SlideShare a Scribd company logo
1 of 41
Download to read offline
DISCOVER 2015
1-3 December, London
Improve the security of your application portfolio
in a few days with on-demand testing services
London, December 2, Yves Le Floch
2Copyright © 2015 Capgemini and Sogeti. All Rights Reserved
Improve the security of your application portfolio | December 2nd, 2015
Capgemini positioning
3Copyright © 2015 Capgemini and Sogeti. All Rights Reserved
Improve the security of your application portfolio | December 2nd, 2015
Cybersecurity services portfolio
4Copyright © 2015 Capgemini and Sogeti. All Rights Reserved
Improve the security of your application portfolio | December 2nd, 2015
Capgemini Cybersecurity video
5Copyright © 2015 Capgemini and Sogeti. All Rights Reserved
Improve the security of your application portfolio | December 2nd, 2015
Improve the security of your applications
! The World Quality Report: Application Security Findings
! Application security: the next challenge
! Best Practice: a secure software development lifecycle
! Application Security Testing as a Service
! Platform demonstration
! Questions & Answers
The World Quality Report: Application Security Findings
7Copyright © 2015 Capgemini and Sogeti. All Rights Reserved
Improve the security of your application portfolio | December 2nd, 2015
The World Quality Report 2015-16
Companysize:1,000–
4,999,5,000–10,000
and10,000+
Controlledmix ofCIOs,
ITDirectors,VP
Applications/QA,Testing
ManagerandCDO/CMO
Seenextslidefor
detailedsplits
1560interviews
CATI25%(390)
CAWI75%(1170) Globalstudy
April– June2015
Allinterviews
conductedabidedby
therulesand
regulationssetbythe
MRS
How
When
Where
Who
What
Studydetails
8Copyright © 2015 Capgemini and Sogeti. All Rights Reserved
Improve the security of your application portfolio | December 2nd, 2015
The Top 5 most important aspects of your IT strategy
9Copyright © 2015 Capgemini and Sogeti. All Rights Reserved
Improve the security of your application portfolio | December 2nd, 2015
Focus areas for IT Strategy
10Copyright © 2015 Capgemini and Sogeti. All Rights Reserved
Improve the security of your application portfolio | December 2nd, 2015
Commonly performed security testing activities
11Copyright © 2015 Capgemini and Sogeti. All Rights Reserved
Improve the security of your application portfolio | December 2nd, 2015
The Top 5 most important aspects of your IT strategy
12Copyright © 2015 Capgemini and Sogeti. All Rights Reserved
Improve the security of your application portfolio | December 2nd, 2015
In what stage of Application Lifecycle is security testing undertaken?
Application security: the next challenge
14Copyright © 2015 Capgemini and Sogeti. All Rights Reserved
Improve the security of your application portfolio | December 2nd, 2015
Giant data breaches!
15Copyright © 2015 Capgemini and Sogeti. All Rights Reserved
Improve the security of your application portfolio | December 2nd, 2015
What is the challenge enterprises are facing?
68%
increase in mobile
application
vulnerability
disclosures
5
Infrastructure security
is rather mature,
when application security
is rather new
16Copyright © 2015 Capgemini and Sogeti. All Rights Reserved
Improve the security of your application portfolio | December 2nd, 2015
How to measure the issue?
17Copyright © 2015 Capgemini and Sogeti. All Rights Reserved
Improve the security of your application portfolio | December 2nd, 2015
The Top 10 Application security risks
18Copyright © 2015 Capgemini and Sogeti. All Rights Reserved
Improve the security of your application portfolio | December 2nd, 2015
The current state of security
Organizations are under increased pressure to develop new applications to support
digital transformation – whether internal or external facing
!  Applications delivered quickly, focus on ergonomics and little focus on governance
!  Many incorporate sensitiv<e data that can be breached, should any vulnerability be left
!  Do you know how many applications your organization has? How many critical applications?
Security checks left to the end of the development lifecycle (penetration testing)
!  Penetration testing is no longer enough: too little too late
!  Too expensive to perform pentests or manual code reviews at each releases
!  Much less costly to fix security issues before the application is deployed (i.e. in QA/integration)
Network and infrastructure security testing now widely covered, but lack of maturity at the
application level
!  Lack of a formal & systematic process to prevent vulnerabilities before the breach
•  Hackers know that : 80%+ of breaches happen at application level
19Copyright © 2015 Capgemini and Sogeti. All Rights Reserved
Improve the security of your application portfolio | December 2nd, 2015
What does a good approach look like?
! Supports your digital transformation
! Proactive instead of reactive
! Includes:
• Building security into the development process
• Comprehensive testing: automated scanning,
expert assessment and penetration testing
• Secure architecture & deployment
! Security issues are fixed before the application goes
into production
! Issues prioritised by risk and business criticality
! Cost effective
! Rapidly implemented
Best Practice: a secure software development lifecycle
21Copyright © 2015 Capgemini and Sogeti. All Rights Reserved
Improve the security of your application portfolio | December 2nd, 2015
Best Practice Approach: Overview
1. Discover 2. Patch 3. Security Gate 4. Shift-Left 5. Mature
1.  Identify the scope of the problem
2.  Fix the critical vulnerabilities in the high risk applications
3.  Establish a Security Gate
4.  Add security controls earlier in the Software Development Life-cycle
5.  Raise the security bar
22Copyright © 2015 Capgemini and Sogeti. All Rights Reserved
Improve the security of your application portfolio | December 2nd, 2015
Best Practice Approach: Discover
1. Discover
Create risk ranked inventory of on-line applications
•  Web, Facebook, mobile
•  In-house developed, out-sourced, third-party
•  Basic risk categorization
Assess sample of applications
•  Dynamic Application Security Testing
Establish the business case
•  Gain executive sponsorship
Don‘t wait for a breach!
23Copyright © 2015 Capgemini and Sogeti. All Rights Reserved
Improve the security of your application portfolio | December 2nd, 2015
Best Practice Approach: Patch
2. Patch
Reduce exposure to critical vulnerabilities in high risk applications
Complete assessment of high risk applications
–  Identify critical vulnerabilities
Remediate
–  Retire or replace application
–  Block with WAF/IPS
–  Work with development to fix
Commence Application Security Awareness program
These can’t wait!
24Copyright © 2015 Capgemini and Sogeti. All Rights Reserved
Improve the security of your application portfolio | December 2nd, 2015
Best Practice Approach: Security Gate
3. Security Gate
Define and Implement Policy
•  Application risk category specific
•  Update Internal Standards
•  Add to Vendor Contracts
Implement a Security Gate
•  Enforce policy for all new apps and major releases
•  Work through backlog by risk category
–  Advisory initially then enforce incrementally
Publicise Program
•  Publish KPI’s
•  Identify Security Champions
25Copyright © 2015 Capgemini and Sogeti. All Rights Reserved
Improve the security of your application portfolio | December 2nd, 2015
Best Practice Approach: Shift-Left
4. Shift-Left
Embed Static Application Security Testing in development process
•  In-house development teams
–  IDE Integration
–  Build Integration
–  Bug-tracking
•  Offer to key out-source suppliers and third-parties
Secure Development Training Program
•  Secure Development Guidelines
•  Mandatory Role-based training
26Copyright © 2015 Capgemini and Sogeti. All Rights Reserved
Improve the security of your application portfolio | December 2nd, 2015
Best Practice Approach: Mature
5. Mature
Raise Security Bar
•  E.g. Policy now includes addressing ‘medium’ rated vulnerabilities for high risk applications
Increase scope
•  Internal Applications
BSIMM assessment of SDLC
•  Identify and implement additional security controls
–  Threat Modelling
–  Security Architecture Review
Use metrics to drive continuous improvement
•  Add application security performance to vendor selection
Move cost of assessments to third-party vendors
27Copyright © 2015 Capgemini and Sogeti. All Rights Reserved
Improve the security of your application portfolio | December 2nd, 2015
Best Practice Approach: Summary
1. Discover 2. Patch 3. Security Gate 4. Shift-Left 5. Mature
1.  Identify the scope of the problem
•  Take advantage of automated discovery approach
2.  Fix the critical vulnerabilities in the high risk applications
•  Retire or block to minimize impact on development. Fix if you have to.
3.  Establish a Security Gate
•  Use cloud–based solution like Fortify on Demand for speed and scalability
4.  Add security controls earlier in the Software Development Life-cycle
•  Add SAST and role-based security training to your SDLC
5.  Raise the security bar
•  Use metrics to drive continuous improvement
Application Security Testing as a Service
29Copyright © 2015 Capgemini and Sogeti. All Rights Reserved
Improve the security of your application portfolio | December 2nd, 2015
An industrial Application Security Testing platform
30Copyright © 2015 Capgemini and Sogeti. All Rights Reserved
Improve the security of your application portfolio | December 2nd, 2015
Delivered by Capgemini/Sogeti, powered by Hewlett Packard Enterprise –
Combining the power of two market leaders
Capgemini - Sogeti recognized as a leader
for independent Testing Services
HP recognized as a leader by Gartner
for Application Security Testing
31Copyright © 2015 Capgemini and Sogeti. All Rights Reserved
Improve the security of your application portfolio | December 2nd, 2015
Combining manual/automated testing, static/dynamic testing, pentest
SAST - Static application security
testing:
Test is done on modules on the written code (not
running)
• Can be performed during of after development process, early in
the lifecycle, no server required
• Manual and automated analysis of the source, bytecode or
binary code
• Linked to code, provides useful and clear clues for remediation
• Integrate application security testing into Development / Quality
Assurance processes -> to be performed early in the process
DAST - Dynamic application security
testing:
Test is done on the running code, which is
challenged to reveal vulnerabilities
• Test the runtime application on integration or production
platform.
• Manual and automated analysis of the running application
• Can be performed only at the end of the development
process
• Results more difficult to exploit, but closer to a real attack
Code manual review
Expert analysis of the code
• Can be performed early in the lifecycle, no server required
• Linked to code, provides useful and clear clues for remediation
• Find all vulnerabilities with the right criticality analysis
• Expert intensive (expensive, difficult to scale, slow)
Penetration testing:
The ethical hacker performs a real hacking
• Very similar to what a real hacker would do
• Provides a good view of the operational risks
• Exploits vulnerabilities in order to demonstrate exploitability
• Alco covers servers and production vulnerabilities
• Late in the process
• Expert intensive (expensive, difficult to scale, slow)
32Copyright © 2015 Capgemini and Sogeti. All Rights Reserved
Improve the security of your application portfolio | December 2nd, 2015
Objective: an industrial Security testing capacity
Supported by best-in-classApplication security testing tools1
Maximizing the industrialapproach (reduceddelay and cost)2
Entirely managed/hosted by Sogetiin Europe forsecurity and trust reasons3
Offering on-line accessforclients (management,assessments,reports…)4
Allowing maximumadaptationto client risk and budgetpriorities5
Allowing Rightshore delivery upon clientrequestforimproved delay and cost6
Pay peruse: no investment,no license,no hardware,no expertise required7
33Copyright © 2015 Capgemini and Sogeti. All Rights Reserved
Improve the security of your application portfolio | December 2nd, 2015
Platform demonstration
34Copyright © 2015 Capgemini and Sogeti. All Rights Reserved
Improve the security of your application portfolio | December 2nd, 2015
Access to a leading tool and proven expertise
35Copyright © 2015 Capgemini and Sogeti. All Rights Reserved
Improve the security of your application portfolio | December 2nd, 2015
How it works
Customeruploadssoftware
or dynamic accessdata
directly on his portal
Upload
Dynamic,static and/ormobile
automatic testing
Scan
Expertreview and additional
tests to ensure minimalfalse
positives and falsenegatives
Review
36Copyright © 2015 Capgemini and Sogeti. All Rights Reserved
Improve the security of your application portfolio | December 2nd, 2015
The benefits
! Regularly checkedand updated by HP’s Security Researchteam who find four times the number of new critical
vulnerabilities than the rest of the market combined (Frost and Sullivan)
! Easy to purchase
Launchyour application
securityinitiative in < 1 day
! No hardware or software
investments
! No security experts to hire,
train and retain
Simple
Scale to test all sensitive
applicationsin your
organization
! From one-day turn-around on
applicationsecurity results
! Potentially support 1000sof
applicationsfor desktop,
mobile or cloud
! Dynamic and static testing
with manual review
Fast & Comprehensive
Test anyapplication
! Secure commercial, open
source and 3rd party
applications
! Test applications on demand
according to risk and budget
Flexible
37Copyright © 2015 Capgemini and Sogeti. All Rights Reserved
Improve the security of your application portfolio | December 2nd, 2015
Comprehensive and accurate testing
38Copyright © 2015 Capgemini and Sogeti. All Rights Reserved
Improve the security of your application portfolio | December 2nd, 2015
Multiple levels of testing based on application risk
Low Medium High
Basic
assessment
Standard
assessment
Premium
assessment
! Marketing Site ! Personally identifiable
information
! Business useful
! Credit card/ SSN
information
! Business critical
Questions & Answers
40Copyright © 2015 Capgemini and Sogeti. All Rights Reserved
Improve the security of your application portfolio | December 2nd, 2015
Contact information
Yves
Le Floch
VP, Head of CyberSecurity
Business Development
Sogeti
yves.le-floch@sogeti.com
+33 1 55 00 13 41
David
Harper
Fortify on Demand
Practice Principal, EMEA
Hewlett Packard Enterprise
david.harper@hpe.com
+44 751 528 5200
www.sogeti.com
www.capgemini.com
The information contained in this presentation is proprietary and confidential. It is for internal and intermediary use only.
Copyright © 2015 Capgemini and Sogeti. All rights reserved.
Rightshore® is a trademark belonging to Capgemini.
No part of this presentation may be modified, deleted or expanded by any process or means without prior written permission from Capgemini.
About Capgemini and Sogeti
Now with 180,000 people in over 40 countries, Capgemini is one of the world's
foremost providers of consulting, technology and outsourcing services. The Group
reported 2014 global revenues of EUR 10.573 billion. Together with its clients,
Capgemini creates and delivers business, technology and digital solutions that fit
their needs, enabling them to achieve innovation and competitiveness. A deeply
multicultural organization, Capgemini has developed its own way of working,
the Collaborative Business Experience™, and draws on Rightshore®, its worldwide
delivery model.
Sogeti is a leading provider of technology and software testing, specializing in
Application, Infrastructure and Engineering Services. Sogeti offers cutting-edge
solutions around Testing, Business Intelligence & Analytics, Mobile, Cloud and
Cyber Security. Sogeti brings together more than 20,000 professionals in 15
countries and has a strong local presence in over 100 locations in Europe, USA
and India. Sogeti is a wholly-owned subsidiary of Cap Gemini S.A., listed on the
Paris Stock Exchange.

