SlideShare una empresa de Scribd logo
1 de 20
Descargar para leer sin conexión
Presented	
  by	
  Alison	
  Giano1o	
  
Foocamp	
  2013	
  
MANAGING RISK IN
HIGH-PERFORMANCE APPS
FAILING
…
ABOUT ME •  I	
  am	
  the	
  CTO/CSO	
  for	
  noise.	
  
•  We	
  build	
  stuff	
  for	
  brands	
  like	
  Intel,	
  
vitaminwater,	
  JPMorgan	
  Chase,	
  GE,	
  Sunkist,	
  
Sears,	
  Unilever,	
  &	
  more.	
  
•  Managing	
  risk	
  is	
  a	
  big	
  part	
  of	
  what	
  I	
  do.	
  
•  Risk	
  management	
  doesn’t	
  have	
  to	
  be	
  boring.	
  	
  
Hi, I’m Alison!
FOOCAMP 2013
@snipeyhead	
  @snipeyhead	
  
Risk is not BAD or GOOD.
It just IS, and it will exist
whether you choose to
acknowledge it or not.
FOOCAMP 2013
THIRD-PARTY DEPENDENCIES
FOOCAMP 2013
RISK:
(APIs,	
  SaaS/PaaS)	
  
APPLICATION SECURITY
FOOCAMP 2013
RISK:
(XSS,	
  CSRF,	
  SQL	
  Injec<on,	
  etc.)	
  
APPLICATION PERFORMANCE
FOOCAMP 2013
RISK:
(Code	
  Errors,	
  Technical	
  Debt,	
  Bad	
  
Queries,	
  Cache	
  Failures)	
  
SERVER PERFORMANCE
FOOCAMP 2013
RISK:
(Misconfigura<ons,	
  Exceeding	
  
Capacity,	
  Hardware/Network	
  
Failure)	
  
BRITTLE DEPLOYMENT
FOOCAMP 2013
RISK:
(Problems	
  during	
  deployment,	
  
par<ally	
  deployed	
  code)	
  
OVERLY COMPLEX SYSTEMS
FOOCAMP 2013
RISK:
(Impossible	
  to	
  debug,	
  difficult	
  to	
  
change)	
  
RISK-MATRIX
•  Every	
  project,	
  every	
  Sme.	
  No	
  excuses.	
  
•  Create	
  a	
  risk	
  matrix	
  	
  
•  Probability	
  of	
  failure	
  
•  Impact	
  of	
  failure	
  
•  Ways	
  to	
  minimize	
  probability	
  
•  Game	
  plan	
  if	
  failure	
  occurs	
  
FOOCAMP 2013
TRANSPARENCY
•  All	
  stakeholders	
  sign-­‐off	
  on	
  the	
  risk	
  
matrix	
  
•  Manages	
  expectaSons	
  	
  
•  Gives	
  you	
  a	
  clear	
  course	
  of	
  acSon	
  during	
  
crisis	
  
FOOCAMP 2013
AKA “COVERING YOUR ASS”
Just because something has
risk doesn’t necessarily mean
it’s a bad decision.
FOOCAMP 2013
Sometimes, the risk is worth
the reward.
FOOCAMP 2013
FOOCAMP 2013
Different	
  perspecSves	
  can	
  uncover	
  more	
  risk	
  
	
  
Counters	
  the	
  sSgma	
  of	
  risk	
  being	
  BAD	
  
	
  
Prevents	
  the	
  sSgma	
  of	
  being	
  the	
  one	
  who	
  always	
  says	
  NO!	
  
Risk Management is
a TEAM EFFORT!
LOG EVERYTHING
FOOCAMP 2013
TIP:
(Automate	
  log	
  parsing	
  to	
  alert	
  if	
  
there’s	
  trouble)	
  
MONITOR ALL THE THINGS!
FOOCAMP 2013
TIP:
(Design	
  your	
  system	
  with	
  
monitoring	
  in	
  mind)	
  
PREMATURE OPTIMIZATION
FOOCAMP 2013
TIP:
(JUST	
  SAY	
  NO!)	
  
