Ed Adams CEO Security Innovation. John Kirkwood CISO Security Innovation ISACA Webinar Program ISACA. All rights reserved.
|
|
|
- Darcy Richard
- 9 years ago
- Views:
Transcription
1 Mapping Application Security to Compliance Ed Adams CEO Security Innovation John Kirkwood CISO Security Innovation
2 Agenda About Security Innovation Security Drivers and Industry Data Aligning software development with corporate policies and compliance requirements Creating an action plan to identify and remediate gaps between current and best practices Conclusion
3 About Security Innovation Application Security Experts 10+ years research on vulnerabilities Hundreds of assessments on world s most dominant software Security testing methodology adopted by SAP, Symantec, Microsoft and McAfee Authors of 8 books Products, Services & Training Software and Code Assessment SDLC Consulting elearning Helping organizations Build internal application security competency Create a secure, repeatable SDLC Reduce application risk
4 About Edward Adams & John Kirkwood Ed Adams, CEO, Security Innovation 15+ years experience in the IT security and quality assurance industries Sits on board of the National Association of Information Security Groups (NAISG) and Massachusetts North Shore Technology Council (NSTC) Contributor to New England Cable News, CSO Magazine, CIO Update, SC Magazine, Business Daily, Optimize and CFO Magazine Maintains a blog with CSO Magazine John Kirkwood, CISO & Senior Security Strategist, Security Innovation Past Global / Chief Information Security Officer for top Global Fortune 500 Companies for the past 8+ years Responsible for creating application security and risk management programs Work experience of more than 20 years in Financial Services, Retail and Healthcare Industries Global experience in the Americas, Europe and Asia 4
5 Agenda About Security Innovation Security Drivers and Industry Data Aligning software development with corporate policies i and compliance requirements Creating an action plan to identify and remediate gaps between current and best practices Conclusion
6 Major Cyber Incidents 2011 YTD Automotive 283,000 Unauthorized Data Access $206M Lawsuit Security Solutions Entertainment 40M 100 M+ Cyber Attack Unauthorized $66M Rem. Data Access $171M Rem. $1 B lawsuit Technology 20M Cyber Attack Global Governmental Coalition unknown # of systems compromised (possibly 187 member countries) Suspicious file transfers Mobile Device "cascade failure" of RIM data systems RIM offers $100 app bundle Q1 Q2 Q3 Q Stock Exchange 10, Clients Data Sharing Service Compromised Marketing Potentially tens of millions of e- mail addresses stolen Unauthorized Data Access Defense Contractor # unknown RSA SecurIDs used to breach LM Financial Services Payroll Processing Healthcare 200,000 Unauthorized Access $2.7M Stolen 1 client w/ 3.5 M users Cyber Attack 4M healthcare records stolen Copyright 2011, Smbiosys, LLC. All Rights Reserved
7 Root Cause & the Hackers Target: Insecure Applications Today, the money is in software applications that s where companies process their most sensitive data from Credit card numbers to customer and employee information as well as trade secrets -- Forrester 90%+ attacks ac are at the application layer (Verizon Business Study) Hacks targeting retail sector have increased 43%, largely due to SQL injection and the use of exploit toolkits (Dell SecureWorks) 25% of respondents indicated that meeting compliance objectives is the most effective argument in convincing management to invest in software security (Forrester) 92% of attacks were not highly difficult (Verizon Business Study) Copyright 2011, Smbiosys, LLC. All Rights Reserved
8 Application Security: the Next Frontier of Compliance Regulations historically focused on network security, but application security requirements are emerging FISMA & NIST require organizations to integrate security assessments into SDLC PCI-DSS secure coding standards ;..prevent vulnerabilities such as injection flaws SEC Evaluate security risks to determine if disclosure is required Dozens of others Requirements are general and implications non-obvious Develop according to industry best practices uh, where can I find those? Protected t information should not be improperly altered or destroyed d Huh???
