SlideShare a Scribd company logo
Security & data privacy by design for new
applications development
Philippe Cornette
Partner
| 2
DigiTribe is an IT & business Consulting company
specialized in Digital enablement & execution
30+ Hands-on Experts & former C-level managers
3 Tribes: Cybersecurity, Digital enablement, Data Science
Customers: Large & Mid-sized organizations & Fintech
Mission
Bring innovation, relevant digital practices and start-
up mindset to large corporate organizations
| 32018 | DigiTribe | Confidential
63% of data breaches linked to a third-party component
56% of companies have experienced a 3rd-party breach in 2017
Data security laws and regulators increasingly require Banks & Insurance companies to perform sufficient
oversight of their third-party vendor’s data security protocols
By 2020, 75% of Fortune Global 500 companies will treat vendor risk management as a Board-level
initiative(Source: Gartner)
IOT, Open Banking APIs under PSD2, outsourcing, … and the FINTECHs create new risks & opportunities
EBA & NBB
“While staying behind and ignoring fintech is a real risk for banks, they should still tread carefully when
implementing fintech or, of course, any change. Banks should fully take into account the EBA’s 2018 “report on
the prudential risks and opportunities arising for institutions from fintech” when considering, implementing or
using fintech technologies, in the sense that they should take the necessary precautions to avoid, mitigate or
reduce certain risks.”
Why Financial institutions are increasing the number of
Information Security Due Diligences / TPSA ?
| 42018 | DigiTribe | Confidential
| 52018 | DigiTribe | Confidential
Reduce the risk of information security incidents
Ensure that their offerings are secure and dependable
Gain active assurance that suppliers are protecting their data
Comply with legal and policy requirements
Enable informed decision making when selecting new suppliers
What do your customers expect ?
| 62018 | DigiTribe | Confidential
Entry ticket for new contracts (Third-party assessment,
due diligence requirements)
Compliance (e.g. GDPR, NIS, PCI DSS,…)
Key differentiator / marketing advantages
Reduce costs of fixing bugs
Why security by design is important for the
Fintechs
| 72018 | DigiTribe | Confidential
Defense in Depth
| 82018 | DigiTribe | Confidential
System layers where security may be compromised
| 92018 | DigiTribe | Confidential
Software Security requirements
Security by Design principles
• Secure the weakest link
• Minimize attack surface area
• Establish secure defaults
• Principle of Least privilege
• Principle of Defense in depth
• Fail securely
• Don’t trust services
• Separation of duties
• Avoid security by obscurity
• Keep security simple
• Fix security issues correctly
• Promote privacy | 10
| 11
Secure SDLC
| 122018 | DigiTribe | Confidential
Requirements
• Do you gather security objectives?
• How are they mapped to the rest of the design process?
Design
• Does your team conduct security architecture and design reviews?
• Do you use checklists to drive the process? Do you revise them over time?
• Does your team create threat models to understand and prioritize risk?
Coding
• Does your team use a formalized set of security coding best practices?
• What type of code scanning tools do you use?
• Do you perform code reviews against security best practices?
Testing
• Does your team conduct 3rd party or internal penetration tests?
• Are your testers QA trained on the latest attack trends and test techniques?
• Do you use security testing tools?
Questions to ask yourself
Secure coding
Secure Coding
Secure software does not happen by itself. It requires consistently applied
methodologies across the organization
Securing coding is the practice of developing computer software in a way that
guards against the accidental introduction of security vulnerabilities. Defects, bugs
and logic flaws are consistently the primary cause of commonly exploited software
vulnerabilities.
This includes acceptance tests for third-parties code (e.g. : libraries downloaded
from internet)
| 152018 | DigiTribe | Confidential
The importance of knowing how to code with style… guide
| 162018 | DigiTribe | Confidential
Coding Standards Benefits
• Code Clarity/Easier to Understand
• Easier to Maintain
• Reduces Bugs
• Simplifies Code Reviews
• Shorter learning curve for new team members
• Consistency across large and distributed teams
• Comply with internal or regulatory quality initiatives
Business Benefits
• Improve software quality
• Accelerate time to market
• Enhance customer satisfaction
• Reduce long term cost
• Improve productivity
Coding Style guide
| 182018 | DigiTribe | Confidential
Component
• The average application consists of 106 open source components.
Vulnerability
• A typical application contains 23 known vulnerabilities.
License
• Most applications indicate at least 8 GPL licensed components.
Architecture
• Many components in use are old, unsupported, and unpopular.
The need for open source security management became front-page news in 2017
owing to a major data breach at Equifax (Consumer credit rating agency).
The breach (due to a Apache Struts security hole) has compromised the information
of over 148 million U.S. consumers, nearly 700,000 U.K. residents, and more than
19,000 Canadian customers.
Open Source Security
Open source, Libraries and Frameworks: Best Practices
• Use libraries and frameworks from trusted sources actively maintained and
widely used.
• Create and maintain an inventory catalogue of all the third party libraries.
• Proactively keep libraries and components up to date; use tools, like OWASP
Dependency Check, Retire.JS, to identify project dependencies and check if
there are known, publicly disclosed vulnerabilities for all third party code.
• Reduce the attack surface by encapsulating the library and expose only the
required behaviour into your software.
• Manage your technical debt
• Create a concise Open Source Security Policy
| 202018 | DigiTribe | Confidential
| 212018 | DigiTribe | Confidential
Risk, Cybersecurity & GDPR assessment & gap analysis
(ISO27001, NIST, SWIFT CSP, GDPR,…)
IT Strategy, architecture and governance
Cybersecurity strategy, roadmap & implementation
CISO & DPO as a service
Support to answer TPSA
Third-party assessment of your suppliers
Partnership on solutions with our customers
Second opinion as a service
What can Digitribe do for you ?
To contact us
www.digitribe.be philippe.cornette@digitribe.be +32 478403012
| 222018 | DigiTribe | Confidential

