SlideShare a Scribd company logo
1 of 25
Download to read offline
Get Your Board to Say “Yes” to
a BSIMM Assessment
5 ways benchmarking improves
software security oversight.
The typical board of directors
• Is more concerned than ever before about cyber risk.
• Must demonstrate oversight to shareholders, customers,
partners, and regulators.
• Seeks opportunities for a competitive advantage.
But…
• Has limited understanding of security activities.
• Isn’t sure how to measure success.
They often ask the
“wrong” questions.
For example…
“What is the bug count in the
software we develop?”
This is a “wrong” question because…
Bug count alone doesn’t consider severity of risk or size of
your application portfolio.
“How long does it take us to recover from
a security incident?”
This is a “wrong” question because…
This is largely out of your control; it can vary depending on
the type of security breach.
They have limited context.
For example, if you tell your board…
“We’ve got # security staff for
every developer.”
The board doesn’t know if that is high or low.
“We perform ad-hoc source code review.”
The board doesn’t know if that is good or bad.
They focus on internal data.
Problems with an internal-only assessment
• May unwittingly inflate an organization’s software
security activities.
• Doesn’t consider the full universe of potential activities
employed by advanced software security initiatives.
• Relies on personal experience to plan for the future.
The board can’t influence
what they don’t understand.
As a result, your security program suffers
• Investments and hires are delayed or rejected.
• The organization has less incentive to comply with
security policies.
• Confidence in security leadership decreases.
Change the conversation.
5 ways a BSIMM Assessment
helps your board see the big picture.
1
They get an accurate picture of your software
security initiative.
BSIMM shows your board…
• A full inventory of your software security activities in an
easy-to-digest, standard framework.
• An unbiased view of your operations, based on detailed
interviews and documentation.
2
They can compare your software security
initiative to 100+ real-world SSIs.
BSIMM shows your board…
• Security activities that give you a competitive advantage
over other organizations.
• Areas in which your organization lags behind best-in-
class software security initiatives.
3
They can understand the basis for
investment decisions.
BSIMM shows your board…
• How peer organizations value investments in certain
software security activities over others.
• Opportunities to increase efficiencies and reduce risk by
changing the mix of your security activities.
4
They can follow a roadmap for future planning.
BSIMM shows your board…
• Maturity levels for each type of software security activity,
based on prevalence and complexity.
• The current position of your own organization on the
maturity curve and strategies to reach the next level.
5
They can see evidence of your progress.
BSIMM shows your board…
• How your software security initiative becomes more
mature over time.
• How your relative position to other organizations
improves.
“If the ladder is not leaning against
the right wall, every step we take just
gets us to the wrong place faster.”
— Steven Covey
Help your board see the
big picture.
Talk to Cigital about a
BSIMM Assessment today.

More Related Content

What's hot

Handle With Care: You Have My VA Report!
Handle With Care: You Have My VA Report!Handle With Care: You Have My VA Report!
Handle With Care: You Have My VA Report!Cigital
 
7 Lessons Learned From BSIMM
7 Lessons Learned From BSIMM7 Lessons Learned From BSIMM
7 Lessons Learned From BSIMMCigital
 
Challenges of Vulnerability Management
 Challenges of Vulnerability Management Challenges of Vulnerability Management
Challenges of Vulnerability ManagementRahul Neel Mani
 
Assess all the things
Assess all the thingsAssess all the things
Assess all the thingsJerod Brennen
 
Planning and Deploying an Effective Vulnerability Management Program
Planning and Deploying an Effective Vulnerability Management ProgramPlanning and Deploying an Effective Vulnerability Management Program
Planning and Deploying an Effective Vulnerability Management ProgramSasha Nunke
 
Is Your Vulnerability Management Program Keeping Pace With Risks?
Is Your Vulnerability Management Program Keeping Pace With Risks?Is Your Vulnerability Management Program Keeping Pace With Risks?
Is Your Vulnerability Management Program Keeping Pace With Risks?Skybox Security
 
Vulnerability Management: What You Need to Know to Prioritize Risk
Vulnerability Management: What You Need to Know to Prioritize RiskVulnerability Management: What You Need to Know to Prioritize Risk
Vulnerability Management: What You Need to Know to Prioritize RiskAlienVault
 
Is Your Vulnerability Management Program Irrelevant?
Is Your Vulnerability Management Program Irrelevant?Is Your Vulnerability Management Program Irrelevant?
Is Your Vulnerability Management Program Irrelevant?Skybox Security
 
Secure Software Development Lifecycle
Secure Software Development LifecycleSecure Software Development Lifecycle
Secure Software Development Lifecycle1&1
 
Dmitriy Desyatkov "Secure SDLC or Security Culture to be or not to be"
Dmitriy Desyatkov "Secure SDLC or Security Culture to be or not to be"Dmitriy Desyatkov "Secure SDLC or Security Culture to be or not to be"
Dmitriy Desyatkov "Secure SDLC or Security Culture to be or not to be"WrikeTechClub
 