GET TO KNOW YOUR USERS
FOOCAMP 2013
TIP:
(If	
  something	
  changes,	
  there’s	
  
probably	
  a	
  reason)	
  
FEWER MOVING PARTS IS
BETTER
FOOCAMP 2013
TIP:
THANK YOU!
FOOCAMP 2013
@snipeyhead	
  

Más contenido relacionado

Destacado

Los movimientos en el plano Ejercicios + Solucionarios
Los movimientos en el plano Ejercicios + SolucionariosLos movimientos en el plano Ejercicios + Solucionarios
Los movimientos en el plano Ejercicios + Solucionarios
Julio López Rodríguez
 
Software Risk Management
Software Risk ManagementSoftware Risk Management
Software Risk Management
Gunjan Patel
 
¿Qué aprendemos en clase de música?
¿Qué aprendemos en clase de música?¿Qué aprendemos en clase de música?
¿Qué aprendemos en clase de música?
mariajesusmusica
 

Destacado (12)

Claudia Ortega
Claudia OrtegaClaudia Ortega
Claudia Ortega
 
webserver overload
 webserver  overload  webserver  overload
webserver overload
 
Development of TeXShop - The Past and the Future (TUG 2013)
Development of TeXShop - The Past and the Future (TUG 2013)Development of TeXShop - The Past and the Future (TUG 2013)
Development of TeXShop - The Past and the Future (TUG 2013)
 
Proceso de nutrición
Proceso de nutriciónProceso de nutrición
Proceso de nutrición
 
Discovery Phase: Planing Your Web Project
Discovery Phase: Planing Your Web ProjectDiscovery Phase: Planing Your Web Project
Discovery Phase: Planing Your Web Project
 
Risk analysis
Risk analysisRisk analysis
Risk analysis
 
Los movimientos en el plano Ejercicios + Solucionarios
Los movimientos en el plano Ejercicios + SolucionariosLos movimientos en el plano Ejercicios + Solucionarios
Los movimientos en el plano Ejercicios + Solucionarios
 
List of Software Development Model and Methods
List of Software Development Model and MethodsList of Software Development Model and Methods
List of Software Development Model and Methods
 
Software Risk Management
Software Risk ManagementSoftware Risk Management
Software Risk Management
 
Risk management in software engineering
Risk management in software engineeringRisk management in software engineering
Risk management in software engineering
 
¿Qué aprendemos en clase de música?
¿Qué aprendemos en clase de música?¿Qué aprendemos en clase de música?
¿Qué aprendemos en clase de música?
 
Risk Management Framework
Risk Management FrameworkRisk Management Framework
Risk Management Framework
 

Similar a Failing well: Managing Risk in High Performance Applications

Similar a Failing well: Managing Risk in High Performance Applications (20)

Deploying Static Application Security Testing on a Large Scale
Deploying Static Application Security Testing on a Large ScaleDeploying Static Application Security Testing on a Large Scale
Deploying Static Application Security Testing on a Large Scale
 
Risk Based Testing in Agile context - Kees Blokland
Risk Based Testing in Agile context - Kees BloklandRisk Based Testing in Agile context - Kees Blokland
Risk Based Testing in Agile context - Kees Blokland
 
Value-driven threat modeling: Security by design - Avi Douglen - DevOpsDays T...
Value-driven threat modeling: Security by design - Avi Douglen - DevOpsDays T...Value-driven threat modeling: Security by design - Avi Douglen - DevOpsDays T...
Value-driven threat modeling: Security by design - Avi Douglen - DevOpsDays T...
 
2016-05-30 risk driven design
2016-05-30 risk driven design2016-05-30 risk driven design
2016-05-30 risk driven design
 
The Most Important Thing: How Mozilla Does Security and What You Can Steal
The Most Important Thing: How Mozilla Does Security and What You Can StealThe Most Important Thing: How Mozilla Does Security and What You Can Steal
The Most Important Thing: How Mozilla Does Security and What You Can Steal
 
Bilot 3mode
Bilot 3modeBilot 3mode
Bilot 3mode
 
Threat Modeling Lessons from Star Wars
Threat Modeling Lessons from Star WarsThreat Modeling Lessons from Star Wars
Threat Modeling Lessons from Star Wars
 
Operational Risk Assessment PowerPoint Presentation Slides
Operational Risk Assessment PowerPoint Presentation SlidesOperational Risk Assessment PowerPoint Presentation Slides
Operational Risk Assessment PowerPoint Presentation Slides
 
