Follow us

Principles of application security: the importance of making security everybody’s business in your organisation

Application Security which is sometimes shortened to ‘AppSec’ – is an increasingly important Cybersecurity field, especially considering the growing variety and number of online buying and selling activities and platforms.

These different ecommerce activities may be carried out on websites, through online games, apps or via smart home devices. Application Security encompasses all the security (and compliance) Processes, Roles (people) and Tools/Technologies that are used to ensure that ecommerce activities of all types and on all platforms are secure.

For organisations to meet their strategic Application Security requirements, it is essential to apply a set of smart and relevant guiding principles one of which involves Making Security Everybody’s Business.

The Essential Link

The widely accepted belief that end users are the weakest link in every security chain is a rather unhelpful approach to Cybersecurity.

A much better approach is to make use of different routes to inform, empower and engage users in any security strategy. It is essential to make the users aware of the crucial role and responsibility even they have for ensuring that their organisation builds and maintains a strengthened security chain. It is important to include a well-planned Security Awareness Programme in any Cybersecurity roadmap with one of the core goals of the programme being to make it clear to all end users (or employees, as the case may be) that they are indeed a link on which the organisation relies on in several areas to achieve a strong security posture.

Realistically, end users typically are the first line of defence. They are also the most exposed part of a company’s defence structure because they engage within the organisation as well as outside it. Within the organisation, they may be subject to strict rules which are enforced during work hours and in work environments. However, outside of these settings, end users, in most cases, operate under fewer technology restrictions such as activity monitoring, data collection, analytics and alerts.

This is especially true in organisations which do not have a mature Bring Your own Device (BYOD) strategy and Data Monitoring and Management processes that are being maintained. End users can be manipulated into divulging sensitive company information. Outside of any company-managed monitoring controls and restrictions, these attacks are more likely to be successful and this can be damaging to an organisation’s security posture and overall business.

Manipulating an employee into exfiltrating data from an organisation and risking GDPR compliance infractions can be carried out using Social Engineering attacks. These attacks do not require complex security tools and methodologies. In the same vein, preventing these types of attacks does not require complex security tools and methodologies. Note that the goal here is to prevent these attacks. Prevention is important and precedes monitoring e.g. for data exfiltration -, identifying and eventually stopping the attacks assuming they are successfully discovered.

Within an organisation:

  • Security may not be everyone’s profession or area of expertise;
  • Security may not be identified as a sub-requirement in everyone’s job description;
  • The word “security” may not appear anywhere in some or all of the job adverts that the organisation places.

But security has to be everybody’s business and making security everybody’s business can be achieved through the following approaches, among others:

Signposting: This involves placing informational materials and posters at strategic points around office spaces. For example, to support developers, a company can choose to place the OWASP Top 10 Controls on a large, clear poster in the code development teams’ office area. For HR it can be a poster highlighting the best ways to avoid falling victim to social engineering attacks. For senior management it can be a desk mat that provides short, sharp reminders about how to avoid falling victim to spear-phishing and whaling. These items are useful and invaluable for informing and reinforcing a company’s Cybersecurity message and they are a good way to positively influence a company’s Cybersecurity culture.

Security Portal: Creating and maintaining an online security portal that is readily accessible to employees is an important way of increasing user security awareness within an organisation. This portal can be used to hold resources including an organisation’s Acceptable Use (AUP) and Information Security Policies (ISP), its Incident Response contact details and even some basic ‘guides’ such as how to recognise a ransomeware attack and what to do immediately one is observed.

Training: Providing role-specific security training to everyone across an entire organisation is also a key way to improve security awareness. The training should be targeted, interesting and based on relevant topics. For example, the Human Resources Team may not need to know about the need to encrypt data at rest using strong encryption but they do need to know that access to different assets should be managed based on roles and so, depending on the company structure, it may be their responsibility to ensure that the details of all employee roles, role requirements and responsibilities which they provide to other teams including the IT team is accurate.

