Application Security Testing. Jesper Kråkhede



Similar documents
Assuring Application Security: Deploying Code that Keeps Data Safe

Application Security Center overview

Accelerating Software Security With HP. Rob Roy Federal CTO HP Software

HP Fortify Application Security Lucas v. Stockhausen PreSales Manager HP Fortify EMEA Enterprise Security

Testing the Security of your Applications

Fortify. Securing Your Entire Software Portfolio

Testing the Security of your Applications

HP Fortify application security

Vulnerabilities: A 360 Degree Approach

Securing Your Web Application against security vulnerabilities. Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group

HP Application Security Center

MAXIMUM PROTECTION, MINIMUM DOWNTIME

Internet security: Shutting the doors to keep hackers off your network

Moderator: Benjamin McGee, CISSP Cyber Security Lead SAIC

Testing Solutions to Tackle Application Security Checkpoint Technologies SQGNE. Jimmie Parson Checkpoint Technologies

HP Fortify Software Security Center

It may look like this all has to do with your password, but that s not the only factor to worry about.

Application Backdoor Assessment. Complete securing of your applications

Enterprise Software Security Strategies

AUTOMATED PENETRATION TESTING PRODUCTS

CYBER & PRIVACY INSURANCE FOR FINANCIAL INSTITUTIONS

September 20, 2013 Senior IT Examiner Gene Lilienthal

How-To Guide: Cyber Security. Content Provided by

Cyber Risks and Insurance Solutions Malaysia, November 2013

Threat Intelligence Pty Ltd Specialist Security Training Catalogue

The Top Web Application Attacks: Are you vulnerable?

Application Security in the Software Development Lifecycle

Application Code Development Standards

Application Security Testing Powered by HPE Fortify on Demand. Managed application security testing available on demand

Threat Modeling. Categorizing the nature and severity of system vulnerabilities. John B. Dickson, CISSP

How To Choose Data Center Colocation Over Cloud Computing

Best Practices - Remediation of Application Vulnerabilities

WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY

for Critical Infrastructure Protection Supervisory Control and Data Acquisition SCADA SECURITY ADVICE FOR CEOs

A HELPING HAND TO PROTECT YOUR REPUTATION

Rational AppScan & Ounce Products

Nine Steps to Smart Security for Small Businesses

Protecting your business interests through intelligent IT security services, consultancy and training

Experience the commitment WHITE PAPER. Information Security Continuous Monitoring. Charting the Right Course. cgi.com 2014 CGI GROUP INC.

CYBERSTRAT IS PART OF GMTL LLP, 26 YORK STREET, LONDON, W1U 6PZ, UNITED KINGDOM

Security & privacy in the cloud; an easy road?

SECURITY CONSIDERATIONS FOR LAW FIRMS

Basic Techniques to prevent Identity Theft and Cybercrime

HTML5 SECURITY. Why Should I Care? Ofer Shezaf, ofr@hp.com Product Manager, Security Solutions HP ArcSight

Understanding Professional Liability Insurance

SMALL BUSINESS PRESENTATION

Is your software secure?

White Paper. Automating Your Code Review: Moving to a SaaS Model for Application Security

Too Critical To Fail Cyber-Attacks on ERP, CRM, SCM and HR Systems

CYBER RISK SECURITY, NETWORK & PRIVACY

Cybercrime: risks, penalties and prevention

The Importance of Cybersecurity Monitoring for Utilities

El costo oculto de las aplicaciones Vulnerables. Faustino Sanchez. WW Security Sales Enablement. IBM Canada

THE HACKERS NEXT TARGET

Learning objectives for today s session

Combatting the Biggest Cyber Threats to the Financial Services Industry. A White Paper Presented by: Lockheed Martin Corporation

Cybersecurity and internal audit. August 15, 2014

Modern IT Security. Jerry Craft Sr. Security & Networking Consultant

Cyber- Attacks: The New Frontier for Fraudsters. Daniel Wanjohi, Technology Security Specialist

Sharpen your document and data security HP Security solutions for imaging and printing

RETHINKING CYBER SECURITY Changing the Business Conversation

Today s Rundown 1. What is Red Teaming? 2. So it s just an awesome pen test? 3. Nuts & Bolts of Red Teaming 4. Why should we care? 5.

WHITE PAPER. Attack the Attacker HOW A MANAGED SECURITY SERVICE IMPROVES EFFICIENCY AND SAVES COST

Seven Practical Steps to Delivering More Secure Software. January 2011

Reducing the Cost and Complexity of Web Vulnerability Management

Product Roadmap. Sushant Rao Principal Product Manager Fortify Software, a HP company

How To Protect Your Data From Being Hacked

future data and infrastructure

Black Box versus White Box: Different App Testing Strategies John B. Dickson, CISSP

London Business Interruption Association Technology new risks and opportunities for the Insurance industry

safe and sound processing online card payments securely

Passing PCI Compliance How to Address the Application Security Mandates

Cyber Insurance Presentation

Cyber Security Management

AUTOMATED PENETRATION TESTING PRODUCTS

Cybersecurity and Hospitals. What Hospital Trustees Need to Know About Managing Cybersecurity Risk and Response

IBM Rational AppScan: enhancing Web application security and regulatory compliance.

