+ All Categories
Home > Documents > EXECUTIVE ROUNDTABLE Sponsored by Veracode App …...She has built v1.0 products and has scaled...

EXECUTIVE ROUNDTABLE Sponsored by Veracode App …...She has built v1.0 products and has scaled...

Date post: 25-Jun-2020
Category:
Upload: others
View: 4 times
Download: 0 times
Share this document with a friend
10
App Security: How Do You Know You’ve Got It Right? EXECUTIVE ROUNDTABLE Sponsored by Veracode Agenda 5:30 – 6:00 p.m. Registration & Networking 6:00 – 7:00 p.m. Product Briefing • Nick Holland, Director, Banking and Payments, Information Security Media Group Anu Subramanian, VP of Engineering, Veracode • Joe Leonard, CISO Evangelist 7:00 – 8:30 p.m. Distillery tour & tasting. Dinner and drinks to follow. 8:30 p.m. Program Concludes
Transcript
Page 1: EXECUTIVE ROUNDTABLE Sponsored by Veracode App …...She has built v1.0 products and has scaled products through their maturity cycle. Joe Leonard ... exploited by hackers. Our complete

App Security: How Do You Know You’ve Got It Right?

EXECUTIVE ROUNDTABLESponsored by Veracode

Agenda5:30 – 6:00 p.m.

Registration & Networking

6:00 – 7:00 p.m.

Product Briefing

• Nick Holland, Director, Banking and Payments, Information Security Media Group• Anu Subramanian, VP of Engineering, Veracode• Joe Leonard, CISO Evangelist

7:00 – 8:30 p.m.

Distillery tour & tasting. Dinner and drinks to follow.

8:30 p.m.

Program Concludes

Page 2: EXECUTIVE ROUNDTABLE Sponsored by Veracode App …...She has built v1.0 products and has scaled products through their maturity cycle. Joe Leonard ... exploited by hackers. Our complete

Introduction

Increasingly, organizations across all industries are using

applications to attract new customers and conduct business.

But cybercriminals are aware of these lucrative channels and

are continually looking for ways to exploit them. So how do

organizations know if their application security is sufficient to

protect their business from data breaches? And how do they

know if their code contains exploitable vulnerabilities?

This exclusive executive briefing on App Security: How Do You Know You’ve Got it Right? will provide

answers to these and other critical questions.

Guided by insights from Anu Subramanian, vice president of engineering at event sponsor Veracode,

and Joe Leonard, the company’s CISO evangelist, this invitation-only event will also draw upon the

experiences of the attendees, who will describe how they have deployed application security strategies

within their enterprises. Among the discussion topics:

• How are you ensuring the security of your applications in order to protect your critical data and brand?

• How do you even know if your application security program is effective?

• How has your organization integrated app security in its DevOps process?

You’ll have the opportunity to discuss the topic with a handful of senior executives and market leaders in

an informal, closed-door setting, from which you will emerge with new strategies and solutions you can

immediately put to work.

App Security: How Do You Know You’ve Got it Right? 2

Page 3: EXECUTIVE ROUNDTABLE Sponsored by Veracode App …...She has built v1.0 products and has scaled products through their maturity cycle. Joe Leonard ... exploited by hackers. Our complete

Discussion Points

Among the questions to be presented for open discourse:

• What types of attacks are you commonly seeing via the application layer today?

• How are you ensuring the security of your applications in order to protect your critical data and brand?

• How do you even know if your application security program is effective?

• How is today’s threat landscape changing around application security?

• What are CISOs most frequently missing when it comes to application security?

• What are the greatest risks if an organization gets it wrong?

• How has your organization integrated app security in its DevOps process?

• How do you know if your organization’s application security program is effective? How should you be measuring this?

App Security: How Do You Know You’ve Got it Right? 3

Page 4: EXECUTIVE ROUNDTABLE Sponsored by Veracode App …...She has built v1.0 products and has scaled products through their maturity cycle. Joe Leonard ... exploited by hackers. Our complete

About the ExpertsJoining our discussion today to share the latest insights and

case studies is:

Anu Subramanian

Vice President of Engineering Veracode

Subramanian is responsible for dynamic and data engineering. She has over 20 years of experience

in building and leading diverse engineering teams at companies that span the spectrum from start-

ups to Fortune 100 companies. She has built v1.0 products and has scaled products through their

maturity cycle.

