SlideShare a Scribd company logo
© 2017 IBM Corporation
Leverage DevOps & Agile
Development to Transform Your
Application Testing Program:
Client Case Study
Speakers
Shuchita Gupta
Senior Software Client
Architect & Leader
IBM
Sona Srinivasan
Senior IT Architect, Global
Architecture and Technology
Services IT
CISCO Systems, Inc.
Alan Shimel
Moderator, Editor-in-Chief
DevOps.com
2
State of Application Security
Average time to
detect APT
256 days
Average cost of a
U.S. data breach
$6.5M
Percentage of breaches
due to Web attacks
40%
Sources:
IBM X-Force Threat Intelligence 2015; 2016 Verizon Data Breach Investigations Report; 2016 Cost of Data Breach Study: Global Analysis
Average size of a U.S.
data breach
30K records
3
Conversations & Challenges
How often should you think about
security in the SDLC? Are
automated DAST scans enough?
Should I stop my release in a
continuous delivery pipeline if my
critical vulnerabilities aren't fixed?
Can running SAST scans on each
build reduce my need to run DAST
scans?
Should my user stories for security be
incorporated in a sprint, or be a part of
my design?
Key:
SAST – Static Application Security Testing
DAST – Dynamic Application Security Testing
4
Poll Question #1
5
The Sec Ops Journey
Conversations that launched
with Agile
The Steps to
Cognitive Security
Examples of
Continuous Security
Continuous Security
at Cisco
Adapting to
Threats & Attacks
Together
6
6
Continuous Security Example #1
Architecture & Security Requirements
• Threat Modeling By Feature & Design - For
every major application re-design or major
feature change, Threat Models must be built
based on the application’s design changes
• Security assessments and User Stories Tie
in, where security assessments answer the
Who, Why and What of the feature and
application. Documented Security Design
Revisit of the data classification for data at
Rest, and Transit
• E.g.: Employee data on Company System
becomes Customer Data on Insurance System,
data changes classification from system to
system, depending on the consuming
application
• Application Profiling at the time of
Provisioning for baselining
7
Continuous Security Example #2
Running static security scans on GIT repo branches
is considered continuous security with:
• Code Tagging (E.g.: deployed code tags needs to have meta
data about the code) with insights into code patterns (E.g.:
Singleton Usages, Factory patterns etc. tied to security insights)
• Developer Behaviors (E.g.: Developers who code in JAVA
might need training in SQL Injections etc., novice developers
might need training in XSS)
• Code-branch Patterns (E.g.: Code reposes with fewer
branches might have more to catch as branched code might be
more modularized and secure)
• Vulnerability Trends (E.g.: HR apps have SQL Injections, while
Service X might have the most vulnerable code)
• Types of Languages used tied to type of data classification
(E.g.: Cisco is a big JAVA and PL/SQL Shop with movement
towards Apex and Angular etc.…)
8
Continuous Security Example #3
Automated DAST is seen as continuous security with security benchmarking
• Quality Pre-requisites for DAST – Can Deployment workflows check for Quality & Load Tests
before running DAST scans? (Have QA bugs been fixed so DAST is spending more time on the
security threat classes?)
• Are the DAST Test environments close to Production and stable enough for graceful recovery