9 Agenda About Security Innovation Security Drivers and Industry Data Aligning software development with corporate policies i and compliance requirements Creating an action plan to identify and remediate gaps between current and best practices Conclusion
10 Corporate Application Compliance Framework aligning development with management policies
11 Mapping OWASP Top Ten to PCI DSS
12 PCI DSS mapped to ISO (and OWASP)
13 Selected coding practices that contribute to compliance High-Level Requirement Standards (Partial List) Selected Coding Practices Confidentiality SOX, PCI DSS, HIPAA, Appropriate use of strong encryption for data in databases. ISO 27002, HIPAA, GLBA, Encrypting confidential data in memory. No custom or untrusted encryption routines. FFIEC, Basel l I, CA SB Encrypting data in motion, especially for wireless transmissions. 1386, FIPS 199, NIST SP Masking confidential data that needs to be viewed in part / / Data integrity SOX, PCI DSS, ISO Robust integrity checks to prevent tampering with data. Authentication and access control Logging and auditing Availability Change management 27002, HIPAA, GLBA, FIPS 199, NIST SP / / SOX, PCI DSS, ISO 27002, HIPAA, II, NIST SP / / SOX, PCI DSS, ISO 27002, HIPAA, SB 1386, NIST SP / / SOX, ISO 27002, HIPAA, II FIPS 199, NIST SP / / SOX, BASEL II, NIST SP / Input validation and comprehensive error handling to prevent injection attacks, privilege escalation, and other hacking techniques. Output encoding. Use of least privileges. Hashing for confidential data that needs to be validated (e.g. passwords). Support for strong passwords & two-factor authentication where appropriate. Role-based access control and revocation of rights, with clear roles mapped to permissions. Locked down file access and database roles. No guest accounts. Passwords and encryption keys encrypted before storage and transmission. Detailed audit trails of users accessing data and resources. Detailed logging of systems that process sensitive data, including shutdowns, restarts and unusual events. No confidential data exposed in logs. Event logs and audit trails available only to system admins and protected from unauthorized modifications. Code reliability. Failover and redundancy built into applications. Applications resistant to denial of service attacks. Clean up of confidential data in memory and in file systems during failures and shutdowns. Source control. Logging of application changes. Application change logs accessible only to privileged users and resistant to tampering.
14 Application Security Continuum Ready for re-scan Secure at the Source Defend in Place Find and Fix Results to Dev Team
15 Aligning Development Activities with Compliance: OWASP and Other Coding Standards OWASP Maps to and referenced in many industry and regulatory compliance standards and frameworks U.S. FTC and DISA, PCI-DSS Used by many companies NSA: in their developer guidance on web application security Oracle: for developer awareness IBM AppScan: maps source code findings to OWASP Top 10 CWE: most dangerous software weaknesses The CERT secure coding standards The Microsoft SDL (Secure Development Lifecycle) Security Innovation s TeamMentor extensive collection of Secure SDLC checklists and code samples
16 Agenda About Security Innovation Security Drivers and Industry Data Aligning software development with corporate policies i and compliance requirements Creating an action plan to identify and remediate gaps between current and best practices Conclusion
17 Assessing your Existing SDLC Graphical View 1.) Review Org Structure and Team Roles 2)Analyze 2.) Policies & Standards Requirements Best Practices 5)C 5.) Create Gap Analysis Report with recommendations 3.) Analyze & 4.) Refine via focused Aggregate Data Interviews (usually team leads)
18 Assessing your Existing SDLC Activity Matrix Product A Product B Product C Define Security Objectives X X Apply Security Design Guidelines X X Threat Model X X Security Architecture and Design Review X X Apply Security Implementation Guidelines X Security Code Review X X X Security Penetration Testing X X X Apply Security Deployment Guidelines Security Deployment Review X X 3rd party Security Penetration Test X X X Security Incident Response Plan X X X
19 Assessing your Existing SDLC Questions to Ask
20 Assessing your Existing SDLC Security Policies Security policies are the backbone of your development process without them, many efforts are wasted what good is a scanning tool if it s use is not required? Questions to ask yourself do you have a formal development process with well-defined phases and activities? do you have a dedicated security team? do you have corporate security and compliance policies? how is the development team made aware of security policies? how does the development team access security policies? how does your development team interact with company security policies (governance, compliance, etc)?
21 Assessing your Existing SDLC Requirements & Design Phase Security activities security requirements objectives threat modeling design best practices & design reviews Questions to ask yourself: do you gather security objectives? How are they stored? How are they mapped to the rest of the design process? do you have a set of design best practices that you employ for security? How do you ensure architects are using them? How do you revise and improve them over time? does your team conduct security architecture and design reviews? How often? Do you use checklists to drive the process? How are the results tracked and used to improve the design? does your team create threat models for your application s architecture/design? When? Is it updated d over time? How is it used to improve the design, implementation and testing?
22 Assessing your Existing SDLC Implementation Phase Implementation phase security activities development best practices security code reviews Questions to Ask does your team use a formalized set of security coding best practices? what type of code scanning tools do you use? do you perform code reviews against security best practices? How often? What is the process? Do you have a set of checklists that can use drive the review process? How are the results tracked and used to improve the implementation?