More Related Content

What's hot

2018 State of Cyber Resilience - New York
2018 State of Cyber Resilience - New York2018 State of Cyber Resilience - New York
2018 State of Cyber Resilience - New Yorkaccenture
 
Automotive Cybersecurity: Shifting into Overdrive
Automotive Cybersecurity: Shifting into OverdriveAutomotive Cybersecurity: Shifting into Overdrive
Automotive Cybersecurity: Shifting into Overdriveaccenture
 
Technology Vision 2016 - Infographic
Technology Vision 2016 - InfographicTechnology Vision 2016 - Infographic
Technology Vision 2016 - InfographicAccenture Technology
 
Equinor: What does normal look like?
Equinor: What does normal look like? Equinor: What does normal look like?
Equinor: What does normal look like? AppDynamics
 
eGestalt Named a 2012 'Emerging Vendor' by CRN and UBM Channel
eGestalt Named a 2012 'Emerging Vendor' by CRN and UBM ChanneleGestalt Named a 2012 'Emerging Vendor' by CRN and UBM Channel
eGestalt Named a 2012 'Emerging Vendor' by CRN and UBM Channelflashnewsrelease
 
CWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) plan
CWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) planCWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) plan
CWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) planCapgemini
 
eGestalt Named a 2012 ‘Emerging Vendor’by CRN and UBM Channel
eGestalt Named a 2012 ‘Emerging Vendor’by CRN and UBM ChanneleGestalt Named a 2012 ‘Emerging Vendor’by CRN and UBM Channel
eGestalt Named a 2012 ‘Emerging Vendor’by CRN and UBM ChannelAegify Inc.
 