from the DAST attacks (DMZ, Core Zone, Data Center, PaaS profile), especially in a continuous
environment? Example - Network latency of the source call of the DAST scan to the Application
Destination environment (Eg: India to Richardson)
9
Continuous Security Example #4
Management of Incident Response data
and mapping to application attacks,
environment attacks with:
• Pre-Deployment Security Posture and:
• SAST
• DAST
• Open Source Scanning
• App Profiling (Cloud native, hybrid, on premise etc.)
• Penetration Test Results
• Post-Deployment Security Posture of:
• Applications
• Data
• Environment
10
Poll Question #2
11
Development Platform as a Service
Cloud
Apps
Apps
Built
Apps
Bought
Web
Mobile
Mobile
Web
DAST
Deployment
……
Repo
Mgmt.
Binary
Executable
Mgmt.
Executable
Mgmt.
……
……
……
……
Binary
Analyzer
Mobile
DAST
Build
Automation
SAST
Cloud
Ready
DAST
Quality
Assurance
Deployment
Post-Deployment
Mgmt.
Penetration
Test
Deployment
Repo
Mgmt.
Repo
Mgmt.
Build
Automation
Build
Automation
Quality
Assurance
Quality
Assurance
SAST
SAST
Penetration
Test
Penetration
Test
Post-Deployment
Mgmt.
Post-Deployment
Mgmt.
Quality
Assurance
Quality
Assurance
DAST
Binary
Analyzer
Mobile
DAST
Deployment
Deployment
Penetration
Test
Penetration
Test
Post-Deployment
Mgmt.
Post-Deployment
Mgmt.
APIs
Repo
Mgmt.
Build
Automation
Quality
Assurance
SAST Deployment
Cloud
Ready
DAST
Penetration
Test
Post-Deployment
Mgmt.
12
APP Profiling & DPAAS Choice
App
Stack
Provisioning
& App
Profiling
Cloud API
Web App Built
Cloud App
Mobile App Built
Web App Packaged
Mobile App Packaged
Incidents
&
Security
Breaches
App
Profile
(comp-
osite)
13
Poll Question #3
14
Continuous Security at Cisco
People &
Skillset
Technology &
Automation
Governance
& Audits
1. Continuous Education on
Process & Technology
2. In-Context Training as
opposed to On-Demand 
3. Federated Security Personnel
in the functions
1. Watch the Market &
Developer world
2. Our eyes are on PaaS
changes and Developer
Tools & Technology
Changes
1. Bringing The Policy to the user
2. Moving Governance into the
Life Cycle – Start Right, rather
than shift left 
3. Multi-Check Points
15
Journey to COGNITIVE
•Good
Domain
Knowledge
• Developer
Skill-Set will
range from
beginner to
seasoned
Simplify
• Process is
simple and
mature for
automation
•Intermediate
Skill-Set of
the
Developer
Automate
• Go from
multiple
sub-
systems to
digital
components
in streams
• Expert
Developer
Digitize
• Developer is
knowledgeable
enough on when
to apply machine
learning to enable
speed
• Adding Specific
Bots to address
bottlenecks is a
great way to ease
the experience
problem for
security tools &
their complexity
Machine
Learning
• Developer is
a Highly
Seasoned
with domain
expertise and
data
architectures
which then
leverage
cognitive
APIs for
Proactive
Security
Guidance
Cognitive
Process Complexity
Developer Skillset
16
Managing Risk Holistically
Comprehensive
attack surface
minimization
through insights
Bottoms up &
Top down
Vulnerability
management
Technology
ecosystem –
with Vendors
Always
remember the
application is
the front door -
Trained Ninjas
17
Key Resources to Learn More
18
• Forrester Report “Secure Applications at the Speed of DevOps”
• Gartner 2017 Magic Quadrant for Application Security Testing
• Forrester Total Economic Impact (TEI) Study
• E-Guide: 5 Steps to Achieve Risk-Based Application Security Management
Q & A
19
© 2017 IBM Corporation
Thank You!

