SlideShare a Scribd company logo
1 of 34
Failing and Failing
fast in AppDev
How do we keep up in AppSec?
Oz Deally- Vice President,
Cybersecurity Practice Lead: Capgemini
Gopal Padinjaruveetil –
Cybersecurity Thought leader and Strategist: Capgemini
Preys and Predators – The natural world is a hostile place
Human evilness cannot be eliminated
4
The only difference:
humans do bad
things not for
survival, but
pleasure and other
unknown reasons
We are tired of catching up.. We need resilience
5
A fever is a symptom. There's an underlying disease that causes it. Giving you a fever (sitting in a sauna)
doesn't make you sick, and getting rid of the fever (in a cold bath, for example) doesn't always get rid of the
illness…
Spending time and money gaming symptoms and effects is common and urgent, but it's often true that you'd
be better off focusing on the disease (the cause) instead.
– Seth Godin
Security vulnerability is a symptom,
The root cause is always something else
Technology growing at an exponential rate
If technology is growing at exponential rate and if we do nothing, the security threats too would rise exponentially..
6
263 = 18,446,744,073,709,551,615
IPV4= 4 Billion devices(size of postage stamp)
IPV6 = 340 Trillion Trillion Trillion (Undecilion) devices (Size of
Solar system)
50 billion Connected Devices by 2020
9.9 Trillion market Value
Over 80 trillion email spam messages a year
Connected Cars, Connected cities, Connected
Devices 2025?
Connected Bodies (BYBN ) 2035?
Finally Singularity* in 2045?
The Future of Application Security, Let us look at some Facts
7
In the future, the Internet of Things is likely to mold our virtual and
physical worlds together in ways that is difficult to comprehend.
– There will be 50 Billion Connected Devices by 2020
– 92% of Current IOT Devices are is Vulnerable*
– 80% of the applications are Vulnerable and 60% of them critical
vulnerabilities
– That means if we don’t change, in 2020 we will have 36.8
Vulnerable devices
As the physical objects in our everyday lives become more connected
and as they start to increasingly detect and share observations about
us, they also could become the bridge to facilitate attacks on other
systems and other physical objects that are interconnected, directly
creating risks to personal safety not only of an individual but also the
community, regions and even countries.
Agile Methodolgy and Secure Development Lifecycle
Are we ready to open our Kimono?
8
– “Technology vendors will open their own kimonos. Driven by new types of threats, CISOs will
continue to increase oversight of IT vendor risk management in 2016.
– This will cause a reaction on the supply side as leading vendors trumpet their own internal
cyber supply chain management and secure software development best practices as a way
of differentiating themselves from more lackadaisical competitors.”
– 80% of breaches occur at the application layer, with more than 60% of applications having
serious flaws
– Rapid release of new applications leaves many organizations feeling there is not enough
time to spend on security,
– Agile does not bend to Security, so you need to bend Security to fit Agile ?.
– Fundamental principle in Agile Self-disciplined Teams and Self Organizing Teams.
– Self-Organization is in the DNA of an organization..
– The organization provides the environment for self-organization
– How many organizations are a crucible for self-organization today?
A real lesson from a kids fantasy tale
9
Now, here, you see, it takes all the running you
can do, to keep in the same place. If you want to
get somewhere else, you must run at least twice
as fast as that!
- The Red Queen, to Alice, in Lewis Carroll’s
Through the Looking Glass
The adversary is constantly advancing its capabilities..
Can we overtake them at the current pace?
“Unless we change our direction, we are likely to end up where we are
headed” – unknown
10
Secure Coding (Eliminating Coding Flaws)
Secure by Design (Eliminating Design Flaws)
Secure Configuration (Eliminating Configuration Flaws)
Mutate: Behavior Modification in Secure SDLC
Application Security and SDLC
11
1
4
2
3
Secure By Design
Eliminating Design Flaws
12
The natural world is a good example of an Intelligent Design
for Security
13
The Central Nervous system
The Blood Brain Barrier
The Immune system
The Camouflage
The Reflex Action
The Adrenaline
Many More..
Survival of the fittest (Resilience) requires design as a
"way of thinking”
“You can fix it on the drawing board with an eraser or you can fix it on the
site with a sledgehammer" – Frank Lloyd Wright
14
Placeholder for title
15
Sustain Secure
State
Remediation of
Non Compliance
Verification
&
Validation
Secure
Configuration
Secure Coding
Secure
Design (Threat
Modeling)
Technical
Security
Standards,
Procedure,
Specifications
Enterprise
Security
and
Privacy Policies,
Security
Principles
Plan, Design and
Architecture
Develop and
Test
Maintain and
Run
What Is Threat Modeling?
16
– Threat modeling is an engineering technique you can use to help you
identify security objectives threats, attacks, vulnerabilities, and
countermeasures in the context of your application scenario. The
