Stop disrupting my workflow! How you can get the right security training at the right time
Stop disrupting my workflow! How you can get the right security training at the right time
![](https://cdn.prod.website-files.com/5fec9210c1841a6c20c6ce81/6022b6a1431e400be19032d8_601128051502890a7a004e37_ramon-salinero-vEE00Hx5d0Q-unsplash.webp)
![](https://cdn.prod.website-files.com/5fec9210c1841a6c20c6ce81/6022b6a1431e400be19032d8_601128051502890a7a004e37_ramon-salinero-vEE00Hx5d0Q-unsplash.webp)
Think about the last time you were at work, perhaps in a software project team working to an impossible deadline. And then, your manager comes along and says there is some mandatory security training to do, and that it needs to be shoehorned into your workday on top of everything else.
They know it, and you know it. It's a huge PITA, but for compliance reasons, you'll be playing some boring training videos in the background while you keep coding, tuning in and out of both tasks and giving your full attention to neither. This is a common scenario; it's highly disruptive, and it wastes everyone's time. Most security training is too generic, and it's easy to ignore something that bounces in and out of a workday with no real value.
As a company, our goal is to bring a better, more effective type of security training to you, and this is born from knowing exactly what it's like to be disengaged from what the AppSec team tells you is important, when each of your priorities is misaligned. What is interesting, though, is that we started to think about what we could do to reduce the barrier to getting training when you need it - even with our full platform, there are a few steps involved that take you away from your work, at moments where you still need a helpful push but can't dedicate a block of concentration to a training session.
We looked at how micro-learning could be implemented into your workflow, in the IDE or issue tracker, in a more seamless way. And this is what we came up with:
This is based on Just-in-Time (JiT) principles, wherein you're served the right knowledge, at the right time for it to be immediately effective and useful. It's the opposite of the just in case approach to learning, which is often a state of information overload that takes away precious time and headspace for building features.
Quality code is secure code, and if you need a non-invasive security sidekick to collaborate with occasionally, then it might be worth your while to take it for a test drive.
Eliminate the barriers, and bring the training to you.
Cybersecurity might be an interest for some, but not everyone. And no-one should expect developers to become security experts - that still remains the job of specialist AppSec teams. However, security-aware developers are revered for their skills, and the protection they can offer organizations right from the code-building stage. It's a position in high demand, and you can build the foundations over time with contextual micro-learning.
Now, if you're thinking about integrated training as more like Clippy (may he rest in peace), then it's important to note that in the case of Secure Code Warrior's integrations, they're built by developers for developers, so the irritation factor has been considered and obliterated.
Let's check it out in action:
![](https://cdn.prod.website-files.com/5fec9210c1841a6c20c6ce81/6022b6a00f9e2b1699aae5b6_5fc5e049bbf6c4ff296f9a42_sDc-j9JFd5m-kdYvF0FHLsgA-L_17cpEozVRrcdKtgdbiEGbTKoZN1oRRGmGH-E-DA-CRSwvIrDysiXPzjY940DwaqrFqkRyh3nPWMzpg80hqT9dISe3ioihYdlpsAB4HovrSCUh.png)
Secure Code Warrior for Github inspects code for Common Weakness Enumeration (CWE) or OWASP references in the labels, issue title, and body of issues to display contextual just-in-time training. The way it works is if a vulnerability reference is found, a comment will be posted on the issue to assist in swift resolution and prevention of recurring vulnerabilities. It integrates with the issue without disruption of your process, or making you jump through hoops for a solution.
And if you use Jira, the process is similar:
![](https://cdn.prod.website-files.com/5fec9210c1841a6c20c6ce81/6022b6a021eb8e01d473f6d3_60112829004e5f2f97278fab_Screenshot%25202021-01-27%2520at%25207.44.13%2520PM.png)
![](https://cdn.prod.website-files.com/5fec9210c1841a6c20c6ce81/6022b6a021f967953e387985_60112851fe7e063e0cd0391d_Screenshot%25202021-01-27%2520at%25207.43.51%2520PM.png)
Now, for the incumbent security-aware superstars, it's important to remember that it's not all on you to make magic happen. You're going to need support, training, and a reason to take security seriously and get it into your own workflow. Luckily, this is all part of a functioning DevSecOps process, and lots of organizations are already taking note. Why not get a head start?
Download them now, and let us know what you think.
Resources to get you started
Trust Agent by Secure Code Warrior
Discover SCW Trust Agent, an innovative solution designed to enhance security by aligning developer secure code knowledge and skills with the work they commit. It provides comprehensive visibility and controls across an organization's entire code repository, analyzing each commit against developers' secure code profiles. With SCW Trust Agent, organizations can strengthen their security posture, optimize development lifecycles, and scale developer-driven security.
Resources to get you started
Women in Security are Winning: How the AWSN is Setting Up a New Generation of Security Superwomen
Secure-by-Design is the latest initiative on everyone’s lips, and the Australian government, collaborating with CISA at the highest levels of global governance, is guiding a higher standard of software quality and security from vendors.
Women in Security are Winning: How the AWSN is Setting Up a New Generation of Security Superwomen
Secure-by-Design is the latest initiative on everyone’s lips, and the Australian government, collaborating with CISA at the highest levels of global governance, is guiding a higher standard of software quality and security from vendors.
