SlideShare a Scribd company logo
1 of 18
Download to read offline
CONFIDENTIAL© 2019 Synopsys, Inc.1
Using Metrics to Drive Your Software Security
Initiative
June 18, 2019
Kevin Nassery
CONFIDENTIAL© 2019 Synopsys, Inc.2
Intro
Me:
• Lead BSIMM ops & SSI practice at Synopsys Software Integrity Group
• 20+ years (50/50 in consulting) across infrastructure security, software
security, and program consulting
• 50+ BSIMM assessments
Metrics talk:
• The good
• The bad
• The must-haves
• But…not in that order
• Real stories (but anonymized
to protect the guilty)
CONFIDENTIAL© 2019 Synopsys, Inc.3
Metrics vs. measures
Used interchangeably in business—can’t assume what someone is talking
about when they use either term. However:
–A measure is a numerical observation independent of the process defining
how it was taken
–A metric is a numerical observation based on standard systems, methods,
calculations, and data sources
Metrics provide better comparative value over collections of measures:
– Consistency in observation process
– Consistency in meaning
CONFIDENTIAL© 2019 Synopsys, Inc.4
What you need to know about SSI metrics in 2 minutes
Must
• Measure SDL
compliance
• Get telemetry
from primary
gates
• Create feedback
loop to SSDL
enhancement
• Look at the data!
• Consider factors
of the program
execution and risk
Should
• Correlate data
• Strive for good
time series data
• Compare value of
efforts
• Test your theories/
intuition
• Tell your AppSec
story
• Fix your metrics
when you know
they’re broken
• Maximize the
security impact of
spend
Should avoid
• Accidentally
complicating the
numbers
• Intentionally
complicating the
numbers
• Rushing metrics
development
Must not
• Make up numbers
• Make up stories
about made-up
numbers
CONFIDENTIAL© 2019 Synopsys, Inc.5
What does BSIMM tell us about metrics?
[SM2.1] Publish data about software security internally.
• Just 39% of firms in BSIMM9 are publishing data about their SSI within the organization,
compared to 84% that have identified gate locations (SM1.4).
[SM3.3] Identify metrics and use them to drive budgets.
• Only 15% of firms are using metrics formally enough to drive fiscal decisions about their
software security initiatives.
CONFIDENTIAL© 2019 Synopsys, Inc.6
Misstep #1: Not enough context
CEO to CISO:
“I see January was a real
setback in our open issues from
penetration testing. Let’s not let
that happen again.”
CISO to CEO:
“Yes, ma’am.”
CISO to AppSec director:
“Cancel that new pen test
contract ASAP!”
CONFIDENTIAL© 2019 Synopsys, Inc.7
Misstep #1: Not enough context (cont.)
Date % PT # PT open H # PT open M # PT open L
6/2/19 66 1438 796 2148
5/2/19 66 1778 856 2540
4/2/19 66 1619 844 2320
3/2/19 66 1720 905 2450
2/2/19 66 2861 1435 4160
1/2/19 66 2841 1496 4211
12/2/18 66 1381 739 1950
11/2/18 66 1307 651 1880
10/2/18 66 1270 632 1875
9/2/18 66 927 447 1240
8/2/18 47 758 451 1100
7/2/18 47 748 405 1000
6/2/18 48 731 387 950
5/2/18 52 655 388 900
4/2/18 52 627 360 925
3/2/18 52 678 403 933
2/2/18 50 655 364 850
1/2/18 50 606 284 800
12/2/17 50 683 315 900
11/2/17 50 832 414 1200
10/2/17 10 97 35 50
9/2/17 10 105 69 150
8/2/17 10 228 75 200
7/2/17 10 101 48 50
0
10
20
30
40
50
60
70
3/6/17 6/14/17 9/22/17 12/31/17 4/10/18 7/19/18 10/27/18 2/4/19 5/15/19 8/23/19
% Portfolio Tested in Last 90 days
AppSec director to CISO:
“In January 2019, we began authenticated application testing, which gave us new
visibility into vulnerabilities we previously weren’t aware of. Most of these issues
were present long before they were discovered, and we’ve started the remediation
progress with our business and technical owners. Before that, in August, we were
able to bring our testing coverage across our portfolio up from 50% to 66%.”
Issues like this are best managed by ensuring executives are familiar with the
concepts of “managed” vs. “unmanaged” risk and providing visibility into both areas
wherever possible.
CONFIDENTIAL© 2019 Synopsys, Inc.8
Misstep #2: Bad definition & calculation
0
50
100
150
200
250
300
Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec
MTTR (days)
Total
AppSec director to CISO on January 1:
“Our most important application security metric
is our mean time to remediate, which
represents our organization’s ability to
remediate our known findings.”
October 1:
“Good news: We were able to finally close out
a critical design flaw discovered in January!”
CISO to AppSec director:
“That’s great. Unfortunately, your bonus has
been canceled due to the September MTTR.”
CONFIDENTIAL© 2019 Synopsys, Inc.9
Misstep #2: Bad definition & calculation (cont.)
Row Labels Sum of TTR (days)
Jan 13
Feb 11
Mar 124
Apr 16
May 10
Jun 20
Jul 73
Aug 63
Sep 253
Oct 17
Nov 12
Dec 15
Finding Open Date TTR (days) EOMonth-Remed
4006 1/7/18 240 9/30/18
2360 3/23/18 100 3/31/18
4726 8/7/18 60 8/31/18
1372 7/9/18 50 7/31/18
3345 1/13/18 7 1/31/18
0
50
100
150
200
250
300
Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec
MTTR (days)
Total
By not representing “open” issues in the MTTR calculation, the most “difficult” problems were
unaccounted for until they were closed. These types of lagging issues are quite common, unless
great care is taken in metrics development. Metrics, like software, often contain bugs.
CONFIDENTIAL© 2019 Synopsys, Inc.10
Misstep #3: Hidden factors, hidden risk
“Our severity scale reduces risk to low, where CVSS indicated the issue is not exploitable.”
• Misinterpreting “Not Defined” as “Not
Exploitable” hid hundreds of critical
security flaws from the remediation
efforts.
• The original intent was to facilitate
“prioritization” of risk, but this
carelessness resulted in major program
setbacks and provoked leadership
changes.
Image source: CVSS v3.0: Specification Document
CONFIDENTIAL© 2019 Synopsys, Inc.11
Misstep #4: Breaking the incentive model
“Because I’m a penetration tester, my compensation is driven by making
applications more secure. The key metric we use is if the applications
tested have fewer findings over time.”
Every published metric may have an unintended influence on stakeholder
incentives. Pressure check how your organization is using data to ensure
the incentives align with the overall goals of the organization and security
initiative.
CONFIDENTIAL© 2019 Synopsys, Inc.12
Highlight #1: Using metrics to drive vendor selection
“We provided the same application, artifacts, and source
code to multiple vendors and our internal testing team
with the same allotted time. The complete superset of
results was then aggregated and deduplicated, and each
vendor was given a percentage score against the
baseline. This score was combined with other
comparative factors, such as quality of guidance,
reporting factors, and cost, and was used to drive our
vendor schedule for the next 24 months.”
Designing metrics that can inform budgetary decisions is
a key behavior of successful SSI leaders.
CONFIDENTIAL© 2019 Synopsys, Inc.13
Highlight #2: Using a security activity to measure another
“We weren’t sure if our secure development training was
effective, so we analyzed our defects from multiple discovery
sources against our developer curriculum content. Each high
and critical issue was cross-referenced with our training
content, which led to us identifying both areas where we didn’t
have any coverage and areas where we did have coverage but
developers were still making mistakes.
This gave us clear direction on expanding the security
development curriculum and refreshing problematic existing
content.”
CONFIDENTIAL© 2019 Synopsys, Inc.14
Highlight #3: Making the case for SSI growth
“After our acquisition, the value of our SSI
investment was unclear to our new executive
leadership team. Fortunately, we had the tools and
automation in place to sample a number of
applications not managed by our SSI and compare
against the SSI’s portfolio. This demonstrated to
our leadership teams the importance of our
upstream program elements such as training, IDE
integrated secure code review, and threat
modeling.”
CONFIDENTIAL© 2019 Synopsys, Inc.15
Fun resources to inspire a new mindset
A fun primer on how to look at data differently, and a fun
introduction to thinking about incentives
A documented approach that may help you break
some of the institutional inertia regarding “bad”
numbers
How objectives and key results (OKRs) has
helped tech giants from Intel to Google achieve
explosive growth—and how it can help any
organization thrive
CONFIDENTIAL© 2019 Synopsys, Inc.16
Discussion
CONFIDENTIAL© 2019 Synopsys, Inc.17
Interested in learning more?
Our fourth annual FLIGHT Boston 2019 conference is just around the corner. On Sept. 17–19,
Synopsys will bring together leading experts from around the world to help you take your
software security/development practice to new heights. You’ll learn about the latest insights and
best practices in application security, DevOps and the cloud, and open source license
compliance.
Visit https://snps.sw-sec.co/FLIGHTBoston for more information and use code FLIGHT19 for
50% off your registration.
Thank You