More Related Content

What's hot

Cybersecurity Summit AHR20 NIST framework Cimetrics
Cybersecurity Summit AHR20 NIST framework CimetricsCybersecurity Summit AHR20 NIST framework Cimetrics
Cybersecurity Summit AHR20 NIST framework Cimetrics
Cimetrics Inc
 
Lowered uncertainty of an anti-theft product to secure mobile end points, for...
Lowered uncertainty of an anti-theft product to secure mobile end points, for...Lowered uncertainty of an anti-theft product to secure mobile end points, for...
Lowered uncertainty of an anti-theft product to secure mobile end points, for...Mindtree Ltd.
 
2015 - Data Security Solutions @Dienas Bizness Exigen IBM - Business Data Pro...
2015 - Data Security Solutions @Dienas Bizness Exigen IBM - Business Data Pro...2015 - Data Security Solutions @Dienas Bizness Exigen IBM - Business Data Pro...
2015 - Data Security Solutions @Dienas Bizness Exigen IBM - Business Data Pro...
Andris Soroka
 
CIO Review - Top 20 CyberSecurity
CIO Review - Top 20 CyberSecurityCIO Review - Top 20 CyberSecurity
CIO Review - Top 20 CyberSecurityBob Guimarin
 
Cybersecurity Summit AHR20 Protect Cimetrics
Cybersecurity Summit AHR20 Protect CimetricsCybersecurity Summit AHR20 Protect Cimetrics
Cybersecurity Summit AHR20 Protect Cimetrics
Cimetrics Inc
 
Understanding IoT Security: How to Quantify Security Risk of IoT Technologies
Understanding IoT Security: How to Quantify Security Risk of IoT TechnologiesUnderstanding IoT Security: How to Quantify Security Risk of IoT Technologies
Understanding IoT Security: How to Quantify Security Risk of IoT Technologies
Denim Group
 
Securing your supply chain & vicarious liability (cyber security)
Securing your supply chain & vicarious liability (cyber security)Securing your supply chain & vicarious liability (cyber security)
Securing your supply chain & vicarious liability (cyber security)
Ollie Whitehouse
 
IoT security compliance checklist
IoT security compliance checklist IoT security compliance checklist
IoT security compliance checklist
PriyaNemade
 
