Application Software Assurance Center of Excellence Relies on Professionalized Teams to Train Air Force Programmers in Securing the SDLC

Size: px
Start display at page:

Download "Application Software Assurance Center of Excellence Relies on Professionalized Teams to Train Air Force Programmers in Securing the SDLC"

Transcription

1 Application Software Assurance Center of Excellence Relies on Professionalized Teams to Train Air Force Programmers in Securing the SDLC

2 Application Software Assurance Center of Excellence Relies on Professionalized Teams to Train Air Force Programmers in Securing the SDLC Introduction Air Force computer system programmers and application developers are extremely effective at writing code for new software applications that support the larger mission, but until recently, most had never been trained in integrating and building any kind of security into the software development life cycle (SDLC). That s where the Air Force s Application Software Assurance Center of Excellence (ASACoE) comes in. This small organization was first established in 2005 after a hacker exploited a weakness in the background code of a major Air Force personnel system and compromised more than 30,000 personnel records. Today, it is tasked with training Air Force programmers on how to recognize the vulnerabilities and threats that can be designed into software design or inserted at any point in the lifecycle whether accidentally or intentionally and providing the tools and techniques that will help programmers identify, prioritize and mitigate those threats. To date, ASACoE personnel have trained nearly 1,700 programmers in software threats, risk mitigation, proper coding techniques and automated tool usage and assessed more than 900 applications and 150 million lines of code at nearly 250 Air Force program development offices across the country. The organization has five traveling vulnerability analysis teams, all of whom are encouraged to obtain a professional certification in software development lifecycle security, though the organization does not endorse any one commercial credential over another. Currently, nearly all team members have taken a refresher course in the Certified Secure Software Lifecycle Professional (CSSLP ) credential from (ISC) 2 and plan to take the exam necessary to obtain professional certification. Master Sgt. William P. Tooke, superintendent of ASACoE, who already holds the CSSLP credential, says that although ASACoE personnel are recognized as subject matter experts in application security, having a professional certification gives them an extra aura of knowledgeable authority as they begin working with new customers. Our team leads are all non-commissioned officers (NCOs) in the Air Force, which in the big picture, means that they re low ranking, explains Master Sgt. Tooke. So when they travel out for an assessment and they re telling someone that their baby is ugly, so to speak, that their systems are insecure, they are sometimes sitting across the table from a colonel or a GS14 or GS15. Having that certification gives us a little more credibility and gives them a little bit of added trust that we really do know what we re talking about. 1

3 Addressing New Realities Application vulnerabilities are now considered the No. 1 threat among information security professionals, according to the 2011 Global Workforce Study, a Frost & Sullivan market survey sponsored by (ISC) 2. And information security experts have estimated that 90 percent of all reported security incidents result from exploits against defects in the design or code of software. Of course, there have always been threats by people who want to infiltrate DoD systems or do harm to the United States, and vulnerabilities are inherent in software. Software is developed by human beings and so it s going to have bugs, especially if you re using untrained people or those without a lot of experience, says Capt. Nicolas A. Aquino, chief technology officer (CTO) for ASACoE. With the advent of cloud computing, mobile devices and other advancements, however, there has been a spike in the number of vulnerabilities because the software is being developed at such a rapid pace, with a lot of competition just to field the latest and greatest. At the same time, attackers are getting much more savvy. Despite these realities, ASACoE personnel have to spend much of their time raising awareness within the Air Force and the larger Department of Defense about the need to apply secure software practices during the application development process. Whereas traditional information assurance focuses on building perimeter defenses around data and systems housing data, the focus of software assurance is on integrating and building security into applications, explains Capt. Aquino. This means changing how security is viewed currently, which is as an after thought, to the ideal in which it s an integral part of the entire system s security from Day One. The organization s five traveling vulnerability assessment teams provide a standard training process when they meet with a program development office. During the first week at a customer site, they offer a crash course in software assurance to make sure that developers and program managers know, first and foremost, the reality of the threats that exist in software and how to mitigate those vulnerabilities, says Master Sgt. Tooke. During the second week of training, the ASACoE team helps assess Air Force systems for insecurities. These can include legacy and commercial-off-the-shelf applications and those still under development. They then train programmers and developers on how to use a suite of automated tools that ASACoE provides. Having the tools really helps make the process go quicker and narrows down their search, Capt. Aquino explains. Because in trying to go through a million lines of code manually, you may not notice a single character being off but the reality is that one character being off could pose a great, great threat to the overall system. Once personnel are utilizing the tools and other best practices provided to them, the ASACoE team continues to support the unit over another twoweek period. During that timeframe, they ll complete the triage assessment report, augment remediation efforts when feasible, conduct follow-up reviews 2

