Magic Numbers. An In-Depth Guide to the 5 Key Performance Indicators for Web Application Security. Rafal Los HP Web Application Security Evangelist
|
|
|
- Barnard Watson
- 10 years ago
- Views:
Transcription
1 Magic Numbers An In-Depth Guide to the 5 Key Performance Indicators for Web Application Security Rafal Los HP Web Application Security Evangelist Version Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice
2 Proceedings 1 Background 2 Essential KPIs 3 Applications 4 Practical Understand the need for business-level intelligence Identify essential KPIs, their definitions, components Applying the 5 Essential KPIs to Enterprise Programs A practical example of real-life application of KPIs 2
3 Background Metrics, KPIs, and Information Security 3
4 Security Metrics Primer INFORMATION SECURITY HAS HAD A ROUGH RELATIONSHIP WITH METRICS Three core issues with metrics in security: 1.Very little actuarial data to support initiatives Virtually no data supporting likelihood of being successfully attacked 2.Incorrect, hasty use of metrics as intelligence Vulnerabilities being used as risks Metrics math without context 3. It hasn t happened to me being used as a metric Many victims don t know, or won t admit it 4
5 Information Security hasn t capitalized on available metrics can KPIs save the day? 5
6 KPI Primer A key performance indicator (KPI) is a measure of performance, commonly used to help an organization define and evaluate how successful it is, typically in terms of making progress towards its long-term organizational goals. 6
7 KPI Primer A key performance indicator (KPI) is a measure of performance, commonly used to help an organization define and evaluate how successful it is, typically in terms of making progress towards its long-term organizational goals. 7
8 Business vs. IT Goals Business Goals IT Security Goals [Web App Sec] Test 100% web applications What are Business Goals? Zero vulnerabilities in production web applications SDLC-integrated security processes Continual environment scanning for new vulnerabilities Developer education & training Automate testing & compliance 8
9 Business thinks in terms of risk. Risk is bad, seen in shades of gray. Web application vulnerabilities contribute to IT risk IT risk is a factor of overall business risk Business goal: Reduce IT risk to acceptable level. Mindset reset 9
10 Tough Questions Will it be possible to perform an analysis of 100% of enterprise web applications? Will a zero vulnerability metric be reachable, practical or even desirable? Is vulnerability reduction the same as risk reduction? 10
11 Enterprise Application Security Program Challenges Challenges Get funded Justify required resources Find vulnerabilities Bugs in business critical apps Removing defects Decrease risks with a budget Proving success How do you prove success? Resources Security vulnerability metrics Application registries Defect tracking systems Data from tools, human testing 11
12 Essential KPIs Proving Success with Advanced Metrics 12
13 The 5 Key Performance Indicators (KPIs) WRT Weighted Risk Trend DRW Defect Remediation Window RDR Rate of Defect Recurrence SCM Specific Coverage Metric SQR Security to Quality defect Ratio KPIs provide business-level context to security-generated data KPIs answer the so what? question Each additional KPI indicates a step forward in program maturity None of these KPIs draw strictly from security data 13
14 KPI #1 Weighted Risk Trend Maturity Rank: 1 A business-based representation of risk from vetted web application security defects over a specified time-period, or repeated iterations of application development. Formula: [(Multiplier critical x defects) + (Multiplier high x defects) + (Multiplier medium x defects) + (Multiplier low x defects)] x *Criticality business Requirements Web application registry with business-level criticality assigned *Pull business criticality rating from DR documents Vetted web applications security defects by criticality level Mathematic plot capability 14
15 KPI #2 Defect Remediation Window Maturity Rank: 2 The length of time from when a vetted web application security defect is identified until it is verified closed. Requirements Defect tracking system, tracking web application security vulnerabilities in development, testing, and production environments Self-service testing, bug tracking, and reporting capabilities Cooperative security enablement thru development, QA, OPS teams Man-Hours
16 KPI #3 Rate of Defect Recurrence Maturity Rank: 3 The rate, over time, at which previously closed web application security defects are re-introduced into a given application, organization, or other logical unit. Requirements Advanced defect tracking system Advanced web application security testing capabilities Capabilities to identify similar or like defects across an application or logical trackable unit Recurring Defects
