Building an Effective SDLC Program: Case Study Guy Bejerano, CSO, LivePerson Ofer Maor, CTO, Seeker Security.

Slides:



Advertisements
Similar presentations
Enabling Technology Innovation using Open Source Software
Advertisements

Ensuring your business continuity. The problem (According to top research firms ) 59% of fortune 500 companies experience a minimum of 1.6 hours of downtime.
QuEdge Testing Process Delivering Global Solutions.
An Agile Retrospective Clinton Keith Overview Retrospective format What works (clear wins)? What doesn’t work so well? What do we need to start doing?
Infosec 2012 | 25/4/12 Application Performance Monitoring Ofer MAOR CTO Infosec 2012.
HVC2012 | 8-Nov-12 Application Performance Monitoring Ofer Maor CTO HVC Nov 2012 Haifa, Israel.
<<replace with Customer Logo>>
© 2008 All Right Reserved Fortify Software Inc. Hybrid 2.0 – In search of the holy grail… A Talk for OWASP BeNeLux by Roger Thornton Founder/CTO Fortify.
Agile-Scrum in QA – Case study at TraderTools Amitay Itskovitch TraderTools LLC QA Manager Phone: ,
Agile development By Sam Chamberlain. First a bit of history..
© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Security Services Svetlana.
NuVista Technologies Pte Ltd Superior Performance, Improved Efficiency & Tangible Cost Savings For IOS - Integrated Outsourcing Services Suite Your preferred.
IT Governance: Simultaneously Empowers and Controls Source: IT Governance, Chapter 1.
Pertemuan Matakuliah: A0214/Audit Sistem Informasi Tahun: 2007.
July 8-9, 2014 | Ronald Reagan Building | Washington, DC Federal Cloud Computing Summit Dr. Barry C. West Cloud Tools and Integration.
Agile Testing with Testing Anywhere The road to automation need not be long.
The Product Owner prioritizes the requirements or features through feedback from the Stakeholders & interaction with the core team The Team.
A Connected World in transformation NICE – DATACENTRES 2012 May 23 rd 2012 Paul-François CATTIER Global Data Centre Solution VP.
REV Total SaaS global revenues of $13.1 billion in 2009 Total SaaS estimated revenues of $40.5 billion by % of CRM software in 2011 will.
Agile/Scrum Case study Code name: ninja.  2 scrum teams  One product backlog  8 months so far  Long term project  External integrations  R&D and.
PopMedNet Software Development Life Cycle Chayim Herzig-Marx Harvard Pilgrim Health Care Institute Daniel Dee Lincoln Peak Partners.
> Blueprint Kickoff >. Introductions Customer Vision & Success Criteria Apigee Accelerator Overview Blueprint Schedule Roles & Responsibilities Communications.
© Copyright High Performance Concepts, Inc. 12 Criteria for Software Vendor Selection July 14, 2014 prepared by: Brian Savoie Vice President HIGH.
10 Steps To Agile Development Without Compromising Enterprise Security
Successfully Managing Change To Realise STP Adam Stern Ibacas Consultancy Ltd.
MusalaSoft Quality Process Overview Damyan Kasapov, QA Engineer Tsvetelina Kovacheva, QA Engineer March 15, 2005.
Resource Systems.  The need for agility  History of Product Development  Delivery of EPCOT  Future Challenges & Recommendations  Reflection  Questions?
Alcatel-Lucent CDC Workshop, Coaching & Knowledge Transfer Project Management.
1 “ Understanding leads to perfection” Author: Herb Isenberg Ph.D A Bird’s Eye View Quality Foundations January 2011.
Discussion Panelists: Justin C. Klein Keane Sr. Information Security Specialist University of Pennsylvania Jonathan Hanny Application Security Specialist.
Testing Challenges in an Agile Environment Biraj Nakarja Sogeti UK 28 th October 2009.
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 1 Integrated Enterprise-wide Risk Management Protecting Critical Information Assets and Records FIRM Forum.
© 2008 IBM Corporation Challenges for Infrastructure Outsourcing July 29, 2011 Atul Gupta Vice President, Strategic Outsourcing, IBM.
For Testbeds TM. Secure, multi-tenant cloud orchestration platform –Turnkey platform for delivering IaaS clouds –Hypervisor agnostic –Massively scalable,
Software Security Without The Source Code By Matt Hargett.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Built on Azure, Moodle Helps Educators Create Proprietary Private Web Sites Filled with Dynamic Courses that Extend Learning Anytime, Anywhere MICROSOFT.
Theories of Agile, Fails of Security Daniel Liber CyberArk.
Containing Cost Through Platform-Based Business Process Outsourcing.
July, 2008 Impati – Software Test Solutions. July, Contents Testing Service Overview and Approach Test Services and Industries Key Services Offering.
Phoenix Scrum User Group Simplifying Scrum Online May 21 st 2009.
It’s tough out there … Software delivery challenges.
Intelligence and Information Systems 1 3/17/2004 © 2004 Raytheon Company USC/CSE Executive Workshop on Agile Experiences March 17, 2004 A Raytheon Agile.
Geoff Davis Software Development Leader Software Development at eWater.
Cisco Consulting Services for Application-Centric Cloud Your Company Needs Fast IT Cisco Application-Centric Cloud Can Help.
1. ENTERPRISE AGILE TRANSFORMATION AT THE US POSTAL SERVICE MAY 24, Agile Business Solutions.
Checkmarx choose what developers use. About us o Founded in 2006 o Enterprise Grade Static and Interactive Application Security Testing Solutions o Hundreds.
MICROSOFT AZURE APP BUILDER PROFILE: RAVERUS LTD. Raverus is a customer-driven company engaged in providing software applications designed to improve and.
IS&T Project Reviews September 9, Project Review Overview Facilitative approach that actively engages a number of key project staff and senior IS&T.
© 2016, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Darren Thayre, AWS Professional Services Succeeding with AWS by delivering high.
Copyright © 2016, Cigital So you’ve purchased a SAST tool? Brenton Kohler Copyright © 2016, Cigital.
Effective Performance Testing in Agile and DevOps
Rapid Launch Workshop ©CC BY-SA.
From manual test shop to fully automated test coverage: A How-To session to speed up your journey Jayshree Bhakta ITHAKA/JSTOR.
Agile Metrics that Matter
Cloud University Live: 8 Steps to Build Your Cloud Go to Market Plan
The IT Budgeting Process
Reliable Software Services Inc.
All-Inclusive Testing in API Management
MANAGING APPLICATION SECURITY
Speaker’s Name, SAP Month 00, 2017
CI/CD for Digital Apps Streamlining the Dev, Test & Release Cycle in Enterprises Guy Arieli, CTO, Experitest.
Fast, Agile, Simple Decemebr 2017 Think Simple, Run Faster.
Real Testing Scenario Strategy: Bringing this all together – Success!
Secure Coding: SDLC Integration Sixfold Path
Herding Cats and Security Tools
JOINED AT THE HIP: DEVSECOPS AND CLOUD-BASED ASSETS
The role of the test organization in a Security Sensitive project
Overview UA has formed is forming a Security Operations Center (SOC) with Students supporting Tier 1 Activities. The SOC provides benefits to the University.
GRC - A Strategic Approach
Presentation transcript:

Building an Effective SDLC Program: Case Study Guy Bejerano, CSO, LivePerson Ofer Maor, CTO, Seeker Security

SDLC – Why Do We Bother? Vendor Heaven – Sell All You Can Sell Finding Your Path in The Jungle - Assembling The Puzzle to Build a Robust SDLC Program The Next 45 Min Data & Insights based on our LivePerson

Seeker Security Formerly Hacktics ® (Acquired by EY) New Generation of Application Security Testing (IAST) Recognized as Top 10 Most Innovative Companies at RSA ® Recognized as “Cool Vendor” by Gartner Identify, Demonstrate & Mitigate Critical Application Business Risk

LivePerson Monitor web visitor’s behavior (Over 1.2 B visits each month) Providing Engagement platform ( Over 10 M chats each month) Deploying code on customers’ websites SAAS in a full Multi-tenancy environment Process and Store customers’ data on our systems

Providing Service to Some of the Biggest

Cloud Motivation for Building Secure Code Reputation in a social era Risk Characteristics Cyber Crime – Financial motivation Systems are more accessible and Perimeter protection is not enough Legal liability and cost of non-compliance Customers (over 15 application pen-tests in the past year)

The Impact of Security Bugs in Production Highly expensive to fix (4X than during the dev process) We are not focusing on the upside Creates friction – Externally and Internally

Back in the Waterfall Days DesignDevelopmentQARollout 3 rd party Pen-Testing Security Requirements Bug Fixing Challenges Accuracy of Testing Same Findings Repeating Internal Friction Still Exists Customer Testing

And Then We Moved to Agile Sprint Plan Sprint & RegressionRollout Security Requirements Challenges Shorter Cycle (Design, Bug Fixing) Greater Friction In Production Customer Testing 3 rd party Pen-Testing

The Solution Matrix Vendor Heaven Infinite Services, Products, Solutions & Combinations In House / Outsourced Services / Product / SaaS Manual / Automated Blackbox / Whitebox Penetration Test / Code Review DAST / SAST / IAST

In-House/ Outsourced Skills Availability Cost Repeatability SDLC Integration Service/Product/SaaS (Manual/Automated) Accuracy False Positives False Negatives Skills/Quality Repeatability Ease of Use SDLC Integration Intellectual Property Coverage DAST/SAST/IAST (PT/CR, Black/White Box) Accuracy False Positives False Negatives Quality of Results Pinpointing Code Data Handling Validation Ease of Operation 3 rd Party Code Scale The Solution Matrix - Considerations

How to Assemble All the Pieces? Define Your PlaygroundRisk – Web, Data, Multi-Tenancy Customers – SLA, Standards Choose a Framework Who Leads This Program Highly Technical Organization (System Owners, Scrum Masters, Tech Leaders) Knowledge – Who & How Hands-On… QA First On-going sessions

How to Assemble All the Pieces? Fitting Tools to Platform and Development Process Java – Multi-Tier Agile Methodology JIRA (For bug tracking) Define Operational cycleKey Performance Indicators Operational Review (by system owners) Pen-Test Strategy 3 rd Party Blackbox Pre-defined flows to check

SDLC Take #2 Sprint Plan Sprint & RegressionRollout Security Design In Production Customer Testing 3 rd party Pen-Testing Budgeted “Certification” Program R&D / QA Ownership (Tech Leaders & System Owners) Knowledge (Hands-On Training + On-Going Sessions) Embedded Bug Tracking in Dev Tools Static Code Analysis Runtime/Dynamic Code Analysis

Thank You! Q&A