Joe Leonard

Vice President of Engineering Veracode

Leonard is the founder and chief executive officer for CISO advisory services, which provides

business development services to manufactures and focuses on how to get better product adoption

in the marketplace. He has over 40 years of industry experience and has a diverse background

working at value-added resellers, a web hosting services provider, an internet services provider, a

cellular communications firm and the U.S. Army.

About Veracode

Veracode is a leader in helping organizations secure the software that powers their world.

Veracode’s SaaS platform and integrated solutions help security teams and software developers find

and fix security-related defects at all points in the software development lifecycle, before they can be

exploited by hackers. Our complete set of offerings help customers reduce the risk of data breaches,

increase the speed of secure software delivery, meet compliance requirements and cost-effectively

secure their software assets – whether that’s software they make, buy or sell.

Veracode serves more than 2,000 customers across a wide range of industries, including nearly one-

third of the Fortune 100 and more than 20 of Forbes’ 100 Most Valuable Brands.

App Security: How Do You Know You’ve Got it Right? 4

Page 5: EXECUTIVE ROUNDTABLE Sponsored by Veracode App …...She has built v1.0 products and has scaled products through their maturity cycle. Joe Leonard ... exploited by hackers. Our complete

About the ModeratorLeading our discussion today is:

Nick Holland

Director, Banking and Payments Information Security Media Group

Holland, an experienced security analyst, has spent the last decade focusing on the intersection of

digital banking, payments and security technologies. He has spoken at a variety of conferences and

events, including Mobile World Congress, Money2020, Next Bank and SXSW, and has been quoted by

The Wall Street Journal, CNN Money, MSNBC, NPR, Forbes, Fortune, BusinessWeek, Time Magazine,

The Economist and the Financial Times. He holds an MSc degree in information systems management

from the University of Stirling, Scotland.

About ISMG

Information Security Media Group (ISMG) is the world’s largest media organization devoted solely

to information security and risk management. Each of our 28 media properties provides education,

research and news that is specifically tailored to key vertical sectors including banking, healthcare

and the public sector; geographies from the North America to Southeast Asia; and topics such as

data breach prevention, cyber risk assessment and fraud. Our annual global summit series connects

senior security professionals with industry thought leaders to find actionable solutions for pressing

cybersecurity challenges.

For more information, visit www.ismg.io.

App Security: How Do You Know You’ve Got it Right? 5

Page 6: EXECUTIVE ROUNDTABLE Sponsored by Veracode App …...She has built v1.0 products and has scaled products through their maturity cycle. Joe Leonard ... exploited by hackers. Our complete

NOTE: In advance of this event, ISMG’s Nick Holland spoke about

application security with Veracode’s Anu Subramanian and Joe

Leonard. Here is an excerpt of that conversation.

Changing Landscape

NICK HOLLAND: How is today’s threat landscape changing around

application security?

ANU SUBRAMANIAN: The number of applications are increasing,

which expands the attack surface and creates more opportunity for

criminals and nation-states to attack. The OWASP Top 10 – 2017 –

lists the 10 most critical web application security risks:

• Injection

• Broken Authentication

• Sensitive Data Exposure

• XML External Entities (XXE)

• Broken Access Controls

• Security Misconfigurations

• Cross-Site Scripting (XSS)

• Insecure Deserialization

• Using Components with Known Vulnerabilities

• Insufficient Logging & Monitoring

Each risk has details broken out for: Is the application vulnerable?

Also offered are example attack scenarios, tips on how to prevent

and references, both OWASP and external.

What’s Missing?

HOLLAND: What are CISOs most frequently missing when it comes

to application security?

LEONARD: They’re missing developing a strategy with policies,

procedures and guidelines for application security throughout the

organization. In many organizations, testing is being performed on

a subset of applications, and the testing isn’t comprehensive or

continuous.

In addition, security testing results are scattered among multiple

security tools and it is hard to make risk decisions for the business.

This leaves tremendous gaps in the security posture that make the

organization vulnerable to an attack.

CONTEXT

App Security: How Do You Know You've Got It Right?Q&A with Veracode’s Anu Subramanian and Joe Leonard

Anu Subramanian

Joe Leonard

“Getting it wrong can lead to a data breach, which has significant costs for legal fees, professional services, fines, penalties and brand reputation damage.”

App Security: How Do You Know You’ve Got it Right? 6

Page 7: EXECUTIVE ROUNDTABLE Sponsored by Veracode App …...She has built v1.0 products and has scaled products through their maturity cycle. Joe Leonard ... exploited by hackers. Our complete

Greatest Risks

HOLLAND: What are the greatest risks if an organization gets it

wrong?