More Related Content

What's hot

EMEA: Using Security Metrics to Drive Action - 22 Experts Share How to Commun...
EMEA: Using Security Metrics to Drive Action - 22 Experts Share How to Commun...EMEA: Using Security Metrics to Drive Action - 22 Experts Share How to Commun...
EMEA: Using Security Metrics to Drive Action - 22 Experts Share How to Commun...Mighty Guides, Inc.
 
2018 U.S State of Cybercrime
2018 U.S State of Cybercrime2018 U.S State of Cybercrime
2018 U.S State of CybercrimeIDG
 
Ernst & Young visuals security survey 2012
Ernst & Young visuals security survey 2012Ernst & Young visuals security survey 2012
Ernst & Young visuals security survey 2012Advent IM Ltd
 
Open Source Insight: Global Response to COSRI 2017 Open Source Security and R...
Open Source Insight: Global Response to COSRI 2017 Open Source Security and R...Open Source Insight: Global Response to COSRI 2017 Open Source Security and R...
Open Source Insight: Global Response to COSRI 2017 Open Source Security and R...Black Duck by Synopsys
 
Security of the future - Adapting Approaches to What We Need
Security of the future - Adapting Approaches to What We NeedSecurity of the future - Adapting Approaches to What We Need
Security of the future - Adapting Approaches to What We Needsimplyme12345
 
