Enterprise Application Security Program
|
|
|
- Joy Powers
- 10 years ago
- Views:
Transcription
1 Enterprise Application Security Program GE s approach to solving the root cause and establishing a Center of Excellence Darren Challey GE Application Security Leader
2 Agenda Why is AppSec important? Why is it so hard? Changing the culture Critical success factors Structuring an enterprise program: Guidance Education Tools Managing vendors Creating a center of excellence 2 /
3 Why is Application security important?
4 Press we like! 2005, 2006 Global Most Admired Companies (#1) Fortune Seven consecutive years: World s Most Respected Company Financial Times 2004 Named a member of the Dow Jones Sustainability Index 4 /
5 Press we can t afford Significant reputational, regulatory & financial harm 5 /
6 AppSec is a large data loss source Loss or disclosure of PII (Personally Identifiable Information) is required to be reported (thus good data) Source: Verizon s 2009 Data Breach Investigations Report Figure /
7 Challenges, why is this so hard?
8 AppSec changes rapidly OWASP Top : A1 Unvalidated Input A2 Broken Access Control A3 Broken Auth. / Session Mgmt A4 Cross Site Scripting A5 Buffer Overflow A6 Injection Flaws A7 Improper Error Handling A8 Insecure Storage A9 Application Denial of Service A10 Insecure Config. Management OWASP Top : A1 Cross Site Scripting (XSS) A2 Injection Flaws (e.g., SQL injection) A3 Malicious File Execution (i.e., PHP) A4 Insecure Direct Object Reference A5 Cross Site Request Forgery (XSRF) A6 Info Leak / Improper Error Handling A7 Broken Auth. / Session Mgmt A8 Insecure Cryptographic Storage A9 Insecure Communications A10 Failure to Restrict URL Access OWASP.org new! new! new! 8 /
9 The image cannot be displayed. Your computer may not have enough memory to open the image, or the image may have been corrupted. Restart your computer, and then open the file again. If the red x still appears, you may have to delete the image and then insert it again. Changing landscape 1. Increased skill and talent pool of technically proficient individuals willing to break the law 2. Growing volume of financially valuable data online (PII and corporate intellectual property 3. Development of criminal markets (black markets) to facilitate conversion to money attackers now have effective skills, something to steal, and a place to sell it Completely one-sided: we must find all vulnerabilities while the bad guys only need to find one 9 /
10 Becoming an enabler (not a barrier) Security Readiness Design Dev. QA Stag e Past Production InfoSec is the barrier Security Readiness Future InfoSec is an enabler Must inject application security earlier through Guidance, Education and Tools 10 /
11 Ineffective tollgates lead to Must understand the development and deployment process and integrate rather than mandate
12 The image cannot be displayed. Your computer may not have enough memory to open the image, or the image may have been corrupted. Restart your computer, and then open the file again. If the red x still appears, you may have to delete the image and then insert it again. Applying security at the right time $ $ $ $ $ $ $ $ $ $ $ $ $ $ 12 /
13 Solving the problem for the enterprise
14 Some success factors Form a mission and strategy Develop policy (but not corporate mandate ) Gain executive buy-in (cost / benefit / risk) Understand the magnitude of problem (metrics) Asset inventory and vulnerability management Develop standards (what should I do and when?) Establish a formal program (strong leadership) Focus on education and training materials Develop in-house expertise, services and COE Continuous improvement, measurement, KPI Communicate, communicate, communicate Drive a culture change (shared need, WIIFM) Communicate expectations with vendors Implement incentives (and penalties) Digitize after the process is solid (tools) 14 /
15 AppSec program mission & structure The Application Security Program will achieve and maintain a strong application security posture across the company through the implementation of consistent and unified guidance, education and tools. Guidance Education Guidance Provide clear direction to the company and vendors on the expectations for secure code development Metrics Assist the businesses and vendors with educating their developers in secure coding practices Education Tools Identify tools to ensure secure code, assist in the deployment of those tools Tools 15 /
16 AppSec program strategy Monitor & improve Guidance tools Inventory & tracking Policy guidance Security tools tools Standards guidance Metrics tools education Training 16 /
17 Guidance Guidance Vulnerability Remediation Guide Secure Coding Guidelines Secure Deployment GE Application Security Working Group Quick Reference Card Contractual language Desk Calendars 17 /
18 Guidance AppSec Calendars helped increase visitors to key Guidance materialsguidance hits for Best Practices for Secure Coding spiked in March & June downloads doubled in April when Quick Reference Card with Quick links appeared 18 /
