AppSec Phoenix Welcomes Vandana Verma, Cybersecurity leader in application and cloud security, to its technical advisory board

Vandana Verma Joins Phoenix Security Advisory Board

Vandana’s leadership and year of field experience in cybersecurity strengthen the leadership and provide a sounding board for the community.

Vandana Verma Joins Phoenix Security Advisory Board

LONDON, England (September 28, 2022)— AppSec Phoenix, the next-gen leader in Vulnerability and Posture Management for Cloud and Application security, has announced the addition of Vandana Verma to its Technology Advisory Board. Vandana joins the firm as an advisor adding to the board years of leadership and experience. 

Vandana is a well-respected leader in the OWASP and Application security community. Vandana is the Security Relations at SNYK, co-founder at infosec Kids and OWASP Chair of the OWASP Board of directors. Vandana is on the review board of Black Hat and CISO Magazine and was previously Security Solution Architect at IBM.  Vandana is a pillar of the security community and a well-respected member.

“We are honoured and enthusiastic to welcome Vandana in the Phoenix Security family and welcome her years of experience in the technology advisory board,” said Francesco Cipollone, CEO and founder of AppSec Phoenix. “Vandana has the unique combination of direct approach, kindness and keen eye on the community that we need to have a thriving board.”

Francesco Cipollone

“I am thrilled to be part of AppSec Phoenix’s advisory board and keen to see it part of the OWASP community,” said Vandana ” As a cyber security practitioner, I saw first-hand what problem application and operational security have, and Phoenix Security is revolutionizing the way those two teams communicate in terms of risk.”

Vandana Verma

Vandana joins an advisory board that boasts several notable names in the cybersecurity sector, including:

  • Andrew Peterson led Signal Science, a leading cybersecurity product, for five years before it sold to Fastly for $775M. Peterson brings startup knowledge, international support, exposure to the US market, and key introductions to customers. His insight into the American market and its current trends and his contacts with venture capitalists provide valuable insight to the advisory team. He also advises several companies and has been instrumental in providing Security Phoenix with key recommendations on getting a head start in product startup and potential pitfalls.
  • Christopher Hodson is an acclaimed leader, advisor, and investor with over a decade of experience in the tech and cybersecurity sectors. Christopher has a board leadership track record, has served as CISO for Zscaler and Tanium, and is currently at Contentful. Christopher is also a seasoned board executive, serving as a board advisor for Charted Institute of Information Security, CompTIA, and Cybrary.
  • Chris Romeo is an acclaimed leader, advisor, and investor with over twenty-five years of experience in the application and cybersecurity sectors. Chris Romeo is the Chief Security Officer and co-founder of Security Journey and is a leading voice and thinker in application security, threat modelling, and security culture. Chris is the host of the award-winning “Application Security Podcast” and is a highly rated industry speaker and trainer, featured at the RSA Conference, the AppSec Village @ DefCon, OWASP Global AppSec, ISC2 Security Congress, and All Day DevOps.
  • Xabi Errotabehere has more than 20 years of experience building world-class digital products. He co-founded Cloud Conformity, a Cloud Security Posture Management tool, and took the company in a high-growth mode before Trend Micro acquired it in 2019. Errotabehere brings insight into how to successfully manage a business in its early days and techniques to effectively go to market and acquire clients.
  • Mike is a well-respected leader and advisor. Mike Takla is the co-founder & CRO of Hacknotice, previously, he was the Director of Inside Sales at Security Scorecard. His several years of field and practical experience have given mike the best insight on how to measure and run teams.

To learn more about AppSec Phoenix or to schedule a free demo, visit https://www.phoenix.security/request-a-demo/.

Francesco is an internationally renowned public speaker, with multiple interviews in high-profile publications (eg. Forbes), and an author of numerous books and articles, who utilises his platform to evangelize the importance of Cloud security and cutting-edge technologies on a global scale.

