In the second half of the discussion about secure developer training programs, G Mark Hardy and Scott Russo delve deeper into how to engineer an effective cybersecurity course. They discuss the importance and impact of automation and shifting left, the customization needed for different programming languages and practices, and the role of gamification in engagement and learning. The conversation also touches upon anticipating secular trends, compliance with privacy and data protection regulations, different leaning styles and preferences, and effective strategies to enhance courses based on participant feedback. Scott highlights the lasting impacts and future implications of secure developer training, especially with the advent of generative AI in code generation.
ISACA Event (10 Jan 2024) With G Mark Hardy - https://www.cisotradecraft.com/isaca
Transcripts: https://docs.google.com/document/d/1zr09gVpJuZMUMmF9Y-Kc0DOy-1gH0cx-
Chapters
#178 - Cyber Threat Intelligence (with Jeff Majka & Andrew Dutton)
#177 - 2024 CISO Mindmap (with Rafeeq Rehman)
#176 - Reality-Based Leadership (with Alex Dorr)
#175 - Navigating NYDFS Cyber Regulation
#174 - OWASP Top 10 Web Application Attacks
#173 - Mastering Vulnerability Management
#172 - Table Top Exercises
#171 - Navigating Software Supply Chain Security (with Cassie Crossley)
#170 - Responsibility, Accountability, and Authority
#169 - MFA Mishaps
#168 - Cybersecurity First Principles (with Rick Howard)
#167 - Cybersecurity Apprenticeships (with Craig Barber)
#166 - Cyber Acronyms You Should Know
#165 - Modernizing Our SOC Ingest (with JP Bourget)
#164 - The 7 Lies in Cyber
#163 - Operational Resilience
#162 - CISO Predictions for 2024
#160 - Secure Developer Training Programs (with Scott Russo) Part 1
#159 - Refreshing Your Cybersecurity Strategy
Create your
podcast in
minutes
It is Free
Insight Story: Tech Trends Unpacked
Zero-Shot
Fast Forward by Tomorrow Unlocked: Tech past, tech future
Black Wolf Feed (Chapo Premium Feed Bootleg)
Bannon`s War Room