Practical Applications of Software Security Model Chris Nagel
|
|
|
- Geraldine McGee
- 10 years ago
- Views:
Transcription
1 Practical Applications of Software Security Model Chris Nagel Software Security Consultant Fortify Software
2 Introductions About Me: Chris Nagel Software Security Consultant With Fortify for 2+ Years Before Fortify - Senior Software engineer for USAF(12 years) Air Force Wargaming Institute Developing Wargames Developed.NET web and windows apps in C# Extensive experience in all areas of the SDLC Last 2 years with USAF Application Software Assurance Center of Excellence (ASACoE) Education MS and BS in CS 2
3 Agenda History The ASACoE Process Challenges Lessons Learned Q&A
4 In the Beginning 4
5 History August 2005 USAF Human Resource System Breached 33,000 Personnel Records Stolen Attack vector was software related Impact was felt throughout the USAF
6 Response Software Security Pilot Program Lead by Maj. Bruce Jenkins Critical vulnerabilities were found in all pilot applications Decision was made to organize a group dedicated to software security Fall 2006 Application Software Assurance Center of Excellence
7 Response Vehicle Contract competition to find best automated security software Focus on 3 areas: Static Analysis (Source Code Analysis) Dynamic Analysis (Penetration Testing) Data Tier Analysis (Database STIG Checking) The Winners Fortify Software (SCA and 360 Server) IBM Rational Appscan AppSecInc AppDetective Services Prime Contractor Telos Subcontractors Fortify and Cigital
8 Mastering SSA: ASACoE Program Management Offices Visited: 96 Applications Assessed: 600+ Total Lines of Code Assessed: 93,921,058 Ramstein AB Germany
9 ASACoE Benefits Significant Risk Mitigation throughout the SDLC Cost and Time Savings for PMOs Certification & Accreditation Processing Time Reduced Real Time Protection for Fielded Operational Systems
10 60.00 Critical/High Vulnerabilities Per 1,000 Lines of Code Initial Follow-On % % 9% 60% 75% 69% 0.00 App1 App2 App3 App4 App5 App6
11 The ASACoE Process 11
12 The ASACoE Process Support Enable Train 5 Day On-Site Triage Assessment Triage Assessment Report; Augment Remediation Efforts; Follow-up Scans 3 Day Training Session
13 The ASACoE Process - Train 3 Day Training Session 1 Day Defensive Programming Need for Software Assurance Case Studies Vulnerability Examples ½ Day AppDetective Training 1 Day Fortify SCA Training ½ Day Fortify RTA/PTA/360 Server Mixed audience: Managers, IA, Developers Hosted at Gunter AFB or other AFBs 13
14 The ASACoE Process On-Site Scan codebase with the goal of integrating into the build process Help optimize scans to your codebase Mentor developers on secure coding practices Defensive programming techniques Triage scan results with developers Triage your FPR s as well as AppDetective and AppScan results. Time is limited so a full triage of the FPR s will be delivered with the final report The tools will be left behind and a security assessment report will be delivered to the PMO. This will enable you to perform regular scans on your own 14
15 The ASACoE Process On-Site ASACoE Assessment Team (4 person team) At least 1 Organic and the rest Contractors Contractors serve as Subject Matter Experts Organics serve as Team Chiefs All team members trained to use software suite Product specialization depending on background Periodic rotation of duties 15
16 The ASACoE Process On-Site 16
17 The ASACoE Process - Support -1 st Tier Support - Link to Vendors Support Remediation - 3 rd Party Resources - Verification -New Training - New Assessment Re- Assess Follow Up Scans - Further Analysis - Custom Rules 17
18 Challenges 18
19 Challenges Challenge #1: NO MANDATE No clear vision for software assurance Currently working with proactive groups Large focus on new business Can put a damper on remediation Could be making a bigger splash 19
20 Challenges Challenge #2: Moderate Adoption Many re-assessments reveal moderate adoption of software assurance Focus on scanning leaves little time for process development and automation Need alternate training methods 20
21 Challenges Challenge #3: Awareness and Education Complex problem with complex solution All leadership levels need to be made aware of the risks associated with software vulnerabilities Getting the word out SAF/A6 and AFSPC Provide policy recommendations and best practices AF Institute of Technology, AF Academy, and Cyber Technical Schools Aided US Navy, Army & Canadian Army Stand Up Similar Centers 21