17 KPI #4 Specific Coverage Metric Maturity Rank: 4 The flow-based or component-based coverage of total functionality that web application security testing has achieved. Total functionality = known functionality + discovered functionality* Requirements Method for measuring total application surface (UI, API, code-level coverage methods) plus *advanced application discovery tools Advanced security testing capabilities using flow-based, data-driven methodology for completeness Integration with Quality Assurance for functional specification coverage 17
18 KPI #5 Security to Quality Defect Ratio Maturity Rank: 4 The ratio of security defects to the total number of software quality defects being generated (functional + performance + security). Formula: defects D s D t D s = Total Security defects; D t = Total Overall Quality Requirements Mature defect reporting system (tracking combined quality defects) Security as a quality defect Performance as a quality defect Functional (+related) as a quality defect Tight cooperation of Information Security & Quality Assurance 18
19 KPI Facts KPI: WRT KPI: DRW KPI: RDR Metric is best graphed Risk trend will decrease over time similar to 1 / x Each defect criticality must have a non-linear factor assigned Critical = 10 High = 5 Medium = 2 Low = 1 Application business criticality must be rigidly defined Business critical Critical Important #1 most critical KPI DRW will be potentially very large at first Critical to shrink this metric as quickly as possible Can be used to target education where needed Important to note type of defect remediated (complex defects take longer to fix) Reappearing defects measure internal development confusion Recurring defects should prompt a systemic investigation into rootcause Critical for identifying poorly-run development organizations 19
20 KPI Facts KPI: SCM Most difficult KPI to achieve Most organizations cannot identify even known attack surface coverage Flow-driven & data-driven methodology is required to fully test known attack surface Exploratory testing required to discover unknown functionality KPI: SQR Final step in organizational maturity with respect to security testing Demonstrates security adoption as a component of overall software quality 20
21 Applications Applying the KPIs 21
22 Applying KPIs to Web Application Security Programs What You Have What You Want
23 Failures of Common Metrics Common Metrics Failure Mode(s) Options? 1. Number of vulnerabilities found 2. Number of pages scanned/tested 3. Critical vulnerabilities found 4. Critical vulnerabilities fixed 1. So what? No context! 2. So what? Do pages matter? 3. Business-critical? Or IT-critical? Or? 4. Business-critical? Or IT-critical? Or? Business Context. KPIs provide business context to standard metrics reporting practices. 23
24 When Metrics Aren t Enough Objective Conclusively prove that risk is being reduced through program effort Remove subjectivity of metrics by providing business context Bring IT Security into higher-level business discussion Unify testing methodologies KPIs Answer Combine metrics with business-level context Provide direct feedback to the business to target ongoing effort Track program effectiveness including education, corporate remediation strategies Consolidate technical metrics into businesslevel dashboards Successfully break the security silo 24
25 Practical Real-life KPI use-case 25
26 Example Application the large financial Current Situation Complaints 1,500 web applications Security testing some web applications preproduction Difficult to halt critical applications Metrics collected, reported ad-hoc (per test) No way to prioritize effort Difficult to demonstrate if program spend is making a positive impact Impossible to have business-level conversation on security vulnerabilities in go-live applications No way of knowing what actual coverage is being achieved by security testing Result: Business down-plays security s role 26
27 Example Application the large financial Applied KPI Weighted Risk Trend (WRT) Application registry + business ranking to prioritize application testing Business context to go/no-go decisions for critical defects Demonstrate risk reduction in business-critical applications over time Demonstrate program spend effectiveness Applied KPI Defect Remediation Window (DRW) Produce baseline for defect remediation times Implement program plan to prevent security defects from making it to production Demonstrate program effectiveness by shrinking remediation window(s) 27
