SlideShare a Scribd company logo
DevOps to DevSecOps:
Delivering quality and secure development from
the start
Simon Roe, Outpost24 & Stefania Chaplin, Secure Code Warrior
15th July 2021
Helping customers improve security posture since 2001
Full stack security assessment
Over 2,000 customers in all regions of the world
Really good at breaking technology
Today’s agenda
3
● Security best practice for maximum DevSecOps from developer training, risk scoring, to
application security scanning and API testing
● Building security testing into your SDLC to deliver actionable results and reduce
application vulnerabilities
● Integration and automation of application security for fast and secure deployment
● Fundamentals for starting left with secure code training to maximize compliance
Outpost24 Template
2019
DevOps
Traditional ‘Waterfall’ Development
5
Plan Code Build Test Release Deploy
Security is ‘tested’ during the fixed Test period.
6
• Cost of a Data Breach $3.86M
• 207 days to detect
• 73 days to contain
• $150 / per PII record lost
Find during Development
$100 / defect
Find during Build
$500 / defect
Find during QA/Test
$1,500 / defect
Find in Production
$10,000 / defect
Up to 80% of development
costs are spent identifying
and correcting defects!
Source: Ponemon Institute 2020
Source: National Institute of Standards and Technology
Cost of security defects 6
How do we
incorporate security?
• Security has historically been a
silo
• Designed to prevent change
• Waterfall security does not fit
the shift left mentality
• Process + People change
• DevOps security champions
‘Companies are spending a great deal on
security. But we read of a number of massive
computer-related attacks. Clearly something is
wrong. The root of the problem is twofold:
we’re protecting the wrong things, and were
hurting productivity in the process.’
Thinking security, Steven M. Bellovin
Resistance is
futile
DevOps is here, and getting
bigger
DevSecOps – How?
• Dev teams should engage with Infosec as early as
possible
• Embed security champions into DevOps teams
• ‘Start left’ in your security testing approach
• Embed security into the Developers KPI’s
• Integrate security into the DevOps Tool chain
(automatically)
• Run post mortems and ‘Learn’ from them
• Encourage security best practices through gamified
learning
11
Learning from the best or the worst 12
• Mistakes happen. And continue to happen daily.
• DevSecOps integration is not immune.
• DevSecOps is about process as well as people.
• Building security into the very heart of DevOps. Empower individuals to
be the security person in their day to day roles through:
• Mutual understanding.
• Shared Language.
• Shared vision.
• Collaborative tooling.
Outpost24 Template
2019
DevSecOps – Now what?
Dev(Sec)Ops is here, and
getting bigger
15
Takeaways
Don’t resist – build a plan 16
• If DevSecOps isn’t practiced today:
• In the next month identify the who / what / where of the CI
/CD pipeline
• Find security champions in Dev and Ops
• In the next 3 months create a plan to integrate security into
DevOps
• Start left. Add one or two tools into an earlier phase of
the SDLC including secure code training
• Empower developers with training to own their own
security code hygiene
• Within 6 months security should be embedded in all phases of
the SDLC
• If DevSecOps is practiced today:
• Can it be improved?
• Do you have a good understanding of security state of each
phase from Develop through deploy and monitor?
• Do you train your developers regularly on security issues?
Outpost24 Template
2019
Starting left with secure code training
Security issues in the beginning...
18
Security bugs used to be
an afterthought, now
preventing vulnerabilities
is integrated into the daily
workflow.
19
Mo’ money, mo’ problems...
20
Money Code
Where do vulnerabilities come from?
21
The opportunity to overlay with software security
22
The opportunity:
• Make Security part of that DevOps ecosystem
• Embed writing secure code into the day-to-day development work
Why do we need effective security training?
23
10 YEARS OF FAILED KNOWLEDGE DISTRIBUTION
OF VULNERABILITIES FOUND IN 1999
Break The Cycle of Recurring Vulnerabilities 24
Culture fit for developers
25
Provide developers with solutions to write
secure code that appeal to developers.
Developer should see the benefit:
● Highly sought-after
● A cut above average developers
● More lucrative job opportunities
● Instrumental in the battle against cyberattacks
and data breaches
Mindset for developers:
Aware that the only good code is secure code.
Make developers
security superheroes
26
Culture of Security Awareness
27
• Let developers get hands-on and learn by doing
• When security training is engaging and
delivered in the languages and frameworks that
are actually used, it is a powerful learning
experience
• Give developers the time to train
• Empower them to level up as a developer, while
leaving behind boring assessments and tick-the-
box training
The right type of training
28
• EMPOWER DEVELOPERS WITH THE
KNOWLEDGE TO SUCCEED IN
DAY-TO-DAY WORK
• > Hands-on, bite-sized and contextual
• > Language/framework specific (yes, even
COBOL!)
• > Incentive-based, with assessable
outcomes
• > Doesn’t bore everyone senseless (make it
a game!)
29
• Start left with security – all the way left
• Run developer training – improve security code hygiene
• Appoint Security champions
• Integrate security throughout your SDLC #devsecops
Takeaways
Outpost24 Template
2019
Simon Roe, Product Manager Application Security &
Stefania Chaplin, Solutions Architect
sro@outpost24.com
schaplin@securecodewarrior.com
Questions?