Discuss this blog with our community on Slack

Join our AppSec Phoenix community on Slack to discuss this blog and other news with our professional security team

From our Blog

Phoenix Security has integrated Orca Security to enhance vulnerability management across runtime environments and cloud infrastructure. This agentless expansion brings cloud misconfiguration remediation, real-time risk intelligence, and full code-to-cloud security visibility into the ASPM platform, empowering DevSecOps teams to prioritize and resolve high-impact application security issues across AWS, Azure, and GCP.
Alfonso Eusebio
Phoenix Security has integrated Semgrep to enhance code-to-cloud security coverage, bringing high-performance static analysis and Software Composition Analysis (SCA) into its Application Security Posture Management platform. This integration empowers DevSecOps teams with faster triage, contextual vulnerability management, and precise prioritization across cloud-native environments including AWS, Azure, and GCP.
Alfonso Eusebio
The team at Phoenix Security pleased to bring you another set of new application security (ASPM) features and improvements for vulnerability management across application and cloud security engines. This release builds on top of previous releases with key additions and progress across multiple areas of the platform. Application Security Posture Management (ASPM) Enhancements • New Weighted Asset Risk Formula – Refined risk aggregation for tailored vulnerability management. • Auto-Approval of Risk Exceptions – Accelerate mitigation by automating security approvals. • Enhanced Risk Explorer & Business Unit Insights – Monitor and analyze risk exposure by business units for better prioritization. Vulnerability & Asset Management • Link Findings to Existing Tickets – Seamless GitHub, ServiceNow, and Azure DevOps integration. • Multi-Finding Ticketing for ADO – Group multiple vulnerabilities in a single ticket for better workflow management. • Filter by Business Unit, CWE, Ownership, and Deployment Environment – Target vulnerabilities with precision using advanced filtering. Cyber Threat Intelligence & Security Enhancements • Cyber Threat Intelligence Premium – Access 128,000+ exploits for better exploitability and fixability metrics. • SBOM, Container SBOM & Open Source Artifact Analysis – Conduct deep security analysis with reachability insights. • Enhanced Lacework Container Management – Fetch and analyze running container details for better security reporting. • REST API Enhancements – Use asset tags for automated deployments and streamline security processes. Other Key Updates • CVE & CWE Columns Added – Compare vulnerabilities more effectively. • Custom Status Management for Findings – Personalize security workflows with custom status configurations. • Impact & Risk Explorer Side Panel – Gain heatmap-based insights into vulnerability distribution and team risk impact. 🚀 Stay ahead of vulnerabilities, optimize risk assessment, and enhance security efficiency with Phoenix Security’s latest features! 🚀
Alfonso Eusebio
We don’t need more tools. We need a new way of thinking. Application Security Posture Management (ASPM) promises the world, but most teams crumble under tool sprawl, silos, and endless ticket queues. That’s why I built IronClad™ — a brutally simple, brutally effective operating model that fuses ASPM with decentralized ownership and ruthless clarity. This isn’t theory. It’s how security teams can actually win: small empowered squads, zero ambiguity, and mission-first remediation. If you’re tired of drowning in dashboards and ready to rethink how your teams build, secure, and scale, this is the blueprint. 👉 Read how ASPM + IronClad™ flips the script on vulnerability management.
Phil Moroni
As cyber threats become increasingly sophisticated, the need for a more proactive and comprehensive approach to vulnerability management is undeniable. A threat-centric methodology, when combined with advanced tools like Agentic AI and Application Security Posture Management (ASPM), offers organizations the ability to predict and mitigate vulnerabilities before they are exploited by threat actors. This article delves into how leveraging threat intelligence, exposure and reachability analysis, and contextual risk assessments can help organizations stay ahead of cyber threats, specifically focusing on high-risk vulnerabilities like remote code execution (RCE) and memory corruption. Through case studies like Citrix ADC and MOVEit Transfer, the article highlights the growing trend of zero-day exploits and emphasizes the importance of a proactive, data-driven security strategy. In a world where vulnerabilities are constantly targeted, adopting a threat-centric approach is not just a best practice—it’s essential to ensuring long-term security. For startups, the focus is clear—establish visibility and ensure core security practices are in place. Application Security Posture Management (ASPM) tools provide a straightforward, automated approach to detecting vulnerabilities