4 and continue to help fine-tune programmer and developer understanding of ASACoE processes, tools and best practices. ASACoE also acts as a central repository of information on software assurance threats, trends and successful mitigations. We don t just leave and wish them good luck, says Capt. Aquino. We give them a list of suggestions to help them continue to move forward; we recommend that they get together with all of their stakeholders and we ll usually recommend changes to their SDLC. ASACoE s ultimate goal in their training is to convince program offices to fully integrate software assurance into their SDLC. The Project Management Officers that have been the most successful have embraced the entire process that we ve helped them establish, or they ve established their own based on our model, says Master Sgt. Tooke. But we ve also had the unsuccessful stories where the PMOs just wanted us to be a cure-all, to be there as a box to check, but not necessarily to embrace what we ve equipped them and trained them to do. People Skills Although tools and process are critical to bolstering security throughout the entire application lifecycle, the most critical resource in effectively securing applications is the workforce itself, according to Master Sgt. Tooke. People are vitally important to the entire process, he states. You need people to design the architecture and the initial code, and from a triaging and vulnerability standpoint, you need to have people backing that up as well. The automated tools may find vulnerabilities, but they can turn out to be false positives or false negatives, so you need someone with the knowledge and the judgment to recognize the difference. Well-trained programmers are also able to whittle down the massive amount of information that automated tools collect and turn it into something that is manageable. An automated tool can help you catch the vulnerabilities or coding errors, but you still need someone to decide, Hey, these vulnerabilities have a higher likelihood of exploitation but these other ones are not as likely to be exploited and then prioritize accordingly. For this reason, ASACoE personnel encourage programmers and developers at customer sites to continue advancing their knowledge level. We think it s really important for them to pursue the type of security training that programmers in the Air Force don t get right now, whether that involves going for a professional certification, enrolling in a commercial course or simply engaging in self-study, says Capt. Aquino. Any kind of supplemental training would be of benefit to them. And in fact, ASACoE is working with a functional manager within Air Force Human Resources to try to incorporate and mandate software assurance training at every level of the Computer Systems Programmer career field, from apprentice to seniorlevel manager. Aquino says this is especially critical in light of the fact that there is an internal push to rely even more 3

5 heavily on blue suit Air Force programmers in developing new applications. We re the ones with the security clearances and so we re a little bit more trusted than going out and hiring someone from outside the organization to come in and code a new system for us, he explains. Bottom-line Benefits When well-trained, knowledgeable personnel apply information security best practices to application development from start to finish, the benefits are numerous. Among these are clear cost savings, according to Aquino. If a software programmer is able to discover and fix a routine security vulnerability during the code design process, the cost is roughly $25 per vulnerability. By contrast, if that same vulnerability is not discovered until after the system is actually fielded, the cost jumps to $16,000. And then there s the case of a major Air Force weapons system that was able to avoid an estimated $500 million in rework and recycle costs because an ASACoE team helped catch a large number of hacker-prone vulnerabilities before the release and support phase. Other benefits include better budgeting and forecasting for stakeholders, an easier certification and accreditation process for legacy systems, protection of the Air Force brand and an increase in the overall performance, reliability and code quality of application software. It s really about inherently making your code and your systems more and more secure, which makes it harder for the attackers to do any damage and greatly enhances national security, says Master Sgt. Tooke. Our most important achievements have been helping our customers produce more secure, higher-quality software. In light of these benefits, ASACoE s work is getting attention and requests for help from other organizations that want to incorporate software security into their application development processes. We have worked with our sister services, DoD and other Federal agencies to build comprehensive knowledge and processes across the DoD, says Master Sgt. Tooke. Our processes have been utilized as a model for the other services and agencies to follow. And its work to increase awareness and knowledge among military programmers will continue. ASACoE will ultimately become a charter member of the still-being-developed DoD Software Assurance Community of Practice, which will be responsible for crafting software assurance governance and guidance for the entire DoD. Ultimately, we say that we want to work ourselves out of a job, says Aquino. When we do, that will mean that the Air Force no longer needs ASACoE because its development offices, both government and commercial, are effectively creating and delivering secure software by following a risk-based approach to addressing threats and vulnerabilities, says Aquino. This will take some time, but it should not be an unreasonable goal. 4

6

Practical Applications of Software Security Model Chris Nagel

Practical Applications of Software Security Model Chris Nagel Practical Applications of Software Security Model Chris Nagel Software Security Consultant Fortify Software Introductions About Me: Chris Nagel Software Security Consultant With Fortify for 2+ Years Before

More information

Agile Development for Application Security Managers

Agile Development for Application Security Managers Agile Development for Application Security Managers www.quotium.com When examining the agile development methodology many organizations are uncertain whether it is possible to introduce application security

More information

Building Assurance Into Software Development Life- Cycle (SDLC)

Building Assurance Into Software Development Life- Cycle (SDLC) Application Software Assurance Center of Excellence (ASACoE) Building Assurance Into Software Development Life- Cycle (SDLC) James Woody Woodworth Operations Chief, ASACoE & Sean Barnum, Principal Consultant

More information

Information Security and Privacy. Lynn McNulty, CISSP. Advisory Board November 2008

Information Security and Privacy. Lynn McNulty, CISSP. Advisory Board November 2008 Information Security and Privacy Lynn McNulty, CISSP Advisory Board November 2008 Global leaders in certifying and educating information security professionals with the CISSP and related concentrations,