19 Education CBT1: Intro to AppSec at GE (60 min) Education CBT2: GE Best Practices for Secure Coding (90 min) CBT3: Attack Profiles & Countermeasures (120 Developer min) Awareness Assessment: 100 s of internally-developed questions Randomized questions, timed completion Vendors track their own results Allows tailoring of training / awareness programs 19 /
20 Tools COE AppSec assessment services Vendor framework & Metrics Compliance Handbook Common objects repository GE Enterprise Application Security Scanning & Monitoring tools SCABBA White Box S0E0C0U0R0E000 Tools Automation is the way to go (but the tools are not quite there yet) 20 /
21 Managing vendor performance
22 GE secure SDL framework Tools Goal: prevent, detect or correct security defects earlier Requirements Design Development QA Security Testing Deployment Security Kick-off Use Security Requirements Checklist Identify regulatory and compliance considerations Ensure development team has access to [test tools] Ensure developers trained or certified on Secure Coding Skills Follow GE Secure Architecture & Deployment Guidelines in design Cover all points in Architecture and Design Review checklist Develop Security Use cases Develop Security Abuse cases Perform risk assessment (recommended tool: Threat modeling) Use GE Best Practices for Secure Coding Use Secure Common Objects (COR) Use Secure Code Review checklist during Peer Review Scan app. code using [test tools] and fix all High or Critical vulnerabilities Use GE AppSec COE services for early security review Perform Risk based security test (use Security Test cases Template) Scan App. using [test tools] and fix all High or Critical vulnerabilities Use GE AppSec COE services for early security review Perform Internal Final Security Assessment (Refer Vulnerability Ratings & Categories) Fix all High or Critical vulnerabilities before delivering code to GE Obtain signoff from GDC AppSec Leader Use GE AppSec COE services for Security Review Perform Infrastructure Security Review Use GE AppSec COE services for Assessments 22 /
23 Vendor AppSec Performance Tools 23 /
24 Vendor AppSec Performance Tools 24 /
25 So is any of this making a difference?
26 Is it making a difference? Tools Vulnerabilities checked in assessments increasing 26 /
27 Forming a center of excellence
28 What is a COE? A Center of Excellence combines the best available people, processes and tools to deliver low cost / high quality services and guidance under strong leadership with a clear mission. People Expertise (internal and external) Multi-disciplinary capability Cross-business steering committee Process Excellence Standard engagement model Cycle time reductions through Lean Managed w/ metrics to drive behavior Leverage Internal best practices External benchmarking Tools Central deployment / management Leverage enterprise agreements Start with process, follow with tools 28 /
29 Softtek Facilities Biometric Access: Privacy Glass: 29 /
30 Formal training & defined roles Comprehensive training program for all auditors to ensure skills are kept current and that auditors can provide more than one type of service. 30 /
31 COE team structure Tools Research Operations Stakeholder Management Queue Management Application Security Auditors 31 /
32 Application Assessment Types Black / Gray Box Benefits: Quick, cost-effective and targeted No source code needed Identify configuration issues Many more findings vs. scanner Better at finding: Access Control / Auth. issues Configuration Mgt. Issues Input Validation (faster) White Box Benefits: Comprehensive, seeks all vulnerabilities Does not require a live instance Detailed developer remediation help Better at finding: Sensitive information Input validation problems Exception management issues Back doors, logic bombs Instance Code 32 /
33 Application assessment process Verification Assessment (optional) GE Business Client (Requestor) Submit Request Upload Source Code Approve? Y Report Delivered GE Business Security Leader (Approver) Application Security Program (COE) Approve? Y Prepare Statement of Work (SOW) Perform Assessme nt Prepare Report 33 /
34 Vulnerability criticality ratings 1 Impact High - important assets or functions compromised, total data corruption or all services completely lost Medium - data corruption possible or primary services interrupted Low - non-critical assets or minimal secondary services affected, minor data corruption 2 Likelihood Impact Low - vulnerability is very difficult to discover, very difficult to exploit or not directly exposed and attacker would gain very limited application access Medium - vulnerability is relatively difficult to discover, relatively difficult to exploit and attacker would gain limited application access High - vulnerability is publicly known, easy to discover, easy to exploit, and attacker would gain full application access 3 Low Medium High Vulnerability Criticality Rating Medium High Critical Low Medium High Info. Low Medium Low Medium High Likelihood 34 /
35 COE customer satisfaction survey 91% Business Case s Response s Resp. Rate Enterprise Solutions % GE Commercial Finance % 89% 05/19/2008 to 05/31/2009 GE Corporate % GE Healthcare % GE Industrial % GE Infrastructure % GE Money % NBCU % SABIC-IP % Unknown 0 8 N/A Total % 91% 35 /
