SlideShare a Scribd company logo
1 of 21
Download to read offline
© Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information.
How to Scale
Mobile Application Security Testing
© Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information.
Connect with NowSecure
Connect with us on Twitter @NowSecureMobile / #SecureTalks
—
Learn more at https://nowsecure.com
Katie Strzempka
Services
© Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information.
● Author of IPhone and iOS Forensics
● Masters in Cyber Forensics and
Bachelors of Science in Computer
Technology from Purdue University
● @kstrzemp
© Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information.
Contents
● 2016 NowSecure Mobile Security Report
● The Challenges Teams Face
● How You Can Scale
© Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information.
2016 NowSecure Mobile
Security Report
Released last week
© Copyright 2015 NowSecure, Inc. All Rights Reserved. Proprietary information.
400K APPS
We tested
© Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information.
25%of Android apps have at least one
high risk security or privacy flaw
© Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information.
Percentage of Android Apps with Security Issues
Sensitive Data Leak Issues
Network Issues
File System Issues
© Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information.
Business apps:
High risk issues exist within each app category
3x
more likely to leak
login credentials
more likely to leak login
credentials or email address
4x1.5xmore likely to include a
high risk vulnerability
Gaming apps: Social apps:
© Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information.
82%of devices tested by the
Vulnerability Test Suite for Android had
at least one of 25 vulnerabilities
© Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information.
The Challenges
Teams face a variety of challenges with security in the SDLC
© Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information.
Teams are overwhelmed with security testing
100+Many enterprises have more than 100
unique, internal apps
© Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information.
Source code analysis has too many false positives
● Testing reports more false
positives instead of identifying
actual issues
● Static only
● Misses key tests such as insecure
data storage or authentication
issues
© Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information.
Teams lack a process for mobile
● App testing is repetitive and
takes time to manually set up
testing environments
● Inconsistent methods and
results across team members
© Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information..
Teams are finding vulnerabilities too late in the SDLC
The back-and-forth between
developers and analysts wastes
time and money
© Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information.
The longer you wait, the more it costs
Requirements /
Architecture
Coding Integration /
Component
Testing
System /
Acceptance
Testing
Production /
Post-Release
Source: National Institute of Standards and Technology
The cost for fixing
vulnerabilities is
30xhigher after an application has
been deployed
© Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information.
How to Scale
You can save time, money, and effort
© Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information.
What needs to be a part of the process for mobile?
● Structure a team that can integrate testing to be efficient
● Emphasize process and similar tools across teams
● Automation (both static and dynamic)
● Test early in the SDLC, with remediation recommendations built in
© Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information..
Lab Workstation
Analyst-driven mobile app security testing kit
© Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information.
Lab Automated
Automated app analysis with continuous integration
● Heading to RSA Conference? Stop by our booth # 3235 for a live demo.
● Set up a demo. Contact us at www.nowsecure.com/contact.
© Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information..
Questions?
kstrzempka@nowsecure.com
+1 312.878.1100
@kstrzemp

More Related Content

What's hot

Cybersecurity 101 for Ophthalmology & Physician Practices
Cybersecurity 101 for Ophthalmology & Physician PracticesCybersecurity 101 for Ophthalmology & Physician Practices
Cybersecurity 101 for Ophthalmology & Physician Practices
Ravi D. Goel, MD
 

What's hot (20)

85% of App Store Apps Fail OWASP Mobile Top 10: Are you exposed?
85% of App Store Apps Fail OWASP Mobile Top 10: Are you exposed?85% of App Store Apps Fail OWASP Mobile Top 10: Are you exposed?
85% of App Store Apps Fail OWASP Mobile Top 10: Are you exposed?
 
