Beyond Traditional Software Security: Let's Explore the Concept of a Workflow Bill of Materials

Channel:
Subscribers:
4,700
Published on ● Video Link: https://www.youtube.com/watch?v=0GRHMVuAdmw



Duration: 43:07
12 views
1


Guest: Francesco Cipollone, CEO & Founder at Phoenix Security [@sec_phoenix]

On LinkedIn | https://www.linkedin.com/in/fracipo/

On Twitter | https://twitter.com/FrankSEC42

On YouTube | https://www.youtube.com/@phoenixsec

____________________________

Host: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]

On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martin

____________________________

This Episode’s Sponsors

Imperva | https://itspm.ag/imperva277117988

Pentera | https://itspm.ag/penteri67a

___________________________

Episode Notes

In this episode of Redefining CyberSecurity Podcast, host Sean Martin is joined by Francesco Cipollone from Phoenix Security for a riveting conversation on the vulnerabilities associated with using pre-made tools for website development. The dialogue revolves around the inherent security risks these tools pose, especially when used by non-technical teams like marketing.

Francesco shares a fascinating account of discovering a potential SQL injection in a well-known CRM system. This revelation underscores the importance of input validation and the necessity of secure defaults in any tool. The discussion also brings to light the fact that many systems do not consider these potential security risks as standard, often requiring additional licenses or configurations for basic security measures.

The conversation takes an interesting turn as they discuss a new concept of a Workflow Bill of Materials™ (WBOM)—a term coined by the host, Sean Martin, for the first time. This idea extends beyond the typical focus on software bill of material security (which often focuses on source code, services, and APIs) to include a broader view of the tools and systems that teams use in their daily operations. The WBOM concept emphasizes the need for organizations to understand the associated risks of these tools and implement more secure practices.

Sean and Francesco highlight the importance of threat modeling in identifying potential risks. They also discuss the challenges organizations face in ensuring security, especially when these tools are used by teams with zero security knowledge. The episode concludes with a call to action for the industry to move towards security by default and the ethical use of technology.

This episode offers listeners an insightful look into the complexities of cybersecurity in the context of commonly used tools and systems, and the urgent need for a shift in perspective when it comes to securing these tools.

___________________________

Watch this and other videos on ITSPmagazine's YouTube Channel

Redefining CyberSecurity Podcast with Sean Martin, CISSP playlist:

📺 https://www.youtube.com/playlist?list=PLnYu0psdcllS9aVGdiakVss9u7xgYDKYqITSPmagazine YouTube Channel:

📺 https://www.youtube.com/@itspmagazine

Be sure to share and subscribe!

___________________________

Resources

Francesco's LinkedIn Post: https://www.linkedin.com/posts/fracipo_bit-of-a-rant-on-the-security-tax-of-certain-activity-7139650868064202753-LZ21/

___________________________

To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit:

https://www.itspmagazine.com/redefining-cybersecurity-podcast

Are you interested in sponsoring an ITSPmagazine Channel?

👉 https://www.itspmagazine.com/sponsor-the-itspmagazine-podcast-network




Other Videos By ITSPmagazine


2024-01-11ITSPmagazine Podcast Network Weekly Catch-Up | January 11, 2024 | Unscripted and Random Thoughts ...
2024-01-11ITSPmagazine Podcast Network Weekly Catch-Up | January 11, 2024 | Unscripted and Random Thoughts
2024-01-10Do I Own It If I Cannot Touch It? Do I Even Care Anymore? Exploring Data Ownership in a Digital A...
2024-01-10Do I Own It If I Cannot Touch It? Do I Even Care Anymore? Exploring Data Ownership in a Digital Age
2024-01-09Embracing the Cubes A Conversation on Robotics, Artificial Intelligence, and Human-Tech Interactions
2024-01-08CES 2024 Coverage | The Connected Farm: New Technology And Tools For Farmers To Reduce Waste And ...
2024-01-07Tech Layoffs - Why or Why Not Me? | Locked Down Podcast With Kayla Williams and Taylor Parsons
2024-01-05Book | Black Grief, White Grievance: The Politics of Loss | A conversation with the Author, Profe...
2024-01-05Book | Black Grief, White Grievance: The Politics of Loss | Author, Professor Juliet Hooker
2024-01-05Beyond Traditional Software Security: Let's Explore the Concept of a Workflow Bill of Materials (...
2024-01-05Beyond Traditional Software Security: Let's Explore the Concept of a Workflow Bill of Materials
2024-01-03Shaping Tomorrow's Workforce: The Impact of Generative AI on Work Dynamics and Organizational Cul...
2024-01-03Shaping Tomorrow's Workforce The Impact of Generative AI on Work Dynamics and Organizational Culture
2024-01-02What Really Motivates Your Team | A Conversation with Chris Caruso | The Soulful CXO Podcast
2024-01-01Sean Martin wishes you and yours a year of peace, prosperity, and promise
2023-12-31Operationalize Cybersecurity Throughout the Business: Building Security from the Ground Up | A Co...
2023-12-30A Cyber Vision in Motion: Topics I am Keen to Explore in 2024 | A Musing On the Future of Cyberse...
2023-12-29The Role of AI in Cyber Attacks and Cybersecurity Defense Strategies: Adapting the Business to an...
2023-12-28GRC Trends | A Conversation with Sonal Agrawal | Locked Down Podcast
2023-12-28The AI Inflection Point with Leslie Shannon: Exploring the Future of Entertainment and Media | A ...
2023-12-28The AI Inflection Point with Leslie Shannon: Exploring the Future of Entertainment and Media



Tags:
Redefining Cybersecurity
Sean Martin
Francesco
Phoenix Security
pre-made tools
website development
security vulnerabilities
CRM systems
SQL injection
input validation
secure defaults
non-technical teams
marketing
software security
threat modeling
Workflow Bill of Materials
WBOM
ethical use of technology
cybersecurity
application security
security risks
open source
commercial services
security company
asset inventory