More Related Content

What's hot (19)

PPTX
Improve threat detection with hids and alien vault usm
AlienVault
 
PDF
Outpost24 webinar - A day in the life of an information security professional
Outpost24
 
PPTX
Incident response live demo slides final
AlienVault
 
PDF
Evidence-Based Security: The New Top Five Controls
Priyanka Aash
 
PPTX
An introduction to Cyber Essentials
Jisc
 
PDF
Outpost24 webinar - Implications when migrating to a Zero Trust model
Outpost24
 
PPTX
Outpost24 webinar - The new CISO imperative: connecting technical vulnerabili...
Outpost24
 
PPTX
Improve Situational Awareness for Federal Government with AlienVault USM
AlienVault
 
PDF
Outpost24 webinar: Security Analytics: what's in a risk score
Outpost24
 
PPTX
Building an application security program
Outpost24
 
PDF
How to Reduce the Attack Surface Created by Your Cyber-Tools
Enterprise Management Associates
 
PDF
Symantec Cyber Security Solutions | MSS and Advanced Threat Protection
infoLock Technologies
 
PPTX
Outpost24 webinar: Risk-based approach to security assessments
Outpost24
 
PDF
QualysGuard InfoDay 2013 - QualysGuard Security & Compliance Suite supporting...
Risk Analysis Consultants, s.r.o.
 
PDF
Alien vault sans cyber threat intelligence
AlienVault
 
PDF
Outpost24 webinar - Improve your organizations security with red teaming
Outpost24
 
PDF
TIC-TOC: Ransomware: Help your Customers be Prepared with Dominique Singer an...
SaraPia5
 
PPTX
New USM v5.0 - Get Complete Security Visibility Faster & Easier Than Ever
AlienVault
 
PPTX
Malware evolution and Endpoint Detection and Response
Adrian Guthrie
 
Improve threat detection with hids and alien vault usm
AlienVault
 
Outpost24 webinar - A day in the life of an information security professional
Outpost24
 
Incident response live demo slides final
AlienVault
 
Evidence-Based Security: The New Top Five Controls
Priyanka Aash
 
An introduction to Cyber Essentials
Jisc
 
Outpost24 webinar - Implications when migrating to a Zero Trust model
Outpost24
 
Outpost24 webinar - The new CISO imperative: connecting technical vulnerabili...
Outpost24
 
Improve Situational Awareness for Federal Government with AlienVault USM
AlienVault
 
Outpost24 webinar: Security Analytics: what's in a risk score
Outpost24
 
Building an application security program
Outpost24
 
How to Reduce the Attack Surface Created by Your Cyber-Tools
Enterprise Management Associates
 
Symantec Cyber Security Solutions | MSS and Advanced Threat Protection
infoLock Technologies
 
Outpost24 webinar: Risk-based approach to security assessments
Outpost24
 
QualysGuard InfoDay 2013 - QualysGuard Security & Compliance Suite supporting...
Risk Analysis Consultants, s.r.o.
 
