Skip to content

Cybersecurity Insights with Contrast CISO David Lindner | 3/15/24

    
Cybersecurity Insights with Contrast CISO David Lindner | 3/15/24

Insight #1

If you want insight into how difficult security is, look at the Cybersecurity and Infrastructure Security Agency (CISA). The agency was recently breached through a Common Vulnerability and Exposure (CVE) it had placed on its Known Exploited Vulnerabilities (KEV) list. It's difficult out there, folks; keep fighting the good fight.

Insight #2

It is really sad that the urgency of fixing security issues is too low to motivate remediation until someone discloses detailed information about those issues. I look at the recent kerfuffle between JetBrains and Rapid7 over two recently disclosed vulnerabilities. If we would just put more priority on security issues, would we continue running into these problems?

Insight #3

The EU has passed the first AI regulation, the Artificial Intelligence Act, which puts limits on what types of applications can use AI based on their criticality and makes it illegal for the highest-risk tier to use any form of AI. It's an interesting step, but who is classifying the many millions of things that may want to use AI? Will this hamper the ability for organizations or even complete sectors to innovate?

David Lindner, Chief Information Security Officer

David Lindner, Chief Information Security Officer

David is an experienced application security professional with over 20 years in cybersecurity. In addition to serving as the chief information security officer, David leads the Contrast Labs team that is focused on analyzing threat intelligence to help enterprise clients develop more proactive approaches to their application security programs. Throughout his career, David has worked within multiple disciplines in the security field—from application development, to network architecture design and support, to IT security and consulting, to security training, to application security. Over the past decade, David has specialized in all things related to mobile applications and securing them. He has worked with many clients across industry sectors, including financial, government, automobile, healthcare, and retail. David is an active participant in numerous bug bounty programs.