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal
Continuous Cyber Attacks: Engaging Business Leaders for the New NormalContinuous Cyber Attacks: Engaging Business Leaders for the New Normal
Continuous Cyber Attacks: Engaging Business Leaders for the New NormalAccenture Technology
 
Accenture Cloud Platform: Control, Manage and Govern the Enterprise Cloud
Accenture Cloud Platform: Control, Manage and Govern the Enterprise CloudAccenture Cloud Platform: Control, Manage and Govern the Enterprise Cloud
Accenture Cloud Platform: Control, Manage and Govern the Enterprise CloudAccenture Operations
 
Solving Your Top IT Challenges
Solving Your Top IT Challenges Solving Your Top IT Challenges
Solving Your Top IT Challenges Insight
 
Moving to unified PV: Transforming Safety with End-to-end PV Solutions
Moving to unified PV: Transforming Safety with End-to-end PV SolutionsMoving to unified PV: Transforming Safety with End-to-end PV Solutions
Moving to unified PV: Transforming Safety with End-to-end PV SolutionsVeeva Systems
 
Securing the Internet of Things Opportunity: Putting Cybersecurity at the Hea...
Securing the Internet of Things Opportunity: Putting Cybersecurity at the Hea...Securing the Internet of Things Opportunity: Putting Cybersecurity at the Hea...
Securing the Internet of Things Opportunity: Putting Cybersecurity at the Hea...Capgemini
 
How to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber ResilientHow to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber ResilientAccenture Operations
 
Complicate, detect, respond: stopping cyber attacks with identity analytics
Complicate, detect, respond: stopping cyber attacks with identity analyticsComplicate, detect, respond: stopping cyber attacks with identity analytics
Complicate, detect, respond: stopping cyber attacks with identity analyticsCA Technologies
 
Accenture Banking Security Index
Accenture Banking Security IndexAccenture Banking Security Index
Accenture Banking Security Indexaccenture
 
Digital Outlook: Healthcare Industry
Digital Outlook: Healthcare IndustryDigital Outlook: Healthcare Industry
Digital Outlook: Healthcare IndustryInfosys
 
From Cybersecurity to Cyber Resilience
From Cybersecurity to Cyber ResilienceFrom Cybersecurity to Cyber Resilience
From Cybersecurity to Cyber Resilienceaccenture
 
Virtual Gov Day - Security Breakout - Deloitte
Virtual Gov Day - Security Breakout - DeloitteVirtual Gov Day - Security Breakout - Deloitte
Virtual Gov Day - Security Breakout - DeloitteSplunk
 

What's hot (20)

2018 State of Cyber Resilience - New York
2018 State of Cyber Resilience - New York2018 State of Cyber Resilience - New York
2018 State of Cyber Resilience - New York
 
Automotive Cybersecurity: Shifting into Overdrive
Automotive Cybersecurity: Shifting into OverdriveAutomotive Cybersecurity: Shifting into Overdrive
Automotive Cybersecurity: Shifting into Overdrive
 
Technology Vision 2016 - Infographic
Technology Vision 2016 - InfographicTechnology Vision 2016 - Infographic
Technology Vision 2016 - Infographic
 
Equinor: What does normal look like?
Equinor: What does normal look like? Equinor: What does normal look like?
Equinor: What does normal look like?
 
eGestalt Named a 2012 'Emerging Vendor' by CRN and UBM Channel
eGestalt Named a 2012 'Emerging Vendor' by CRN and UBM ChanneleGestalt Named a 2012 'Emerging Vendor' by CRN and UBM Channel
eGestalt Named a 2012 'Emerging Vendor' by CRN and UBM Channel
 
CWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) plan
CWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) planCWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) plan
CWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) plan
 
eGestalt Named a 2012 ‘Emerging Vendor’by CRN and UBM Channel
eGestalt Named a 2012 ‘Emerging Vendor’by CRN and UBM ChanneleGestalt Named a 2012 ‘Emerging Vendor’by CRN and UBM Channel
eGestalt Named a 2012 ‘Emerging Vendor’by CRN and UBM Channel
 
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal
Continuous Cyber Attacks: Engaging Business Leaders for the New NormalContinuous Cyber Attacks: Engaging Business Leaders for the New Normal
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal
 
Integrated_Insights_Platform_web
Integrated_Insights_Platform_webIntegrated_Insights_Platform_web
Integrated_Insights_Platform_web
 
Accenture Cloud Platform: Control, Manage and Govern the Enterprise Cloud
Accenture Cloud Platform: Control, Manage and Govern the Enterprise CloudAccenture Cloud Platform: Control, Manage and Govern the Enterprise Cloud
Accenture Cloud Platform: Control, Manage and Govern the Enterprise Cloud
 
Solving Your Top IT Challenges
Solving Your Top IT Challenges Solving Your Top IT Challenges
Solving Your Top IT Challenges
 
Moving to unified PV: Transforming Safety with End-to-end PV Solutions
Moving to unified PV: Transforming Safety with End-to-end PV SolutionsMoving to unified PV: Transforming Safety with End-to-end PV Solutions
Moving to unified PV: Transforming Safety with End-to-end PV Solutions
 
Securing the Internet of Things Opportunity: Putting Cybersecurity at the Hea...
Securing the Internet of Things Opportunity: Putting Cybersecurity at the Hea...Securing the Internet of Things Opportunity: Putting Cybersecurity at the Hea...
Securing the Internet of Things Opportunity: Putting Cybersecurity at the Hea...
 
How to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber ResilientHow to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber Resilient
 
Complicate, detect, respond: stopping cyber attacks with identity analytics
Complicate, detect, respond: stopping cyber attacks with identity analyticsComplicate, detect, respond: stopping cyber attacks with identity analytics
Complicate, detect, respond: stopping cyber attacks with identity analytics
 
Accenture Banking Security Index
Accenture Banking Security IndexAccenture Banking Security Index
Accenture Banking Security Index
 
Digital Outlook: Healthcare Industry
Digital Outlook: Healthcare IndustryDigital Outlook: Healthcare Industry
Digital Outlook: Healthcare Industry
 
From Cybersecurity to Cyber Resilience
From Cybersecurity to Cyber ResilienceFrom Cybersecurity to Cyber Resilience
From Cybersecurity to Cyber Resilience
 
Virtual Gov Day - Security Breakout - Deloitte
Virtual Gov Day - Security Breakout - DeloitteVirtual Gov Day - Security Breakout - Deloitte
Virtual Gov Day - Security Breakout - Deloitte
 
PT on CF
PT on CFPT on CF
PT on CF
 

Viewers also liked

Get Ready for Web Application Security Testing
Get Ready for Web Application Security TestingGet Ready for Web Application Security Testing
Get Ready for Web Application Security TestingAlan Kan
 