More Related Content

What's hot (19)

PDF
DevOps Explained
Richard Seroter
 
PPT
Enterprise DevOps and the Cloud
CloudCheckr
 
PPTX
The Human Side of DevSecOps
Jules Pierre-Louis
 
PPTX
The Coming Earthquake in IIS and SQL Configuration Management
Jules Pierre-Louis
 
PPTX
DevOps Transformations
Ernest Mueller
 
PPTX
Detecting Insider Threats with Multi-layered Security Webcast
Compuware
 
PDF
Scaling Enterprise DevOps with CloudBees
DevOps.com
 
PDF
DevOps: A Culture Transformation, More than Technology
CA Technologies
 
PPTX
Introduction to devops
UtpalenduChakrobortt1
 
PPTX
SRE 101 (Site Reliability Engineering)
Hussain Mansoor
 
PDF
Untangling Continuous Delivery
Perforce
 
PDF
AppSec Fast and Slow: Your DevSecOps CI/CD Pipeline Isn’t an SSA Program
Denim Group
 
ODP
Lessons from DevOps: Taking DevOps practices into your AppSec Life
Matt Tesauro
 
PPTX
Enterprise DevOps and the Modern Mainframe Webcast Presentation
Compuware
 
PPTX
10 Reasons Why You Should Consider Google App Engine (GAE) for Your Next Project
Abeer R
 
PDF
DevOps and DevSecOps, Incident Management
ShriniKulkarni
 
PDF
Code-to-Cloud Visibility: An Essential Framework for DevOps Success
JadeCampbell13
 
PDF
Dos and Don'ts of DevSecOps
Priyanka Aash
 
PDF
Innovation in Action - #MFSummit2017
Micro Focus
 
DevOps Explained
Richard Seroter
 
Enterprise DevOps and the Cloud
CloudCheckr
 
The Human Side of DevSecOps
Jules Pierre-Louis
 
The Coming Earthquake in IIS and SQL Configuration Management
Jules Pierre-Louis
 
DevOps Transformations
Ernest Mueller
 
Detecting Insider Threats with Multi-layered Security Webcast
Compuware
 
Scaling Enterprise DevOps with CloudBees
DevOps.com
 
DevOps: A Culture Transformation, More than Technology
CA Technologies
 
Introduction to devops
UtpalenduChakrobortt1
 
SRE 101 (Site Reliability Engineering)
Hussain Mansoor
 
Untangling Continuous Delivery
Perforce
 
AppSec Fast and Slow: Your DevSecOps CI/CD Pipeline Isn’t an SSA Program
Denim Group
 
Lessons from DevOps: Taking DevOps practices into your AppSec Life
Matt Tesauro
 
Enterprise DevOps and the Modern Mainframe Webcast Presentation
Compuware
 
10 Reasons Why You Should Consider Google App Engine (GAE) for Your Next Project
Abeer R
 
DevOps and DevSecOps, Incident Management
ShriniKulkarni
 
Code-to-Cloud Visibility: An Essential Framework for DevOps Success
JadeCampbell13
 
Dos and Don'ts of DevSecOps
Priyanka Aash
 
Innovation in Action - #MFSummit2017
Micro Focus
 

Similar to Leverage DevOps & Agile Development to Transform Your Application Testing Program: Client Case Study (20)

PDF
DevSecOps: Essential Tooling to Enable Continuous Security(25m ADDO)
Rich Mills
 
PDF
DevSecOps: essential tooling to enable continuous security 2019-09-16
Rich Mills
 
PDF
DevSecOps
Spv Reddy
 
PPTX
Static Application Security Testing Strategies for Automation and Continuous ...
Kevin Fealey
 
PDF
Application Security Testing(AST)
Arvind Bhardwaj [AB]
 
PDF
Shift Left Security
BATbern
 
PDF
How the Cloud Shifts the Burden of Security to Development
Erika Barron
 
PPTX
TWISummit 2019 - Build Security In
Thoughtworks
 
PDF
Continuous security
Kim van Wilgen
 
PDF
How to Integrate AppSec Testing into your DevOps Program
Denim Group
 
PDF
Outpost24 Webinar - Creating a sustainable application security program to dr...
Outpost24
 
PDF
Shifting Security Left - The Innovation of DevSecOps - ValleyTechCon
Tom Stiehm
 
PDF
Filling your AppSec Toolbox - Which Tools, When to Use Them, and Why
Black Duck by Synopsys
 
