In this episode of "Build Amazing Things Securely," host Laura Bell Main sits down with Andrew from Teko. Andrew shares his journey from software development to application security, highlighting his burnout experience and subsequent career pivot. He discusses the importance of understanding and integrating into teams' existing processes, using techniques like Rosebud Thorn for cultural and security growth. Andrew emphasizes learning from mistakes, the value of different perspectives in AppSec, and the future direction of the field.
DYjSn56zeT31N17Upavk
laura-bell-main--she-her-_1_11-22-2023_130012:
Hello everybody and welcome back to this
2
:episode of Build Amazing Things Securely.
3
:My name is Laura Bell Main and
as well as Running Safe Stack.
4
:I am your host and guide for
this and All Bats episodes today.
5
:We have a great guest with us.
6
:We have Andrew here from.
7
:Tayko.
8
:Now I, I am seeing that
in the, that little way.
9
:'cause I saw it written down and my
brain went, how do I pronounce this?
10
:You'll know this from previous episodes.
11
:I'm bad at names.
12
:So it's like Tao, but not Tao.
13
:So there we go.
14
:You can always say in that kind of
name if you want in that kind of tone.
15
:But jokes aside, welcome Andrew.
16
:It is lovely to have you here today.
17
:Track 1: It's good to have you.
18
:So just letting you know, Laura it's Teko.
19
:Do you wanna start again?
20
:laura-bell-main--she-her-_1_11-22-2023_130012:
I'm truly terrible with names.
21
:No, we're just gonna leave it Soko.
22
:There we go.
23
:No, we, we on this show.
24
:We own our mistakes.
25
:Track 1: I was trying to
help you with the taco
26
:laura-bell-main--she-her-_1_11-22-2023_130012:
just, yeah, no, and no.
27
:And then I
28
:Track 1: have gone down the Tokyo route.
29
:laura-bell-main--she-her-_1_11-22-2023_130012:
Yeah, I did.
30
:My brain just liked going there.
31
:All right.
32
:Okay, so
33
:Track 1: We just like the sound
of it and we like the look of it.
34
:So
35
:laura-bell-main--she-her-_1_11-22-2023_130012:
Takyo, like ko.
36
:Wait, we got it.
37
:Okay.
38
:So thank you Andrew.
39
:We've already learned things.
40
:I've already learned things today.
41
:So who are you?
42
:The human.
43
:Track 1: Who am I?
44
:The human.
45
:Okay.
46
:Oh, that, that's a very deep question.
47
:, how long do we have?
48
:We've got 25 minutes.
49
:25 minutes.
50
:laura-bell-main--she-her-_1_11-22-2023_130012:
yeah.
51
:I'll steer you if you end up on laying on
a couch and talking about your parents.
52
:We'll be fine though.
53
:Track 1: Good, good.
54
:. I tend to do that.
55
:Me as a person.
56
:I'm someone that, likes to,
I've always been very technical.
57
:I've been a data-driven kind of person.
58
:I love data analytics.
59
:I love finding behavioral
patterns in data.
60
:And, it was, there was a point in around
:
61
:acquisition and I was helping around
that company and I burnt myself out.
62
:I.
63
:I took some time off.
64
:I was, and I started to really
think about, my approach.
65
:And I think that's what who I am now
as a person is I changed my attitude
66
:and my way of thinking about things.
67
:And I like still like to use
data, but I also love people.
68
:And I love helping people and I've always
loved helping people and I I've started
69
:like this security journey now about
helping and relating to people rather than
70
:letting technology dictate and letting
processes and rigid things dictate.
71
:As a person, that's who I am.
72
:I love to help.
73
:And where I've come from a careers
perspective I've done about 10 to
74
:15 years of software development.
75
:Came from the good old days of,
that net drive went through all
76
:the perils of ASP version one.
77
:laura-bell-main--she-her-_1_11-22-2023_130012:
Ooh.
78
:Track 1: and and I think I was very lucky
'cause at that era of working inside
79
:companies, we got to see a lot of change
in the attitudes of maybe the old guard
80
:and the new guard that was coming through,
which is this agile process that, had,
81
:has been around for, 50 plus years.