More information

Information Security Risk and Compliance Series Risking Your Business

Information Security Risk and Compliance Series Risking Your Business Information Security Risk and Compliance Series Risking Your Business Sergio Saenz and Ron Nemes June 2015 Introduction As the DoD Information Assurance Certification and Accreditation Process (DIACAP)

More information

Cisco Security Optimization Service

Cisco Security Optimization Service Cisco Security Optimization Service Proactively strengthen your network to better respond to evolving security threats and planned and unplanned events. Service Overview Optimize Your Network for Borderless

More information

Security in the smart grid

Security in the smart grid Security in the smart grid Security in the smart grid It s hard to avoid news reports about the smart grid, and one of the media s favorite topics is security, cyber security in particular. It s understandable

More information

The 2009 State of Cybersecurity from the Federal CISO s Perspective An (ISC) 2 Report. April 2009

The 2009 State of Cybersecurity from the Federal CISO s Perspective An (ISC) 2 Report. April 2009 The 2009 State of Cybersecurity from the Federal CISO s Perspective An (ISC) 2 Report April 2009 The State of Cybersecurity from the Federal CISO s Perspective An (ISC) 2 Report Executive summary Governments

More information

PASTA Abstract. Process for Attack S imulation & Threat Assessment Abstract. VerSprite, LLC Copyright 2013

PASTA Abstract. Process for Attack S imulation & Threat Assessment Abstract. VerSprite, LLC Copyright 2013 2013 PASTA Abstract Process for Attack S imulation & Threat Assessment Abstract VerSprite, LLC Copyright 2013 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

More information

A Strategic Approach to Web Application Security

A Strategic Approach to Web Application Security WhiteHat Security White Paper A Strategic Approach to Web Application Security Extending security across the entire software development lifecycle Jerry Hoff WhiteHat Security The problem: websites are

More information

Effective Software Security Management

Effective Software Security Management Effective Software Security Management choosing the right drivers for applying application security Author: Dharmesh M Mehta dharmeshmm@mastek.com / dharmeshmm@owasp.org Table of Contents Abstract... 1

More information

Business Process Validation: What it is, how to do it, and how to automate it

Business Process Validation: What it is, how to do it, and how to automate it Business Process Validation: What it is, how to do it, and how to automate it Automated business process validation is the best way to ensure that your company s business processes continue to work as

More information

LEARNING CURRICULUM SECURITY COMPASS TRAINING 2015 Q3. Copyright 2015. Security Compass. 1

LEARNING CURRICULUM SECURITY COMPASS TRAINING 2015 Q3. Copyright 2015. Security Compass. 1 LEARNING CURRICULUM SECURITY COMPASS TRAINING 2015 Q3 Copyright 2015. Security Compass. 1 CONTENTS WHY SECURITY COMPASS...3 RECOMMENDED LEARNING PATHs...4 TECHNICAL LEARNING PATHS...4 BUSINESS / SUPPORT

More information

Northrop Grumman / Integrated Cyber Threat Response

Northrop Grumman / Integrated Cyber Threat Response I. Program Overview Organization Name/Program Name: Northrop Grumman / Integrated Cyber Threat Response Program Leader Name/ Position/Contact information E-mail, Phone Program Category Program Background:

More information

Seven Practical Steps to Delivering More Secure Software. January 2011

Seven Practical Steps to Delivering More Secure Software. January 2011 Seven Practical Steps to Delivering More Secure Software January 2011 Table of Contents Actions You Can Take Today 3 Delivering More Secure Code: The Seven Steps 4 Step 1: Quick Evaluation and Plan 5 Step

More information

INTRODUCTION TO PENETRATION TESTING

INTRODUCTION TO PENETRATION TESTING 82-02-67 DATA SECURITY MANAGEMENT INTRODUCTION TO PENETRATION TESTING Stephen Fried INSIDE What is Penetration Testing? Terminology; Why Test? Types of Penetration Testing; What Allows Penetration Testing

More information

Finding and Applying for Teaching Jobs

Finding and Applying for Teaching Jobs Finding and Applying for Teaching Jobs Assess your strengths/weaknesses If you ve just graduated from college, you ve probably been so inundated by your hectic academic schedule that you haven t given

More information

Survey on Application Security Programs and Practices

Survey on Application Security Programs and Practices Survey on Application Security Programs and Practices A SANS Analyst Survey Written by Jim Bird and Frank Kim Advisor: Barbara Filkins February 2014 Sponsored by Hewlett-Packard, Qualys and Veracode 2014

More information

Learning Course Curriculum

Learning Course Curriculum Learning Course Curriculum Security Compass Training Learning Curriculum. Copyright 2012. Security Compass. 1 It has long been discussed that identifying and resolving software vulnerabilities at an early

More information

Information Security Services

Information Security Services Information Security Services Information Security In 2013, Symantec reported a 62% increase in data breaches over 2012. These data breaches had tremendous impacts on many companies, resulting in intellectual

More information

The Value of Vulnerability Management*

The Value of Vulnerability Management* The Value of Vulnerability Management* *ISACA/IIA Dallas Presented by: Robert Buchheit, Director Advisory Practice, Dallas Ricky Allen, Manager Advisory Practice, Houston *connectedthinking PwC Agenda

