Skip to content

Cybersecurity Insights with Contrast CISO David Lindner | 8/12

    
Cybersecurity Insights with Contrast CISO David Lindner | 8/12

Insight #1

"Penetration testing and vulnerability scanning are two different things. Penetration testing will give you information about exploiting vulnerabilities whereas a vulnerability scan will just provide you with potential avenues for exploitation. These two should be used in tandem as one of the many tools in your security toolbox to find and fix true positive vulnerabilities."
 

Insight #2

"Security is now a part of the business. CISOs and security leaders are moving to report to the Board and security decisions are made without conflicts of interest. This move is critical for organizations as they grow to make sure their security posture continually improves."
 

Insight #3

"Psychological acceptability is a critical component when designing security features in a product. I like to follow the keep it super simple model when helping architects design new security features. Over-architecting can lead to more problems and many times over-architected security features don’t provide the level of security they may look like. If your risk level or threat models don’t change with the new feature, I would re-think the need to add it in the first place."
David Lindner, Chief Information Security Officer

David Lindner, Chief Information Security Officer

David is an experienced application security professional with over 20 years in cybersecurity. In addition to serving as the chief information security officer, David leads the Contrast Labs team that is focused on analyzing threat intelligence to help enterprise clients develop more proactive approaches to their application security programs. Throughout his career, David has worked within multiple disciplines in the security field—from application development, to network architecture design and support, to IT security and consulting, to security training, to application security. Over the past decade, David has specialized in all things related to mobile applications and securing them. He has worked with many clients across industry sectors, including financial, government, automobile, healthcare, and retail. David is an active participant in numerous bug bounty programs.