10 Steps to Building an Effective Vulnerability Management Program
10 Steps to Building an Effective Vulnerability Management Program10 Steps to Building an Effective Vulnerability Management Program
10 Steps to Building an Effective Vulnerability Management ProgramBeyondTrust
 
Setting up a secure development life cycle with OWASP - seba deleersnyder
Setting up a secure development life cycle with OWASP - seba deleersnyderSetting up a secure development life cycle with OWASP - seba deleersnyder
Setting up a secure development life cycle with OWASP - seba deleersnyderSebastien Deleersnyder
 
Web Application Vulnerability Management
Web Application Vulnerability ManagementWeb Application Vulnerability Management
Web Application Vulnerability Managementjpubal
 
Vulnerability Management: How to Think Like a Hacker to Reduce Risk
Vulnerability Management: How to Think Like a Hacker to Reduce RiskVulnerability Management: How to Think Like a Hacker to Reduce Risk
Vulnerability Management: How to Think Like a Hacker to Reduce RiskBeyondTrust
 
Effective Vulnerability Management
Effective Vulnerability ManagementEffective Vulnerability Management
Effective Vulnerability ManagementVicky Ames
 
Enterprise Vulnerability Management: Back to Basics
Enterprise Vulnerability Management: Back to BasicsEnterprise Vulnerability Management: Back to Basics
Enterprise Vulnerability Management: Back to BasicsDamon Small
 
Enterprise Class Vulnerability Management Like A Boss
Enterprise Class Vulnerability Management Like A BossEnterprise Class Vulnerability Management Like A Boss
Enterprise Class Vulnerability Management Like A Bossrbrockway
 
Implementing Vulnerability Management
Implementing Vulnerability Management Implementing Vulnerability Management
Implementing Vulnerability Management Argyle Executive Forum
 

What's hot (20)

Handle With Care: You Have My VA Report!
Handle With Care: You Have My VA Report!Handle With Care: You Have My VA Report!
Handle With Care: You Have My VA Report!
 
7 Lessons Learned From BSIMM
7 Lessons Learned From BSIMM7 Lessons Learned From BSIMM
7 Lessons Learned From BSIMM
 
Challenges of Vulnerability Management
 Challenges of Vulnerability Management Challenges of Vulnerability Management
Challenges of Vulnerability Management
 
Assess all the things
Assess all the thingsAssess all the things
Assess all the things
 
Planning and Deploying an Effective Vulnerability Management Program
Planning and Deploying an Effective Vulnerability Management ProgramPlanning and Deploying an Effective Vulnerability Management Program
Planning and Deploying an Effective Vulnerability Management Program
 
Is Your Vulnerability Management Program Keeping Pace With Risks?
Is Your Vulnerability Management Program Keeping Pace With Risks?Is Your Vulnerability Management Program Keeping Pace With Risks?
Is Your Vulnerability Management Program Keeping Pace With Risks?
 
Vulnerability Management: What You Need to Know to Prioritize Risk
Vulnerability Management: What You Need to Know to Prioritize RiskVulnerability Management: What You Need to Know to Prioritize Risk
Vulnerability Management: What You Need to Know to Prioritize Risk
 
Is Your Vulnerability Management Program Irrelevant?
Is Your Vulnerability Management Program Irrelevant?Is Your Vulnerability Management Program Irrelevant?
Is Your Vulnerability Management Program Irrelevant?
 
Secure Software Development Lifecycle
Secure Software Development LifecycleSecure Software Development Lifecycle
Secure Software Development Lifecycle
 
Dmitriy Desyatkov "Secure SDLC or Security Culture to be or not to be"
Dmitriy Desyatkov "Secure SDLC or Security Culture to be or not to be"Dmitriy Desyatkov "Secure SDLC or Security Culture to be or not to be"
Dmitriy Desyatkov "Secure SDLC or Security Culture to be or not to be"
 
10 Steps to Building an Effective Vulnerability Management Program
10 Steps to Building an Effective Vulnerability Management Program10 Steps to Building an Effective Vulnerability Management Program
10 Steps to Building an Effective Vulnerability Management Program
 
Setting up a secure development life cycle with OWASP - seba deleersnyder
Setting up a secure development life cycle with OWASP - seba deleersnyderSetting up a secure development life cycle with OWASP - seba deleersnyder
Setting up a secure development life cycle with OWASP - seba deleersnyder
 
Web Application Vulnerability Management
Web Application Vulnerability ManagementWeb Application Vulnerability Management
Web Application Vulnerability Management
 
Vulnerability Management: How to Think Like a Hacker to Reduce Risk
Vulnerability Management: How to Think Like a Hacker to Reduce RiskVulnerability Management: How to Think Like a Hacker to Reduce Risk
Vulnerability Management: How to Think Like a Hacker to Reduce Risk
 