More information

The Role of Internal Audit in Risk Governance

The Role of Internal Audit in Risk Governance The Role of Internal Audit in Risk Governance How Organizations Are Positioning the Internal Audit Function to Support Their Approach to Risk Management Executive summary Risk is inherent in running any

More information

The Emergence of Security Business Intelligence: Risk

The Emergence of Security Business Intelligence: Risk The Emergence of Security Business Intelligence: Risk Management through Deep Analytics & Automation Mike Curtis Vice President of Technology Strategy December, 2011 Introduction As an industry we are

More information

Zero Trust Requires Effective Business-Centric Application Segmentation

Zero Trust Requires Effective Business-Centric Application Segmentation Zero Trust Requires Effective Business-Centric Application Segmentation GET STARTED Zero Trust Requires Effective Business-Centric Application Segmentation To protect the network from today s sophisticated

More information

Network Management and Defense Telos offers a full range of managed services for:

Network Management and Defense Telos offers a full range of managed services for: Network Management and Defense Telos offers a full range of managed services for: Network Management Operations Defense Cybersecurity and Information Assurance Software and Application Assurance Telos:

More information

Addressing FISMA Assessment Requirements

Addressing FISMA Assessment Requirements SOLUTION BRIEF Heeding FISMA s Call for Security Metrics and Continuous Network Monitoring Addressing FISMA Assessment Requirements Using RedSeal november 2011 WHITE PAPER RedSeal Networks, Inc. 3965 Freedom

More information

Course 4202: Fraud Awareness and Cyber Security Workshop (3 days)

Course 4202: Fraud Awareness and Cyber Security Workshop (3 days) Course introduction It is vital to ensure that your business is protected against the threats of fraud and cyber crime and that operational risk processes are in place. This three-day course provides an

More information

Managing Vulnerabilities for PCI Compliance White Paper. Christopher S. Harper Managing Director, Agio Security Services

Managing Vulnerabilities for PCI Compliance White Paper. Christopher S. Harper Managing Director, Agio Security Services Managing Vulnerabilities for PCI Compliance White Paper Christopher S. Harper Managing Director, Agio Security Services PCI STRATEGY Settling on a PCI vulnerability management strategy is sometimes a difficult

More information

Compliance. Review. Our Compliance Review is based on an in-depth analysis and evaluation of your organization's:

Compliance. Review. Our Compliance Review is based on an in-depth analysis and evaluation of your organization's: Security.01 Penetration Testing.02 Compliance Review.03 Application Security Audit.04 Social Engineering.05 Security Outsourcing.06 Security Consulting.07 Security Policy and Program.08 Training Services

More information

Secure Development LifeCycles (SDLC)

Secure Development LifeCycles (SDLC) www.pwc.com Feb 2014 Secure Development LifeCycles (SDLC) Bart De Win Bart De Win? 15+ years of Information Security Experience Ph.D. in Computer Science - Application Security Author of >60 scientific

More information

NOTICE: This publication is available at: http://www.nws.noaa.gov/directives/.

NOTICE: This publication is available at: http://www.nws.noaa.gov/directives/. Department of Commerce National Oceanic & Atmospheric Administration National Weather Service NATIONAL WEATHER SERVICE INSTRUCTION 60-703 23 April 2013 Information Technology IT Security VULNERABILITY

More information

Vulnerability management lifecycle: defining vulnerability management

Vulnerability management lifecycle: defining vulnerability management Framework for building a vulnerability management lifecycle program http://searchsecurity.techtarget.com/magazinecontent/framework-for-building-avulnerability-management-lifecycle-program August 2011 By

More information

Designing & Implementing. Programs. MBA Bank Expo 2012 April 11, 2012

Designing & Implementing. Programs. MBA Bank Expo 2012 April 11, 2012 Designing & Implementing Enterprise Security Programs MBA Bank Expo 2012 April 11, 2012 Session Purpose G R O U P Premise: Security is institutionalized, but the enterprise is evolving. the enterprise

More information

Detect, Contain and Control Cyberthreats

Detect, Contain and Control Cyberthreats A SANS Whitepaper Written by Eric Cole, PhD June 2015 Sponsored by Raytheon Websense 2015 SANS Institute Introduction Dwell Time Relates to damage because the longer a system is compromised, the bigger

More information

COUNTERINTELLIGENCE. Protecting Key Assets: A Corporate Counterintelligence Guide

COUNTERINTELLIGENCE. Protecting Key Assets: A Corporate Counterintelligence Guide COUNTERINTELLIGENCE O F F I C E O F T H E N A T I O N A L C O U N T E R I N T E L L I G E N C E Protecting Key Assets: A Corporate Counterintelligence Guide E X E C U T I V E Counterintelligence for the

More information

BEST PRACTICES FOR SECURITY TESTING TOP 10 RECOMMENDED PRACTICES

BEST PRACTICES FOR SECURITY TESTING TOP 10 RECOMMENDED PRACTICES BEST PRACTICES FOR SECURITY TESTING TOP 10 RECOMMENDED PRACTICES Disclaimer!! Best Practices are Not rules or rigid standards General solutions to common problems Guidelines and common reference that can