82
:But finally getting into those teams
and progressing away from the waterfall
83
:techniques and having those epiphany
moments, in when it was all coming out,
84
:I think was a very unique position to be
in, and I've carried that out as well.
85
:So yeah, developer, then I decided
to create a really nice portal
86
:for everyone to, to log into, so
for some volunteers, and I made
87
:it vulnerable and it got hacked.
88
:laura-bell-main--she-her-_1_11-22-2023_130012:
Oh no.
89
:Track 1: all know about those kind
of things, it never feels good.
90
:And, I left it for a couple
of months, but then I started
91
:to really get intrigued in it.
92
:And I've met a couple
of really good people.
93
:They weren't, dictating, they helped me.
94
:They gave me some books to
read about the OS top 10.
95
:There was a book about it
and how to do it in net.
96
:So I read that.
97
:And.
98
:So I started to get my journey in security
through Alcorn Group with Wade Alcorn.
99
:And he gave me the confidence that
I wanted to have to start working
100
:in security and naturally led me
into my AppSec career that I am,
101
:like I'm journeying on now and.
102
:Now my company that I'm trying to show
and help the industry change in the
103
:way that I felt back in 2000 2010.
104
:That's a long time ago now, isn't it?
105
:laura-bell-main--she-her-_1_11-22-2023_130012:
Yeah, it's all right.
106
:We're all old.
107
:We'll just bypass that.
108
:Don't worry.
109
:Track 1: But yeah, that,
that's me at the moment.
110
:And I've got my business
par partner, Isaac.
111
:We've got a similar mindset about
helping our clients predominantly,
112
:rather than just doing the
everyday sort of consultancy work.
113
:And yeah, that, that's sort of
me where I am at the moment.
114
:I love my family.
115
:I put them above everything
else since that burnout period.
116
:And I'm, I try and make sure that I.
117
:Our employees have that sort of sane
mentality and hopefully we won't
118
:go down the way that, traditionally
happens with burnout for certain
119
:consultants in our industry.
120
:laura-bell-main--she-her-_1_11-22-2023_130012:
Look there, there's many
121
:things to unpick here.
122
:I'm just gonna call out a few things.
123
:Firstly, hat tip to the OG Wade Alcorn,
who, if you haven't met him, folks
124
:at home is genuinely a nice human.
125
:Do reach out and have a look at
what he's up to and what he's done.
126
:It is an impressive career path he's built
for himself, and I know he's impacted a
127
:lot of people, not just the lovely Andrew.
128
:He's today.
129
:It's a big step to, to build
your own company, Andrew.
130
:So that's really amazing.
131
:And congratulations.
132
:Burnout is a terrible thing and I'm
sure many of the audience have been
133
:around that in some way, but to
come back from that and choose to
134
:build something of your own is huge.
135
:So fantastic.
136
:Really excited.
137
:And that's why I wanted to have you
on today because some of the ways you
138
:think Andrew are a little bit unusual.
139
:And when we've been talking in
the past, there are ways you
140
:bringing security to software.
141
:That we haven't thought about before,
or at least I haven't thought about.
142
:So I wanted to dig in today of, with
the breadth of experience you have with
143
:all of the things you've seen what is it
you do in AppSec that's a bit weird and
144
:different, and what can we learn from you?
145
:Track 1: Look it is a bit weird and
a bit different and it's probably
146
:a weird and different to maybe our,
like our fellow folks in security.
147
:But if you were to talk to an engineer
and to a product manager, these kind
148
:of ways of thinking are actually
fairly straightforward and what they do
149
:every day and how they do things and.
150
:I definitely felt that way when
I first was introduced to most of
151
:these processes that I like to like,
that I like to do with companies
152
:when I go in and have a look around.
153
:And, I didn't necessarily
start thinking this way.
154
:I've made a lot of mistakes
along the way, and I think
155
:that's something that, you know.
156
:I hope your viewers and listeners like get
to listen to that and say, I don't wanna
157
:make mistakes make as many mistakes as
you can, because if I didn't make those
158
:mistakes, I wouldn't have the mental
like thinking that I have right now.