Effective Vulnerability Management
Effective Vulnerability ManagementEffective Vulnerability Management
Effective Vulnerability Management
 
Enterprise Vulnerability Management: Back to Basics
Enterprise Vulnerability Management: Back to BasicsEnterprise Vulnerability Management: Back to Basics
Enterprise Vulnerability Management: Back to Basics
 
Session15
Session15Session15
Session15
 
Application Hackers Have A Handbook. Why Shouldn't You?
Application Hackers Have A Handbook. Why Shouldn't You?Application Hackers Have A Handbook. Why Shouldn't You?
Application Hackers Have A Handbook. Why Shouldn't You?
 
Enterprise Class Vulnerability Management Like A Boss
Enterprise Class Vulnerability Management Like A BossEnterprise Class Vulnerability Management Like A Boss
Enterprise Class Vulnerability Management Like A Boss
 
Implementing Vulnerability Management
Implementing Vulnerability Management Implementing Vulnerability Management
Implementing Vulnerability Management
 

Viewers also liked

Mandatory Reporting and Neglect: Impacts and Issues
Mandatory Reporting and Neglect: Impacts and IssuesMandatory Reporting and Neglect: Impacts and Issues
Mandatory Reporting and Neglect: Impacts and IssuesBASPCAN
 
"They'd very much picked up on the change in my behaviour":
"They'd very much picked up on the change in my behaviour":"They'd very much picked up on the change in my behaviour":
"They'd very much picked up on the change in my behaviour":BASPCAN
 
إرتقاء القيم - د.عبداللطيف خليفة
إرتقاء القيم - د.عبداللطيف خليفةإرتقاء القيم - د.عبداللطيف خليفة
إرتقاء القيم - د.عبداللطيف خليفة101Education
 
Oferta wspolpracy repechage2
Oferta wspolpracy repechage2Oferta wspolpracy repechage2
Oferta wspolpracy repechage2barbararepechage
 
Epistemología, Bolivia, Belleza, Carnaval, White Skin, Corso, Piel Blanca, Co...
Epistemología, Bolivia, Belleza, Carnaval, White Skin, Corso, Piel Blanca, Co...Epistemología, Bolivia, Belleza, Carnaval, White Skin, Corso, Piel Blanca, Co...
Epistemología, Bolivia, Belleza, Carnaval, White Skin, Corso, Piel Blanca, Co...Álvaro Miguel Carranza Montalvo
 
Quality of Care Giving in Substance Abuse Mothers
Quality of Care Giving in Substance Abuse MothersQuality of Care Giving in Substance Abuse Mothers
Quality of Care Giving in Substance Abuse MothersBASPCAN
 
A friend in need - Young people's views of peer support about issues of abuse...
A friend in need - Young people's views of peer support about issues of abuse...A friend in need - Young people's views of peer support about issues of abuse...
A friend in need - Young people's views of peer support about issues of abuse...BASPCAN
 
Enfoque Crítico de la Educación, Educación, Bolivia, Piel Blanca
Enfoque Crítico de la Educación, Educación, Bolivia, Piel BlancaEnfoque Crítico de la Educación, Educación, Bolivia, Piel Blanca
Enfoque Crítico de la Educación, Educación, Bolivia, Piel BlancaÁlvaro Miguel Carranza Montalvo
 
NYFW#TrendReportSS17#
NYFW#TrendReportSS17#NYFW#TrendReportSS17#
NYFW#TrendReportSS17#悦 杨
 
Turn the Page - Barriers and facilitators to change for young people on a har...
Turn the Page - Barriers and facilitators to change for young people on a har...Turn the Page - Barriers and facilitators to change for young people on a har...
Turn the Page - Barriers and facilitators to change for young people on a har...BASPCAN
 
Our life at school
Our life at schoolOur life at school
Our life at schoolHugoamoedo99
 
NTCIR11-Math2-PattaniyilN_slides
NTCIR11-Math2-PattaniyilN_slidesNTCIR11-Math2-PattaniyilN_slides
NTCIR11-Math2-PattaniyilN_slidesNidhin Pattaniyil
 
Can Grassroots Parent Educational Programs Compete with Nationally Prominent ...
Can Grassroots Parent Educational Programs Compete with Nationally Prominent ...Can Grassroots Parent Educational Programs Compete with Nationally Prominent ...
Can Grassroots Parent Educational Programs Compete with Nationally Prominent ...BASPCAN
 
Unsupervised contact in an age of new technology: Possibe Solutions
Unsupervised contact in an age of new technology: Possibe SolutionsUnsupervised contact in an age of new technology: Possibe Solutions
Unsupervised contact in an age of new technology: Possibe SolutionsBASPCAN
 