Story Testing Approach for Enterprise Applications using Selenium Framework
Story Testing Approach for Enterprise Applications using Selenium FrameworkStory Testing Approach for Enterprise Applications using Selenium Framework
Story Testing Approach for Enterprise Applications using Selenium FrameworkOleksiy Rezchykov
 
Gerrit is Getting Native with RPM, Deb and Docker
Gerrit is Getting Native with RPM, Deb and DockerGerrit is Getting Native with RPM, Deb and Docker
Gerrit is Getting Native with RPM, Deb and DockerLuca Milanesio
 
Introduction to Bdd and cucumber
Introduction to Bdd and cucumberIntroduction to Bdd and cucumber
Introduction to Bdd and cucumberNibu Baby
 
DevQA: make your testers happier with Groovy, Spock and Geb (Greach 2014)
DevQA: make your testers happier with Groovy, Spock and Geb (Greach 2014)DevQA: make your testers happier with Groovy, Spock and Geb (Greach 2014)
DevQA: make your testers happier with Groovy, Spock and Geb (Greach 2014)Alvaro Sanchez-Mariscal
 
Testing Microservices with a Citrus twist
Testing Microservices with a Citrus twistTesting Microservices with a Citrus twist
Testing Microservices with a Citrus twistchristophd
 
Capybara testing
Capybara testingCapybara testing
Capybara testingFutureworkz
 
Testing Java EE apps with Arquillian
Testing Java EE apps with ArquillianTesting Java EE apps with Arquillian
Testing Java EE apps with ArquillianIvan Ivanov
 
Bdd (Behavior Driven Development)
Bdd (Behavior Driven Development)Bdd (Behavior Driven Development)
Bdd (Behavior Driven Development)Helder De Oliveira
 
Arquillian & Citrus
Arquillian & CitrusArquillian & Citrus
Arquillian & Citruschristophd
 
Lunch and learn: Cucumber and Capybara
Lunch and learn: Cucumber and CapybaraLunch and learn: Cucumber and Capybara
Lunch and learn: Cucumber and CapybaraMarc Seeger
 
Pruebas funcionales de Software
Pruebas funcionales de SoftwarePruebas funcionales de Software
Pruebas funcionales de SoftwareBrian Pando
 
Automated Acceptance Tests & Tool choice
Automated Acceptance Tests & Tool choiceAutomated Acceptance Tests & Tool choice
Automated Acceptance Tests & Tool choicetoddbr
 
Continuous integration using Jenkins and Sonar
Continuous integration using Jenkins and SonarContinuous integration using Jenkins and Sonar
Continuous integration using Jenkins and SonarPascal Larocque
 
Sonar qube to impove code quality
Sonar qube   to impove code qualitySonar qube   to impove code quality
Sonar qube to impove code qualityMani Sarkar
 
Design First API's with RAML and SoapUI
Design First API's with RAML and SoapUIDesign First API's with RAML and SoapUI
Design First API's with RAML and SoapUIDaniel Feist
 
Rspec and Capybara Intro Tutorial at RailsConf 2013
Rspec and Capybara Intro Tutorial at RailsConf 2013Rspec and Capybara Intro Tutorial at RailsConf 2013
Rspec and Capybara Intro Tutorial at RailsConf 2013Brian Sam-Bodden
 

Viewers also liked (20)

Get Ready for Web Application Security Testing
Get Ready for Web Application Security TestingGet Ready for Web Application Security Testing
Get Ready for Web Application Security Testing
 
Story Testing Approach for Enterprise Applications using Selenium Framework
Story Testing Approach for Enterprise Applications using Selenium FrameworkStory Testing Approach for Enterprise Applications using Selenium Framework
Story Testing Approach for Enterprise Applications using Selenium Framework
 
Next level of Appium
Next level of AppiumNext level of Appium
Next level of Appium
 
Automate you Appium test like a pro!
Automate you Appium test like a pro!Automate you Appium test like a pro!
Automate you Appium test like a pro!
 
Gerrit is Getting Native with RPM, Deb and Docker
Gerrit is Getting Native with RPM, Deb and DockerGerrit is Getting Native with RPM, Deb and Docker
Gerrit is Getting Native with RPM, Deb and Docker
 
Introduction to Bdd and cucumber
Introduction to Bdd and cucumberIntroduction to Bdd and cucumber
Introduction to Bdd and cucumber
 
DevQA: make your testers happier with Groovy, Spock and Geb (Greach 2014)
DevQA: make your testers happier with Groovy, Spock and Geb (Greach 2014)DevQA: make your testers happier with Groovy, Spock and Geb (Greach 2014)
DevQA: make your testers happier with Groovy, Spock and Geb (Greach 2014)
 
Testing Microservices with a Citrus twist
Testing Microservices with a Citrus twistTesting Microservices with a Citrus twist
Testing Microservices with a Citrus twist
 
Capybara testing
Capybara testingCapybara testing
Capybara testing
 
Testing Java EE apps with Arquillian
Testing Java EE apps with ArquillianTesting Java EE apps with Arquillian
Testing Java EE apps with Arquillian
 
Bdd (Behavior Driven Development)
Bdd (Behavior Driven Development)Bdd (Behavior Driven Development)
Bdd (Behavior Driven Development)
 
Arquillian & Citrus
Arquillian & CitrusArquillian & Citrus
Arquillian & Citrus
 
Workshop calabash appium
Workshop calabash appiumWorkshop calabash appium
Workshop calabash appium
 
Lunch and learn: Cucumber and Capybara
Lunch and learn: Cucumber and CapybaraLunch and learn: Cucumber and Capybara
Lunch and learn: Cucumber and Capybara
 
Pruebas funcionales de Software
Pruebas funcionales de SoftwarePruebas funcionales de Software
Pruebas funcionales de Software
 
Automated Acceptance Tests & Tool choice
Automated Acceptance Tests & Tool choiceAutomated Acceptance Tests & Tool choice
Automated Acceptance Tests & Tool choice
 
Continuous integration using Jenkins and Sonar
Continuous integration using Jenkins and SonarContinuous integration using Jenkins and Sonar
Continuous integration using Jenkins and Sonar
 
Sonar qube to impove code quality
Sonar qube   to impove code qualitySonar qube   to impove code quality
Sonar qube to impove code quality
 
Design First API's with RAML and SoapUI
Design First API's with RAML and SoapUIDesign First API's with RAML and SoapUI
Design First API's with RAML and SoapUI
 
Rspec and Capybara Intro Tutorial at RailsConf 2013
Rspec and Capybara Intro Tutorial at RailsConf 2013Rspec and Capybara Intro Tutorial at RailsConf 2013
Rspec and Capybara Intro Tutorial at RailsConf 2013
 

Similar to Improve Security of App Portfolio with On-Demand Testing

Integrating IBM PureApplication System and IBM UrbanCode Deploy: A GE Capital...
Integrating IBM PureApplication System and IBM UrbanCode Deploy: A GE Capital...Integrating IBM PureApplication System and IBM UrbanCode Deploy: A GE Capital...
Integrating IBM PureApplication System and IBM UrbanCode Deploy: A GE Capital...Prolifics
 
WeSecure Data Security Congres: 5 must haves to safe cloud enablement
WeSecure Data Security Congres: 5 must haves to safe cloud enablementWeSecure Data Security Congres: 5 must haves to safe cloud enablement
WeSecure Data Security Congres: 5 must haves to safe cloud enablementWeSecure
 
Automating Your Tools: How to Free Up Your Security Professionals for Actual ...
Automating Your Tools: How to Free Up Your Security Professionals for Actual ...Automating Your Tools: How to Free Up Your Security Professionals for Actual ...
Automating Your Tools: How to Free Up Your Security Professionals for Actual ...Kevin Fealey
 
Structuring and Scaling an Application Security Program
Structuring and Scaling an Application Security ProgramStructuring and Scaling an Application Security Program
Structuring and Scaling an Application Security ProgramDenim Group
 
we45 SecDevOps Presentation - ISACA Chennai
we45 SecDevOps Presentation - ISACA Chennaiwe45 SecDevOps Presentation - ISACA Chennai
we45 SecDevOps Presentation - ISACA ChennaiAbhay Bhargav
 
Protecting Mission-Critical Source Code from Application Security Vulnerabili...
Protecting Mission-Critical Source Code from Application Security Vulnerabili...Protecting Mission-Critical Source Code from Application Security Vulnerabili...
Protecting Mission-Critical Source Code from Application Security Vulnerabili...IBM Security
 
Developing Mobile Trust in Today's E-Privacy Landscape - Webinar 11/19/2015
Developing Mobile Trust in Today's E-Privacy Landscape - Webinar 11/19/2015Developing Mobile Trust in Today's E-Privacy Landscape - Webinar 11/19/2015
Developing Mobile Trust in Today's E-Privacy Landscape - Webinar 11/19/2015Ghostery, Inc.
 