Mobile Apps & Connected Healthcare: Managing 3rd-Party Mobile App Risk
Mobile Apps & Connected Healthcare: Managing 3rd-Party Mobile App RiskMobile Apps & Connected Healthcare: Managing 3rd-Party Mobile App Risk
Mobile Apps & Connected Healthcare: Managing 3rd-Party Mobile App Risk
 
Top OSS for Mobile AppSec Testing: The Latest on R2 and FRIDA
Top OSS for Mobile AppSec Testing: The Latest on R2 and FRIDATop OSS for Mobile AppSec Testing: The Latest on R2 and FRIDA
Top OSS for Mobile AppSec Testing: The Latest on R2 and FRIDA
 
Cybersecurity Fundamentals for Bar Associations
Cybersecurity Fundamentals for Bar AssociationsCybersecurity Fundamentals for Bar Associations
Cybersecurity Fundamentals for Bar Associations
 
What attackers know about your mobile apps that you don’t: Banking & FinTech
What attackers know about your mobile apps that you don’t: Banking & FinTechWhat attackers know about your mobile apps that you don’t: Banking & FinTech
What attackers know about your mobile apps that you don’t: Banking & FinTech
 
Mobile App Crashworthiness - Securing Vehicle-to-Device (V2D) Interfaces and ...
Mobile App Crashworthiness - Securing Vehicle-to-Device (V2D) Interfaces and ...Mobile App Crashworthiness - Securing Vehicle-to-Device (V2D) Interfaces and ...
Mobile App Crashworthiness - Securing Vehicle-to-Device (V2D) Interfaces and ...
 
Pegasus Spyware - What You Need to Know
Pegasus Spyware - What You Need to KnowPegasus Spyware - What You Need to Know
Pegasus Spyware - What You Need to Know
 
Webinar: Stopping evasive malware - how a cloud sandbox array works
Webinar: Stopping evasive malware - how a cloud sandbox array worksWebinar: Stopping evasive malware - how a cloud sandbox array works
Webinar: Stopping evasive malware - how a cloud sandbox array works
 
Splunk Discovery Day Dubai 2017 - Security Keynote
Splunk Discovery Day Dubai 2017 - Security KeynoteSplunk Discovery Day Dubai 2017 - Security Keynote
Splunk Discovery Day Dubai 2017 - Security Keynote
 
Lookout pegasus-android-technical-analysis
Lookout pegasus-android-technical-analysisLookout pegasus-android-technical-analysis
Lookout pegasus-android-technical-analysis
 
Add Security Testing Tools to Your Delivery Pipeline
Add Security Testing Tools to Your Delivery PipelineAdd Security Testing Tools to Your Delivery Pipeline
Add Security Testing Tools to Your Delivery Pipeline
 
Mobile Security - 2015 Wrap-up and 2016 Predictions
Mobile Security - 2015 Wrap-up and 2016 PredictionsMobile Security - 2015 Wrap-up and 2016 Predictions
Mobile Security - 2015 Wrap-up and 2016 Predictions
 
A day in the life of a pentester
A day in the life of a pentesterA day in the life of a pentester
A day in the life of a pentester
 
Using Deception to Detect and Profile Hidden Threats
Using Deception to Detect and Profile Hidden ThreatsUsing Deception to Detect and Profile Hidden Threats
Using Deception to Detect and Profile Hidden Threats
 
Mobile Security: 2016 Wrap-Up and 2017 Predictions
Mobile Security: 2016 Wrap-Up and 2017 PredictionsMobile Security: 2016 Wrap-Up and 2017 Predictions
Mobile Security: 2016 Wrap-Up and 2017 Predictions
 
Splunk Discovery Dusseldorf: September 2017 - Security Session
Splunk Discovery Dusseldorf: September 2017 - Security SessionSplunk Discovery Dusseldorf: September 2017 - Security Session
Splunk Discovery Dusseldorf: September 2017 - Security Session
 
SplunkLive! London Enterprise Security & UBA
SplunkLive! London Enterprise Security & UBASplunkLive! London Enterprise Security & UBA
SplunkLive! London Enterprise Security & UBA
 
Deception in Cyber Security (League of Women in Cyber Security)
Deception in Cyber Security (League of Women in Cyber Security)Deception in Cyber Security (League of Women in Cyber Security)
Deception in Cyber Security (League of Women in Cyber Security)
 
Cybersecurity 101 for Ophthalmology & Physician Practices
Cybersecurity 101 for Ophthalmology & Physician PracticesCybersecurity 101 for Ophthalmology & Physician Practices
Cybersecurity 101 for Ophthalmology & Physician Practices
 
The Threat Landscape in the Era of Directed Attacks - Webinar
The Threat Landscape in the Era of Directed Attacks - Webinar The Threat Landscape in the Era of Directed Attacks - Webinar
The Threat Landscape in the Era of Directed Attacks - Webinar
 