Recruitment: Within job descriptions for non-security specific roles, it is essential to include hints at an organisation’s culture and respect for security. This makes it clear to prospective applicants for these non-security specific jobs that they will be expected to have an appreciation for security and even some awareness of fundamental security principles including the use of Multi-factor authentication, or the need to make use of only strong passwords among other principles. It is also important to make sure that security is not only highlighted before and as soon as an employee joins a company, but throughout their stay including if and when they move positions within their organisation.

Informal communications: These are discussions which are driven by individual security team members and can be held, for example, over a meal or in an office games area. These sessions can be used as a relaxed way of reinforcing security principles and improving an organisation’s security culture.

Security Champions: Champions are security enthusiasts/evangelists who may or may not have any security experience and/or qualifications but who are keen on Cybersecurity as a field. The key point of note is that security champions are not employees who work in Cybersecurity specifically, but they work as members of other non-security teams within an organisation. For instance, they may be part of the DevOps, Developers, Scrum Masters, Product Owners, Delivery drivers, Human Resources or the Finance team. They are a good channel through which central security teams can pass important messages and updates to other teams and influence the culture within those teams and, by extension, the organisation’s wider security culture. Champions are very helpful for ensuring that central Application Security policies and processes are applied within their own teams.

User Awareness, as a security Control, can and should be measured over time in order to identify any gaps in its implementation and to ensure improvements are made over time whenever required.

To learn more, please call Alastair Dickson on 020 3962 2206.


Contact Us

To find out more about cyber security and Continuous Controls Monitoring, please complete the form below with a short message and we’ll get right back to you. Alternatively, you can book a meeting directly.

2nd & 3rd Floor,
2 Burgon Street,
City Of London,


Niall Flavin

DevOps Engineer -

Uttamkurmar Lakhani

Technical Analyst -

Register for updates

Please register your contact details with us to receive links to insightful blog articles as soon as they are published.

2nd & 3rd Floor,
2 Burgon Street,
City Of London,


Liam Flavin

Intern Developer -

Ekaterina Kuzevanova

Back End Developer -

Mohamed Mohamud

Front End Developer -

Juan Morales

DevOps Engineer -

Luke Bakare

DevOps Engineer -

Rutvik Belapurkar

Technical Analyst -

Harman Singh Malhotra

Technical Analyst -

Jason Wilkes

Technical Lead -

Annie Greenfield

Marketing Executive -

Will Tonge

Head of Recruitment -

Will has spent the last 9-years embedded in Cyber Security working with global, household names and innovative start-ups.

Passionate about bringing people and technology together, Will has worked in various settings, helping build high-growth organisations across multiple sectors. During this time, he has built an extensive network with access to some of the best talent out there.

Outside of QO, his young daughter keeps him well on his toes!

Shaun Barnes

DevOps Team Lead

Mark Hudson

Non-Exec Director -

Mark works with SMEs and charities to develop strategies to help them grow and access development capital. He is a NED, charity trustee and mentor to a wide range of people. His plural career started in 2017 after 16 years at pwc as a Deals partner working with large corporates and PE houses; at pwc he also ran the Retail and Consumer practice and was Chairman of the pwc UK Supervisory Board. Prior to pwc he was an executive director at Welcome Break and Iceland Group, and a partner at Bain and Company. He trained as an engineer at Imperial College and has an MBA from INSEAD. 

Register for our event

Sign-up to future Quod Orbis events

Eamon Flavin

Non-Exec Director -

Eamon is a highly regarded and massively respected technology career professional as well as serial entrepreneur. He has started, grown and successfully taken to market three technology business.

Genuinely expert in technology, Eamon has enjoyed long-term working relationships with many of the world’s top companies and organisations in finance, banking, government, manufacturing, engineering, technology and the charities sector.

He draws on unparalleled contacts and experience and provides advice, solutions and recommendations, as well as helping respond to emergencies. Eamon has grown in-house and client teams and has a gift for hiring great people.

Peter Martin

Non-Exec Director -

Peter has the ability to do what many fail to and that is to consistently bring together highly professional teams and build a business environment that is supportive, agile, professional and where everyone enjoys coming into the office.