36 Questions?
37 Appendix
38 Tools Communicate Communicate Communicate Tools Communication plan Posters 2009 Awareness calendar Newsletters 38 /
39 Darren Challey Biography Currently GE Application Security Leader: Lead a cross-business AppSec Working Group Establish policies, procedures and best practices Provide company-wide guidance, services and tools Maintain company-wide AppSec metrics program Partner with GE vendors to fix root cause Prior Roles and Businesses: IT Controller and IT SOx Leader (GE Corporate) Six Sigma Black Belt (GE Commercial Finance) Web Master & Program Manager (GE Commercial Finance) Electrical, Mechanical & Nuclear Engineer (GE Energy and GE KAPL) Degrees and Certifications: Certified Information Systems Security Professional (CISSP) Certified Information Systems Auditor (CISA) Edison Engineering Development Program Graduate Master of Engineering, Computer Systems - Rensselaer Polytechnic Inst. Bachelor of Science, Mechanical Engineering Union College 39 /
40 Secure SDLC and GE-EAS Guidance Developer On-boarding Portal Application Security Policy, Requirements, Regulatory and Compliance Guidance Developer Skills Assessment Education Tools CBT 1: Introduction to App Sec CBT 2: In-depth App Sec Training CBT 3: Threats & Countermeasures Threat Modeling Tool Common IDE with Tools Secure Coding Best Secure Deployment Guide Practices Vulnerability remediation guide Tools Training Secure COR Security Analyst Tools Static Code Analysis Dynamic Code Analysis Vulnerability Tracking Vulnerability Testing Tools & Monitoring In process 3 rd Party Assessment; Security Reviews 40 /
41 SW Quality Assurance / Security Convergence Positive Testing Negative Testing Under-perform Application s Desired Functionality Over-perform Functional Bugs Technical Bugs Performance Bugs (Doesn t do what it should) Security Bugs (Does more that it should) 41 /
How to start a software security initiative within your organization: a maturity based and metrics driven approach OWASP
How to start a software security initiative within your organization: a maturity based and metrics driven approach Marco Morana OWASP Lead/ TISO Citigroup OWASP Application Security For E-Government Copyright
White Paper. Guide to PCI Application Security Compliance for Merchants and Service Providers
White Paper Guide to PCI Application Security Compliance for Merchants and Service Providers Contents Overview... 3 I. The PCI DSS Requirements... 3 II. Compliance and Validation Requirements... 4 III.