23 Assessing your Existing SDLC Verification Phase Verification phase security activities abuse case definition i i penetration testing Questions to ask: does your team conduct 3 rd party or internal penetration tests? How often are they performed? Do you prioritize attack paths based on a threat model? Do you have a set of vulnerabilities, unique to your system, that t you test t against? How are the results tracked and used to improve the implementation? are your testers/qa trained on the latest attack trends and test techniques? do you use security testing tools? Does your team know how to use them effectively? Web scanners such as AppScan or WebInspect File and network fuzzers etc
24 Assessing your Existing SDLC Release & Response Phase Release/response phase security activities and preparedness security deployment review security attack response patching processes Questions does your team use a formalized set of security deployment best practices? do you have a security incident response plan? do you use network scanning tools such as Nessus? do you have a set of deployment best practices that you employ for security? How are they stored? Do you ensure your developers are using these? How do you revise and improve these best practices over time? do you review the deployment for security best practices before deployment? How often are inspections performed? Do you use checklists to drive the process? How are the results tracked and used to improve the deployment?
25 Planning & Implementing Remediation Roadmap Use assessments from previous phases. For each high-priority area: review the major risk management strategies identify appropriate control options describe necessary modifications to compliance activities Identify which h activities/controls iti t will yield biggest bang for the buck Use results to construct a phased software risk remediation roadmap Select tools and partners that can help implement Sequencing is critical introduce baseline guidance for all first work with security champions; develop them as mentors beware not to invest in new tools too soon Measure progress relative to compliance & security objectives/requirements adjust as corporate priorities, threat patterns, compliance standards change
26 Agenda About Security Innovation Security Drivers and Industry Data Aligning g software development with corporate policies and compliance requirements Creating an action plan to identify and remediate gaps between current and best practices Conclusion
27 SDLC Compliance Assessment for Energy Client High-Level findings Good software engineering processes but lacks coordinated formalized security engineering processes teams not trained on security principles no standards for secure design or implementation no architecture, design or code reviews focused on security no threat modeling being done to assess risk team unable to prioritize efforts or mitigate threats repeatedly Team is making lots of mistakes, both in design & development resulted in many exploitable vulnerabilities in critical applications likely indicative of all the company s applications Would fail PCI and ISO audits
28 Case Study Recommendations Made
29 Case Study: SDLC Assessment for Energy Client security activity recommendations How security engineering activities can be layered into a traditional software development process
30 Case Study: SDLC Assessment for Energy Client how recommended activities could have prevented issues A threat model would have exposed key assets for protection and design-level mitigations could have been created A design review would have checked that each design mitigation was placed in the architecture properly Secure implementation best practices and security focused code reviews would ensure: the development of input and data validation routines the proper use of output encoding and cryptography A penetration test before deployment could discover issues that fell through the cracks in the early phases of development All of the above would have been steps toward compliance (not to mention making their software systems more secure )
31 Case Study: SDLC Assessment for Energy Client training recommendations Requirements & Analysis Architecture & Design Code Implementation Testing How to Define Security Objectives (ENG 111) Fundamentals of Secure Architecture (DES 101) Classes of Security Defects (TST 201) Fundamentals of Security Testing (TST 101) Architecture Risk Analysis & Remediation (DES 212) Creating Secure Application Architecture (DES 311) Fundamentals of Secure Development (COD 101) Understanding Secure Code.NET 4.0 (COD 214) Creating Secure Code ASP.NET (COD 311) How to Test for OWASP Top Ten (TST 211) Intro to Threat Modeling (ENG 301) How to Perform a Code Review (ENG 401) Everyone: Fundamentals of Application Security (AWA 101)
32 Case Study: SDLC Assessment for Energy Client recommendations for requirements gathering When accepting a change request or a new requirement, examine each requirement for security and compliance impact if there will be a security impact, track it as a new security requirement evaluate if there needs to be additional security requirements in place to mitigate added risk requirements management tools can help here (esp. with traceability) Before moving on to application design, security objectives and requirements must be defined review security objectives to ensure they are appropriate for the functional requirements and application scenario determine security objectives based upon data asset classification All security requirements should be tracked in the requirements management tool they had one already; just weren t using it for security
