The Strengths of Combining Code Review with Application Penetration Testing
- The strengths of manual pen testing in findings vulns (against Top 10)
- How each technique can leverage the other.
- How proving vulns can be important, but not really in a mature org
- The massive benefit of finding where the vulns are in the CODE, not just finding the flaws in the application
- How tracking down a penetration testing finding to where the flaw is in the actual code can be EXTREMELY hard
- Potentially some discussion on the role of automated analysis tools (both code and external scanning) and their strengths
- An how automated analysis tools can support a more efficient application security assessment process, when combined with manual analysis
Dave Wichers is a cofounder and the Chief Operating Officer (COO) of Aspect Security, a company that specializes in application security services.
As a volunteer to OWASP, Dave is:
- A member of the OWASP Board,
- The OWASP Conferences Chair,
- Project lead and coauthor of the OWASP Top 10,
- Coauthor of the OWASP Application Security Verification Standard, and
- Contributor to the OWASP Enterprise Security API (ESAPI) project.
Dave has over 20 years of experience in the information security field, and has focused exclusively on application security since 1998. At Aspect, in addition to his COO duties, he is Aspect's application security courseware lead, one of their chief instructors, and provides a wide variety of application security consulting services to Aspect's clients. Prior to starting Aspect, he ran the Application Security Services Group at Exodus Communications. Dave has a Bachelors and Masters degree in Computer Science, is a CISSP, and a CISM.