threat modeling activity helps you to:
– Threat modeling is performed to identify when and where more
effort should be applied. There are many possible vulnerabilities,
threats, and exploits; it is unlikely that your application will
encounter all of them.
– It is also unlikely that your company would need to address all of
them. Threat modeling helps you identify where your organization
needs to apply effort.
Why Do Threat Modeling
17
Balancing Business Value with Business Risk
– Risk Appetite
– Risk Tolerance
Secure by Design and Not Chance
– Secure by design at design time
– Secure by design at Run Time
Adhere to fundamental principles of security
– Support the Business
– Defend the Business
– Promote responsible security behavior
Key Questions we ask in Threat Modeling
18
– Where does your system live?
– What are you building ?
– What do you have to protect?
– Who are your users?
– Who are your adversaries?
– What can go wrong ?(mis-use cases)
– What are your weak points?
– What can you do to mitigate the threats?
Key Concepts in Threat Modeling
19
– Risk
– Trust Boundary
– Attack Trees
– Identifying Threats(STRIDE Model)
– Attack Surface
– Attack Vectors
– Risk Mitigation Strategies
– Rating Risk with (DREAD)
– Countermeasures
Guidelines for Threat Modeling
20
Concept Description
Modeling to reduce risk Threat modeling helps you identify where effort needs to be applied.
Incremental rendering
Threat modeling is iterative. You should not be too concerned about missing details in any single
iteration productive.
Context-precision
Context-precision provides relevancy. You need to look at application use cases and roles to truly
vulnerabilities.
Boundaries
Establishing boundaries helps you to define constraints and goals. Boundaries help you Identify
happen, what needs to happen, and what is nice to happen.
Entry and exit criteria
By defining entry and exit criteria, you establish tests for success so you know when your threat
enough) and to ensure you spend the right amount of time on the activity.
Pattern-based information model
By using a pattern-based information model, you can identify the patterns of repeatable
them into categories.
Secure Coding
Eliminating Coding Flaws
21
Automate, Automate, Automate
22
– OWASP
– Define Coding Standards
– SANS 25 Dangerous
Programming Errors
– Use Design Patterns when possible
– Reuse Secure Components
(SBB, TBB)
– Fail Fast, Fail Early
Secure Configuration
Eliminating Configuration Flaws
23
Adopt an Industry Standard Secure Configuration
24
Ensure Baseline is followed
 US DoD Security Technical Implementation Guides (STIGs) for
Databases http://iase.disa.mil/stigs/Pages/index.aspx
 CIS Bench Marks
https://benchmarks.cisecurity.org/
Adopt a Baseline
Maintain the secure baseline
Evolutionary Design
Embraces the fact of an evolving system understanding, and helps system’s design evolve
25
Evolving and adapting through Mutation the only way to survive
in a hostile world
Op
Evolutionary Design
Embraces the fact of an evolving system understanding, and helps system’s design evolve
26
Evolving and adapting through Mutation the only way to survive
in a hostile world
Op
Evolutionary Design
Embraces the fact of an evolving system understanding, and helps system’s design evolve
27
Evolving and adapting through Mutation the only way to survive
in a hostile world
Op
Mutate: Human Behavior Changes in SDLC
Optional subtitle
28
Change is inevitable.. Adaptation is Optional
29
Policy and Procedure without Enforcement is Ineffective
Does the compliance Program have the teeth? Do they have visibility into the policy violations ?
30
Enforcement Without Teeth Will Lead To Ineffective Compliance or No
Compliance
Are there real implications for policy violations (monetary, disciplinary) ?
31
TSA and Zero Tolerance:
32
– It is possible to build
application security program
with
Zero Tolerance
– Requires a
Cultural Change
– Requires strong management
support
– Behavior Change takes time
– Don’t expect
overnight change
– But it can be done
McNamara Fallacy and Predictive Analytics
You can not manage what you can not measure
33
Define smart KPI’s for your application security program
including human behavior metrics
Capgemini’s Industrial Application Security Testing Capacity
Powered by HPE
34
The Capgemini performs technical and
administrative platform management
HPE provides the tool and help
Sogeti scale up
The clients upload their applications
and URL,
download their reports
Capgemini auditors produce the reports
based on the
scan results
Prospects can try the platform and watch
assessments results
Capgemini Manages the portal and support
the client
Static and dynamic
scanning Hosting
client portals
Static Dynamic
Get more information
35
– Supporting text here
– Supporting text here
– Supporting text here
– Supporting text here
– Supporting text here
– Supporting text here
Text here
Attend these sessions: Visit these demos: Follow us on Social Media:
Where do they go after the show?
Add that here.
Thank You
Oz Deally: oz.deally@Capgemini.com
Gopal Padinjaruveetil: gopal.padinjaruveetil@capgemini.com
36