22 Software Assurance Process Lessons Learned 22
23 Software Assurance Process Lessons Lesson #1: Clear Communication Regarding Security Before assessment, try to define policies and expectations Ensure that policies and expectations are communicated to all stake holders Consistently enforce policies and expectations 23
24 Software Assurance Process Lessons Lesson #2: Don t Bite Off More Than You Can Chew Large amounts of issues are typically found during software assurance assessment Don t Panic Assess risk of vulnerabilities and prioritize what gets fixed first Still worried? Try Fortify RTA! 24
25 Software Assurance Process Lessons Lesson #3: Automate the Process If you don t have continuous builds, it s worth looking at Integrate Fortify SCA into your build process Automate FPR uploads to Fortify 360 Server Use alerts to notify stake holders 25
26 Training Lessons Learned 26
27 Training Lessons Lesson #1: The ASACoE Training is good for everyone The content is mainly tailored for developers, but it s good for Managers, IA, Builders, etc. Get refresh training from ASACoE Incorporate ASACoE training slides into new hire training 27
28 Training Lessons Lesson #2: The ASACoE Training Is Not Enough Designed to scratch the surface Software Security is very complex and requires continual education Develop required training program for developers Because Software Security is relatively new, getting training information can be difficult Many software security blogs Books Instructor lead training and conferences Software Security certifications are emerging Certified Software Security Lifecycle Professional (CSSLP) SANS Institute 28
29 Training Lessons Lesson #3: Not Everyone Learns the Same Not everyone can learn effectively from instructor lead classes CBTs can be effective and are available from Fortify Some developers prefer self study 29
30 Technology Lessons Learned 30
31 Technology Lessons Lesson #1: Explore Fortify Custom Rules The default Fortify rule packs cover most APIs, but not everything Custom rules are used to educate SCA on custom APIs or 3 rd party APIs not covered Can also enforce policies in code Very detailed topic Fortify can provide training 31
32 Technology Lessons Lesson #2: Integrate with Bug Tracking If you re using a bug tracking system, and you should be, integrate with Fortify 360 We support Bugzilla out of the box Can also support: Microsoft Team Foundation Server JIRA HP Quality Center Exposed API for other systems 32
33 Technology Lessons Lesson #3: Explore Custom Reports Reporting system is based on BIRT, and open source report engine Fortify Report templates available in Fortify 360 Server The ASACoE/Fortify can help with custom reports 33
34 Closing Remarks The ASACoE process was designed to assess the largest amount of applications possible not the best fit for everyone If you like the ASACoE approach, they will help with implementing their model When considering establishing a Center of Excellence, first consult industry standards (SAMM, BSIMM) 34
35 Questions?
Building Assurance Into Software Development Life- Cycle (SDLC)
Application Software Assurance Center of Excellence (ASACoE) Building Assurance Into Software Development Life- Cycle (SDLC) James Woody Woodworth Operations Chief, ASACoE & Sean Barnum, Principal Consultant
HP Fortify Application Security Lucas v. Stockhausen PreSales Manager HP Fortify EMEA [email protected] +49 1520 1898430 Enterprise Security
HP Fortify Application Security Lucas v. Stockhausen PreSales Manager HP Fortify EMEA [email protected] +49 1520 1898430 Enterprise Security The problem Cyber attackers are targeting applications
HP Application Security Center
HP Application Security Center Web application security across the application lifecycle Solution brief HP Application Security Center helps security professionals, quality assurance (QA) specialists and
Testing Solutions to Tackle Application Security Checkpoint Technologies SQGNE. Jimmie Parson Checkpoint Technologies
Testing Solutions to Tackle Application Security Checkpoint Technologies SQGNE Jimmie Parson Checkpoint Technologies Welcome, Introductions Agenda Checkpoint Technologies Quick Corporate Overview Why do
HP Fortify application security
HP Fortify application security Erik Costlow Enterprise Security The problem Cyber attackers are targeting applications Networks Hardware Applications Intellectual Property Security Measures Switch/Router
HP Fortify Software Security Center