33 Case Study: SDLC Assessment for Energy Client Design Recommendations Use the TeamMentor security guidelines to apply security design best practices Perform a security architecture and design review before coding starts t Use the TeamMentor security checklists to drive the review, provide usable guidance, and document for compliance audits Create a threat model on your application s design before coding begins Ensure asset classification and to help pprioritize threats
34 Case Study: SDLC Assessment for Energy Client Implementation Recommendations Use TeamMentor security yguidelines to apply security implementation best practices Secure Coding Standards requirement in PCI Perform a security code review before each check-in can be implemented with buddy code reviews as well as with the occasional group code review for knowledge sharing use the TeamMentor security checklists to drive the review Require that Visual Studio Code Analysis is turned on and all errors and warnings are handled before each check-in
35 Case Study: SDLC Assessment for Energy Client Verification Recommendations Use the security objectives and the threat model to build a security penetration test plan can write tests before code is written Complete internal penetration testing before deployment document for PCI and ISO requirements Complete a 3rd party penetration test on Internet facing applications before deployment document for PCI and ISO requirements
36 Case Study: SDLC Assessment for Energy Client Release Recommendations Perform a security deployment review, including configuration settings, before deploying Use TeamMentor security checklists to drive review Ensure there is a security incident response plan in place should include severity levels for potential vulnerabilities, escalation plans and engineers on call Where there is an incident response plan in place, this can be used as the basis s for the security incident response se plan
37 Case Study: SDLC Assessment for Energy Client Recommended rollout sequencing Security Objectives if you don t know the security it s difficult to be successful with any other activities Architecture and Design Review for Security bugs introduced in the design phase are the most expensive to deal with later Threat Modeling Drives the test plans and ensures that you address most critical threats Code Review for Security implementation bugs are the most common can save you later rework or help avoid costly exploits Security Review for Deployment even an effective process can be undone by a configuration error during deployment. Design Guidelines for Security adopting proven design principles ensures your application is secure from the start Security Testing used to validate designed mitigations and ensure nothing slipped through the cracks
38 Agenda About Security Innovation Aligning software development with corporate policies and compliance requirements Creating an action plan to identify if and remediate gaps between current and best practices Conclusion
39 Conclusion Most regulations, frameworks, and compliance mandates revolve around the same key, best practices for secure development Simple tools like spreadsheets can help you organize these with controls for rows and activities for columns helps visualize impact of single activity on multiple compliance requirements Rolling out a repeatable SDLC that integrates key security and compliance activities: Ensures future requirements will have little impact on existing efforts Allows you to maintain a big picture view to software development and IT teams Secure development has benefits beyond compliance 50% of software vulnerabilities prior to production can reduce configuration management and incident response costs by 75 percent (Gartner) Audit costs and re-do expenses dramatically reduced over 70% of all exploits take advantage of known and common vulnerabilities
40 Repeatable, Secure Development Works A look at the Microsoft SDL Total Vulnerabilities Disclosed 12 Months After Release 400 Total Vulnerabilities Disclosed 36 Months After Release Windows Windows OS I OS II OS III XP Vista SQL Server 2000 SQL Server 2005 Competing commercial DB Before SDL After SDL Before SDL After SDL 45% reduction in Vulnerabilities 91% reduction in Vulnerabilities Consistent, well documented security practices during all phases of a development project will not only facilitate compliance, but result in fewer vulnerabilities
41 How Security Innovation can Help TeamProfessor elearning Security Awareness for Staff Technical Training for Dev/IT Teams ASP.Net, Java, C/C++,.Net, Windows, C#, JRE PCI-DSS for Developers; Intro to PCI-DSS How to Test for the OWASP Top Ten TeamMentor: Secure Development Guidance System - 3,5000 Code snippets, how-to s, checklists, attacks, principle - Guidance views for OWASP, PCI-DSS - Application Risk Consulting Software & Code Assessment Enterprise Application Risk Ranking SDLC Assessment (and mapping to compliance requirements!) [email protected]
How to start a software security initiative within your organization: a maturity based and metrics driven approach OWASP
