I will discuss a holistic approach to application security (security methods), development (secure coding practices, source code review practices (DEVOPS/SECOPS), and secure deployment not just in the application side but the systems and network infrastructure. We will then discuss common attack vectors, threats both external and internal and what needs to be done to mitigate them and what needs to happen post breach covering finding the point of intrusion as well as possible legal/compliance issues after a breach.