Third Annual State of Cyber Resilience SlideShare
Third Annual State of Cyber Resilience SlideShare Third Annual State of Cyber Resilience SlideShare
Third Annual State of Cyber Resilience SlideShare Accenture Security
 
CSO Pandemic Impact Survey, 2020
CSO Pandemic Impact Survey, 2020CSO Pandemic Impact Survey, 2020
CSO Pandemic Impact Survey, 2020IDG
 
2021 IDG Security Priorities Study
2021 IDG Security Priorities Study2021 IDG Security Priorities Study
2021 IDG Security Priorities StudyIDG
 
Using Security Metrics to Drive Action in Asia Pacific - 22 Experts Share How...
Using Security Metrics to Drive Action in Asia Pacific - 22 Experts Share How...Using Security Metrics to Drive Action in Asia Pacific - 22 Experts Share How...
Using Security Metrics to Drive Action in Asia Pacific - 22 Experts Share How...Mighty Guides, Inc.
 
Outside the (Black) Box: Protecting Core Operations in Energy
Outside the (Black) Box: Protecting Core Operations in EnergyOutside the (Black) Box: Protecting Core Operations in Energy
Outside the (Black) Box: Protecting Core Operations in Energyaccenture
 
Demonstrating Information Security Program Effectiveness
Demonstrating Information Security Program EffectivenessDemonstrating Information Security Program Effectiveness
Demonstrating Information Security Program EffectivenessDoug Copley
 
2016 Future of Open Source Survey Results
2016 Future of Open Source Survey Results2016 Future of Open Source Survey Results
2016 Future of Open Source Survey ResultsBlack Duck by Synopsys
 
Understanding the Security-Specific Purchase Process [Infographic]
Understanding the Security-Specific Purchase Process [Infographic]Understanding the Security-Specific Purchase Process [Infographic]
Understanding the Security-Specific Purchase Process [Infographic]IDG
 
IDG 2020 Security Priorities Research
IDG 2020 Security Priorities ResearchIDG 2020 Security Priorities Research
IDG 2020 Security Priorities ResearchIDG
 
SVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - OverviewSVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - OverviewSilicon Valley Bank
 
SVB Cybersecurity Impact on Innovation Report
SVB Cybersecurity Impact on Innovation ReportSVB Cybersecurity Impact on Innovation Report
SVB Cybersecurity Impact on Innovation ReportSilicon Valley Bank
 
Priming your digital immune system: Cybersecurity in the cognitive era
Priming your digital immune system: Cybersecurity in the cognitive eraPriming your digital immune system: Cybersecurity in the cognitive era
Priming your digital immune system: Cybersecurity in the cognitive eraLuke Farrell
 

What's hot (20)

EMEA: Using Security Metrics to Drive Action - 22 Experts Share How to Commun...
EMEA: Using Security Metrics to Drive Action - 22 Experts Share How to Commun...EMEA: Using Security Metrics to Drive Action - 22 Experts Share How to Commun...
EMEA: Using Security Metrics to Drive Action - 22 Experts Share How to Commun...
 
Cybersecurity report-vol-8
Cybersecurity report-vol-8Cybersecurity report-vol-8
Cybersecurity report-vol-8
 
2018 U.S State of Cybercrime
2018 U.S State of Cybercrime2018 U.S State of Cybercrime
2018 U.S State of Cybercrime
 
Ernst & Young visuals security survey 2012
Ernst & Young visuals security survey 2012Ernst & Young visuals security survey 2012
Ernst & Young visuals security survey 2012
 
Open Source Insight: Global Response to COSRI 2017 Open Source Security and R...
Open Source Insight: Global Response to COSRI 2017 Open Source Security and R...Open Source Insight: Global Response to COSRI 2017 Open Source Security and R...
Open Source Insight: Global Response to COSRI 2017 Open Source Security and R...
 
Security of the future - Adapting Approaches to What We Need
Security of the future - Adapting Approaches to What We NeedSecurity of the future - Adapting Approaches to What We Need
Security of the future - Adapting Approaches to What We Need
 
Third Annual State of Cyber Resilience SlideShare
Third Annual State of Cyber Resilience SlideShare Third Annual State of Cyber Resilience SlideShare
Third Annual State of Cyber Resilience SlideShare
 
CSO Pandemic Impact Survey, 2020
CSO Pandemic Impact Survey, 2020CSO Pandemic Impact Survey, 2020
CSO Pandemic Impact Survey, 2020
 
2021 IDG Security Priorities Study
2021 IDG Security Priorities Study2021 IDG Security Priorities Study
2021 IDG Security Priorities Study
 
EMA Megatrends in Cyber-Security
EMA Megatrends in Cyber-SecurityEMA Megatrends in Cyber-Security
EMA Megatrends in Cyber-Security
 
Using Security Metrics to Drive Action in Asia Pacific - 22 Experts Share How...
Using Security Metrics to Drive Action in Asia Pacific - 22 Experts Share How...Using Security Metrics to Drive Action in Asia Pacific - 22 Experts Share How...
Using Security Metrics to Drive Action in Asia Pacific - 22 Experts Share How...
 