Educación Productiva, Educación, Intercultural, Pluricultural, Bolivia
Educación Productiva, Educación, Intercultural, Pluricultural, BoliviaEducación Productiva, Educación, Intercultural, Pluricultural, Bolivia
Educación Productiva, Educación, Intercultural, Pluricultural, BoliviaÁlvaro Miguel Carranza Montalvo
 

Viewers also liked (20)

Mandatory Reporting and Neglect: Impacts and Issues
Mandatory Reporting and Neglect: Impacts and IssuesMandatory Reporting and Neglect: Impacts and Issues
Mandatory Reporting and Neglect: Impacts and Issues
 
"They'd very much picked up on the change in my behaviour":
"They'd very much picked up on the change in my behaviour":"They'd very much picked up on the change in my behaviour":
"They'd very much picked up on the change in my behaviour":
 
إرتقاء القيم - د.عبداللطيف خليفة
إرتقاء القيم - د.عبداللطيف خليفةإرتقاء القيم - د.عبداللطيف خليفة
إرتقاء القيم - د.عبداللطيف خليفة
 
Oferta wspolpracy repechage2
Oferta wspolpracy repechage2Oferta wspolpracy repechage2
Oferta wspolpracy repechage2
 
Resume_Vinayak_Mahajan
Resume_Vinayak_MahajanResume_Vinayak_Mahajan
Resume_Vinayak_Mahajan
 
Epistemología, Bolivia, Belleza, Carnaval, White Skin, Corso, Piel Blanca, Co...
Epistemología, Bolivia, Belleza, Carnaval, White Skin, Corso, Piel Blanca, Co...Epistemología, Bolivia, Belleza, Carnaval, White Skin, Corso, Piel Blanca, Co...
Epistemología, Bolivia, Belleza, Carnaval, White Skin, Corso, Piel Blanca, Co...
 
Quality of Care Giving in Substance Abuse Mothers
Quality of Care Giving in Substance Abuse MothersQuality of Care Giving in Substance Abuse Mothers
Quality of Care Giving in Substance Abuse Mothers
 
Eje cafetero
Eje cafeteroEje cafetero
Eje cafetero
 
A friend in need - Young people's views of peer support about issues of abuse...
A friend in need - Young people's views of peer support about issues of abuse...A friend in need - Young people's views of peer support about issues of abuse...
A friend in need - Young people's views of peer support about issues of abuse...
 
Enfoque Crítico de la Educación, Educación, Bolivia, Piel Blanca
Enfoque Crítico de la Educación, Educación, Bolivia, Piel BlancaEnfoque Crítico de la Educación, Educación, Bolivia, Piel Blanca
Enfoque Crítico de la Educación, Educación, Bolivia, Piel Blanca
 
NYFW#TrendReportSS17#
NYFW#TrendReportSS17#NYFW#TrendReportSS17#
NYFW#TrendReportSS17#
 
Turn the Page - Barriers and facilitators to change for young people on a har...
Turn the Page - Barriers and facilitators to change for young people on a har...Turn the Page - Barriers and facilitators to change for young people on a har...
Turn the Page - Barriers and facilitators to change for young people on a har...
 
Our life at school
Our life at schoolOur life at school
Our life at school
 
NTCIR11-Math2-PattaniyilN_slides
NTCIR11-Math2-PattaniyilN_slidesNTCIR11-Math2-PattaniyilN_slides
NTCIR11-Math2-PattaniyilN_slides
 
Can Grassroots Parent Educational Programs Compete with Nationally Prominent ...
Can Grassroots Parent Educational Programs Compete with Nationally Prominent ...Can Grassroots Parent Educational Programs Compete with Nationally Prominent ...
Can Grassroots Parent Educational Programs Compete with Nationally Prominent ...
 
Creative acceleration
Creative accelerationCreative acceleration
Creative acceleration
 
Unsupervised contact in an age of new technology: Possibe Solutions
Unsupervised contact in an age of new technology: Possibe SolutionsUnsupervised contact in an age of new technology: Possibe Solutions
Unsupervised contact in an age of new technology: Possibe Solutions
 
план работы цбс на 4 квартал 2015
план работы  цбс на 4 квартал 2015план работы  цбс на 4 квартал 2015
план работы цбс на 4 квартал 2015
 
Educación Productiva, Educación, Intercultural, Pluricultural, Bolivia
Educación Productiva, Educación, Intercultural, Pluricultural, BoliviaEducación Productiva, Educación, Intercultural, Pluricultural, Bolivia
Educación Productiva, Educación, Intercultural, Pluricultural, Bolivia
 
Weka project_Edit
Weka project_EditWeka project_Edit
Weka project_Edit
 

Similar to Get Your Board to Say "Yes" to a BSIMM Assessment

10-things-you-ought-to-know-before-you-benchmark(1)
10-things-you-ought-to-know-before-you-benchmark(1)10-things-you-ought-to-know-before-you-benchmark(1)
10-things-you-ought-to-know-before-you-benchmark(1)Marie Peters
 
Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Revie...
Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Revie...Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Revie...
Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Revie...Wendy Knox Everette
 
Cybersecurity threat assessment manual
Cybersecurity threat assessment manualCybersecurity threat assessment manual
Cybersecurity threat assessment manualAdeel Javaid
 
Balbix-New-CISO-Board-Deck.pptx
Balbix-New-CISO-Board-Deck.pptxBalbix-New-CISO-Board-Deck.pptx
Balbix-New-CISO-Board-Deck.pptxjjvdneut
 
Balbix-New-CISO-Board-Deck.pptx
Balbix-New-CISO-Board-Deck.pptxBalbix-New-CISO-Board-Deck.pptx
Balbix-New-CISO-Board-Deck.pptxjjvdneut
 
How to measure your cybersecurity performance
How to measure your cybersecurity performanceHow to measure your cybersecurity performance
How to measure your cybersecurity performanceAbhishek Sood
 
Cipher_Guide-To-Selecting-the-Right-CI-Software-Solution
Cipher_Guide-To-Selecting-the-Right-CI-Software-SolutionCipher_Guide-To-Selecting-the-Right-CI-Software-Solution
Cipher_Guide-To-Selecting-the-Right-CI-Software-SolutionBenjamin Decowski
 
Third Party Risk Management
Third Party Risk ManagementThird Party Risk Management
Third Party Risk ManagementEC-Council
 
Using Threat Information to Build Your Cyber Risk Intelligence Program
Using Threat Information to Build Your Cyber Risk Intelligence ProgramUsing Threat Information to Build Your Cyber Risk Intelligence Program
Using Threat Information to Build Your Cyber Risk Intelligence ProgramSurfWatch Labs
 
Allgress High Level Presentation
Allgress High Level PresentationAllgress High Level Presentation
Allgress High Level Presentatione9128
 
Top 10 Interview Questions for Risk Analyst.pptx
Top 10 Interview Questions for Risk Analyst.pptxTop 10 Interview Questions for Risk Analyst.pptx
Top 10 Interview Questions for Risk Analyst.pptxinfosec train
 
Rothke rsa 2012 building a security operations center (soc)
Rothke rsa 2012  building a security operations center (soc)Rothke rsa 2012  building a security operations center (soc)
Rothke rsa 2012 building a security operations center (soc)Ben Rothke
 
Metrics & Reporting - A Failure in Communication
Metrics & Reporting - A Failure in CommunicationMetrics & Reporting - A Failure in Communication
Metrics & Reporting - A Failure in CommunicationChris Ross
 
Building a Security Operations Center (SOC).pdf
Building a Security Operations Center (SOC).pdfBuilding a Security Operations Center (SOC).pdf
Building a Security Operations Center (SOC).pdfTapOffice
 
Bob West - Educating the Board of Directors
Bob West - Educating the Board of DirectorsBob West - Educating the Board of Directors
Bob West - Educating the Board of Directorscentralohioissa
 
(ISC)2 Security Congress 2015 - The Cloud Trust Conundrum- You’re Asking all ...
(ISC)2 Security Congress 2015 - The Cloud Trust Conundrum- You’re Asking all ...(ISC)2 Security Congress 2015 - The Cloud Trust Conundrum- You’re Asking all ...
(ISC)2 Security Congress 2015 - The Cloud Trust Conundrum- You’re Asking all ...Andrew O. Leeth
 
What is an IANS CISO Workshop? Factor 6
What is an IANS CISO Workshop? Factor 6What is an IANS CISO Workshop? Factor 6
What is an IANS CISO Workshop? Factor 6IANS
 
Audit and Compliance BDR Knowledge Training
Audit and Compliance BDR Knowledge TrainingAudit and Compliance BDR Knowledge Training
Audit and Compliance BDR Knowledge TrainingTory Quinton
 

Similar to Get Your Board to Say "Yes" to a BSIMM Assessment (20)

10-things-you-ought-to-know-before-you-benchmark(1)
10-things-you-ought-to-know-before-you-benchmark(1)10-things-you-ought-to-know-before-you-benchmark(1)
10-things-you-ought-to-know-before-you-benchmark(1)
 
Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Revie...
Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Revie...Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Revie...
Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Revie...
 
