SlideShare una empresa de Scribd logo
1 de 47
Descargar para leer sin conexión
Solving the Enterprise Security Challenge


             Derek F Holt
             Worldwide Sales Executive
             Jazz, Security, Software Delivery Platform
             dfholt@us.ibm.com




© 2009 IBM Corporation
IBM Rational Software Conference 2009

Online Risks Continue to Increase
                                                    Visa, Amex Cut Ties with CardSystems
                                                        July 19, 2005 -- Visa USA Inc. and American Express Co. are
                                                        cutting ties with the payment-processing company that left 40 million
                                                        credit and debit card accounts vulnerable to hackers in one of the
                                                        biggest breaches of consumer data

 Jan 18, 2007
 Massive Security Breach Reveals Credit Card Data
 The TJX Companies, a large retailer that operates more than 2,000 retail stores under brands
 such as Bob’s Stores, HomeGoods, Marshalls, T.J. Maxx and A.J. Wright, said on Wednesday
 that it suffered a massive computer breach on a portion of its network that handles credit card,
 debit card, check and merchandise transactions in the United States and abroad.



                                                                    BJ's Settles Case with FTC over Customer Data
                                                                     FTC alleges weak security at wholesale club led to fraudulent sales valued in the millions
                                                                     JUNE 17, 2005 -- After credit card data for thousands of customers was used to make
                                                                     fraudulent purchases in other stores, BJ's Wholesale Club Inc. has agreed

  CNBC's Easy Money
  BusinessWeek uncovers that the cable channel's own design flaw
  may be behind the investigation into its million-dollar stock-
  picking contest

                                                                  USDA admits data breach, thousands of social
                                                                  security numbers revealed
                                                                  Thursday, 17 April 2007
                                                                  (AXcess News) Washington - The US Department of Agriculture (USDA) admitted that a security
                                                                  breach allowed social security and other personal information of over 63,000 recipients of federal
                                                                  farm loans be made available on a public website in violation of Federal privacy laws.


                                                                                                                                                                       22
IBM Rational Software Conference 2009



   Breach Attempts Increase in Times of
   Economic Crisis
    " In 2009, security products will remain stronger than other IT areas
    because of compliance and business requirements. In fact, a recent IDC
    economic meltdown study showed that security was the least likely area
    to face cuts in response to the current economic crisis. Many
    organizations will defer discretionary projects, freeze hiring, and actively
    look for savings from virtualization, hosted services, and automated
    security management."
                                               Source: December 2008, IDC #215745




    “…just as street crime increases in times of financial stress, more
    attackers are likely to perform an online version of shoplifting and bank
    robbery ."
                                               Source: October 2008, DarkReading



                                                                                    33
IBM Rational Software Conference 2009



2008 Web Threats Take Center Stage
    Web application vulnerabilities
      Web applications have become the Achilles heel of Corporate IT Security
      Represent largest category in vuln disclosures (55% in 2008)
      This number does not include custom-developed Web applications!
      74% of Web application vulnerabilities disclosed in 2008 have no patch to fix them




4                                                                                          4
IBM Rational Software Conference 2009



Reality: Most Attacks are Targeted at Web Apps




                      75%
                                of All Attacks on Information Security are
                                Directed to the Web Application Layer
                       2/3 of All Web Applications are Vulnerable            **Gartner

                                                                                         55
IBM Rational Software Conference 2009



Changing Security Landscape of Today
 “Webification” has changed everything
    Infrastructure is more abstract and less defined
    Everything needs a web interface
    Agents and heavy clients are no longer acceptable
    Traditional defenses no longer apply




 Many Web Security Drivers
    Increase in vulnerabilities / disclosures
       Application security has become the top threat
    Regulatory Compliance
        Requirements such as PCI, HIPAA, GLBA, SOX, etc
    User demand
       For rich applications is pushing development to advanced code
       techniques – Web 2.0 introducing more risks to threats
    Enterprise Modernization                                                Web Applications
       Driving traditional applications to online world (SOA), increasing
       corporate risk
    Cost cutting in current economic climate
       Demands increased efficiencies




                                                                                               66
IBM Rational Software Conference 2009



Who Do We Need To Protect our Enterprise From?


     $
                          Organized Crime
                            What: Data & Identity Theft, Extortion
                            Why: Profit




                                     Espionage (Nation State & Corporate)
                                          What: Data Theft & Intellectual Property
                                          Why: Power




                                                H4ck0rZ / Script Kiddies
                                                   What: Defacement & Denial of Service
                                                   Why: Prestige




                                                                                          7
IBM Rational Software Conference 2009
              The Cost Of A Breach, Broken Out For Three Sample
              Companies




        September 2008 “Confessions Of A QSA: The Inside Story Of PCI Compliance”


                                                                                    8
IBM Rational Software Conference 2009



Why Are Our Enterprises at Risk?
      1. Developers are not trained in security
            Most computer science curricula have no security courses
            Focus is on developing features
            Security vulnerability = BUG


      2. Under investment from security teams
            Lack of tools, policies, processes, people


      3. Growth in complex, mission critical online applications
            Online banking, commerce,
            Web 2.0, etc (AJAX, JSON, AMF, JavaScript, Adobe Flash, etc)




                                                                           9
IBM Rational Software Conference 2009



Organizations must mitigate their online risk!

   Organizations need to mitigate the risk of a Web
   Application Security breach!
      They need to find and remediate vulnerabilities in their Web Applications before they are
      exploited by Hackers
      They need to do this in a cost effective manner




                                                                                                  10
IBM Rational Software Conference 2009



Application Security Maturity Model
           UNAWARE     AWARENESS            CORRECTIVE      OPERATIONS
                         PHASE                PHASE      EXCELLENCE PHASE


                                                             10 %

                                              30 %
Maturity




                          30 %

           30 %


                                  Duration 2-3 Years                Time



                                                                            11
IBM Rational Software Conference 2009


  Addressing Web Application Security
            Approaches for addressing Web Application Security

                                                                          Enterprise-Wide
                                                        Strategic
                                                        Strategic         Scalable Solution


                                        Internal
                                        Internal          Manual Efforts, Desktop Audit Tools
                                        Tactical
                                        Tactical          Internal Security Experts


                                          Consultants
                     Outsourced
                     Outsourced           Pen Testing



    Do Nothing
    Do Nothing


                                                                                                 12
                                                                                                12
IBM Rational Software Conference 2009



What is the cost of a defect?
   80% of development costs are spent
    identifying and correcting defects!




                                                                                   Once released
                                                         During the                 as a product
                                                         QA/Testing
                                                                                  $16,000/defect
                           During the build                phase
   During the                   phase                    $450/defect
  coding phase
                              $100/defect
    $25/defect


                           The increasing costs of fixing a defect….

                                            National Institute of Standards and Technology (NIST)   13
IBM Rational Software Conference 2009



Enabling the Operationalization of Security Testing
 Clients are addressing Web Application Security in three ways:

        Outsource Security                         Enable Security                       Embed Security into
          Testing (SaaS)                             Specialists                           Development
                                                                                  Implement environment-specific security
  Outsource web application security       Requires web application security      testing solution for select stakeholders
  infrastructure or testing                subject matter expertise
                                                                                  Alleviates security testing bottleneck
  Enables immediate identification of      Single-step security testing (no       downstream
  sources of online risk without the       additional oversight required as
                                                                                  Increases security awareness across the
  necessary time and investment for in-    expertise is built-in)                 organization (code security improvement,
  house training and resources             Eliminates training requirements for   vulnerability awareness)
  Fastest path to actionable information   non-security experts                   Enables a more efficient process for on-
                                                                                  time and on-budget application
                                                                                  development




    Customers receive actionable
             reports
       (AppScan OnDemand)



                  Control, Monitor, Collaborate and Report Web Application Security Testing



                                                                                                                           14
IBM Rational Software Conference 2009



Outsourced Testing: Case Study

   An enterprise that has
        Many legacy and newly created web applications
        A small security team compared to the number of web applications
        requiring security testing
        Developers that are not that aware of security

   The challenge
        Limited resources
        Need for detailed and actionable test results
        Need to test a large number of web applications



                                                                           15
IBM Rational Software Conference 2009



Outsourced Testing: AppScan OnDemand

        Hosting outsourced to IBM/Rational
             Rational manages the setup, hardware, upgrades, maintenance,
             backups, etc.
        Administration outsourced to IBM/Rational
             Rational creates scan configurations, job schedules, and
             organizes/prioritizes results – i.e. maximizes the product capabilities on
             your behalf
        Business/Security Analyst function outsourced to IBM/Rational
        experts via Solution Management
             Client is trained on how to interpret and use the information resulting from
             AppScan and Policy Tester scans
        Client focuses only on issue remediation = customer success


                                                                                            16
IBM Rational Software Conference 2009



AppScan OnDemand




       Scan Web applications/sites          Analyze                 Report
                                        (identify issues)   (detailed & actionable)




                    VPN




                                                                                      17
IBM Rational Software Conference 2009


PCI DSS Reporting




                                        18
IBM Rational Software Conference 2009


Findings Advisory and Details




                                        19
IBM Rational Software Conference 2009


Remediation Tasks – Action Plan




                                        20
IBM Rational Software Conference 2009



Enabling the Operationalization of Security Testing
 Clients are addressing Web Application Security in three ways:

        Outsource Security                         Enable Security                       Embed Security into
          Testing (SaaS)                             Specialists                           Development
                                                                                  Implement environment-specific security
  Outsource web application security       Requires web application security      testing solution for select stakeholders
  infrastructure or testing                subject matter expertise
                                                                                  Alleviates security testing bottleneck
  Enables immediate identification of      Single-step security testing (no       downstream
  sources of online risk without the       additional oversight required as
                                                                                  Increases security awareness across the
  necessary time and investment for in-    expertise is built-in)                 organization (code security improvement,
  house training and resources             Eliminates training requirements for   vulnerability awareness)
  Fastest path to actionable information   non-security experts                   Enables a more efficient process for on-
                                                                                  time and on-budget application
                                                                                  development




                                                Security Team uses
   Customers receive actionable
                                             AppScan Standard Edition &
            reports
                                             AppScan Reporting Console
      (AppScan OnDemand)



                  Control, Monitor, Collaborate and Report Web Application Security Testing



                                                                                                                           21
IBM Rational Software Conference 2009



Enabling Security Team: Case Study

   An enterprise that has
        Many web applications
        A policy requiring applications pass a security audit before going to production
        A security team in place to audit the applications
        A process for fixing security issues
             Security issues found are sent back to developers
             Developers communicate with the security team and implement the fix.
             More rounds of auditing until the application passes the security audit

   The challenge
             Security team’s capacity is insufficient for the number of applications and security
             issues
             Developers need more detailed information and reproduction scenarios for the security
             issues detected
             How to securely get the results to the Developers and manage them


                                                                                                     22
IBM Rational Software Conference 2009


AppScan Standard Edition




                                        23
IBM Rational Software Conference 2009

AppScan Standard Edition




                                        24
IBM Rational Software Conference 2009

AppScan Standard Edition




                                        25
IBM Rational Software Conference 2009

AppScan Standard Edition




                                        26
IBM Rational Software Conference 2009



 The Power of AppScan Reporting Console

                                        AppScan Reporting
                                            Console




                    VISIBILITY                         CONTROL




                                                                 27
IBM Rational Software Conference 2009



  AppScan Reporting Console – Dashboards and Metrics




                                                       28
IBM Rational Software Conference 2009


Visibility

        Visibility of security issues
             Sharing data to all stakeholders
             Security people collaborating with developers to fix security issues
        Control of Who Can Access/Manage Results
                 Provides central control and oversight
        How it works:
             Customer hosts AppScan Reporting Console
             Developers provide application information to the security team
             Security team tests the applications, compiles reports
             Security team communicates security issues to development, by sending
             link to report within AppScan Reporting Console or by pushing defects
             into the defect tracking system
             Once the issues are fixed, the tests are re-done and issues are managed


                                                                                       29
IBM Rational Software Conference 2009



Enabling the Operationalization of Security Testing
 Clients are addressing Web Application Security in three ways:

        Outsource Security                         Enable Security                       Embed Security into
          Testing (SaaS)                             Specialists                           Development
                                                                                  Implement environment-specific security
  Outsource web application security       Requires web application security      testing solution for select stakeholders
  infrastructure or testing                subject matter expertise
                                                                                  Alleviates security testing bottleneck
  Enables immediate identification of      Single-step security testing (no       downstream
  sources of online risk without the       additional oversight required as
                                                                                  Increases security awareness across the
  necessary time and investment for in-    expertise is built-in)                 organization (code security improvement,
  house training and resources             Eliminates training requirements for   vulnerability awareness)
  Fastest path to actionable information   non-security experts                   Enables a more efficient process for on-
                                                                                  time and on-budget application
                                                                                  development




                                                Security Team uses
    Customers receive actionable                                                            Developers use
                                              AppScan Standard Edition
             reports                                                                      AppScan Enterprise
                                            & AppScan Reporting Console
       (AppScan OnDemand)



                  Control, Monitor, Collaborate and Report Web Application Security Testing



                                                                                                                           30
IBM Rational Software Conference 2009



Security in Development: Case Study

   An enterprise that has
        Development teams who are aware of the security challenge and would like to fix security issues at
        an early in the development lifecycle for lower cost
        Developers that:
             Incorporate security testing as part of the development work.
             Test their changes to the application before delivering these changes to the source stream
             Log defects or fix them immediately
        A security team that:
             Oversees the applications’ issues
             Audit the applications before going to production


   The challenge
        Enabling developers who are not security experts to perform security testing
        Enable security team to maintain control and oversight of the security testing




                                                                                                             31
IBM Rational Software Conference 2009



Security In Development: Scalability and Control

     Scalability
        Scale up to large security scans
        Scale out to different user communities
          QuickScan UI enables non-security expert to do security scanning


     Control
          Provides central control and oversight
          Security team uses advanced view to see what scans have been done and results
          Security team collaborates with developers to increase scope of testing




                                                                                          32
IBM Rational Software Conference 2009



 The Power of AppScan Enterprise

                                        AppScan Enterprise
                                             Console




          VISIBILITY                      SCALABILITY        CONTROL




                                                                       33
IBM Rational Software Conference 2009




                                          Dev Team 1
                                                  Scan
                         Scan                   Data and    Dev Team 2
                       Data and                  Reports
        QA Team         Reports

                                                                  Scan
                                                                Data and
                                                                 Reports

                                        ASE Portal
                                                              Scan
                 Scan                                       Data and
               Data and                            Scan      Reports
                Reports                          Data and
                                                  Reports



      Build Team
                                                                Managers


                                        Security Team


                                                                           34
IBM Rational Software Conference 2009


Security In Development: Workflow


    1. Developer Writes Code            4. Developer Checks in Code




  2. Developer compiles code locally
      to unit test changes using        3. Developer Fixes or Logs Issues
         AppScan QuickScan




                                                                            35
IBM Rational Software Conference 2009




                                        36
IBM Rational Software Conference 2009




                                        37
IBM Rational Software Conference 2009




                                        38
IBM Rational Software Conference 2009




                                        39
IBM Rational Software Conference 2009




                                        40
IBM Rational Software Conference 2009




                                        41
IBM Rational Software Conference 2009


IBM Rational Web-Based Training
Key to adoption across the organization is education

    Informative
    Learn at your own pace
    Self-paced
    Engaging (narrated by
    experts)
    Accessible
    Localizable
    Compatible with other
    Learning Management
    Systems
    Easily embedded into
    Rational AppScan Enterprise
    and Policy Tester products




                                                     Audio ON/OFF
                                  Progress Reports
                                                                    Closed Captioning

                                                                                    42
IBM Rational Software Conference 2009

 IBM Rational AppScan – Security in the SDLC
           CODE                          BUILD                              QA                       SECURITY


                                        AppScan Enterprise / Reporting Console




                 AppScan Ent.                                      (scanning agent)                AppScan       AppScan
    AppScan                          AppScan Build Ed
  Developer Ed    QuickScan                                                      (QA clients)   Enterprise user Standard Ed
                  (web client)        (scanning agent)               AppScan Tester Ed            (web client)    (desktop)
    (desktop)

                Ounce Labs Products *NEW!!!


   Rational        Rational
  Application      Software       Rational         Rational                 Rational Quality
  Developer        Analyzer      ClearCase        BuildForge                   Manager

                                  Rational ClearQuest / Defect Management

                                 IBM Rational Web Based Training for AppScan

  Build security testing into      Automate Security /         Security / compliance testing     Security & Compliance
           the IDE               Compliance testing in the      incorporated into testing &        Testing, oversight,
                                     Build Process                remediation workflows           control, policy, audits

                                                                                                                              43
IBM Rational Software Conference 2009


The Maturing Security Industry – Evolving Analysis Techniques
  Dynamic Analysis <> Blackbox
  - Sending tests to a functioning
  application




                                                    Total Potential
                                                    Security Issues




                                              Static    Runtime    Dynamic
   Static Code Analysis <> Whitebox          Analysis   Analysis   Analysis
   - Looking at the code for issues (code-
   level scanning)




                                                                              44
IBM Rational Software Conference 2009

Rational AppScan Development and Ounce Labs
An end to end security solution
     AppScan continues to be recognized as the leader
     in Dynamic Analysis Security Testing (DAST)
     With the addition of Ounce Labs (a recognized
     leader in Static Analysis Security Testing), IBM                    Total Potential
     now has an unprecedented end to end security                        Security Issues
     portfolio.



                                                                   Static    Runtime    Dynamic
       Business Outcome                                           Analysis   Analysis   Analysis

         Enable more people to contribute to security testing
         coverage with solutions for specific use cases
         Use case offerings facilitate the adoption of security
         with minimal disruption to existing objectives




                                                                                                   45
IBM Rational Software Conference 2009




                                        46
IBM Rational Software Conference 2009




© Copyright IBM Corporation 2009. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind,
express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have
the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM
software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and/or capabilities
referenced in these materials may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature
availability in any way. IBM, the IBM logo, Rational, the Rational logo, Telelogic, the Telelogic logo, and other IBM products and services are trademarks of the International Business Machines
Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others.


                                                                                                                                                                                                47

Más contenido relacionado

La actualidad más candente

Brand Protect Services
Brand Protect ServicesBrand Protect Services
Brand Protect ServicesDavid Hughes
 
Closing the gaps in enterprise data security: A model for 360 degrees protection
Closing the gaps in enterprise data security: A model for 360 degrees protectionClosing the gaps in enterprise data security: A model for 360 degrees protection
Closing the gaps in enterprise data security: A model for 360 degrees protectionFindWhitePapers
 
Arrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBM
Arrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBMArrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBM
Arrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBMArrow ECS UK
 
Omlis Data Breaches Report - An Inside Perspective
Omlis Data Breaches Report - An Inside Perspective Omlis Data Breaches Report - An Inside Perspective
Omlis Data Breaches Report - An Inside Perspective Omlis
 
The Economic Impact of File Virtualization
The Economic Impact of File VirtualizationThe Economic Impact of File Virtualization
The Economic Impact of File VirtualizationFindWhitePapers
 
20101012 CIOnet Cyber Security Final Results
20101012 CIOnet Cyber Security Final Results20101012 CIOnet Cyber Security Final Results
20101012 CIOnet Cyber Security Final ResultsCIONET
 
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...HyTrust
 
Financial Analyst Day 2013
Financial Analyst Day 2013Financial Analyst Day 2013
Financial Analyst Day 2013avelinakauffman
 
Security and Privacy: What Nonprofits Need to Know
Security and Privacy: What Nonprofits Need to KnowSecurity and Privacy: What Nonprofits Need to Know
Security and Privacy: What Nonprofits Need to KnowTechSoup
 
Mobile security summit - 10 mobile risks
Mobile security summit - 10 mobile risksMobile security summit - 10 mobile risks
Mobile security summit - 10 mobile risksVladimir Jirasek
 
20101012 isa larry_clinton
20101012 isa larry_clinton20101012 isa larry_clinton
20101012 isa larry_clintonCIONET
 
The Cybercriminal Approach to Mobile Fraud: Now They’re Getting Serious
The Cybercriminal Approach to Mobile Fraud: Now They’re Getting SeriousThe Cybercriminal Approach to Mobile Fraud: Now They’re Getting Serious
The Cybercriminal Approach to Mobile Fraud: Now They’re Getting SeriousIBM Security
 
Retail Stores and Wireless Security—Recommendations
Retail Stores and Wireless Security—RecommendationsRetail Stores and Wireless Security—Recommendations
Retail Stores and Wireless Security—RecommendationsAirTight Networks
 
Trend Micro - Virtualization and Security Compliance
Trend Micro - Virtualization and Security Compliance Trend Micro - Virtualization and Security Compliance
Trend Micro - Virtualization and Security Compliance 1CloudRoad.com
 
Choosing the Right Data Security Solution
Choosing the Right Data Security SolutionChoosing the Right Data Security Solution
Choosing the Right Data Security SolutionProtegrity
 

La actualidad más candente (20)

Brand Protect Services
Brand Protect ServicesBrand Protect Services
Brand Protect Services
 
Data Breach Response Guide (Whitepaper))
Data Breach Response Guide (Whitepaper))Data Breach Response Guide (Whitepaper))
Data Breach Response Guide (Whitepaper))
 
Closing the gaps in enterprise data security: A model for 360 degrees protection
Closing the gaps in enterprise data security: A model for 360 degrees protectionClosing the gaps in enterprise data security: A model for 360 degrees protection
Closing the gaps in enterprise data security: A model for 360 degrees protection
 
Dr K Subramanian
Dr K SubramanianDr K Subramanian
Dr K Subramanian
 
Arrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBM
Arrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBMArrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBM
Arrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBM
 
Omlis Data Breaches Report - An Inside Perspective
Omlis Data Breaches Report - An Inside Perspective Omlis Data Breaches Report - An Inside Perspective
Omlis Data Breaches Report - An Inside Perspective
 
The Economic Impact of File Virtualization
The Economic Impact of File VirtualizationThe Economic Impact of File Virtualization
The Economic Impact of File Virtualization
 
20101012 CIOnet Cyber Security Final Results
20101012 CIOnet Cyber Security Final Results20101012 CIOnet Cyber Security Final Results
20101012 CIOnet Cyber Security Final Results
 
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
 
Financial Analyst Day 2013
Financial Analyst Day 2013Financial Analyst Day 2013
Financial Analyst Day 2013
 
1 s2.0-s0167404801002097-main
1 s2.0-s0167404801002097-main1 s2.0-s0167404801002097-main
1 s2.0-s0167404801002097-main
 
Security and Privacy: What Nonprofits Need to Know
Security and Privacy: What Nonprofits Need to KnowSecurity and Privacy: What Nonprofits Need to Know
Security and Privacy: What Nonprofits Need to Know
 
Mobile security summit - 10 mobile risks
Mobile security summit - 10 mobile risksMobile security summit - 10 mobile risks
Mobile security summit - 10 mobile risks
 
Breached! The First 48
Breached! The First 48Breached! The First 48
Breached! The First 48
 
20101012 isa larry_clinton
20101012 isa larry_clinton20101012 isa larry_clinton
20101012 isa larry_clinton
 
The Cybercriminal Approach to Mobile Fraud: Now They’re Getting Serious
The Cybercriminal Approach to Mobile Fraud: Now They’re Getting SeriousThe Cybercriminal Approach to Mobile Fraud: Now They’re Getting Serious
The Cybercriminal Approach to Mobile Fraud: Now They’re Getting Serious
 
Retail Stores and Wireless Security—Recommendations
Retail Stores and Wireless Security—RecommendationsRetail Stores and Wireless Security—Recommendations
Retail Stores and Wireless Security—Recommendations
 
Trend Micro - Virtualization and Security Compliance
Trend Micro - Virtualization and Security Compliance Trend Micro - Virtualization and Security Compliance
Trend Micro - Virtualization and Security Compliance
 
Choosing the Right Data Security Solution
Choosing the Right Data Security SolutionChoosing the Right Data Security Solution
Choosing the Right Data Security Solution
 
News letter oct 12
News letter oct 12News letter oct 12
News letter oct 12
 

Similar a Solving the enterprise security challenge - Derek holt

Information Security
Information SecurityInformation Security
Information Securitytrunko
 
PCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio PanadaPCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio PanadaIBM Danmark
 
Cyber Risk for Construction Industry
Cyber Risk for Construction Industry Cyber Risk for Construction Industry
Cyber Risk for Construction Industry BrianHuntMSFCPACRISC
 
21 Cybersecurity Companies You Need to Know.pptx
21 Cybersecurity Companies You Need to Know.pptx21 Cybersecurity Companies You Need to Know.pptx
21 Cybersecurity Companies You Need to Know.pptxSonaliG6
 
Global Cyber Security Industry
Global Cyber Security IndustryGlobal Cyber Security Industry
Global Cyber Security IndustryReportLinker.com
 
Sept 2012 data security & cyber liability
Sept 2012   data security & cyber liabilitySept 2012   data security & cyber liability
Sept 2012 data security & cyber liabilityDFickett
 
Don’t let your organization be in the headlines for the wrong reasons
 Don’t let your organization be in the headlines for the wrong reasons Don’t let your organization be in the headlines for the wrong reasons
Don’t let your organization be in the headlines for the wrong reasonsIBM Security
 
ISSA: Cloud data security
ISSA: Cloud data securityISSA: Cloud data security
ISSA: Cloud data securityUlf Mattsson
 
IBM Tivoli - Security Solutions for the Cloud
IBM Tivoli - Security Solutions for the CloudIBM Tivoli - Security Solutions for the Cloud
IBM Tivoli - Security Solutions for the CloudVincent Kwon
 
Segurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago CavannaSegurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago CavannaSantiago Cavanna
 
Data security in cloud
Data security in cloudData security in cloud
Data security in cloudInterop
 
Key note in nyc the next breach target and how oracle can help - nyoug
Key note in nyc   the next breach target and how oracle can help - nyougKey note in nyc   the next breach target and how oracle can help - nyoug
Key note in nyc the next breach target and how oracle can help - nyougUlf Mattsson
 
Maloney slides
Maloney slidesMaloney slides
Maloney slidesOnkar Sule
 
Emerging application and data protection for multi cloud
Emerging application and data protection for multi cloudEmerging application and data protection for multi cloud
Emerging application and data protection for multi cloudUlf Mattsson
 
IDC Report : Web Security
IDC Report : Web SecurityIDC Report : Web Security
IDC Report : Web SecurityKim Jensen
 
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...IBM Security
 
Bordless Breaches and Migrating Malware
Bordless Breaches and Migrating MalwareBordless Breaches and Migrating Malware
Bordless Breaches and Migrating MalwareSarah Freemantle
 
Key Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence IndexKey Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence IndexIBM Security
 
IBM Cloud for Financial Services Overview
IBM Cloud for Financial Services OverviewIBM Cloud for Financial Services Overview
IBM Cloud for Financial Services OverviewSuzanne Livingston
 

Similar a Solving the enterprise security challenge - Derek holt (20)

Information Security
Information SecurityInformation Security
Information Security
 
PCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio PanadaPCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio Panada
 
Cyber Risk for Construction Industry
Cyber Risk for Construction Industry Cyber Risk for Construction Industry
Cyber Risk for Construction Industry
 
21 Cybersecurity Companies You Need to Know.pptx
21 Cybersecurity Companies You Need to Know.pptx21 Cybersecurity Companies You Need to Know.pptx
21 Cybersecurity Companies You Need to Know.pptx
 
Global Cyber Security Industry
Global Cyber Security IndustryGlobal Cyber Security Industry
Global Cyber Security Industry
 
Sept 2012 data security & cyber liability
Sept 2012   data security & cyber liabilitySept 2012   data security & cyber liability
Sept 2012 data security & cyber liability
 
Don’t let your organization be in the headlines for the wrong reasons
 Don’t let your organization be in the headlines for the wrong reasons Don’t let your organization be in the headlines for the wrong reasons
Don’t let your organization be in the headlines for the wrong reasons
 
Presentación AMIB Los Cabos
Presentación AMIB Los CabosPresentación AMIB Los Cabos
Presentación AMIB Los Cabos
 
ISSA: Cloud data security
ISSA: Cloud data securityISSA: Cloud data security
ISSA: Cloud data security
 
IBM Tivoli - Security Solutions for the Cloud
IBM Tivoli - Security Solutions for the CloudIBM Tivoli - Security Solutions for the Cloud
IBM Tivoli - Security Solutions for the Cloud
 
Segurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago CavannaSegurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago Cavanna
 
Data security in cloud
Data security in cloudData security in cloud
Data security in cloud
 
Key note in nyc the next breach target and how oracle can help - nyoug
Key note in nyc   the next breach target and how oracle can help - nyougKey note in nyc   the next breach target and how oracle can help - nyoug
Key note in nyc the next breach target and how oracle can help - nyoug
 
Maloney slides
Maloney slidesMaloney slides
Maloney slides
 
Emerging application and data protection for multi cloud
Emerging application and data protection for multi cloudEmerging application and data protection for multi cloud
Emerging application and data protection for multi cloud
 
IDC Report : Web Security
IDC Report : Web SecurityIDC Report : Web Security
IDC Report : Web Security
 
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
 
Bordless Breaches and Migrating Malware
Bordless Breaches and Migrating MalwareBordless Breaches and Migrating Malware
Bordless Breaches and Migrating Malware
 
Key Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence IndexKey Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence Index
 
IBM Cloud for Financial Services Overview
IBM Cloud for Financial Services OverviewIBM Cloud for Financial Services Overview
IBM Cloud for Financial Services Overview
 

Más de Roopa Nadkarni

New integrations for synergy and change - Sean Innes
New integrations for synergy and change - Sean InnesNew integrations for synergy and change - Sean Innes
New integrations for synergy and change - Sean InnesRoopa Nadkarni
 
Best practices for effective doors implementation-Ashwini Patil
Best practices for effective doors implementation-Ashwini PatilBest practices for effective doors implementation-Ashwini Patil
Best practices for effective doors implementation-Ashwini PatilRoopa Nadkarni
 
Accelerated test case - Anish bhanu
Accelerated test case - Anish bhanuAccelerated test case - Anish bhanu
Accelerated test case - Anish bhanuRoopa Nadkarni
 
web 2. 0 performance testing - Dave chadwick
web 2. 0 performance testing - Dave chadwickweb 2. 0 performance testing - Dave chadwick
web 2. 0 performance testing - Dave chadwickRoopa Nadkarni
 
RQM in scrum agile testing - Raj kumar
RQM in scrum agile testing - Raj kumarRQM in scrum agile testing - Raj kumar
RQM in scrum agile testing - Raj kumarRoopa Nadkarni
 
Req Pro - Andreas gschwind
Req Pro - Andreas gschwindReq Pro - Andreas gschwind
Req Pro - Andreas gschwindRoopa Nadkarni
 
Extending Rhapsody -Rick boldt
Extending Rhapsody -Rick boldtExtending Rhapsody -Rick boldt
Extending Rhapsody -Rick boldtRoopa Nadkarni
 
EM overview- - Hayden lindsey
EM overview- - Hayden lindseyEM overview- - Hayden lindsey
EM overview- - Hayden lindseyRoopa Nadkarni
 
Application security vision - John b
Application security vision - John bApplication security vision - John b
Application security vision - John bRoopa Nadkarni
 
Smarter Products For A Smarter PLanet - Neeraj Chandra
Smarter Products For A Smarter PLanet - Neeraj ChandraSmarter Products For A Smarter PLanet - Neeraj Chandra
Smarter Products For A Smarter PLanet - Neeraj ChandraRoopa Nadkarni
 
Real Insights Real Results - Steve Robinson
Real Insights Real Results - Steve RobinsonReal Insights Real Results - Steve Robinson
Real Insights Real Results - Steve RobinsonRoopa Nadkarni
 
Overcoming Contradictions - Mike O Rourke
Overcoming Contradictions - Mike O RourkeOvercoming Contradictions - Mike O Rourke
Overcoming Contradictions - Mike O RourkeRoopa Nadkarni
 
Opportunities In Challenging Times - Steve Robinson
Opportunities In Challenging Times - Steve RobinsonOpportunities In Challenging Times - Steve Robinson
Opportunities In Challenging Times - Steve RobinsonRoopa Nadkarni
 
How To Make It Real - Hayden Lindsey
How To Make It Real - Hayden LindseyHow To Make It Real - Hayden Lindsey
How To Make It Real - Hayden LindseyRoopa Nadkarni
 
Achieving Agility At Scale - Martin Nally
Achieving Agility At Scale - Martin NallyAchieving Agility At Scale - Martin Nally
Achieving Agility At Scale - Martin NallyRoopa Nadkarni
 
RPT Oracle Plugin - Anitha Krishnamurthy
RPT Oracle Plugin - Anitha KrishnamurthyRPT Oracle Plugin - Anitha Krishnamurthy
RPT Oracle Plugin - Anitha KrishnamurthyRoopa Nadkarni
 

Más de Roopa Nadkarni (20)

Agile - Monojit basu
Agile - Monojit basuAgile - Monojit basu
Agile - Monojit basu
 
New integrations for synergy and change - Sean Innes
New integrations for synergy and change - Sean InnesNew integrations for synergy and change - Sean Innes
New integrations for synergy and change - Sean Innes
 
Best practices for effective doors implementation-Ashwini Patil
Best practices for effective doors implementation-Ashwini PatilBest practices for effective doors implementation-Ashwini Patil
Best practices for effective doors implementation-Ashwini Patil
 
Agile - Monojit Basu
Agile - Monojit BasuAgile - Monojit Basu
Agile - Monojit Basu
 
Accelerated test case - Anish bhanu
Accelerated test case - Anish bhanuAccelerated test case - Anish bhanu
Accelerated test case - Anish bhanu
 
web 2. 0 performance testing - Dave chadwick
web 2. 0 performance testing - Dave chadwickweb 2. 0 performance testing - Dave chadwick
web 2. 0 performance testing - Dave chadwick
 
RTF - Prasad bhatt
RTF - Prasad bhattRTF - Prasad bhatt
RTF - Prasad bhatt
 
RQM in scrum agile testing - Raj kumar
RQM in scrum agile testing - Raj kumarRQM in scrum agile testing - Raj kumar
RQM in scrum agile testing - Raj kumar
 
Req Pro - Andreas gschwind
Req Pro - Andreas gschwindReq Pro - Andreas gschwind
Req Pro - Andreas gschwind
 
RFT - Ashish Mathur
RFT - Ashish MathurRFT - Ashish Mathur
RFT - Ashish Mathur
 
Extending Rhapsody -Rick boldt
Extending Rhapsody -Rick boldtExtending Rhapsody -Rick boldt
Extending Rhapsody -Rick boldt
 
EM overview- - Hayden lindsey
EM overview- - Hayden lindseyEM overview- - Hayden lindsey
EM overview- - Hayden lindsey
 
Application security vision - John b
Application security vision - John bApplication security vision - John b
Application security vision - John b
 
Smarter Products For A Smarter PLanet - Neeraj Chandra
Smarter Products For A Smarter PLanet - Neeraj ChandraSmarter Products For A Smarter PLanet - Neeraj Chandra
Smarter Products For A Smarter PLanet - Neeraj Chandra
 
Real Insights Real Results - Steve Robinson
Real Insights Real Results - Steve RobinsonReal Insights Real Results - Steve Robinson
Real Insights Real Results - Steve Robinson
 
Overcoming Contradictions - Mike O Rourke
Overcoming Contradictions - Mike O RourkeOvercoming Contradictions - Mike O Rourke
Overcoming Contradictions - Mike O Rourke
 
Opportunities In Challenging Times - Steve Robinson
Opportunities In Challenging Times - Steve RobinsonOpportunities In Challenging Times - Steve Robinson
Opportunities In Challenging Times - Steve Robinson
 
How To Make It Real - Hayden Lindsey
How To Make It Real - Hayden LindseyHow To Make It Real - Hayden Lindsey
How To Make It Real - Hayden Lindsey
 
Achieving Agility At Scale - Martin Nally
Achieving Agility At Scale - Martin NallyAchieving Agility At Scale - Martin Nally
Achieving Agility At Scale - Martin Nally
 
RPT Oracle Plugin - Anitha Krishnamurthy
RPT Oracle Plugin - Anitha KrishnamurthyRPT Oracle Plugin - Anitha Krishnamurthy
RPT Oracle Plugin - Anitha Krishnamurthy
 

Último

"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 

Último (20)

"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 

Solving the enterprise security challenge - Derek holt

  • 1. Solving the Enterprise Security Challenge Derek F Holt Worldwide Sales Executive Jazz, Security, Software Delivery Platform dfholt@us.ibm.com © 2009 IBM Corporation
  • 2. IBM Rational Software Conference 2009 Online Risks Continue to Increase Visa, Amex Cut Ties with CardSystems July 19, 2005 -- Visa USA Inc. and American Express Co. are cutting ties with the payment-processing company that left 40 million credit and debit card accounts vulnerable to hackers in one of the biggest breaches of consumer data Jan 18, 2007 Massive Security Breach Reveals Credit Card Data The TJX Companies, a large retailer that operates more than 2,000 retail stores under brands such as Bob’s Stores, HomeGoods, Marshalls, T.J. Maxx and A.J. Wright, said on Wednesday that it suffered a massive computer breach on a portion of its network that handles credit card, debit card, check and merchandise transactions in the United States and abroad. BJ's Settles Case with FTC over Customer Data FTC alleges weak security at wholesale club led to fraudulent sales valued in the millions JUNE 17, 2005 -- After credit card data for thousands of customers was used to make fraudulent purchases in other stores, BJ's Wholesale Club Inc. has agreed CNBC's Easy Money BusinessWeek uncovers that the cable channel's own design flaw may be behind the investigation into its million-dollar stock- picking contest USDA admits data breach, thousands of social security numbers revealed Thursday, 17 April 2007 (AXcess News) Washington - The US Department of Agriculture (USDA) admitted that a security breach allowed social security and other personal information of over 63,000 recipients of federal farm loans be made available on a public website in violation of Federal privacy laws. 22
  • 3. IBM Rational Software Conference 2009 Breach Attempts Increase in Times of Economic Crisis " In 2009, security products will remain stronger than other IT areas because of compliance and business requirements. In fact, a recent IDC economic meltdown study showed that security was the least likely area to face cuts in response to the current economic crisis. Many organizations will defer discretionary projects, freeze hiring, and actively look for savings from virtualization, hosted services, and automated security management." Source: December 2008, IDC #215745 “…just as street crime increases in times of financial stress, more attackers are likely to perform an online version of shoplifting and bank robbery ." Source: October 2008, DarkReading 33
  • 4. IBM Rational Software Conference 2009 2008 Web Threats Take Center Stage Web application vulnerabilities Web applications have become the Achilles heel of Corporate IT Security Represent largest category in vuln disclosures (55% in 2008) This number does not include custom-developed Web applications! 74% of Web application vulnerabilities disclosed in 2008 have no patch to fix them 4 4
  • 5. IBM Rational Software Conference 2009 Reality: Most Attacks are Targeted at Web Apps 75% of All Attacks on Information Security are Directed to the Web Application Layer 2/3 of All Web Applications are Vulnerable **Gartner 55
  • 6. IBM Rational Software Conference 2009 Changing Security Landscape of Today “Webification” has changed everything Infrastructure is more abstract and less defined Everything needs a web interface Agents and heavy clients are no longer acceptable Traditional defenses no longer apply Many Web Security Drivers Increase in vulnerabilities / disclosures Application security has become the top threat Regulatory Compliance Requirements such as PCI, HIPAA, GLBA, SOX, etc User demand For rich applications is pushing development to advanced code techniques – Web 2.0 introducing more risks to threats Enterprise Modernization Web Applications Driving traditional applications to online world (SOA), increasing corporate risk Cost cutting in current economic climate Demands increased efficiencies 66
  • 7. IBM Rational Software Conference 2009 Who Do We Need To Protect our Enterprise From? $ Organized Crime What: Data & Identity Theft, Extortion Why: Profit Espionage (Nation State & Corporate) What: Data Theft & Intellectual Property Why: Power H4ck0rZ / Script Kiddies What: Defacement & Denial of Service Why: Prestige 7
  • 8. IBM Rational Software Conference 2009 The Cost Of A Breach, Broken Out For Three Sample Companies September 2008 “Confessions Of A QSA: The Inside Story Of PCI Compliance” 8
  • 9. IBM Rational Software Conference 2009 Why Are Our Enterprises at Risk? 1. Developers are not trained in security Most computer science curricula have no security courses Focus is on developing features Security vulnerability = BUG 2. Under investment from security teams Lack of tools, policies, processes, people 3. Growth in complex, mission critical online applications Online banking, commerce, Web 2.0, etc (AJAX, JSON, AMF, JavaScript, Adobe Flash, etc) 9
  • 10. IBM Rational Software Conference 2009 Organizations must mitigate their online risk! Organizations need to mitigate the risk of a Web Application Security breach! They need to find and remediate vulnerabilities in their Web Applications before they are exploited by Hackers They need to do this in a cost effective manner 10
  • 11. IBM Rational Software Conference 2009 Application Security Maturity Model UNAWARE AWARENESS CORRECTIVE OPERATIONS PHASE PHASE EXCELLENCE PHASE 10 % 30 % Maturity 30 % 30 % Duration 2-3 Years Time 11
  • 12. IBM Rational Software Conference 2009 Addressing Web Application Security Approaches for addressing Web Application Security Enterprise-Wide Strategic Strategic Scalable Solution Internal Internal Manual Efforts, Desktop Audit Tools Tactical Tactical Internal Security Experts Consultants Outsourced Outsourced Pen Testing Do Nothing Do Nothing 12 12
  • 13. IBM Rational Software Conference 2009 What is the cost of a defect? 80% of development costs are spent identifying and correcting defects! Once released During the as a product QA/Testing $16,000/defect During the build phase During the phase $450/defect coding phase $100/defect $25/defect The increasing costs of fixing a defect…. National Institute of Standards and Technology (NIST) 13
  • 14. IBM Rational Software Conference 2009 Enabling the Operationalization of Security Testing Clients are addressing Web Application Security in three ways: Outsource Security Enable Security Embed Security into Testing (SaaS) Specialists Development Implement environment-specific security Outsource web application security Requires web application security testing solution for select stakeholders infrastructure or testing subject matter expertise Alleviates security testing bottleneck Enables immediate identification of Single-step security testing (no downstream sources of online risk without the additional oversight required as Increases security awareness across the necessary time and investment for in- expertise is built-in) organization (code security improvement, house training and resources Eliminates training requirements for vulnerability awareness) Fastest path to actionable information non-security experts Enables a more efficient process for on- time and on-budget application development Customers receive actionable reports (AppScan OnDemand) Control, Monitor, Collaborate and Report Web Application Security Testing 14
  • 15. IBM Rational Software Conference 2009 Outsourced Testing: Case Study An enterprise that has Many legacy and newly created web applications A small security team compared to the number of web applications requiring security testing Developers that are not that aware of security The challenge Limited resources Need for detailed and actionable test results Need to test a large number of web applications 15
  • 16. IBM Rational Software Conference 2009 Outsourced Testing: AppScan OnDemand Hosting outsourced to IBM/Rational Rational manages the setup, hardware, upgrades, maintenance, backups, etc. Administration outsourced to IBM/Rational Rational creates scan configurations, job schedules, and organizes/prioritizes results – i.e. maximizes the product capabilities on your behalf Business/Security Analyst function outsourced to IBM/Rational experts via Solution Management Client is trained on how to interpret and use the information resulting from AppScan and Policy Tester scans Client focuses only on issue remediation = customer success 16
  • 17. IBM Rational Software Conference 2009 AppScan OnDemand Scan Web applications/sites Analyze Report (identify issues) (detailed & actionable) VPN 17
  • 18. IBM Rational Software Conference 2009 PCI DSS Reporting 18
  • 19. IBM Rational Software Conference 2009 Findings Advisory and Details 19
  • 20. IBM Rational Software Conference 2009 Remediation Tasks – Action Plan 20
  • 21. IBM Rational Software Conference 2009 Enabling the Operationalization of Security Testing Clients are addressing Web Application Security in three ways: Outsource Security Enable Security Embed Security into Testing (SaaS) Specialists Development Implement environment-specific security Outsource web application security Requires web application security testing solution for select stakeholders infrastructure or testing subject matter expertise Alleviates security testing bottleneck Enables immediate identification of Single-step security testing (no downstream sources of online risk without the additional oversight required as Increases security awareness across the necessary time and investment for in- expertise is built-in) organization (code security improvement, house training and resources Eliminates training requirements for vulnerability awareness) Fastest path to actionable information non-security experts Enables a more efficient process for on- time and on-budget application development Security Team uses Customers receive actionable AppScan Standard Edition & reports AppScan Reporting Console (AppScan OnDemand) Control, Monitor, Collaborate and Report Web Application Security Testing 21
  • 22. IBM Rational Software Conference 2009 Enabling Security Team: Case Study An enterprise that has Many web applications A policy requiring applications pass a security audit before going to production A security team in place to audit the applications A process for fixing security issues Security issues found are sent back to developers Developers communicate with the security team and implement the fix. More rounds of auditing until the application passes the security audit The challenge Security team’s capacity is insufficient for the number of applications and security issues Developers need more detailed information and reproduction scenarios for the security issues detected How to securely get the results to the Developers and manage them 22
  • 23. IBM Rational Software Conference 2009 AppScan Standard Edition 23
  • 24. IBM Rational Software Conference 2009 AppScan Standard Edition 24
  • 25. IBM Rational Software Conference 2009 AppScan Standard Edition 25
  • 26. IBM Rational Software Conference 2009 AppScan Standard Edition 26
  • 27. IBM Rational Software Conference 2009 The Power of AppScan Reporting Console AppScan Reporting Console VISIBILITY CONTROL 27
  • 28. IBM Rational Software Conference 2009 AppScan Reporting Console – Dashboards and Metrics 28
  • 29. IBM Rational Software Conference 2009 Visibility Visibility of security issues Sharing data to all stakeholders Security people collaborating with developers to fix security issues Control of Who Can Access/Manage Results Provides central control and oversight How it works: Customer hosts AppScan Reporting Console Developers provide application information to the security team Security team tests the applications, compiles reports Security team communicates security issues to development, by sending link to report within AppScan Reporting Console or by pushing defects into the defect tracking system Once the issues are fixed, the tests are re-done and issues are managed 29
  • 30. IBM Rational Software Conference 2009 Enabling the Operationalization of Security Testing Clients are addressing Web Application Security in three ways: Outsource Security Enable Security Embed Security into Testing (SaaS) Specialists Development Implement environment-specific security Outsource web application security Requires web application security testing solution for select stakeholders infrastructure or testing subject matter expertise Alleviates security testing bottleneck Enables immediate identification of Single-step security testing (no downstream sources of online risk without the additional oversight required as Increases security awareness across the necessary time and investment for in- expertise is built-in) organization (code security improvement, house training and resources Eliminates training requirements for vulnerability awareness) Fastest path to actionable information non-security experts Enables a more efficient process for on- time and on-budget application development Security Team uses Customers receive actionable Developers use AppScan Standard Edition reports AppScan Enterprise & AppScan Reporting Console (AppScan OnDemand) Control, Monitor, Collaborate and Report Web Application Security Testing 30
  • 31. IBM Rational Software Conference 2009 Security in Development: Case Study An enterprise that has Development teams who are aware of the security challenge and would like to fix security issues at an early in the development lifecycle for lower cost Developers that: Incorporate security testing as part of the development work. Test their changes to the application before delivering these changes to the source stream Log defects or fix them immediately A security team that: Oversees the applications’ issues Audit the applications before going to production The challenge Enabling developers who are not security experts to perform security testing Enable security team to maintain control and oversight of the security testing 31
  • 32. IBM Rational Software Conference 2009 Security In Development: Scalability and Control Scalability Scale up to large security scans Scale out to different user communities QuickScan UI enables non-security expert to do security scanning Control Provides central control and oversight Security team uses advanced view to see what scans have been done and results Security team collaborates with developers to increase scope of testing 32
  • 33. IBM Rational Software Conference 2009 The Power of AppScan Enterprise AppScan Enterprise Console VISIBILITY SCALABILITY CONTROL 33
  • 34. IBM Rational Software Conference 2009 Dev Team 1 Scan Scan Data and Dev Team 2 Data and Reports QA Team Reports Scan Data and Reports ASE Portal Scan Scan Data and Data and Scan Reports Reports Data and Reports Build Team Managers Security Team 34
  • 35. IBM Rational Software Conference 2009 Security In Development: Workflow 1. Developer Writes Code 4. Developer Checks in Code 2. Developer compiles code locally to unit test changes using 3. Developer Fixes or Logs Issues AppScan QuickScan 35
  • 36. IBM Rational Software Conference 2009 36
  • 37. IBM Rational Software Conference 2009 37
  • 38. IBM Rational Software Conference 2009 38
  • 39. IBM Rational Software Conference 2009 39
  • 40. IBM Rational Software Conference 2009 40
  • 41. IBM Rational Software Conference 2009 41
  • 42. IBM Rational Software Conference 2009 IBM Rational Web-Based Training Key to adoption across the organization is education Informative Learn at your own pace Self-paced Engaging (narrated by experts) Accessible Localizable Compatible with other Learning Management Systems Easily embedded into Rational AppScan Enterprise and Policy Tester products Audio ON/OFF Progress Reports Closed Captioning 42
  • 43. IBM Rational Software Conference 2009 IBM Rational AppScan – Security in the SDLC CODE BUILD QA SECURITY AppScan Enterprise / Reporting Console AppScan Ent. (scanning agent) AppScan AppScan AppScan AppScan Build Ed Developer Ed QuickScan (QA clients) Enterprise user Standard Ed (web client) (scanning agent) AppScan Tester Ed (web client) (desktop) (desktop) Ounce Labs Products *NEW!!! Rational Rational Application Software Rational Rational Rational Quality Developer Analyzer ClearCase BuildForge Manager Rational ClearQuest / Defect Management IBM Rational Web Based Training for AppScan Build security testing into Automate Security / Security / compliance testing Security & Compliance the IDE Compliance testing in the incorporated into testing & Testing, oversight, Build Process remediation workflows control, policy, audits 43
  • 44. IBM Rational Software Conference 2009 The Maturing Security Industry – Evolving Analysis Techniques Dynamic Analysis <> Blackbox - Sending tests to a functioning application Total Potential Security Issues Static Runtime Dynamic Static Code Analysis <> Whitebox Analysis Analysis Analysis - Looking at the code for issues (code- level scanning) 44
  • 45. IBM Rational Software Conference 2009 Rational AppScan Development and Ounce Labs An end to end security solution AppScan continues to be recognized as the leader in Dynamic Analysis Security Testing (DAST) With the addition of Ounce Labs (a recognized leader in Static Analysis Security Testing), IBM Total Potential now has an unprecedented end to end security Security Issues portfolio. Static Runtime Dynamic Business Outcome Analysis Analysis Analysis Enable more people to contribute to security testing coverage with solutions for specific use cases Use case offerings facilitate the adoption of security with minimal disruption to existing objectives 45
  • 46. IBM Rational Software Conference 2009 46
  • 47. IBM Rational Software Conference 2009 © Copyright IBM Corporation 2009. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and/or capabilities referenced in these materials may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. IBM, the IBM logo, Rational, the Rational logo, Telelogic, the Telelogic logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others. 47