Outside the (Black) Box: Protecting Core Operations in Energy
Outside the (Black) Box: Protecting Core Operations in EnergyOutside the (Black) Box: Protecting Core Operations in Energy
Outside the (Black) Box: Protecting Core Operations in Energy
 
Demonstrating Information Security Program Effectiveness
Demonstrating Information Security Program EffectivenessDemonstrating Information Security Program Effectiveness
Demonstrating Information Security Program Effectiveness
 
2016 Future of Open Source Survey Results
2016 Future of Open Source Survey Results2016 Future of Open Source Survey Results
2016 Future of Open Source Survey Results
 
Understanding the Security-Specific Purchase Process [Infographic]
Understanding the Security-Specific Purchase Process [Infographic]Understanding the Security-Specific Purchase Process [Infographic]
Understanding the Security-Specific Purchase Process [Infographic]
 
CAPP Conference Survey
CAPP Conference SurveyCAPP Conference Survey
CAPP Conference Survey
 
IDG 2020 Security Priorities Research
IDG 2020 Security Priorities ResearchIDG 2020 Security Priorities Research
IDG 2020 Security Priorities Research
 
SVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - OverviewSVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - Overview
 
SVB Cybersecurity Impact on Innovation Report
SVB Cybersecurity Impact on Innovation ReportSVB Cybersecurity Impact on Innovation Report
SVB Cybersecurity Impact on Innovation Report
 
Priming your digital immune system: Cybersecurity in the cognitive era
Priming your digital immune system: Cybersecurity in the cognitive eraPriming your digital immune system: Cybersecurity in the cognitive era
Priming your digital immune system: Cybersecurity in the cognitive era
 

Similar to Webinar – Using Metrics to Drive Your Software Security Initiative

10-things-you-ought-to-know-before-you-benchmark(1)
10-things-you-ought-to-know-before-you-benchmark(1)10-things-you-ought-to-know-before-you-benchmark(1)
10-things-you-ought-to-know-before-you-benchmark(1)Marie Peters
 
Metrics & Reporting - A Failure in Communication
Metrics & Reporting - A Failure in CommunicationMetrics & Reporting - A Failure in Communication
Metrics & Reporting - A Failure in CommunicationChris Ross
 
IREC165473PR RP 2017 Security Outlook
IREC165473PR RP 2017 Security OutlookIREC165473PR RP 2017 Security Outlook
IREC165473PR RP 2017 Security OutlookChris Cornillie
 
Outpost24 Webinar - Creating a sustainable application security program to dr...
Outpost24 Webinar - Creating a sustainable application security program to dr...Outpost24 Webinar - Creating a sustainable application security program to dr...
Outpost24 Webinar - Creating a sustainable application security program to dr...Outpost24
 
Cyber Defence - Service portfolio
Cyber Defence - Service portfolioCyber Defence - Service portfolio
Cyber Defence - Service portfolioKaloyan Krastev
 
Merging forensics w data analytics
Merging forensics w data analyticsMerging forensics w data analytics
Merging forensics w data analyticschris75308
 
Why Do Enterprise Companies Build Apps So Slowly?
Why Do Enterprise Companies Build Apps So Slowly?Why Do Enterprise Companies Build Apps So Slowly?
Why Do Enterprise Companies Build Apps So Slowly?Helpshift
 
Cyber security framework
Cyber security frameworkCyber security framework
Cyber security frameworkYann Lecourt
 
From checkboxes to frameworks
From checkboxes to frameworksFrom checkboxes to frameworks
From checkboxes to frameworksVincent Bellamy
 
Technology Trends in Insurance
Technology Trends in InsuranceTechnology Trends in Insurance
Technology Trends in Insuranceminorifh
 
Technology Trends in Insurance
Technology Trends in InsuranceTechnology Trends in Insurance
Technology Trends in InsuranceNEOS Consulting
 
IT Guide for Mobility: Making the case for Security leaders
IT Guide for Mobility: Making the case for Security leadersIT Guide for Mobility: Making the case for Security leaders
IT Guide for Mobility: Making the case for Security leadersCisco Mobility
 
CA Technologies Predictions for Identity Management in 2015 – The Application...
CA Technologies Predictions for Identity Management in 2015 – The Application...CA Technologies Predictions for Identity Management in 2015 – The Application...
CA Technologies Predictions for Identity Management in 2015 – The Application...CA Technologies
 
Ciso organizational priorities to build a resilient bimodal it
Ciso organizational priorities to build a resilient bimodal itCiso organizational priorities to build a resilient bimodal it
Ciso organizational priorities to build a resilient bimodal itChandra Sekhar Tondepu
 
Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5Accenture Technology
 
Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5accenture
 
A CIRO's-eye view of Digital Risk Management
A CIRO's-eye view of Digital Risk ManagementA CIRO's-eye view of Digital Risk Management
A CIRO's-eye view of Digital Risk ManagementDaren Dunkel
 
Does title make a difference?
Does title make a difference?Does title make a difference?
Does title make a difference?Pete Nieminen
 

Similar to Webinar – Using Metrics to Drive Your Software Security Initiative (20)

10-things-you-ought-to-know-before-you-benchmark(1)
10-things-you-ought-to-know-before-you-benchmark(1)10-things-you-ought-to-know-before-you-benchmark(1)
10-things-you-ought-to-know-before-you-benchmark(1)
 