Alien vault sans cyber threat intelligence
AlienVault
 
Outpost24 webinar - Improve your organizations security with red teaming
Outpost24
 
TIC-TOC: Ransomware: Help your Customers be Prepared with Dominique Singer an...
SaraPia5
 
New USM v5.0 - Get Complete Security Visibility Faster & Easier Than Ever
AlienVault
 
Malware evolution and Endpoint Detection and Response
Adrian Guthrie
 

Similar to Outpost24 Webinar - DevOps to DevSecOps: delivering quality and secure development from the start (20)

PDF
Outpost24 webinar: Turning DevOps and security into DevSecOps
Outpost24
 
PDF
Modern Security Operations aka Secure DevOps @ All Day DevOps 2017
Madhu Akula
 
PPTX
Outpost24 webinar - Why security perfection is the enemy of DevSecOps
Outpost24
 
PDF
Why Security Engineer Need Shift-Left to DevSecOps?
Najib Radzuan
 
PPTX
DevSecOps: Integrating Security Into DevOps! {Business Security}
Algoworks Inc
 
PDF
DevSecOps at Agile 2019
Elizabeth Ayer
 
PDF
Scale security for a dollar or less
Mohammed A. Imran
 
PPTX
Secure DevOps - Evolution or Revolution?
Security Innovation
 
PDF
Security's DevOps Transformation
Michele Chubirka
 
PDF
Strengthen and Scale Security Using DevSecOps - OWASP Indonesia
Mohammed A. Imran
 
PDF
DevOps and Devsecops What are the Differences.pdf
Techugo
 
PDF
How Security can be the Next Force Multiplier in DevOps
Andrew Storms
 
PDF
AppSec How-To: Achieving Security in DevOps
Checkmarx
 
PPTX
DevSecOps : an Introduction
Prashanth B. P.
 
PDF
DevOps and Devsecops- Everything you need to know.
Techugo
 
PDF
Learning Devsecops 1st Edition Steve Suehring
murdyamaruan
 
PDF
Strengthen and Scale Security for a dollar or less
Mohammed A. Imran
 
PDF
Protecting Agile Transformation through Secure DevOps (DevSecOps)
Eryk Budi Pratama
 
PPTX
DevSecOps Training Bootcamp - A Practical DevSecOps Course
Tonex
 
PPTX
DevOps & Security: Here & Now
Checkmarx
 
Outpost24 webinar: Turning DevOps and security into DevSecOps
Outpost24
 
Modern Security Operations aka Secure DevOps @ All Day DevOps 2017
Madhu Akula
 
Outpost24 webinar - Why security perfection is the enemy of DevSecOps
Outpost24
 
Why Security Engineer Need Shift-Left to DevSecOps?
Najib Radzuan
 
DevSecOps: Integrating Security Into DevOps! {Business Security}
Algoworks Inc
 
DevSecOps at Agile 2019
Elizabeth Ayer
 
Scale security for a dollar or less
Mohammed A. Imran
 
Secure DevOps - Evolution or Revolution?
Security Innovation
 
Security's DevOps Transformation
Michele Chubirka
 
Strengthen and Scale Security Using DevSecOps - OWASP Indonesia
Mohammed A. Imran
 
DevOps and Devsecops What are the Differences.pdf
Techugo
 
How Security can be the Next Force Multiplier in DevOps
Andrew Storms
 
AppSec How-To: Achieving Security in DevOps
Checkmarx
 
DevSecOps : an Introduction
Prashanth B. P.
 
DevOps and Devsecops- Everything you need to know.
Techugo
 
Learning Devsecops 1st Edition Steve Suehring
murdyamaruan
 
Strengthen and Scale Security for a dollar or less
Mohammed A. Imran
 
Protecting Agile Transformation through Secure DevOps (DevSecOps)
Eryk Budi Pratama
 
DevSecOps Training Bootcamp - A Practical DevSecOps Course
Tonex
 
DevOps & Security: Here & Now
Checkmarx
 
Ad

More from Outpost24 (20)

PPTX
Outpost24 webinar - A fresh look into the underground card shop ecosystem
Outpost24
 
PDF
Outpost24 webinar Why API security matters and how to get it right.pdf
Outpost24
 
PPTX
Outpost24 webinar - How to protect your organization from credential theft
Outpost24
 
PPTX
Outpost24 webinar : Beating hackers at their own game 2022 predictions
Outpost24
 
PDF
Outpost24 webinar - Mapping Vulnerabilities with the MITRE ATT&CK Framework
Outpost24
 