How to start a software security initiative within your organization: a maturity based and metrics driven approach Marco Morana OWASP Lead/ TISO Citigroup OWASP Application Security For E-Government Copyright
Defending the Database Techniques and best practices
ISACA Houston: Grounding Security & Compliance Where The Data Lives Mark R. Trinidad Product Manager [email protected] March 19, 2009 Agenda Understanding the Risk Changing threat landscape The target
Comprehensive Approach to Database Security
Comprehensive Approach to Database Security [email protected] NYOUG 2008 1 What will I discuss today Identify Threats, Vulnerabilities and Risk to Databases Analyze the drivers for Database Security Identify
SECURITY. Risk & Compliance Services
SECURITY Risk & Compliance s V1 8/2010 Risk & Compliances s Risk & compliance services Summary Summary Trace3 offers a full and complete line of security assessment services designed to help you minimize
Passing PCI Compliance How to Address the Application Security Mandates
Passing PCI Compliance How to Address the Application Security Mandates The Payment Card Industry Data Security Standards includes several requirements that mandate security at the application layer. These
Effective Software Security Management
Effective Software Security Management choosing the right drivers for applying application security Author: Dharmesh M Mehta [email protected] / [email protected] Table of Contents Abstract... 1
Maintaining PCI-DSS compliance. Daniele Bertolotti [email protected] Antonio Ricci [email protected]
Maintaining PCI-DSS compliance Daniele Bertolotti [email protected] Antonio Ricci [email protected] Sessione di Studio Milano, 21 Febbraio 2013 Agenda 1 Maintaining PCI-DSS compliance
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES www.kaspersky.com EXPERT SERVICES Expert Services from Kaspersky Lab are exactly that the services of our in-house experts, many of them global
ETHICAL HACKING 010101010101APPLICATIO 00100101010WIRELESS110 00NETWORK1100011000 101001010101011APPLICATION0 1100011010MOBILE0001010 10101MOBILE0001
001011 1100010110 0010110001 010110001 0110001011000 011000101100 010101010101APPLICATIO 0 010WIRELESS110001 10100MOBILE00010100111010 0010NETW110001100001 10101APPLICATION00010 00100101010WIRELESS110
Promoting Application Security within Federal Government. AppSec DC November 13, 2009. The OWASP Foundation http://www.owasp.org
Promoting Application Security within Federal Government AppSec DC November 13, 2009 Dr. Sarbari Gupta, CISSP, CISA Founder/President Electrosoft [email protected] 703-437-9451 ext 12 The Foundation
The Protection Mission a constant endeavor
a constant endeavor The IT Protection Mission a constant endeavor As businesses become more and more dependent on IT, IT must face a higher bar for preparedness Cyber preparedness is the process of ensuring
Data Privacy: The High Cost of Unprotected Sensitive Data 6 Step Data Privacy Protection Plan
WHITE PAPER Data Privacy: The High Cost of Unprotected Sensitive Data 6 Step Data Privacy Protection Plan Introduction to Data Privacy Today, organizations face a heightened threat landscape with data
The Top Web Application Attacks: Are you vulnerable?
QM07 The Top Web Application Attacks: Are you vulnerable? John Burroughs, CISSP Sr Security Architect, Watchfire Solutions [email protected] Agenda Current State of Web Application Security Understanding
EMC CONSULTING SECURITY STANDARDS AND COMPLIANCE SERVICES
EMC CONSULTING SECURITY STANDARDS AND COMPLIANCE SERVICES Aligning information with business and operational objectives ESSENTIALS Leverage EMC Consulting as your trusted advisor to move your and compliance
By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015
Community Bank Auditors Group Cybersecurity What you need to do now June 9, 2015 By: Gerald Gagne MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2015 Wolf & Company, P.C. Cybersecurity
Promoting Application Security within Federal Government. AppSec DC November 13, 2009. The OWASP Foundation http://www.owasp.org
Promoting Application Security within Federal Government AppSec DC November 13, 2009 Dr. Sarbari Gupta, CISSP, CISA Founder/President Electrosoft [email protected] 703-437-9451 ext 12 The Foundation
Columbia University Web Security Standards and Practices. Objective and Scope
Columbia University Web Security Standards and Practices Objective and Scope Effective Date: January 2011 This Web Security Standards and Practices document establishes a baseline of security related requirements
Presentation for : The New England Board of Higher Education. Hot Topics in IT Security and Data Privacy
Presentation for : The New England Board of Higher Education Hot Topics in IT Security and Data Privacy October 22, 2010 Rocco Grillo, CISSP Managing Director Protiviti Inc. Quote of the Day "It takes
Securing Your Web Application against security vulnerabilities. Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group
Securing Your Web Application against security vulnerabilities Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group Agenda Security Landscape Vulnerability Analysis Automated Vulnerability
Reducing Application Vulnerabilities by Security Engineering
Reducing Application Vulnerabilities by Security Engineering - Subash Newton Manager Projects (Non Functional Testing, PT CoE Group) 2008, Cognizant Technology Solutions. All Rights Reserved. The information
Security for a Smarter Planet. 2011 IBM Corporation All Rights Reserved.