ISACA 2016 Application Security RGJ
ISACA 2016 Application Security RGJISACA 2016 Application Security RGJ
ISACA 2016 Application Security RGJ
 
Metrics & Reporting - A Failure in Communication
Metrics & Reporting - A Failure in CommunicationMetrics & Reporting - A Failure in Communication
Metrics & Reporting - A Failure in Communication
 
IREC165473PR RP 2017 Security Outlook
IREC165473PR RP 2017 Security OutlookIREC165473PR RP 2017 Security Outlook
IREC165473PR RP 2017 Security Outlook
 
Outpost24 Webinar - Creating a sustainable application security program to dr...
Outpost24 Webinar - Creating a sustainable application security program to dr...Outpost24 Webinar - Creating a sustainable application security program to dr...
Outpost24 Webinar - Creating a sustainable application security program to dr...
 
Cyber Defence - Service portfolio
Cyber Defence - Service portfolioCyber Defence - Service portfolio
Cyber Defence - Service portfolio
 
Merging forensics w data analytics
Merging forensics w data analyticsMerging forensics w data analytics
Merging forensics w data analytics
 
Why Do Enterprise Companies Build Apps So Slowly?
Why Do Enterprise Companies Build Apps So Slowly?Why Do Enterprise Companies Build Apps So Slowly?
Why Do Enterprise Companies Build Apps So Slowly?
 
Cyber security framework
Cyber security frameworkCyber security framework
Cyber security framework
 
From checkboxes to frameworks
From checkboxes to frameworksFrom checkboxes to frameworks
From checkboxes to frameworks
 
Technology Trends in Insurance
Technology Trends in InsuranceTechnology Trends in Insurance
Technology Trends in Insurance
 
Technology Trends in Insurance
Technology Trends in InsuranceTechnology Trends in Insurance
Technology Trends in Insurance
 
IT Guide for Mobility: Making the case for Security leaders
IT Guide for Mobility: Making the case for Security leadersIT Guide for Mobility: Making the case for Security leaders
IT Guide for Mobility: Making the case for Security leaders
 
CA Technologies Predictions for Identity Management in 2015 – The Application...
CA Technologies Predictions for Identity Management in 2015 – The Application...CA Technologies Predictions for Identity Management in 2015 – The Application...
CA Technologies Predictions for Identity Management in 2015 – The Application...
 
eob_dec14.artok
eob_dec14.artokeob_dec14.artok
eob_dec14.artok
 
Ciso organizational priorities to build a resilient bimodal it
Ciso organizational priorities to build a resilient bimodal itCiso organizational priorities to build a resilient bimodal it
Ciso organizational priorities to build a resilient bimodal it
 
Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5
 
Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5
 
A CIRO's-eye view of Digital Risk Management
A CIRO's-eye view of Digital Risk ManagementA CIRO's-eye view of Digital Risk Management
A CIRO's-eye view of Digital Risk Management
 
Does title make a difference?
Does title make a difference?Does title make a difference?
Does title make a difference?
 

More from Synopsys Software Integrity Group

Webinar–Mobile Application Hardening Protecting Business Critical Apps
Webinar–Mobile Application Hardening Protecting Business Critical AppsWebinar–Mobile Application Hardening Protecting Business Critical Apps
Webinar–Mobile Application Hardening Protecting Business Critical AppsSynopsys Software Integrity Group
 
Webinar–You've Got Your Open Source Audit Report–Now What?
Webinar–You've Got Your Open Source Audit Report–Now What? Webinar–You've Got Your Open Source Audit Report–Now What?
Webinar–You've Got Your Open Source Audit Report–Now What? Synopsys Software Integrity Group
 
Do Design Quality and Code Quality Matter in Merger and Acquisition Tech Due ...
Do Design Quality and Code Quality Matter in Merger and Acquisition Tech Due ...Do Design Quality and Code Quality Matter in Merger and Acquisition Tech Due ...
Do Design Quality and Code Quality Matter in Merger and Acquisition Tech Due ...Synopsys Software Integrity Group
 
Webinar–Financial Services Study Shows Why Investing in AppSec Matters
Webinar–Financial Services Study Shows Why Investing in AppSec MattersWebinar–Financial Services Study Shows Why Investing in AppSec Matters
Webinar–Financial Services Study Shows Why Investing in AppSec MattersSynopsys Software Integrity Group
 
Webinar–Improving Fuzz Testing of Infotainment Systems and Telematics Units U...
Webinar–Improving Fuzz Testing of Infotainment Systems and Telematics Units U...Webinar–Improving Fuzz Testing of Infotainment Systems and Telematics Units U...
Webinar–Improving Fuzz Testing of Infotainment Systems and Telematics Units U...Synopsys Software Integrity Group
 
Webinar–Is Your Software Security Supply Chain a Security Blind Spot?
Webinar–Is Your Software Security Supply Chain a Security Blind Spot?Webinar–Is Your Software Security Supply Chain a Security Blind Spot?
Webinar–Is Your Software Security Supply Chain a Security Blind Spot?Synopsys Software Integrity Group
 