Short introduction to SAP security research (sitNL)
Short introduction to SAP security research (sitNL)Short introduction to SAP security research (sitNL)
Short introduction to SAP security research (sitNL)
 
R3 Process Training
R3 Process TrainingR3 Process Training
R3 Process Training
 
Make it Just So - 4/23/20
Make it Just So - 4/23/20Make it Just So - 4/23/20
Make it Just So - 4/23/20
 
Bug Advocacy
Bug AdvocacyBug Advocacy
Bug Advocacy
 
Risk Management Plan In Business Powerpoint Presentation Slides
Risk Management Plan In Business Powerpoint Presentation SlidesRisk Management Plan In Business Powerpoint Presentation Slides
Risk Management Plan In Business Powerpoint Presentation Slides
 
Risk Management Plan In Business PowerPoint Presentation Slides
Risk Management Plan In Business PowerPoint Presentation Slides Risk Management Plan In Business PowerPoint Presentation Slides
Risk Management Plan In Business PowerPoint Presentation Slides
 
Creating and Implementing Your Analytics Strategy
Creating and Implementing Your Analytics StrategyCreating and Implementing Your Analytics Strategy
Creating and Implementing Your Analytics Strategy
 
Phil Koopman's ISSRE 2016 Keynote
Phil Koopman's ISSRE 2016 KeynotePhil Koopman's ISSRE 2016 Keynote
Phil Koopman's ISSRE 2016 Keynote
 
5 real ways to destroy business by breaking SAP applications
5 real ways to destroy business by breaking SAP applications5 real ways to destroy business by breaking SAP applications
5 real ways to destroy business by breaking SAP applications
 
Protect-Biz for non-profits
Protect-Biz for non-profitsProtect-Biz for non-profits
Protect-Biz for non-profits
 
Mitigation Planning PowerPoint Presentation Slides
Mitigation Planning PowerPoint Presentation Slides Mitigation Planning PowerPoint Presentation Slides
Mitigation Planning PowerPoint Presentation Slides
 
A Practical Security Framework for Website Owners
A Practical Security Framework for Website OwnersA Practical Security Framework for Website Owners
A Practical Security Framework for Website Owners
 

Más de Alison Gianotto

Security Bootcamp for Startups and Small Businesses
Security Bootcamp for Startups and Small Businesses Security Bootcamp for Startups and Small Businesses
Security Bootcamp for Startups and Small Businesses
Alison Gianotto
 
Getting users to care about security
Getting users to care about securityGetting users to care about security
Getting users to care about security
Alison Gianotto
 

Más de Alison Gianotto (10)

Security Bootcamp for Startups and Small Businesses
Security Bootcamp for Startups and Small Businesses Security Bootcamp for Startups and Small Businesses
Security Bootcamp for Startups and Small Businesses
 
Laravel 5.2 Gates, AuthServiceProvider and Policies
Laravel 5.2 Gates, AuthServiceProvider and PoliciesLaravel 5.2 Gates, AuthServiceProvider and Policies
Laravel 5.2 Gates, AuthServiceProvider and Policies
 
dotScale 2014
dotScale 2014dotScale 2014
dotScale 2014
 
LonestarPHP 2014 Security Keynote
LonestarPHP 2014 Security KeynoteLonestarPHP 2014 Security Keynote
LonestarPHP 2014 Security Keynote
 
MacIT 2014 - Essential Security & Risk Fundamentals
MacIT 2014 - Essential Security & Risk FundamentalsMacIT 2014 - Essential Security & Risk Fundamentals
MacIT 2014 - Essential Security & Risk Fundamentals
 
DNS 101 for Non-Techs
DNS 101 for Non-TechsDNS 101 for Non-Techs
DNS 101 for Non-Techs
 
Security Primer
Security PrimerSecurity Primer
Security Primer
 
Facebook Timeline for Pages
Facebook Timeline for PagesFacebook Timeline for Pages
Facebook Timeline for Pages
 
Getting users to care about security
Getting users to care about securityGetting users to care about security
Getting users to care about security
 
Twitter 101: 140 characters. Don't be a douche.
Twitter 101: 140 characters. Don't be a douche.Twitter 101: 140 characters. Don't be a douche.
Twitter 101: 140 characters. Don't be a douche.
 

Último

Último (20)

Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 

Failing well: Managing Risk in High Performance Applications