More Related Content

What's hot

Security and Policing event presentation by Steve lamb from hewlett packard e...
Security and Policing event presentation by Steve lamb from hewlett packard e...Security and Policing event presentation by Steve lamb from hewlett packard e...
Security and Policing event presentation by Steve lamb from hewlett packard e...
Steve Lamb
 
Cloud in the Boardroom
Cloud in the BoardroomCloud in the Boardroom
Cloud in the Boardroom
Accenture Operations
 

What's hot (20)

Capgemini Insurance Connect : Subscription based services for claims , policy...
Capgemini Insurance Connect : Subscription based services for claims , policy...Capgemini Insurance Connect : Subscription based services for claims , policy...
Capgemini Insurance Connect : Subscription based services for claims , policy...
 
Security Posture Management Enters the Cloud
Security Posture Management Enters the CloudSecurity Posture Management Enters the Cloud
Security Posture Management Enters the Cloud
 
Security and Policing event presentation by Steve lamb from hewlett packard e...
Security and Policing event presentation by Steve lamb from hewlett packard e...Security and Policing event presentation by Steve lamb from hewlett packard e...
Security and Policing event presentation by Steve lamb from hewlett packard e...
 
The New Energy Consumer: What Promises Do Blockchain Technologies Offer Energ...
The New Energy Consumer: What Promises Do Blockchain Technologies Offer Energ...The New Energy Consumer: What Promises Do Blockchain Technologies Offer Energ...
The New Energy Consumer: What Promises Do Blockchain Technologies Offer Energ...
 
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal
Continuous Cyber Attacks: Engaging Business Leaders for the New NormalContinuous Cyber Attacks: Engaging Business Leaders for the New Normal
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal
 
Technology Factor: Accelerating Your Journey to As a Service
Technology Factor: Accelerating Your Journey to As a ServiceTechnology Factor: Accelerating Your Journey to As a Service
Technology Factor: Accelerating Your Journey to As a Service
 
Cloud in the Boardroom
Cloud in the BoardroomCloud in the Boardroom
Cloud in the Boardroom
 
Swedbank's journey to becoming the bank of the future
Swedbank's journey to becoming the bank of the futureSwedbank's journey to becoming the bank of the future
Swedbank's journey to becoming the bank of the future
 
Harnessing the Power of Entrepreneurs to Open Innovation
Harnessing the Power of Entrepreneurs to Open InnovationHarnessing the Power of Entrepreneurs to Open Innovation
Harnessing the Power of Entrepreneurs to Open Innovation
 
Mature Field Redevelopments: How to Stay Relevant for the Foreseeable Future
Mature Field Redevelopments: How to Stay Relevant for the Foreseeable FutureMature Field Redevelopments: How to Stay Relevant for the Foreseeable Future
Mature Field Redevelopments: How to Stay Relevant for the Foreseeable Future
 
Asset Hub - Asset Data Management in Infrastructure-Rich Organizations
Asset Hub - Asset Data Management in Infrastructure-Rich OrganizationsAsset Hub - Asset Data Management in Infrastructure-Rich Organizations
Asset Hub - Asset Data Management in Infrastructure-Rich Organizations
 
Digital Transformation through Product and Service Innovation - Session Spons...
Digital Transformation through Product and Service Innovation - Session Spons...Digital Transformation through Product and Service Innovation - Session Spons...
Digital Transformation through Product and Service Innovation - Session Spons...
 
Oracle Big Data Action Plan for Finance Professionals
Oracle Big Data Action Plan for Finance ProfessionalsOracle Big Data Action Plan for Finance Professionals
Oracle Big Data Action Plan for Finance Professionals
 
Technology Factor: Accelerating Your Journey to As a Service
Technology Factor: Accelerating Your Journey to As a ServiceTechnology Factor: Accelerating Your Journey to As a Service
Technology Factor: Accelerating Your Journey to As a Service
 
Accenture Cloud Platform: Control, Manage and Govern the Enterprise Cloud
Accenture Cloud Platform: Control, Manage and Govern the Enterprise CloudAccenture Cloud Platform: Control, Manage and Govern the Enterprise Cloud
Accenture Cloud Platform: Control, Manage and Govern the Enterprise Cloud
 
Jawwy: How a Saudi Digital Venture is Rewriting the Telecom Rulebook
Jawwy: How a Saudi Digital Venture is Rewriting the Telecom RulebookJawwy: How a Saudi Digital Venture is Rewriting the Telecom Rulebook
Jawwy: How a Saudi Digital Venture is Rewriting the Telecom Rulebook
 
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
 
Modern Finance at Microsoft US
Modern Finance at Microsoft USModern Finance at Microsoft US
Modern Finance at Microsoft US
 
