Artwork

Content provided by G Mark Hardy & Ross Young, G Mark Hardy, and Ross Young. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by G Mark Hardy & Ross Young, G Mark Hardy, and Ross Young or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

#161 - Secure Developer Training Programs (with Scott Russo) Part 2

45:21
 
Share
 

Manage episode 391524943 series 2849492
Content provided by G Mark Hardy & Ross Young, G Mark Hardy, and Ross Young. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by G Mark Hardy & Ross Young, G Mark Hardy, and Ross Young or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

In the second half of the discussion about secure developer training programs, G Mark Hardy and Scott Russo delve deeper into how to engineer an effective cybersecurity course. They discuss the importance and impact of automation and shifting left, the customization needed for different programming languages and practices, and the role of gamification in engagement and learning. The conversation also touches upon anticipating secular trends, compliance with privacy and data protection regulations, different leaning styles and preferences, and effective strategies to enhance courses based on participant feedback. Scott highlights the lasting impacts and future implications of secure developer training, especially with the advent of generative AI in code generation.

ISACA Event (10 Jan 2024) With G Mark Hardy - https://www.cisotradecraft.com/isaca

Transcripts: https://docs.google.com/document/d/1zr09gVpJuZMUMmF9Y-Kc0DOy-1gH0cx-

Chapters

  • 00:00 Introduction
  • 01:08 Importance of Ongoing Support and Mentorship
  • 01:46 The Role of Community in Training
  • 03:03 Hands-on Exercises and Practical Experience
  • 06:01 Success Stories and Testimonials
  • 08:29 Incorporating Security Trends into Training
  • 11:08 Balancing Security with Developer Productivity
  • 18:17 Teaching Secure Coding Practices in Different Languages
  • 20:27 Engaging and Motivating Participants
  • 22:51 Promoting the Program: Engaging and Fun
  • 23:37 Accommodating Different Learning Styles
  • 24:16 Catering to Self-Paced Learners
  • 26:19 Addressing Proficiency Levels and Remediation
  • 28:55 Compliance with Privacy and Data Protection Regulations
  • 30:48 Breaking Down Complex Security Concepts
  • 32:05 Creating a Culture of Security Awareness
  • 33:25 Partnerships and Collaborations in Secure Development
  • 35:10 Feedback and Improvement of the Program
  • 36:12 Cost Considerations for Secure Developer Training
  • 39:20 Tracking Participants' Progress and Completion Rates
  • 41:23 Trends in Secure Developer Training
  • 43:42 Final Thoughts on Secure Developer Training
  continue reading

182 episodes

Artwork
iconShare
 
Manage episode 391524943 series 2849492
Content provided by G Mark Hardy & Ross Young, G Mark Hardy, and Ross Young. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by G Mark Hardy & Ross Young, G Mark Hardy, and Ross Young or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

In the second half of the discussion about secure developer training programs, G Mark Hardy and Scott Russo delve deeper into how to engineer an effective cybersecurity course. They discuss the importance and impact of automation and shifting left, the customization needed for different programming languages and practices, and the role of gamification in engagement and learning. The conversation also touches upon anticipating secular trends, compliance with privacy and data protection regulations, different leaning styles and preferences, and effective strategies to enhance courses based on participant feedback. Scott highlights the lasting impacts and future implications of secure developer training, especially with the advent of generative AI in code generation.

ISACA Event (10 Jan 2024) With G Mark Hardy - https://www.cisotradecraft.com/isaca

Transcripts: https://docs.google.com/document/d/1zr09gVpJuZMUMmF9Y-Kc0DOy-1gH0cx-

Chapters

  • 00:00 Introduction
  • 01:08 Importance of Ongoing Support and Mentorship
  • 01:46 The Role of Community in Training
  • 03:03 Hands-on Exercises and Practical Experience
  • 06:01 Success Stories and Testimonials
  • 08:29 Incorporating Security Trends into Training
  • 11:08 Balancing Security with Developer Productivity
  • 18:17 Teaching Secure Coding Practices in Different Languages
  • 20:27 Engaging and Motivating Participants
  • 22:51 Promoting the Program: Engaging and Fun
  • 23:37 Accommodating Different Learning Styles
  • 24:16 Catering to Self-Paced Learners
  • 26:19 Addressing Proficiency Levels and Remediation
  • 28:55 Compliance with Privacy and Data Protection Regulations
  • 30:48 Breaking Down Complex Security Concepts
  • 32:05 Creating a Culture of Security Awareness
  • 33:25 Partnerships and Collaborations in Secure Development
  • 35:10 Feedback and Improvement of the Program
  • 36:12 Cost Considerations for Secure Developer Training
  • 39:20 Tracking Participants' Progress and Completion Rates
  • 41:23 Trends in Secure Developer Training
  • 43:42 Final Thoughts on Secure Developer Training
  continue reading

182 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Quick Reference Guide