HP Fortify Software Security Center Proactively Eliminate Risk in Software Trust Your Software 92% of exploitable vulnerabilities are in software National Institute for Standards and Technology (NIST)
Moderator: Benjamin McGee, CISSP Cyber Security Lead SAIC
From Security Assessment to Vulnerability Remediation: The Realities of Deploying a Cloud-Based Application Risk Management Solution Moderator: Benjamin McGee, CISSP Cyber Security Lead SAIC Setting the
Leveraging OWASP to Reduce Web App Data Breach Risk
Leveraging OWASP to Reduce Web App Data Breach Risk P R E S E N T E D B Y J O H N VERRY P R I N C I P A L S E C U R I T Y C O N S U L T A N T P I V O T POINT SECURITY www.pivotpointsecurity.com Specialists
Black Box versus White Box: Different App Testing Strategies John B. Dickson, CISSP
Black Box versus White Box: Different App Testing Strategies John B. Dickson, CISSP Learning objectives for today s session Understand different types of application assessments and how they differ Be
Production Security and the SDLC. Mark Kraynak Sr. Dir. Strategic Marketing Imperva [email protected]
Production Security and the SDLC Mark Kraynak Sr. Dir. Strategic Marketing Imperva [email protected] Building Security Into the Development Process Production Test existing deployed apps Eliminate security
The Evolution of Application Monitoring
The Evolution of Application Monitoring Narayan Makaram, CISSP, Director, Solutions Marketing, HP Enterprise Security Business Unit, May 18 th, 2012 Rise of the cyber threat Enterprises and Governments
Cyber-Security Assessment, Remediation, and Identity Protection, Monitoring, and Restoration Services
4937 Fargo Street North Charleston SC 29418 Phone 843.266.2330 Fax 843.266.2333 w w w. c o d e l y n x. c o m Request for Information: Cyber-Security Assessment, Remediation, and Identity Protection, Monitoring,
IBM Rational AppScan: Application security and risk management
IBM Software Security November 2011 IBM Rational AppScan: Application security and risk management Identify, prioritize, track and remediate critical security vulnerabilities and compliance demands 2 IBM
Application Security Center overview
Application Security overview Magnus Hillgren Presales HP Software Sweden Fredrik Möller Nordic Manager - Fortify Software HP BTO (Business Technology Optimization) Business outcomes STRATEGY Project &
Product Roadmap. Sushant Rao Principal Product Manager Fortify Software, a HP company
Product Roadmap Sushant Rao Principal Product Manager Fortify Software, a HP company Agenda Next Generation of Security Analysis Future Directions 2 Currently under investigation and not guaranteed to
OFFICE OF INFORMATION SECURITY. Secure Code Review Standard Operating Procedures
OFFICE OF INFORMATION SECURITY Secure Code Review Standard Operating Procedures JUNE 2014 Table of Contents 1. Introduction... 1 1.1 Document Audience... 1 1.2 Secure Code Review Overview... 2 1.3 V&V
Fortify Training Services. Securing Your Entire Software Portfolio FRAMEWORK*SSA
Fortify Training Services Securing Your Entire Software Portfolio FRAMEWORK*SSA Fortify s holistic approach to application security truly safeguards our enterprise against today s ever-changing security
Network Management and Defense Telos offers a full range of managed services for:
Network Management and Defense Telos offers a full range of managed services for: Network Management Operations Defense Cybersecurity and Information Assurance Software and Application Assurance Telos:
Streamlining Application Vulnerability Management: Communication Between Development and Security Teams
Streamlining Application Vulnerability Management: Communication Between Development and Security Teams October 13, 2012 OWASP Boston Application Security Conference Agenda Introduction / Background Vulnerabilities
Beyond ISO 27034 - Intel's Product Security Maturity Model (PSMM)
Beyond ISO 27034 - Intel's Product Security Maturity Model (PSMM) Harold Toomey Sr. Product Security Architect & PSIRT Manager Intel Corp. 2 October 2015 @NTXISSA #NTXISSACSC3 Agenda Application / Product
Enterprise Information Technology Security Assessment RFP Answers to Questions
Enterprise Information Technology Security Assessment RFP Answers to Questions GENERAL QUESTIONS Q: How do the goals of the security assessment relate to improving the way VEIC does business? A: Security
Web application security Executive brief Managing a growing threat: an executive s guide to Web application security.
