PRESENTATION: If Our Developers Are Our Front Line of Defense, Why Do We Put Them Last?

September 30, 2024

The Hacks & Hops InfoSec conference brings some of the most interesting speakers to Minneapolis. This year they were back, bigger than ever, and this time the event took over Allianz Field in St. Paul! Start Left® Security's CEO, Jeremy Vaughan, participated as a keynote speaker this year and you can see his presentation below:


Scaling Your Security Champions Program: If Our Developers Are Our Front Line of Defense, Why Do We Put Them Last?

Presented by Jeremy Vaughan, CEO & Co-Founder, Start Left Security

SIMPLIFIED TRANSCRIPT:


Introduction: The Start Left Philosophy


Thank you for having me, and a big shoutout to FR Secure for hosting this great event. Today, we’re diving into a topic near and dear to me: scaling security champions within your organization. I come from a software development background, and as the CEO of Start Left Security, I’ve seen first-hand how teams can move fast while maintaining strong security practices. But it requires more than just tools—it requires cultural and behavior change, organizational restructuring, and people empowerment.


At Start Left, our focus is on empowering product teams, and we chose our name intentionally—because you can’t get further left than people. We’re shifting the conversation from tools to organizational design, fostering collaboration and communication across teams to truly embed security into the fabric of the development lifecycle.


Why the Shift Left Approach Falls Short


Many organizations pride themselves on “shifting left,” but simply adopting CI/CD pipelines and implementing tools doesn’t mean you’re practicing DevOps or DevSecOps. While these approaches aim to catch vulnerabilities earlier in the development process, they often miss the most critical element: the people building [and maintaining] the software.


Security needs to be more than just an afterthought or a reactionary measure—it must be integrated from the very start, empowering developers to be proactive in identifying and addressing security risks.

My Personal Why: The Failure of Software Quality


My passion for this subject comes from a personal experience that highlights the consequences of software decay. My daughter was diagnosed with Type 1 diabetes at 16 months old. For the first five years, we didn’t sleep through the night because we were constantly worried about her blood sugar levels.

We finally got a continuous glucose monitor (CGM), and we put our trust in this medical device. But when she was eight, the device failed to notify us of dangerously low blood sugar levels. The software hadn't been updated in two years. It wasn’t a security flaw, but it was a failure in software quality—and it nearly cost my daughter her life.


This experience was a wake-up call for me. Software quality is a security issue, and too many organizations hide behind compliance while neglecting the upkeep of their systems.


A Broken Industry: Focusing on the Wrong Things


When we look at how the industry handles cybersecurity today, it’s clear we don’t have a cybersecurity problem; we have a software quality problem. We’re still focused too much on reactive security, like Cloud Security Posture Management (CSPM), instead of embedding security into the design and development stages. 


If we’re still waiting for issues to appear at runtime or when the product is live, we’re already too late. Alert fatigue and over-reliance on tools are rampant. We’ve created a system that isn’t resilient or effective, and it’s time to change that.


Building a Security-First Culture Through DevSecOps


High-quality software includes security, and that’s where DevOps and cultural change come into play. DevOps, at its core, is about creating high-performing teams that are focused on building resilient, high-quality software—and that includes addressing vulnerabilities as part of the process. 


If you’re a CISO or a C-suite leader, your job isn’t just to buy tools; it’s to build a program. This requires you to shift the culture of your organization, creating an environment where developers are empowered to take ownership of security.


Why Developers Are the Key to Scaling Security


Developers are your front line of defense. They’re the ones building the products that millions of people rely on every day. By empowering them to make security a part of their craft, we’re not only improving the quality of the software but also reducing risks before they reach production.


To truly scale a security champions program, you need to focus on organizational change:

1. Cultural Change: Security shouldn’t be a bottleneck; it should be a competitive advantage.

2. Behavioral Change: We need to incentivize developers to get better at security, and that involves continuous learning and gamification.

3. Organizational Design: Create small, high-performing teams with security embedded into their day-to-day operations.


Why Tool Consolidation Isn’t Enough


A lot of CISOs we talk to believe that consolidating tools will solve their security issues, but they’re wrong. Throwing more tools at the problem without addressing the underlying organizational and cultural issues doesn’t work. Developers already use 10, 20, or even 30 tools, many of them open-source. It’s not about adding more tools—it’s about building high-quality software and creating a resilient, immutable infrastructure.


We need to stop thinking that runtime protection, or the tools we deploy at the end of the development cycle, will save us. By then, it’s too late.


