SlideShare uma empresa Scribd logo
1 de 34
Baixar para ler offline
Optimizing Security Velocity in Your
DevSecOps Pipeline at Scale
Tools Tips Tactics
THE 2021 WEBINAR SERIES
February 18, 2021 | 2 pm - 3 pm, EST
Brian Reed
Chief Mobility Officer
Dan Cornell
Co-Founder & CTO
© Copyright 2021 Now Secure, Inc. All Rights Reserved. Proprietary Information. Do not distribute.
Agenda
2
Introductions
State of App Security
Powering Secure Pipelines
Mastering Volume & Velocity
Reference Resources
Open Q&A
Meet the Experts
Brian Reed
Chief Mobility Officer
Dan Cornell
Co-Founder & CTO
© Copyright 2021 Now Secure, Inc. All Rights Reserved. Proprietary Information. Do not distribute.
Mission:
Save the World from Unsafe Mobile Apps
Automated Mobile AppSec Testing Software
Expert Pen Testing & Training Services
Mobile-First & Mobile-Only, 10+ Years in Mobile Forensics & Security
Standards-driven OWASP, NIAP, CVSS, Industry Regulations
Sponsor of OWASP Mobile Project, MASVS, Top 10
Contributors to Frida & Radare
2X Mobile App Sec Testing (MAST) Leader by IDC
DevSecOps Transformational Leader by Gartner
3
© Copyright 2021 Now Secure, Inc. All Rights Reserved. Proprietary Information. Do not distribute.
About Denim Group & ThreadFix
Leading provider of application security assessments,
penetration testing and remediation services.
• Blue Chip Fortune 500 customer base
• Trusted change agent for Secure DevOps
PRODUCT & SERVICES
• ThreadFix (Product)
• Management Assessment Program
• Security Advisory Services
RECOGNITION
• 2020 ISPG Global Excellence Award
• 2019 Cyber Defense Magazine (CDM) InfoSec Awards
© Copyright 2021 Now Secure, Inc. All Rights Reserved. Proprietary Information. Do not distribute.
• Waterfall
• Agile
• DevOps
• DevSecOps
5
Poll 1: Which best characterizes your SDLC?
© Copyright 2021 Now Secure, Inc. All Rights Reserved. Proprietary Information. Do not distribute.
6
Poll 2: How many scans are you running per week?
• 25 - 100
• 250+
• 1000+
• 2500+
© Copyright 2021 Now Secure, Inc. All Rights Reserved. Proprietary Information. Do not distribute.
Applications Run the Word
7
© Copyright 2021 Now Secure, Inc. All Rights Reserved. Proprietary Information. Do not distribute.
Applications Run the Word
8
But... delivering apps securely at scale challenges all organizations!
© Copyright 2021 Now Secure, Inc. All Rights Reserved. Proprietary Information. Do not distribute.
Security & Vulnerability Mgmt Stats
9
92%
of Web Apps have Exploitable
Security Flaws
44%
of Vulnerabilities
Remediated in 90 days
Abandoned Web Applications: Achilles' Heel of FT 500 Companies, High-Tech Bridge Security Research | 2018 DevOps Community Survey | 2019 Verizon Data Breach Investigation Report
2019 Veracode State of Software Security
Nearly Half of
all Developers
say they don't have enough time
to spend on security, even though
they are aware of its importance.
56 Days
Across All Applications
72 Days
For all Internally Built Applications
© Copyright 2021 Now Secure, Inc. All Rights Reserved. Proprietary Information. Do not distribute.
Mobile Security Stats
10
69%
of all digital traffic & time
spent is on mobile vs. web
Sources: AppAnnie, March, 2020; Comscore, January & November 2020 Gartner,
Avoid Mobile App Security Pitfalls, Zumerle, 27Jul2020 Adobe Analytics Holiday Predictions
November 2020 Momentum Cyber Cybersecurity Market Review Q3-2020 NowSecure
Privacy Benchmark, 2019; NowSecure Security Benchmark 2019
85%
of Mobile Apps
have security risks
70%
of Mobile Apps leak
personal data to
violate GDPR/CCPA
9%
of orgs automate over
75% of test cases
14%
of orgs can release
software daily
30%
Reduction in breach
costs by companies w/
automated security
© Copyright 2021 Now Secure, Inc. All Rights Reserved. Proprietary Information. Do not distribute.
Challenges in Delivering Secure Apps @ Scale
Outpaces human ability to
process; Requires automation
Requires better collaboration
across Dev + QA+ Sec + Ops
Leaves gaps and slows the
business;
Requires integration
Slows the mobile pipeline,
more security bugs in the wild;
Requires mobile best-of-breed
Business pressures to innovate
and release faster
Fragmented tools
and processes
Rapidly growing number of apps,
test cycles, bugs, releases, data
feeds and stakeholders
Mobile Security often lags
Web Security
© Copyright 2021 Now Secure, Inc. All Rights Reserved. Proprietary Information. Do not distribute.
The Typical Software Pipeline
R
e
q
u
i
r
e
m
e
n
t
s
&
D
e
s
i
g
n
C
o
d
e
C
o
m
m
i
t
B
u
i
l
d
T
e
s
t
S
t
a
g
e
D
e
p
l
o
y
12
© Copyright 2021 Now Secure, Inc. All Rights Reserved. Proprietary Information. Do not distribute.
Driving Efficient Pipelines, Data Volume & Flow
Funnel it all into a unified process
without having to invent a new
PC Apps
Web Apps
Mobile Apps
Dev
QA
Security