More information

Secure Software Begins in the Development Process

Secure Software Begins in the Development Process A S P E S D L C Tr a i n i n g Secure Software Begins in the Development Process A WHITE PAPER PROVIDED TO ASPE BY SECURITY INNOVATION Secure Software Begins in the Development Process written for CIO

More information

Some Thoughts on the Future of Cyber-security

Some Thoughts on the Future of Cyber-security Some Thoughts on the Future of Cyber-security Mike Thomas Information Assurance Directorate National Security Agency NSI IMPACT April 2015 1 Introduction, or Why are we here? National security missions

More information

Ten Strategies to Encourage Academic Integrity in Large Lecture Classes

Ten Strategies to Encourage Academic Integrity in Large Lecture Classes Ten Strategies to Encourage Academic Integrity in Large Lecture Classes Brian Udermann and Karrie Lamers Introduction Academic integrity has been and continues to be a lively topic of discussion on most

More information

The Four-Step Guide to Understanding Cyber Risk

The Four-Step Guide to Understanding Cyber Risk Lifecycle Solutions & Services The Four-Step Guide to Understanding Cyber Risk Identifying Cyber Risks and Addressing the Cyber Security Gap TABLE OF CONTENTS Introduction: A Real Danger It is estimated

More information

Cenzic Product Guide. Cloud, Mobile and Web Application Security

Cenzic Product Guide. Cloud, Mobile and Web Application Security Cloud, Mobile and Web Application Security Table of Contents Cenzic Enterprise...3 Cenzic Desktop...3 Cenzic Managed Cloud...3 Cenzic Cloud...3 Cenzic Hybrid...3 Cenzic Mobile...4 Technology...4 Continuous

More information

Building a BYOD Strategy For Education

Building a BYOD Strategy For Education A CBTS White Paper Building a BYOD Strategy For Education Chris Burns Marketing Director, CBTS 8/1/2012 www.cbts.cinbell.com Overview the BYOD Trend in Education Bring Your Own Device (BYOD) is one of

More information

13 Simple Facebook Best Practices To Build Your Business Facebook Page

13 Simple Facebook Best Practices To Build Your Business Facebook Page 13 Simple Facebook Best Practices To Build Your Business Facebook Page 1. Be Engaging When crafting updates for your page, you need to aim for fan engagement as your main goal. Posting blanket statements

More information

Web Application security testing: who tests the test?

Web Application security testing: who tests the test? Web Application security testing: who tests the test? Ainārs Galvāns Application Penetration Tester www.exigenservices.lv About myself Functional testing Leading test group Reporting to client Performance

More information

Using Metrics to Manage Your Application Security Program

Using Metrics to Manage Your Application Security Program Using Metrics to Manage Your Application Security Program Written by Jim Bird March 2016 Sponsored by Veracode 2016 SANS Institute In this paper, we ll look at the first steps in measuring your AppSec

More information

Buyer Lead Conversion Plan

Buyer Lead Conversion Plan Buyer Lead Conversion Plan Respond effectively to your new buyer leads whether they are from Trulia, or other internet sources. This plan is based on best practices, tips and email scripts shared by top

More information

Information Security in Business: Issues and Solutions

Information Security in Business: Issues and Solutions Covenant University Town & Gown Seminar 2015 Information Security in Business: Issues and Solutions A Covenant University Presentation By Favour Femi-Oyewole, BSc, MSc (Computer Science), MSc (Information

More information

Entire contents 2011 Praetorian. All rights reserved. Information Security Provider and Research Center www.praetorian.com

Entire contents 2011 Praetorian. All rights reserved. Information Security Provider and Research Center www.praetorian.com Entire contents 2011 Praetorian. All rights reserved. Information Security Provider and Research Center www.praetorian.com Threat Modeling "Threat modeling at the design phase is really the only way to

More information

Fortify. Securing Your Entire Software Portfolio

Fortify. Securing Your Entire Software Portfolio Fortify 360 Securing Your Entire Software Portfolio Fortify Fortify s holistic approach to application security truly safeguards our enterprise against today s ever-changing security threats. Craig Schumard,

More information

Reducing Application Vulnerabilities by Security Engineering

Reducing Application Vulnerabilities by Security Engineering Reducing Application Vulnerabilities by Security Engineering - Subash Newton Manager Projects (Non Functional Testing, PT CoE Group) 2008, Cognizant Technology Solutions. All Rights Reserved. The information

More information

ISTQB - Certified Tester Advanced Level - Test Manager

ISTQB - Certified Tester Advanced Level - Test Manager CTALTM - Version: 3 30 June 2016 ISTQB - Certified Tester Advanced Level - Test Manager ISTQB - Certified Tester Advanced Level - Test Manager CTALTM - Version: 3 5 days Course Description: Being a technical

More information

The Business Value of Meetings: Test Your Knowledge Jack J. Phillips PhD Chairman, ROI Institute, Inc.