Viewers also liked

Gursev kalra _mobile_application_security_testing - ClubHack2009
Gursev kalra _mobile_application_security_testing - ClubHack2009Gursev kalra _mobile_application_security_testing - ClubHack2009
Gursev kalra _mobile_application_security_testing - ClubHack2009
ClubHack
 
Security Testing Mobile Applications
Security Testing Mobile ApplicationsSecurity Testing Mobile Applications
Security Testing Mobile Applications
Denim Group
 
Security testing
Security testingSecurity testing
Security testing
baskar p
 

Viewers also liked (13)

Cybersecurity Best Practices in Financial Services
Cybersecurity Best Practices in Financial ServicesCybersecurity Best Practices in Financial Services
Cybersecurity Best Practices in Financial Services
 
Mobile Apps Security Testing -1
Mobile Apps Security Testing -1Mobile Apps Security Testing -1
Mobile Apps Security Testing -1
 
Gursev kalra _mobile_application_security_testing - ClubHack2009
Gursev kalra _mobile_application_security_testing - ClubHack2009Gursev kalra _mobile_application_security_testing - ClubHack2009
Gursev kalra _mobile_application_security_testing - ClubHack2009
 
Mobile application security – effective methodology, efficient testing! hem...
Mobile application security – effective methodology, efficient testing!   hem...Mobile application security – effective methodology, efficient testing!   hem...
Mobile application security – effective methodology, efficient testing! hem...
 
Web and Mobile Application Security
Web and Mobile Application SecurityWeb and Mobile Application Security
Web and Mobile Application Security
 
Basic Guide For Mobile Application Testing
Basic Guide For Mobile Application TestingBasic Guide For Mobile Application Testing
Basic Guide For Mobile Application Testing
 
Security Testing Mobile Applications
Security Testing Mobile ApplicationsSecurity Testing Mobile Applications
Security Testing Mobile Applications
 
The curious case of mobile app security.pptx
The curious case of mobile app security.pptxThe curious case of mobile app security.pptx
The curious case of mobile app security.pptx
 
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.com
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.comMobile Application Security Testing, Testing for Mobility App | www.idexcel.com
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.com
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application Security
 
Mobile Application Security Testing (Static Code Analysis) of Android App
Mobile Application Security Testing (Static Code Analysis) of Android AppMobile Application Security Testing (Static Code Analysis) of Android App
Mobile Application Security Testing (Static Code Analysis) of Android App
 
Security testing
Security testingSecurity testing
Security testing
 
Nullcon Goa 2016 - Automated Mobile Application Security Testing with Mobile ...
Nullcon Goa 2016 - Automated Mobile Application Security Testing with Mobile ...Nullcon Goa 2016 - Automated Mobile Application Security Testing with Mobile ...
Nullcon Goa 2016 - Automated Mobile Application Security Testing with Mobile ...
 

Similar to How to scale mobile application security testing

SplunkLive! Zurich 2018: Use Splunk for Incident Response, Orchestration and ...
SplunkLive! Zurich 2018: Use Splunk for Incident Response, Orchestration and ...SplunkLive! Zurich 2018: Use Splunk for Incident Response, Orchestration and ...
SplunkLive! Zurich 2018: Use Splunk for Incident Response, Orchestration and ...
Splunk
 

Similar to How to scale mobile application security testing (20)

Next-level mobile app security: A programmatic approach
Next-level mobile app security: A programmatic approachNext-level mobile app security: A programmatic approach
Next-level mobile app security: A programmatic approach
 
Vetting Mobile Apps for Corporate Use: Security Essentials
Vetting Mobile Apps for Corporate Use: Security EssentialsVetting Mobile Apps for Corporate Use: Security Essentials
Vetting Mobile Apps for Corporate Use: Security Essentials
 
Add Security Testing Tools to Your Delivery Pipeline
Add Security Testing Tools to Your Delivery PipelineAdd Security Testing Tools to Your Delivery Pipeline
Add Security Testing Tools to Your Delivery Pipeline
 