28 Vulnerability reduction, without business context 250 More vulnerabilities = more risk?
29 Vulnerability reduction, with business context 250 App criticality + defects = more risk 200 ERP Retail 150 Marketing
30 Example Application the large financial KPIs mean measurable gains Break the security silo Improve security team s posture in the business Apply business context to measure risk Make key go/no-go decisions intelligently with business support 30
31 Data is raw information Metrics are refined data KPIs are metrics with business-context Business context makes security relevant. 31
32 The 5 Key Performance Indicators (KPIs) WRT Weighted Risk Trend DRW Defect Remediation Window RDR Rate of Defect Recurrence SCM Specific Coverage Metric SQR Security to Quality defect Ratio KPIs are the difference between technical data points, and the actionable intelligence that information security needs. 32
33 Rafal Los - Security Evangelist, HP [email protected] Direct: +1 (404) Twitter: Twitter.com/Wh1t3Rabbit Blog: HP.com/go/White-Rabbit 33
Continuous???? Copyright 2015 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
???? 1 Copyright 2015 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Application Delivery is Accelerating Surge in # of releases per app
HP Application Security Center
HP Application Security Center Web application security across the application lifecycle Solution brief HP Application Security Center helps security professionals, quality assurance (QA) specialists and
Delivering Cost Effective IT Services
M2 Technology Delivering Cost Effective IT Services Defense agencies have been directed to move towards cloud and shared service models by the Federal Data Center Consolidation Initiative (FDCCI), the
應 用 SIEM 偵 測 與 預 防 APT 緩 攻 擊
應 用 SIEM 偵 測 與 預 防 APT 緩 攻 擊 HP Enterprise Security 林 傳 凱 (C. K. Lin) Senior Channel PreSales, North Asia HP ArcSight, Enterprise Security 1 Rise Of The Cyber Threat Enterprises and Governments are experiencing
Enabling Continuous Delivery by Leveraging the Deployment Pipeline
Enabling Continuous Delivery by Leveraging the Deployment Pipeline Jason Carter Principal (972) 689-6402 [email protected] Pariveda Solutions, Inc. Dallas,TX Table of Contents Matching
Table of contents. Enterprise Resource Planning (ERP) functional testing best practices: Ten steps to ERP systems reliability
Enterprise Resource Planning (ERP) functional testing best practices: Ten steps to ERP systems reliability Table of contents Introduction.......................................................2 Step 1:
Business white paper. Best practices for implementing automated functional testing solutions
Business white paper Best practices for implementing automated functional testing solutions Table of contents Contents 3 Introduction 3 Functional testing versus unit testing 4 The pros and cons of manual
"Practical Security Testing for Web Applications"
T10 Track 5/7/2009 11:15:00 AM "Practical Security Testing for Web Applications" Presented by: Rafal Los Hewlett-Packard Application Security Center Presented at: 330 Corporate Way, Suite 300, Orange Park,
10 Best Practices for Application Performance Testing
Business white paper 10 Best Practices for Application Performance Testing Leveraging Agile Performance Testing for Web and Mobile Applications 10 Best Practices for Application Performance Testing Table
Application Test Management and Quality Assurance
SAP Brief Extensions SAP Quality Center by HP Objectives Application Test Management and Quality Assurance Deliver new software with confidence Deliver new software with confidence Testing is critical
SUSTAINING COMPETITIVE DIFFERENTIATION
SUSTAINING COMPETITIVE DIFFERENTIATION Maintaining a competitive edge in customer experience requires proactive vigilance and the ability to take quick, effective, and unified action E M C P e r s pec
White Paper. Software Development Best Practices: Enterprise Code Portal
White Paper Software Development Best Practices: Enterprise Code Portal An Enterprise Code Portal is an inside the firewall software solution that enables enterprise software development organizations
Requirements-Based Testing: Encourage Collaboration Through Traceability
White Paper Requirements-Based Testing: Encourage Collaboration Through Traceability Executive Summary It is a well-documented fact that incomplete, poorly written or poorly communicated requirements are
Support the Era of the App with End-to-End Network and Application Performance Visibility
Support the Era of the App with End-to-End Network and Application Performance Visibility Traditional Performance Management Is Not Enough The realities of the modern IT landscape are daunting. Your business-critical
Be Fast, but be Secure a New Approach to Application Security July 23, 2015
Be Fast, but be Secure a New Approach to Application Security July 23, 2015 Copyright 2015 Vivit Worldwide Copyright 2015 Vivit Worldwide Brought to you by Copyright 2015 Vivit Worldwide Hosted by Paul
CaaS Think as a bad guy Petr Hněvkovský, CISA, CISSP HP Enterprise Security
CaaS Think as a bad guy Petr Hněvkovský, CISA, CISSP HP Enterprise Security 1 Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Data Governance. Unlocking Value and Controlling Risk. Data Governance. www.mindyourprivacy.com
Data Governance Unlocking Value and Controlling Risk 1 White Paper Data Governance Table of contents Introduction... 3 Data Governance Program Goals in light of Privacy... 4 Data Governance Program Pillars...