© Copyright 2021 Now Secure, Inc. All Rights Reserved. Proprietary Information. Do not distribute.
Security in the Pipeline
R
e
q
u
i
r
e
m
e
n
t
s
&
D
e
s
i
g
n
C
o
d
e
C
o
m
m
i
t
B
u
i
l
d
T
e
s
t
S
t
a
g
e
D
e
p
l
o
y
14
Static Source Scans
Cloud Security testing
Dynamic Testing
Manual Pen Testing
SCA Repo Scans APISec Testing
Mobile
Web
Network
IDE Plug-ins WAF Data
IAST
© Copyright 2021 Now Secure, Inc. All Rights Reserved. Proprietary Information. Do not distribute.
Mobile AppSec Testing Challenges in Pipeline
R
e
q
u
i
r
e
m
e
n
t
s
&
D
e
s
i
g
n
C
o
d
e
C
o
m
m
i
t
B
u
i
l
d
T
e
s
t
S
t
a
g
e
D
e
p
l
o
y
15
Static Source only
tests 20% of actual
attack surface
Static Source high
false positives
Hard to automate
Dynamic & APISec to
get other 80% coverage
2 week manual pen
tests don’t scale
High rate of security
bugs escape into
production
Late stage testing
delays releases
© Copyright 2021 Now Secure, Inc. All Rights Reserved. Proprietary Information. Do not distribute.
Mobile AppSec Testing in Pipeline
R
e
q
u
i
r
e
m
e
n
t
s
&
D
e
s
i
g
n
C
o
d
e
C
o
m
m
i
t
B
u
i
l
d
T
e
s
t
S
t
a
g
e
D
e
p
l
o
y
16
Test mobile binary to
eliminate source language
dependencies
Directly measure app
behavior for high accuracy
Test live running apps on
real devices, not emulators
Apply standards-driven
checks & analysis [eg
OWASP MASVS, NIAP, CVSS]
Check for Apple & Google
app store blockers
Automated Mobile
AppSec Testing for
Continuous Security
© Copyright 2021 Now Secure, Inc. All Rights Reserved. Proprietary Information. Do not distribute.
NowSecure Powers Your Mobile AppSec Toolchain
R
e
q
u
i
r
e
m
e
n
t
s
&
D
e
s
i
g
n
C
o
d
e
C
o
m
m
i
t
B
u
i
l
d
T
e
s
t
S
t
a
g
e
D
e
p
l
o
y
17
+200 Standards-based
checks for sensitive data,
app store blockers &
regulatory compliance
Dev repair guides &
sample code to fix fast
Direct CI/CD, Ticketing,
Vuln Mgmt, GRC &
toolchain integrations
Run autonomously no new
tools for dev, no workflow
changes
High accuracy, no false
positives
Autonomously
Test CI/CD Builds
& Generate Security
Tickets
Fast On-Demand
Testing for All
Stakeholders
© Copyright 2021 Now Secure, Inc. All Rights Reserved. Proprietary Information. Do not distribute.
Vulnerability Management Challenges in Pipelines
R
e
q
u
i
r
e
m
e
n
t
s
&
D
e
s
i
g
n
C
o
d
e
C
o
m
m
i
t
B
u
i
l
d
T
e
s
t
S
t
a
g
e
D
e
p
l
o
y
18
Different types of analysis provide different types
of insight
Vulnerability and weakness data enter at different
stages of the pipeline
Vulnerabilities must be
routed to the correct
team(s) for
remediation
Data volume: High for
applications, massive
across the portfolio
False positives have to be culled and vulnerabilities
have to be contextualized and prioritized
© Copyright 2021 Now Secure, Inc. All Rights Reserved. Proprietary Information. Do not distribute.
Vulnerability Management in Pipeline
R
e
q
u
i
r
e
m
e
n
t
s
&
D
e
s
i
g
n
C
o
d
e
C
o
m
m
i
t
B
u
i
l
d
T
e
s
t
S
t
a
g
e
D
e
p
l
o
y
19
Create a unified process
with tools to collect,
process and route data
Integrate across tools in
CI/CD pipeline
Create automated vuln
merge & mapping process
Enable agentless
SAST+DAST correlation
Ensure continuous
accreditation
Automated
Vulnerability
Management
Mobile
Web
Web Svcs
Web Client
IoT Apps
DAST
SAST
IAST
SCA
Pen Test
© Copyright 2021 Now Secure, Inc. All Rights Reserved. Proprietary Information. Do not distribute.
ThreadFix Remediation Cycle
© Copyright 2021 Now Secure, Inc. All Rights Reserved. Proprietary Information. Do not distribute.
Running an Efficient, Scalable Pipeline Together
R
e
q
u
i
r
e
m
e
n
t
s
&
D
e
s
i
g
n
C
o
d
e
C
o
m
m
i
t
B
u
i
l
d
T
e
s
t
S
t
a
g
e
D
e
p
l
o
y
21
Automated Mobile
AppSec Testing for
Continuous Security
Automated
Vulnerability
Management
Leverage existing
workflows
Better developer
communication
Faster feedback loops
More vulnerabilities fixed
faster
© Copyright 2021 Now Secure, Inc. All Rights Reserved. Proprietary Information. Do not distribute.
Best Portfolio Coverage: Breadth and Depth
Mobile
Apps
Web
Apps
Web
Services
IOT
Apps
Web Client
Apps
SAST
NowSecure
DAST
IAST
Pen Testing
SCA
ThreadFix powered by Denim Group
© Copyright 2021 Now Secure, Inc. All Rights Reserved. Proprietary Information. Do not distribute.
Delivering Value and Security at DevOps Speed
● Continuous
● Automated
● Fast
● Efficient
● Scalable
● Cost effective
R
e
q
u
i
r
e
m
e
n
t
s
&
D
e
s
i
g
n
C
o
d
e
C
o
m
m
i
t
B
u
i
l
d
T
e
s
t
S
t
a
g
e
D
e
p
l
o
y
Velocity
Scale ROI
23
SECURITY AUTOMATION
© Copyright 2021 Now Secure, Inc. All Rights Reserved. Proprietary Information. Do not distribute.
THE CLIENT
Education
THE CHALLENGE
• The company had a large portfolio of 2,000 applications, and application
security testing processes were manual and nonstandardized.
THE SOLUTION
