Loading…
Attending this event?
THE MUST ATTEND EVENT FOR CYBERSECURITY PROFESSIONALS
Thursday June 27, 2024 1:15pm - 1:45pm WEST
ASVS is awesome! At the same time it contains 200+ requirements. Even after localising it for your context, it’s likely to have 100+ relevant requirements. Can we - the security team - ask the developers to go through this list for every feature? We can, but how likely it is to happen in a modern DevSecOps environment, and what will be the quality of the engagement with ASVS? (Also, spreadsheets are boring and everyone hates them).

Can we do better? Yes!

Retrieval-Augmented Generation (RAG) is the process of optimising the output of a large language model, so it references an authoritative knowledge base outside of its training data sources before generating a response. Luckily, ASVS is a very “graphy” data that lends itself well to being stored in a graph format.

Using this graph as the authoritative knowledge base, we use semantic similarity search on the feature description to look up relevant ASVS requirements, which is already very useful on its own. But passing these requirements as context to OpenAI or another LLM gives further useful results, reducing hallucinations and giving the developers specific security requirements for their features that are based on ASVS.

The ideas in this talk will help AppSec engineers with their scaling and culture building efforts, and will help all the developers/builders to get some security impact in their features fast.

Speakers
avatar for Irene Michlin

Irene Michlin

Appsec Lead, Neo4j
Irene Michlin is an application security lead at Neo4j. Before going into application security, Irene worked as software engineer, architect, and technical lead at companies ranging from startups to corporate giants. Her professional interests include securing development life-cycles... Read More →
AS

Alex Spiridenkovas

Senior Security Engineer, Neo4j
Alex is a computer security enthusiast with 20 years of experience in this field. He has performed software security assessments across a range of systems, from embedded device firmware to distributed enterprise web applications. He likes to tinker with technologies in his spare time... Read More →
Thursday June 27, 2024 1:15pm - 1:45pm WEST
Room: 1.13 CCL
Log in to leave feedback.

Sign up or log in to save this to your schedule, view media, leave feedback and see who's attending!

Share Modal

Share this link via

Or copy link