and enforcing policies. These solutions help reduce risk quickly without overburdening small security teams. Mature organizations, on the other hand, are tackling a different set of problems. With the sheer number of vulnerabilities and an increasingly complicated threat landscape, enterprises need to fine-tune their approach. The goal shifts toward intelligent remediation, leveraging real-time threat intelligence and advanced risk prioritization. ASPM tools at this stage do more than just detect vulnerabilities—they provide context, enable proactive decision-making, and streamline the entire remediation process. The emergence of AI-assisted code generation has further complicated security in both environments. These tools, while speeding up development, are often responsible for introducing new vulnerabilities into applications at a faster pace than traditional methods. The challenge is clear: AI-generated code can hide flaws that are difficult to catch in the rush of innovation. Both startups and enterprises need to adjust their security posture to account for these new risks. ASPM platforms, like Phoenix Security, provide automated scanning of code before it hits production, ensuring that flaws don’t make it past the first line of defense. Meanwhile, organizations are also grappling with the backlog crisis in the National Vulnerability Database (NVD). A staggering number of CVEs remain unprocessed, leaving many businesses with limited data on which to base their patching decisions. While these delays leave companies vulnerable, Phoenix Security steps in by cross-referencing CVE data with known exploits and live threat intelligence, helping organizations stay ahead despite the lag in official vulnerability reporting. Whether just starting their security program or managing a complex infrastructure, organizations need a toolset that adapts with them. Phoenix Security enables businesses of any size to prioritize vulnerabilities based on actual risk, not just theoretical impact, helping security teams navigate the evolving threat landscape with speed and accuracy.
Francesco Cipollone
The journey of securing an organization’s application landscape varies dramatically, depending on where a company stands in its maturity. Early-stage startups with small security teams face challenges not only with vulnerabilities but also with scaling their security processes in line with their growth. On the flip side, established enterprises struggle with managing complex environments, prioritizing remediation, and dealing with vast amounts of vulnerabilities while staying ahead of sophisticated threats. For startups, the focus is clear—establish visibility and ensure core security practices are in place. Application Security Posture Management (ASPM) tools provide a straightforward, automated approach to detecting vulnerabilities and enforcing policies. These solutions help reduce risk quickly without overburdening small security teams. Mature organizations, on the other hand, are tackling a different set of problems. With the sheer number of vulnerabilities and an increasingly complicated threat landscape, enterprises need to fine-tune their approach. The goal shifts toward intelligent remediation, leveraging real-time threat intelligence and advanced risk prioritization. ASPM tools at this stage do more than just detect vulnerabilities—they provide context, enable proactive decision-making, and streamline the entire remediation process. The emergence of AI-assisted code generation has further complicated security in both environments. These tools, while speeding up development, are often responsible for introducing new vulnerabilities into applications at a faster pace than traditional methods. The challenge is clear: AI-generated code can hide flaws that are difficult to catch in the rush of innovation. Both startups and enterprises need to adjust their security posture to account for these new risks. ASPM platforms, like Phoenix Security, provide automated scanning of code before it hits production, ensuring that flaws don’t make it past the first line of defense. Meanwhile, organizations are also grappling with the backlog crisis in the National Vulnerability Database (NVD). A staggering number of CVEs remain unprocessed, leaving many businesses with limited data on which to base their patching decisions. While these delays leave companies vulnerable, Phoenix Security steps in by cross-referencing CVE data with known exploits and live threat intelligence, helping organizations stay ahead despite the lag in official vulnerability reporting. Whether just starting their security program or managing a complex infrastructure, organizations need a toolset that adapts with them. Phoenix Security enables businesses of any size to prioritize vulnerabilities based on actual risk, not just theoretical impact, helping security teams navigate the evolving threat landscape with speed and accuracy.
Francesco Cipollone
x  Powerful Protection for WordPress, from Shield Security
This Site Is Protected By
ShieldPRO