Web application security Executive brief Managing a growing threat: an executive s guide to Web application security. Danny Allan, strategic research analyst, IBM Software Group Contents 2 Introduction
Application Security Testing. Jesper Kråkhede
Application Security Testing Jesper Kråkhede AST 2015-10-22 2 Others call it security and try to avoid it I call it passion and dive right into it Jesper Kråkhede Worked as a security consultant for 17
From Rivals to BFF: WAF & VA Unite OWASP 07.23.2009. The OWASP Foundation http://www.owasp.org
From Rivals to BFF: WAF & VA Unite 07.23.2009 Brian Contos, Chief Security Strategist Imperva Inc. [email protected] +1 (650) 832.6054 Copyright The Foundation Permission is granted to copy, distribute
Taking Information Security Risk Management Beyond Smoke & Mirrors
Taking Information Security Risk Management Beyond Smoke & Mirrors Evan Wheeler Omgeo Session ID: GRC-107 Insert presenter logo here on slide master. See hidden slide 4 for directions Session Classification:
A Strategic Approach to Web Application Security The importance of a secure software development lifecycle
A Strategic Approach to Web Application Security The importance of a secure software development lifecycle Rachna Goel Technical Lead Enterprise Technology Web application security is clearly the new frontier
IBM Innovate 2011. AppScan: Introducin g Security, a first. Bobby Walters Consultant, ATSC [email protected] Application Security & Compliance
IBM Innovate 2011 Bobby Walters Consultant, ATSC [email protected] Application Security & Compliance AppScan: Introducin g Security, a first June 5 9 Orlando, Florida Agenda Defining Application Security
Learning objectives for today s session
Black Box versus White Box: Different App Testing Strategies John B. Dickson, CISSP Learning objectives for today s session Understand what a black box and white box assessment is and how they differ Identify
How to start a software security initiative within your organization: a maturity based and metrics driven approach OWASP
How to start a software security initiative within your organization: a maturity based and metrics driven approach Marco Morana OWASP Lead/ TISO Citigroup OWASP Application Security For E-Government Copyright
Assessment and Authorization
Assessment and Authorization ProPath Office of Information and Technology Table of Contents Assessment and Authorization Process Maps... 1 Process: Assessment and Authorization... 5 Assessment and Authorization
Closing the Vulnerability Gap of Third- Party Patching
SOLUTION BRIEF: THIRD-PARTY PATCH MANAGEMENT........................................ Closing the Vulnerability Gap of Third- Party Patching Who should read this paper IT Managers who are trying to manage
WHITEPAPER Executive Summary Fortify Software WWW.FORTIFY.COM
Optimizing the Microsoft SDL for Secure Development Fortify Solutions to Strengthen and Streamline a Microsoft Security Development Lifecycle Implementation Executive Summary Developing secure software
Information Technology Security Review April 16, 2012
Information Technology Security Review April 16, 2012 The Office of the City Auditor conducted this project in accordance with the International Standards for the Professional Practice of Internal Auditing
Application Security Testing How to find software vulnerabilities before you ship or procure code
Application Security Testing How to find software vulnerabilities before you ship or procure code Anita D Amico, Ph.D. Hassan Radwan 1 Overview Why Care About Application Security? Quality vs Security
Seven Practical Steps to Delivering More Secure Software. January 2011
Seven Practical Steps to Delivering More Secure Software January 2011 Table of Contents Actions You Can Take Today 3 Delivering More Secure Code: The Seven Steps 4 Step 1: Quick Evaluation and Plan 5 Step
Web Application Security Roadmap
Web Application Security Roadmap Joe White [email protected] Cyberlocksmith April 2008 Version 0.9 Background Web application security is still very much in it s infancy. Traditional operations teams
WebGoat for testing your Application Security tools
WebGoat for testing your Application Security tools NAISG-DFW February 28 th, 2012 Michael A Ortega, CISSP CEH CISM GCFA Sr Application Security Professional IBM Security Systems 312.523.1538 [email protected]
HP ESP Partner Enablement Fortify Proof of Concept Boot Camp Training
HP ESP Partner Enablement Fortify Proof of Concept Boot Camp Training HP and HP Enterprise Security Products are committed to your success as an HP Partner. In the Fortify Proof of Concept Boot Camp Training,
Securing Your Web Application against security vulnerabilities. Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group
Securing Your Web Application against security vulnerabilities Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group Agenda Security Landscape Vulnerability Analysis Automated Vulnerability
Application Code Development Standards
Application Code Development Standards Overview This document is intended to provide guidance to campus system owners and software developers regarding secure software engineering practices. These standards
Protect Your Organization With the Certification That Maps to a Master s-level Education in Software Assurance