OWASP Mobile Top 10
OWASP Mobile Top 10OWASP Mobile Top 10
OWASP Mobile Top 10
 
Cutting out the middleman: Man-in-the-middle attacks and prevention for mobil...
Cutting out the middleman: Man-in-the-middle attacks and prevention for mobil...Cutting out the middleman: Man-in-the-middle attacks and prevention for mobil...
Cutting out the middleman: Man-in-the-middle attacks and prevention for mobil...
 
iOS and Android security: Differences you need to know
iOS and Android security: Differences you need to knowiOS and Android security: Differences you need to know
iOS and Android security: Differences you need to know
 
Seven Steps to Pragmatic Mobile Testing
Seven Steps to Pragmatic Mobile TestingSeven Steps to Pragmatic Mobile Testing
Seven Steps to Pragmatic Mobile Testing
 
CASE STUDY - Ironclad Messaging & Secure App Dev for Regulated Industries
CASE STUDY - Ironclad Messaging & Secure App Dev for Regulated IndustriesCASE STUDY - Ironclad Messaging & Secure App Dev for Regulated Industries
CASE STUDY - Ironclad Messaging & Secure App Dev for Regulated Industries
 
Webinar: How to Load Test for Your Mobile Peak
Webinar: How to Load Test for Your Mobile PeakWebinar: How to Load Test for Your Mobile Peak
Webinar: How to Load Test for Your Mobile Peak
 
3 tips to increase mobile test coverage
3 tips to increase mobile test coverage3 tips to increase mobile test coverage
3 tips to increase mobile test coverage
 
Application Security - Making It Work
Application Security - Making It WorkApplication Security - Making It Work
Application Security - Making It Work
 
Running a High-Efficiency, High-Visibility Application Security Program with...
Running a High-Efficiency, High-Visibility Application Security Program with...Running a High-Efficiency, High-Visibility Application Security Program with...
Running a High-Efficiency, High-Visibility Application Security Program with...
 
ThreadFix and SD Elements Unifying Security Requirements and Vulnerability Ma...
ThreadFix and SD Elements Unifying Security Requirements and Vulnerability Ma...ThreadFix and SD Elements Unifying Security Requirements and Vulnerability Ma...
ThreadFix and SD Elements Unifying Security Requirements and Vulnerability Ma...
 
How Healthcare CISOs Can Secure Mobile Devices
How Healthcare CISOs Can Secure Mobile DevicesHow Healthcare CISOs Can Secure Mobile Devices
How Healthcare CISOs Can Secure Mobile Devices
 
Optimizing Your Application Security Program with Netsparker and ThreadFix
Optimizing Your Application Security Program with Netsparker and ThreadFixOptimizing Your Application Security Program with Netsparker and ThreadFix
Optimizing Your Application Security Program with Netsparker and ThreadFix
 
Test Masters 2016 Spring Conference
Test Masters 2016 Spring ConferenceTest Masters 2016 Spring Conference
Test Masters 2016 Spring Conference
 
The Mobile Testing Checklist
The Mobile Testing ChecklistThe Mobile Testing Checklist
The Mobile Testing Checklist
 
You Can't Stop The Breach Without Prevention And Detection
You Can't Stop The Breach Without Prevention And DetectionYou Can't Stop The Breach Without Prevention And Detection
You Can't Stop The Breach Without Prevention And Detection
 
Creating Trust for the Internet of Things
Creating Trust for the Internet of ThingsCreating Trust for the Internet of Things
Creating Trust for the Internet of Things
 
SplunkLive! Zurich 2018: Use Splunk for Incident Response, Orchestration and ...
SplunkLive! Zurich 2018: Use Splunk for Incident Response, Orchestration and ...SplunkLive! Zurich 2018: Use Splunk for Incident Response, Orchestration and ...
SplunkLive! Zurich 2018: Use Splunk for Incident Response, Orchestration and ...
 