Cyber Security Maturity Assessment
 Cyber Security Maturity Assessment Cyber Security Maturity Assessment
Cyber Security Maturity Assessment
Doreen Loeber
 
Driving IT Transformation with Agile Analytics
Driving IT Transformation with Agile AnalyticsDriving IT Transformation with Agile Analytics
Driving IT Transformation with Agile Analytics
Bit Stew Systems
 
Internet of things security challenges
Internet of things security challengesInternet of things security challenges
Internet of things security challenges
Hadi Fadlallah
 
What has changed in Corporate Cybersecurity?
What has changed in Corporate Cybersecurity?What has changed in Corporate Cybersecurity?
What has changed in Corporate Cybersecurity?
Nixu Corporation
 
Open Source Insight: GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...
Open Source Insight:GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...Open Source Insight:GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...
Open Source Insight: GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...
Black Duck by Synopsys
 
Solving Industrial Data Integration with Machine Intelligence
Solving Industrial Data Integration with Machine IntelligenceSolving Industrial Data Integration with Machine Intelligence
Solving Industrial Data Integration with Machine Intelligence
Bit Stew Systems
 
Iot cyber security
Iot cyber securityIot cyber security
Iot cyber security
sajid mehmood
 
How digital technology is shaping the future of marthab
How digital technology is shaping the future of marthabHow digital technology is shaping the future of marthab
How digital technology is shaping the future of marthab
Argelich Networks
 
Cybersecurity for Field IIoT Networks
Cybersecurity for Field IIoT NetworksCybersecurity for Field IIoT Networks
Cybersecurity for Field IIoT Networks
Yokogawa1
 
CWIN17 Rome / A holostic cybersecurity
CWIN17 Rome / A holostic cybersecurityCWIN17 Rome / A holostic cybersecurity
CWIN17 Rome / A holostic cybersecurity
Capgemini
 

What's hot (18)

Cybersecurity Summit AHR20 NIST framework Cimetrics
Cybersecurity Summit AHR20 NIST framework CimetricsCybersecurity Summit AHR20 NIST framework Cimetrics
Cybersecurity Summit AHR20 NIST framework Cimetrics
 
Lowered uncertainty of an anti-theft product to secure mobile end points, for...
Lowered uncertainty of an anti-theft product to secure mobile end points, for...Lowered uncertainty of an anti-theft product to secure mobile end points, for...
Lowered uncertainty of an anti-theft product to secure mobile end points, for...
 
2015 - Data Security Solutions @Dienas Bizness Exigen IBM - Business Data Pro...
2015 - Data Security Solutions @Dienas Bizness Exigen IBM - Business Data Pro...2015 - Data Security Solutions @Dienas Bizness Exigen IBM - Business Data Pro...
2015 - Data Security Solutions @Dienas Bizness Exigen IBM - Business Data Pro...
 
CIO Review - Top 20 CyberSecurity
CIO Review - Top 20 CyberSecurityCIO Review - Top 20 CyberSecurity
CIO Review - Top 20 CyberSecurity
 
Cybersecurity Summit AHR20 Protect Cimetrics
Cybersecurity Summit AHR20 Protect CimetricsCybersecurity Summit AHR20 Protect Cimetrics
Cybersecurity Summit AHR20 Protect Cimetrics
 
Understanding IoT Security: How to Quantify Security Risk of IoT Technologies
Understanding IoT Security: How to Quantify Security Risk of IoT TechnologiesUnderstanding IoT Security: How to Quantify Security Risk of IoT Technologies
Understanding IoT Security: How to Quantify Security Risk of IoT Technologies
 
Securing your supply chain & vicarious liability (cyber security)
Securing your supply chain & vicarious liability (cyber security)Securing your supply chain & vicarious liability (cyber security)
Securing your supply chain & vicarious liability (cyber security)
 
IoT security compliance checklist
IoT security compliance checklist IoT security compliance checklist
IoT security compliance checklist
 
Cyber Security Maturity Assessment
 Cyber Security Maturity Assessment Cyber Security Maturity Assessment
Cyber Security Maturity Assessment
 
Driving IT Transformation with Agile Analytics
Driving IT Transformation with Agile AnalyticsDriving IT Transformation with Agile Analytics
Driving IT Transformation with Agile Analytics
 
Internet of things security challenges
Internet of things security challengesInternet of things security challenges
Internet of things security challenges
 
What has changed in Corporate Cybersecurity?
What has changed in Corporate Cybersecurity?What has changed in Corporate Cybersecurity?
What has changed in Corporate Cybersecurity?
 