How SAP Business Intelligence Solutions provide real-time insight into your organization
How SAP Business Intelligence Solutions provide real-time insight into your organization 28 Oct 2015 Agenda 1) What is Business Intelligence (BI) 2) SAP BusinessObjects Features Overview 3) Demo & Report
IBM SECURITY QRADAR INCIDENT FORENSICS
IBM SECURITY QRADAR INCIDENT FORENSICS DELIVERING CLARITY TO CYBER SECURITY INVESTIGATIONS Gyenese Péter Channel Sales Leader, CEE IBM Security Systems 12014 IBM Corporation Harsh realities for many enterprise
WHITE PAPER Analytics for digital retail
WHITE PAPER Analytics for digital retail Introduction The advent of organized retail propelled businesses to reach out to a wider spectrum of consumers in an effort to increase market share. This gave
Implement a unified approach to service quality management.
Service quality management solutions To support your business objectives Implement a unified approach to service quality management. Highlights Deliver high-quality software applications that meet functional
Business white paper. Missioncritical. defense. Creating a coordinated response to application security attacks
Business white paper Missioncritical defense Creating a coordinated response to application security attacks Table of contents 3 Your business is under persistent attack 4 Respond to those attacks seamlessly
How to measure your business resiliency
How to measure your business resiliency Define the KPI s/kri s and scorecards to control your security and business continuity capabilities Krzysztof Pulkiewicz BCMLogic [email protected]
Thinking about APM? 4 key considerations for buy vs. build your own
An AppDynamics Business White Paper Thinking about APM? 4 key considerations for buy vs. build your own Most technology folks have heard Marc Andreessen s provocative statement, Software is eating the
Enterprise Application Security Program
Enterprise Application Security Program GE s approach to solving the root cause and establishing a Center of Excellence Darren Challey GE Application Security Leader Agenda Why is AppSec important? Why
Measuring Performance
Measuring Performance Dr. Ashraf Hassan Abdelwahab [email protected] Ministry of State for Administrative Development Egypt What are we measuring? Measuring performance implies measuring the delivery of
Find the intruders using correlation and context Ofer Shezaf
Find the intruders using correlation and context Ofer Shezaf Agenda The changing threat landscape What can you do to find intruders? Best practices for timely detection and mitigation HP ArcSight 2 Find
Obtaining Enterprise Cybersituational
SESSION ID: SPO-R06A Obtaining Enterprise Cybersituational Awareness Eric J. Eifert Sr. Vice President Managed Security Services DarkMatter Agenda My Background Key components of the Cyber Situational
Making Reporting Relevant - Automating capacity scorecards in Microsoft Excel
Making Reporting Relevant - Automating capacity scorecards in Microsoft Excel Thomas Barns, Senior Consultant, Capacitas 1 Background Capacity reporting Automation Grouping Colouring Diagrams Beyond Excel
HP Fortify Application Security Lucas v. Stockhausen PreSales Manager HP Fortify EMEA [email protected] +49 1520 1898430 Enterprise Security
HP Fortify Application Security Lucas v. Stockhausen PreSales Manager HP Fortify EMEA [email protected] +49 1520 1898430 Enterprise Security The problem Cyber attackers are targeting applications
HP Fortify application security
HP Fortify application security Erik Costlow Enterprise Security The problem Cyber attackers are targeting applications Networks Hardware Applications Intellectual Property Security Measures Switch/Router
Vulnerability Management
Vulnerability Management Buyer s Guide Buyer s Guide 01 Introduction 02 Key Components 03 Other Considerations About Rapid7 01 INTRODUCTION Exploiting weaknesses in browsers, operating systems and other
How To Choose the Right Vendor Information you need to select the IT Security Testing vendor that is right for you.