PDF
Security in CI/CD Pipelines: Tips for DevOps Engineers
DevOps.com
 
ODP
Dev ops ci-ap-is-oh-my_security-gone-agile_ut-austin
Matt Tesauro
 
PDF
Security Checkpoints in Agile SDLC
Rahul Raghavan
 
PDF
Application Security Guide for Beginners
Checkmarx
 
PPTX
Succeeding-Marriage-Cybersecurity-DevOps final
rkadayam
 
PDF
Including security in devops
Jérémy Matos
 
PDF
Ast in CI/CD by Ofer Maor
DevSecCon
 
DevSecOps: Essential Tooling to Enable Continuous Security(25m ADDO)
Rich Mills
 
DevSecOps: essential tooling to enable continuous security 2019-09-16
Rich Mills
 
DevSecOps
Spv Reddy
 
Static Application Security Testing Strategies for Automation and Continuous ...
Kevin Fealey
 
Application Security Testing(AST)
Arvind Bhardwaj [AB]
 
Shift Left Security
BATbern
 
How the Cloud Shifts the Burden of Security to Development
Erika Barron
 
TWISummit 2019 - Build Security In
Thoughtworks
 
Continuous security
Kim van Wilgen
 
How to Integrate AppSec Testing into your DevOps Program
Denim Group
 
Outpost24 Webinar - Creating a sustainable application security program to dr...
Outpost24
 
Shifting Security Left - The Innovation of DevSecOps - ValleyTechCon
Tom Stiehm
 
Filling your AppSec Toolbox - Which Tools, When to Use Them, and Why
Black Duck by Synopsys
 
Security in CI/CD Pipelines: Tips for DevOps Engineers
DevOps.com
 
Dev ops ci-ap-is-oh-my_security-gone-agile_ut-austin
Matt Tesauro
 
Security Checkpoints in Agile SDLC
Rahul Raghavan
 
Application Security Guide for Beginners
Checkmarx
 
Succeeding-Marriage-Cybersecurity-DevOps final
rkadayam
 
Including security in devops
Jérémy Matos
 
Ast in CI/CD by Ofer Maor
DevSecCon
 
Ad

More from Deborah Schalm (20)

PDF
Exploring Prometheus: Combining Metrics and Alerting to Improve Incident Mana...
Deborah Schalm
 
PDF
Discovering Dark Debt in your Culture
Deborah Schalm
 
PDF
A Discussion of Automated Infrastructure Security with a Practical Example
Deborah Schalm
 
PDF
Protect Your Organization Against Known Security Defects
Deborah Schalm
 
PDF
Putting the Ops in DevOps
Deborah Schalm
 
PDF
Machine Learning to Turbo-Charge the Ops Portion of DevOps
Deborah Schalm
 
PDF
Post-Equifax: How to Trust But Verify Your Software Supply Chain
Deborah Schalm
 
PDF
30 Minutes to a Private Cloud
Deborah Schalm
 
PDF
Taking DevOps Monitoring to the Next Level - The 5 Step Guide to Monitoring N...
Deborah Schalm
 
PDF
Top 5 Considerations for Operating a Kubernetes Environment at Scale
Deborah Schalm
 
PPTX
Is a Monolith Standing in the Way of Your Digital Transformation? Refactor fo...
Deborah Schalm
 
PDF
EMA: Ten Priorities for Hybrid Cloud, Containers and DevOps in 2017
Deborah Schalm
 
PDF
Application Discovery! The Gift That Keeps on Giving
Deborah Schalm
 
PDF
Top 5 Challenges in Scaling DevOps in Brownfield Environments
Deborah Schalm
 
PDF
The Coming Earthquake in WebSphere Application Server Configuration Management
Deborah Schalm
 
PDF
Planet of the APIs: Monitoring Transactions in the Wild
Deborah Schalm
 
PDF
Get Loose! Microservices and Loosely Coupled Architectures
Deborah Schalm
 
PDF
Proactive Monitoring: Playing Offense for the Win
Deborah Schalm
 
PDF
No Tool is an Island: Building DevOps into your business
Deborah Schalm
 
PDF
Scale Continuous Deployment to Production with DeployHub and CloudBees
Deborah Schalm
 
Exploring Prometheus: Combining Metrics and Alerting to Improve Incident Mana...
Deborah Schalm
 
Discovering Dark Debt in your Culture
Deborah Schalm
 
A Discussion of Automated Infrastructure Security with a Practical Example
Deborah Schalm
 