PPTX
Outpost24 webinar: The state of ransomware in 2021 and how to limit your expo...
Outpost24
 
PPTX
Outpost24 webinar - Api security
Outpost24
 
PDF
Outpost24 Webinar - CISO conversation behind the cyber security technology
Outpost24
 
PDF
Outpost24 webinar - Differentiating vulnerabilities from risks to reduce time...
Outpost24
 
PDF
Outpost24 webinar - How to secure cloud services in the DevOps fast lane
Outpost24
 
PPTX
Outpost24 webinar - Demystifying Web Application Security with Attack Surface...
Outpost24
 
PPTX
Outpost24 webinar - Bridging your cyber hygiene gap to prevent enterprise hac...
Outpost24
 
PPTX
Outpost24 webinar mastering container security in modern day dev ops
Outpost24
 
PPTX
Outpost24 webinar - Protecting Cezanne HR’s cloud web application with contin...
Outpost24
 
PPTX
Outpost24 webinar - Understanding the 7 deadly web application attack vectors
Outpost24
 
PPTX
Outpost24 webinar - Cybersecurity readiness in the post Covid-19 world
Outpost24
 
PPTX
Outpost24 webinar - Securing DevOps in Cloud Environments
Outpost24
 
PDF
Outpost24 webinar - Covid-19: Driving application security resilience in time...
Outpost24
 
PDF
Outpost24 webinar - preventing wireless attacks with device visibility and t...
Outpost24
 
PDF
Outpost24 webinar - risk based vulnerability management - what's in a risk score
Outpost24
 
Outpost24 webinar - A fresh look into the underground card shop ecosystem
Outpost24
 
Outpost24 webinar Why API security matters and how to get it right.pdf
Outpost24
 
Outpost24 webinar - How to protect your organization from credential theft
Outpost24
 
Outpost24 webinar : Beating hackers at their own game 2022 predictions
Outpost24
 
Outpost24 webinar - Mapping Vulnerabilities with the MITRE ATT&CK Framework
Outpost24
 
Outpost24 webinar: The state of ransomware in 2021 and how to limit your expo...
Outpost24
 
Outpost24 webinar - Api security
Outpost24
 
Outpost24 Webinar - CISO conversation behind the cyber security technology
Outpost24
 
Outpost24 webinar - Differentiating vulnerabilities from risks to reduce time...
Outpost24
 
Outpost24 webinar - How to secure cloud services in the DevOps fast lane
Outpost24
 
Outpost24 webinar - Demystifying Web Application Security with Attack Surface...
Outpost24
 
Outpost24 webinar - Bridging your cyber hygiene gap to prevent enterprise hac...
Outpost24
 
Outpost24 webinar mastering container security in modern day dev ops
Outpost24
 
Outpost24 webinar - Protecting Cezanne HR’s cloud web application with contin...
Outpost24
 
Outpost24 webinar - Understanding the 7 deadly web application attack vectors
Outpost24
 
Outpost24 webinar - Cybersecurity readiness in the post Covid-19 world
Outpost24
 
Outpost24 webinar - Securing DevOps in Cloud Environments
Outpost24
 
Outpost24 webinar - Covid-19: Driving application security resilience in time...
Outpost24
 
Outpost24 webinar - preventing wireless attacks with device visibility and t...
Outpost24
 
Outpost24 webinar - risk based vulnerability management - what's in a risk score
Outpost24
 
Ad

Recently uploaded (20)

PDF
ERP Consulting Services and Solutions by Contetra Pvt Ltd
jayjani123
 
PDF
Technical-Careers-Roadmap-in-Software-Market.pdf
Hussein Ali
 
PDF
[Solution] Why Choose the VeryPDF DRM Protector Custom-Built Solution for You...
Lingwen1998
 
PDF
intro_to_cpp_namespace_robotics_corner.pdf
MohamedSaied877003
 
PDF
Everything you need to know about pricing & licensing Microsoft 365 Copilot f...
Q-Advise
 
PDF
Best Web development company in india 2025
Greenusys
 
PDF
Dipole Tech Innovations – Global IT Solutions for Business Growth
dipoletechi3
 