Protect Your Organization With the Certification That Maps to a Master s-level Education in Software Assurance Sponsored by the U.S. Department of Homeland Security (DHS), the Software Engineering Institute
UP L04 Introduction to 3 rd Party Patching Using the 4A Model Hands-On Lab
UP L04 Introduction to 3 rd Party Patching Using the 4A Model Hands-On Lab Description The objective of this course is to introduce students to the various concepts of 3rd party patching. Students will
Starting your Software Security Assurance Program. May 21, 2015 ITARC, Stockholm, Sweden
Starting your Software Security Assurance Program May 21, 2015 ITARC, Stockholm, Sweden Presenter Max Poliashenko Chief Enterprise Architect Wolters Kluwer, Tax & Accounting Max leads the Enterprise Architecture
Continuous Delivery and Risk Management
Continuous Delivery and Risk Management SESSION ID: SEC-T10 Shaik Mokhinuddeen Director, Software Engineering CA Technologies Ravindra Rajaram Principal Software Engineer CA Technologies Development Deployment
DOE CYBER SECURITY EBK: CORE COMPETENCY TRAINING REQUIREMENTS Key Cyber Security Role: Authorizing Official (AO)
DOE CYBER SECURITY EBK: CORE COMPETENCY TRAINING REQUIREMENTS Key Cyber Security Role: Authorizing Official (AO) Role Definition: The AO is the Senior DOE Management Federal official with the authority
Coverity Services. World-class professional services, technical support and training from the Coverity development testing experts
Coverity Services World-class professional services, technical support and training from the Coverity development testing experts Coverity has helped over 1,100 customers around the globe assure the quality,
From the Bottom to the Top: The Evolution of Application Monitoring
From the Bottom to the Top: The Evolution of Application Monitoring Narayan Makaram, CISSP Director, Security Solutions HP/Enterprise Security Business Unit Session ID: SP01-202 Session 2012 Classification:
! Resident of Kauai, Hawaii
SECURE SDLC Jim Manico @manicode! OWASP Volunteer! Global OWASP Board Member! Manager of several OWASP secure coding projects! Security Instructor, Author! 17 years of web-based, databasedriven software
Space Ground Services in the Joint Information Environment (JIE)
Space Ground Services in the Joint Information Environment (JIE) Scott Niebuhr, Jeremy Burton, Judy Kerner, Sky Troyer The Aerospace Corporation 2015 The Aerospace Corporation Space Ground Services in
PCI Compliance Just the Facts. Rick Dakin President [email protected] 303.554.6333 ext. 7001
PCI Compliance Just the Facts Rick Dakin President [email protected] 303.554.6333 ext. 7001 Agenda Regulatory Landscape Scary Bedtime Stories What went wrong? PCI Compliance Process o What
Integrating Tools Into the SDLC
Integrating Tools Into the SDLC FIRST Conference 2007 The problem Too many organizations have either: Failed to try software security tools at all Tried tools, but became overwhelmed Tools relegated to
WEB Penetration Testing
FTA Annual Conference WEB Penetration Testing and Vulnerability Analysis June 10, 2008 Timothy R. Blevins, KDOR Chief Information Officer 1 WEB Penetration Testing What is WEB Penetration Testing? When
A white paper analysis from Orasi Software. Enterprise Security. Attacking the problems of application and mobile security
A white paper analysis from Orasi Software Enterprise Security Attacking the problems of application and mobile security Introduction: Securing the Mobile Enterprise The mobile enterprise has created vast
ESKISP6055.01 Manage security testing
Overview This standard covers the competencies concerning with managing security testing activities. Including managing resources activities and deliverables. This includes planning, conducting and reporting
Continuous Network Monitoring
Continuous Network Monitoring Eliminate periodic assessment processes that expose security and compliance programs to failure Continuous Network Monitoring Continuous network monitoring and assessment
Cyber Security Risks for Banking Institutions.
Cyber Security Risks for Banking Institutions. September 8, 2014 1 Administrative CPE regulations require that online participants take part in online questions Must respond to a minimum of four questions
Be Fast, but be Secure a New Approach to Application Security July 23, 2015
Be Fast, but be Secure a New Approach to Application Security July 23, 2015 Copyright 2015 Vivit Worldwide Copyright 2015 Vivit Worldwide Brought to you by Copyright 2015 Vivit Worldwide Hosted by Paul
Penetration Testing. I.T. Security Specialists. Penetration Testing 1
Penetration I.T. Security Specialists ing 1 about us At Caretower, we help businesses to identify vulnerabilities within their security systems and provide an action plan to help prevent security breaches
Managed Service Solutions Catalogue. MANAGED SERVICES SOLUTIONS CATALOGUE MS Offering Overview June 2014
Managed Service Solutions Catalogue MANAGED SERVICES SOLUTIONS CATALOGUE MS Offering Overview June 2014 1 MANAGED SERVICES SOLUTIONS CATALOGUE Managed Services Solutions Catalogue Managed Service Solutions
Secure Development LifeCycles (SDLC)
www.pwc.com Feb 2014 Secure Development LifeCycles (SDLC) Bart De Win Bart De Win? 15+ years of Information Security Experience Ph.D. in Computer Science - Application Security Author of >60 scientific
Vulnerability Management in an Application Security World. AppSec DC November 12 th, 2009. The OWASP Foundation http://www.owasp.
