Software Security: Services and Products



Similar documents
The New OWASP Testing Guide v4

Acunetix Website Audit. 5 November, Developer Report. Generated by Acunetix WVS Reporter (v8.0 Build )

Detecting and Exploiting XSS with Xenotix XSS Exploit Framework

Excellence Doesn t Need a Certificate. Be an. Believe in You AMIGOSEC Consulting Private Limited

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

Client Side Cross Site Scripting

Adobe Systems Incorporated

HP WebInspect Tutorial

Detecting Web Application Vulnerabilities Using Open Source Means. OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008

Implementation of Web Application Security Solution using Open Source Gaurav Gupta 1, B. K. Murthy 2, P. N. Barwal 3

Common Security Vulnerabilities in Online Payment Systems

How to start a software security initiative within your organization: a maturity based and metrics driven approach OWASP

The Top Web Application Attacks: Are you vulnerable?

ASL IT SECURITY BEGINNERS WEB HACKING AND EXPLOITATION

Web Application Penetration Testing

Reducing Application Vulnerabilities by Security Engineering

Cyber Security 2014 SECURE BANKING SOLUTIONS, LLC

WHITE PAPER FORTIWEB WEB APPLICATION FIREWALL. Ensuring Compliance for PCI DSS 6.5 and 6.6

ASL IT Security Advanced Web Exploitation Kung Fu V2.0

Continuous, proactive cybersecurity.

How to Rob an Online Bank (and get away with it)

Cyber Essentials PLUS. Common Test Specification

Mean Time to Fix (MTTF) IT Risk s Dirty Little Secret Joe Krull, CPP, CISSP, IAM, CISA, A.Inst.ISP, CRISC, CIPP

PASTA Abstract. Process for Attack S imulation & Threat Assessment Abstract. VerSprite, LLC Copyright 2013

Creating Stronger, Safer, Web Facing Code. JPL IT Security Mary Rivera June 17, 2011

InfoSec Academy Application & Secure Code Track

CS 558 Internet Systems and Technologies

Tobias Gondrom (OWASP Global Board Member)

WHITE PAPER. FortiWeb Web Application Firewall Ensuring Compliance for PCI DSS 6.5 and 6.6

The Importance of Patching Non-Microsoft Applications

IT Security Testing Services

Overview of the Penetration Test Implementation and Service. Peter Kanters

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats

Web Application Worms & Browser Insecurity

Managing Web & Application Security with OWASP bringing it all together. Tobias Gondrom (OWASP Project Leader)

IBM Security Strategy

How to break in. Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering

Next-Generation Penetration Testing. Benjamin Mossé, MD, Mossé Security

North Dakota 2013 IT Security Audit Vulnerability Assessment & Penetration Test Project Briefing

elearning for Secure Application Development

Web applications. Web security: web basics. HTTP requests. URLs. GET request. Myrto Arapinis School of Informatics University of Edinburgh

Where every interaction matters.

Performing a Web Application Security Assessment

Secure development and the SDLC. Presented By Jerry

Web Application Security

HTTPParameter Pollution. ChrysostomosDaniel

CREST EXAMINATIONS. CREST (GB) Ltd 2016 All Rights Reserved

LEARNING CURRICULUM SECURITY COMPASS TRAINING 2015 Q3. Copyright Security Compass. 1

Application Security Testing. Erez Metula (CISSP), Founder Application Security Expert

WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY

Secure Web Applications. The front line defense

KASPERSKY FRAUD PREVENTION PLATFORM COVERING ONLINE AND MOBILE BANKING RISKS

Advancements in Botnet Attacks and Malware Distribution

Building & Measuring Security in Web Applications. Fabio Cerullo Cycubix Limited 30 May Belfast

Development Processes (Lecture outline)

2015 Vulnerability Statistics Report

PTSv2 in pills: The Best First for Beginners who want to become Penetration Testers. Self-paced, online, flexible access

OWASP and OWASP Top 10 (2007 Update) OWASP. The OWASP Foundation. Dave Wichers. The OWASP Foundation. OWASP Conferences Chair