Webinar–Sécurité Applicative et DevSecOps dans un monde Agile
Webinar–Sécurité Applicative et DevSecOps dans un monde AgileWebinar–Sécurité Applicative et DevSecOps dans un monde Agile
Webinar–Sécurité Applicative et DevSecOps dans un monde AgileSynopsys Software Integrity Group
 
Webinar–Creating a Modern AppSec Toolchain to Quantify Service Risks
Webinar–Creating a Modern AppSec Toolchain to Quantify Service RisksWebinar–Creating a Modern AppSec Toolchain to Quantify Service Risks
Webinar–Creating a Modern AppSec Toolchain to Quantify Service RisksSynopsys Software Integrity Group
 
Webinar – Streamling Your Tech Due Diligence Process for Software Assets
Webinar – Streamling Your Tech Due Diligence Process for Software AssetsWebinar – Streamling Your Tech Due Diligence Process for Software Assets
Webinar – Streamling Your Tech Due Diligence Process for Software AssetsSynopsys Software Integrity Group
 

More from Synopsys Software Integrity Group (20)

Webinar–Segen oder Fluch?
Webinar–Segen oder Fluch?Webinar–Segen oder Fluch?
Webinar–Segen oder Fluch?
 
Webinar–Mobile Application Hardening Protecting Business Critical Apps
Webinar–Mobile Application Hardening Protecting Business Critical AppsWebinar–Mobile Application Hardening Protecting Business Critical Apps
Webinar–Mobile Application Hardening Protecting Business Critical Apps
 
Webinar–The 2019 Open Source Year in Review
Webinar–The 2019 Open Source Year in ReviewWebinar–The 2019 Open Source Year in Review
Webinar–The 2019 Open Source Year in Review
 
Webinar–Best Practices for DevSecOps at Scale
Webinar–Best Practices for DevSecOps at ScaleWebinar–Best Practices for DevSecOps at Scale
Webinar–Best Practices for DevSecOps at Scale
 
Webinar–That is Not How This Works
Webinar–That is Not How This WorksWebinar–That is Not How This Works
Webinar–That is Not How This Works
 
Webinar–You've Got Your Open Source Audit Report–Now What?
Webinar–You've Got Your Open Source Audit Report–Now What? Webinar–You've Got Your Open Source Audit Report–Now What?
Webinar–You've Got Your Open Source Audit Report–Now What?
 
Webinar–OWASP Top 10 for JavaScript for Developers
Webinar–OWASP Top 10 for JavaScript for DevelopersWebinar–OWASP Top 10 for JavaScript for Developers
Webinar–OWASP Top 10 for JavaScript for Developers
 
Webinar–The State of Open Source in M&A Transactions
Webinar–The State of Open Source in M&A Transactions Webinar–The State of Open Source in M&A Transactions
Webinar–The State of Open Source in M&A Transactions
 
Webinar–5 ways to risk rank your vulnerabilities
Webinar–5 ways to risk rank your vulnerabilitiesWebinar–5 ways to risk rank your vulnerabilities
Webinar–5 ways to risk rank your vulnerabilities
 
Do Design Quality and Code Quality Matter in Merger and Acquisition Tech Due ...
Do Design Quality and Code Quality Matter in Merger and Acquisition Tech Due ...Do Design Quality and Code Quality Matter in Merger and Acquisition Tech Due ...
Do Design Quality and Code Quality Matter in Merger and Acquisition Tech Due ...
 
Webinar–Using Evidence-Based Security
Webinar–Using Evidence-Based Security Webinar–Using Evidence-Based Security
Webinar–Using Evidence-Based Security
 
Webinar–Delivering a Next Generation Vulnerability Feed
Webinar–Delivering a Next Generation Vulnerability FeedWebinar–Delivering a Next Generation Vulnerability Feed
Webinar–Delivering a Next Generation Vulnerability Feed
 
Webinar–Financial Services Study Shows Why Investing in AppSec Matters
Webinar–Financial Services Study Shows Why Investing in AppSec MattersWebinar–Financial Services Study Shows Why Investing in AppSec Matters
Webinar–Financial Services Study Shows Why Investing in AppSec Matters
 
Webinar–What You Need To Know About Open Source Licensing
Webinar–What You Need To Know About Open Source LicensingWebinar–What You Need To Know About Open Source Licensing
Webinar–What You Need To Know About Open Source Licensing
 
Webinar–Improving Fuzz Testing of Infotainment Systems and Telematics Units U...
Webinar–Improving Fuzz Testing of Infotainment Systems and Telematics Units U...Webinar–Improving Fuzz Testing of Infotainment Systems and Telematics Units U...
Webinar–Improving Fuzz Testing of Infotainment Systems and Telematics Units U...
 
Webinar–Why All Open Source Scans Aren't Created Equal
Webinar–Why All Open Source Scans Aren't Created EqualWebinar–Why All Open Source Scans Aren't Created Equal
Webinar–Why All Open Source Scans Aren't Created Equal
 
Webinar–Is Your Software Security Supply Chain a Security Blind Spot?
Webinar–Is Your Software Security Supply Chain a Security Blind Spot?Webinar–Is Your Software Security Supply Chain a Security Blind Spot?
Webinar–Is Your Software Security Supply Chain a Security Blind Spot?
 