SCW Trust Agent - Visibility and Control to Scale Developer Driven Security
SCW Trust Agent, introduced by Secure Code Warrior, offers security leaders the visibility and control needed to scale developer-driven security within organizations. By connecting to code repositories, it assesses code commit metadata, inspects developers, programming languages used, and shipment timestamps to determine developers' security knowledge.
Stop disrupting my workflow! How you can get the right security training at the right time
![](https://cdn.prod.website-files.com/5fec9210c1841a6c20c6ce81/6022b6a1431e400be19032d8_601128051502890a7a004e37_ramon-salinero-vEE00Hx5d0Q-unsplash.webp)
Think about the last time you were at work, perhaps in a software project team working to an impossible deadline. And then, your manager comes along and says there is some mandatory security training to do, and that it needs to be shoehorned into your workday on top of everything else.
They know it, and you know it. It's a huge PITA, but for compliance reasons, you'll be playing some boring training videos in the background while you keep coding, tuning in and out of both tasks and giving your full attention to neither. This is a common scenario; it's highly disruptive, and it wastes everyone's time. Most security training is too generic, and it's easy to ignore something that bounces in and out of a workday with no real value.
As a company, our goal is to bring a better, more effective type of security training to you, and this is born from knowing exactly what it's like to be disengaged from what the AppSec team tells you is important, when each of your priorities is misaligned. What is interesting, though, is that we started to think about what we could do to reduce the barrier to getting training when you need it - even with our full platform, there are a few steps involved that take you away from your work, at moments where you still need a helpful push but can't dedicate a block of concentration to a training session.
We looked at how micro-learning could be implemented into your workflow, in the IDE or issue tracker, in a more seamless way. And this is what we came up with:
This is based on Just-in-Time (JiT) principles, wherein you're served the right knowledge, at the right time for it to be immediately effective and useful. It's the opposite of the just in case approach to learning, which is often a state of information overload that takes away precious time and headspace for building features.
Quality code is secure code, and if you need a non-invasive security sidekick to collaborate with occasionally, then it might be worth your while to take it for a test drive.
Eliminate the barriers, and bring the training to you.
Cybersecurity might be an interest for some, but not everyone. And no-one should expect developers to become security experts - that still remains the job of specialist AppSec teams. However, security-aware developers are revered for their skills, and the protection they can offer organizations right from the code-building stage. It's a position in high demand, and you can build the foundations over time with contextual micro-learning.
Now, if you're thinking about integrated training as more like Clippy (may he rest in peace), then it's important to note that in the case of Secure Code Warrior's integrations, they're built by developers for developers, so the irritation factor has been considered and obliterated.
Let's check it out in action:
![](https://cdn.prod.website-files.com/5fec9210c1841a6c20c6ce81/6022b6a00f9e2b1699aae5b6_5fc5e049bbf6c4ff296f9a42_sDc-j9JFd5m-kdYvF0FHLsgA-L_17cpEozVRrcdKtgdbiEGbTKoZN1oRRGmGH-E-DA-CRSwvIrDysiXPzjY940DwaqrFqkRyh3nPWMzpg80hqT9dISe3ioihYdlpsAB4HovrSCUh.png)
Secure Code Warrior for Github inspects code for Common Weakness Enumeration (CWE) or OWASP references in the labels, issue title, and body of issues to display contextual just-in-time training. The way it works is if a vulnerability reference is found, a comment will be posted on the issue to assist in swift resolution and prevention of recurring vulnerabilities. It integrates with the issue without disruption of your process, or making you jump through hoops for a solution.
And if you use Jira, the process is similar:
![](https://cdn.prod.website-files.com/5fec9210c1841a6c20c6ce81/6022b6a021eb8e01d473f6d3_60112829004e5f2f97278fab_Screenshot%25202021-01-27%2520at%25207.44.13%2520PM.png)
![](https://cdn.prod.website-files.com/5fec9210c1841a6c20c6ce81/6022b6a021f967953e387985_60112851fe7e063e0cd0391d_Screenshot%25202021-01-27%2520at%25207.43.51%2520PM.png)
Now, for the incumbent security-aware superstars, it's important to remember that it's not all on you to make magic happen. You're going to need support, training, and a reason to take security seriously and get it into your own workflow. Luckily, this is all part of a functioning DevSecOps process, and lots of organizations are already taking note. Why not get a head start?
Download them now, and let us know what you think.
Resources to get you started
Women in Security are Winning: How the AWSN is Setting Up a New Generation of Security Superwomen
Secure-by-Design is the latest initiative on everyone’s lips, and the Australian government, collaborating with CISA at the highest levels of global governance, is guiding a higher standard of software quality and security from vendors.
SCW Trust Agent - Visibility and Control to Scale Developer Driven Security
SCW Trust Agent, introduced by Secure Code Warrior, offers security leaders the visibility and control needed to scale developer-driven security within organizations. By connecting to code repositories, it assesses code commit metadata, inspects developers, programming languages used, and shipment timestamps to determine developers' security knowledge.
Trust Agent by Secure Code Warrior
Discover SCW Trust Agent, an innovative solution designed to enhance security by aligning developer secure code knowledge and skills with the work they commit. It provides comprehensive visibility and controls across an organization's entire code repository, analyzing each commit against developers' secure code profiles. With SCW Trust Agent, organizations can strengthen their security posture, optimize development lifecycles, and scale developer-driven security.