Skip to content

Security Journey Resources

Content to help you run an effective training program to everyone in your SDLC.

HackEDU Resources

Guides, Reports & Checklists

SecurityJourney_SecureCodingReport_stack

Secure Coding Report: Injection Vulnerabilities

Download Secure Coding Training Against Injection Vulnerabilities Infographic

Secure Coding Training Against Injection Vulnerabilities Infographic

Download the Guide - Best Practices for Developing a Successful Secure Coding Training Program

Best Practices for Developing a Successful Secure Coding Training Program

SecurityJourney_SecurityBelt

eBook: Build a Security Belt Program that Changes Culture

SecurityJourney_ImpactonSecurityCulture

eBook: The Impact of Security Journey on Security Culture

SecurityJourney_MeasuringValue

eBook: Measuring the Value of Security Education

SecurityJourney_Top10ThreatsEbook

eBook: The 10 Greatest Threats to Your Application's Security

Download Checklist for Evaluating Secure Coding Training Solutions

Checklist for Evaluating Secure Coding Training Solutions

download-report-vulnerabilities-benchmark

Vulnerabilities Benchmark Report (And Guide)

SecurityJourney - OverviewBrochure_stack

Overview Brochure

Case Studies

Download Streamline PCI Compliance for Requirement 6.5 - Secure Coding Training

Streamline PCI Compliance for Requirement 6.5 - Secure Coding Training

Download the Security Journey PCI Secure Coding Case Study

Reduce Vulnerabilities with Secure Coding Training

Download the Simplify Secure Coding Training Case Study

Simplify Secure Coding Training Requirements for SOC2 Compliance

Download A Leading Marketing AutomationCompany Takes Secure Coding Best Practice To Another Level

A Leading Marketing Automation Company Takes Secure Coding Best Practice To Another Level

Webinars

hackedu_homepage_webinar

Secure World: How to Build an Effective Secure Coding Training Program

Security Journey Secure World: Injection Vulnerabilities

Secure World: What do Developers Know About Injection Vulnerabilities?

Watch the Webinar: Keeping the Balance

Keeping the Balance Between Security Testing and Rapid Release

AppSec Explained OWASP Webinar

AppSec Explained: OWASP Edition

AppSec Explained SSRF Webinar

A Deep Dive into SSRF

Webinar: Threat Modeling Unleashed Part One

Threat Modeling Unleashed

Webinar: Threat Modeling Unleashed Part Two

Threat Modeling Unleashed: Part 2, Mitigation and Analysis

Webinar: Threat Modeling

Threat Modeling in Action

Webinar: Threat Modeling Again

Threat Model All The Things

Webinar The Top 9 Threats

The Top 9 Threats to Smart Contracts

Webinar: Blockchain Threat Landscape (Part One)

The Blockchain Threat Landscape

Webinar: The Blockchain Threat Landscape PartTwo

The Blockchain Threat Landscape: Part 2

Podcasts

Application Security Podcast

AppSec Podcast

Chris Romeo and Robert Hurlbut deconstruct world-class Application Security experts, digging deep to find the tools, tactics, projects, and tricks that make them successful. Each episode begins with the guest's security origin story or how they got started in Application Security. Topics range from DevOps+security, secure coding, OWASP, threat modeling, security culture, and anything else they can think of regarding application security.

hi5 Podcast

Stay up to date with the application security news you need to know!

Every other week we take you through the five best cybersecurity articles everyone should know about! Whether you like to watch, listen, or read we have an option for you.