Cybersecurity threat assessment manual
Cybersecurity threat assessment manualCybersecurity threat assessment manual
Cybersecurity threat assessment manual
 
Balbix-New-CISO-Board-Deck.pptx
Balbix-New-CISO-Board-Deck.pptxBalbix-New-CISO-Board-Deck.pptx
Balbix-New-CISO-Board-Deck.pptx
 
Balbix-New-CISO-Board-Deck.pptx
Balbix-New-CISO-Board-Deck.pptxBalbix-New-CISO-Board-Deck.pptx
Balbix-New-CISO-Board-Deck.pptx
 
How to measure your cybersecurity performance
How to measure your cybersecurity performanceHow to measure your cybersecurity performance
How to measure your cybersecurity performance
 
Cipher_Guide-To-Selecting-the-Right-CI-Software-Solution
Cipher_Guide-To-Selecting-the-Right-CI-Software-SolutionCipher_Guide-To-Selecting-the-Right-CI-Software-Solution
Cipher_Guide-To-Selecting-the-Right-CI-Software-Solution
 
Third Party Risk Management
Third Party Risk ManagementThird Party Risk Management
Third Party Risk Management
 
So you want to be a CISO - 5 steps to Success
So you want to be a CISO - 5 steps to SuccessSo you want to be a CISO - 5 steps to Success
So you want to be a CISO - 5 steps to Success
 
Using Threat Information to Build Your Cyber Risk Intelligence Program
Using Threat Information to Build Your Cyber Risk Intelligence ProgramUsing Threat Information to Build Your Cyber Risk Intelligence Program
Using Threat Information to Build Your Cyber Risk Intelligence Program
 
Allgress High Level Presentation
Allgress High Level PresentationAllgress High Level Presentation
Allgress High Level Presentation
 
Top 10 Interview Questions for Risk Analyst.pptx
Top 10 Interview Questions for Risk Analyst.pptxTop 10 Interview Questions for Risk Analyst.pptx
Top 10 Interview Questions for Risk Analyst.pptx
 
Rothke rsa 2012 building a security operations center (soc)
Rothke rsa 2012  building a security operations center (soc)Rothke rsa 2012  building a security operations center (soc)
Rothke rsa 2012 building a security operations center (soc)
 
Metrics & Reporting - A Failure in Communication
Metrics & Reporting - A Failure in CommunicationMetrics & Reporting - A Failure in Communication
Metrics & Reporting - A Failure in Communication
 
Building a Security Operations Center (SOC).pdf
Building a Security Operations Center (SOC).pdfBuilding a Security Operations Center (SOC).pdf
Building a Security Operations Center (SOC).pdf
 
Bob West - Educating the Board of Directors
Bob West - Educating the Board of DirectorsBob West - Educating the Board of Directors
Bob West - Educating the Board of Directors
 
(ISC)2 Security Congress 2015 - The Cloud Trust Conundrum- You’re Asking all ...
(ISC)2 Security Congress 2015 - The Cloud Trust Conundrum- You’re Asking all ...(ISC)2 Security Congress 2015 - The Cloud Trust Conundrum- You’re Asking all ...
(ISC)2 Security Congress 2015 - The Cloud Trust Conundrum- You’re Asking all ...
 
ISACA 2016 Application Security RGJ
ISACA 2016 Application Security RGJISACA 2016 Application Security RGJ
ISACA 2016 Application Security RGJ
 
What is an IANS CISO Workshop? Factor 6
What is an IANS CISO Workshop? Factor 6What is an IANS CISO Workshop? Factor 6
What is an IANS CISO Workshop? Factor 6
 
Audit and Compliance BDR Knowledge Training
Audit and Compliance BDR Knowledge TrainingAudit and Compliance BDR Knowledge Training
Audit and Compliance BDR Knowledge Training
 

More from Cigital

Secure Design: Threat Modeling
Secure Design: Threat ModelingSecure Design: Threat Modeling
Secure Design: Threat ModelingCigital
 
Video Game Security
Video Game SecurityVideo Game Security
Video Game SecurityCigital
 
Static Analysis Tools and Frameworks: Overcoming a Dangerous Blind Spot
Static Analysis Tools and Frameworks: Overcoming a Dangerous Blind SpotStatic Analysis Tools and Frameworks: Overcoming a Dangerous Blind Spot
Static Analysis Tools and Frameworks: Overcoming a Dangerous Blind SpotCigital
 
Cyber War, Cyber Peace, Stones, and Glass Houses
Cyber War, Cyber Peace, Stones, and Glass HousesCyber War, Cyber Peace, Stones, and Glass Houses
Cyber War, Cyber Peace, Stones, and Glass HousesCigital
 
The Complete Web Application Security Testing Checklist
The Complete Web Application Security Testing ChecklistThe Complete Web Application Security Testing Checklist
The Complete Web Application Security Testing ChecklistCigital
 
SAST vs. DAST: What’s the Best Method For Application Security Testing?
SAST vs. DAST: What’s the Best Method For Application Security Testing?SAST vs. DAST: What’s the Best Method For Application Security Testing?
SAST vs. DAST: What’s the Best Method For Application Security Testing?Cigital
 
BSIMM By The Numbers
BSIMM By The NumbersBSIMM By The Numbers
BSIMM By The NumbersCigital
 