• Process Standardization
• ThreadFix to standardized how static and dynamic tests were run and
consolidate the results into a single repository of record.
• Workflow Integration
• Once the vulnerability identification process was standardized and
streamlined, this allowed them to integrate workflows with the JIRA
system in use by development teams.
ThreadFix Case Study
+500%
Throughput for testing
workflows
100%
Improved testing process
able to handle very large
portfolio of apps
-44%
Time to fix vulnerabilities
© Copyright 2021 Now Secure, Inc. All Rights Reserved. Proprietary Information. Do not distribute.
Free Resources from ThreadFix
25
Application Asset Management with ThreadFix (webinar)
https://threadfix.it/resources/application-asset-management-with-threadfix/
Applied ThreadFix: Application Portfolio Tracking (associated blog post)
https://threadfix.it/resources/applied-threadfix-application-portfolio-tracking/
Applied ThreadFix: Seeding Your Application Portfolio with OWASP Amass (associated blog post)
https://threadfix.it/resources/applied-threadfix-seeding-your-application-portfolio-with-owasp-amass/
Using Collaboration to Make Application Vulnerability Management a Team Sport (webinar)
https://threadfix.it/resources/using-collaboration-to-make-application-vulnerability-management-a-team-sport/
Applied ThreadFix: Effective Security Team Collaboration (associated blog post)
https://threadfix.it/resources/applied-threadfix-effective-security-team-collaboration/
Applied ThreadFix: Security Teams Collaborating with Development Teams (associated blog post)
https://threadfix.it/resources/applied-threadfix-security-teams-collaborating-with-development-teams/
© Copyright 2021 Now Secure, Inc. All Rights Reserved. Proprietary Information. Do not distribute.
NowSecure Case Study
“Dev said they wanted 10 minutes or
less, accurate results, no false positives,
and complete automation. By meeting
these requirements with NowSecure,
we now have visibility and are fully
automated into every build. It will
automatically stop a build if a high-risk
vuln presents.”
Director App Security
Fortune 100 Financial Services Company
“We’ve benefited from productivity
improvements gained from automated
testing. Being able to trigger tests when
we promote code has saved us
meaningful time. Our company was able
to increase its release frequency from
quarterly to monthly for a 3x
improvement.”
Heather Brinkhaus, Senior Business Analyst,
Customer Apps, Caribou Coffee
“We practice security by design to
enable and empower devs with
different security tools at their
fingertips. We have created an
abstraction layer for all security
elements leveraging tools and
standards like NowSecure, OWASP
MASVS and NIST controls
embedded in our DevSecOps
pipeline. Builds complete, tests run
automatically, issues are surfaced
directly to the developer.”
Nick Christi, Manager of App &
Product Security, Allstate
© Copyright 2021 Now Secure, Inc. All Rights Reserved. Proprietary Information. Do not distribute.
Free Resources from NowSecure
https://www.cybrary.it/course/mobile-app-security/
https://bit.ly/3lfcQJG
https://bit.ly/3jfd1mx
https://bit.ly/3gmnoTv
https://bit.ly/32oHmIx
27
© Copyright 2021 Now Secure, Inc. All Rights Reserved. Proprietary Information. Do not distribute.
GIVEAWAY TIME!
28
© Copyright 2021 Now Secure, Inc. All Rights Reserved. Proprietary Information. Do not distribute.
Q&A
29
Ask the Experts
Brian Reed
Chief Mobility Officer
Dan Cornell
Co-Founder & CTO
© Copyright 2021 Now Secure, Inc. All Rights Reserved. Proprietary Information. Do not distribute.
Thank You!
30
Brian Reed
Chief Mobility Officer
Dan Cornell
Co-Founder & CTO
Meet the Experts
Optimizing Security Velocity in Your
DevSecOps Pipeline at Scale
Tools Tips Tactics
THE 2021 WEBINAR SERIES
February 18, 2021 | 2 pm - 3 pm, EST
Brian Reed
Chief Mobility Officer
Dan Cornell
Co-Founder & CTO
© Copyright 2021 Now Secure, Inc. All Rights Reserved. Proprietary Information. Do not distribute.
Parking lot
© Copyright 2021 Now Secure, Inc. All Rights Reserved. Proprietary Information. Do not distribute.
[Webinar] Optimizing Security Velocity in Your DevSecOps Pipeline at Scale
Businesses are driving development teams to build, test and deliver app innovations faster
and faster, while attackers continue to grow in sophistication and complexity. Join Brian
Reed, Chief Mobility Officer of NowSecure and Dan Cornell, Co-Founder and CTO of
ThreadFix in this best practices session to learn how to drive efficiencies in team and
pipeline performance at scale.
Note I pulled this deck together as thought leadership piece not direct product promotion.
We can choose to add specific product slides, demo screenshots, etc if we feel its needed
when we talk next.
Abstract and Notes [to be removed]