The Business Value of Meetings: Test Your Knowledge Jack J. Phillips PhD Chairman, ROI Institute, Inc. The Business Value of Meetings: Test Your Knowledge Jack J. Phillips PhD Chairman, ROI Institute, Inc. The Issue The recession has brought radical changes to the meetings and events industry. With the

More information

State of Oregon. State of Oregon 1

State of Oregon. State of Oregon 1 State of Oregon State of Oregon 1 Table of Contents 1. Introduction...1 2. Information Asset Management...2 3. Communication Operations...7 3.3 Workstation Management... 7 3.9 Log management... 11 4. Information

More information

I D C E X E C U T I V E B R I E F

I D C E X E C U T I V E B R I E F Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com I D C E X E C U T I V E B R I E F P e netration Testing: Taking the Guesswork Out of Vulnerability

More information

The PCI Dilemma. COPYRIGHT 2009. TecForte

The PCI Dilemma. COPYRIGHT 2009. TecForte The PCI Dilemma Today, all service providers and retailers that process, store or transmit cardholder data have a legislated responsibility to protect that data. As such, they must comply with a diverse

More information

Experience the commitment WHITE PAPER. Information Security Continuous Monitoring. Charting the Right Course. cgi.com 2014 CGI GROUP INC.

Experience the commitment WHITE PAPER. Information Security Continuous Monitoring. Charting the Right Course. cgi.com 2014 CGI GROUP INC. Experience the commitment WHITE PAPER Information Security Continuous Monitoring Charting the Right Course May 2014 cgi.com 2014 CGI GROUP INC. During the last few months of 2013, six federal agencies

More information

Application Security in the Software Development Lifecycle

Application Security in the Software Development Lifecycle Application Security in the Software Development Lifecycle Issues, Challenges and Solutions www.quotium.com 1/15 Table of Contents EXECUTIVE SUMMARY... 3 INTRODUCTION... 4 IMPACT OF SECURITY BREACHES TO

More information

Managing Vulnerabilities For PCI Compliance

Managing Vulnerabilities For PCI Compliance Managing Vulnerabilities For PCI Compliance Christopher S. Harper Vice President of Technical Services, Secure Enterprise Computing, Inc. June 2012 NOTE CONCERNING INTELLECTUAL PROPERTY AND SOLUTIONS OF

More information

Is Penetration Testing recommended for Industrial Control Systems?

Is Penetration Testing recommended for Industrial Control Systems? Is Penetration Testing recommended for Industrial Control Systems? By Ngai Chee Ban, CISSP, Honeywell Process Solutions, Asia Pacific Cyber Security Assessment for Industrial Automation Conducting a cyber-security

More information

VIGILANCE INTERCEPTION PROTECTION

VIGILANCE INTERCEPTION PROTECTION MINIMIZE CYBERTHREATS VIGILANCE INTERCEPTION PROTECTION CYBERSECURITY CDW FINANCIAL SERVICES 80 million identities were exposed by breaches in financial services in 2014. 1 1 symantec.com, Internet Security

More information

Rising to the Challenge

Rising to the Challenge CYBERSECURITY: Rising to the Challenge Dialogues with Subject Matter Experts Advanced persistent threats. Zero-day attacks. Insider threats. Cybersecurity experts say that if IT leaders are not concerned

More information

Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks

Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks Dale Peterson Director, Network Security Practice Digital Bond, Inc. 1580 Sawgrass Corporate Parkway, Suite 130 Sunrise, FL 33323

More information

How To Test For Security On A Network Without Being Hacked

How To Test For Security On A Network Without Being Hacked A Simple Guide to Successful Penetration Testing Table of Contents Penetration Testing, Simplified. Scanning is Not Testing. Test Well. Test Often. Pen Test to Avoid a Mess. Six-phase Methodology. A Few

More information

The Value of Automated Penetration Testing White Paper

The Value of Automated Penetration Testing White Paper The Value of Automated Penetration Testing White Paper Overview As an information security and the security manager of the company, I am well aware of the difficulties of enterprises and organizations

More information

next generation privilege identity management

next generation privilege identity management next generation privilege identity management Nowadays enterprise IT teams are focused on adopting and supporting newer devices, applications and platforms to address business needs and keep up pace with

More information

Information Technology Risk Management

Information Technology Risk Management Find What Matters Information Technology Risk Management Control What Counts The Cyber-Security Discussion Series for Federal Government security experts... by Carson Associates your bridge to better IT

More information

Enterprise Security Tactical Plan

Enterprise Security Tactical Plan Enterprise Security Tactical Plan Fiscal Years 2011 2012 (July 1, 2010 to June 30, 2012) Prepared By: State Chief Information Security Officer The Information Security Council State of Minnesota Enterprise

More information

Security Technology Vision 2016: Empowering Your Cyber Defenders to Enable Digital Trust Executive Summary

Security Technology Vision 2016: Empowering Your Cyber Defenders to Enable Digital Trust Executive Summary Security Technology Vision 2016: Empowering Your Cyber Defenders to Enable Digital Trust Executive Summary 2 Security Technology Vision 2016 Empowering Your Cyber Defenders to Enable Digital Trust Fighter

More information

IDENTITY SOLUTIONS: Security Beyond the Perimeter

IDENTITY SOLUTIONS: Security Beyond the Perimeter IDENTITY SOLUTIONS: Security Beyond the Perimeter 2016 Cloud Security Alliance All Rights Reserved All rights reserved. You may download, store, display on your computer, view, print, and link to the Cloud