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
 
Intelligent Infrastructures: Unlocking the Digital Business
Intelligent Infrastructures: Unlocking the Digital BusinessIntelligent Infrastructures: Unlocking the Digital Business
Intelligent Infrastructures: Unlocking the Digital Business
 

Viewers also liked

WordPress Page Builders for Non-Developers (Create Visual Layouts Without Code)
WordPress Page Builders for Non-Developers (Create Visual Layouts Without Code)WordPress Page Builders for Non-Developers (Create Visual Layouts Without Code)
WordPress Page Builders for Non-Developers (Create Visual Layouts Without Code)
Geoff Myers
 
Bite sized 9: A Fruit of the spirit- Gentleness
Bite sized 9: A Fruit of the spirit- GentlenessBite sized 9: A Fruit of the spirit- Gentleness
Bite sized 9: A Fruit of the spirit- Gentleness
MyWonderStudio
 

Viewers also liked (20)

Recuperación final del grado 9
Recuperación final del grado 9Recuperación final del grado 9
Recuperación final del grado 9
 
Taller 6
Taller 6Taller 6
Taller 6
 
Evaluacion 11
Evaluacion 11Evaluacion 11
Evaluacion 11
 
Pga 03-04 r03 - vi periodo 8
Pga 03-04 r03 - vi periodo 8Pga 03-04 r03 - vi periodo 8
Pga 03-04 r03 - vi periodo 8
 
JSLINK - Retours d'expériences
JSLINK - Retours d'expériencesJSLINK - Retours d'expériences
JSLINK - Retours d'expériences
 
Guinness
GuinnessGuinness
Guinness
 
resume
resume resume
resume
 
Carnet de voyage Degeyter fi al andalus
Carnet de voyage Degeyter fi al andalusCarnet de voyage Degeyter fi al andalus
Carnet de voyage Degeyter fi al andalus
 
Phân tích print ads & tvc nhóm 10
Phân tích print ads & tvc   nhóm 10Phân tích print ads & tvc   nhóm 10
Phân tích print ads & tvc nhóm 10
 
Cryptography With PHP
Cryptography With PHPCryptography With PHP
Cryptography With PHP
 
WordPress Page Builders for Non-Developers (Create Visual Layouts Without Code)
WordPress Page Builders for Non-Developers (Create Visual Layouts Without Code)WordPress Page Builders for Non-Developers (Create Visual Layouts Without Code)
WordPress Page Builders for Non-Developers (Create Visual Layouts Without Code)
 
Cpa ex tt_landings_290617
Cpa ex tt_landings_290617Cpa ex tt_landings_290617
Cpa ex tt_landings_290617
 
Microservices with SenecaJS (part 2)
Microservices with SenecaJS (part 2)Microservices with SenecaJS (part 2)
Microservices with SenecaJS (part 2)
 
Promise of Push (HTTP/2 Web Performance)
Promise of Push (HTTP/2 Web Performance)Promise of Push (HTTP/2 Web Performance)
Promise of Push (HTTP/2 Web Performance)
 
Acta Nº 24
Acta Nº 24Acta Nº 24
Acta Nº 24
 
Certificados Locutor Acta 17
Certificados Locutor Acta 17Certificados Locutor Acta 17
Certificados Locutor Acta 17
 
Certificados Locutor Acta 21
Certificados Locutor Acta 21Certificados Locutor Acta 21
Certificados Locutor Acta 21
 
Permulaan Matematika Deduktif
Permulaan Matematika DeduktifPermulaan Matematika Deduktif
Permulaan Matematika Deduktif
 
Announcing Amazon Lex - January 2017 AWS Online Tech Talks
Announcing Amazon Lex - January 2017 AWS Online Tech TalksAnnouncing Amazon Lex - January 2017 AWS Online Tech Talks
Announcing Amazon Lex - January 2017 AWS Online Tech Talks
 
Bite sized 9: A Fruit of the spirit- Gentleness
Bite sized 9: A Fruit of the spirit- GentlenessBite sized 9: A Fruit of the spirit- Gentleness
Bite sized 9: A Fruit of the spirit- Gentleness
 

Similar to Failing and Failing Fast in AppDev – How Do We Keep up in AppSec?

Slides to the online event "Creating an effective cybersecurity strategy" by ...
Slides to the online event "Creating an effective cybersecurity strategy" by ...Slides to the online event "Creating an effective cybersecurity strategy" by ...
Slides to the online event "Creating an effective cybersecurity strategy" by ...
Berezha Security Group
 
CIA Trifecta ISACA Boise 2016 Watson
CIA Trifecta ISACA Boise 2016 WatsonCIA Trifecta ISACA Boise 2016 Watson
CIA Trifecta ISACA Boise 2016 Watson
Patricia M Watson
 

Similar to Failing and Failing Fast in AppDev – How Do We Keep up in AppSec? (20)

Cyber-Security Threats: Why We are Losing the Battle (and Probably Don't Even...
Cyber-Security Threats: Why We are Losing the Battle (and Probably Don't Even...Cyber-Security Threats: Why We are Losing the Battle (and Probably Don't Even...
Cyber-Security Threats: Why We are Losing the Battle (and Probably Don't Even...
 