159
:And, don't be arrogant about it.
160
:Differently, generally that's a.
161
:And I can encourage my children always
think differently and don't worry
162
:about if people say that it's wrong.
163
:You personally know if you are
on the right track and you think
164
:positively, so give it a go and
it's okay to make those mistakes.
165
:laura-bell-main--she-her-_1_11-22-2023_130012:
All right.
166
:You've got us all intrigued, Andrew.
167
:Okay we've got permission
to make mistakes.
168
:It's all gonna feel a bit weird.
169
:I feel like we're being briefed on
some kind of crazy adventure here.
170
:So what are these processes that you
are borrowing from the existing software
171
:world, from the existing product world
and where do they fit into security?
172
:Track 1: Generally with application
security, we want to fit into the
173
:lifecycle of a product or, S-S-D-L-C.
174
:So the software development lifecycle
is something that we, where we always
175
:start with when we talk about AppSec and
where we're going to inject security.
176
:I've tried that before, and when I've
come in with, threat modeling processes of
177
:different maturities of different things,
I've started from, asking those three
178
:key questions, what can go wrong, all
those kind of things to full on blowing
179
:spreadsheets with, questions that would
generally help us, but maybe not help
180
:an engineer who's too busy doing work.
181
:The very first one that I got to be
involved in is the Rose Budd Thorn.
182
:And it was part of a retro
session with one of the teams.
183
:And it was basically trying to get
what they had done wrong, what they'd
184
:done right, and what do they want to
actually do further in the future.
185
:And I've taken that sort of approach
to how I come into companies.
186
:I.
187
:And evaluate like where everything is
because if you get a bunch of, very
188
:intelligent, smart people in a room and
you ask them a few questions and you
189
:break up those sessions into smaller
sessions with smaller groups of people, I.
190
:You really start to get how
they're feeling and where
191
:security truly actually is.
192
:'cause you can sit in a room and talk
about it as we all have done and through
193
:auditors and all that kind of stuff.
194
:But if you don't truly believe
that what you're doing is actually
195
:going to make a difference, then
you generally don't want to.
196
:And I found that get,
letting everyone get it out.
197
:And generally you do find
there's a lot of thorns.
198
:And then
199
:laura-bell-main--she-her-_1_11-22-2023_130012:
Hank, I'm gonna have to stop you, Andrew.
200
:'cause you believe it or not, I
don't know what Rosebud Thorn is.
201
:Can you just step us backwards
and what is a rose and what
202
:is a bird and what is a thorn?
203
:'cause I don't think we're
in the garden right now.
204
:Track 1: Yeah.
205
:So when you think about a,
like a rose it generally goes
206
:through the phases of growth.
207
:And so you've got the
thorn, which hurts you.
208
:So that's the bad, the things that
you know, you're not generally
209
:happy with and what you're going
and how you're progressing.
210
:You got the bud, which is your growth.
211
:So what do you want to do
and how do you wanna do it?
212
:What do you think you can do better?
213
:And then you got your flour, which
is the thing that you are doing well.
214
:And that's probably one of the
most important things to 'cause.
215
:It's usually the one that isn't
filled out the most when you
216
:have these kind of sessions.
217
:And it's that process of taking those
thorns and actually talking and digesting
218
:some of those things together that they
actually do turn out to be flowers.
219
:That's pretty much the gist,
220
:laura-bell-main--she-her-_1_11-22-2023_130012:
today I.
221
:Track 1: and, yeah I just found it
like it's, anyone that hasn't done it,
222
:even going through that process that we
just went through a little bit before,
223
:it makes you break out of the normal
mundane routines of what's going on.
224
:And allows people to relax and do things.
225
:And the more session sessions you do.
226
:Something that I've, that I wasn't
doing in the past, but I'm starting
227
:to do now is keep a track of each one
and to show, and maybe we might talk
228
:about it a bit more, but we've gotta
show, when you talk about these kind
229
:of processes, it's hard to measure.
230
:And that's one of the experiments I'm
going with right now with seeing how I can
231
:measure like company's growth and culture.
