RSAC™ 2025 Conference Quick Look: The Future of Secure Programming Using LLMs

Subscribers:
98,300
Published on ● Video Link: https://www.youtube.com/watch?v=hd8yOtG9W4g



Duration: 0:00
138 views
2


Presenter: Mark Sherman, Director, CERT, Software Engineering Institute, CMU

This Quick Look provides a short preview of the full session at RSAC™ 2025 Conference, taking place April 28 to May 1, 2025. This presentation grounds expectations of using LLM-based systems for fixing software and will present results of evaluating 100s of examples of insecure code drawn from real systems by various models from OpenAI. The results illustrate the strengths, weaknesses, progress, and gaps of different systems as they have evolved over recent years. Methods for closing the gaps will be discussed.
https://path.rsaconference.com/flow/rsac/us25/FullAgenda/page/catalog/session/1726853558154001fyP4.




Other Videos By RSA Conference


2025-04-27RSAC™ Conference Lifetime Achievement Award Presentation
2025-04-24RSAC™ 2025 Conference Quick Look—Older & Online—How to Stay Safe in a Quickly Changing Digital World
2025-04-24RSAC™ 2025 Conference Quick Look: Adversarial Illusions in Multi-Modal Embeddings
2025-04-18RSAC™ 2025 Conference Quick Look—Multi-District Litigation—Navigating the 2020 Ransomware Experience
2025-04-18RSAC™ 2025 Conference Know Before You Go
2025-04-17Webcast: From Hack to Sale: The Journey of Stolen Data
2025-04-16RSAC™ 2025 Conference Quick Look: From Good to Great, the Foundations of Application Security
2025-04-15RSAC™ 2025 Conference Quick Look: Protecting the Digital Community: A Scam Awareness Playbook
2025-04-14RSAC™ 2025 Conference Quick Look: Secure by Design: Are We Winning?
2025-04-11RSAC™ 2025 Conference Quick Look: Pig Butchering and the Threat of Transnational Organized Crime
2025-04-10RSAC™ 2025 Conference Quick Look: The Future of Secure Programming Using LLMs
2025-04-09Webcast: Is Cyber Risk on the Rise? Let’s Ask the Data
2025-04-08RSAC™ 2025 Conference Quick Look—Suspicious Minds—Hunting Threats that Don't Trigger Security Alerts
2025-04-07Preview: RSAC™ Innovation Sandbox | Where Are They Now - Reality Defender
2025-04-07RSAC™ Innovation Sandbox Contest | How to Craft a Winning Submission
2025-04-07RSAC™ 2025 Conference Quick Look: The Microsoft Cloud Identity Crisis
2025-04-04RSAC™ 2025 Conference Quick Look: 10 Common Flaws in Incident Response Plans
2025-04-04RSAC™ 2025 Conference Quick Look: War Planning for Technology Companies
2025-04-04RSAC™ Innovation Sandbox Contest | Shining a Spotlight on Cybersecurity Startups
2025-04-03Preview: RSAC™ Innovation Sandbox | Where Are They Now - Axonius
2025-04-02RSAC™ 2025 Conference Quick Look: A Deep Dive into the New SEC Cybersecurity Disclosure Requirements