Reducing Application Vulnerabilities by Security Engineering
Reducing Application Vulnerabilities by Security Engineering - Subash Newton Manager Projects (Non Functional Testing, PT CoE Group) 2008, Cognizant Technology Solutions. All Rights Reserved. The information
Black Box versus White Box: Different App Testing Strategies John B. Dickson, CISSP
Black Box versus White Box: Different App Testing Strategies John B. Dickson, CISSP Learning objectives for today s session Understand different types of application assessments and how they differ Be
Mean Time to Fix (MTTF) IT Risk s Dirty Little Secret Joe Krull, CPP, CISSP, IAM, CISA, A.Inst.ISP, CRISC, CIPP
Mean Time to Fix (MTTF) IT Risk s Dirty Little Secret Joe Krull, CPP, CISSP, IAM, CISA, A.Inst.ISP, CRISC, CIPP Presentation Overview Basic Application Security (AppSec) Fundamentals Risks Associated With
Learning objectives for today s session
Black Box versus White Box: Different App Testing Strategies John B. Dickson, CISSP Learning objectives for today s session Understand what a black box and white box assessment is and how they differ Identify
Promoting Application Security within Federal Government. AppSec DC November 13, 2009. The OWASP Foundation http://www.owasp.org
Promoting Application Security within Federal Government AppSec DC November 13, 2009 Dr. Sarbari Gupta, CISSP, CISA Founder/President Electrosoft [email protected] 703-437-9451 ext 12 The Foundation
Introduction to Web Application Security. Microsoft CSO Roundtable Houston, TX. September 13 th, 2006
Introduction to Web Application Security Microsoft CSO Roundtable Houston, TX September 13 th, 2006 Overview Background What is Application Security and Why Is It Important? Examples Where Do We Go From
Turning the Battleship: How to Build Secure Software in Large Organizations. Dan Cornell May 11 th, 2006
Turning the Battleship: How to Build Secure Software in Large Organizations Dan Cornell May 11 th, 2006 Overview Background and key questions Quick review of web application security The web application
Application Code Development Standards
Application Code Development Standards Overview This document is intended to provide guidance to campus system owners and software developers regarding secure software engineering practices. These standards
Promoting Application Security within Federal Government. AppSec DC November 13, 2009. The OWASP Foundation http://www.owasp.org
Promoting Application Security within Federal Government AppSec DC November 13, 2009 Dr. Sarbari Gupta, CISSP, CISA Founder/President Electrosoft [email protected] 703-437-9451 ext 12 The Foundation
How to Build a Trusted Application. John Dickson, CISSP
How to Build a Trusted Application John Dickson, CISSP Overview What is Application Security? Examples of Potential Vulnerabilities Strategies to Build Secure Apps Questions and Answers Denim Group, Ltd.
How to achieve PCI DSS Compliance with Checkmarx Source Code Analysis
How to achieve PCI DSS Compliance with Checkmarx Source Code Analysis Document Scope This document aims to assist organizations comply with PCI DSS 3 when it comes to Application Security best practices.
OWASP and OWASP Top 10 (2007 Update) OWASP. The OWASP Foundation. Dave Wichers. The OWASP Foundation. OWASP Conferences Chair dave.wichers@owasp.
and Top 10 (2007 Update) Dave Wichers The Foundation Conferences Chair [email protected] COO, Aspect Security [email protected] Copyright 2007 - The Foundation This work is available
DISA's Application Security and Development STIG: How OWASP Can Help You. AppSec DC November 12, 2009. The OWASP Foundation http://www.owasp.
DISA's Application Security and Development STIG: How Can Help You AppSec DC November 12, 2009 Jason Li Senior Application Security Engineer [email protected] The Foundation http://www.owasp.org
WebGoat for testing your Application Security tools
WebGoat for testing your Application Security tools NAISG-DFW February 28 th, 2012 Michael A Ortega, CISSP CEH CISM GCFA Sr Application Security Professional IBM Security Systems 312.523.1538 [email protected]
Network Test Labs (NTL) Software Testing Services for igaming
Network Test Labs (NTL) Software Testing Services for igaming Led by committed, young and dynamic professionals with extensive expertise and experience of independent testing services, Network Test Labs
Application Security 101. A primer on Application Security best practices
Application Security 101 A primer on Application Security best practices Table of Contents Introduction...1 Defining Application Security...1 Managing Risk...2 Weighing AppSec Technology Options...3 Penetration
Using Free Tools To Test Web Application Security
Using Free Tools To Test Web Application Security Speaker Biography Matt Neely, CISSP, CTGA, GCIH, and GCWN Manager of the Profiling Team at SecureState Areas of expertise: wireless, penetration testing,
The Top Web Application Attacks: Are you vulnerable?