Open Source Insight: GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...
Open Source Insight:GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...Open Source Insight:GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...
Open Source Insight: GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...
 
Solving Industrial Data Integration with Machine Intelligence
Solving Industrial Data Integration with Machine IntelligenceSolving Industrial Data Integration with Machine Intelligence
Solving Industrial Data Integration with Machine Intelligence
 
Iot cyber security
Iot cyber securityIot cyber security
Iot cyber security
 
How digital technology is shaping the future of marthab
How digital technology is shaping the future of marthabHow digital technology is shaping the future of marthab
How digital technology is shaping the future of marthab
 
Cybersecurity for Field IIoT Networks
Cybersecurity for Field IIoT NetworksCybersecurity for Field IIoT Networks
Cybersecurity for Field IIoT Networks
 
CWIN17 Rome / A holostic cybersecurity
CWIN17 Rome / A holostic cybersecurityCWIN17 Rome / A holostic cybersecurity
CWIN17 Rome / A holostic cybersecurity
 

Similar to Fintech Belgium - MeetUp on The Right Tech for your FinTech - Philippe Cornette - Digitribe - 18-12-18

Aalto cyber-10.4.18
Aalto cyber-10.4.18Aalto cyber-10.4.18
Aalto cyber-10.4.18
japijapi
 
Robust anti-theft technology driving customer preference for a leading manufa...
Robust anti-theft technology driving customer preference for a leading manufa...Robust anti-theft technology driving customer preference for a leading manufa...
Robust anti-theft technology driving customer preference for a leading manufa...
Mindtree Ltd.
 
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoftHow Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
OSIsoft, LLC
 
Safeguarding customer and financial data in analytics and machine learning
Safeguarding customer and financial data in analytics and machine learningSafeguarding customer and financial data in analytics and machine learning
Safeguarding customer and financial data in analytics and machine learning
Ulf Mattsson
 
Ivanti Webinar - How to Win Budget and Influence Non-InfoSec Stakeholders
Ivanti Webinar - How to Win Budget and Influence Non-InfoSec StakeholdersIvanti Webinar - How to Win Budget and Influence Non-InfoSec Stakeholders
Ivanti Webinar - How to Win Budget and Influence Non-InfoSec Stakeholders
Ivanti
 
SecureWeb3 - Developing a Comprehensive Cybersecurity Strategy for the Decent...
SecureWeb3 - Developing a Comprehensive Cybersecurity Strategy for the Decent...SecureWeb3 - Developing a Comprehensive Cybersecurity Strategy for the Decent...
SecureWeb3 - Developing a Comprehensive Cybersecurity Strategy for the Decent...
Prasanna Hegde
 
Accenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber ResilienceAccenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber Resilience
accenture
 
DACHNUG50 BigFix NIS2.pdf
DACHNUG50 BigFix NIS2.pdfDACHNUG50 BigFix NIS2.pdf
DACHNUG50 BigFix NIS2.pdf
DNUG e.V.
 
Accenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber ResilienceAccenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber Resilience
accenture
 
Security Implications of Accenture Technology Vision 2015 - Executive Report
Security Implications of Accenture Technology Vision 2015 - Executive ReportSecurity Implications of Accenture Technology Vision 2015 - Executive Report
Security Implications of Accenture Technology Vision 2015 - Executive Report
Accenture Technology
 
Secure and Compliant Data Management in FinTech Applications
Secure and Compliant Data Management in FinTech ApplicationsSecure and Compliant Data Management in FinTech Applications
Secure and Compliant Data Management in FinTech Applications
Lionel Briand
 
IBM Cloud for Financial Services Overview
IBM Cloud for Financial Services OverviewIBM Cloud for Financial Services Overview
IBM Cloud for Financial Services Overview
Suzanne Livingston
 
ISC2 Privacy-Preserving Analytics and Secure Multiparty Computation
ISC2 Privacy-Preserving Analytics and Secure Multiparty ComputationISC2 Privacy-Preserving Analytics and Secure Multiparty Computation
ISC2 Privacy-Preserving Analytics and Secure Multiparty Computation
UlfMattsson7
 
ISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloudISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloud
Ulf Mattsson
 
CompTIA powered Cybersecurity Apprenticeships
CompTIA powered Cybersecurity ApprenticeshipsCompTIA powered Cybersecurity Apprenticeships
CompTIA powered Cybersecurity Apprenticeships
Zeshan Sattar
 
MCGlobalTech Service Presentation
MCGlobalTech Service PresentationMCGlobalTech Service Presentation
MCGlobalTech Service Presentation
William McBorrough
 
MCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationMCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service Presentation
William McBorrough
 
Chris neely the future of cyber security events 3
Chris neely the future of cyber security   events 3Chris neely the future of cyber security   events 3
Chris neely the future of cyber security events 3
Redazione InnovaPuglia
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & Recommendations
Ulf Mattsson
 
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Enterprise Management Associates
 

Similar to Fintech Belgium - MeetUp on The Right Tech for your FinTech - Philippe Cornette - Digitribe - 18-12-18 (20)

Aalto cyber-10.4.18
Aalto cyber-10.4.18Aalto cyber-10.4.18
Aalto cyber-10.4.18
 
Robust anti-theft technology driving customer preference for a leading manufa...
Robust anti-theft technology driving customer preference for a leading manufa...Robust anti-theft technology driving customer preference for a leading manufa...
Robust anti-theft technology driving customer preference for a leading manufa...
 
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoftHow Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
 
Safeguarding customer and financial data in analytics and machine learning
Safeguarding customer and financial data in analytics and machine learningSafeguarding customer and financial data in analytics and machine learning
Safeguarding customer and financial data in analytics and machine learning
 
Ivanti Webinar - How to Win Budget and Influence Non-InfoSec Stakeholders
Ivanti Webinar - How to Win Budget and Influence Non-InfoSec StakeholdersIvanti Webinar - How to Win Budget and Influence Non-InfoSec Stakeholders
Ivanti Webinar - How to Win Budget and Influence Non-InfoSec Stakeholders
 
SecureWeb3 - Developing a Comprehensive Cybersecurity Strategy for the Decent...
SecureWeb3 - Developing a Comprehensive Cybersecurity Strategy for the Decent...SecureWeb3 - Developing a Comprehensive Cybersecurity Strategy for the Decent...
SecureWeb3 - Developing a Comprehensive Cybersecurity Strategy for the Decent...
 
Accenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber ResilienceAccenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber Resilience
 
DACHNUG50 BigFix NIS2.pdf
DACHNUG50 BigFix NIS2.pdfDACHNUG50 BigFix NIS2.pdf
DACHNUG50 BigFix NIS2.pdf
 
Accenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber ResilienceAccenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber Resilience
 
Security Implications of Accenture Technology Vision 2015 - Executive Report
Security Implications of Accenture Technology Vision 2015 - Executive ReportSecurity Implications of Accenture Technology Vision 2015 - Executive Report
Security Implications of Accenture Technology Vision 2015 - Executive Report
 
Secure and Compliant Data Management in FinTech Applications
Secure and Compliant Data Management in FinTech ApplicationsSecure and Compliant Data Management in FinTech Applications
Secure and Compliant Data Management in FinTech Applications
 
IBM Cloud for Financial Services Overview
IBM Cloud for Financial Services OverviewIBM Cloud for Financial Services Overview
IBM Cloud for Financial Services Overview
 
