December 11, 2025
There’s a major problem in application security: Organizations secure code before release, but attackers strike in production. This gap is exactly where runtime application security comes in.
In his DevOpsCon Munich keynote, Backbase CISO Brian Vlootman explained how this reality shapes defense for Backbase, a modern banking platform that runs on top of customers’ aging core systems. Banks rely on Backbase to deliver digital banking experiences even when their legacy cores are hard to modernize or staff. That dependency raises the stakes in production, and Vlootman showed why prevention alone cannot protect live banking applications.
What follows are the five security learnings he laid out, including the case for Application Detection and Response (ADR). Use these links to jump to each section:
Most teams run EDR on hosts but leave applications undefended.
Shipped flaws and new CVEs still reach live banking systems.
Restrict reconnaissance and lateral movement in cloud native banking apps.
Follow untrusted input through live execution and stop attacks instantly.
Ground truth on real exposure, real endpoint usage and real dependencies.
At DevOpsCon Munich, CISO Brian Vlootman asked the room two questions.
His point landed instantly. The entire industry protects hosts in production, but leaves live applications unguarded, even though that is where attackers strike. Backbase could not accept that blind spot. What followed was his five-lesson playbook for defending real banking applications under real attack.
If the input turns malicious along that path, ADR can block the exploit in real time. SQL injection was his concrete example.
The takeaway is simple. Host-level detection is now standard in production. Application runtime detection is not, even though exploitation actually happens in the application layer.
Backbase first built a prevention-heavy SDLC program. The baseline he described included:
Developer security training to build secure coding habits and prevent basics like SQL injection
Some controls only work once the application is running in a real environment. Without that full runtime context, including real traffic paths and real service interactions, those controls cannot be tested or trusted.
That is why Brian pushed back on “shift left” as a blanket rule. His point was to do the right security at the right time in the SDLC, because some controls only make sense at the end of the lifecycle. He made the same point about tools. Backbase dropped an early SAST tool because the findings were so noisy that developers could not clear them, so the tool was adding security debt instead of reducing risk.
Even with a mature prevention program, he called out an “uncomfortable truth” that AppSec teams have to plan for. The SDLC still focuses on prevention and vulnerability hunting before release. That work is necessary, but it does not close the production risk.
He tied both gaps to Backbase’s shift into SaaS. Once you operate the platform, you own production risk and customer data protection continuously, not just at release.
The first production answer he described was Defensible Security Architecture. It starts from assuming production is under constant attack. When a vulnerability is exploited, attackers gain access, but exploitation is not automatically game over. Attackers usually need time for reconnaissance, foothold and lateral movement. He said that a window can last hours, days, weeks, or even months. Defensible architecture is designed to exploit the attacker’s post-exploit window. It limits how far an attacker can move after landing and makes any abnormal movement appear quickly as a high-signal event.
He made the approach concrete in cloud native microservices:
He linked defensible security architecture to cyber resilience and EU DORA. The posture assumes compromise, reduces blast radius and keeps unaffected components operating. Detection engineering sits within the same layer, prioritizing logs and alerts for events that should not happen. Those exceptions produce the highest fidelity signals.
Two Backbase security principles he highlighted:
After laying out prevention and a defensible architecture, he added ADR to Backbase's production runtime control.
ADR is deployed as an agent beside the software already running in production. That agent instruments what is going on inside the application. It can trace how client-supplied input flows through live execution to sensitive operations such as database calls. When the runtime path exhibits malicious behavior, such as an injection attempt, ADR can block the exploit on the spot.
He ties ADR to two production facts:
In his model, ADR sits behind the SDLC as the runtime layer that catches exploitation-prevention misses and exposure that occurs after shipping.
ADR is more than a runtime exploit blocker. Once the agent runs in production, it gives two kinds of ground truth that SDLC tools cannot: what the live application is actually exposing and which dependencies are actually executing in memory. That production data reshapes how AppSec teams scope risk and prioritize CVEs.
Runtime defense has to be engineered in layers, not bolted on after prevention fails.
Brian’s DevOpsCon model was layered.

Jake Milstein is Vice President of Corporate Marketing & Communications at Contrast Security, where he drives awareness of Application Security and Application Detection & Response (ADR). Before entering cybersecurity, Jake spent much of his career leading newsrooms and newscasts at CBS, Fox, NBC, and ABC affiliates nationwide, earning multiple Emmy and Edward R. Murrow awards. He has since led sales and marketing teams at leading cybersecurity companies, helping customers stop breaches with Managed Detection and Response (MDR), Application Detection and Response (ADR), and a wide range of consulting services.
Get the latest content from Contrast directly to your mailbox. By subscribing, you will stay up to date with all the latest and greatest from Contrast.