232
:Through this process by showing them like,
this was a thorn four quarters ago and
233
:now it's a, it's turned into a rose and
things like that, and it helps teams show
234
:that they actually are growing in security
235
:laura-bell-main--she-her-_1_11-22-2023_130012:
I love this.
236
:I love this because, we talk a lot
about return on investment and you'll
237
:see lots of marketers who, say, Hey,
do this thing and you will get, a
238
:hundred million dollars return on this.
239
:Or, 93% of bugs are
stopped in their tracks.
240
:But in reality, most of
that's just made up hype.
241
:I love the idea that while this is
quite a, it's a cultural exercise,
242
:it's, we're not talking about how many
bugs were on Tuesday versus Wednesday.
243
:The way you're structuring this and
coming back to it is giving you those
244
:reference points to see growth over time.
245
:And I think taking that extra time
to make sure you've recorded it and
246
:can see and take a moment to look
back and see that is something we
247
:can all remember to do more of.
248
:It's really easy to keep going
forward and not take stock and
249
:remind ourselves how far we've come.
250
:Track 1: Yeah, no, definitely.
251
:And just, as keeping to, who I am
as a human, I do not to the point of
252
:practicing it by writing it down, I.
253
:I do that with my partner.
254
:I do that with my parents and, it
does grow a sense of communal and that
255
:kind of thing to, 'cause we all live
busy lives and, being able to reflect
256
:and act don't generally do much.
257
:laura-bell-main--she-her-_1_11-22-2023_130012:
Okay, so I'm loving this.
258
:We are borrowing processes
that are already established.
259
:They already work.
260
:We know that, and we're
applying them into our space.
261
:Now, what's the benefit of
using a process that people are
262
:already familiar with instead of
bringing in a new one, you think?
263
:Track 1: There's lots of process,
like lots of benefits I always go
264
:back to that mistake that I made
when I came in with all these
265
:processes that I thought were amazing.
266
:And, I said before I'm a data person,
so I love writing up processes,
267
:how it's gonna work and everything.
268
:And, the concept of build
shock, they get process shock.
269
:And you are working in these highly
scalable, highly moving teams.
270
:They've already had their velocity
measured, they're working very well,
271
:and then all of a sudden, the security
consultant comes in and disrupts it.
272
:And there are techniques, inside
agile that help disruption.
273
:But ultimately you don't want to disrupt.
274
:The thing that I do like to do is like
the Rosebud Thorn, I do introduce people
275
:to, because it helps me understand
what's going on, but then sitting and
276
:watching how they do their things.
277
:And then, using how I, like how we do
things in security and trans, like trans
278
:translating it into their way of thinking.
279
:There was a company that
I was consulting for and.
280
:They were heavy in the design
aspect they brought up their mirror.
281
:They started to do the, show me
the gooey design, and then they had
282
:these little cards and it was like
Joe blogs such and such likes to
283
:use the platform for doing X, Y, z.
284
:He is a family man.
285
:He's the age of this.
286
:And, the design personas
that everyone uses.
287
:And this is, this, it's probably not a
new concept, but it was a new one for me.
288
:So I went to the design team and
shout out to, to Damien if he's
289
:actually gonna listen to this.
290
:But he went and drew me up.
291
:Part of my role was to
do a threat profile.
292
:We learned about it, built up
a threat profile, built up all
293
:the things that could possibly
be a threat to this company.
294
:And then we went and made personas.
295
:So hang on.
296
:I can't remember the names of them,
but hopefully I will be able to.
297
:So we had Ida Impersonator.
298
:Ida is the master of deception.
299
:She's stolen and forged credentials
to gain unauthorized access to
300
:systems, always keeping with
a true identity and secret.
301
:And then we we put traits so deceptive
opportunistic, and then we put in
302
:some defense strategies around it.
303
:So the ways that we can
mitigate those those threats.
304
:Ap API, key rotation.
305
:Token validation, all that kind
of stuff that as we, we know as
306
:security people will help you prevent
the threats and mitigate them, but
307
:trying to do it in a different way.
