Mathias Tausig
Maturity assessment for technicians or how I learned to love OWASP SAMM
#1about 5 minutes
The difference between secure coding and secure development
Secure coding skills alone cannot prevent insecure products; a robust development lifecycle is essential to address systemic risks.
#2about 3 minutes
Common security failures beyond individual coding errors
Vulnerabilities in third-party libraries and architectural flaws found late in the process highlight critical gaps in the development lifecycle.
#3about 4 minutes
Introducing the OWASP SAMM framework for maturity assessment
OWASP SAMM provides a structured way to measure the security of your software development process through interviews and granular scoring.
#4about 3 minutes
Understanding the structure of the OWASP SAMM model
The model is organized into five business functions, each containing security practices, streams, and three distinct maturity levels.
#5about 3 minutes
How SAMM maps security issues across the lifecycle
A single issue like a vulnerable dependency or a missing threat model will be reflected across multiple interconnected areas in the SAMM assessment.
#6about 3 minutes
Using SAMM scores to build an improvement roadmap
The granular scores from a SAMM assessment are used to identify blind spots and create a phased roadmap for improvement, not for an overall grade.
#7about 4 minutes
Conducting an effective SAMM assessment interview
An assessment can be conducted by an external expert or as a self-assessment, typically involving a small team over a full day to ensure thoroughness.
#8about 5 minutes
A practical guide to the OWASP SAMM toolbox spreadsheet
The official spreadsheet provides a structured questionnaire for grading, note-taking, and defining a multi-phase improvement roadmap with visual progress charts.
#9about 3 minutes
Common mistakes to avoid when implementing SAMM
Avoid using scores to compare teams or setting rigid, context-free requirements, as this undermines the goal of tailored, meaningful improvement.
#10about 7 minutes
Key steps for getting started with your first assessment
A summary of the process involves selecting a team, using the official toolbox, taking detailed notes, and defining a realistic, obtainable roadmap.
#11about 4 minutes
The modern DevSecOps approach to application security
Shifting left requires integrating security tooling like SCA and SAST directly into the agile development lifecycle to catch vulnerabilities early and reduce costs.
#12about 6 minutes
The risks of open source and indirect dependencies
Software Composition Analysis (SCA) addresses the massive risk surface of open source libraries, where 80% of vulnerabilities are found in indirect dependencies.
#13about 15 minutes
Live demo of exploiting a cross-site scripting vulnerability
A practical demonstration shows how a cross-site scripting (XSS) vulnerability in a third-party library can be exploited and then fixed by upgrading the dependency.
#14about 5 minutes
Automating dependency fixes with SCA tooling
Modern SCA tools can automate vulnerability remediation by creating pull requests to update packages, including support for transitive dependencies.
#15about 8 minutes
Securing containers and infrastructure as code (IAC)
Beyond application code, security scanning must extend to container base images and Infrastructure as Code (IAC) configurations to prevent vulnerabilities and misconfigurations.
#16about 7 minutes
How to advocate for DevSecOps in your organization
Justify investment in security automation by showing the exponential cost increase of fixing vulnerabilities later in the development cycle.
#17about 13 minutes
Building a security culture with champions and training
Foster a proactive security mindset by establishing a security champions program, running internal training sessions, and demonstrating practical exploits to raise awareness.
Related jobs
Jobs that call for the skills explored in this talk.
Matching moments
1:32:57 MIN
Integrating security into the software development lifecycle
Software Security 101: Secure Coding Basics
00:28 MIN
Why developers make basic cybersecurity mistakes
Don't Be A Naive Developer: How To Avoid Basic Cybersecurity Mistakes
04:46 MIN
Shifting security testing left in the development lifecycle
Vue3 practical development
18:14 MIN
Creating a security maturity model for leadership
Organizational Change Through The Power Of Why - DevSecOps Enablement
05:33 MIN
Integrating security earlier in the development lifecycle
Vulnerable VS Code extensions are now at your front door
55:17 MIN
Avoiding common security mistakes and giving better feedback
The weekly developer show: Boosting Python with CUDA, CSS Updates & Navigating New Tech Stacks
29:56 MIN
Q&A on speed, team adoption, and common mistakes
DevSecOps: Injecting Security into Mobile CI/CD Pipelines
02:54 MIN
Moving beyond the "it just works" developer mindset
Don't Be A Naive Developer: How To Avoid Basic Cybersecurity Mistakes
Featured Partners
Related Videos
DevSecOps: Security in DevOps
Aarno Aukia
Climate vs. Weather: How Do We Sustainably Make Software More Secure?
Panel Discussion
Securing Your Web Application Pipeline From Intruders
Milecia McGregor
You can’t hack what you can’t see
Reto Kaeser
Building Security Champions
Tanya Janca
The attacker's footprint
Antonio de Mello & Amine Abed
Security Challenges of Breaking A Monolith
Reinhard Kugler
Software Security 101: Secure Coding Basics
Thomas Konrad
From learning to earning
Jobs that call for the skills explored in this talk.


Quality and Security by Design Engineer (m/w/d)
AKDB Anstalt für kommunale Datenverarbeitung in Bayern
München, Germany
Intermediate
Senior
IT Security
Automated Testing
Application Security Engineer, SDO AppSec EMEA
Amazon.com, Inc
Charing Cross, United Kingdom
Remote
Junior
C++
Java
Python
JavaScript
+2
Technical Program Manager - Security
Securitysamsara Networks Limited
Charing Cross, United Kingdom
Remote
Junior
JIRA
Tableau
Confluence
Agile Methodologies
Full Stack Software Engineer (Attack Surface Management)
Sysdig
Remote
Intermediate
REST
MySQL
Neo4j
PostgreSQL
+4
DevOps Security Engineer with Golang Development Focus (m/f/d)
SAP AG
Sankt Leon-Rot, Germany
Junior
Go
Azure
DevOps
Puppet
Docker
+6
Application Security Engineer
Spencer Rose Ltd
Edinburgh, United Kingdom
€90K
Bash
Python
Jenkins
Powershell