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptxEmphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptxlior mazor
 
Application Security Testing for a DevOps Mindset
Application Security Testing for a DevOps Mindset  Application Security Testing for a DevOps Mindset
Application Security Testing for a DevOps Mindset Denim Group
 
DevOps – Don’t Be Left Behind
DevOps – Don’t Be Left BehindDevOps – Don’t Be Left Behind
DevOps – Don’t Be Left BehindCapgemini
 
Delivering Enterprise Applications: Faster. Cheaper. Better
Delivering Enterprise Applications: Faster. Cheaper. BetterDelivering Enterprise Applications: Faster. Cheaper. Better
Delivering Enterprise Applications: Faster. Cheaper. BetterProlifics
 
Infrastructure predictive monitoring with itoa jean louis baudoin, capgemini-...
Infrastructure predictive monitoring with itoa jean louis baudoin, capgemini-...Infrastructure predictive monitoring with itoa jean louis baudoin, capgemini-...
Infrastructure predictive monitoring with itoa jean louis baudoin, capgemini-...Capgemini
 
Infrastructure predictive monitoring with itoa jean louis baudoin, capgemini-...
Infrastructure predictive monitoring with itoa jean louis baudoin, capgemini-...Infrastructure predictive monitoring with itoa jean louis baudoin, capgemini-...
Infrastructure predictive monitoring with itoa jean louis baudoin, capgemini-...Capgemini
 
Navigating agile automotive software development
Navigating agile automotive software development Navigating agile automotive software development
Navigating agile automotive software development Rogue Wave Software
 
Mobile Security - 2015 Wrap-up and 2016 Predictions
Mobile Security - 2015 Wrap-up and 2016 PredictionsMobile Security - 2015 Wrap-up and 2016 Predictions
Mobile Security - 2015 Wrap-up and 2016 PredictionsSkycure
 
Outpost24 webinar - Protecting Cezanne HR’s cloud web application with contin...
Outpost24 webinar - Protecting Cezanne HR’s cloud web application with contin...Outpost24 webinar - Protecting Cezanne HR’s cloud web application with contin...
Outpost24 webinar - Protecting Cezanne HR’s cloud web application with contin...Outpost24
 
eFolder Partner Chat Webinar – "How We Minimized Risk": An eFolder and OpenDN...
eFolder Partner Chat Webinar – "How We Minimized Risk": An eFolder and OpenDN...eFolder Partner Chat Webinar – "How We Minimized Risk": An eFolder and OpenDN...
eFolder Partner Chat Webinar – "How We Minimized Risk": An eFolder and OpenDN...eFolder
 
HP Software Performance Tour 2014 - Enterprise Agility in the age of Applicat...
HP Software Performance Tour 2014 - Enterprise Agility in the age of Applicat...HP Software Performance Tour 2014 - Enterprise Agility in the age of Applicat...
HP Software Performance Tour 2014 - Enterprise Agility in the age of Applicat...HP Enterprise Italia
 

Similar to Improve Security of App Portfolio with On-Demand Testing (20)

Integrating IBM PureApplication System and IBM UrbanCode Deploy: A GE Capital...
Integrating IBM PureApplication System and IBM UrbanCode Deploy: A GE Capital...Integrating IBM PureApplication System and IBM UrbanCode Deploy: A GE Capital...
Integrating IBM PureApplication System and IBM UrbanCode Deploy: A GE Capital...
 
WeSecure Data Security Congres: 5 must haves to safe cloud enablement
WeSecure Data Security Congres: 5 must haves to safe cloud enablementWeSecure Data Security Congres: 5 must haves to safe cloud enablement
WeSecure Data Security Congres: 5 must haves to safe cloud enablement
 
Automating Your Tools: How to Free Up Your Security Professionals for Actual ...
Automating Your Tools: How to Free Up Your Security Professionals for Actual ...Automating Your Tools: How to Free Up Your Security Professionals for Actual ...
Automating Your Tools: How to Free Up Your Security Professionals for Actual ...
 
Structuring and Scaling an Application Security Program
Structuring and Scaling an Application Security ProgramStructuring and Scaling an Application Security Program
Structuring and Scaling an Application Security Program
 
we45 SecDevOps Presentation - ISACA Chennai
we45 SecDevOps Presentation - ISACA Chennaiwe45 SecDevOps Presentation - ISACA Chennai
we45 SecDevOps Presentation - ISACA Chennai
 
Protecting Mission-Critical Source Code from Application Security Vulnerabili...
Protecting Mission-Critical Source Code from Application Security Vulnerabili...Protecting Mission-Critical Source Code from Application Security Vulnerabili...
Protecting Mission-Critical Source Code from Application Security Vulnerabili...
 
Developing Mobile Trust in Today's E-Privacy Landscape - Webinar 11/19/2015
Developing Mobile Trust in Today's E-Privacy Landscape - Webinar 11/19/2015Developing Mobile Trust in Today's E-Privacy Landscape - Webinar 11/19/2015
Developing Mobile Trust in Today's E-Privacy Landscape - Webinar 11/19/2015
 
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptxEmphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
 
Dual-Track Agile at Scale
Dual-Track Agile at ScaleDual-Track Agile at Scale
Dual-Track Agile at Scale
 
Application Security Testing for a DevOps Mindset
Application Security Testing for a DevOps Mindset  Application Security Testing for a DevOps Mindset
Application Security Testing for a DevOps Mindset
 
DevOps – Don’t Be Left Behind
DevOps – Don’t Be Left BehindDevOps – Don’t Be Left Behind
DevOps – Don’t Be Left Behind
 
Delivering Enterprise Applications: Faster. Cheaper. Better
Delivering Enterprise Applications: Faster. Cheaper. BetterDelivering Enterprise Applications: Faster. Cheaper. Better
Delivering Enterprise Applications: Faster. Cheaper. Better
 
Application Hackers Have A Handbook. Why Shouldn't You?
Application Hackers Have A Handbook. Why Shouldn't You?Application Hackers Have A Handbook. Why Shouldn't You?
Application Hackers Have A Handbook. Why Shouldn't You?
 
Infrastructure predictive monitoring with itoa jean louis baudoin, capgemini-...
Infrastructure predictive monitoring with itoa jean louis baudoin, capgemini-...Infrastructure predictive monitoring with itoa jean louis baudoin, capgemini-...
Infrastructure predictive monitoring with itoa jean louis baudoin, capgemini-...
 
Infrastructure predictive monitoring with itoa jean louis baudoin, capgemini-...
Infrastructure predictive monitoring with itoa jean louis baudoin, capgemini-...Infrastructure predictive monitoring with itoa jean louis baudoin, capgemini-...
Infrastructure predictive monitoring with itoa jean louis baudoin, capgemini-...
 