308
:So then when they went and designed
their system team, they had not only Joe
309
:Blogs, but they had IDA sitting there.
310
:So that, and then the product
manager would be like, okay, how
311
:are we going to deal with ida?
312
:And then people would
start to talk about it.
313
:And it's that kind of like
looking at how people work already
314
:laura-bell-main--she-her-_1_11-22-2023_130012:
I think this is a really interesting
315
:shift for us as an industry.
316
:It's very hard an a sign of maturity
for a group to be able to go from being,
317
:Hey, we are the authority on this thing.
318
:Here's the thing, you should be doing
it to bringing all of your skills
319
:and techniques and your experience,
but in a subtle, non-ego way, we
320
:go, cool, you are doing this thing.
321
:How can I help?
322
:Weave something new into that.
323
:It's security stops being the
main event and it starts being a
324
:gentle thread through an existing
developer workflow workflow even.
325
:So in this process of borrowing these
processes and bringing them into
326
:teams, have there been any other
kind of things that if you, somebody
327
:was listening at home and they were
gonna start on this themselves, any
328
:recommendations you'd make for them?
329
:I love this.
330
:That's great advice.
331
:And I love the idea of just going
to a tool that, other roles and
332
:software are using and just go
look at what their templates are.
333
:Go see what their processes are, what
tools they use, because the closer you
334
:get to them, the less cognitive load that
they have to join you on your adventure.
335
:'cause they already know
there's tools, these techniques.
336
:So if you were gonna pick, if you're
gonna put on your like psychic hat
337
:and look forwards in AppSec Andrew,
where did you think it's headed?
338
:Where are the big problems and
challenges that we're gonna be
339
:looking at in the next five years?
340
:Oh, absolutely.
341
:I'm here with my thorns.
342
:My thorns for you.
343
:I really love this the future of
application security instead of
344
:being a blocker as a coach and an
enabler and as an inspiration, but
345
:then ultimately no longer needed
in the way that it currently is.
346
:What an ideal dream that would be.
347
:And perhaps, but folks who are listening
can, take some of the guidance from this.
348
:Go move a little closer
to their dev teams.
349
:Work in ways they're already familiar
with and see how many people you
350
:can inspire, like Andrew to get
their little light bulb moments.
351
:If we were to follow along with
your adventures after this,
352
:Andrew and Tako, look at me.
353
:I can say it learning.
354
:We can do it too.
355
:If we would follow along with your
adventures, what's the best way to
356
:catch up with you and what you're up to?
357
:That's incredible and what
a generous offer there.
358
:It's absolutely fine and there
are many of us not on the social
359
:medias, but what a lovely offer.
360
:Do reach out to myself, reach out to
Andrew, reach out to others in your
361
:community because, sometimes sitting
down and having a chat, even if it's
362
:recorded for the internet, like this can
be really helpful for everyone involved.
363
:Right Andrew, it has been an
absolute delight to have you here.
364
:I'm sure we are going to catch up again
at some point in the future as you explore
365
:further into how to make application
security part of everyone's world.
366
:So thank you for coming
on and being a guest.
367
:I'd never call it that.
368
:I literally have a unicorn
in my background team.
369
:Airy fairy is all good with me.
370
:Right team at home, you know
the drill at this point.
371
:Now I've been reading books about
podcasts and apparently I'm not supposed
372
:to tell you to like, and subscribe.
373
:I'm supposed to tell you to go and
recommend this podcast to a friend.
374
:So off you go.
375
:Go find a friend.
376
:Make friends, give them
cake, possibly a podcast.
377
:Who knows?
378
:That's apparently how this works.
379
:If you are gonna be wonderfully brave
like Andrew and wanna share what you are
380
:working on with whatever you are building
in the world, come and have a chat to us.
381
:If you visit
www.buildamazingthingssecurely.com,
382
:we've got a fancy domain now you
can sign up to a guest and you can
383
:check out our previous episodes.
384
:So thank you for your ears.
385
:We look forward to seeing you
on the internet again soon.
386
:And thank you, Andrew, one more time
for being such a wonderful guest today.