BSIMM: Bringing Science to Software Security
BSIMM: Bringing Science to Software SecurityBSIMM: Bringing Science to Software Security
BSIMM: Bringing Science to Software SecurityCigital
 
BSIMM-V: The Building Security In Maturity Model
BSIMM-V: The Building Security In Maturity ModelBSIMM-V: The Building Security In Maturity Model
BSIMM-V: The Building Security In Maturity ModelCigital
 
How to Avoid the Top Ten Software Security Flaws
How to Avoid the Top Ten Software Security FlawsHow to Avoid the Top Ten Software Security Flaws
How to Avoid the Top Ten Software Security FlawsCigital
 

More from Cigital (10)

Secure Design: Threat Modeling
Secure Design: Threat ModelingSecure Design: Threat Modeling
Secure Design: Threat Modeling
 
Video Game Security
Video Game SecurityVideo Game Security
Video Game Security
 
Static Analysis Tools and Frameworks: Overcoming a Dangerous Blind Spot
Static Analysis Tools and Frameworks: Overcoming a Dangerous Blind SpotStatic Analysis Tools and Frameworks: Overcoming a Dangerous Blind Spot
Static Analysis Tools and Frameworks: Overcoming a Dangerous Blind Spot
 
Cyber War, Cyber Peace, Stones, and Glass Houses
Cyber War, Cyber Peace, Stones, and Glass HousesCyber War, Cyber Peace, Stones, and Glass Houses
Cyber War, Cyber Peace, Stones, and Glass Houses
 
The Complete Web Application Security Testing Checklist
The Complete Web Application Security Testing ChecklistThe Complete Web Application Security Testing Checklist
The Complete Web Application Security Testing Checklist
 
SAST vs. DAST: What’s the Best Method For Application Security Testing?
SAST vs. DAST: What’s the Best Method For Application Security Testing?SAST vs. DAST: What’s the Best Method For Application Security Testing?
SAST vs. DAST: What’s the Best Method For Application Security Testing?
 
BSIMM By The Numbers
BSIMM By The NumbersBSIMM By The Numbers
BSIMM By The Numbers
 
BSIMM: Bringing Science to Software Security
BSIMM: Bringing Science to Software SecurityBSIMM: Bringing Science to Software Security
BSIMM: Bringing Science to Software Security
 
BSIMM-V: The Building Security In Maturity Model
BSIMM-V: The Building Security In Maturity ModelBSIMM-V: The Building Security In Maturity Model
BSIMM-V: The Building Security In Maturity Model
 
How to Avoid the Top Ten Software Security Flaws
How to Avoid the Top Ten Software Security FlawsHow to Avoid the Top Ten Software Security Flaws
How to Avoid the Top Ten Software Security Flaws
 

Recently uploaded

Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdfPayment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdfkalichargn70th171
 
Exploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdfExploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdfproinshot.com
 
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdfintroduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdfVishalKumarJha10
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Steffen Staab
 
Sector 18, Noida Call girls :8448380779 Model Escorts | 100% verified
Sector 18, Noida Call girls :8448380779 Model Escorts | 100% verifiedSector 18, Noida Call girls :8448380779 Model Escorts | 100% verified
Sector 18, Noida Call girls :8448380779 Model Escorts | 100% verifiedDelhi Call girls
 
Chinsurah Escorts ☎️8617697112 Starting From 5K to 15K High Profile Escorts ...
Chinsurah Escorts ☎️8617697112  Starting From 5K to 15K High Profile Escorts ...Chinsurah Escorts ☎️8617697112  Starting From 5K to 15K High Profile Escorts ...
Chinsurah Escorts ☎️8617697112 Starting From 5K to 15K High Profile Escorts ...Nitya salvi
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsArshad QA
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension AidPhilip Schwarz
 
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrainmasabamasaba
 
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park %in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park masabamasaba
 
The Top App Development Trends Shaping the Industry in 2024-25 .pdf
The Top App Development Trends Shaping the Industry in 2024-25 .pdfThe Top App Development Trends Shaping the Industry in 2024-25 .pdf
The Top App Development Trends Shaping the Industry in 2024-25 .pdfayushiqss
 
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfonteinmasabamasaba
 
Pharm-D Biostatistics and Research methodology
Pharm-D Biostatistics and Research methodologyPharm-D Biostatistics and Research methodology
Pharm-D Biostatistics and Research methodologyAnusha Are
 
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park %in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park masabamasaba
 
VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnAmarnathKambale
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsJhone kinadey
 
LEVEL 5 - SESSION 1 2023 (1).pptx - PDF 123456
LEVEL 5   - SESSION 1 2023 (1).pptx - PDF 123456LEVEL 5   - SESSION 1 2023 (1).pptx - PDF 123456
LEVEL 5 - SESSION 1 2023 (1).pptx - PDF 123456KiaraTiradoMicha
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
10 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 202410 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 2024Mind IT Systems
 

