+ All Categories
Home > Documents > Improving Your Business Through Applications That You Can Trust - HP Protect 2014

Improving Your Business Through Applications That You Can Trust - HP Protect 2014

Date post: 17-Jan-2016
Category:
Upload: sagrav
View: 217 times
Download: 0 times
Share this document with a friend
Description:
technical report
Popular Tags:
24
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Improving your business through applications that you can trust Eduardo Vianna de Camargo Neves, CISSP Sales Manager, Enterprise Accounts Brazil HP Protect 2014 – Washington, DC
Transcript
Page 1: Improving Your Business Through Applications That You Can Trust - HP Protect 2014

© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

Improving your business through applications that you can trustEduardo Vianna de Camargo Neves, CISSPSales Manager, Enterprise Accounts Brazil

HP Protect 2014 – Washington, DC

Page 2: Improving Your Business Through Applications That You Can Trust - HP Protect 2014

© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.2

1996 1998 2001 2013 2014

IT Network Security Consultant

CISO Fortify Specialist

Sales Manager

Page 3: Improving Your Business Through Applications That You Can Trust - HP Protect 2014

© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

Let´s talk about trust.

Page 4: Improving Your Business Through Applications That You Can Trust - HP Protect 2014

© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

Track history is only one component of a complex equation.

Page 5: Improving Your Business Through Applications That You Can Trust - HP Protect 2014

© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

Threats can emerge from unlikely places.

Page 6: Improving Your Business Through Applications That You Can Trust - HP Protect 2014

© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

But if you can figure out when a threat is coming…

Page 7: Improving Your Business Through Applications That You Can Trust - HP Protect 2014

© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

You can plan an apply an effective defense system.

Page 8: Improving Your Business Through Applications That You Can Trust - HP Protect 2014

© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

But to work, we need to rethink what we learned about trust.

Page 9: Improving Your Business Through Applications That You Can Trust - HP Protect 2014

© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.9

U$ 7,22 millions per yearis the average investment per company to solve issues generated by cybercrime

Source: 2013 Cost of Cyber Crime Study: Global Report, Sponsored by HP Enterprise Security

Page 10: Improving Your Business Through Applications That You Can Trust - HP Protect 2014

© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.10

Page 11: Improving Your Business Through Applications That You Can Trust - HP Protect 2014

© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

Page 12: Improving Your Business Through Applications That You Can Trust - HP Protect 2014

© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

Page 13: Improving Your Business Through Applications That You Can Trust - HP Protect 2014

© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

Something must change if we want to succeed.

Page 14: Improving Your Business Through Applications That You Can Trust - HP Protect 2014

© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

Understanding the current attack surface.

Page 15: Improving Your Business Through Applications That You Can Trust - HP Protect 2014

© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.15

Making U$ 92 millions in five simple steps

1

1Find a software security defect.

2

2Inject a malware on the system.

3

3Hide your presence from current defenses.

4

4Extract all credit card data you want.

5 Sell the data for a large and hungry customer base.

5

Page 16: Improving Your Business Through Applications That You Can Trust - HP Protect 2014

© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.165X

84%

Page 17: Improving Your Business Through Applications That You Can Trust - HP Protect 2014

© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.17

The root-cause analysis for software security

0.40

Design Build Test Deploy

1.752.25

Architecture Definition Software Build Test Scoping

System Integration

Source: Jones, Casper. “Software Defect Origins and Removal Methods”. December, 2012

Page 18: Improving Your Business Through Applications That You Can Trust - HP Protect 2014

© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.18

What we can expect for a near future

Hybrid Models RisksBig Data

Local ITLocal + Cloud

+ ?Megabytes Zetabytes Localized Contextualized

• More complexity• Less visibility and

control• New threats may be

unknown

• More analysis requirements

• Structured x Non-structured

• Decision taking

• Compliance requirements

• Distributed attack surface

• Holistic Risk Management

Page 19: Improving Your Business Through Applications That You Can Trust - HP Protect 2014

© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.19

HP Fortify as a enabler for trustful software

ApplicationProtection

Software Security Assurance

Application Assessment

Find FixFortif

y

Page 20: Improving Your Business Through Applications That You Can Trust - HP Protect 2014

© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.20

HP Fortify on the Software Development Lifecycle

HP Fortify SCA

HP WebInspect

Design Build Test Deploy

HP Fortify RTA

HP ApplicationView

HP Fortify SSC

HP Fortify on Demand

HP FortifyIDE Plug-Ins

Training Sessions

ProfessionalServices

HP Application Defender

Page 21: Improving Your Business Through Applications That You Can Trust - HP Protect 2014

© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.21

Secure software can generate measurable benefits for the entire organization

Working with trusted software

Rational money allocation

Strategic and measurable

results

Pro active compliance measures

Integrated approach to

control the attack surface

Page 22: Improving Your Business Through Applications That You Can Trust - HP Protect 2014

© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.22

Page 23: Improving Your Business Through Applications That You Can Trust - HP Protect 2014

© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

“Change is the law of life. And those who look only to the past or present are certain to miss the future.John F.

Kennedy

Page 24: Improving Your Business Through Applications That You Can Trust - HP Protect 2014

© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

Thank you.


Recommended