Protect Your Organization Against Known Security Defects
Deborah Schalm
 
Putting the Ops in DevOps
Deborah Schalm
 
Machine Learning to Turbo-Charge the Ops Portion of DevOps
Deborah Schalm
 
Post-Equifax: How to Trust But Verify Your Software Supply Chain
Deborah Schalm
 
30 Minutes to a Private Cloud
Deborah Schalm
 
Taking DevOps Monitoring to the Next Level - The 5 Step Guide to Monitoring N...
Deborah Schalm
 
Top 5 Considerations for Operating a Kubernetes Environment at Scale
Deborah Schalm
 
Is a Monolith Standing in the Way of Your Digital Transformation? Refactor fo...
Deborah Schalm
 
EMA: Ten Priorities for Hybrid Cloud, Containers and DevOps in 2017
Deborah Schalm
 
Application Discovery! The Gift That Keeps on Giving
Deborah Schalm
 
Top 5 Challenges in Scaling DevOps in Brownfield Environments
Deborah Schalm
 
The Coming Earthquake in WebSphere Application Server Configuration Management
Deborah Schalm
 
Planet of the APIs: Monitoring Transactions in the Wild
Deborah Schalm
 
Get Loose! Microservices and Loosely Coupled Architectures
Deborah Schalm
 
Proactive Monitoring: Playing Offense for the Win
Deborah Schalm
 
No Tool is an Island: Building DevOps into your business
Deborah Schalm
 
Scale Continuous Deployment to Production with DeployHub and CloudBees
Deborah Schalm
 
Ad

Recently uploaded (20)

PDF
vMix Pro 28.0.0.42 Download vMix Registration key Bundle
kulindacore
 
DOCX
Import Data Form Excel to Tally Services
Tally xperts
 
PPTX
Tally software_Introduction_Presentation
AditiBansal54083
 
PDF
유니티에서 Burst Compiler+ThreadedJobs+SIMD 적용사례
Seongdae Kim
 
PDF
Executive Business Intelligence Dashboards
vandeslie24
 
PPTX
Java Native Memory Leaks: The Hidden Villain Behind JVM Performance Issues
Tier1 app
 
PDF
HiHelloHR – Simplify HR Operations for Modern Workplaces
HiHelloHR
 
PPT
MergeSortfbsjbjsfk sdfik k
RafishaikIT02044
 
PDF
Efficient, Automated Claims Processing Software for Insurers
Insurance Tech Services
 
PDF
GetOnCRM Speeds Up Agentforce 3 Deployment for Enterprise AI Wins.pdf
GetOnCRM Solutions
 
PPTX
Human Resources Information System (HRIS)
Amity University, Patna
 
PPTX
Engineering the Java Web Application (MVC)
abhishekoza1981
 
PPTX
Writing Better Code - Helping Developers make Decisions.pptx
Lorraine Steyn
 
PDF
Thread In Android-Mastering Concurrency for Responsive Apps.pdf
Nabin Dhakal
 
PDF
Salesforce CRM Services.VALiNTRY360
VALiNTRY360
 
PPTX
Migrating Millions of Users with Debezium, Apache Kafka, and an Acyclic Synch...
MD Sayem Ahmed
 
PDF
Streamline Contractor Lifecycle- TECH EHS Solution
TECH EHS Solution
 
PPTX
The Role of a PHP Development Company in Modern Web Development
SEO Company for School in Delhi NCR
 
PPTX
MailsDaddy Outlook OST to PST converter.pptx
abhishekdutt366
 
PPTX
An Introduction to ZAP by Checkmarx - Official Version
Simon Bennetts
 
vMix Pro 28.0.0.42 Download vMix Registration key Bundle
kulindacore
 
Import Data Form Excel to Tally Services
Tally xperts
 
Tally software_Introduction_Presentation
AditiBansal54083
 
유니티에서 Burst Compiler+ThreadedJobs+SIMD 적용사례
Seongdae Kim
 
Executive Business Intelligence Dashboards
vandeslie24
 
Java Native Memory Leaks: The Hidden Villain Behind JVM Performance Issues
Tier1 app
 