More from NowSecure

More from NowSecure (19)

iOS recon with Radare2
iOS recon with Radare2iOS recon with Radare2
iOS recon with Radare2
 
From Tangled Mess to Organized Flow: A Mobile DevSecOps Reference Architecture
From Tangled Mess to Organized Flow: A Mobile DevSecOps Reference ArchitectureFrom Tangled Mess to Organized Flow: A Mobile DevSecOps Reference Architecture
From Tangled Mess to Organized Flow: A Mobile DevSecOps Reference Architecture
 
Android Q & iOS 13 Privacy Enhancements
Android Q & iOS 13 Privacy EnhancementsAndroid Q & iOS 13 Privacy Enhancements
Android Q & iOS 13 Privacy Enhancements
 
Debunking the Top 5 Myths About Mobile AppSec
Debunking the Top 5 Myths About Mobile AppSecDebunking the Top 5 Myths About Mobile AppSec
Debunking the Top 5 Myths About Mobile AppSec
 
OSS Tools: Creating a Reverse Engineering Plug-in for r2frida
OSS Tools: Creating a Reverse Engineering Plug-in for r2fridaOSS Tools: Creating a Reverse Engineering Plug-in for r2frida
OSS Tools: Creating a Reverse Engineering Plug-in for r2frida
 
Building a Mobile App Pen Testing Blueprint
Building a Mobile App Pen Testing BlueprintBuilding a Mobile App Pen Testing Blueprint
Building a Mobile App Pen Testing Blueprint
 
Mobile App Security Predictions 2019
Mobile App Security Predictions 2019Mobile App Security Predictions 2019
Mobile App Security Predictions 2019
 
Jeff's Journey: Best Practices for Securing Mobile App DevOps
Jeff's Journey: Best Practices for Securing Mobile App DevOpsJeff's Journey: Best Practices for Securing Mobile App DevOps
Jeff's Journey: Best Practices for Securing Mobile App DevOps
 
A Risk-Based Mobile App Security Testing Strategy
A Risk-Based Mobile App Security Testing StrategyA Risk-Based Mobile App Security Testing Strategy
A Risk-Based Mobile App Security Testing Strategy
 
Android P Security Updates: What You Need to Know
Android P Security Updates: What You Need to KnowAndroid P Security Updates: What You Need to Know
Android P Security Updates: What You Need to Know
 
iOS 12 Preview - What You Need To Know
iOS 12 Preview - What You Need To KnowiOS 12 Preview - What You Need To Know
iOS 12 Preview - What You Need To Know
 
5 Tips for Agile Mobile App Security Testing
5 Tips for Agile Mobile App Security Testing5 Tips for Agile Mobile App Security Testing
5 Tips for Agile Mobile App Security Testing
 
Solving for Compliance: Mobile app security for banking and financial services
Solving for Compliance: Mobile app security for banking and financial servicesSolving for Compliance: Mobile app security for banking and financial services
Solving for Compliance: Mobile app security for banking and financial services
 
Leaky Mobile Apps: What You Need to Know
Leaky Mobile Apps: What You Need to KnowLeaky Mobile Apps: What You Need to Know
Leaky Mobile Apps: What You Need to Know
 
Delivering secure mobile financial services (MFS) - "Frictionless" vs diligence
Delivering secure mobile financial services (MFS) - "Frictionless" vs diligenceDelivering secure mobile financial services (MFS) - "Frictionless" vs diligence
Delivering secure mobile financial services (MFS) - "Frictionless" vs diligence
 
How Android and iOS Security Enhancements Complicate Threat Detection
How Android and iOS Security Enhancements Complicate Threat DetectionHow Android and iOS Security Enhancements Complicate Threat Detection
How Android and iOS Security Enhancements Complicate Threat Detection
 
Mobile Penetration Testing: Episode III - Attack of the Code
Mobile Penetration Testing: Episode III - Attack of the CodeMobile Penetration Testing: Episode III - Attack of the Code
Mobile Penetration Testing: Episode III - Attack of the Code
 
Mobile Penetration Testing: Episode II - Attack of the Code
Mobile Penetration Testing: Episode II - Attack of the CodeMobile Penetration Testing: Episode II - Attack of the Code
Mobile Penetration Testing: Episode II - Attack of the Code
 
Mobile Penetration Testing: Episode 1 - The Forensic Menace
Mobile Penetration Testing: Episode 1 - The Forensic MenaceMobile Penetration Testing: Episode 1 - The Forensic Menace
Mobile Penetration Testing: Episode 1 - The Forensic Menace
 

Recently uploaded

Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)
Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)
Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)
Cara Menggugurkan Kandungan 087776558899
 