Vulnerability Management in an Application Security World AppSec DC November 12 th, 2009 Dan Cornell Global Membership Committee Denim Group [email protected] (210) 572-4400 Twitter: @danielcornell The
Attack Intelligence: Why It Matters
Attack Intelligence: Why It Matters WHITE PAPER Core Security +1 617.399-6980 [email protected] www.coresecurity.com A Proactive Strategy Attacks against your organization are more prevalent than ever,
Making Database Security an IT Security Priority
Sponsored by Oracle Making Database Security an IT Security Priority A SANS Whitepaper November 2009 Written by Tanya Baccam Security Strategy Overview Why a Database Security Strategy? Making Databases
VA SOFTWARE ASSURANCE PROGRAM OFFICE
VA Code Review Process elearning Module Start >> VA Code Review Process elearning Module Getting Started About Fortify About VA This section provides an introduction to this elearning course. This section
The Secrets to Using MS Project Server Effectively
The Secrets to Using MS Project Server Effectively About the Presenter: David Mack 16+ years Microsoft Project experience Instructor and mentor to several Fortune 500 companies Federal deliveries to VA,
MasterCard PCI & Site Data Protection (SDP) Program Update. Academy of Risk Management Innovate. Collaborate. Educate.
MasterCard PCI & Site Data Protection (SDP) Program Update Academy of Risk Management Innovate. Collaborate. Educate. The Payment Card Industry Security Standards Council (PCI SSC) Open, Global Forum Founded
CORE INSIGHT ENTERPRISE: CSO USE CASES FOR ENTERPRISE SECURITY TESTING AND MEASUREMENT
CORE INSIGHT ENTERPRISE: CSO USE CASES FOR ENTERPRISE SECURITY TESTING AND MEASUREMENT How advancements in automated security testing software empower organizations to continuously measure information
Defending the Database Techniques and best practices
ISACA Houston: Grounding Security & Compliance Where The Data Lives Mark R. Trinidad Product Manager [email protected] March 19, 2009 Agenda Understanding the Risk Changing threat landscape The target
Se i o Pricing Document
Se i o Pricing Document This document details pricing structures and policies for ServiceNow. It includes information on the ServiceNow pricing model for standard packages as well as all options and add---ons.
Application Security Audit Fault Injection Model, Fuzz Generators & Static Code Analysis. Training Brochure
Application Security Audit Fault Injection Model, Fuzz Generators & Static Code Analysis Training Brochure Synopsis This Four-day practical training is designed for Information Systems auditors, application
Automatic vs. Manual Code Analysis
Automatic vs. Manual Code Analysis 2009-11-17 Ari Kesäniemi Senior Security Architect Nixu Oy [email protected] Copyright The Foundation Permission is granted to copy, distribute and/or modify this
Designing & Building a Cybersecurity Program. Based on the NIST Cybersecurity Framework (CSF)
Designing & Building a Cybersecurity Program Based on the NIST Cybersecurity Framework (CSF) Larry Wilson Lesson 1 June, 2015 1 About the Class This course covers the essential elements for planning, building
Security Automation in Agile SDLC Real World Cases
Security Automation in Agile SDLC Real World Cases Ofer Maor Director of Security Strategy, Synopsys AppSec California, January 2016 Speaker Security Strategy at Synopsys Founder of Seeker / Pioneer of
PASTA Abstract. Process for Attack S imulation & Threat Assessment Abstract. VerSprite, LLC Copyright 2013
2013 PASTA Abstract Process for Attack S imulation & Threat Assessment Abstract VerSprite, LLC Copyright 2013 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Survey on Application Security Programs and Practices
Survey on Application Security Programs and Practices A SANS Analyst Survey Written by Jim Bird and Frank Kim Advisor: Barbara Filkins February 2014 Sponsored by Hewlett-Packard, Qualys and Veracode 2014
SAFECode Security Development Lifecycle (SDL)
SAFECode Security Development Lifecycle (SDL) Michael Howard Microsoft Matthew Coles EMC 15th Semi-annual Software Assurance Forum, September 12-16, 2011 Agenda Introduction to SAFECode Security Training