HiHelloHR – Simplify HR Operations for Modern Workplaces
HiHelloHR
 
MergeSortfbsjbjsfk sdfik k
RafishaikIT02044
 
Efficient, Automated Claims Processing Software for Insurers
Insurance Tech Services
 
GetOnCRM Speeds Up Agentforce 3 Deployment for Enterprise AI Wins.pdf
GetOnCRM Solutions
 
Human Resources Information System (HRIS)
Amity University, Patna
 
Engineering the Java Web Application (MVC)
abhishekoza1981
 
Writing Better Code - Helping Developers make Decisions.pptx
Lorraine Steyn
 
Thread In Android-Mastering Concurrency for Responsive Apps.pdf
Nabin Dhakal
 
Salesforce CRM Services.VALiNTRY360
VALiNTRY360
 
Migrating Millions of Users with Debezium, Apache Kafka, and an Acyclic Synch...
MD Sayem Ahmed
 
Streamline Contractor Lifecycle- TECH EHS Solution
TECH EHS Solution
 
The Role of a PHP Development Company in Modern Web Development
SEO Company for School in Delhi NCR
 
MailsDaddy Outlook OST to PST converter.pptx
abhishekdutt366
 
An Introduction to ZAP by Checkmarx - Official Version
Simon Bennetts
 

Leverage DevOps & Agile Development to Transform Your Application Testing Program: Client Case Study