Security for a Smarter Planet The Smarter Planet Our world is getting Instrumented Our world is getting Interconnected Our world is getting Intelligent Growing Security Challenges on the Smarter Planet
Checklist for HIPAA/HITECH Compliance Best Practices for Healthcare Information Security
Checklist for HIPAA/HITECH Compliance Best Practices for Healthcare Information Security Ali Pabrai, MSEE, CISSP (ISSMP, ISSAP) For Daily Compliance & Security Tips, Follow ecfirst @ Agenda Review the
Security Controls What Works. Southside Virginia Community College: Security Awareness
Security Controls What Works Southside Virginia Community College: Security Awareness Session Overview Identification of Information Security Drivers Identification of Regulations and Acts Introduction
Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense
A Trend Micro Whitepaper I February 2016 Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense How Trend Micro Deep Security Can Help: A Mapping to the SANS Top 20 Critical
Privacy + Security + Integrity
Privacy + Security + Integrity Docufree Corporation Data Security Checklist Security by Design Docufree is very proud of our security record and our staff works diligently to maintain the greatest levels
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE THE CHALLENGE: SECURE THE OPEN AIR Wirelesss communication lets you take your business wherever your customers,
What IT Auditors Need to Know About Secure Shell. SSH Communications Security
What IT Auditors Need to Know About Secure Shell SSH Communications Security Agenda Secure Shell Basics Security Risks Compliance Requirements Methods, Tools, Resources What is Secure Shell? A cryptographic
Database Security & Auditing
Database Security & Auditing Jeff Paddock Manager, Enterprise Solutions September 17, 2009 1 Verizon 2009 Data Breach Investigations Report: 285 million records were compromised in 2008 2 Agenda The Threat
Integrating Security into the Application Development Process. Jerod Brennen, CISSP CTO & Principal Security Consultant, Jacadis
Integrating Security into the Application Development Process Jerod Brennen, CISSP CTO & Principal Security Consultant, Jacadis Agenda Seek First to Understand Source Code Security AppSec and SQA Analyzing
Cyber Security Controls Assessment : A Critical Discipline of Systems Engineering
Cyber Controls : A Critical Discipline of Systems 14 th Annual NDIA Systems San Diego, CA October 24-28, 2011 Bharat Shah Lockheed Martin IS&GS [email protected] Purpose Provide an overview on integrating
SECURITY EDUCATION CATALOGUE
SECURITY EDUCATION CATALOGUE i ii TABLE OF CONTENTS Introduction 2 Security Awareness Education 3 Security Awareness Course Catalogue 4 Security Awareness Course Builder 7 SAE Print Material 8 Secure Code
Web application security Executive brief Managing a growing threat: an executive s guide to Web application security.
Web application security Executive brief Managing a growing threat: an executive s guide to Web application security. Danny Allan, strategic research analyst, IBM Software Group Contents 2 Introduction
Application Security Guide For CISOs
Application Security Guide For CISOs Version 1.0 (November 2013) Project Lead and Main Author Marco Morana Co-authors, Contributors and Reviewers Tobias Gondrom, Eoin Keary, Andy Lewis, Stephanie Tan and
Web Application Security
Web Application Security Ng Wee Kai Senior Security Consultant PulseSecure Pte Ltd About PulseSecure IT Security Consulting Company Part of Consortium in IDA (T) 606 Term Tender Cover most of the IT Security
Secure Web Applications. The front line defense
Secure Web Applications The front line defense Agenda Web Application Security Threat Overview Exploiting Web Applications Common Attacks & Preventative techniques Developing Secure Web Applications -Security
LEARNING CURRICULUM SECURITY COMPASS TRAINING 2015 Q3. Copyright 2015. Security Compass. 1
LEARNING CURRICULUM SECURITY COMPASS TRAINING 2015 Q3 Copyright 2015. Security Compass. 1 CONTENTS WHY SECURITY COMPASS...3 RECOMMENDED LEARNING PATHs...4 TECHNICAL LEARNING PATHS...4 BUSINESS / SUPPORT
A Database Security Management White Paper: Securing the Information Business Relies On. November 2004
A Database Security Management White Paper: Securing the Information Business Relies On November 2004 IPLocks, Inc. 441-A W. Trimble Road, San Jose, CA 95131 USA A Database Security Management White Paper:
Device Hardening, Vulnerability Remediation and Mitigation for Security Compliance
Device Hardening, Vulnerability Remediation and Mitigation for Security Compliance Produced on behalf of New Net Technologies by STEVE BROADHEAD BROADBAND TESTING 2010 broadband testing and new net technologies
The Value of Vulnerability Management*
The Value of Vulnerability Management* *ISACA/IIA Dallas Presented by: Robert Buchheit, Director Advisory Practice, Dallas Ricky Allen, Manager Advisory Practice, Houston *connectedthinking PwC Agenda
Enterprise Security Solutions
Enterprise Security Solutions World-class technical solutions, professional services and training from experts you can trust ISOCORP is a Value-Added Reseller (VAR) and services provider for best in class
Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data
Kenna Platform Security A technical overview of the comprehensive security measures Kenna uses to protect your data V2.0, JULY 2015 Multiple Layers of Protection Overview Password Salted-Hash Thank you
Office of Inspector General
DEPARTMENT OF HOMELAND SECURITY Office of Inspector General Security Weaknesses Increase Risks to Critical United States Secret Service Database (Redacted) Notice: The Department of Homeland Security,
Everything You Wanted to Know about DISA STIGs but were Afraid to Ask
Everything You Wanted to Know about DISA STIGs but were Afraid to Ask An EiQ Networks White Paper 2015 EiQ Networks, Inc. All Rights Reserved. EiQ, the EiQ logo, the SOCVue logo, SecureVue, ThreatVue,
Database Auditing: Best Practices. Rob Barnes, CISA Director of Security, Risk and Compliance Operations [email protected]
Database Auditing: Best Practices Rob Barnes, CISA Director of Security, Risk and Compliance Operations [email protected] Verizon 2009 Data Breach Investigations Report: 285 million records were compromised
Network Test Labs (NTL) Software Testing Services for igaming
Network Test Labs (NTL) Software Testing Services for igaming Led by committed, young and dynamic professionals with extensive expertise and experience of independent testing services, Network Test Labs
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE THE CHALLENGE: SECURE THE OPEN AIR Wirelesss communication lets you take your business wherever your customers,
Managing Privileged Identities in the Cloud. How Privileged Identity Management Evolved to a Service Platform
Managing Privileged Identities in the Cloud How Privileged Identity Management Evolved to a Service Platform Managing Privileged Identities in the Cloud Contents Overview...3 Management Issues...3 Real-World
Obtaining Value from Your Database Activity Monitoring (DAM) Solution
Obtaining Value from Your Database Activity Monitoring (DAM) Solution September 23, 2015 Mike Miller Chief Security Officer Integrigy Corporation Stephen Kost Chief Technology Officer Integrigy Corporation
Integrated Threat & Security Management.