ISC2 Privacy-Preserving Analytics and Secure Multiparty Computation
ISC2 Privacy-Preserving Analytics and Secure Multiparty ComputationISC2 Privacy-Preserving Analytics and Secure Multiparty Computation
ISC2 Privacy-Preserving Analytics and Secure Multiparty Computation
 
ISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloudISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloud
 
CompTIA powered Cybersecurity Apprenticeships
CompTIA powered Cybersecurity ApprenticeshipsCompTIA powered Cybersecurity Apprenticeships
CompTIA powered Cybersecurity Apprenticeships
 
MCGlobalTech Service Presentation
MCGlobalTech Service PresentationMCGlobalTech Service Presentation
MCGlobalTech Service Presentation
 
MCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationMCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service Presentation
 
Chris neely the future of cyber security events 3
Chris neely the future of cyber security   events 3Chris neely the future of cyber security   events 3
Chris neely the future of cyber security events 3
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & Recommendations
 
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
 

More from FinTech Belgium

Webinar Exploring DORA for Fintechs - Simont Braun
Webinar Exploring DORA for Fintechs - Simont BraunWebinar Exploring DORA for Fintechs - Simont Braun
Webinar Exploring DORA for Fintechs - Simont Braun
FinTech Belgium
 
Digital Finance Summit 2024 Partners Brochure
Digital Finance Summit 2024 Partners BrochureDigital Finance Summit 2024 Partners Brochure
Digital Finance Summit 2024 Partners Brochure
FinTech Belgium
 
Fintech Belgium General Assembly and Anniversary Event 2024
Fintech Belgium General Assembly and Anniversary Event 2024Fintech Belgium General Assembly and Anniversary Event 2024
Fintech Belgium General Assembly and Anniversary Event 2024
FinTech Belgium
 
Webinar on E-Invoicing for Fintech Belgium
Webinar on E-Invoicing for Fintech BelgiumWebinar on E-Invoicing for Fintech Belgium
Webinar on E-Invoicing for Fintech Belgium
FinTech Belgium
 
06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf
06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf
06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf
FinTech Belgium
 
05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx
05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx
05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx
FinTech Belgium
 
03_Emmanuel Ndiaye_Degroof Petercam.pptx
03_Emmanuel Ndiaye_Degroof Petercam.pptx03_Emmanuel Ndiaye_Degroof Petercam.pptx
03_Emmanuel Ndiaye_Degroof Petercam.pptx
FinTech Belgium
 
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx
FinTech Belgium
 
00_Main ppt_MeetupDORA&CyberSecurity.pptx
00_Main ppt_MeetupDORA&CyberSecurity.pptx00_Main ppt_MeetupDORA&CyberSecurity.pptx
00_Main ppt_MeetupDORA&CyberSecurity.pptx
FinTech Belgium
 
Pitch Ogloba Feb 2nd 2024 .pptx
Pitch Ogloba Feb 2nd 2024           .pptxPitch Ogloba Feb 2nd 2024           .pptx
Pitch Ogloba Feb 2nd 2024 .pptx
FinTech Belgium
 
20240315 _E-Invoicing Digiteal. .pptx
20240315 _E-Invoicing Digiteal.    .pptx20240315 _E-Invoicing Digiteal.    .pptx
20240315 _E-Invoicing Digiteal. .pptx
FinTech Belgium
 
04_Gambit_Laurent Bodson. .pptx
04_Gambit_Laurent Bodson.          .pptx04_Gambit_Laurent Bodson.          .pptx
04_Gambit_Laurent Bodson. .pptx
FinTech Belgium
 
03_Discai_Dagmar Schouterden. .pdf
03_Discai_Dagmar Schouterden.       .pdf03_Discai_Dagmar Schouterden.       .pdf
03_Discai_Dagmar Schouterden. .pdf
FinTech Belgium
 
01_DLA Piper_Nicolas Kalokyris. .pptx
01_DLA Piper_Nicolas Kalokyris.    .pptx01_DLA Piper_Nicolas Kalokyris.    .pptx
01_DLA Piper_Nicolas Kalokyris. .pptx
FinTech Belgium
 