Building an Effective Mobile Device Management Strategy for a User-centric Mobile Enterprise

AVOIDING THE BREACH 5 Common Ways Technology Vendors Put Their Healthcare Customer's PHI at Risk

BCS Foundation Certificate in Information Security Management Principles

Web Applications The Hacker s New Target

Insurance Considerations Related to Data Security and Breach in Outsourcing Agreements

National Cybersecurity Awareness Campaign

SMALL BUSINESS PRESENTATION

Cyber Security 2014 SECURE BANKING SOLUTIONS, LLC

SMALL BUSINESS REPUTATION & THE CYBER RISK

Cyber Security for audit committees

Cyber Threats Insights from history and current operations. Prepared by Cognitio May 5, 2015

The Roles of Software Testing & QA in Security Testing

G-Cloud Service Definition. Atos infrastructure Vulnerability Scanning (Outpost24) SaaS

Your Web and Applications

Managing cyber risks with insurance

Data breach, cyber and privacy risks. Brian Wright Lloyd Wright Consultants Ltd

Introduction to Cybersecurity Overview. October 2014

Introduction. Secure Software Development 9/03/2015. Matias starts. Daan takes over. Matias takes over. Who are we? Round of introductions

HOSTING. Managed Security Solutions. Managed Security. ECSC Solutions

90% of health insurers surveyed have had a data breach 3. 72% increase in cyberattacks against healthcare companies occurred between 2013 and

Open Source Security Study How Are Open Source Development Communities Embracing Security Best Practices?

JOB DESCRIPTION CONTRACTUAL POSITION

Who s Doing the Hacking?

Transcription:

Application Security Testing Jesper Kråkhede

AST 2015-10-22 2

Others call it security and try to avoid it I call it passion and dive right into it Jesper Kråkhede Worked as a security consultant for 17 years Into security since I was 8 years old and started to pick locks Director Cybersecurity at Sogeti with a passion for security architecture Work globally with compliance frameworks CISSP and Member of Mensa Blogs at www.crowmoor.se Rules are great for others AST 2015-10-22 3

What challenges are enterprises facing? 1 120% increase in breaches reported in 2014 2 Over 500M identities were exposed via breaches in 2013 3 4 1 in 8 legitimate websites have a critical vulnerability Web-based attacks: 80% of attacks 5 68% increase in mobile application vulnerability disclosures 4

Hacking is Al Capone s new gun Automated attacks Global industry The costs for cyber crime annually is over 400Bn Fraud, extortion, sabotage, industrial espionage, information theft etc. Our adversaries are not 15 year old boys but seasoned and skilled professionals or foreign military Failing to understand who is threatening you will make you underestimate the attack and instead you ll be yet a victim AST 2015-10-22 5

They took control of a network of banks undetected and transferred money when the wanted Modern version of pickpocketing An ATM with malfunction An ATM started giving out money uncontrolled A security company started to investigate the issue They found a set of command and control software installed all over the network of banks Money was transferred between accounts just below the radar All automated detection patterns have thresholds; identifying and staying below them marks the skills of the hacker AST 2015-10-22 6

The hackers spent two months following senior management to learn all processes for money transfer Learning processes Implementing the long con They followed everything senior management did for two months to learn how the banks worked By identifying the processes and thresholds for money transfer they could initiate a long series of money transfers that was not detected By utilising vulnerabilities in many systems it was possible for the hackers to gain control of the systems they needed AST 2015-10-22 7

They had 100% control of support and could block clients from see when money was stolen from the accounts Hacking service desk Supporting the support When money was started to be siphoned away from accounts the customers called the banks The hackers took the calls and blamed a technical glitch and moved money from other accounts into the customers accounts With this total control the banks have lost all control of the money AST 2015-10-22 8

All ATMs were under their control and money was dispensed at their convenience Exploited ATM Money was stolen using hacked ATMs With total access to operate the ATMs, money was dispensed when an accomplish where in place to collect the money from the ATM Millions and millions of where stolen using hacked ATMs Even the video surveillance were under the hackers control making the possibility to identify the culprits slim at best AST 2015-10-22 9

What s the current situation? 56% of organisations have been hacked Attackers are targeting applications rather than networks and hardware 84% of breaches occur at the application layer (Gartner, 2013) By identifying vulnerabilities in applications we are minimising the attack surface and safeguard the information and systems AST is just another layer in the security setup 10

HP 2013 Mobile Application Security Study of over 2,000 mobile application from 600+ companies 11

Sogeti Security Gate Secure ALL your applications before deployment Web, Facebook, Mobile In-house, out-sourced, third-party Security Testing Service Code Test Deploy Contract/Outsource Procure Security Gate 12

How it works Upload Test Review Customer uploads software or dynamic access data directly from his portal Dynamic, static and/or mobile testing Expert review of the results, help remediate and prioritize fixes. 13

Comprehensive and accurate testing Static Analysis Powered by HP Fortify SCA Dynamic Analysis Powered by HP WebInspect Manual Review Enterprise proven technology 100% code coverage Support for 21 development languages Production safe Three testing levels QA or production environments Security expert review Reduce false positives 14

Multiple levels of testing based on application risk Low Medium High Marketing Site Personally identifiable information Business useful Credit card/ SSN information Business critical Basic assessment Standard assessment Premium assessment 15

Outcome: Overview 16

Outcome: Issue information 17

Outcome: Fix recommendation 18

The security tester has a specific set of skills Operating systems Networking Security tools Curiosity Programming Scripting Databases A security tester needs a subset of the skills a security architect needs 19

Want to become a security tester or specialist? Curiosity and a out-of-the-box thinking is mandatory 20

But what if I don t bother about security testing? You will be found! You will be hacked! You will lose! Today it only takes 10 seconds before a server is found on internet 21

Q & A Got any mor-r-r-e questions? Contact information: Jesper Kråkhede jesper.krakhede@sogeti.se +46 725 27 65 87 Read more at www.crowmoor.se AST 2015-10-22 22