Slides to the online event "Creating an effective cybersecurity strategy" by ...
Slides to the online event "Creating an effective cybersecurity strategy" by ...Slides to the online event "Creating an effective cybersecurity strategy" by ...
Slides to the online event "Creating an effective cybersecurity strategy" by ...
 
Inconvenient Truth(s) - On Application Security (from 2007)
Inconvenient Truth(s) - On Application Security (from 2007)Inconvenient Truth(s) - On Application Security (from 2007)
Inconvenient Truth(s) - On Application Security (from 2007)
 
Bad Advice, Unintended Consequences, and Broken Paradigms: Think & Act Di...
Bad Advice, Unintended Consequences, and Broken Paradigms: Think & Act Di...Bad Advice, Unintended Consequences, and Broken Paradigms: Think & Act Di...
Bad Advice, Unintended Consequences, and Broken Paradigms: Think & Act Di...
 
Moving beyond Vulnerability Testing
Moving beyond Vulnerability TestingMoving beyond Vulnerability Testing
Moving beyond Vulnerability Testing
 
Jack Whitsitt - Yours, Anecdotally
Jack Whitsitt - Yours, AnecdotallyJack Whitsitt - Yours, Anecdotally
Jack Whitsitt - Yours, Anecdotally
 
Avoiding The Seven Deadly Sins of IT
Avoiding The Seven Deadly Sins of ITAvoiding The Seven Deadly Sins of IT
Avoiding The Seven Deadly Sins of IT
 
Man and Machine -- Forming a Perfect Union to Mature Security Programs -- Key...
Man and Machine -- Forming a Perfect Union to Mature Security Programs -- Key...Man and Machine -- Forming a Perfect Union to Mature Security Programs -- Key...
Man and Machine -- Forming a Perfect Union to Mature Security Programs -- Key...
 
OSB50: Operational Security: State of the Union
OSB50: Operational Security: State of the UnionOSB50: Operational Security: State of the Union
OSB50: Operational Security: State of the Union
 
A recommendation for software development responses for future
A recommendation for software development responses for futureA recommendation for software development responses for future
A recommendation for software development responses for future
 
Navigating the 12 Risks of Artificial Intelligence - oragetechnologies .pdf
Navigating the 12 Risks of Artificial Intelligence - oragetechnologies .pdfNavigating the 12 Risks of Artificial Intelligence - oragetechnologies .pdf
Navigating the 12 Risks of Artificial Intelligence - oragetechnologies .pdf
 
Yours Anecdotally: Developing a Cybersecurity Problem Space
Yours Anecdotally: Developing a Cybersecurity Problem SpaceYours Anecdotally: Developing a Cybersecurity Problem Space
Yours Anecdotally: Developing a Cybersecurity Problem Space
 
Web security – application security roads to software security nirvana iisf...
Web security – application security roads to software security nirvana   iisf...Web security – application security roads to software security nirvana   iisf...
Web security – application security roads to software security nirvana iisf...
 
The CISO Problems Risk Compliance Management in a Software Development 030420...
The CISO Problems Risk Compliance Management in a Software Development 030420...The CISO Problems Risk Compliance Management in a Software Development 030420...
The CISO Problems Risk Compliance Management in a Software Development 030420...
 
Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Differ...
Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Differ...Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Differ...
Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Differ...
 
Cybrary's navigating a security wasteland
Cybrary's navigating a security wasteland Cybrary's navigating a security wasteland
Cybrary's navigating a security wasteland
 
Staying Ahead in the Cybersecurity Game: What Matters Now
Staying Ahead in the Cybersecurity Game: What Matters NowStaying Ahead in the Cybersecurity Game: What Matters Now
Staying Ahead in the Cybersecurity Game: What Matters Now
 
CIA Trifecta ISACA Boise 2016 Watson
CIA Trifecta ISACA Boise 2016 WatsonCIA Trifecta ISACA Boise 2016 Watson
CIA Trifecta ISACA Boise 2016 Watson
 
What i learned at issa international summit 2019
What i learned at issa international summit 2019What i learned at issa international summit 2019
What i learned at issa international summit 2019
 
Uncertainty, Risk, and Information Value in Software Requirements and Archite...
Uncertainty, Risk, and Information Value in Software Requirements and Archite...Uncertainty, Risk, and Information Value in Software Requirements and Archite...
Uncertainty, Risk, and Information Value in Software Requirements and Archite...
 