Navigating agile automotive software development
Navigating agile automotive software development Navigating agile automotive software development
Navigating agile automotive software development
 
Mobile Security - 2015 Wrap-up and 2016 Predictions
Mobile Security - 2015 Wrap-up and 2016 PredictionsMobile Security - 2015 Wrap-up and 2016 Predictions
Mobile Security - 2015 Wrap-up and 2016 Predictions
 
Outpost24 webinar - Protecting Cezanne HR’s cloud web application with contin...
Outpost24 webinar - Protecting Cezanne HR’s cloud web application with contin...Outpost24 webinar - Protecting Cezanne HR’s cloud web application with contin...
Outpost24 webinar - Protecting Cezanne HR’s cloud web application with contin...
 
eFolder Partner Chat Webinar – "How We Minimized Risk": An eFolder and OpenDN...
eFolder Partner Chat Webinar – "How We Minimized Risk": An eFolder and OpenDN...eFolder Partner Chat Webinar – "How We Minimized Risk": An eFolder and OpenDN...
eFolder Partner Chat Webinar – "How We Minimized Risk": An eFolder and OpenDN...
 
HP Software Performance Tour 2014 - Enterprise Agility in the age of Applicat...
HP Software Performance Tour 2014 - Enterprise Agility in the age of Applicat...HP Software Performance Tour 2014 - Enterprise Agility in the age of Applicat...
HP Software Performance Tour 2014 - Enterprise Agility in the age of Applicat...
 

More from Capgemini

Top Healthcare Trends 2022
Top Healthcare Trends 2022Top Healthcare Trends 2022
Top Healthcare Trends 2022Capgemini
 
Top P&C Insurance Trends 2022
Top P&C Insurance Trends 2022Top P&C Insurance Trends 2022
Top P&C Insurance Trends 2022Capgemini
 
Commercial Banking Trends book 2022
Commercial Banking Trends book 2022Commercial Banking Trends book 2022
Commercial Banking Trends book 2022Capgemini
 
Top Trends in Payments 2022
Top Trends in Payments 2022Top Trends in Payments 2022
Top Trends in Payments 2022Capgemini
 
Top Trends in Wealth Management 2022
Top Trends in Wealth Management 2022Top Trends in Wealth Management 2022
Top Trends in Wealth Management 2022Capgemini
 
Retail Banking Trends book 2022
Retail Banking Trends book 2022Retail Banking Trends book 2022
Retail Banking Trends book 2022Capgemini
 
Top Life Insurance Trends 2022
Top Life Insurance Trends 2022Top Life Insurance Trends 2022
Top Life Insurance Trends 2022Capgemini
 
キャップジェミニ、あなたの『RISE WITH SAP』のパートナーです
キャップジェミニ、あなたの『RISE WITH SAP』のパートナーですキャップジェミニ、あなたの『RISE WITH SAP』のパートナーです
キャップジェミニ、あなたの『RISE WITH SAP』のパートナーですCapgemini
 
Property & Casualty Insurance Top Trends 2021
Property & Casualty Insurance Top Trends 2021Property & Casualty Insurance Top Trends 2021
Property & Casualty Insurance Top Trends 2021Capgemini
 
Life Insurance Top Trends 2021
Life Insurance Top Trends 2021Life Insurance Top Trends 2021
Life Insurance Top Trends 2021Capgemini
 
Top Trends in Commercial Banking: 2021
Top Trends in Commercial Banking: 2021Top Trends in Commercial Banking: 2021
Top Trends in Commercial Banking: 2021Capgemini
 
Top Trends in Wealth Management: 2021
Top Trends in Wealth Management: 2021Top Trends in Wealth Management: 2021
Top Trends in Wealth Management: 2021Capgemini
 
Top Trends in Payments: 2021
Top Trends in Payments: 2021Top Trends in Payments: 2021
Top Trends in Payments: 2021Capgemini
 
Health Insurance Top Trends 2021
Health Insurance Top Trends 2021Health Insurance Top Trends 2021
Health Insurance Top Trends 2021Capgemini
 
Top Trends in Retail Banking: 2021
Top Trends in Retail Banking: 2021Top Trends in Retail Banking: 2021
Top Trends in Retail Banking: 2021Capgemini
 
Capgemini’s Connected Autonomous Planning
Capgemini’s Connected Autonomous PlanningCapgemini’s Connected Autonomous Planning
Capgemini’s Connected Autonomous PlanningCapgemini
 
Top Trends in Retail Banking: 2020
Top Trends in Retail Banking: 2020Top Trends in Retail Banking: 2020
Top Trends in Retail Banking: 2020Capgemini
 
Top Trends in Life Insurance: 2020
Top Trends in Life Insurance: 2020Top Trends in Life Insurance: 2020
Top Trends in Life Insurance: 2020Capgemini
 
Top Trends in Health Insurance: 2020
Top Trends in Health Insurance: 2020Top Trends in Health Insurance: 2020
Top Trends in Health Insurance: 2020Capgemini
 
Top Trends in Payments: 2020
Top Trends in Payments: 2020Top Trends in Payments: 2020
Top Trends in Payments: 2020Capgemini
 

More from Capgemini (20)

Top Healthcare Trends 2022
Top Healthcare Trends 2022Top Healthcare Trends 2022
Top Healthcare Trends 2022
 
Top P&C Insurance Trends 2022
Top P&C Insurance Trends 2022Top P&C Insurance Trends 2022
Top P&C Insurance Trends 2022
 
Commercial Banking Trends book 2022
Commercial Banking Trends book 2022Commercial Banking Trends book 2022
Commercial Banking Trends book 2022
 
Top Trends in Payments 2022
Top Trends in Payments 2022Top Trends in Payments 2022
Top Trends in Payments 2022
 
Top Trends in Wealth Management 2022
Top Trends in Wealth Management 2022Top Trends in Wealth Management 2022
Top Trends in Wealth Management 2022
 
Retail Banking Trends book 2022
Retail Banking Trends book 2022Retail Banking Trends book 2022
Retail Banking Trends book 2022
 
Top Life Insurance Trends 2022
Top Life Insurance Trends 2022Top Life Insurance Trends 2022
Top Life Insurance Trends 2022
 
キャップジェミニ、あなたの『RISE WITH SAP』のパートナーです
キャップジェミニ、あなたの『RISE WITH SAP』のパートナーですキャップジェミニ、あなたの『RISE WITH SAP』のパートナーです
キャップジェミニ、あなたの『RISE WITH SAP』のパートナーです
 
Property & Casualty Insurance Top Trends 2021
Property & Casualty Insurance Top Trends 2021Property & Casualty Insurance Top Trends 2021
Property & Casualty Insurance Top Trends 2021
 
Life Insurance Top Trends 2021
Life Insurance Top Trends 2021Life Insurance Top Trends 2021
Life Insurance Top Trends 2021
 
Top Trends in Commercial Banking: 2021
Top Trends in Commercial Banking: 2021Top Trends in Commercial Banking: 2021
Top Trends in Commercial Banking: 2021
 
Top Trends in Wealth Management: 2021
Top Trends in Wealth Management: 2021Top Trends in Wealth Management: 2021
Top Trends in Wealth Management: 2021
 
Top Trends in Payments: 2021
Top Trends in Payments: 2021Top Trends in Payments: 2021
Top Trends in Payments: 2021
 
Health Insurance Top Trends 2021
Health Insurance Top Trends 2021Health Insurance Top Trends 2021
Health Insurance Top Trends 2021
 
Top Trends in Retail Banking: 2021
Top Trends in Retail Banking: 2021Top Trends in Retail Banking: 2021
Top Trends in Retail Banking: 2021
 
Capgemini’s Connected Autonomous Planning
Capgemini’s Connected Autonomous PlanningCapgemini’s Connected Autonomous Planning
Capgemini’s Connected Autonomous Planning
 