Mais conteúdo relacionado

Mais procurados

Mais procurados (20)

Security Champions: Pushing Security Expertise to the Edges of Your Organization
Security Champions: Pushing Security Expertise to the Edges of Your OrganizationSecurity Champions: Pushing Security Expertise to the Edges of Your Organization
Security Champions: Pushing Security Expertise to the Edges of Your Organization
 
Compatibility Testing of Your Web Apps - Tips and Tricks for Debugging Locall...
Compatibility Testing of Your Web Apps - Tips and Tricks for Debugging Locall...Compatibility Testing of Your Web Apps - Tips and Tricks for Debugging Locall...
Compatibility Testing of Your Web Apps - Tips and Tricks for Debugging Locall...
 
A New View of Your Application Security Program with Snyk and ThreadFix
A New View of Your Application Security Program with Snyk and ThreadFixA New View of Your Application Security Program with Snyk and ThreadFix
A New View of Your Application Security Program with Snyk and ThreadFix
 
DevSecOps and the CI/CD Pipeline
 DevSecOps and the CI/CD Pipeline DevSecOps and the CI/CD Pipeline
DevSecOps and the CI/CD Pipeline
 
Overcoming the old ways of working with DevSecOps - Culture, Data, Graph, and...
Overcoming the old ways of working with DevSecOps - Culture, Data, Graph, and...Overcoming the old ways of working with DevSecOps - Culture, Data, Graph, and...
Overcoming the old ways of working with DevSecOps - Culture, Data, Graph, and...
 
Barriers to Container Security and How to Overcome Them
Barriers to Container Security and How to Overcome ThemBarriers to Container Security and How to Overcome Them
Barriers to Container Security and How to Overcome Them
 
Bridging the Security Testing Gap in Your CI/CD Pipeline
Bridging the Security Testing Gap in Your CI/CD PipelineBridging the Security Testing Gap in Your CI/CD Pipeline
Bridging the Security Testing Gap in Your CI/CD Pipeline
 
10 things to get right for successful dev secops
10 things to get right for successful dev secops10 things to get right for successful dev secops
10 things to get right for successful dev secops
 
Shifting Security Left - The Innovation of DevSecOps - ValleyTechCon
Shifting Security Left - The Innovation of DevSecOps - ValleyTechConShifting Security Left - The Innovation of DevSecOps - ValleyTechCon
Shifting Security Left - The Innovation of DevSecOps - ValleyTechCon
 
Secure DevOPS Implementation Guidance
Secure DevOPS Implementation GuidanceSecure DevOPS Implementation Guidance
Secure DevOPS Implementation Guidance
 
Using Collaboration to Make Application Vulnerability Management a Team Sport
Using Collaboration to Make Application Vulnerability Management a Team SportUsing Collaboration to Make Application Vulnerability Management a Team Sport
Using Collaboration to Make Application Vulnerability Management a Team Sport
 
Shifting Security Left - The Innovation of DevSecOps - AgileDC
Shifting Security Left - The Innovation of DevSecOps - AgileDCShifting Security Left - The Innovation of DevSecOps - AgileDC
Shifting Security Left - The Innovation of DevSecOps - AgileDC
 
DevSecOps for the DoD
DevSecOps for the DoDDevSecOps for the DoD
DevSecOps for the DoD
 
PKI in DevOps: How to Deploy Certificate Automation within CI/CD
PKI in DevOps: How to Deploy Certificate Automation within CI/CDPKI in DevOps: How to Deploy Certificate Automation within CI/CD
PKI in DevOps: How to Deploy Certificate Automation within CI/CD
 
DevSecOps Singapore 2017 - Security in the Delivery Pipeline
DevSecOps Singapore 2017 - Security in the Delivery PipelineDevSecOps Singapore 2017 - Security in the Delivery Pipeline
DevSecOps Singapore 2017 - Security in the Delivery Pipeline
 
DevSecOps - The big picture
DevSecOps - The big pictureDevSecOps - The big picture
DevSecOps - The big picture
 
The New Security Playbook: DevSecOps
The New Security Playbook: DevSecOpsThe New Security Playbook: DevSecOps
The New Security Playbook: DevSecOps
 
DevSecOps - It can change your life (cycle)
DevSecOps - It can change your life (cycle)DevSecOps - It can change your life (cycle)
DevSecOps - It can change your life (cycle)
 
Implementing an Application Security Pipeline in Jenkins
Implementing an Application Security Pipeline in JenkinsImplementing an Application Security Pipeline in Jenkins
Implementing an Application Security Pipeline in Jenkins
 
Shift Risk Left: Security Considerations When Migrating Apps to the Cloud
Shift Risk Left: Security Considerations When Migrating Apps to the CloudShift Risk Left: Security Considerations When Migrating Apps to the Cloud
Shift Risk Left: Security Considerations When Migrating Apps to the Cloud
 

Semelhante a Optimizing Security Velocity in Your DevSecOps Pipeline at Scale

ISACA 2016 Annual Conference SA_State of Risk_Tunde Ogunkoya_DeltaGRiC_Consul...
ISACA 2016 Annual Conference SA_State of Risk_Tunde Ogunkoya_DeltaGRiC_Consul...ISACA 2016 Annual Conference SA_State of Risk_Tunde Ogunkoya_DeltaGRiC_Consul...
ISACA 2016 Annual Conference SA_State of Risk_Tunde Ogunkoya_DeltaGRiC_Consul...
Tunde Ogunkoya
 
Veracode Corporate Overview - Print
Veracode Corporate Overview - PrintVeracode Corporate Overview - Print
Veracode Corporate Overview - Print
Andrew Kanikuru
 

Semelhante a Optimizing Security Velocity in Your DevSecOps Pipeline at Scale (20)

From Tangled Mess to Organized Flow: A Mobile DevSecOps Reference Architecture
From Tangled Mess to Organized Flow: A Mobile DevSecOps Reference ArchitectureFrom Tangled Mess to Organized Flow: A Mobile DevSecOps Reference Architecture
From Tangled Mess to Organized Flow: A Mobile DevSecOps Reference Architecture
 
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptxEmphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
 
CA Management Cloud - Enterprise Mobility
CA Management Cloud - Enterprise MobilityCA Management Cloud - Enterprise Mobility
CA Management Cloud - Enterprise Mobility
 
ISACA 2016 Annual Conference SA_State of Risk_Tunde Ogunkoya_DeltaGRiC_Consul...
ISACA 2016 Annual Conference SA_State of Risk_Tunde Ogunkoya_DeltaGRiC_Consul...ISACA 2016 Annual Conference SA_State of Risk_Tunde Ogunkoya_DeltaGRiC_Consul...
ISACA 2016 Annual Conference SA_State of Risk_Tunde Ogunkoya_DeltaGRiC_Consul...
 