QM07 The Top Web Application Attacks: Are you vulnerable? John Burroughs, CISSP Sr Security Architect, Watchfire Solutions [email protected] Agenda Current State of Web Application Security Understanding
Pentests more than just using the proper tools
Pentests more than just using the proper tools Agenda 1. Information Security @ TÜV Rheinland 2. Penetration testing Introduction Evaluation scheme Security Analyses of web applications Internal Security
Software Development: The Next Security Frontier
James E. Molini, CISSP, CSSLP Microsoft Member, (ISC)² Advisory Board of the Americas [email protected] http://www.codeguard.org/blog Software Development: The Next Security Frontier De-perimiterization
Pentests more than just using the proper tools
Pentests more than just using the proper tools Agenda 1. Information Security @ TÜV Rheinland 2. Security testing 3. Penetration testing Introduction Evaluation scheme Security Analyses of web applications
Creating Stronger, Safer, Web Facing Code. JPL IT Security Mary Rivera June 17, 2011
Creating Stronger, Safer, Web Facing Code JPL IT Security Mary Rivera June 17, 2011 Agenda Evolving Threats Operating System Application User Generated Content JPL s Application Security Program Securing
Adobe Systems Incorporated
Adobe Connect 9.2 Page 1 of 8 Adobe Systems Incorporated Adobe Connect 9.2 Hosted Solution June 20 th 2014 Adobe Connect 9.2 Page 2 of 8 Table of Contents Engagement Overview... 3 About Connect 9.2...
Where every interaction matters.
Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper
WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats
WHITE PAPER FortiWeb and the OWASP Top 10 PAGE 2 Introduction The Open Web Application Security project (OWASP) Top Ten provides a powerful awareness document for web application security. The OWASP Top
HP Fortify Application Security Lucas v. Stockhausen PreSales Manager HP Fortify EMEA [email protected] +49 1520 1898430 Enterprise Security
HP Fortify Application Security Lucas v. Stockhausen PreSales Manager HP Fortify EMEA [email protected] +49 1520 1898430 Enterprise Security The problem Cyber attackers are targeting applications
elearning for Secure Application Development
elearning for Secure Application Development Curriculum Application Security Awareness Series 1-2 Secure Software Development Series 2-8 Secure Architectures and Threat Modeling Series 9 Application Security
Effective Software Security Management
Effective Software Security Management choosing the right drivers for applying application security Author: Dharmesh M Mehta [email protected] / [email protected] Table of Contents Abstract... 1
Integrated Threat & Security Management.
Integrated Threat & Security Management. SOLUTION OVERVIEW Vulnerability Assessment for Web Applications Fully Automated Web Crawling and Reporting Minimal Website Training or Learning Required Most Accurate
Passing PCI Compliance How to Address the Application Security Mandates
Passing PCI Compliance How to Address the Application Security Mandates The Payment Card Industry Data Security Standards includes several requirements that mandate security at the application layer. These
Web Engineering Web Application Security Issues
Security Issues Dec 14 2009 Katharina Siorpaes Copyright 2009 STI - INNSBRUCK www.sti-innsbruck.at It is NOT Network Security It is securing: Custom Code that drives a web application Libraries Backend
Enterprise Computing Solutions
Business Intelligence Data Center Cloud Mobility Enterprise Computing Solutions Security Solutions arrow.com Security Solutions Secure the integrity of your systems and data today with the one company
APPLICATION SECURITY: ONE SIZE DOESN T FIT ALL
APPLICATION SECURITY: ONE SIZE DOESN T FIT ALL Charles Henderson Trustwave SpiderLabs Session ID: Session Classification: SPO2-W25 Intermediate AGENDA One size rarely fits all Sizing up an application