Top Trends in Retail Banking: 2020
Top Trends in Retail Banking: 2020Top Trends in Retail Banking: 2020
Top Trends in Retail Banking: 2020
 
Top Trends in Life Insurance: 2020
Top Trends in Life Insurance: 2020Top Trends in Life Insurance: 2020
Top Trends in Life Insurance: 2020
 
Top Trends in Health Insurance: 2020
Top Trends in Health Insurance: 2020Top Trends in Health Insurance: 2020
Top Trends in Health Insurance: 2020
 
Top Trends in Payments: 2020
Top Trends in Payments: 2020Top Trends in Payments: 2020
Top Trends in Payments: 2020
 

Recently uploaded

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 

Recently uploaded (20)

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 

Improve Security of App Portfolio with On-Demand Testing

  • 1. DISCOVER 2015 1-3 December, London Improve the security of your application portfolio in a few days with on-demand testing services London, December 2, Yves Le Floch
  • 2. 2Copyright © 2015 Capgemini and Sogeti. All Rights Reserved Improve the security of your application portfolio | December 2nd, 2015 Capgemini positioning
  • 3. 3Copyright © 2015 Capgemini and Sogeti. All Rights Reserved Improve the security of your application portfolio | December 2nd, 2015 Cybersecurity services portfolio
  • 4. 4Copyright © 2015 Capgemini and Sogeti. All Rights Reserved Improve the security of your application portfolio | December 2nd, 2015 Capgemini Cybersecurity video
  • 5. 5Copyright © 2015 Capgemini and Sogeti. All Rights Reserved Improve the security of your application portfolio | December 2nd, 2015 Improve the security of your applications ! The World Quality Report: Application Security Findings ! Application security: the next challenge ! Best Practice: a secure software development lifecycle ! Application Security Testing as a Service ! Platform demonstration ! Questions & Answers
  • 6. The World Quality Report: Application Security Findings
  • 7. 7Copyright © 2015 Capgemini and Sogeti. All Rights Reserved Improve the security of your application portfolio | December 2nd, 2015 The World Quality Report 2015-16 Companysize:1,000– 4,999,5,000–10,000 and10,000+ Controlledmix ofCIOs, ITDirectors,VP Applications/QA,Testing ManagerandCDO/CMO Seenextslidefor detailedsplits 1560interviews CATI25%(390) CAWI75%(1170) Globalstudy April– June2015 Allinterviews conductedabidedby therulesand regulationssetbythe MRS How When Where Who What Studydetails
  • 8. 8Copyright © 2015 Capgemini and Sogeti. All Rights Reserved Improve the security of your application portfolio | December 2nd, 2015 The Top 5 most important aspects of your IT strategy
  • 9. 9Copyright © 2015 Capgemini and Sogeti. All Rights Reserved Improve the security of your application portfolio | December 2nd, 2015 Focus areas for IT Strategy
  • 10. 10Copyright © 2015 Capgemini and Sogeti. All Rights Reserved Improve the security of your application portfolio | December 2nd, 2015 Commonly performed security testing activities
  • 11. 11Copyright © 2015 Capgemini and Sogeti. All Rights Reserved Improve the security of your application portfolio | December 2nd, 2015 The Top 5 most important aspects of your IT strategy
  • 12. 12Copyright © 2015 Capgemini and Sogeti. All Rights Reserved Improve the security of your application portfolio | December 2nd, 2015 In what stage of Application Lifecycle is security testing undertaken?
  • 13. Application security: the next challenge
  • 14. 14Copyright © 2015 Capgemini and Sogeti. All Rights Reserved Improve the security of your application portfolio | December 2nd, 2015 Giant data breaches!
  • 15. 15Copyright © 2015 Capgemini and Sogeti. All Rights Reserved Improve the security of your application portfolio | December 2nd, 2015 What is the challenge enterprises are facing? 68% increase in mobile application vulnerability disclosures 5 Infrastructure security is rather mature, when application security is rather new
  • 16. 16Copyright © 2015 Capgemini and Sogeti. All Rights Reserved Improve the security of your application portfolio | December 2nd, 2015 How to measure the issue?
  • 17. 17Copyright © 2015 Capgemini and Sogeti. All Rights Reserved Improve the security of your application portfolio | December 2nd, 2015 The Top 10 Application security risks
  • 18. 18Copyright © 2015 Capgemini and Sogeti. All Rights Reserved Improve the security of your application portfolio | December 2nd, 2015 The current state of security Organizations are under increased pressure to develop new applications to support digital transformation – whether internal or external facing !  Applications delivered quickly, focus on ergonomics and little focus on governance !  Many incorporate sensitiv<e data that can be breached, should any vulnerability be left !  Do you know how many applications your organization has? How many critical applications? Security checks left to the end of the development lifecycle (penetration testing) !  Penetration testing is no longer enough: too little too late !  Too expensive to perform pentests or manual code reviews at each releases !  Much less costly to fix security issues before the application is deployed (i.e. in QA/integration) Network and infrastructure security testing now widely covered, but lack of maturity at the application level !  Lack of a formal & systematic process to prevent vulnerabilities before the breach •  Hackers know that : 80%+ of breaches happen at application level
  • 19. 19Copyright © 2015 Capgemini and Sogeti. All Rights Reserved Improve the security of your application portfolio | December 2nd, 2015 What does a good approach look like? ! Supports your digital transformation ! Proactive instead of reactive ! Includes: • Building security into the development process • Comprehensive testing: automated scanning, expert assessment and penetration testing • Secure architecture & deployment ! Security issues are fixed before the application goes into production ! Issues prioritised by risk and business criticality ! Cost effective ! Rapidly implemented
  • 20. Best Practice: a secure software development lifecycle
  • 21. 21Copyright © 2015 Capgemini and Sogeti. All Rights Reserved Improve the security of your application portfolio | December 2nd, 2015 Best Practice Approach: Overview 1. Discover 2. Patch 3. Security Gate 4. Shift-Left 5. Mature 1.  Identify the scope of the problem 2.  Fix the critical vulnerabilities in the high risk applications 3.  Establish a Security Gate 4.  Add security controls earlier in the Software Development Life-cycle 5.  Raise the security bar
  • 22. 22Copyright © 2015 Capgemini and Sogeti. All Rights Reserved Improve the security of your application portfolio | December 2nd, 2015 Best Practice Approach: Discover 1. Discover Create risk ranked inventory of on-line applications •  Web, Facebook, mobile •  In-house developed, out-sourced, third-party •  Basic risk categorization Assess sample of applications •  Dynamic Application Security Testing Establish the business case •  Gain executive sponsorship Don‘t wait for a breach!
  • 23. 23Copyright © 2015 Capgemini and Sogeti. All Rights Reserved Improve the security of your application portfolio | December 2nd, 2015 Best Practice Approach: Patch 2. Patch Reduce exposure to critical vulnerabilities in high risk applications Complete assessment of high risk applications –  Identify critical vulnerabilities Remediate –  Retire or replace application –  Block with WAF/IPS –  Work with development to fix Commence Application Security Awareness program These can’t wait!
  • 24. 24Copyright © 2015 Capgemini and Sogeti. All Rights Reserved Improve the security of your application portfolio | December 2nd, 2015 Best Practice Approach: Security Gate 3. Security Gate Define and Implement Policy •  Application risk category specific •  Update Internal Standards •  Add to Vendor Contracts Implement a Security Gate •  Enforce policy for all new apps and major releases •  Work through backlog by risk category –  Advisory initially then enforce incrementally Publicise Program •  Publish KPI’s •  Identify Security Champions
  • 25. 25Copyright © 2015 Capgemini and Sogeti. All Rights Reserved Improve the security of your application portfolio | December 2nd, 2015 Best Practice Approach: Shift-Left 4. Shift-Left Embed Static Application Security Testing in development process •  In-house development teams –  IDE Integration –  Build Integration –  Bug-tracking •  Offer to key out-source suppliers and third-parties Secure Development Training Program •  Secure Development Guidelines •  Mandatory Role-based training