More information

Top 10 Tips for Successful Software Development Management

Top 10 Tips for Successful Software Development Management 71% of the software projects do not succeed! Top 10 Tips for Successful Software Development Management by Jack Bicer Here are some time tested guidelines that have been used extensively to deliver web

More information

DoD final rule for the detection and avoidance of counterfeit electronic parts impacts contractors operations

DoD final rule for the detection and avoidance of counterfeit electronic parts impacts contractors operations Government contracts alert Nixon Peabody LLP DoD final rule for the detection and avoidance of counterfeit electronic parts impacts contractors operations June 25, 2014 By Vincent J. Napoleon and Nia D.

More information

Guidelines 1 on Information Technology Security

Guidelines 1 on Information Technology Security Guidelines 1 on Information Technology Security Introduction The State Bank of Pakistan recognizes that financial industry is built around the sanctity of the financial transactions. Owing to the critical

More information

SECURITY B-SIDES: ATLANTA STRATEGIC PENETRATION TESTING. Presented by: Dave Kennedy Eric Smith

SECURITY B-SIDES: ATLANTA STRATEGIC PENETRATION TESTING. Presented by: Dave Kennedy Eric Smith SECURITY B-SIDES: ATLANTA STRATEGIC PENETRATION TESTING Presented by: Dave Kennedy Eric Smith AGENDA Penetration Testing by the masses Review of current state by most service providers Deficiencies in

More information

Extreme Networks Security Analytics G2 Vulnerability Manager

Extreme Networks Security Analytics G2 Vulnerability Manager DATA SHEET Extreme Networks Security Analytics G2 Vulnerability Manager Improve security and compliance by prioritizing security gaps for resolution HIGHLIGHTS Help prevent security breaches by discovering

More information

SECURITY FIRST: AN ESSENTIAL GUIDE TO PENETRATION TESTING

SECURITY FIRST: AN ESSENTIAL GUIDE TO PENETRATION TESTING WHITE PAPER SMART THINKING. DELIVERED. SECURITY FIRST: AN ESSENTIAL GUIDE TO PENETRATION TESTING WWW.SERVERCHOICE.COM INTRODUCTION Penetration testing, or pen tests, can be a confusing subject for many

More information

Increase insight. Reduce risk. Feel confident.

Increase insight. Reduce risk. Feel confident. Increase insight. Reduce risk. Feel confident. Define critical goals with enhanced visibility then enable security and compliance across your complex IT infrastructure. VIRTUALIZATION + CLOUD NETWORKING

More information

2012 North American Vulnerability Research Product Leadership Award

2012 North American Vulnerability Research Product Leadership Award 2012 2012 North American Vulnerability Research Product Leadership Award 2012 Frost & Sullivan 1 We Accelerate Growth Product Leadership Award Vulnerability Management North America, 2012 Frost & Sullivan

More information

Information Technology Security Review April 16, 2012

Information Technology Security Review April 16, 2012 Information Technology Security Review April 16, 2012 The Office of the City Auditor conducted this project in accordance with the International Standards for the Professional Practice of Internal Auditing

More information

U.S. Department of Energy Office of Inspector General Office of Audits & Inspections

U.S. Department of Energy Office of Inspector General Office of Audits & Inspections U.S. Department of Energy Office of Inspector General Office of Audits & Inspections Audit Report Management of Western Area Power Administration's Cyber Security Program DOE/IG-0873 October 2012 Department

More information

90% of data breaches are caused by software vulnerabilities.

90% of data breaches are caused by software vulnerabilities. 90% of data breaches are caused by software vulnerabilities. Get the skills you need to build secure software applications Secure Software Development (SSD) www.ce.ucf.edu/ssd Offered in partnership with

More information

Software & Supply Chain Assurance: Mitigating Risks Attributable to Exploitable ICT / Software Products and Processes

Software & Supply Chain Assurance: Mitigating Risks Attributable to Exploitable ICT / Software Products and Processes Software & Supply Chain Assurance: Mitigating Risks Attributable to Exploitable ICT / Software Products and Processes Joe Jarzombek, PMP, CSSLP Director for Software & Supply Chain Assurance Stakeholder

More information

Design as Product Strategy Bringing design thinking to product management to create products people love

Design as Product Strategy Bringing design thinking to product management to create products people love Design as Product Strategy Bringing design thinking to product management to create products people love Jon Kolko Director, Austin Center for Design 2 3/30/2014 Where do great new products come from?