More from Capgemini

Commercial Banking Trends book 2022
Commercial Banking Trends book 2022Commercial Banking Trends book 2022
Commercial Banking Trends book 2022
Capgemini
 
Top Trends in Payments 2022
Top Trends in Payments 2022Top Trends in Payments 2022
Top Trends in Payments 2022
Capgemini
 
Top Trends in Wealth Management 2022
Top Trends in Wealth Management 2022Top Trends in Wealth Management 2022
Top Trends in Wealth Management 2022
Capgemini
 
Retail Banking Trends book 2022
Retail Banking Trends book 2022Retail Banking Trends book 2022
Retail Banking Trends book 2022
Capgemini
 
Top Trends in Commercial Banking: 2021
Top Trends in Commercial Banking: 2021Top Trends in Commercial Banking: 2021
Top Trends in Commercial Banking: 2021
Capgemini
 
Top Trends in Retail Banking: 2021
Top Trends in Retail Banking: 2021Top Trends in Retail Banking: 2021
Top Trends in Retail Banking: 2021
Capgemini
 
Top Trends in Retail Banking: 2020
Top Trends in Retail Banking: 2020Top Trends in Retail Banking: 2020
Top Trends in Retail Banking: 2020
Capgemini
 

More from Capgemini (20)

Top Healthcare Trends 2022
Top Healthcare Trends 2022Top Healthcare Trends 2022
Top Healthcare Trends 2022
 
Top P&C Insurance Trends 2022
Top P&C Insurance Trends 2022Top P&C Insurance Trends 2022
Top P&C Insurance Trends 2022
 
Commercial Banking Trends book 2022
Commercial Banking Trends book 2022Commercial Banking Trends book 2022
Commercial Banking Trends book 2022
 
Top Trends in Payments 2022
Top Trends in Payments 2022Top Trends in Payments 2022
Top Trends in Payments 2022
 
Top Trends in Wealth Management 2022
Top Trends in Wealth Management 2022Top Trends in Wealth Management 2022
Top Trends in Wealth Management 2022
 
Retail Banking Trends book 2022
Retail Banking Trends book 2022Retail Banking Trends book 2022
Retail Banking Trends book 2022
 
Top Life Insurance Trends 2022
Top Life Insurance Trends 2022Top Life Insurance Trends 2022
Top Life Insurance Trends 2022
 
キャップジェミニ、あなたの『RISE WITH SAP』のパートナーです
キャップジェミニ、あなたの『RISE WITH SAP』のパートナーですキャップジェミニ、あなたの『RISE WITH SAP』のパートナーです
キャップジェミニ、あなたの『RISE WITH SAP』のパートナーです
 
Property & Casualty Insurance Top Trends 2021
Property & Casualty Insurance Top Trends 2021Property & Casualty Insurance Top Trends 2021
Property & Casualty Insurance Top Trends 2021
 
Life Insurance Top Trends 2021
Life Insurance Top Trends 2021Life Insurance Top Trends 2021
Life Insurance Top Trends 2021
 
Top Trends in Commercial Banking: 2021
Top Trends in Commercial Banking: 2021Top Trends in Commercial Banking: 2021
Top Trends in Commercial Banking: 2021
 
Top Trends in Wealth Management: 2021
Top Trends in Wealth Management: 2021Top Trends in Wealth Management: 2021
Top Trends in Wealth Management: 2021
 
Top Trends in Payments: 2021
Top Trends in Payments: 2021Top Trends in Payments: 2021
Top Trends in Payments: 2021
 
Health Insurance Top Trends 2021
Health Insurance Top Trends 2021Health Insurance Top Trends 2021
Health Insurance Top Trends 2021
 
Top Trends in Retail Banking: 2021
Top Trends in Retail Banking: 2021Top Trends in Retail Banking: 2021
Top Trends in Retail Banking: 2021
 
Capgemini’s Connected Autonomous Planning
Capgemini’s Connected Autonomous PlanningCapgemini’s Connected Autonomous Planning
Capgemini’s Connected Autonomous Planning
 
Top Trends in Retail Banking: 2020
Top Trends in Retail Banking: 2020Top Trends in Retail Banking: 2020
Top Trends in Retail Banking: 2020
 
Top Trends in Life Insurance: 2020
Top Trends in Life Insurance: 2020Top Trends in Life Insurance: 2020
Top Trends in Life Insurance: 2020
 
Top Trends in Health Insurance: 2020
Top Trends in Health Insurance: 2020Top Trends in Health Insurance: 2020
Top Trends in Health Insurance: 2020
 
Top Trends in Payments: 2020
Top Trends in Payments: 2020Top Trends in Payments: 2020
Top Trends in Payments: 2020
 

Recently uploaded

Recently uploaded (20)

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 

Failing and Failing Fast in AppDev – How Do We Keep up in AppSec?