Rational AppScan & Ounce Products
IBM Software Group Rational AppScan & Ounce Products Presenters Tony Sisson and Frank Sassano 2007 IBM Corporation IBM Software Group The Alarming Truth CheckFree warns 5 million customers after hack http://infosecurity.us/?p=5168
Developing Secure Software in the Age of Advanced Persistent Threats
Developing Secure Software in the Age of Advanced Persistent Threats ERIC BAIZE EMC Corporation DAVE MARTIN EMC Corporation Session ID: ASEC-201 Session Classification: Intermediate Our Job: Keep our Employer
FINAL DoIT 11.03.2015 - v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES
Purpose: The Department of Information Technology (DoIT) is committed to developing secure applications. DoIT s System Development Methodology (SDM) and Application Development requirements ensure that
State of Web Application Security. Ralph Durkee Durkee Consulting, Inc. Rochester ISSA & OWASP Chapters [email protected]
Ralph Durkee Durkee Consulting, Inc. Rochester ISSA & OWASP Chapters [email protected] Ralph Durkee Founder of Durkee Consulting since 1996 Founder of Rochester OWASP since 2004 President of Rochester ISSA chapter
External Supplier Control Requirements
External Supplier Control s Cyber Security For Suppliers Categorised as Low Cyber Risk 1. Asset Protection and System Configuration Barclays Data and the assets or systems storing or processing it must
Web Application Penetration Testing
Web Application Penetration Testing 2010 2010 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T Intellectual Property. Will Bechtel [email protected]
Six Essential Elements of Web Application Security. Cost Effective Strategies for Defending Your Business
6 Six Essential Elements of Web Application Security Cost Effective Strategies for Defending Your Business An Introduction to Defending Your Business Against Today s Most Common Cyber Attacks When web
WEB SITE SECURITY. Jeff Aliber Verizon Digital Media Services
WEB SITE SECURITY Jeff Aliber Verizon Digital Media Services 1 SECURITY & THE CLOUD The Cloud (Web) o The Cloud is becoming the de-facto way for enterprises to leverage common infrastructure while innovating
Security Testing and Vulnerability Management Process. e-governance
Security Testing and Vulnerability Management Process for e-governance Draft DEPARTMENT OF ELECTRONICS AND INFORMATION TECHNOLOGY Ministry of Communication and Information Technology, Government of India.
Application Security Testing How to find software vulnerabilities before you ship or procure code
Application Security Testing How to find software vulnerabilities before you ship or procure code Anita D Amico, Ph.D. Hassan Radwan 1 Overview Why Care About Application Security? Quality vs Security
Penetration Testing in Romania
Penetration Testing in Romania Adrian Furtunǎ, Ph.D. 11 October 2011 Romanian IT&C Security Forum Agenda About penetration testing Examples Q & A 2 What is penetration testing? Method for evaluating the
IT Security & Compliance. On Time. On Budget. On Demand.
IT Security & Compliance On Time. On Budget. On Demand. IT Security & Compliance Delivered as a Service For businesses today, managing IT security risk and meeting compliance requirements is paramount
White Paper. Automating Your Code Review: Moving to a SaaS Model for Application Security
White Paper Automating Your Code Review: Moving to a SaaS Model for Application Security Contents Overview... 3 Executive Summary... 3 Code Review and Security Analysis Methods... 5 Source Code Review
white SECURITY TESTING WHITE PAPER
white SECURITY TESTING WHITE PAPER Contents: Introduction...3 The Need for Security Testing...4 Security Scorecards...5 Test Approach... 11 Framework... 16 Project Initiation Process... 17 Conclusion...