An approach to Web Application Penetration Testing. By: Whiskah

Web Application Hacking (Penetration Testing) 5-day Hands-On Course

(WAPT) Web Application Penetration Testing

Application Security Guide For CISOs

CYBERSTRAT IS PART OF GMTL LLP, 26 YORK STREET, LONDON, W1U 6PZ, UNITED KINGDOM

Secure Web Development Teaching Modules 1. Security Testing. 1.1 Security Practices for Software Verification

The new OWASP standard for the Web Application Penetration Testing

Web Application Security

Attack Intelligence Research Center Monthly Threat Report MalWeb Evolution and Predictions

ios Security The Never-Ending Story of Malicious Profiles Adi Sharabani Yair Amit CEO & Co-Founder Skycure CTO & Co-Founder

Threat Intelligence Pty Ltd Specialist Security Training Catalogue

Bug Report. Date: March 19, 2011 Reporter: Chris Jarabek

Software & Supply Chain Assurance: Mitigating Risks Attributable to Exploitable ICT / Software Products and Processes

ESKISP Manage security testing

Web Application Security 101

Professional Penetration Testing Techniques and Vulnerability Assessment ...

CORE Security and the Payment Card Industry Data Security Standard (PCI DSS)

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

How To Integrate Intelligence Based Security Into Your Organisation

Course Descriptions November 2014

Trust Digital Best Practices

Security Intelligence Services. Cybersecurity training.


Integrating Security Testing into Quality Control

Transcription:

Software Security: Services and Products

Minded Security Management & Business Profile Senior Management Business Profile Matteo Meucci CEO and Minded Security SRL co-founder Founded in 2007 in Italy Marco Morana Managing Director and partner UK focusing on software security services Limited Steady Business Growth Giorgio Fedon COO, Technical Director and co- revenues up 40% vs. previous year founder Invested in Minded Security Stefano Di Paola CTO and co-founder UK from 2014 with focus on security products for web security

Minded Security Customers & Global Reach Product and services presence in 17 countries Industry sectors include: E-commerce, Energy Banking Finance Software Telecoms

Minded Security in The News

R&D Security Research on vulnerabilities Disclosed hundreds of vulnerabilities of Internet Explorer, Mozilla, Adobe (UXSS),MySQL. Development of open source tools Developing of tool ad hoc as Flash Testing, DOMInatorPRO Develop new testing techniques HTTP Parameter Pollution, Universal XSS Key Role of Minded Security in OWASP OWASP Italy founder in 2005 OWASP CISO Guide leader OWASP Testing Guide leader from 2006 OWASP Anti Malware leader from 2011 OWASP SAMM contributors from 2010

Client Side Vulnerability Detection Solutions

DOMinator Pro: Securing Next Generation of Web Applications

DOMinator Pro: Securing Next Generation of Web Applications

DOMinator Pro: Securing Next Generation of Web Applications Google Plus One DOM XSS This video demonstrates how to use the DOMinatorPro Fuzzer feature and how to identify a DOM HTML injection vulnerability on a google.com page. DOMinatorPro is able to understand if the Javascript code loaded by the page looks for a particular pattern. This finding was also cited by the Department of Homeland Security in its daily report Google.com DOMXSS Here, a DOM XSS is shown on a Google Plus One button which can lead to external JavaScript execution. This vulnerability was particularly interesting because it was present on every page containing a Google +1 button. DOMinatorPro identifies this vulnerability as URL Redirection and in its description it gives some interesting advice in order to understand if this issue is actually exploitable.

Malware Detection and Fraud Prevention Solutions

AMT Banking Malware Detector: the scenario Non infected customer I would like to know which users are infected by malware to manage the risk I will modify the IBAN and money data Infected customer Infected customers On-line Banking Nowadays the number of infected users that are using on-line banking services is increasing dramatically. On-line Banking Fraud Office needs tools to know in real time which users are infected and could be defrauded using the on-line banking service.