Information you need to select the IT Security Testing vendor that is right for you. Netragard, Inc Main: 617-934- 0269 Email: [email protected] Website: http://www.netragard.com Blog: http://pentest.netragard.com
Armanino LLP Welcomes You To Today s Webinar:
Armanino LLP Welcomes You To Today s Webinar: Turbo Charge Your Sales Team New Sales & Marketing Dashboard The presentation will begin in a few moments 1 Armanino LLP armaninollp.com Armanino LLP armaninollp.com
How To Manage Security On A Networked Computer System
Unified Security Reduce the Cost of Compliance Introduction In an effort to achieve a consistent and reliable security program, many organizations have adopted the standard as a key compliance strategy
HP ALM11 & MS VS/TFS2010
Comparison Test Management Tools HP ALM11 & MS VS/TFS2010 22 mei 2012 voordracht georganiseerd door Discussiegroep Software Testing met de steun van Ingenieurshuis, Antwerpen 24/05/2012 HP ALM 11 Microsoft
Overview, Goals, & Introductions
Improving the Retail Experience with Predictive Analytics www.spss.com/perspectives Overview, Goals, & Introductions Goal: To present the Retail Business Maturity Model Equip you with a plan of attack
Manage projects effectively
Business white paper Manage projects effectively HP Project and Portfolio Management Center and HP Agile Manager Table of contents 3 Executive summary 3 The HP Solution Invest in what matters most then
Integrating Application Security into the Mobile Software Development Lifecycle. WhiteHat Security Paper
Integrating Application Security into the Mobile Software Development Lifecycle WhiteHat Security Paper Keeping pace with the growth of mobile According to the November 2015 edition of the Ericsson Mobility
Senior Business Intelligence/Engineering Analyst
We are very interested in urgently hiring 3-4 current or recently graduated Computer Science graduate and/or undergraduate students and/or double majors. NetworkofOne is an online video content fund. We
KnoahSoft Harmony TM Suite. Because Not All Agents are Created Equal
KnoahSoft Harmony TM Suite Because Not All Agents are Created Equal Performance management is not just software; it is a mindset that permeates the entire solution. When performance management tools are
Analytics-driven Workforce Optimization
Analytics-driven Workforce Optimization > What if your organization could improve everything about how it delivers customer service? What if you could serve customers better and more cost effectively while
An Introduction to. Metrics. used during. Software Development
An Introduction to Metrics used during Software Development Life Cycle www.softwaretestinggenius.com Page 1 of 10 Define the Metric Objectives You can t control what you can t measure. This is a quote
Advanced Solutions. Uniformance Suite. Real-time Digital Intelligence Through Unified Data, Analytics and Visualization
Advanced Solutions Uniformance Suite Real-time Digital Intelligence Through Unified Data, Analytics and Visualization What is Uniformance? Honeywell s Uniformance Suite provides real-time digital intelligence
Palo Alto Networks and Splunk: Combining Next-generation Solutions to Defeat Advanced Threats
Palo Alto Networks and Splunk: Combining Next-generation Solutions to Defeat Advanced Threats Executive Summary Palo Alto Networks strategic partnership with Splunk brings the power of our next generation
ALM120 Application Lifecycle Management 11.5 Essentials
ALM120 Application Lifecycle Management 11.5 Essentials Instructor-Led Workshop OVERVIEW This course provides the tools you need to implement and use Quality Center 11.50. Students learn how to manage
Building Security into the Software Life Cycle
Building Security into the Software Life Cycle A Business Case Marco M. Morana Senior Consultant Foundstone Professional Services, a Division of McAfee Outline» Glossary» What is at risk, what we do about
Business Case Outsourcing Information Security: The Benefits of a Managed Security Service
Business Case Outsourcing Information Security: The Benefits of a Managed Security Service seccuris.com (866) 644-8442 Contents Introduction... 3 Full- Time Experts vs. a Part- Time In- House Staff...
Enterprise Business Service Management
Technical white paper Enterprise Business Service Management Key steps and components of a successful solution Table of contents Executive Summary... 2 Setting the goal establishing an IT initiative...
