Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.

Slides:



Advertisements
Similar presentations
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Advertisements

Increasing Capital investments
ENGAGE IN A CAREER IN BUSINESS 8/2/2011. ENGAGE IN A CAREER IN BUSINESS Some Job Descriptions Include: Operations Technology Finance Investment Management.
Copyright © 2012 FuseSource Corp.. All rights reserved. 1 FuseSource Enterprise Michelle Davis – FuseSource Federal.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
© 2008 All Right Reserved Fortify Software Inc. Hybrid 2.0 – In search of the holy grail… A Talk for OWASP BeNeLux by Roger Thornton Founder/CTO Fortify.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
The OWASP Foundation Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under.
Roadmap to Continuous Integration Testing and Benefits Gowri Selka, Walgreens Natalie Koltun, Walgreens May 20th, 2014 ©2013 Walgreen Co. All rights reserved.
1 IS371 WEEK 8 Last and Final Assignment Application Development Alternatives to Application Development Instructor Online Evaluations.
System Implementations American corporations spend about $300 Billion a year on software implementation/upgrade projects.
Money Management Skills
System Implementations American corporations spend about $300 Billion a year on software implementation/upgrade projects.
OWASP APPSEC, 2013 JEREMIAH GROSSMAN Founder and THE REAL STATE OF WEBSITE SECURITY and THE TRUTH ABOUT ACCOUNTABILITY and “BEST-PRACTICES.”
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
BPM Governance Identifying methods for prioritizing, standardizing, measuring and controlling BPM efforts.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
The OWASP Foundation Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Lean and (Prepared for) Mean: Application Security Program Essentials Philip J. Beyer - Texas Education Agency John B. Dickson.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the Creative Commons Attribution-ShareAlike.
Measuring Security Best Practices with OpenSAMM Alan Jex SnowFROC 2013.
Copyright © 2006 CyberRAVE LLC. All rights reserved. 1 Virtual Private Network Service Grid A Fixed-to-Mobile Secure Communications Framework Managed Security.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
 Protect customers with more secure software  Reduce the number of vulnerabilities  Reduce the severity of vulnerabilities  Address compliance requirements.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Business Systems Development SDLC and introduction to the Microsoft Solutions Framework Team and Process Models.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the Creative Commons Attribution-ShareAlike.
Copyright 2007 © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
1 © Quality House QUALITY HOUSE The best testing partner in Bulgaria.
Copyright 2007 © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
HIGH INTENSITY DRUG TRAFFICKING AREA FINANCIAL MANAGEMENT DATABASE PROJECT.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Project Management Methodology Development Stage.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Copyright 2007 © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Containing Cost Through Platform-Based Business Process Outsourcing.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Chapter 8 Auditing in an E-commerce Environment
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
CONFIDENTIAL – SPE Use Only – DRAFT v111 October 21, 2008 Human Capital Management Program Domestic Human Capital Management (HCM), CIPS Reintegration,
Cisco Consulting Services for Application-Centric Cloud Your Company Needs Fast IT Cisco Application-Centric Cloud Can Help.
Driving Value from IT Services using ITIL and COBIT 5 July 24, 2013 Gary Hardy ITWinners.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
IT INVESTMENT MANAGEMENT FRAMEWORK Pertemuan 3-4
MANAGING APPLICATION SECURITY
Automation Of Software Test
Secure Coding: SDLC Integration Sixfold Path
Delivering Business Value Faster
HCL Application Modernization Services
Presentation transcript:

Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP Foundation OWASP Software Security Maturity The Economic Advantages of a Resilient Supply Chain- Software Security

OWASP 2 The End in Mind…  13% of every dollar spent on software development is returned for a productivity gain and reinvested in high value activities

OWASP 3 3 DTCC Confidential Software Security Program - Value Delivery and Productivity Save 2008 Productivity Save $19 M Productivity Gain Increases from Y 2007 to Y % Cost Benefit Analysis Y 2006Y 2007Y 2008Y 2009 ADM Budget$114.1 M$ M$ 145 M Investment- $17.1 M- $ 0.25 M - $ 0.25 M* Annual Return- $17.1 M$ 2.75 M$ 19 M$ 19 M* Cumulative Return - $17.1 M -$ 14.6 M$ 4.4 M$ 23 M* Productivity SaveN.A. 1.97%11.13%>13.10%* * Projected * Estimate

OWASP 4 Consulting ExpertiseWorkflow, Process Management- CMMI Education, Training, “Security Mavens” SDLC Software Security Controls  10-15% Productivity Impact  3 year program  Business case based on reduced risk, higher productivity Static Code Analysis Dynamic Analysis Manual “White Box” Testing “Black Box” Testing Pen Tests End-to-end Security Requirements Security Architecture DesignDevelopmentQ/A- TestingProduction

OWASP 5 Economic Impact of Controls PreventativeDetective Controls Lifecycle 1 36

OWASP 66 The Challenge in 2005 The Depository Trust & Clearing Corp (DTCC) had 450 application developers on shore and over 100 offshore creating product for their brokers, bank, mutual fund and insurance carrier customers. DTCC needed to implement improved security practices as part of the application development process. The goal was to create more secure applications to handle clearance and settlement of more than $1.8 Quadrillion worth of securities transactions each year Background:Background: Context:Context: Dilemma:Dilemma: – CMMI Level 3 Certified development organization – What is the best approach to improving the resiliency of software developed, outsourced or bought?

OWASP 7 Code Management Open Source Palamida/Black Duck DTCC’s Software Security Program System Implementation Lifecycle (SILC – CLASP Integration) Security Education Communication KPIs, Portfolio Level Reporting, Vulnerability Framework Requirements Phase Business Requirements, PSA Process Enhance Whiteboard Tracking BITS Shared Assessment- Services Design Phase Current ASAR New ASAR Implementation Build Phase Fortify – In-house Development Veracode – COTS Testing Phase WHITEHAT – Dynamic Analysis Security Testing (TSG) Operational Phase Application Logging Control Standard enVision Integration Application Assessment Net2S, Primeon (on demand) Database Security AppDetective – Compliance enVision – Security Monitoring 10 Core Control Points

OWASP 8 KPIs - 17 Production KPIs

OWASP 99 Accountability Model – Comprehensive reports Domain Level, VP Level and Project Level Reports