PDF
Is Framer the Future of AI Powered No-Code Development?
Isla Pandora
 
PPTX
BB FlashBack Pro 5.61.0.4843 With Crack Free Download
cracked shares
 
PPTX
UI5con_2025_Accessibility_Ever_Evolving_
gerganakremenska1
 
PDF
How to Hire AI Developers_ Step-by-Step Guide in 2025.pdf
DianApps Technologies
 
PPTX
Library_Management_System_PPT111111.pptx
nmtnissancrm
 
PDF
Why is partnering with a SaaS development company crucial for enterprise succ...
Nextbrain Technologies
 
PPTX
iaas vs paas vs saas :choosing your cloud strategy
CloudlayaTechnology
 
PDF
TheFutureIsDynamic-BoxLang witch Luis Majano.pdf
Ortus Solutions, Corp
 
PDF
SAP Firmaya İade ABAB Kodları - ABAB ile yazılmıl hazır kod örneği
Salih Küçük
 
PPTX
Build a Custom Agent for Agentic Testing.pptx
klpathrudu
 
PDF
AOMEI Partition Assistant Crack 10.8.2 + WinPE Free Downlaod New Version 2025
bashirkhan333g
 
PPTX
Transforming Insights: How Generative AI is Revolutionizing Data Analytics
LetsAI Solutions
 
PPTX
prodad heroglyph crack 2.0.214.2 Full Free Download
cracked shares
 
ERP Consulting Services and Solutions by Contetra Pvt Ltd
jayjani123
 
Technical-Careers-Roadmap-in-Software-Market.pdf
Hussein Ali
 
[Solution] Why Choose the VeryPDF DRM Protector Custom-Built Solution for You...
Lingwen1998
 
intro_to_cpp_namespace_robotics_corner.pdf
MohamedSaied877003
 
Everything you need to know about pricing & licensing Microsoft 365 Copilot f...
Q-Advise
 
Best Web development company in india 2025
Greenusys
 
Dipole Tech Innovations – Global IT Solutions for Business Growth
dipoletechi3
 
Is Framer the Future of AI Powered No-Code Development?
Isla Pandora
 
BB FlashBack Pro 5.61.0.4843 With Crack Free Download
cracked shares
 
UI5con_2025_Accessibility_Ever_Evolving_
gerganakremenska1
 
How to Hire AI Developers_ Step-by-Step Guide in 2025.pdf
DianApps Technologies
 
Library_Management_System_PPT111111.pptx
nmtnissancrm
 
Why is partnering with a SaaS development company crucial for enterprise succ...
Nextbrain Technologies
 
iaas vs paas vs saas :choosing your cloud strategy
CloudlayaTechnology
 
TheFutureIsDynamic-BoxLang witch Luis Majano.pdf
Ortus Solutions, Corp
 
SAP Firmaya İade ABAB Kodları - ABAB ile yazılmıl hazır kod örneği
Salih Küçük
 
Build a Custom Agent for Agentic Testing.pptx
klpathrudu
 
AOMEI Partition Assistant Crack 10.8.2 + WinPE Free Downlaod New Version 2025
bashirkhan333g
 
Transforming Insights: How Generative AI is Revolutionizing Data Analytics
LetsAI Solutions
 
prodad heroglyph crack 2.0.214.2 Full Free Download
cracked shares
 

Outpost24 Webinar - DevOps to DevSecOps: delivering quality and secure development from the start