  • 1. © 2017 IBM Corporation Leverage DevOps & Agile Development to Transform Your Application Testing Program: Client Case Study
  • 2. Speakers Shuchita Gupta Senior Software Client Architect & Leader IBM Sona Srinivasan Senior IT Architect, Global Architecture and Technology Services IT CISCO Systems, Inc. Alan Shimel Moderator, Editor-in-Chief DevOps.com 2
  • 3. State of Application Security Average time to detect APT 256 days Average cost of a U.S. data breach $6.5M Percentage of breaches due to Web attacks 40% Sources: IBM X-Force Threat Intelligence 2015; 2016 Verizon Data Breach Investigations Report; 2016 Cost of Data Breach Study: Global Analysis Average size of a U.S. data breach 30K records 3
  • 4. Conversations & Challenges How often should you think about security in the SDLC? Are automated DAST scans enough? Should I stop my release in a continuous delivery pipeline if my critical vulnerabilities aren't fixed? Can running SAST scans on each build reduce my need to run DAST scans? Should my user stories for security be incorporated in a sprint, or be a part of my design? Key: SAST – Static Application Security Testing DAST – Dynamic Application Security Testing 4
  • 6. The Sec Ops Journey Conversations that launched with Agile The Steps to Cognitive Security Examples of Continuous Security Continuous Security at Cisco Adapting to Threats & Attacks Together 6 6
  • 7. Continuous Security Example #1 Architecture & Security Requirements • Threat Modeling By Feature & Design - For every major application re-design or major feature change, Threat Models must be built based on the application’s design changes • Security assessments and User Stories Tie in, where security assessments answer the Who, Why and What of the feature and application. Documented Security Design Revisit of the data classification for data at Rest, and Transit • E.g.: Employee data on Company System becomes Customer Data on Insurance System, data changes classification from system to system, depending on the consuming application • Application Profiling at the time of Provisioning for baselining 7
  • 8. Continuous Security Example #2 Running static security scans on GIT repo branches is considered continuous security with: • Code Tagging (E.g.: deployed code tags needs to have meta data about the code) with insights into code patterns (E.g.: Singleton Usages, Factory patterns etc. tied to security insights) • Developer Behaviors (E.g.: Developers who code in JAVA might need training in SQL Injections etc., novice developers might need training in XSS) • Code-branch Patterns (E.g.: Code reposes with fewer branches might have more to catch as branched code might be more modularized and secure) • Vulnerability Trends (E.g.: HR apps have SQL Injections, while Service X might have the most vulnerable code) • Types of Languages used tied to type of data classification (E.g.: Cisco is a big JAVA and PL/SQL Shop with movement towards Apex and Angular etc.…) 8
  • 9. Continuous Security Example #3 Automated DAST is seen as continuous security with security benchmarking • Quality Pre-requisites for DAST – Can Deployment workflows check for Quality & Load Tests before running DAST scans? (Have QA bugs been fixed so DAST is spending more time on the security threat classes?) • Are the DAST Test environments close to Production and stable enough for graceful recovery from the DAST attacks (DMZ, Core Zone, Data Center, PaaS profile), especially in a continuous environment? Example - Network latency of the source call of the DAST scan to the Application Destination environment (Eg: India to Richardson) 9
  • 10. Continuous Security Example #4 Management of Incident Response data and mapping to application attacks, environment attacks with: • Pre-Deployment Security Posture and: • SAST • DAST • Open Source Scanning • App Profiling (Cloud native, hybrid, on premise etc.) • Penetration Test Results • Post-Deployment Security Posture of: • Applications • Data • Environment 10
  • 12. Development Platform as a Service Cloud Apps Apps Built Apps Bought Web Mobile Mobile Web DAST Deployment …… Repo Mgmt. Binary Executable Mgmt. Executable Mgmt. …… …… …… …… Binary Analyzer Mobile DAST Build Automation SAST Cloud Ready DAST Quality Assurance Deployment Post-Deployment Mgmt. Penetration Test Deployment Repo Mgmt. Repo Mgmt. Build Automation Build Automation Quality Assurance Quality Assurance SAST SAST Penetration Test Penetration Test Post-Deployment Mgmt. Post-Deployment Mgmt. Quality Assurance Quality Assurance DAST Binary Analyzer Mobile DAST Deployment Deployment Penetration Test Penetration Test Post-Deployment Mgmt. Post-Deployment Mgmt. APIs Repo Mgmt. Build Automation Quality Assurance SAST Deployment Cloud Ready DAST Penetration Test Post-Deployment Mgmt. 12
  • 13. APP Profiling & DPAAS Choice App Stack Provisioning & App Profiling Cloud API Web App Built Cloud App Mobile App Built Web App Packaged Mobile App Packaged Incidents & Security Breaches App Profile (comp- osite) 13
  • 15. Continuous Security at Cisco People & Skillset Technology & Automation Governance & Audits 1. Continuous Education on Process & Technology 2. In-Context Training as opposed to On-Demand  3. Federated Security Personnel in the functions 1. Watch the Market & Developer world 2. Our eyes are on PaaS changes and Developer Tools & Technology Changes 1. Bringing The Policy to the user 2. Moving Governance into the Life Cycle – Start Right, rather than shift left  3. Multi-Check Points 15
  • 16. Journey to COGNITIVE •Good Domain Knowledge • Developer Skill-Set will range from beginner to seasoned Simplify • Process is simple and mature for automation •Intermediate Skill-Set of the Developer Automate • Go from multiple sub- systems to digital components in streams • Expert Developer Digitize • Developer is knowledgeable enough on when to apply machine learning to enable speed • Adding Specific Bots to address bottlenecks is a great way to ease the experience problem for security tools & their complexity Machine Learning • Developer is a Highly Seasoned with domain expertise and data architectures which then leverage cognitive APIs for Proactive Security Guidance Cognitive Process Complexity Developer Skillset 16
  • 17. Managing Risk Holistically Comprehensive attack surface minimization through insights Bottoms up & Top down Vulnerability management Technology ecosystem – with Vendors Always remember the application is the front door - Trained Ninjas 17
  • 18. Key Resources to Learn More 18 • Forrester Report “Secure Applications at the Speed of DevOps” • Gartner 2017 Magic Quadrant for Application Security Testing • Forrester Total Economic Impact (TEI) Study • E-Guide: 5 Steps to Achieve Risk-Based Application Security Management
  • 20. © 2017 IBM Corporation Thank You!

Editor's Notes

  • #2: Slides 1-2: Alan General introductions and topic overview