Integrating Security into the Application Development Process. Jerod Brennen, CISSP CTO & Principal Security Consultant, Jacadis
Integrating Security into the Application Development Process Jerod Brennen, CISSP CTO & Principal Security Consultant, Jacadis Agenda Seek First to Understand Source Code Security AppSec and SQA Analyzing
BUILDING AN OFFENSIVE SECURITY PROGRAM BUILDING AN OFFENSIVE SECURITY PROGRAM
BUILDING AN OFFENSIVE SECURITY PROGRAM Common Gaps in Security Programs Outsourcing highly skilled security resources can be cost prohibitive. Annual assessments don t provide the coverage necessary. Software
Development Processes (Lecture outline)
Development*Process*for*Secure* So2ware Development Processes (Lecture outline) Emphasis on building secure software as opposed to building security software Major methodologies Microsoft's Security Development
ISSECO Syllabus Public Version v1.0
ISSECO Syllabus Public Version v1.0 ISSECO Certified Professional for Secure Software Engineering Date: October 16th, 2009 This document was produced by the ISSECO Working Party Syllabus Introduction to
North Dakota 2013 IT Security Audit Vulnerability Assessment & Penetration Test Project Briefing
North Dakota 2013 IT Security Audit Vulnerability Assessment & Penetration Test Project Briefing Introduction ManTech Project Manager Mark Shaw, Senior Executive Director Cyber Security Solutions Division
Starting your Software Security Assurance Program. May 21, 2015 ITARC, Stockholm, Sweden
Starting your Software Security Assurance Program May 21, 2015 ITARC, Stockholm, Sweden Presenter Max Poliashenko Chief Enterprise Architect Wolters Kluwer, Tax & Accounting Max leads the Enterprise Architecture
Securing Your Web Application against security vulnerabilities. Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group
Securing Your Web Application against security vulnerabilities Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group Agenda Security Landscape Vulnerability Analysis Automated Vulnerability
05.0 Application Development
Number 5.0 Policy Owner Information Security and Technology Policy Application Development Effective 01/01/2014 Last Revision 12/30/2013 Department of Innovation and Technology 5. Application Development
Security Testing. Vulnerability Assessment vs Penetration Testing. Gabriel Mihai Tanase, Director KPMG Romania. 29 October 2014
Security Testing Vulnerability Assessment vs Penetration Testing Gabriel Mihai Tanase, Director KPMG Romania 29 October 2014 Agenda What is? Vulnerability Assessment Penetration Testing Acting as Conclusion
WhiteHat Security White Paper. Top 11 PCI DSS 3.0 Changes That Will Affect Your Application Security Program
WhiteHat Security White Paper Top 11 PCI DSS 3.0 Changes That Will Affect Your Application Security Program October 2015 The Payment Card Industry Data Security Standard (PCI DSS) is a proprietary information
Application Security in the Software Development Life Cycle (SDLC) White Paper
Application Security in the Software Development Life Cycle (SDLC) White Paper Table of Contents Executive Summary... 3 The Rush to Get Applications to Web, Cloud and Mobile... 3 Issues in Software Development...
SAFECode Security Development Lifecycle (SDL)
SAFECode Security Development Lifecycle (SDL) Michael Howard Microsoft Matthew Coles EMC 15th Semi-annual Software Assurance Forum, September 12-16, 2011 Agenda Introduction to SAFECode Security Training
Threat Modeling. Categorizing the nature and severity of system vulnerabilities. John B. Dickson, CISSP
Threat Modeling Categorizing the nature and severity of system vulnerabilities John B. Dickson, CISSP What is Threat Modeling? Structured approach to identifying, quantifying, and addressing threats. Threat
IBM Rational AppScan: Application security and risk management
IBM Software Security November 2011 IBM Rational AppScan: Application security and risk management Identify, prioritize, track and remediate critical security vulnerabilities and compliance demands 2 IBM
Strategic Information Security. Attacking and Defending Web Services
Security PS Strategic Information Security. Attacking and Defending Web Services Presented By: David W. Green, CISSP [email protected] Introduction About Security PS Application Security Assessments
DFW INTERNATIONAL AIRPORT STANDARD OPERATING PROCEDURE (SOP)
Title: Functional Category: Information Technology Services Issuing Department: Information Technology Services Code Number: xx.xxx.xx Effective Date: xx/xx/2014 1.0 PURPOSE 1.1 To appropriately manage
Magento Security and Vulnerabilities. Roman Stepanov
Magento Security and Vulnerabilities Roman Stepanov http://ice.eltrino.com/ Table of contents Introduction Open Web Application Security Project OWASP TOP 10 List Common issues in Magento A1 Injection
A Strategic Approach to Web Application Security
WhiteHat Security White Paper A Strategic Approach to Web Application Security Extending security across the entire software development lifecycle Jerry Hoff Vice President, Static Code Analysis Division
Detecting Web Application Vulnerabilities Using Open Source Means. OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008
Detecting Web Application Vulnerabilities Using Open Source Means OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008 Kostas Papapanagiotou Committee Member OWASP Greek Chapter [email protected]
90% of data breaches are caused by software vulnerabilities.