Workforce Optimization
Workforce Optimization What if your organization could improve everything about how it delivers customer service? What if you could serve customers better and more cost effectively while mining valuable
Webinar. Feb 23 2012
An Feb 23 2012 Webinar David White Senior Product Manager [email protected] Tel: +972-54-6750323 Shir Goldberg Co-Founder & VP Biz Dev [email protected] Tel: +1 919 827 1194 This presentation
HP and netforensics Security Information Management solutions. Business blueprint
HP and netforensics Security Information Management solutions Business blueprint Executive Summary Every day there are new destructive cyber-threats and vulnerabilities that may limit your organization
THE TOP 4 CONTROLS. www.tripwire.com/20criticalcontrols
THE TOP 4 CONTROLS www.tripwire.com/20criticalcontrols THE TOP 20 CRITICAL SECURITY CONTROLS ARE RATED IN SEVERITY BY THE NSA FROM VERY HIGH DOWN TO LOW. IN THIS MINI-GUIDE, WE RE GOING TO LOOK AT THE
HP Fortify Software Security Center
HP Fortify Software Security Center Proactively Eliminate Risk in Software Trust Your Software 92% of exploitable vulnerabilities are in software National Institute for Standards and Technology (NIST)
HP Service Health Analyzer: Decoding the DNA of IT performance problems
HP Service Health Analyzer: Decoding the DNA of IT performance problems Technical white paper Table of contents Introduction... 2 HP unique approach HP SHA driven by the HP Run-time Service Model... 2
Introduction to QualysGuard IT Risk SaaS Services. Marek Skalicky, CISM, CRISC Regional Account Manager for Central & Adriatic Eastern Europe
Introduction to QualysGuard IT Risk SaaS Services Marek Skalicky, CISM, CRISC Regional Account Manager for Central & Adriatic Eastern Europe Qualys at a Glance Software-as-a-Service (SaaS) Founded in 1999
Loss Prevention Data Mining Using big data, predictive and prescriptive analytics to enpower loss prevention
White paper Loss Prevention Data Mining Using big data, predictive and prescriptive analytics to enpower loss prevention Abstract In the current economy where growth is stumpy and margins reduced, retailers
Qlik s Associative Model
White Paper Qlik s Associative Model See the Whole Story that Lives Within Your Data August, 2015 qlik.com Table of Contents Introduction 3 Qlik s associative model 3 Query-based visualization tools only
can you improve service quality and availability while optimizing operations on VCE Vblock Systems?
SOLUTION BRIEF Service Assurance Solutions from CA Technologies for VCE Vblock Systems can you improve service quality and availability while optimizing operations on VCE Vblock Systems? agility made possible
Root Cause Analysis Concepts and Best Practices for IT Problem Managers
Root Cause Analysis Concepts and Best Practices for IT Problem Managers By Mark Hall, Apollo RCA Instructor & Investigator A version of this article was featured in the April 2010 issue of Industrial Engineer
ISTQB Certified Tester. Foundation Level. Sample Exam 1
ISTQB Certified Tester Foundation Level Version 2015 American Copyright Notice This document may be copied in its entirety, or extracts made, if the source is acknowledged. #1 When test cases are designed
Data Visualization Choices
Data Visualization Choices What, When, and How? Paul Turley Mentor, SolidQ SQL Server MVP April 10-12 Chicago, IL Please silence cell phones April 10-12 Chicago, IL Presenter Introduction Mentor BI Solution
Creating a Business Intelligence Competency Center to Accelerate Healthcare Performance Improvement
Creating a Business Intelligence Competency Center to Accelerate Healthcare Performance Improvement Bruce Eckert, National Practice Director, Advisory Group Ramesh Sakiri, Executive Consultant, Healthcare
Business Intelligence in SharePoint 2013
Business Intelligence in SharePoint 2013 Empowering users to change their world Jason Himmelstein, MVP Senior Technical Director, SharePoint @sharepointlhorn http://www.sharepointlonghorn.com Gold Sponsor
Improving Visibility into your Vulnerability Management Program
Improving Visibility into your Vulnerability Management Program One of the most challenging aspects of managing your vulnerability management program is understanding where to focus your time and effort.
