Yet another interesting lecture on the world of programming languages at C1b3rWall Academy 2021. This time under the title “Shifting it to the left” by Borja Gonzalez Carro, who is Lead Security Analyst for IRIUSRISK SL. He is an IT professional with 20 years of experience, the last six oriented to cybersecurity. He practices different branches of cybersecurity and lately he focuses on application security and S-SDLC, Security by Design and Security by Default.

The aim of the Shift Left strategy is to bring security as far to the left as possible (as far upstream) in the project schedule. Security must be present throughout the software development life cycle (SDLC). Placing security to the left implies:

  • Anticipating risks and security breaches.
  • Saving time.
  • Saving effort.
  • Saving costs.

How can we develop more secure software?

Security by Design: Design secure and robust software components.

Security by Default: The default configuration of software components will be the most secure possible.

Leveraging techniques such as Threat Modeling: Identify potential threats even before writing a single line of code.

Threat Modeling

It is the identification and analysis of the attack surface of the entire space that our application or project has and is susceptible to attack. Threat Modeling allows for the early detection of threats, right up from the design phase.

It takes us to more technical but also more interesting terms. If you would like to learn more about this topic and other topics related to security and programming languages, don’t miss the opportunity to enroll in the C1b3rWall Academy program, which already has more than 50,000 participants from all over the world. You can also take it a step further and enroll in the next Master’s Degree in Cybersecurity at the University of Salamanca.

Posted by Juan M. Corchado

Juan Manuel Corchado (15 de Mayo de 1971, Salamanca, España) Catedrático en la Universidad de Salamanca. Ha sido Vicerrector de Investigación desde el 2013 hasta el 2017 y Director del Parque Científico de la Universidad de Salamanca. Elegido dos veces como Decano de la Facultad de Ciencias, es Doctor en Ciencias de la Computación por la Universidad de Salamanca y, además, es Doctor en Inteligencia Artificial por la University of the West of Scotland. Dirige el Grupo de Investigación Reconocido BISITE (Bioinformática, Sistemas Inteligentes y Tecnología Educativa), creado en el año 2000. Director del IOT Digital Innovation Hub y presidente del AIR Institute, J. M. Corchado también es Profesor Visitante en el Instituto Tecnológico de Osaka desde enero de 2015, Profesor visitante en la Universiti Malaysia Kelantan y Miembro del Advisory Group on Online Terrorist Propaganda of the European Counter Terrorism Centre (EUROPOL). J. M. Corchado ha sido presidente de la asociación IEEE Systems, Man and Cybernetics, y coordinador académico del Instituto Universitario de Investigación en Arte y Tecnología de la Animación de la Universidad de Salamanca e investigador en las Universidades de Paisley (UK), Vigo (Spain) y en el Plymouth Marine Laboratory (UK). En la actualidad compagina toda su actividad con la dirección de los programas de Máster en Seguridad, Animación Digital, Telefonía Movil, Dirección de Sistemas de Información, Internet de las Cosas, Social Media, Diseño e Impresión 3D, Blockchain, Z System, Industria 4.0, Gestión de Proyectos Ágiles y Smart Cities & Intelligent Buildings​, en la Universidad de Salamanca y su trabajo como editor jefe de las revistas ADCAIJ (Advances in Distributed Computing and Artificial Intelligence Journal), OJCST (Oriental Journal of Computer Science and Technology) o Electronics MDPI (Computer Science & Engineering section). J. M. Corchado desarrolla principalmente trabajos en proyectos relacionados con Inteligencia Artificial, Machine Learning, Blockchain, IoT, Fog Computing, Edge Computing, Smart Cities, Smart Grids y Análisis de sentimiento.

Thanks for your comment

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.