Webinar–Sécurité Applicative et DevSecOps dans un monde Agile
Webinar–Sécurité Applicative et DevSecOps dans un monde AgileWebinar–Sécurité Applicative et DevSecOps dans un monde Agile
Webinar–Sécurité Applicative et DevSecOps dans un monde Agile
 
Webinar–Creating a Modern AppSec Toolchain to Quantify Service Risks
Webinar–Creating a Modern AppSec Toolchain to Quantify Service RisksWebinar–Creating a Modern AppSec Toolchain to Quantify Service Risks
Webinar–Creating a Modern AppSec Toolchain to Quantify Service Risks
 
Webinar – Streamling Your Tech Due Diligence Process for Software Assets
Webinar – Streamling Your Tech Due Diligence Process for Software AssetsWebinar – Streamling Your Tech Due Diligence Process for Software Assets
Webinar – Streamling Your Tech Due Diligence Process for Software Assets
 

Recently uploaded

Introduction to Decentralized Applications (dApps)
Introduction to Decentralized Applications (dApps)Introduction to Decentralized Applications (dApps)
Introduction to Decentralized Applications (dApps)Intelisync
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfkalichargn70th171
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfjoe51371421
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptkotipi9215
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfkalichargn70th171
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackVICTOR MAESTRE RAMIREZ
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - InfographicHr365.us smith
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...harshavardhanraghave
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 

Recently uploaded (20)

Introduction to Decentralized Applications (dApps)
Introduction to Decentralized Applications (dApps)Introduction to Decentralized Applications (dApps)
Introduction to Decentralized Applications (dApps)
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdf
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.ppt
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStack
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - Infographic
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 