  • 26. 26Copyright © 2015 Capgemini and Sogeti. All Rights Reserved Improve the security of your application portfolio | December 2nd, 2015 Best Practice Approach: Mature 5. Mature Raise Security Bar •  E.g. Policy now includes addressing ‘medium’ rated vulnerabilities for high risk applications Increase scope •  Internal Applications BSIMM assessment of SDLC •  Identify and implement additional security controls –  Threat Modelling –  Security Architecture Review Use metrics to drive continuous improvement •  Add application security performance to vendor selection Move cost of assessments to third-party vendors
  • 27. 27Copyright © 2015 Capgemini and Sogeti. All Rights Reserved Improve the security of your application portfolio | December 2nd, 2015 Best Practice Approach: Summary 1. Discover 2. Patch 3. Security Gate 4. Shift-Left 5. Mature 1.  Identify the scope of the problem •  Take advantage of automated discovery approach 2.  Fix the critical vulnerabilities in the high risk applications •  Retire or block to minimize impact on development. Fix if you have to. 3.  Establish a Security Gate •  Use cloud–based solution like Fortify on Demand for speed and scalability 4.  Add security controls earlier in the Software Development Life-cycle •  Add SAST and role-based security training to your SDLC 5.  Raise the security bar •  Use metrics to drive continuous improvement
  • 29. 29Copyright © 2015 Capgemini and Sogeti. All Rights Reserved Improve the security of your application portfolio | December 2nd, 2015 An industrial Application Security Testing platform
  • 30. 30Copyright © 2015 Capgemini and Sogeti. All Rights Reserved Improve the security of your application portfolio | December 2nd, 2015 Delivered by Capgemini/Sogeti, powered by Hewlett Packard Enterprise – Combining the power of two market leaders Capgemini - Sogeti recognized as a leader for independent Testing Services HP recognized as a leader by Gartner for Application Security Testing
  • 31. 31Copyright © 2015 Capgemini and Sogeti. All Rights Reserved Improve the security of your application portfolio | December 2nd, 2015 Combining manual/automated testing, static/dynamic testing, pentest SAST - Static application security testing: Test is done on modules on the written code (not running) • Can be performed during of after development process, early in the lifecycle, no server required • Manual and automated analysis of the source, bytecode or binary code • Linked to code, provides useful and clear clues for remediation • Integrate application security testing into Development / Quality Assurance processes -> to be performed early in the process DAST - Dynamic application security testing: Test is done on the running code, which is challenged to reveal vulnerabilities • Test the runtime application on integration or production platform. • Manual and automated analysis of the running application • Can be performed only at the end of the development process • Results more difficult to exploit, but closer to a real attack Code manual review Expert analysis of the code • Can be performed early in the lifecycle, no server required • Linked to code, provides useful and clear clues for remediation • Find all vulnerabilities with the right criticality analysis • Expert intensive (expensive, difficult to scale, slow) Penetration testing: The ethical hacker performs a real hacking • Very similar to what a real hacker would do • Provides a good view of the operational risks • Exploits vulnerabilities in order to demonstrate exploitability • Alco covers servers and production vulnerabilities • Late in the process • Expert intensive (expensive, difficult to scale, slow)
  • 32. 32Copyright © 2015 Capgemini and Sogeti. All Rights Reserved Improve the security of your application portfolio | December 2nd, 2015 Objective: an industrial Security testing capacity Supported by best-in-classApplication security testing tools1 Maximizing the industrialapproach (reduceddelay and cost)2 Entirely managed/hosted by Sogetiin Europe forsecurity and trust reasons3 Offering on-line accessforclients (management,assessments,reports…)4 Allowing maximumadaptationto client risk and budgetpriorities5 Allowing Rightshore delivery upon clientrequestforimproved delay and cost6 Pay peruse: no investment,no license,no hardware,no expertise required7
  • 33. 33Copyright © 2015 Capgemini and Sogeti. All Rights Reserved Improve the security of your application portfolio | December 2nd, 2015 Platform demonstration
  • 34. 34Copyright © 2015 Capgemini and Sogeti. All Rights Reserved Improve the security of your application portfolio | December 2nd, 2015 Access to a leading tool and proven expertise
  • 35. 35Copyright © 2015 Capgemini and Sogeti. All Rights Reserved Improve the security of your application portfolio | December 2nd, 2015 How it works Customeruploadssoftware or dynamic accessdata directly on his portal Upload Dynamic,static and/ormobile automatic testing Scan Expertreview and additional tests to ensure minimalfalse positives and falsenegatives Review
  • 36. 36Copyright © 2015 Capgemini and Sogeti. All Rights Reserved Improve the security of your application portfolio | December 2nd, 2015 The benefits ! Regularly checkedand updated by HP’s Security Researchteam who find four times the number of new critical vulnerabilities than the rest of the market combined (Frost and Sullivan) ! Easy to purchase Launchyour application securityinitiative in < 1 day ! No hardware or software investments ! No security experts to hire, train and retain Simple Scale to test all sensitive applicationsin your organization ! From one-day turn-around on applicationsecurity results ! Potentially support 1000sof applicationsfor desktop, mobile or cloud ! Dynamic and static testing with manual review Fast & Comprehensive Test anyapplication ! Secure commercial, open source and 3rd party applications ! Test applications on demand according to risk and budget Flexible
  • 37. 37Copyright © 2015 Capgemini and Sogeti. All Rights Reserved Improve the security of your application portfolio | December 2nd, 2015 Comprehensive and accurate testing
  • 38. 38Copyright © 2015 Capgemini and Sogeti. All Rights Reserved Improve the security of your application portfolio | December 2nd, 2015 Multiple levels of testing based on application risk Low Medium High Basic assessment Standard assessment Premium assessment ! Marketing Site ! Personally identifiable information ! Business useful ! Credit card/ SSN information ! Business critical
  • 40. 40Copyright © 2015 Capgemini and Sogeti. All Rights Reserved Improve the security of your application portfolio | December 2nd, 2015 Contact information Yves Le Floch VP, Head of CyberSecurity Business Development Sogeti yves.le-floch@sogeti.com +33 1 55 00 13 41 David Harper Fortify on Demand Practice Principal, EMEA Hewlett Packard Enterprise david.harper@hpe.com +44 751 528 5200
  • 41. www.sogeti.com www.capgemini.com The information contained in this presentation is proprietary and confidential. It is for internal and intermediary use only. Copyright © 2015 Capgemini and Sogeti. All rights reserved. Rightshore® is a trademark belonging to Capgemini. No part of this presentation may be modified, deleted or expanded by any process or means without prior written permission from Capgemini. About Capgemini and Sogeti Now with 180,000 people in over 40 countries, Capgemini is one of the world's foremost providers of consulting, technology and outsourcing services. The Group reported 2014 global revenues of EUR 10.573 billion. Together with its clients, Capgemini creates and delivers business, technology and digital solutions that fit their needs, enabling them to achieve innovation and competitiveness. A deeply multicultural organization, Capgemini has developed its own way of working, the Collaborative Business Experience™, and draws on Rightshore®, its worldwide delivery model. Sogeti is a leading provider of technology and software testing, specializing in Application, Infrastructure and Engineering Services. Sogeti offers cutting-edge solutions around Testing, Business Intelligence & Analytics, Mobile, Cloud and Cyber Security. Sogeti brings together more than 20,000 professionals in 15 countries and has a strong local presence in over 100 locations in Europe, USA and India. Sogeti is a wholly-owned subsidiary of Cap Gemini S.A., listed on the Paris Stock Exchange.