Integrated Threat & Security Management. SOLUTION OVERVIEW Vulnerability Assessment for Web Applications Fully Automated Web Crawling and Reporting Minimal Website Training or Learning Required Most Accurate
Altius IT Policy Collection Compliance and Standards Matrix
Governance IT Governance Policy Mergers and Acquisitions Policy Terms and Definitions Policy 164.308 12.4 12.5 EDM01 EDM02 EDM03 Information Security Privacy Policy Securing Information Systems Policy
Building Security into the Software Life Cycle
Building Security into the Software Life Cycle A Business Case Marco M. Morana Senior Consultant Foundstone Professional Services, a Division of McAfee Outline» Glossary» What is at risk, what we do about
Entire contents 2011 Praetorian. All rights reserved. Information Security Provider and Research Center www.praetorian.com
Entire contents 2011 Praetorian. All rights reserved. Information Security Provider and Research Center www.praetorian.com Threat Modeling "Threat modeling at the design phase is really the only way to
Big Data, Big Risk, Big Rewards. Hussein Syed
Big Data, Big Risk, Big Rewards Hussein Syed Discussion Topics Information Security in healthcare Cyber Security Big Data Security Security and Privacy concerns Security and Privacy Governance Big Data
TEAM Academy Catalog. 187 Ballardvale Street, Wilmington, MA 01887 +1.978.694.1008 www.securityinnovation.com
TEAM Academy Catalog 187 Ballardvale Street, Wilmington, MA 01887 +1.978.694.1008 TEAM ACADEMY OVERVIEW 2 Table of Contents TEAM Academy Overview... 4 TEAM Professor Overview... 4 Security Awareness and
90% of data breaches are caused by software vulnerabilities.
90% of data breaches are caused by software vulnerabilities. Get the skills you need to build secure software applications Secure Software Development (SSD) www.ce.ucf.edu/ssd Offered in partnership with
IoT & SCADA Cyber Security Services
IoT & SCADA Cyber Security Services RIOT SOLUTIONS PTY LTD P.O. Box 10087, Adelaide St Brisbane QLD 4000 BRISBANE HEAD OFFICE Level 4, 60 Edward St, Brisbane, QLD 4000 T: 1300 744 028 Email: [email protected]
Introduction to Web Application Security. Microsoft CSO Roundtable Houston, TX. September 13 th, 2006
Introduction to Web Application Security Microsoft CSO Roundtable Houston, TX September 13 th, 2006 Overview Background What is Application Security and Why Is It Important? Examples Where Do We Go From
Formulate A Database Security Strategy To Ensure Investments Will Actually Prevent Data Breaches And Satisfy Regulatory Requirements
A Forrester Consulting Thought Leadership Paper Commissioned By Oracle Formulate A Database Security Strategy To Ensure Investments Will Actually Prevent Data Breaches And Satisfy Regulatory Requirements
Network Security & Privacy Landscape
Network Security & Privacy Landscape Presented By: Greg Garijanian Senior Underwriter Professional Liability 1 Agenda Network Security Overview -Latest Threats - Exposure Trends - Regulations Case Studies
Compliance Guide ISO 27002. Compliance Guide. September 2015. Contents. Introduction 1. Detailed Controls Mapping 2.