  • 1. Failing and Failing fast in AppDev How do we keep up in AppSec? Oz Deally- Vice President, Cybersecurity Practice Lead: Capgemini Gopal Padinjaruveetil – Cybersecurity Thought leader and Strategist: Capgemini
  • 2. Preys and Predators – The natural world is a hostile place Human evilness cannot be eliminated 4 The only difference: humans do bad things not for survival, but pleasure and other unknown reasons
  • 3. We are tired of catching up.. We need resilience 5 A fever is a symptom. There's an underlying disease that causes it. Giving you a fever (sitting in a sauna) doesn't make you sick, and getting rid of the fever (in a cold bath, for example) doesn't always get rid of the illness… Spending time and money gaming symptoms and effects is common and urgent, but it's often true that you'd be better off focusing on the disease (the cause) instead. – Seth Godin Security vulnerability is a symptom, The root cause is always something else
  • 4. Technology growing at an exponential rate If technology is growing at exponential rate and if we do nothing, the security threats too would rise exponentially.. 6 263 = 18,446,744,073,709,551,615 IPV4= 4 Billion devices(size of postage stamp) IPV6 = 340 Trillion Trillion Trillion (Undecilion) devices (Size of Solar system) 50 billion Connected Devices by 2020 9.9 Trillion market Value Over 80 trillion email spam messages a year Connected Cars, Connected cities, Connected Devices 2025? Connected Bodies (BYBN ) 2035? Finally Singularity* in 2045?
  • 5. The Future of Application Security, Let us look at some Facts 7 In the future, the Internet of Things is likely to mold our virtual and physical worlds together in ways that is difficult to comprehend. – There will be 50 Billion Connected Devices by 2020 – 92% of Current IOT Devices are is Vulnerable* – 80% of the applications are Vulnerable and 60% of them critical vulnerabilities – That means if we don’t change, in 2020 we will have 36.8 Vulnerable devices As the physical objects in our everyday lives become more connected and as they start to increasingly detect and share observations about us, they also could become the bridge to facilitate attacks on other systems and other physical objects that are interconnected, directly creating risks to personal safety not only of an individual but also the community, regions and even countries.
  • 6. Agile Methodolgy and Secure Development Lifecycle Are we ready to open our Kimono? 8 – “Technology vendors will open their own kimonos. Driven by new types of threats, CISOs will continue to increase oversight of IT vendor risk management in 2016. – This will cause a reaction on the supply side as leading vendors trumpet their own internal cyber supply chain management and secure software development best practices as a way of differentiating themselves from more lackadaisical competitors.” – 80% of breaches occur at the application layer, with more than 60% of applications having serious flaws – Rapid release of new applications leaves many organizations feeling there is not enough time to spend on security, – Agile does not bend to Security, so you need to bend Security to fit Agile ?. – Fundamental principle in Agile Self-disciplined Teams and Self Organizing Teams. – Self-Organization is in the DNA of an organization.. – The organization provides the environment for self-organization – How many organizations are a crucible for self-organization today?
  • 7. A real lesson from a kids fantasy tale 9 Now, here, you see, it takes all the running you can do, to keep in the same place. If you want to get somewhere else, you must run at least twice as fast as that! - The Red Queen, to Alice, in Lewis Carroll’s Through the Looking Glass The adversary is constantly advancing its capabilities.. Can we overtake them at the current pace?
  • 8. “Unless we change our direction, we are likely to end up where we are headed” – unknown 10
  • 9. Secure Coding (Eliminating Coding Flaws) Secure by Design (Eliminating Design Flaws) Secure Configuration (Eliminating Configuration Flaws) Mutate: Behavior Modification in Secure SDLC Application Security and SDLC 11 1 4 2 3
  • 10. Secure By Design Eliminating Design Flaws 12
  • 11. The natural world is a good example of an Intelligent Design for Security 13 The Central Nervous system The Blood Brain Barrier The Immune system The Camouflage The Reflex Action The Adrenaline Many More.. Survival of the fittest (Resilience) requires design as a "way of thinking”
  • 12. “You can fix it on the drawing board with an eraser or you can fix it on the site with a sledgehammer" – Frank Lloyd Wright 14
  • 13. Placeholder for title 15 Sustain Secure State Remediation of Non Compliance Verification & Validation Secure Configuration Secure Coding Secure Design (Threat Modeling) Technical Security Standards, Procedure, Specifications Enterprise Security and Privacy Policies, Security Principles Plan, Design and Architecture Develop and Test Maintain and Run