Scaling AppSec through Education
Scaling AppSec through EducationScaling AppSec through Education
Scaling AppSec through Education
 
Streamlining AppSec Policy Definition.pptx
Streamlining AppSec Policy Definition.pptxStreamlining AppSec Policy Definition.pptx
Streamlining AppSec Policy Definition.pptx
 
Government and Education Webinar: How the New Normal Could Improve your IT Op...
Government and Education Webinar: How the New Normal Could Improve your IT Op...Government and Education Webinar: How the New Normal Could Improve your IT Op...
Government and Education Webinar: How the New Normal Could Improve your IT Op...
 
La Seguridad en la Economía de las Aplicaciones
La Seguridad en la Economía de las AplicacionesLa Seguridad en la Economía de las Aplicaciones
La Seguridad en la Economía de las Aplicaciones
 
SD-WAN_MoD.pptx for SD WAN networks connectivity
SD-WAN_MoD.pptx for SD WAN networks connectivitySD-WAN_MoD.pptx for SD WAN networks connectivity
SD-WAN_MoD.pptx for SD WAN networks connectivity
 
Veracode Corporate Overview - Print
Veracode Corporate Overview - PrintVeracode Corporate Overview - Print
Veracode Corporate Overview - Print
 
Cyber Warfare e scenari di mercato
Cyber Warfare e scenari di mercatoCyber Warfare e scenari di mercato
Cyber Warfare e scenari di mercato
 
Re-Thinking BYOD Policy.pptx
Re-Thinking BYOD Policy.pptxRe-Thinking BYOD Policy.pptx
Re-Thinking BYOD Policy.pptx
 
DevOps Night - Shifting Security to the Left - SCTV Tower - 19 September 2018
DevOps Night - Shifting Security to the Left - SCTV Tower - 19 September 2018DevOps Night - Shifting Security to the Left - SCTV Tower - 19 September 2018
DevOps Night - Shifting Security to the Left - SCTV Tower - 19 September 2018
 
DarkReading - Securing Your APIs What You Need to Know.pdf
DarkReading - Securing Your APIs What You Need to Know.pdfDarkReading - Securing Your APIs What You Need to Know.pdf
DarkReading - Securing Your APIs What You Need to Know.pdf
 
Making Network Security Relevant
Making Network Security RelevantMaking Network Security Relevant
Making Network Security Relevant
 
Security Across the Cloud Native Continuum with ESG and Palo Alto Networks
Security Across the Cloud Native Continuum with ESG and Palo Alto NetworksSecurity Across the Cloud Native Continuum with ESG and Palo Alto Networks
Security Across the Cloud Native Continuum with ESG and Palo Alto Networks
 
Protect Your Customers Data from Cyberattacks
Protect Your Customers Data from CyberattacksProtect Your Customers Data from Cyberattacks
Protect Your Customers Data from Cyberattacks
 
Bhagvan Kommadi [Value Momentum] | TeleHealth Platform: DevOps-Based Progress...
Bhagvan Kommadi [Value Momentum] | TeleHealth Platform: DevOps-Based Progress...Bhagvan Kommadi [Value Momentum] | TeleHealth Platform: DevOps-Based Progress...
Bhagvan Kommadi [Value Momentum] | TeleHealth Platform: DevOps-Based Progress...
 
Making APIs Secure Demands Tracing and Machine Learning to Rapidly Limit Dama...
Making APIs Secure Demands Tracing and Machine Learning to Rapidly Limit Dama...Making APIs Secure Demands Tracing and Machine Learning to Rapidly Limit Dama...
Making APIs Secure Demands Tracing and Machine Learning to Rapidly Limit Dama...
 
5 Steps for End-to-End Mobile Security with Consumer Apps
5 Steps for End-to-End Mobile Security with Consumer Apps5 Steps for End-to-End Mobile Security with Consumer Apps
5 Steps for End-to-End Mobile Security with Consumer Apps
 

Mais de Denim Group

Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
Denim Group
 
Continuous Authority to Operate (ATO) with ThreadFix – Bringing Commercial In...
Continuous Authority to Operate (ATO) with ThreadFix – Bringing Commercial In...Continuous Authority to Operate (ATO) with ThreadFix – Bringing Commercial In...
Continuous Authority to Operate (ATO) with ThreadFix – Bringing Commercial In...
Denim Group
 

Mais de Denim Group (20)

Long-term Impact of Log4J
Long-term Impact of Log4JLong-term Impact of Log4J
Long-term Impact of Log4J
 
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
 
The As, Bs, and Four Cs of Testing Cloud-Native Applications
The As, Bs, and Four Cs of Testing Cloud-Native ApplicationsThe As, Bs, and Four Cs of Testing Cloud-Native Applications
The As, Bs, and Four Cs of Testing Cloud-Native Applications
 
An Updated Take: Threat Modeling for IoT Systems
An Updated Take: Threat Modeling for IoT SystemsAn Updated Take: Threat Modeling for IoT Systems
An Updated Take: Threat Modeling for IoT Systems
 
Continuous Authority to Operate (ATO) with ThreadFix – Bringing Commercial In...
Continuous Authority to Operate (ATO) with ThreadFix – Bringing Commercial In...Continuous Authority to Operate (ATO) with ThreadFix – Bringing Commercial In...
Continuous Authority to Operate (ATO) with ThreadFix – Bringing Commercial In...
 
Enabling Developers in Your Application Security Program With Coverity and Th...
Enabling Developers in Your Application Security Program With Coverity and Th...Enabling Developers in Your Application Security Program With Coverity and Th...
Enabling Developers in Your Application Security Program With Coverity and Th...
 
AppSec in a World of Digital Transformation
AppSec in a World of Digital TransformationAppSec in a World of Digital Transformation
AppSec in a World of Digital Transformation
 
The As, Bs, and Four Cs of Testing Cloud-Native Applications
The As, Bs, and Four Cs of Testing Cloud-Native ApplicationsThe As, Bs, and Four Cs of Testing Cloud-Native Applications
The As, Bs, and Four Cs of Testing Cloud-Native Applications
 
Enabling Developers in Your Application Security Program With Coverity and Th...
Enabling Developers in Your Application Security Program With Coverity and Th...Enabling Developers in Your Application Security Program With Coverity and Th...
Enabling Developers in Your Application Security Program With Coverity and Th...
 
