By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: ExIm Bank’s Darren Death and Interior’s Madhuri Sammidi on ‘shifting left’ in search for software that is designed to be secure
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > News > ExIm Bank’s Darren Death and Interior’s Madhuri Sammidi on ‘shifting left’ in search for software that is designed to be secure
News

ExIm Bank’s Darren Death and Interior’s Madhuri Sammidi on ‘shifting left’ in search for software that is designed to be secure

News Room
Last updated: 2025/10/11 at 1:01 AM
News Room Published 11 October 2025
Share
SHARE

The concept of DevSecOps has been around so long that it is now firmly established in most federal agencies as one of the key foundations for producing secure software, and even small agencies increasingly have their own DevSecOps pipelines to achieve that goal.

But getting the results they need will take more than just having that pipeline. It will also take planning – including a lot of “shifting left” from the processes agencies have used in the past.

At the Export-Import Bank, for example, this means that we consider security as a basic requirement for development from the very beginning, together with the infrastructure that will be needed to support the system.

“You can’t build a great application and have it sit on top of an infrastructure that has problems. So from a shift-left perspective, we’re making sure we meet all our requirements at the start of the project,” said Darren Death, head of information security at the Export-Import Bank, during Federal News Network’s Cyber ​​Leaders Exchange 2025.

“Historically, security requirements have always been the things that were negotiable, as if they weren’t required. Well, they are required. They have to be treated as functional requirements. And that’s one of the cultural things that we do here at ExIm: we treat them as functional requirements. And the reality is that if you do them at design time, you can design the functional requirements and security requirements together, and then a lot of those problems (of fear, uncertainty and doubt) disappear because you build them. together. You have a high. A powerful system that is also safe.”

Addressing supply chain risks

That same mentality has taken hold at the Bureau of Safety and Environmental Enforcement, the small part of the Interior Department that oversees the offshore oil and gas industry.

Madhuri Sammidi, deputy chief information officer of BSEE, said the agency has moved to a model that includes ‘security by design’.

“Security starts very early, even before we start implementing a system,” she says. “It really starts at the planning stage, and the planning stage could include anything including software supply chain risk. That’s a huge risk that we’re all dealing with, and some of the incidents that we’ve all seen are caused by supply chain risk. And we have to think ahead. The security staff – the security team and the cybersecurity assessment team – needs to be involved in all of these conversations, where applicable, wherever they can be, so that we don’t have to tighten security later. think about security at every stage of the software development lifecycle, starting with planning.”

And mitigating that supply chain risk also requires early conversations with suppliers, Sammidi said.

“It needs to start publishing their inventory before we even start acquiring their software,” she said. “We as a government rely heavily on third-party vendors and their software and integrators. So it’s really important to have all these expectations and engage with the vendors from the beginning about these aspects of cybersecurity and integrating security into every phase of the software system lifecycle, and getting them on the same page as you with your DevSecOps model. How their software BOM can be integrated and used in your continuous integration, continuous delivery pipelines is very important, and something we can all benefit from.”

Build in certainty during acquisition

And especially in the case of small agencies, the staff carrying out the development work may generally be contract employees themselves.

That means all considerations that go into the DevSecOps planning process must also be factored into the contracting process, Death said.

“If you don’t fulfill your contract properly, you get something, not something safe,” he said. “We’re about to enter 2026, and you would think we would be getting secure stuff by default. But we’re not, which highlights the importance of a responsible manager taking the time to build out those security requirements. You can’t assume that. And ultimately what you ask for is what you pay for. You need to have that integration with your procurement team so that the right person (the CIO, the CISO or someone else) is looking at that contract to make it happen. to make sure these things have been settled and that you’re trying to get something safe.’

To take AI ‘baby steps’

Meanwhile, agencies are also considering how new AI-enabled approaches to secure code development can help with the task of integrating secure design principles early in the process.

Sammidi said BSEE is still taking “baby steps” toward using AI as an enabler in software security, but there are promising signs.

“Right now there are so many manual processes around things like code repository evaluation and vulnerability scanning and reporting, and the dashboards we see are not always live data,” she says. “AI could be an answer to some of these challenges that we’re all facing now because false alarms and false positives are creating a kind of fatigue in the security community. AI could be a big help in reducing some of that fatigue. AI still needs human intervention because there are some challenges around things like data quality reporting, but it could be a great enabler, and we need to start small and with that continue until we automate things using fully AI-driven information. cyber security.”

At ExIm bank, officials are already in the early stages of using AI tools for code analysis, Death said.

“When we do our code reviews as part of the CI/CD pipeline, and software that we suspect is vulnerable is discovered, the tools will actually suggest changes to the software code,” he says. “You are still responsible for your results and the software developer ultimately needs to have the skills to determine if those updates and changes are actually valid, but the tools can speed up time. Previously, when you ran a security scan, it wasn’t the developers who did that. That’s another important thing we do here: we get developers to run the scan. We (in the security community) control the configuration, we understand what it is like configured, but then we give them the option to run the scan. Because there’s nothing special about me pressing the start button against them. They can push it, but then they get the results of the scan, and then the tool can actually give them that information.”

Discover more articles and videos on our now Cyber ​​Leaders Exchange 2025 event page.

Copyright © 2025 Federal News Network. All rights reserved. This website is not intended for users located within the European Economic Area.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Today's NYT Wordle Hints, Answer and Help for Oct. 11 #1575- CNET
Next Article How AMD’s AI Software Helped It Score The Multi-Billion Dollar OpenAI Deal
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Today's NYT Connections: Sports Edition Hints, Answers for Oct. 11 #383
News
Sony China refutes recent reports of smartphone withdrawal in China · TechNode
Computing
Epic Sound and Savings for Movie Nights: Take 55% Off This Samsung Soundbar
News
Online merchants offer AI-driven services to “resurrect” loved ones raising data concerns · TechNode
Computing

You Might also Like

News

Today's NYT Connections: Sports Edition Hints, Answers for Oct. 11 #383

3 Min Read
News

Epic Sound and Savings for Movie Nights: Take 55% Off This Samsung Soundbar

3 Min Read
News

Best drone deal: Save 20% on the DJI Mini 3 drone at Amazon

3 Min Read
News

Some Los Angeles Lakers Games Will Get 3D Live Streams on Vision Pro

7 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?