ISO 27002 Compliance Guide September 2015 Contents Compliance Guide 01 02 03 Introduction 1 Detailed Controls Mapping 2 About Rapid7 7 01 INTRODUCTION If you re looking for a comprehensive, global framework
IBM Rational AppScan: Application security and risk management
IBM Software Security November 2011 IBM Rational AppScan: Application security and risk management Identify, prioritize, track and remediate critical security vulnerabilities and compliance demands 2 IBM
BAE Systems PCI Essentail. PCI Requirements Coverage Summary Table
BAE Systems PCI Essentail PCI Requirements Coverage Summary Table Introduction BAE Systems PCI Essential solution can help your company significantly reduce the costs and complexity of meeting PCI compliance
BIG SHIFT TO CLOUD-BASED SECURITY
GUIDE THE BIG SHIFT TO CLOUD-BASED SECURITY How mid-sized and smaller organizations can manage their IT risks and meet regulatory compliance with minimal staff and budget. CONTINUOUS SECURITY TABLE OF
Penetration Testing in Romania
Penetration Testing in Romania Adrian Furtunǎ, Ph.D. 11 October 2011 Romanian IT&C Security Forum Agenda About penetration testing Examples Q & A 2 What is penetration testing? Method for evaluating the
Information Security Services
Information Security Services Information Security In 2013, Symantec reported a 62% increase in data breaches over 2012. These data breaches had tremendous impacts on many companies, resulting in intellectual
MySQL Security: Best Practices
MySQL Security: Best Practices Sastry Vedantam [email protected] Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes
PCI DSS Policies Outline. PCI DSS Policies. All Rights Reserved. ecfirst. 2010. Page 1 of 7 www.ecfirst.com
Policy/Procedure Description PCI DSS Policies Install and Maintain a Firewall Configuration to Protect Cardholder Data Establish Firewall and Router Configuration Standards Build a Firewall Configuration
Infor CloudSuite. Defense-in-depth. Table of Contents. Technical Paper Plain talk about Infor CloudSuite security
Technical Paper Plain talk about security When it comes to Cloud deployment, security is top of mind for all concerned. The Infor CloudSuite team uses best-practice protocols and a thorough, continuous
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to
The President s Critical Infrastructure Protection Board. Office of Energy Assurance U.S. Department of Energy 202/ 287-1808
cover_comp_01 9/9/02 5:01 PM Page 1 For further information, please contact: The President s Critical Infrastructure Protection Board Office of Energy Assurance U.S. Department of Energy 202/ 287-1808
Privilege Gone Wild: The State of Privileged Account Management in 2015
Privilege Gone Wild: The State of Privileged Account Management in 2015 March 2015 1 Table of Contents... 4 Survey Results... 5 1. Risk is Recognized, and Control is Viewed as a Cross-Functional Need...
The Business Case for Security Information Management
The Essentials Series: Security Information Management The Business Case for Security Information Management sponsored by by Dan Sullivan Th e Business Case for Security Information Management... 1 Un
PCI DSS Overview and Solutions. Anwar McEntee [email protected]
PCI DSS Overview and Solutions Anwar McEntee [email protected] Agenda Threat environment and risk PCI DSS overview Who we are Solutions and where we can help Market presence High Profile Hacks in
SecurityMetrics Vision whitepaper
SecurityMetrics Vision whitepaper 1 SecurityMetrics Vision: Network Threat Sensor for Small Businesses Small Businesses at Risk for Data Theft Small businesses are the primary target for card data theft,
Security Breaches and Vulnerability Experiences Overview of PCI DSS Initiative and CISP Payment Application Best Practices Questions and Comments
Security in the Payment Card Industry OWASP AppSec Seattle Oct 2006 Hap Huynh, Information Security Specialist, Visa USA [email protected] Copyright 2006 - The OWASP Foundation Permission is granted to copy,
Strategic Information Security. Attacking and Defending Web Services
Security PS Strategic Information Security. Attacking and Defending Web Services Presented By: David W. Green, CISSP [email protected] Introduction About Security PS Application Security Assessments
Office of Inspector General
Office of Inspector General DEPARTMENT OF HOMELAND SECURITY U.S. Department of Homeland Security Washington, DC 20528 Office of Inspector General Security Weaknesses Increase Risks to Critical DHS Databases
Information Security and Risk Management
Information Security and Risk Management COSO and COBIT Standards and Requirements Page 1 Topics Information Security Industry Standards and COBIT Framework Relation to COSO Internal Control Risk Management
elearning for Secure Application Development
elearning for Secure Application Development Curriculum Application Security Awareness Series 1-2 Secure Software Development Series 2-8 Secure Architectures and Threat Modeling Series 9 Application Security
RSA envision. Platform. Real-time Actionable Security Information, Streamlined Incident Handling, Effective Security Measures. RSA Solution Brief
RSA Solution Brief RSA envision Platform Real-time Actionable Information, Streamlined Incident Handling, Effective Measures RSA Solution Brief The job of Operations, whether a large organization with