Attack Intelligence: Why It Matters
Attack Intelligence: Why It Matters WHITE PAPER Core Security +1 617.399-6980 [email protected] www.coresecurity.com A Proactive Strategy Attacks against your organization are more prevalent than ever,
Getting it Right: How to Find the Right BI Package for the Right Situation Norma Waugh. RMOUG Training Days February 15-17, 2011
Delivering Oracle Success Getting it Right: How to Find the Right BI Package for the Right Situation Norma Waugh RMOUG Training Days February 15-17, 2011 About DBAK Oracle solution provider Co-founded
Introduction to Business Intelligence
IBM Software Group Introduction to Business Intelligence Vince Leat ASEAN SW Group 2007 IBM Corporation Discussion IBM Software Group What is Business Intelligence BI Vision Evolution Business Intelligence
Big Data Analytics- Innovations at the Edge
Big Data Analytics- Innovations at the Edge Brian Reed Chief Technologist Healthcare Four Dimensions of Big Data 2 The changing Big Data landscape Annual Growth ~100% Machine Data 90% of Information Human
Managed Service Solutions Catalogue. MANAGED SERVICES SOLUTIONS CATALOGUE MS Offering Overview June 2014
Managed Service Solutions Catalogue MANAGED SERVICES SOLUTIONS CATALOGUE MS Offering Overview June 2014 1 MANAGED SERVICES SOLUTIONS CATALOGUE Managed Services Solutions Catalogue Managed Service Solutions
How to Build a Trusted Application. John Dickson, CISSP
How to Build a Trusted Application John Dickson, CISSP Overview What is Application Security? Examples of Potential Vulnerabilities Strategies to Build Secure Apps Questions and Answers Denim Group, Ltd.
ITSM Maturity Model. 1- Ad Hoc 2 - Repeatable 3 - Defined 4 - Managed 5 - Optimizing No standardized incident management process exists
Incident ITSM Maturity Model 1- Ad Hoc 2 - Repeatable 3 - Defined 4 - Managed 5 - Optimizing No standardized incident process exists Incident policies governing incident Incident urgency, impact and priority
WHY IT ORGANIZATIONS CAN T LIVE WITHOUT QLIKVIEW
WHY IT ORGANIZATIONS CAN T LIVE WITHOUT QLIKVIEW A QlikView White Paper November 2012 qlikview.com Table of Contents Unlocking The Value Within Your Data Warehouse 3 Champions to the Business Again: Controlled
Implementing Business Intelligence at Indiana University Using Microsoft BI Tools
HEUG Alliance 2013 Implementing Business Intelligence at Indiana University Using Microsoft BI Tools Session 31537 Presenters: Richard Shepherd BI Initiative Co-Lead Cory Retherford Lead Business Intelligence
Requirements Management im Kontext von DevOps
IBM Software Group Rational software Requirements Management im Kontext von DevOps DI Steindl Wolfgang https://www.xing.com/profiles/wolfgang_steindl Senior IT Specialist [email protected] http://lnkd.in/tpzrug
Pragmatic Metrics for Building Security Dashboards
SESSION ID: GRC-W03 Pragmatic Metrics for Building Security Dashboards James Tarala Principal Consultant Enclave Security @isaudit Problem Statement What s measured improves. Peter Drucker In an era of
Increasing Business Efficiency and Agility for ATGbased. Systems. the business challenge: upgrading the development pipeline
Increasing Business Efficiency and Agility for ATGbased ecommerce Systems This case study follows a Tier 1 retailer migrating to an ATG-based ecommerce platform and upgrading its software development process
The Power of Installed-Base Intelligence: Using Quality Data and Meaningful Analysis to Drive Service Revenue WHITE PAPER
The Power of Installed-Base Intelligence: Using Quality Data and Meaningful Analysis to Drive Service Revenue WHITE PAPER The Power of Installed-Base Intelligence: Using Quality Data and Meaningful Analysis
7. Key performance indicators (KPIs)
53 7. Key performance indicators (KPIs) What the standard requires The standard requires that process and product performance is measured against targets and that this information is analysed, along with
Web Application security testing: who tests the test?
Web Application security testing: who tests the test? Ainārs Galvāns Application Penetration Tester www.exigenservices.lv About myself Functional testing Leading test group Reporting to client Performance