Creating a Continuous Feedback Loop with Gamification


At Start Left, we’ve adopted a data-driven performance management approach, similar to Moneyball in sports. We use data to continuously improve team performance, highlight security champions within teams, and provide situational micro-training to help developers fix vulnerabilities in real time.


By giving developers the tools and incentivizing them with rewards—whether it’s through gamification or other forms of recognition—we’re creating a continuous loop of improvement. This approach monetarily rewards teams for their progress and ensures that security becomes second nature.


The Future: Product-Centric Security


The future of security lies in creating product-centric DevSecOps teams. We need Chief Product Security Officers (CPSOs) embedded within product teams, incentivizing high-quality, secure development. Microsoft has already adopted this approach, and other companies will follow suit.


By giving developers the tools, resources, and incentives they need to take ownership of security, we’re not only protecting our products but also building a stronger, more resilient organization.


Conclusion: Empowering Developers to Lead the Charge


Security is no longer the responsibility of just the security team; it’s everyone’s job. Developers are the front line, and we need to empower them to do it right. By changing the culture, organizational design, and the way we approach security, we can scale security champions throughout the entire organization.


It’s time to stop thinking of developers as the last line of defense and start realizing that they are our first.


Thank you.

(Audience Applauding)

SHARE!

More Resources

March 26, 2025
Application Security Posture Management (ASPM) and Developer Security Posture Management (DevSPM) tools promise visibility, prioritization, and increased security coverage—compelling offerings for any security-conscious organization. However, there's a critical gap that technical evaluations led solely by AppSec engineers often overlook.
March 22, 2025
From Reactive to Engineering Excellence In our original " Toyota Moment " post, we exposed the fundamental flaw in how cybersecurity has evolved: we’ve treated it like post-production inspection, not like quality engineering. This follow-up digs deeper into how we got here, why the industry's stuck in a loop, and what the shift to Execution Intelligence really means. The security industry, much like early manufacturing, was built on reactivity—not design. But just as Toyota revolutionized manufacturing with Lean systems and embedded quality, software security is ready for its own transformation. 🔁 Here’s how it’s played out over the last 25 years: REACTIVE (2000-2015) — Piling on tools, alerts, and policies ⬇ WARRANTY (2015-2025) — CSPM + GRC retrofits risk after code ships; shift-left emerges ⬇ PROACTIVE (2022-2026) — ASPM solves what CSPM misses (but only tracks and doesn't fix the overarching problems with the security "system") ⬇ EXCELLENCE (2025-FUTURE) — Start Left as a methodology connects risk to developer behavior and builds security into execution itself
March 19, 2025
Traditional Application Security Posture Management (ASPM) vendors are getting it wrong because they’re focused on the wrong unit of measure.
March 13, 2025
The Industry is Stuck in a Broken Model For decades, cybersecurity has been a bolt-on process—chasing vulnerabilities, enforcing controls, and tracking risks instead of fixing the way software is built. The result? More tools, more alerts, more friction—but no real improvement in execution. Engineering continues to move forward, shipping faster than ever, but security remains reactive, layered on at the end of the development lifecycle, slowing teams down.
January 17, 2025
Security teams often rely on CSPM (Cloud Security Posture Management) and Runtime Protection to safeguard cloud environments and applications after deployment. However, these solutions fail to address the root cause of vulnerabilities—unsecure development practices.
January 10, 2025
The Shift from Developer-Led to Developer-Championed Security
January 3, 2025
The cybersecurity industry loves yet another good buzzword. Right now, CNAPP (Cloud-Native Application Protection Platform) is the term being marketed as the ultimate convergence of ASPM (Application Security Posture Management) and CSPM (Cloud Security Posture Management). But here’s the reality: CNAPP isn’t truly a best-of-breed convergence—it’s an acquisition-fueled patchwork of separate tools stitched together.
December 13, 2024
Discover the hidden costs of ignoring Security by Design. Learn why embedding security into your software development process is essential to avoid compliance risks, customer trust issues, and operational inefficiencies. Explore best practices to safeguard your growth and future-proof your business.
November 21, 2024
While CSPM & ASPM platforms stitched together in an acquisition claim to offer an integrated approach to security by aggregating data across the full lifecycle of software development, they often fall short of delivering true integration. Instead of fostering a cohesive, product-centric DevOps model, these platforms inadvertently create silos within their own systems. The root of the problem lies in the way these platforms are designed—they focus on providing lifecycle scan aggregation without addressing the need for a people-focused, product-centric implementation that truly facilitates DevSecOps.
Show more
Share by: