SlideShare una empresa de Scribd logo
1 de 24
Security YMCA
Why shouting into the security echo chamber does no good!




     Are we, as security people reaching the
          people we need to reach the
               most…developers?
Disclaimers
      • Be careful what you say on twitter
      • This started of as a joke
      • We do not represent our employers, these are or
        own opinions
      • Our survey has NO scientific basis
      • Our survey is NOT free of bias
      • The outfits are just so
        you won’t take us
        seriously ;)

Image: YMCA a CC NC image from bogdog Dan’s Flicks stream:
http://www.flickr.com/photos/25689440@N06/2866020311/
Points of order
• We have about 25 minutes left in this
  presentation
• In this 25 minutes we will try to start a discussion
• Maybe we may even get people to do some real
  research
• 10 minutes are reserved for Q&A and YMCA song
• The next 20 slides will auto-advance every 45
  seconds…
• This talk is interactive… so interact!

• Why the f*ck did you guys pick this talk? No Really
Who are we?
• Chris John Riley




• Arron “F1nux” Finnon
Who are we?
• Frank “Seccubus” Breedijk




• Chris “Suggy” Sumner
So what is this about?
Raise of hands:
• Who in this room is not working in info security?
• Who in this room has ever presented at a
  conference?
• Of those, who presented at a non-security
  conference?

• And yet we wonder why “developers don’t get
  it?”
HTTP Parameter Pollution
       • There are multiple ways to send parameters
       • Sending parameters with both GET and
         POST can lead to interesting results
       • This problem has been known for 11 years
       • Yet 30% for the Alexa top 5000 sites has at
         least on page with this problem*
       • Including Microsoft, Google, VMWare,
         Facebook, Symantec and Paypal
* Taken from Marco Balduzzi’s talk “HTTP Parameter Pollution Vulnerabilities in Web Applications”
Black Hat Europe 2011
So we did a survey
• Not scientific (we’re no scientists)
• Bias introduced (but we’re are biased ;)
• Intended to generate discussion and actual
  research

• Writing a survey to prove a point is not good
  science
• We do not know if the participants were actually
  developers
Demographics - Roles
                              Senior
                          management or
                             Sponsor      Application
               Security                    Architect       Application
              Architect                                    Developer
Project Manager

                                                                     Application
                                                                      Support

                                                                  Business Owner




          Other
                                                        Responses from all over the
                                                        geographic spectrum…
                                                        Lots from UK and USA
Demographics -Experience
            more than 15   less than 2 years
               years


                                                2 -4 years




10 - 15 years




                                 4 - 10 years
Demographics -Skillz

50
45
40
35
30
 25
 20
 15
 10
     5
      0

          novice
                   intermediate
                                                      advanced
                                                                                        ninja

                   ... as an application developer?     .... in application security?
What a 12 step program
             boils down to…
•   Recognize /admit there is a problem
•   Accept it needs to be fixed
•   Get to know the problem
•   Fix the problem
•   Learn new rules to avoid the problem
•   Help others avoid the problem
Admitting/recognizing the problem
• Where do you find most problem when it
  comes to securing applications you develop?
    – I'm not able spot security issues

•   Disagree – 25%                        25%
•   Somewhat agree – 28%                         48%
•   Agree – 19%
                                           27%
•   Strongly Agree – 1%
•   No Answer – 27%
Accept that you need to fix it
• Where do you find most problem when it
  comes to securing applications you develop?
    – Security loses out to features

                                       11
•   Disagree – 11%                     %
                                                  63%
•   Somewhat agree – 17%
•   Agree – 25%
                                            26%
•   Strongly Agree – 21%
•   No Answer – 26%
Investigate the problem
• Where do you find most problem when it
  comes to securing applications you develop?
    – Understanding information on how to secure
      things

•   Disagree – 28%                    28%
•   Somewhat agree – 27%                           46%
•   Agree – 16%
•   Strongly Agree – 3%                 26%

•   No Answer – 26%
Fixing the problem
• Where do you find most problem when it
  comes to securing applications you develop?
    – Fitting security into the development timeline

                                       7
•   Disagree – 7%                      %

•   Somewhat agree – 22%                        66%

•   Agree – 21%
•   Strongly Agree – 23%               27%
•   No Answer – 27%
Help others avoid the problem
• Where do you find most problem when it
  comes to securing applications you develop?
    – Finding the right tools to assist in secure
      development

•   Disagree – 13%                     13%
•   Somewhat agree – 24%                            60%

•   Agree – 29%
•   Strongly Agree – 7%                  27%
•   No Answer – 27%
Where do you find most problems when it comes to
           securing applications you develop?
                                            Disagree       "Agree"

                                                                   66
                                             60                                      63
                                                                                                       60

                         48
       46

                                           1. Make it easier to find the right information & tools
                                           2. Acknowledge the timeline & features issues
       28
                          25


                                             12                                    11                 13
                                                               7



Understanding    I'm not able spot Finding the correct Fitting security   Security loses out Finding the right
information on     security issues    information          into the          to features     tools to assist in
 how to secure                                          development                               secure
     things                                                timeline                            development
Information Sources
How often to you refer to the following information
sources to ensure the security of your applications?

                     Rarely / Never          Regularly / Constantly



                                                        31                        24
            40                                                          45
                       49               49
     60




                                                        61                        67
            51                                                          47
                       43               43
    32



 Blogs     Social     Books           Forums         Training           Best      Internal
          Networks                                   Material         Practice     Coding
                                                                      Guides     Guidelines
How often to you refer to the following information
    sources to ensure the security of your applications?

                            Rarely / Never         Regularly / Constantly




                                                              31                       24
                   40                                                       45
                              49              49
            60




                                                              61                       67
                   51                                                       47
                              43              43
           32



        Blogs     Social     Books           Forums       Training    Best Practice    Internal
                 Networks                                 Material      Guides          Coding
                                                                                      Guidelines


We don’t suck                                         We suck
Internal Coding Guidelines


                  Constantly
                                            Never
   Regularly




Do you even
                          Rarely
have any?
Detect / Prevent
   When developing applications do you or your
company use any of the following to ensure security
         of the applications developed?
        35

        30

        25

        20                           Code-Review (automated
                                     or manual)
        15                           Penetration Testing
        10
                                     Security Review
         5

             0
                                 Surprised by code review, do
                                 they mean a Security Code
                                 Review or Quality Review?
About tools
• In our survey our audience said: 80.8 % wanted
  more tools, however my 2 pence worth (as
  usual in security your being over charged), is
  that we have too many tools.
• Dare I say too much fragmentation in choice of
  tools.
• I wonder about a world with only x1 port
  scanner, all training material, all methodologies,
  all good practice would reflect the x1 single
  tool.
• So my question is, am i officially crazy?
And now for the singing and dancing




Image: “Chewbacca wasn't sure they had disco on Kashyyyk but he sure as hell wasn't going to put all that practice at looking like an 'M' go to
waste” a CC NC SA image from harold.loyd’s Flickr stream: http://www.flickr.com/photos/14434912@N07/3503661701/

Más contenido relacionado

La actualidad más candente (6)

SecureWorld Kim - Infosec at Ludicrous Speeds - Rugged DevOps 6a
SecureWorld   Kim - Infosec at Ludicrous Speeds - Rugged DevOps 6aSecureWorld   Kim - Infosec at Ludicrous Speeds - Rugged DevOps 6a
SecureWorld Kim - Infosec at Ludicrous Speeds - Rugged DevOps 6a
 
Beyond the Knowledge Base: Turning Data into Wisdom - an ITSM Academy Webinar
Beyond the Knowledge Base: Turning Data into Wisdom - an ITSM Academy WebinarBeyond the Knowledge Base: Turning Data into Wisdom - an ITSM Academy Webinar
Beyond the Knowledge Base: Turning Data into Wisdom - an ITSM Academy Webinar
 
Kim IT Pro Forum Eugene: IT at Ludicrous Speeds - rugged dev ops
Kim IT Pro Forum Eugene: IT at Ludicrous Speeds - rugged dev opsKim IT Pro Forum Eugene: IT at Ludicrous Speeds - rugged dev ops
Kim IT Pro Forum Eugene: IT at Ludicrous Speeds - rugged dev ops
 
Kim itSMF New England: ITIL at Ludicrous Speeds - Rugged DevOps 6a
Kim itSMF New England: ITIL at Ludicrous Speeds - Rugged DevOps 6aKim itSMF New England: ITIL at Ludicrous Speeds - Rugged DevOps 6a
Kim itSMF New England: ITIL at Ludicrous Speeds - Rugged DevOps 6a
 
PuppetConf2012GeneKim
PuppetConf2012GeneKimPuppetConf2012GeneKim
PuppetConf2012GeneKim
 
2019 FRSecure CISSP Mentor Program: Class Three
2019 FRSecure CISSP Mentor Program: Class Three 2019 FRSecure CISSP Mentor Program: Class Three
2019 FRSecure CISSP Mentor Program: Class Three
 

Similar a Security YMCA

SAL-DR-01-ELC 10 Understanding the SOC Audience.pptx
SAL-DR-01-ELC 10 Understanding the SOC Audience.pptxSAL-DR-01-ELC 10 Understanding the SOC Audience.pptx
SAL-DR-01-ELC 10 Understanding the SOC Audience.pptx
hforhassan101
 

Similar a Security YMCA (20)

DevSecCon Asia 2017 Shannon Lietz: Security is Shifting Left
DevSecCon Asia 2017 Shannon Lietz: Security is Shifting LeftDevSecCon Asia 2017 Shannon Lietz: Security is Shifting Left
DevSecCon Asia 2017 Shannon Lietz: Security is Shifting Left
 
Devops - Accelerating the Pace and Securing Along the Way - Thaddeus Walsh
Devops - Accelerating the Pace and Securing Along the Way - Thaddeus WalshDevops - Accelerating the Pace and Securing Along the Way - Thaddeus Walsh
Devops - Accelerating the Pace and Securing Along the Way - Thaddeus Walsh
 
Is Your Vulnerability Management Program Irrelevant?
Is Your Vulnerability Management Program Irrelevant?Is Your Vulnerability Management Program Irrelevant?
Is Your Vulnerability Management Program Irrelevant?
 
Security and DevOps Overview
Security and DevOps OverviewSecurity and DevOps Overview
Security and DevOps Overview
 
The Journey to DevSecOps
The Journey to DevSecOpsThe Journey to DevSecOps
The Journey to DevSecOps
 
The Journey to DevSecOps
The Journey to DevSecOpsThe Journey to DevSecOps
The Journey to DevSecOps
 
VMWare Tech Talk: "The Road from Rugged DevOps to Security Chaos Engineering"
VMWare Tech Talk: "The Road from Rugged DevOps to Security Chaos Engineering"VMWare Tech Talk: "The Road from Rugged DevOps to Security Chaos Engineering"
VMWare Tech Talk: "The Road from Rugged DevOps to Security Chaos Engineering"
 
Ensuring Security through Continuous Testing
Ensuring Security through Continuous TestingEnsuring Security through Continuous Testing
Ensuring Security through Continuous Testing
 
Secure DevOps - Evolution or Revolution?
Secure DevOps - Evolution or Revolution?Secure DevOps - Evolution or Revolution?
Secure DevOps - Evolution or Revolution?
 
Making Apps Work
Making Apps WorkMaking Apps Work
Making Apps Work
 
Bad Advice, Unintended Consequences, and Broken Paradigms: Think & Act Di...
Bad Advice, Unintended Consequences, and Broken Paradigms: Think & Act Di...Bad Advice, Unintended Consequences, and Broken Paradigms: Think & Act Di...
Bad Advice, Unintended Consequences, and Broken Paradigms: Think & Act Di...
 
Security within Scaled Agile
Security within Scaled AgileSecurity within Scaled Agile
Security within Scaled Agile
 
State of DevSecOps - DevSecOpsDays 2019
State of DevSecOps - DevSecOpsDays 2019State of DevSecOps - DevSecOpsDays 2019
State of DevSecOps - DevSecOpsDays 2019
 
Vulnerability Management In An Application Security World
Vulnerability Management In An Application Security WorldVulnerability Management In An Application Security World
Vulnerability Management In An Application Security World
 
The State of DevSecOps
The State of DevSecOpsThe State of DevSecOps
The State of DevSecOps
 
State of DevSecOps - DevOpsDays Jakarta 2019
State of DevSecOps - DevOpsDays Jakarta 2019State of DevSecOps - DevOpsDays Jakarta 2019
State of DevSecOps - DevOpsDays Jakarta 2019
 
SAL-DR-01-ELC 10 Understanding the SOC Audience.pptx
SAL-DR-01-ELC 10 Understanding the SOC Audience.pptxSAL-DR-01-ELC 10 Understanding the SOC Audience.pptx
SAL-DR-01-ELC 10 Understanding the SOC Audience.pptx
 
Rapid Risk Assessment: A New Approach to Risk Management
Rapid Risk Assessment: A New Approach to Risk ManagementRapid Risk Assessment: A New Approach to Risk Management
Rapid Risk Assessment: A New Approach to Risk Management
 
Improve Security through Continuous Testing
Improve Security through Continuous TestingImprove Security through Continuous Testing
Improve Security through Continuous Testing
 
The Thing That Should Not Be
The Thing That Should Not BeThe Thing That Should Not Be
The Thing That Should Not Be
 

Más de Security BSides London

Más de Security BSides London (12)

Penetration testing must die
Penetration testing must diePenetration testing must die
Penetration testing must die
 
Your money, your media a DRMtastic (reverse|re) eng. tutorial
Your money, your media a DRMtastic (reverse|re) eng. tutorialYour money, your media a DRMtastic (reverse|re) eng. tutorial
Your money, your media a DRMtastic (reverse|re) eng. tutorial
 
You built a security castle and forgot the bridge…now users are climbing your...
You built a security castle and forgot the bridge…now users are climbing your...You built a security castle and forgot the bridge…now users are climbing your...
You built a security castle and forgot the bridge…now users are climbing your...
 
Agnitio: its static analysis, but not as we know it
Agnitio: its static analysis, but not as we know itAgnitio: its static analysis, but not as we know it
Agnitio: its static analysis, but not as we know it
 
The Funny Thing About Information Security
The Funny Thing About Information SecurityThe Funny Thing About Information Security
The Funny Thing About Information Security
 
Breaking out of restricted RDP
Breaking out of restricted RDPBreaking out of restricted RDP
Breaking out of restricted RDP
 
Breaking, Entering and Pentesting
Breaking, Entering and Pentesting Breaking, Entering and Pentesting
Breaking, Entering and Pentesting
 
All your logs are belong to you!
All your logs are belong to you!All your logs are belong to you!
All your logs are belong to you!
 
Practical Crypto Attacks Against Web Applications
Practical Crypto Attacks Against Web Applications Practical Crypto Attacks Against Web Applications
Practical Crypto Attacks Against Web Applications
 
Jedi mind tricks for building application security programs
Jedi mind tricks for building application security programsJedi mind tricks for building application security programs
Jedi mind tricks for building application security programs
 
Dns tunnelling its all in the name
Dns tunnelling its all in the nameDns tunnelling its all in the name
Dns tunnelling its all in the name
 
Cloud computing due diligence WTF?
Cloud computing due diligence WTF?Cloud computing due diligence WTF?
Cloud computing due diligence WTF?
 

Último

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Último (20)

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 

Security YMCA

  • 1. Security YMCA Why shouting into the security echo chamber does no good! Are we, as security people reaching the people we need to reach the most…developers?
  • 2. Disclaimers • Be careful what you say on twitter • This started of as a joke • We do not represent our employers, these are or own opinions • Our survey has NO scientific basis • Our survey is NOT free of bias • The outfits are just so you won’t take us seriously ;) Image: YMCA a CC NC image from bogdog Dan’s Flicks stream: http://www.flickr.com/photos/25689440@N06/2866020311/
  • 3. Points of order • We have about 25 minutes left in this presentation • In this 25 minutes we will try to start a discussion • Maybe we may even get people to do some real research • 10 minutes are reserved for Q&A and YMCA song • The next 20 slides will auto-advance every 45 seconds… • This talk is interactive… so interact! • Why the f*ck did you guys pick this talk? No Really
  • 4. Who are we? • Chris John Riley • Arron “F1nux” Finnon
  • 5. Who are we? • Frank “Seccubus” Breedijk • Chris “Suggy” Sumner
  • 6. So what is this about? Raise of hands: • Who in this room is not working in info security? • Who in this room has ever presented at a conference? • Of those, who presented at a non-security conference? • And yet we wonder why “developers don’t get it?”
  • 7. HTTP Parameter Pollution • There are multiple ways to send parameters • Sending parameters with both GET and POST can lead to interesting results • This problem has been known for 11 years • Yet 30% for the Alexa top 5000 sites has at least on page with this problem* • Including Microsoft, Google, VMWare, Facebook, Symantec and Paypal * Taken from Marco Balduzzi’s talk “HTTP Parameter Pollution Vulnerabilities in Web Applications” Black Hat Europe 2011
  • 8. So we did a survey • Not scientific (we’re no scientists) • Bias introduced (but we’re are biased ;) • Intended to generate discussion and actual research • Writing a survey to prove a point is not good science • We do not know if the participants were actually developers
  • 9. Demographics - Roles Senior management or Sponsor Application Security Architect Application Architect Developer Project Manager Application Support Business Owner Other Responses from all over the geographic spectrum… Lots from UK and USA
  • 10. Demographics -Experience more than 15 less than 2 years years 2 -4 years 10 - 15 years 4 - 10 years
  • 11. Demographics -Skillz 50 45 40 35 30 25 20 15 10 5 0 novice intermediate advanced ninja ... as an application developer? .... in application security?
  • 12. What a 12 step program boils down to… • Recognize /admit there is a problem • Accept it needs to be fixed • Get to know the problem • Fix the problem • Learn new rules to avoid the problem • Help others avoid the problem
  • 13. Admitting/recognizing the problem • Where do you find most problem when it comes to securing applications you develop? – I'm not able spot security issues • Disagree – 25% 25% • Somewhat agree – 28% 48% • Agree – 19% 27% • Strongly Agree – 1% • No Answer – 27%
  • 14. Accept that you need to fix it • Where do you find most problem when it comes to securing applications you develop? – Security loses out to features 11 • Disagree – 11% % 63% • Somewhat agree – 17% • Agree – 25% 26% • Strongly Agree – 21% • No Answer – 26%
  • 15. Investigate the problem • Where do you find most problem when it comes to securing applications you develop? – Understanding information on how to secure things • Disagree – 28% 28% • Somewhat agree – 27% 46% • Agree – 16% • Strongly Agree – 3% 26% • No Answer – 26%
  • 16. Fixing the problem • Where do you find most problem when it comes to securing applications you develop? – Fitting security into the development timeline 7 • Disagree – 7% % • Somewhat agree – 22% 66% • Agree – 21% • Strongly Agree – 23% 27% • No Answer – 27%
  • 17. Help others avoid the problem • Where do you find most problem when it comes to securing applications you develop? – Finding the right tools to assist in secure development • Disagree – 13% 13% • Somewhat agree – 24% 60% • Agree – 29% • Strongly Agree – 7% 27% • No Answer – 27%
  • 18. Where do you find most problems when it comes to securing applications you develop? Disagree "Agree" 66 60 63 60 48 46 1. Make it easier to find the right information & tools 2. Acknowledge the timeline & features issues 28 25 12 11 13 7 Understanding I'm not able spot Finding the correct Fitting security Security loses out Finding the right information on security issues information into the to features tools to assist in how to secure development secure things timeline development
  • 19. Information Sources How often to you refer to the following information sources to ensure the security of your applications? Rarely / Never Regularly / Constantly 31 24 40 45 49 49 60 61 67 51 47 43 43 32 Blogs Social Books Forums Training Best Internal Networks Material Practice Coding Guides Guidelines
  • 20. How often to you refer to the following information sources to ensure the security of your applications? Rarely / Never Regularly / Constantly 31 24 40 45 49 49 60 61 67 51 47 43 43 32 Blogs Social Books Forums Training Best Practice Internal Networks Material Guides Coding Guidelines We don’t suck We suck
  • 21. Internal Coding Guidelines Constantly Never Regularly Do you even Rarely have any?
  • 22. Detect / Prevent When developing applications do you or your company use any of the following to ensure security of the applications developed? 35 30 25 20 Code-Review (automated or manual) 15 Penetration Testing 10 Security Review 5 0 Surprised by code review, do they mean a Security Code Review or Quality Review?
  • 23. About tools • In our survey our audience said: 80.8 % wanted more tools, however my 2 pence worth (as usual in security your being over charged), is that we have too many tools. • Dare I say too much fragmentation in choice of tools. • I wonder about a world with only x1 port scanner, all training material, all methodologies, all good practice would reflect the x1 single tool. • So my question is, am i officially crazy?
  • 24. And now for the singing and dancing Image: “Chewbacca wasn't sure they had disco on Kashyyyk but he sure as hell wasn't going to put all that practice at looking like an 'M' go to waste” a CC NC SA image from harold.loyd’s Flickr stream: http://www.flickr.com/photos/14434912@N07/3503661701/