SUBRAMANIAN: Getting it wrong can lead to a data breach, which

has significant costs for legal fees, professional services, fines,

penalties and brand reputation damage.

Some organizations never recover from a breach and go out of

business. Other organizations have had executive leadership

changes at the top as a result of the breach and the damage it

caused to the brand.

What keeps a CISO up at night? Getting it wrong. The question

is always asked, “Have I done all the right things to protect the

organization?”

Measuring Effectiveness

HOLLAND: How do you know if your application security program is

effective? How should you be measuring this?

LEONARD: In order for the security program to be effective, your

organization must be able to track application Key Performance

Indicators (KPIs) that are relevant to your business. These application

KPIs should be tracked monthly and be reported to show the

security program improvements that have been made and areas that

should be addressed to improve the overall security posture and

reduce risks.

The KPIs that are developed need to be relevant to business risk for

the most critical assets.

It is important to have the executive team engaged in the KPI

monthly reviews so they understand the risks and what remediation

needs to be done to reduce the organization's business risks. In

addition, there should be reporting that goes to the board so they

understand the application risks so they can make the proper

investments to protect the organization.

Adequate Protections

HOLLAND: How do today’s companies ensure security of

applications in order to protect critical data and brand reputation?

SUBRAMANIAN: The best approach to securing your applications is

using a layered application security testing approach that uses Static

Application Security Testing (SAST), Dynamic Application Security

Testing (DAST), Interactive Analysis Security Testing (IAST), Software

Composition Analysis (SCA) and penetration testing. The results of

all the testing is centralized in a dashboard so the organization can

make risk decisions based on business relevance.

Components of application security testing:

• Static Application Security Testing (SAST)

• White box security testing

• Analyzing the binary without executing the application

• Finding vulnerabilities early in SDLC

• Dynamic Application Security Testing (DAST)

• Black box security testing

• Analyzing application run-time vulnerabilities

• Finding vulnerabilities toward the end of the SDLC (more

expensive to fix)

• Software Composition Analysis (SCA)

• Analyzing open source libraries

• National Vulnerability Database (NVD)

• Interactive Analysis (IAST)

• Analyzing running application code for security vulnerabilities

• Penetration Testing

• Black box security testing

• Some vulnerabilities cannot be found with automated tools.

• Some industry regulations require penetration testing.

• Centralized SaaS portal

• Centralizing all application security testing to one dashboard

• Providing ability to enumerate risks and make better risks

decisions

No one testing approach covers everything, so different testing

methodologies are required to identify vulnerabilities or software

flaws.

Key Advice

HOLLAND: What is the one key piece of advice you’d share with

today’s security professionals when it comes to application security?

LEONARD: Security should be integrated into business and enable

success for governance, compliance and improving business

outcome. Understand the business and how you can help protect

the organization. n

“Security should be integrated into business and enable success for governance, compliance and improving business outcome.”

App Security: How Do You Know You’ve Got it Right? 7

Page 8: EXECUTIVE ROUNDTABLE Sponsored by Veracode App …...She has built v1.0 products and has scaled products through their maturity cycle. Joe Leonard ... exploited by hackers. Our complete

Notes

App Security: How Do You Know You’ve Got it Right? 8

Page 9: EXECUTIVE ROUNDTABLE Sponsored by Veracode App …...She has built v1.0 products and has scaled products through their maturity cycle. Joe Leonard ... exploited by hackers. Our complete

Notes

App Security: How Do You Know You’ve Got it Right? 9

Page 10: EXECUTIVE ROUNDTABLE Sponsored by Veracode App …...She has built v1.0 products and has scaled products through their maturity cycle. Joe Leonard ... exploited by hackers. Our complete

902 Carnegie Center • Princeton, NJ • 08540 • www.ismg.io

About ISMG

Information Security Media Group (ISMG) is the world’s largest media organization devoted solely to information

security and risk management. Each of our 28 media properties provides education, research and news that is

specifically tailored to key vertical sectors including banking, healthcare and the public sector; geographies from

North America to Southeast Asia; and topics such as data breach prevention, cyber risk assessment and fraud.

Our annual global Summit series connects senior security professionals with industry thought leaders to find

actionable solutions for pressing cybersecurity challenges.

Contact

(800) 944-0401 • [email protected]

CyberEd


Recommended