Bringing a unique blend of business acumen and technical knowledge to the role of non-exec director, Peter has already demonstrated his ability to bring an exceptional flair for dealing with complex situations with a clear, considered approach.

Personally, Peter brings humility and a strong moral compass to the team. His disarming and self-deprecating approach wins everyone over.

Anwen Haynes

Head of Marketing -

Anwen has worked in B2B and B2C marketing for over 20 years. From transforming end-to-end customer journeys in retail with strategic customer-centric plans to target driven focused strategies for B2B sales. With extensive experience in digital marketing including SEO, as well as Brand development, she loves to develop a cohesive approach to brand image and communications to drive and develop the business proposition and perception.

Alice Walker

Head of Customer Success -

Alice has worked in the IT industry for 20 years. Starting in Procurement, she moved into Software Asset Management before transitioning into Customer Success Management. Working across a variety of roles for different industries as both a customer and a service provider has given her a great understanding of what makes a great service. She has always been passionate about building and maintaining great customer relationships and helping her customers achieve their goals.

Owain Rowley

Lead Developer -

Owain has spent nearly a decade building software solutions and products within the cyber security sphere for the likes of government entities, large telecommunication companies, banks and card transaction companies.

This level of experience allows him to swiftly identify business and security processes that can be streamlined with automation, increase the efficiency of existing processes, as well as generate insightful data visualisations and models for members of an organisation at each different level.

Ami Penolver

Head of HR & Legal -

Ami is a finance sector career professional, with many years’ experience working in financial services, both in London and throughout the UK. In addition to financial control, she looks after HR and legal for the company.

Being a mother of two also equips her with the basic skills required to manage a senior team of management and technology consultants.

Ami’s sense of balance and perspective is an essential ingredient of the Quod Orbis culture.

Alastair Dickson

Commercial Director -

Alastair has spent the last 20 years working in Cyber Security and Risk Management. He is a passionate believer that security solutions should enable a business to take advantage of all the benefits of the digital world, while not putting the organisation’s data or productivity at risk.

Alastair has developed high-performing teams in some of the industry’s most competitive markets and launched new innovative technologies to market.

Being a rugby coach, and also having four sons at home, means he has lots of experience in keeping a passionate team in order but always has time for some fun!

Gary Penolver


Gary has 15 years’ experience in senior technology roles, and has already been closely involved in starting and taking two technology companies to market.

Totally comfortable with a fast-moving, state-of-the-art technical landscape, he helps his clients maintain and improve security and compliance.

He has a reputation for delivering pragmatic and easy to maintain solutions – business owners and managers enjoy knowing that the security and compliance is well managed and automated, properly instrumented and reported at a competitive cost point.

Honest, open, unflappable and very social, Gary is trusted by many household-name organisations to protect their, and their client’s data.

Martin Greenfield


Martin is an experienced technology and organisational transformation specialist and an excellent, proven leader and communicator in mission-critical operations, particularly in security technology.

Over the past 20 years, multi-billion pound commercial organisations, including global banks, utilities and major investment funds have trusted Martin to transform their operations to meet financial, operational and compliance targets.

Martin optimises operations, managing and transforming operational teams of between 50 and 500 people, to deliver the highest levels of audit compliance, risk management and financial efficiency.

Often working with other major consultancies and suppliers for new global corporate owners or management teams, Martin will help integrate and streamline operations on a global basis.

Thank you.

Please register your contact details with us to receive links to insightful blog articles as soon as they are published.

Sign Up!

Fill in your details to access the Liberty & QO White Paper

Request a Quod Orbis CCM demo

Contact us to schedule a demo of the Quod Orbis CCM managed platform.

See it for yourself – automated Continuous Controls Monitoring (CCM), with complete cyber controls visibility in a single pane of glass, continuance compliance, automated audits, our unique service wrap, and more.

Please complete your details and a member of the Quod Orbis team will be in touch soon.