  • 1. DevOps to DevSecOps: Delivering quality and secure development from the start Simon Roe, Outpost24 & Stefania Chaplin, Secure Code Warrior 15th July 2021
  • 2. Helping customers improve security posture since 2001 Full stack security assessment Over 2,000 customers in all regions of the world Really good at breaking technology
  • 3. Today’s agenda 3 ● Security best practice for maximum DevSecOps from developer training, risk scoring, to application security scanning and API testing ● Building security testing into your SDLC to deliver actionable results and reduce application vulnerabilities ● Integration and automation of application security for fast and secure deployment ● Fundamentals for starting left with secure code training to maximize compliance
  • 5. Traditional ‘Waterfall’ Development 5 Plan Code Build Test Release Deploy Security is ‘tested’ during the fixed Test period.
  • 6. 6 • Cost of a Data Breach $3.86M • 207 days to detect • 73 days to contain • $150 / per PII record lost Find during Development $100 / defect Find during Build $500 / defect Find during QA/Test $1,500 / defect Find in Production $10,000 / defect Up to 80% of development costs are spent identifying and correcting defects! Source: Ponemon Institute 2020 Source: National Institute of Standards and Technology Cost of security defects 6
  • 7. How do we incorporate security? • Security has historically been a silo • Designed to prevent change • Waterfall security does not fit the shift left mentality • Process + People change • DevOps security champions
  • 8. ‘Companies are spending a great deal on security. But we read of a number of massive computer-related attacks. Clearly something is wrong. The root of the problem is twofold: we’re protecting the wrong things, and were hurting productivity in the process.’ Thinking security, Steven M. Bellovin
  • 10. DevOps is here, and getting bigger
  • 11. DevSecOps – How? • Dev teams should engage with Infosec as early as possible • Embed security champions into DevOps teams • ‘Start left’ in your security testing approach • Embed security into the Developers KPI’s • Integrate security into the DevOps Tool chain (automatically) • Run post mortems and ‘Learn’ from them • Encourage security best practices through gamified learning 11
  • 12. Learning from the best or the worst 12 • Mistakes happen. And continue to happen daily. • DevSecOps integration is not immune. • DevSecOps is about process as well as people. • Building security into the very heart of DevOps. Empower individuals to be the security person in their day to day roles through: • Mutual understanding. • Shared Language. • Shared vision. • Collaborative tooling.
  • 14. Dev(Sec)Ops is here, and getting bigger
  • 15. 15
  • 16. Takeaways Don’t resist – build a plan 16 • If DevSecOps isn’t practiced today: • In the next month identify the who / what / where of the CI /CD pipeline • Find security champions in Dev and Ops • In the next 3 months create a plan to integrate security into DevOps • Start left. Add one or two tools into an earlier phase of the SDLC including secure code training • Empower developers with training to own their own security code hygiene • Within 6 months security should be embedded in all phases of the SDLC • If DevSecOps is practiced today: • Can it be improved? • Do you have a good understanding of security state of each phase from Develop through deploy and monitor? • Do you train your developers regularly on security issues?
  • 17. Outpost24 Template 2019 Starting left with secure code training
  • 18. Security issues in the beginning... 18 Security bugs used to be an afterthought, now preventing vulnerabilities is integrated into the daily workflow.
  • 19. 19
  • 20. Mo’ money, mo’ problems... 20 Money Code
  • 21. Where do vulnerabilities come from? 21
  • 22. The opportunity to overlay with software security 22 The opportunity: • Make Security part of that DevOps ecosystem • Embed writing secure code into the day-to-day development work
  • 23. Why do we need effective security training? 23 10 YEARS OF FAILED KNOWLEDGE DISTRIBUTION OF VULNERABILITIES FOUND IN 1999
  • 24. Break The Cycle of Recurring Vulnerabilities 24
  • 25. Culture fit for developers 25 Provide developers with solutions to write secure code that appeal to developers. Developer should see the benefit: ● Highly sought-after ● A cut above average developers ● More lucrative job opportunities ● Instrumental in the battle against cyberattacks and data breaches Mindset for developers: Aware that the only good code is secure code.
  • 27. Culture of Security Awareness 27 • Let developers get hands-on and learn by doing • When security training is engaging and delivered in the languages and frameworks that are actually used, it is a powerful learning experience • Give developers the time to train • Empower them to level up as a developer, while leaving behind boring assessments and tick-the- box training
  • 28. The right type of training 28 • EMPOWER DEVELOPERS WITH THE KNOWLEDGE TO SUCCEED IN DAY-TO-DAY WORK • > Hands-on, bite-sized and contextual • > Language/framework specific (yes, even COBOL!) • > Incentive-based, with assessable outcomes • > Doesn’t bore everyone senseless (make it a game!)
  • 29. 29
  • 30. • Start left with security – all the way left • Run developer training – improve security code hygiene • Appoint Security champions • Integrate security throughout your SDLC #devsecops Takeaways
  • 31. Outpost24 Template 2019 Simon Roe, Product Manager Application Security & Stefania Chaplin, Solutions Architect [email protected] [email protected] Questions?