Content Paul is Following

Securing development infrastructure (GitHub, Jenkins, etc.)

Code tampering

Securing Infrastructure-as-Code (Terraform, Kubernetes, etc.)

Source code leakage

Software composition Analysis (Snyk, Whitesource, etc.)

Protecting the app in production

View Results

None, we don't perform vendor security reviews

Very little, our vendor reviews are mostly a box-checking exercises

Sometimes vendor security reviews delay purchases but they don't change outcomes

Vendor security reviews break ties between equal vendors

Vendor reviews make security a key buying criteria

View Results
Paul Toal, CISO Advisor at Broadcom | Gartner Peer Community