  • 14. What Is Threat Modeling? 16 – Threat modeling is an engineering technique you can use to help you identify security objectives threats, attacks, vulnerabilities, and countermeasures in the context of your application scenario. The threat modeling activity helps you to: – Threat modeling is performed to identify when and where more effort should be applied. There are many possible vulnerabilities, threats, and exploits; it is unlikely that your application will encounter all of them. – It is also unlikely that your company would need to address all of them. Threat modeling helps you identify where your organization needs to apply effort.
  • 15. Why Do Threat Modeling 17 Balancing Business Value with Business Risk – Risk Appetite – Risk Tolerance Secure by Design and Not Chance – Secure by design at design time – Secure by design at Run Time Adhere to fundamental principles of security – Support the Business – Defend the Business – Promote responsible security behavior
  • 16. Key Questions we ask in Threat Modeling 18 – Where does your system live? – What are you building ? – What do you have to protect? – Who are your users? – Who are your adversaries? – What can go wrong ?(mis-use cases) – What are your weak points? – What can you do to mitigate the threats?
  • 17. Key Concepts in Threat Modeling 19 – Risk – Trust Boundary – Attack Trees – Identifying Threats(STRIDE Model) – Attack Surface – Attack Vectors – Risk Mitigation Strategies – Rating Risk with (DREAD) – Countermeasures
  • 18. Guidelines for Threat Modeling 20 Concept Description Modeling to reduce risk Threat modeling helps you identify where effort needs to be applied. Incremental rendering Threat modeling is iterative. You should not be too concerned about missing details in any single iteration productive. Context-precision Context-precision provides relevancy. You need to look at application use cases and roles to truly vulnerabilities. Boundaries Establishing boundaries helps you to define constraints and goals. Boundaries help you Identify happen, what needs to happen, and what is nice to happen. Entry and exit criteria By defining entry and exit criteria, you establish tests for success so you know when your threat enough) and to ensure you spend the right amount of time on the activity. Pattern-based information model By using a pattern-based information model, you can identify the patterns of repeatable them into categories.
  • 20. Automate, Automate, Automate 22 – OWASP – Define Coding Standards – SANS 25 Dangerous Programming Errors – Use Design Patterns when possible – Reuse Secure Components (SBB, TBB) – Fail Fast, Fail Early
  • 22. Adopt an Industry Standard Secure Configuration 24 Ensure Baseline is followed  US DoD Security Technical Implementation Guides (STIGs) for Databases http://iase.disa.mil/stigs/Pages/index.aspx  CIS Bench Marks https://benchmarks.cisecurity.org/ Adopt a Baseline Maintain the secure baseline
  • 23. Evolutionary Design Embraces the fact of an evolving system understanding, and helps system’s design evolve 25 Evolving and adapting through Mutation the only way to survive in a hostile world Op
  • 24. Evolutionary Design Embraces the fact of an evolving system understanding, and helps system’s design evolve 26 Evolving and adapting through Mutation the only way to survive in a hostile world Op
  • 25. Evolutionary Design Embraces the fact of an evolving system understanding, and helps system’s design evolve 27 Evolving and adapting through Mutation the only way to survive in a hostile world Op
  • 26. Mutate: Human Behavior Changes in SDLC Optional subtitle 28
  • 27. Change is inevitable.. Adaptation is Optional 29
  • 28. Policy and Procedure without Enforcement is Ineffective Does the compliance Program have the teeth? Do they have visibility into the policy violations ? 30
  • 29. Enforcement Without Teeth Will Lead To Ineffective Compliance or No Compliance Are there real implications for policy violations (monetary, disciplinary) ? 31
  • 30. TSA and Zero Tolerance: 32 – It is possible to build application security program with Zero Tolerance – Requires a Cultural Change – Requires strong management support – Behavior Change takes time – Don’t expect overnight change – But it can be done
  • 31. McNamara Fallacy and Predictive Analytics You can not manage what you can not measure 33 Define smart KPI’s for your application security program including human behavior metrics
  • 32. Capgemini’s Industrial Application Security Testing Capacity Powered by HPE 34 The Capgemini performs technical and administrative platform management HPE provides the tool and help Sogeti scale up The clients upload their applications and URL, download their reports Capgemini auditors produce the reports based on the scan results Prospects can try the platform and watch assessments results Capgemini Manages the portal and support the client Static and dynamic scanning Hosting client portals Static Dynamic
  • 33. Get more information 35 – Supporting text here – Supporting text here – Supporting text here – Supporting text here – Supporting text here – Supporting text here Text here Attend these sessions: Visit these demos: Follow us on Social Media: Where do they go after the show? Add that here.
  • 34. Thank You Oz Deally: oz.deally@Capgemini.com Gopal Padinjaruveetil: gopal.padinjaruveetil@capgemini.com 36