More information

FedVTE Training Catalog SUMMER 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

FedVTE Training Catalog SUMMER 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov FedVTE Training Catalog SUMMER 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov Access FedVTE online at: fedvte.usalearning.gov If you need any assistance please

More information

YOUR HIPAA RISK ANALYSIS IN FIVE STEPS

YOUR HIPAA RISK ANALYSIS IN FIVE STEPS Ebook YOUR HIPAA RISK ANALYSIS IN FIVE STEPS A HOW-TO GUIDE FOR YOUR HIPAA RISK ANALYSIS AND MANAGEMENT PLAN 2015 SecurityMetrics YOUR HIPAA RISK ANALYSIS IN FIVE STEPS 1 YOUR HIPAA RISK ANALYSIS IN FIVE

More information

IBM Security QRadar Vulnerability Manager

IBM Security QRadar Vulnerability Manager IBM Security QRadar Vulnerability Manager Improve security and compliance by prioritizing security gaps for resolution Highlights Help prevent security breaches by discovering and highlighting high-risk

More information

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to

More information

Cybersecurity: You re Doing IT Wrong

Cybersecurity: You re Doing IT Wrong SESSION ID: CXO-F01 Cybersecurity: You re Doing IT Wrong Jared Carstensen Chief Information Security Officer (CISO), CRH Plc @jaredcarstensen Introduction My Journey Every kid has dream jobs growing up

More information

Sogeti Testing Services. Helping you to Deliver Innovation. and a Better Customer Experience

Sogeti Testing Services. Helping you to Deliver Innovation. and a Better Customer Experience Sogeti Testing Services Helping you to Deliver Innovation and a Better Customer Experience Our commitment to you By partnering with Sogeti we work as an extension of your team, helping you to adopt the

More information

www.pwc.co.uk Cyber security Building confidence in your digital future

www.pwc.co.uk Cyber security Building confidence in your digital future www.pwc.co.uk Cyber security Building confidence in your digital future November 2013 Contents 1 Confidence in your digital future 2 Our point of view 3 Building confidence 4 Our services Confidence in

More information

Assuring Application Security: Deploying Code that Keeps Data Safe

Assuring Application Security: Deploying Code that Keeps Data Safe Assuring Application Security: Deploying Code that Keeps Data Safe Assuring Application Security: Deploying Code that Keeps Data Safe 2 Introduction There s an app for that has become the mantra of users,

More information

WHITE PAPER. Stay ahead (of data leak) with Data Classification and Data Loss Prevention

WHITE PAPER. Stay ahead (of data leak) with Data Classification and Data Loss Prevention WHITE PAPER Stay ahead (of leak) with Data Classification and Data Loss Prevention STAY AHEAD (OF DATA LEAK) WITH RIGHTSWATCH AND DLP 2 Executive Summary Information breaches resulting from the disclosure

More information

U.S. Department of Energy Office of Inspector General Office of Audits and Inspections

U.S. Department of Energy Office of Inspector General Office of Audits and Inspections U.S. Department of Energy Office of Inspector General Office of Audits and Inspections Audit Report The Department's Configuration Management of Non-Financial Systems OAS-M-12-02 February 2012 Department

More information

Moderator: Benjamin McGee, CISSP Cyber Security Lead SAIC

Moderator: Benjamin McGee, CISSP Cyber Security Lead SAIC From Security Assessment to Vulnerability Remediation: The Realities of Deploying a Cloud-Based Application Risk Management Solution Moderator: Benjamin McGee, CISSP Cyber Security Lead SAIC Setting the

More information

White Paper Security in Software Development Life Cycle

White Paper Security in Software Development Life Cycle White Paper Security in Software Development Life Cycle Trojan Horses: Emmanuel Franklin Jonathan Newland Showanda Smith Anh Cao Information Systems and Technology (IS&T) has become an essential part of

More information

Average producers can easily increase their production in a larger office with more market share.

Average producers can easily increase their production in a larger office with more market share. The 10 Keys to Successfully Recruiting Experienced Agents by Judy LaDeur Understand whom you are hiring. Don t make the mistake of only wanting the best agents or those from offices above you in market

More information

Remediating IT vulnerabilities: Expert tips

Remediating IT vulnerabilities: Expert tips E-Guide Remediating IT vulnerabilities: Expert tips Vulnerabilities are a fact of life, and having to patch or remediate them is an ongoing process at most IT organizations. Reasons such as too few administrative

More information

WhiteHat Security White Paper. Top 11 PCI DSS 3.0 Changes That Will Affect Your Application Security Program

WhiteHat Security White Paper. Top 11 PCI DSS 3.0 Changes That Will Affect Your Application Security Program WhiteHat Security White Paper Top 11 PCI DSS 3.0 Changes That Will Affect Your Application Security Program October 2015 The Payment Card Industry Data Security Standard (PCI DSS) is a proprietary information

More information

The Vital Asset for Today s Government

The Vital Asset for Today s Government a strategy paper from The Vital Asset for Today s Government Investing in new enterprise content management technology delivers greater value for budgets, efficiency and public service shutterstock.com

More information

Vulnerability Management

Vulnerability Management Vulnerability Management Buyer s Guide Buyer s Guide 01 Introduction 02 Key Components 03 Other Considerations About Rapid7 01 INTRODUCTION Exploiting weaknesses in browsers, operating systems and other

More information

Software Development: The Next Security Frontier

Software Development: The Next Security Frontier James E. Molini, CISSP, CSSLP Microsoft Member, (ISC)² Advisory Board of the Americas jmolini@microsoft.com http://www.codeguard.org/blog Software Development: The Next Security Frontier De-perimiterization

More information