Recently uploaded (6)

Mobile Application Development-Android and It’s Tools
Mobile Application Development-Android and It’s ToolsMobile Application Development-Android and It’s Tools
Mobile Application Development-Android and It’s Tools
 
Mobile Application Development-Components and Layouts
Mobile Application Development-Components and LayoutsMobile Application Development-Components and Layouts
Mobile Application Development-Components and Layouts
 
Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)
Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)
Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)
 
Android Application Components with Implementation & Examples
Android Application Components with Implementation & ExamplesAndroid Application Components with Implementation & Examples
Android Application Components with Implementation & Examples
 
Mobile App Penetration Testing Bsides312
Mobile App Penetration Testing Bsides312Mobile App Penetration Testing Bsides312
Mobile App Penetration Testing Bsides312
 
Satara Call girl escort *74796//13122* Call me punam call girls 24*7hour avai...
Satara Call girl escort *74796//13122* Call me punam call girls 24*7hour avai...Satara Call girl escort *74796//13122* Call me punam call girls 24*7hour avai...
Satara Call girl escort *74796//13122* Call me punam call girls 24*7hour avai...
 

How to scale mobile application security testing

  • 1. © Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information. How to Scale Mobile Application Security Testing
  • 2. © Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information. Connect with NowSecure Connect with us on Twitter @NowSecureMobile / #SecureTalks — Learn more at https://nowsecure.com
  • 3. Katie Strzempka Services © Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information. ● Author of IPhone and iOS Forensics ● Masters in Cyber Forensics and Bachelors of Science in Computer Technology from Purdue University ● @kstrzemp
  • 4. © Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information. Contents ● 2016 NowSecure Mobile Security Report ● The Challenges Teams Face ● How You Can Scale
  • 5. © Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information. 2016 NowSecure Mobile Security Report Released last week
  • 6. © Copyright 2015 NowSecure, Inc. All Rights Reserved. Proprietary information. 400K APPS We tested
  • 7. © Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information. 25%of Android apps have at least one high risk security or privacy flaw
  • 8. © Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information. Percentage of Android Apps with Security Issues Sensitive Data Leak Issues Network Issues File System Issues
  • 9. © Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information. Business apps: High risk issues exist within each app category 3x more likely to leak login credentials more likely to leak login credentials or email address 4x1.5xmore likely to include a high risk vulnerability Gaming apps: Social apps:
  • 10. © Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information. 82%of devices tested by the Vulnerability Test Suite for Android had at least one of 25 vulnerabilities
  • 11. © Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information. The Challenges Teams face a variety of challenges with security in the SDLC
  • 12. © Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information. Teams are overwhelmed with security testing 100+Many enterprises have more than 100 unique, internal apps
  • 13. © Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information. Source code analysis has too many false positives ● Testing reports more false positives instead of identifying actual issues ● Static only ● Misses key tests such as insecure data storage or authentication issues
  • 14. © Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information. Teams lack a process for mobile ● App testing is repetitive and takes time to manually set up testing environments ● Inconsistent methods and results across team members
  • 15. © Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information.. Teams are finding vulnerabilities too late in the SDLC The back-and-forth between developers and analysts wastes time and money
  • 16. © Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information. The longer you wait, the more it costs Requirements / Architecture Coding Integration / Component Testing System / Acceptance Testing Production / Post-Release Source: National Institute of Standards and Technology The cost for fixing vulnerabilities is 30xhigher after an application has been deployed
  • 17. © Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information. How to Scale You can save time, money, and effort
  • 18. © Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information. What needs to be a part of the process for mobile? ● Structure a team that can integrate testing to be efficient ● Emphasize process and similar tools across teams ● Automation (both static and dynamic) ● Test early in the SDLC, with remediation recommendations built in
  • 19. © Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information.. Lab Workstation Analyst-driven mobile app security testing kit
  • 20. © Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information. Lab Automated Automated app analysis with continuous integration ● Heading to RSA Conference? Stop by our booth # 3235 for a live demo. ● Set up a demo. Contact us at www.nowsecure.com/contact.
  • 21. © Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information.. Questions? kstrzempka@nowsecure.com +1 312.878.1100 @kstrzemp