Site icon SheHacksPurple

Metrics, Models, and Mindsets: A Conversation About the Future of AppSec

Recently I hosted a webinar called “Metrics, Models, and Mindsets: The Future of Application Security” with:

Our goal was simple: talk honestly about where application security is going, and what’s actually working (and not working) in real teams today. You can watch the conversation below:


Meet the Panel


Big Question: Building an AppSec Program with OWASP SAMM

“If you walk into an organization with no AppSec program, what are the essential first steps?”

Aram’s answer – Step 1: Understand where you are

OWASP SAMM (Software Assurance Maturity Model) gives you:

This score isn’t just a vanity number; it’s a map of your current posture across the entire AppSec landscape.

But here’s the important part:

Don’t obsess over the score itself. It’s just a tool.

The real value is in understanding your strengths, your gaps, and where to improve.

Step 2: Define your target posture

SAMM introduces the idea of a target posture: not “max out everything to Level 3,” but:

If you spend $1 million to reach Level 3 in an area that doesn’t materially reduce risk or support the business, you’ve just spent $1 million for nothing.

I loved how Spyros summarized this:
If you spend a fortune to get to the highest maturity level in something that doesn’t matter to the business, you’ve just done a very expensive vanity project.

Tanya: Step 3: Start with inventory (yes, really)

If you don’t know what you have, you can’t protect it. – Tanya

In SAMM, inventory appears in multiple places (even if not always explicitly labeled as “inventory”):

Without that, it’s almost impossible to measure risk.

Build vs Buy (and Where AI Fits In)

Next, I asked Spyros one of my favourite “trick questions”:

“When should an organization build its own security tools vs. buying or using existing ones?”

As someone who used to be a developer far longer than I’ve been on the security side, I absolutely have the “I can just code that” bias. Many developers do.

Spyros’ view: Build vs Buy: It Depends on Criticality

But be careful that:

AI and “vibe coding”

We also talked about AI-generated code and “vibe coding” (where people just keep prompting a model until it “looks right” and then ship whatever came out).

You’ll often end up with a pile of brittle scripts that don’t scale.

So AI can help, but it does not replace:

Use AI as an assistant, not an architect.


Security Champions: What Goes Wrong (and How to Fix It)

Security Champions programs came up a lot at OWASP Global AppSec, and it’s a topic close to my heart. I’ve seen them go really well, and I’ve also seen them crash and burn.

Common mistakes we see

1. No clear goals or responsibilities

Then teams are surprised when:

If your only goal is “better security,” that’s not a goal. That’s a wish.

Instead, define things like:

Everyone should know:


2. Treating champions like a compliance checkbox

Aram talked about organizations that see “security champions” as a shiny thing to implement—and then:

Spyros shared two mistakes he personally made:

Champions are volunteers first. If you treat them like cheap labor, your program will quietly die.

What works better

Things that have worked well for us collectively:

From my side, two big practical tips:

  1. Be specific.
    “Make code better” is not a job description!
    “Help roll out SAST, triage results weekly, and be the first point of contact for security questions in your team” is…
  2. Don’t sprint a marathon.
    Many security teams start a champions program with:
    • Weekly events
    • Long newsletters
    • Tons of 1:1s
      … and burn themselves (and the champions) out in 2–3 months.
    Whatever you think you can do consistently, cut it in half and start there.

And if you drop the ball for a while? Just be honest:

“We had an incident and got pulled away. We’re sorry we went quiet. We still value you and the program, and here’s what we’re doing next.”

That kind of transparency goes a long way.


Metrics: Avoiding Vanity and Measuring What Matters

Because this was a “metrics” webinar, we had to talk about vanity metrics.

What is a vanity metric?

A simple way to think about it:

A metric that looks good on a dashboard, but does not actually help you make better decisions or improve outcomes.

Aram referenced Goodhart’s Law:

“When a measure becomes a target, it ceases to be a good measure.”

For example:

Or the opposite:

The dashboard alone doesn’t tell the whole story.

My favourite example of vanity vs real value

When I worked at a very large, very well-known company, my colleague’s blog posts would get thousands of views from Reddit, while mine would get a few hundred.

I thought he was crushing me—until we added one more metric:

We discovered:

Same tool, same “views” metric, totally different story when we added context.

The lesson:

A single number is rarely enough.
How people behave, not just whether they clicked, matters.

The same applies to security:

Sometimes the best indicators are qualitative and slower to measure, such as better relationships between security and dev, or developers proactively involving security earlier.


AI in AppSec: Help, Hindrance, or Both?

We couldn’t finish without talking about AI!!!

How AI can hinder

We’re putting extremely powerful tools into the hands of people who:

This leads to:

It’s like handing out scalpels to toddlers.

How AI can help (responsibly, intentionally, hopefully)

Used thoughtfully, AI can be useful:

Aram: However, I would not outsource threat modeling entirely to an LLM. At best, it’s:

A brainstorming assistant, not your threat modeler. – Aram

Guardrails and centralization

For organizations trying to manage “everyone using everything”:

And always keep humans in the loop.


One Key Takeaway from Each of Us

To close the webinar, I asked everyone for a single key takeaway.

Thank you so much for being part of this community and for caring about building safer software. 💜

If you have follow-up questions about metrics, OWASP SAMM, security champions, or AI in AppSec, feel free to drop them in the comments! I’d love to hear what you’re wrestling with right now.

Exit mobile version