Recently uploaded (20)

Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdfPayment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
 
Exploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdfExploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdf
 
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdfintroduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
Sector 18, Noida Call girls :8448380779 Model Escorts | 100% verified
Sector 18, Noida Call girls :8448380779 Model Escorts | 100% verifiedSector 18, Noida Call girls :8448380779 Model Escorts | 100% verified
Sector 18, Noida Call girls :8448380779 Model Escorts | 100% verified
 
Chinsurah Escorts ☎️8617697112 Starting From 5K to 15K High Profile Escorts ...
Chinsurah Escorts ☎️8617697112  Starting From 5K to 15K High Profile Escorts ...Chinsurah Escorts ☎️8617697112  Starting From 5K to 15K High Profile Escorts ...
Chinsurah Escorts ☎️8617697112 Starting From 5K to 15K High Profile Escorts ...
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
 
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park %in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
 
The Top App Development Trends Shaping the Industry in 2024-25 .pdf
The Top App Development Trends Shaping the Industry in 2024-25 .pdfThe Top App Development Trends Shaping the Industry in 2024-25 .pdf
The Top App Development Trends Shaping the Industry in 2024-25 .pdf
 
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
 
Pharm-D Biostatistics and Research methodology
Pharm-D Biostatistics and Research methodologyPharm-D Biostatistics and Research methodology
Pharm-D Biostatistics and Research methodology
 
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park %in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
 
VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learn
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
LEVEL 5 - SESSION 1 2023 (1).pptx - PDF 123456
LEVEL 5   - SESSION 1 2023 (1).pptx - PDF 123456LEVEL 5   - SESSION 1 2023 (1).pptx - PDF 123456
LEVEL 5 - SESSION 1 2023 (1).pptx - PDF 123456
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
10 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 202410 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 2024
 

Get Your Board to Say "Yes" to a BSIMM Assessment

  • 1. Get Your Board to Say “Yes” to a BSIMM Assessment 5 ways benchmarking improves software security oversight.
  • 2. The typical board of directors • Is more concerned than ever before about cyber risk. • Must demonstrate oversight to shareholders, customers, partners, and regulators. • Seeks opportunities for a competitive advantage. But… • Has limited understanding of security activities. • Isn’t sure how to measure success.
  • 3. They often ask the “wrong” questions. For example…
  • 4. “What is the bug count in the software we develop?” This is a “wrong” question because… Bug count alone doesn’t consider severity of risk or size of your application portfolio.
  • 5. “How long does it take us to recover from a security incident?” This is a “wrong” question because… This is largely out of your control; it can vary depending on the type of security breach.
  • 6. They have limited context. For example, if you tell your board…
  • 7. “We’ve got # security staff for every developer.” The board doesn’t know if that is high or low.
  • 8. “We perform ad-hoc source code review.” The board doesn’t know if that is good or bad.
  • 9. They focus on internal data.
  • 10. Problems with an internal-only assessment • May unwittingly inflate an organization’s software security activities. • Doesn’t consider the full universe of potential activities employed by advanced software security initiatives. • Relies on personal experience to plan for the future.
  • 11. The board can’t influence what they don’t understand.
  • 12. As a result, your security program suffers • Investments and hires are delayed or rejected. • The organization has less incentive to comply with security policies. • Confidence in security leadership decreases.
  • 13. Change the conversation. 5 ways a BSIMM Assessment helps your board see the big picture.
  • 14. 1 They get an accurate picture of your software security initiative.
  • 15. BSIMM shows your board… • A full inventory of your software security activities in an easy-to-digest, standard framework. • An unbiased view of your operations, based on detailed interviews and documentation.
  • 16. 2 They can compare your software security initiative to 100+ real-world SSIs.
  • 17. BSIMM shows your board… • Security activities that give you a competitive advantage over other organizations. • Areas in which your organization lags behind best-in- class software security initiatives.
  • 18. 3 They can understand the basis for investment decisions.
  • 19. BSIMM shows your board… • How peer organizations value investments in certain software security activities over others. • Opportunities to increase efficiencies and reduce risk by changing the mix of your security activities.
  • 20. 4 They can follow a roadmap for future planning.
  • 21. BSIMM shows your board… • Maturity levels for each type of software security activity, based on prevalence and complexity. • The current position of your own organization on the maturity curve and strategies to reach the next level.
  • 22. 5 They can see evidence of your progress.
  • 23. BSIMM shows your board… • How your software security initiative becomes more mature over time. • How your relative position to other organizations improves.
  • 24. “If the ladder is not leaning against the right wall, every step we take just gets us to the wrong place faster.” — Steven Covey
  • 25. Help your board see the big picture. Talk to Cigital about a BSIMM Assessment today.