Webinar – Using Metrics to Drive Your Software Security Initiative

  • 1. CONFIDENTIAL© 2019 Synopsys, Inc.1 Using Metrics to Drive Your Software Security Initiative June 18, 2019 Kevin Nassery
  • 2. CONFIDENTIAL© 2019 Synopsys, Inc.2 Intro Me: • Lead BSIMM ops & SSI practice at Synopsys Software Integrity Group • 20+ years (50/50 in consulting) across infrastructure security, software security, and program consulting • 50+ BSIMM assessments Metrics talk: • The good • The bad • The must-haves • But…not in that order • Real stories (but anonymized to protect the guilty)
  • 3. CONFIDENTIAL© 2019 Synopsys, Inc.3 Metrics vs. measures Used interchangeably in business—can’t assume what someone is talking about when they use either term. However: –A measure is a numerical observation independent of the process defining how it was taken –A metric is a numerical observation based on standard systems, methods, calculations, and data sources Metrics provide better comparative value over collections of measures: – Consistency in observation process – Consistency in meaning
  • 4. CONFIDENTIAL© 2019 Synopsys, Inc.4 What you need to know about SSI metrics in 2 minutes Must • Measure SDL compliance • Get telemetry from primary gates • Create feedback loop to SSDL enhancement • Look at the data! • Consider factors of the program execution and risk Should • Correlate data • Strive for good time series data • Compare value of efforts • Test your theories/ intuition • Tell your AppSec story • Fix your metrics when you know they’re broken • Maximize the security impact of spend Should avoid • Accidentally complicating the numbers • Intentionally complicating the numbers • Rushing metrics development Must not • Make up numbers • Make up stories about made-up numbers
  • 5. CONFIDENTIAL© 2019 Synopsys, Inc.5 What does BSIMM tell us about metrics? [SM2.1] Publish data about software security internally. • Just 39% of firms in BSIMM9 are publishing data about their SSI within the organization, compared to 84% that have identified gate locations (SM1.4). [SM3.3] Identify metrics and use them to drive budgets. • Only 15% of firms are using metrics formally enough to drive fiscal decisions about their software security initiatives.
  • 6. CONFIDENTIAL© 2019 Synopsys, Inc.6 Misstep #1: Not enough context CEO to CISO: “I see January was a real setback in our open issues from penetration testing. Let’s not let that happen again.” CISO to CEO: “Yes, ma’am.” CISO to AppSec director: “Cancel that new pen test contract ASAP!”
  • 7. CONFIDENTIAL© 2019 Synopsys, Inc.7 Misstep #1: Not enough context (cont.) Date % PT # PT open H # PT open M # PT open L 6/2/19 66 1438 796 2148 5/2/19 66 1778 856 2540 4/2/19 66 1619 844 2320 3/2/19 66 1720 905 2450 2/2/19 66 2861 1435 4160 1/2/19 66 2841 1496 4211 12/2/18 66 1381 739 1950 11/2/18 66 1307 651 1880 10/2/18 66 1270 632 1875 9/2/18 66 927 447 1240 8/2/18 47 758 451 1100 7/2/18 47 748 405 1000 6/2/18 48 731 387 950 5/2/18 52 655 388 900 4/2/18 52 627 360 925 3/2/18 52 678 403 933 2/2/18 50 655 364 850 1/2/18 50 606 284 800 12/2/17 50 683 315 900 11/2/17 50 832 414 1200 10/2/17 10 97 35 50 9/2/17 10 105 69 150 8/2/17 10 228 75 200 7/2/17 10 101 48 50 0 10 20 30 40 50 60 70 3/6/17 6/14/17 9/22/17 12/31/17 4/10/18 7/19/18 10/27/18 2/4/19 5/15/19 8/23/19 % Portfolio Tested in Last 90 days AppSec director to CISO: “In January 2019, we began authenticated application testing, which gave us new visibility into vulnerabilities we previously weren’t aware of. Most of these issues were present long before they were discovered, and we’ve started the remediation progress with our business and technical owners. Before that, in August, we were able to bring our testing coverage across our portfolio up from 50% to 66%.” Issues like this are best managed by ensuring executives are familiar with the concepts of “managed” vs. “unmanaged” risk and providing visibility into both areas wherever possible.
  • 8. CONFIDENTIAL© 2019 Synopsys, Inc.8 Misstep #2: Bad definition & calculation 0 50 100 150 200 250 300 Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec MTTR (days) Total AppSec director to CISO on January 1: “Our most important application security metric is our mean time to remediate, which represents our organization’s ability to remediate our known findings.” October 1: “Good news: We were able to finally close out a critical design flaw discovered in January!” CISO to AppSec director: “That’s great. Unfortunately, your bonus has been canceled due to the September MTTR.”
  • 9. CONFIDENTIAL© 2019 Synopsys, Inc.9 Misstep #2: Bad definition & calculation (cont.) Row Labels Sum of TTR (days) Jan 13 Feb 11 Mar 124 Apr 16 May 10 Jun 20 Jul 73 Aug 63 Sep 253 Oct 17 Nov 12 Dec 15 Finding Open Date TTR (days) EOMonth-Remed 4006 1/7/18 240 9/30/18 2360 3/23/18 100 3/31/18 4726 8/7/18 60 8/31/18 1372 7/9/18 50 7/31/18 3345 1/13/18 7 1/31/18 0 50 100 150 200 250 300 Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec MTTR (days) Total By not representing “open” issues in the MTTR calculation, the most “difficult” problems were unaccounted for until they were closed. These types of lagging issues are quite common, unless great care is taken in metrics development. Metrics, like software, often contain bugs.
  • 10. CONFIDENTIAL© 2019 Synopsys, Inc.10 Misstep #3: Hidden factors, hidden risk “Our severity scale reduces risk to low, where CVSS indicated the issue is not exploitable.” • Misinterpreting “Not Defined” as “Not Exploitable” hid hundreds of critical security flaws from the remediation efforts. • The original intent was to facilitate “prioritization” of risk, but this carelessness resulted in major program setbacks and provoked leadership changes. Image source: CVSS v3.0: Specification Document
  • 11. CONFIDENTIAL© 2019 Synopsys, Inc.11 Misstep #4: Breaking the incentive model “Because I’m a penetration tester, my compensation is driven by making applications more secure. The key metric we use is if the applications tested have fewer findings over time.” Every published metric may have an unintended influence on stakeholder incentives. Pressure check how your organization is using data to ensure the incentives align with the overall goals of the organization and security initiative.
  • 12. CONFIDENTIAL© 2019 Synopsys, Inc.12 Highlight #1: Using metrics to drive vendor selection “We provided the same application, artifacts, and source code to multiple vendors and our internal testing team with the same allotted time. The complete superset of results was then aggregated and deduplicated, and each vendor was given a percentage score against the baseline. This score was combined with other comparative factors, such as quality of guidance, reporting factors, and cost, and was used to drive our vendor schedule for the next 24 months.” Designing metrics that can inform budgetary decisions is a key behavior of successful SSI leaders.
  • 13. CONFIDENTIAL© 2019 Synopsys, Inc.13 Highlight #2: Using a security activity to measure another “We weren’t sure if our secure development training was effective, so we analyzed our defects from multiple discovery sources against our developer curriculum content. Each high and critical issue was cross-referenced with our training content, which led to us identifying both areas where we didn’t have any coverage and areas where we did have coverage but developers were still making mistakes. This gave us clear direction on expanding the security development curriculum and refreshing problematic existing content.”
  • 14. CONFIDENTIAL© 2019 Synopsys, Inc.14 Highlight #3: Making the case for SSI growth “After our acquisition, the value of our SSI investment was unclear to our new executive leadership team. Fortunately, we had the tools and automation in place to sample a number of applications not managed by our SSI and compare against the SSI’s portfolio. This demonstrated to our leadership teams the importance of our upstream program elements such as training, IDE integrated secure code review, and threat modeling.”
  • 15. CONFIDENTIAL© 2019 Synopsys, Inc.15 Fun resources to inspire a new mindset A fun primer on how to look at data differently, and a fun introduction to thinking about incentives A documented approach that may help you break some of the institutional inertia regarding “bad” numbers How objectives and key results (OKRs) has helped tech giants from Intel to Google achieve explosive growth—and how it can help any organization thrive
  • 16. CONFIDENTIAL© 2019 Synopsys, Inc.16 Discussion
  • 17. CONFIDENTIAL© 2019 Synopsys, Inc.17 Interested in learning more? Our fourth annual FLIGHT Boston 2019 conference is just around the corner. On Sept. 17–19, Synopsys will bring together leading experts from around the world to help you take your software security/development practice to new heights. You’ll learn about the latest insights and best practices in application security, DevOps and the cloud, and open source license compliance. Visit https://snps.sw-sec.co/FLIGHTBoston for more information and use code FLIGHT19 for 50% off your registration.