AppSec in a World of Digital Transformation
 AppSec in a World of Digital Transformation AppSec in a World of Digital Transformation
AppSec in a World of Digital Transformation
 
Enumerating Enterprise Attack Surface
Enumerating Enterprise Attack SurfaceEnumerating Enterprise Attack Surface
Enumerating Enterprise Attack Surface
 
Enumerating Enterprise Attack Surface
Enumerating Enterprise Attack SurfaceEnumerating Enterprise Attack Surface
Enumerating Enterprise Attack Surface
 
Assessing Business Operations Risk With Unified Vulnerability Management in T...
Assessing Business Operations Risk With Unified Vulnerability Management in T...Assessing Business Operations Risk With Unified Vulnerability Management in T...
Assessing Business Operations Risk With Unified Vulnerability Management in T...
 
An OWASP SAMM Perspective on Serverless Computing
An OWASP SAMM Perspective on Serverless ComputingAn OWASP SAMM Perspective on Serverless Computing
An OWASP SAMM Perspective on Serverless Computing
 
Optimize Your Security Program with ThreadFix 2.7
Optimize Your Security Program with ThreadFix 2.7Optimize Your Security Program with ThreadFix 2.7
Optimize Your Security Program with ThreadFix 2.7
 
Application Security Testing for a DevOps Mindset
Application Security Testing for a DevOps Mindset  Application Security Testing for a DevOps Mindset
Application Security Testing for a DevOps Mindset
 
Reducing Attack Surface in Budget Constrained Environments
Reducing Attack Surface in Budget Constrained EnvironmentsReducing Attack Surface in Budget Constrained Environments
Reducing Attack Surface in Budget Constrained Environments
 
Securing Voting Infrastructure before the Mid-Term Elections
Securing Voting Infrastructure before the Mid-Term ElectionsSecuring Voting Infrastructure before the Mid-Term Elections
Securing Voting Infrastructure before the Mid-Term Elections
 
Threat Modeling for IoT Systems
Threat Modeling for IoT SystemsThreat Modeling for IoT Systems
Threat Modeling for IoT Systems
 
Understanding IoT Security: How to Quantify Security Risk of IoT Technologies
Understanding IoT Security: How to Quantify Security Risk of IoT TechnologiesUnderstanding IoT Security: How to Quantify Security Risk of IoT Technologies
Understanding IoT Security: How to Quantify Security Risk of IoT Technologies
 

Último

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Último (20)

Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 

Optimizing Security Velocity in Your DevSecOps Pipeline at Scale

  • 1. Optimizing Security Velocity in Your DevSecOps Pipeline at Scale Tools Tips Tactics THE 2021 WEBINAR SERIES February 18, 2021 | 2 pm - 3 pm, EST Brian Reed Chief Mobility Officer Dan Cornell Co-Founder & CTO
  • 2. © Copyright 2021 Now Secure, Inc. All Rights Reserved. Proprietary Information. Do not distribute. Agenda 2 Introductions State of App Security Powering Secure Pipelines Mastering Volume & Velocity Reference Resources Open Q&A Meet the Experts Brian Reed Chief Mobility Officer Dan Cornell Co-Founder & CTO
  • 3. © Copyright 2021 Now Secure, Inc. All Rights Reserved. Proprietary Information. Do not distribute. Mission: Save the World from Unsafe Mobile Apps Automated Mobile AppSec Testing Software Expert Pen Testing & Training Services Mobile-First & Mobile-Only, 10+ Years in Mobile Forensics & Security Standards-driven OWASP, NIAP, CVSS, Industry Regulations Sponsor of OWASP Mobile Project, MASVS, Top 10 Contributors to Frida & Radare 2X Mobile App Sec Testing (MAST) Leader by IDC DevSecOps Transformational Leader by Gartner 3
  • 4. © Copyright 2021 Now Secure, Inc. All Rights Reserved. Proprietary Information. Do not distribute. About Denim Group & ThreadFix Leading provider of application security assessments, penetration testing and remediation services. • Blue Chip Fortune 500 customer base • Trusted change agent for Secure DevOps PRODUCT & SERVICES • ThreadFix (Product) • Management Assessment Program • Security Advisory Services RECOGNITION • 2020 ISPG Global Excellence Award • 2019 Cyber Defense Magazine (CDM) InfoSec Awards
  • 5. © Copyright 2021 Now Secure, Inc. All Rights Reserved. Proprietary Information. Do not distribute. • Waterfall • Agile • DevOps • DevSecOps 5 Poll 1: Which best characterizes your SDLC?
  • 6. © Copyright 2021 Now Secure, Inc. All Rights Reserved. Proprietary Information. Do not distribute. 6 Poll 2: How many scans are you running per week? • 25 - 100 • 250+ • 1000+ • 2500+
  • 7. © Copyright 2021 Now Secure, Inc. All Rights Reserved. Proprietary Information. Do not distribute. Applications Run the Word 7
  • 8. © Copyright 2021 Now Secure, Inc. All Rights Reserved. Proprietary Information. Do not distribute. Applications Run the Word 8 But... delivering apps securely at scale challenges all organizations!
  • 9. © Copyright 2021 Now Secure, Inc. All Rights Reserved. Proprietary Information. Do not distribute. Security & Vulnerability Mgmt Stats 9 92% of Web Apps have Exploitable Security Flaws 44% of Vulnerabilities Remediated in 90 days Abandoned Web Applications: Achilles' Heel of FT 500 Companies, High-Tech Bridge Security Research | 2018 DevOps Community Survey | 2019 Verizon Data Breach Investigation Report 2019 Veracode State of Software Security Nearly Half of all Developers say they don't have enough time to spend on security, even though they are aware of its importance. 56 Days Across All Applications 72 Days For all Internally Built Applications
  • 10. © Copyright 2021 Now Secure, Inc. All Rights Reserved. Proprietary Information. Do not distribute. Mobile Security Stats 10 69% of all digital traffic & time spent is on mobile vs. web Sources: AppAnnie, March, 2020; Comscore, January & November 2020 Gartner, Avoid Mobile App Security Pitfalls, Zumerle, 27Jul2020 Adobe Analytics Holiday Predictions November 2020 Momentum Cyber Cybersecurity Market Review Q3-2020 NowSecure Privacy Benchmark, 2019; NowSecure Security Benchmark 2019 85% of Mobile Apps have security risks 70% of Mobile Apps leak personal data to violate GDPR/CCPA 9% of orgs automate over 75% of test cases 14% of orgs can release software daily 30% Reduction in breach costs by companies w/ automated security
  • 11. © Copyright 2021 Now Secure, Inc. All Rights Reserved. Proprietary Information. Do not distribute. Challenges in Delivering Secure Apps @ Scale Outpaces human ability to process; Requires automation Requires better collaboration across Dev + QA+ Sec + Ops Leaves gaps and slows the business; Requires integration Slows the mobile pipeline, more security bugs in the wild; Requires mobile best-of-breed Business pressures to innovate and release faster Fragmented tools and processes Rapidly growing number of apps, test cycles, bugs, releases, data feeds and stakeholders Mobile Security often lags Web Security
  • 12. © Copyright 2021 Now Secure, Inc. All Rights Reserved. Proprietary Information. Do not distribute. The Typical Software Pipeline R e q u i r e m e n t s & D e s i g n C o d e C o m m i t B u i l d T e s t S t a g e D e p l o y 12
  • 13. © Copyright 2021 Now Secure, Inc. All Rights Reserved. Proprietary Information. Do not distribute. Driving Efficient Pipelines, Data Volume & Flow Funnel it all into a unified process without having to invent a new PC Apps Web Apps Mobile Apps Dev QA Security
  • 14. © Copyright 2021 Now Secure, Inc. All Rights Reserved. Proprietary Information. Do not distribute. Security in the Pipeline R e q u i r e m e n t s & D e s i g n C o d e C o m m i t B u i l d T e s t S t a g e D e p l o y 14 Static Source Scans Cloud Security testing Dynamic Testing Manual Pen Testing SCA Repo Scans APISec Testing Mobile Web Network IDE Plug-ins WAF Data IAST
  • 15. © Copyright 2021 Now Secure, Inc. All Rights Reserved. Proprietary Information. Do not distribute. Mobile AppSec Testing Challenges in Pipeline R e q u i r e m e n t s & D e s i g n C o d e C o m m i t B u i l d T e s t S t a g e D e p l o y 15 Static Source only tests 20% of actual attack surface Static Source high false positives Hard to automate Dynamic & APISec to get other 80% coverage 2 week manual pen tests don’t scale High rate of security bugs escape into production Late stage testing delays releases
  • 16. © Copyright 2021 Now Secure, Inc. All Rights Reserved. Proprietary Information. Do not distribute. Mobile AppSec Testing in Pipeline R e q u i r e m e n t s & D e s i g n C o d e C o m m i t B u i l d T e s t S t a g e D e p l o y 16 Test mobile binary to eliminate source language dependencies Directly measure app behavior for high accuracy Test live running apps on real devices, not emulators Apply standards-driven checks & analysis [eg OWASP MASVS, NIAP, CVSS] Check for Apple & Google app store blockers Automated Mobile AppSec Testing for Continuous Security
  • 17. © Copyright 2021 Now Secure, Inc. All Rights Reserved. Proprietary Information. Do not distribute. NowSecure Powers Your Mobile AppSec Toolchain R e q u i r e m e n t s & D e s i g n C o d e C o m m i t B u i l d T e s t S t a g e D e p l o y 17 +200 Standards-based checks for sensitive data, app store blockers & regulatory compliance Dev repair guides & sample code to fix fast Direct CI/CD, Ticketing, Vuln Mgmt, GRC & toolchain integrations Run autonomously no new tools for dev, no workflow changes High accuracy, no false positives Autonomously Test CI/CD Builds & Generate Security Tickets Fast On-Demand Testing for All Stakeholders