AMT Detection and Fraud Prevention Solution Main Features Uses threat modeling to engineer modules that can be adapted to detect malware attacks based upon modus of operandi Scans the user s browser to detect compromise of its integrity (millions of devices can be scanned without impact) Agent-less that is it is installed on the web server of the online banking site Integrates with existing fraud detection systems used at the bank as well as with partner s fraud detection systems Sends real-time fraud alerts to fraud managers so transactions can be monitored or blocked (detailed risk and attack information)

AMT Banking Malware Detector: the answer Not infected customer I would like a technology to identify malware victims before they will be defrauded I will modify the IBAN and money data Infected customer Infected customers On-line Banking AMT Banking Malware Detector

AMT Banking Malware Detector: agentless Agentless solution: it is not invasive for your users Transparent to the user experience

AMT Control Panel Real time control of user infected Managing of infected clients risk Detailed attack information Daily custom report

Secure Software Engineering 19

Consulting Services Software Security Maturity Assessment This is a high level assessment of the maturity and capability of the organization in software security practices. Minded Security will use the OWASP SAMM standard to conduct the assessment. The goal is to evaluate the current state of the maturity of the organization in conducting software security activities within the SDLC and derive a roadmap that the organization can follow to improve his capabilities in software security. Benefit

Consulting Services Secure Design Minded Security can help creating a secure design process inside your company or support it during the design phase conducting a threat modeling assessment Secure Architecture Minded Security experts can review your architectures analyzing the threats and designing a secure architecture. Secure Coding Guidelines Security Specialists can support your Company to deliver Secure Coding Guidelines to adopt inside the organization. Outsourcing Development Governance Minded Security can support you to develop a Secure Software Assurance process with the aim to define all the criteria and all the steps necessary to guarantee an Assurance of the software that you will buy.

Consulting Services Process for Attack Simulation and Threat Analysis The identification of design flaws in application architecture as well as of countermeasures to detect and protect from targeted and sophisticated cyber-attacks requires businesses to focus on specific threats and attacks rather then on common vulnerabilities. To address this shortcomings of Minded Security Director Marco Morana developed a new process for threat modeling, the Process For Attack Simulation and Threat Analysis (PASTA) that is co-authored by Minded Security director Marco Morana and published in the book Application Threat Modeling by Wiley. The main objective of PASTA is to help organizations to engineer applications and systems that are resilient to targeted cyber attacks such as Distributed Denial of Service (DDoS) and malware automated/botnet based attacks. To help businesses roll out PASTA internally, Minded Security consultants provide the training and an initial remotely managed risk management and threat modeling service.

Training Series Educational Paths For who Introduction to Application Security: threats and defence strategies (1/2 day) Software Security Governance (1 day) Building Security in SDLC (5days) Managers Developers Architects Auditors Testers Business Analyst/ Project manager Process for Attack Simulation and Threat Analysis (2 days) Building Secure Mobile Applications - Android, ios (2 days) Building Secure Software - J2EE,.NET, PHP (2-5 days) Developers Architects JavaScript Security and DOMinatorPro training For Developers or for Testers (2 days) Developers Architects Auditors Testers Secure Code Review (2 days) Developers Architects Auditors Testers Testing Web Applications (5 days) Auditors Testers Application Security for Business Analysts (2days) Business Analysts

Testing Services Secure Code Review Network Penetration Testing Application Penetration Testing Testing Services Flash Security Testing Mobile Security Assessment Web Services Testing

Mobile Security Services Mobile Application Security Assessment Assessment of Mobile Applications for Apple ios, Android, Blackberry and Windows Mobile environments. Review of client and server side software (Secure Code Review). Given the source code of the client and server application (Web Services), we perform a Secure Code Review of the source code. Then we perform a Penetration Test of the Application. PT of the running applications client and server side. Secure Coding Guidelines Building Mobile Secure Software Course Minded Security delivers Secure Coding Guidelines and checklist for all your mobile environments. This training gives to your developers all the knowledge and several practical examples necessary to write secure mobile applications.

Thanks! Minded Security Srl Via Duca D Aosta, 20 50129 Firenze - Italy Mail: matteo.meucci@mindedsecurity.com Minded Security UK Limited One Canada Square Canary Wharf, E14 5AB London - UK Office +44 (0) 203 725 7615 Mobile +44 (0) 7732 234 694 Mail: marco.m.morana@mindedsecurity.com Company Profile: http://bit.ly/mindedprofile Site: http://www.mindedsecurity.com Blog: http://blog.mindedsecurity.com Twitter: http://twitter.com/mindedsecurity YouTube: http://youtube.com/mindedsecurity Magazine: http://bit.ly/mindedmagazine