90% of data breaches are caused by software vulnerabilities. Get the skills you need to build secure software applications Secure Software Development (SSD) www.ce.ucf.edu/ssd Offered in partnership with
Secure Coding in Node.js
Secure Coding in Node.js Advanced Edition Copyright 2015 nvisium LLC 590 Herndon Parkway Suite 120, Herndon VA 20170 571.353.7551 www.nvisium.com 1 Introduction Seth Law VP of Research & Development @
White Paper. Understanding NIST 800 37 FISMA Requirements
White Paper Understanding NIST 800 37 FISMA Requirements Contents Overview... 3 I. The Role of NIST in FISMA Compliance... 3 II. NIST Risk Management Framework for FISMA... 4 III. Application Security
What is Web Security? Motivation
[email protected] http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web
Application Security: What Does it Take to Build and Test a Trusted App? John Dickson, CISSP Denim Group
Application Security: What Does it Take to Build and Test a Trusted App? John Dickson, CISSP Denim Group Overview What is Application Security? Examples of Potential Vulnerabilities Potential Strategies
WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY
WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY www.alliancetechpartners.com WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY More than 70% of all websites have vulnerabilities
Information Security Services
Information Security Services Information Security In 2013, Symantec reported a 62% increase in data breaches over 2012. These data breaches had tremendous impacts on many companies, resulting in intellectual
Five Steps to Achieve Risk-Based Application Security Management Make application security a strategically managed discipline
IBM Security Thought Leadership White Paper Five Steps to Achieve Risk-Based Application Security Management Make application security a strategically managed discipline July 2015 2 Five Steps to Achieve
Rolling out an Effective Application Security Assessment Program. Jason Taylor, CTO [email protected]
Rolling out an Effective Application Security Assessment Program Jason Taylor, CTO [email protected] About Security Innovation Authority in Application Security 10+ years of research and assessment
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities Learning Objectives Name the common categories of vulnerabilities Discuss common system
Columbia University Web Security Standards and Practices. Objective and Scope
Columbia University Web Security Standards and Practices Objective and Scope Effective Date: January 2011 This Web Security Standards and Practices document establishes a baseline of security related requirements
Real World Healthcare Security Exposures. Brian Selfridge, Partner, Meditology Services
Real World Healthcare Security Exposures Brian Selfridge, Partner, Meditology Services 2 Agenda Introduction Background and Industry Context Anatomy of a Pen Test Top 10 Healthcare Security Exposures Lessons
Table of Contents. Page 2/13
Page 1/13 Table of Contents Introduction...3 Top Reasons Firewalls Are Not Enough...3 Extreme Vulnerabilities...3 TD Ameritrade Security Breach...3 OWASP s Top 10 Web Application Security Vulnerabilities
CSUSB Web Application Security Standard CSUSB, Information Security & Emerging Technologies Office
CSUSB, Information Security & Emerging Technologies Office Last Revised: 03/17/2015 Draft REVISION CONTROL Document Title: Author: File Reference: CSUSB Web Application Security Standard Javier Torner
Threat Modeling. Deepak Manohar
Threat Modeling Deepak Manohar Outline Motivation Past Security Approaches Common problems with past security approaches Adversary s perspective Vs Defender s perspective Why defender s perspective? Threat
Excellence Doesn t Need a Certificate. Be an. Believe in You. 2014 AMIGOSEC Consulting Private Limited
Excellence Doesn t Need a Certificate Be an 2014 AMIGOSEC Consulting Private Limited Believe in You Introduction In this age of emerging technologies where IT plays a crucial role in enabling and running
Addressing Cyber Security in Oracle Utilities Applications
Addressing Cyber Security in Oracle Utilities Applications Anthony Shorten Principal Product Manager Oracle Utilities Global Business Unit Sept, 2014 Safe Harbor Statement The following is intended to
Application security testing: Protecting your application and data
E-Book Application security testing: Protecting your application and data Application security testing is critical in ensuring your data and application is safe from security attack. This ebook offers
From the Bottom to the Top: The Evolution of Application Monitoring
From the Bottom to the Top: The Evolution of Application Monitoring Narayan Makaram, CISSP Director, Security Solutions HP/Enterprise Security Business Unit Session ID: SP01-202 Session 2012 Classification:
