+ All Categories
Transcript
Page 1: Webinar Security: Apps of Steel

SECURITY WEBINAR

APPS OF STEELMartin GandarStrategic Marketing Director

Derk TegelerSecurity Director

Page 2: Webinar Security: Apps of Steel

• State of mobile security• Mitigation strategies• Security by design• Software development• M2Active™, the App Lifecycle Platform

AGENDA

Page 3: Webinar Security: Apps of Steel

STATE OF MOBILE SECURITY

• Software on the move• The mobile operating

system• The apps and the stores• The software distribution

problem• Malware

Page 4: Webinar Security: Apps of Steel

MOBILE SECURITY: NETWORKS• Networks

• Control• The need for encryption

against MITM attacks– Telephone networks– Public Wi-Fi hotspots– rogue access points

• Issues with DNS• Issues with the Public Key

Infrastructure (PKI)

Page 5: Webinar Security: Apps of Steel

MITIGATION STRATEGIES• Accountability in business processes• Budget• Risk analysis

• Risk = impact*likelihood• Information classification and

protection rules per class for:• Transmission, Storage & Processing

• Multiple information transmission channels

• Awareness of known vulnerabilities

Page 6: Webinar Security: Apps of Steel

SECURITY BY DESIGN• Information classification• Risk analysis• Threat modelling• Dependencies• Use several security levels• Good key management

Page 7: Webinar Security: Apps of Steel

SOFTWARE DEVELOPMENT• Secure coding standards• Defensive programming• Don’t leak!• Document: in the code, release notes and all other documentation.

• Collaborative development• Maintenance• Code transfers• The App lifecycle

Page 8: Webinar Security: Apps of Steel

THE APP LIFECYCLE PLATFORM ™

- Encrypted object code providing integrity and confidentiality of the software package

- API’s- Secure Coding Standards giving

our partners a strong basis- Templates, best practices and

code snippets

Page 9: Webinar Security: Apps of Steel

M2ACTIVEAPI’S- API’s:

- Authentication Manager- Crypto / cryptographic

functions:- Base64 encoding and decoding- SHA-1 and SHA-256 hashing- AES encryption and decryption- Key generation algorithms

- HTTPS support, including OAUTH

Page 10: Webinar Security: Apps of Steel

THANK YOU FOR YOUR TIMENEXT WEBINAR:18th OF JUNE:ORGANIZING FOR ENTERPRISE APP PORTFOLIOS

Page 11: Webinar Security: Apps of Steel

SECURITY WEBINAR

APPS OF STEELMartin GandarStrategic Marketing [email protected] 7770 366 566

Derk TegelerSecurity [email protected] 6 16 47 29 52


Top Related