  • 18. © Copyright 2021 Now Secure, Inc. All Rights Reserved. Proprietary Information. Do not distribute. Vulnerability Management Challenges in Pipelines R e q u i r e m e n t s & D e s i g n C o d e C o m m i t B u i l d T e s t S t a g e D e p l o y 18 Different types of analysis provide different types of insight Vulnerability and weakness data enter at different stages of the pipeline Vulnerabilities must be routed to the correct team(s) for remediation Data volume: High for applications, massive across the portfolio False positives have to be culled and vulnerabilities have to be contextualized and prioritized
  • 19. © Copyright 2021 Now Secure, Inc. All Rights Reserved. Proprietary Information. Do not distribute. Vulnerability Management in Pipeline R e q u i r e m e n t s & D e s i g n C o d e C o m m i t B u i l d T e s t S t a g e D e p l o y 19 Create a unified process with tools to collect, process and route data Integrate across tools in CI/CD pipeline Create automated vuln merge & mapping process Enable agentless SAST+DAST correlation Ensure continuous accreditation Automated Vulnerability Management Mobile Web Web Svcs Web Client IoT Apps DAST SAST IAST SCA Pen Test
  • 20. © Copyright 2021 Now Secure, Inc. All Rights Reserved. Proprietary Information. Do not distribute. ThreadFix Remediation Cycle
  • 21. © Copyright 2021 Now Secure, Inc. All Rights Reserved. Proprietary Information. Do not distribute. Running an Efficient, Scalable Pipeline Together R e q u i r e m e n t s & D e s i g n C o d e C o m m i t B u i l d T e s t S t a g e D e p l o y 21 Automated Mobile AppSec Testing for Continuous Security Automated Vulnerability Management Leverage existing workflows Better developer communication Faster feedback loops More vulnerabilities fixed faster
  • 22. © Copyright 2021 Now Secure, Inc. All Rights Reserved. Proprietary Information. Do not distribute. Best Portfolio Coverage: Breadth and Depth Mobile Apps Web Apps Web Services IOT Apps Web Client Apps SAST NowSecure DAST IAST Pen Testing SCA ThreadFix powered by Denim Group
  • 23. © Copyright 2021 Now Secure, Inc. All Rights Reserved. Proprietary Information. Do not distribute. Delivering Value and Security at DevOps Speed ● Continuous ● Automated ● Fast ● Efficient ● Scalable ● Cost effective R e q u i r e m e n t s & D e s i g n C o d e C o m m i t B u i l d T e s t S t a g e D e p l o y Velocity Scale ROI 23 SECURITY AUTOMATION
  • 24. © Copyright 2021 Now Secure, Inc. All Rights Reserved. Proprietary Information. Do not distribute. THE CLIENT Education THE CHALLENGE • The company had a large portfolio of 2,000 applications, and application security testing processes were manual and nonstandardized. THE SOLUTION • Process Standardization • ThreadFix to standardized how static and dynamic tests were run and consolidate the results into a single repository of record. • Workflow Integration • Once the vulnerability identification process was standardized and streamlined, this allowed them to integrate workflows with the JIRA system in use by development teams. ThreadFix Case Study +500% Throughput for testing workflows 100% Improved testing process able to handle very large portfolio of apps -44% Time to fix vulnerabilities
  • 25. © Copyright 2021 Now Secure, Inc. All Rights Reserved. Proprietary Information. Do not distribute. Free Resources from ThreadFix 25 Application Asset Management with ThreadFix (webinar) https://threadfix.it/resources/application-asset-management-with-threadfix/ Applied ThreadFix: Application Portfolio Tracking (associated blog post) https://threadfix.it/resources/applied-threadfix-application-portfolio-tracking/ Applied ThreadFix: Seeding Your Application Portfolio with OWASP Amass (associated blog post) https://threadfix.it/resources/applied-threadfix-seeding-your-application-portfolio-with-owasp-amass/ Using Collaboration to Make Application Vulnerability Management a Team Sport (webinar) https://threadfix.it/resources/using-collaboration-to-make-application-vulnerability-management-a-team-sport/ Applied ThreadFix: Effective Security Team Collaboration (associated blog post) https://threadfix.it/resources/applied-threadfix-effective-security-team-collaboration/ Applied ThreadFix: Security Teams Collaborating with Development Teams (associated blog post) https://threadfix.it/resources/applied-threadfix-security-teams-collaborating-with-development-teams/
  • 26. © Copyright 2021 Now Secure, Inc. All Rights Reserved. Proprietary Information. Do not distribute. NowSecure Case Study “Dev said they wanted 10 minutes or less, accurate results, no false positives, and complete automation. By meeting these requirements with NowSecure, we now have visibility and are fully automated into every build. It will automatically stop a build if a high-risk vuln presents.” Director App Security Fortune 100 Financial Services Company “We’ve benefited from productivity improvements gained from automated testing. Being able to trigger tests when we promote code has saved us meaningful time. Our company was able to increase its release frequency from quarterly to monthly for a 3x improvement.” Heather Brinkhaus, Senior Business Analyst, Customer Apps, Caribou Coffee “We practice security by design to enable and empower devs with different security tools at their fingertips. We have created an abstraction layer for all security elements leveraging tools and standards like NowSecure, OWASP MASVS and NIST controls embedded in our DevSecOps pipeline. Builds complete, tests run automatically, issues are surfaced directly to the developer.” Nick Christi, Manager of App & Product Security, Allstate
  • 27. © Copyright 2021 Now Secure, Inc. All Rights Reserved. Proprietary Information. Do not distribute. Free Resources from NowSecure https://www.cybrary.it/course/mobile-app-security/ https://bit.ly/3lfcQJG https://bit.ly/3jfd1mx https://bit.ly/3gmnoTv https://bit.ly/32oHmIx 27
  • 28. © Copyright 2021 Now Secure, Inc. All Rights Reserved. Proprietary Information. Do not distribute. GIVEAWAY TIME! 28
  • 29. © Copyright 2021 Now Secure, Inc. All Rights Reserved. Proprietary Information. Do not distribute. Q&A 29 Ask the Experts Brian Reed Chief Mobility Officer Dan Cornell Co-Founder & CTO
  • 30. © Copyright 2021 Now Secure, Inc. All Rights Reserved. Proprietary Information. Do not distribute. Thank You! 30 Brian Reed Chief Mobility Officer Dan Cornell Co-Founder & CTO Meet the Experts
  • 31. Optimizing Security Velocity in Your DevSecOps Pipeline at Scale Tools Tips Tactics THE 2021 WEBINAR SERIES February 18, 2021 | 2 pm - 3 pm, EST Brian Reed Chief Mobility Officer Dan Cornell Co-Founder & CTO
  • 32.
  • 33. © Copyright 2021 Now Secure, Inc. All Rights Reserved. Proprietary Information. Do not distribute. Parking lot
  • 34. © Copyright 2021 Now Secure, Inc. All Rights Reserved. Proprietary Information. Do not distribute. [Webinar] Optimizing Security Velocity in Your DevSecOps Pipeline at Scale Businesses are driving development teams to build, test and deliver app innovations faster and faster, while attackers continue to grow in sophistication and complexity. Join Brian Reed, Chief Mobility Officer of NowSecure and Dan Cornell, Co-Founder and CTO of ThreadFix in this best practices session to learn how to drive efficiencies in team and pipeline performance at scale. Note I pulled this deck together as thought leadership piece not direct product promotion. We can choose to add specific product slides, demo screenshots, etc if we feel its needed when we talk next. Abstract and Notes [to be removed]