00_Main ppt_AI Act & EU AI Regulation.pptx
00_Main ppt_AI Act & EU AI Regulation.pptx00_Main ppt_AI Act & EU AI Regulation.pptx
00_Main ppt_AI Act & EU AI Regulation.pptx
FinTech Belgium
 
00_MAIN_ppt Antwerp Acceleration Day.pptx.pdf
00_MAIN_ppt Antwerp Acceleration Day.pptx.pdf00_MAIN_ppt Antwerp Acceleration Day.pptx.pdf
00_MAIN_ppt Antwerp Acceleration Day.pptx.pdf
FinTech Belgium
 
Fintech Belgium_Keynote_30012024[52].pdf
Fintech Belgium_Keynote_30012024[52].pdfFintech Belgium_Keynote_30012024[52].pdf
Fintech Belgium_Keynote_30012024[52].pdf
FinTech Belgium
 
01_Voorstelling Argenta (Antwerp Acceleration Day).pptx
01_Voorstelling Argenta (Antwerp Acceleration Day).pptx01_Voorstelling Argenta (Antwerp Acceleration Day).pptx
01_Voorstelling Argenta (Antwerp Acceleration Day).pptx
FinTech Belgium
 
AMS_04 Toon Daenen. .pptx
AMS_04 Toon Daenen.                .pptxAMS_04 Toon Daenen.                .pptx
AMS_04 Toon Daenen. .pptx
FinTech Belgium
 
AMS_03 François De Witte_. .pptx
AMS_03 François De Witte_.         .pptxAMS_03 François De Witte_.         .pptx
AMS_03 François De Witte_. .pptx
FinTech Belgium
 

More from FinTech Belgium (20)

Webinar Exploring DORA for Fintechs - Simont Braun
Webinar Exploring DORA for Fintechs - Simont BraunWebinar Exploring DORA for Fintechs - Simont Braun
Webinar Exploring DORA for Fintechs - Simont Braun
 
Digital Finance Summit 2024 Partners Brochure
Digital Finance Summit 2024 Partners BrochureDigital Finance Summit 2024 Partners Brochure
Digital Finance Summit 2024 Partners Brochure
 
Fintech Belgium General Assembly and Anniversary Event 2024
Fintech Belgium General Assembly and Anniversary Event 2024Fintech Belgium General Assembly and Anniversary Event 2024
Fintech Belgium General Assembly and Anniversary Event 2024
 
Webinar on E-Invoicing for Fintech Belgium
Webinar on E-Invoicing for Fintech BelgiumWebinar on E-Invoicing for Fintech Belgium
Webinar on E-Invoicing for Fintech Belgium
 
06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf
06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf
06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf
 
05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx
05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx
05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx
 
03_Emmanuel Ndiaye_Degroof Petercam.pptx
03_Emmanuel Ndiaye_Degroof Petercam.pptx03_Emmanuel Ndiaye_Degroof Petercam.pptx
03_Emmanuel Ndiaye_Degroof Petercam.pptx
 
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx
 
00_Main ppt_MeetupDORA&CyberSecurity.pptx
00_Main ppt_MeetupDORA&CyberSecurity.pptx00_Main ppt_MeetupDORA&CyberSecurity.pptx
00_Main ppt_MeetupDORA&CyberSecurity.pptx
 
Pitch Ogloba Feb 2nd 2024 .pptx
Pitch Ogloba Feb 2nd 2024           .pptxPitch Ogloba Feb 2nd 2024           .pptx
Pitch Ogloba Feb 2nd 2024 .pptx
 
20240315 _E-Invoicing Digiteal. .pptx
20240315 _E-Invoicing Digiteal.    .pptx20240315 _E-Invoicing Digiteal.    .pptx
20240315 _E-Invoicing Digiteal. .pptx
 
04_Gambit_Laurent Bodson. .pptx
04_Gambit_Laurent Bodson.          .pptx04_Gambit_Laurent Bodson.          .pptx
04_Gambit_Laurent Bodson. .pptx
 
03_Discai_Dagmar Schouterden. .pdf
03_Discai_Dagmar Schouterden.       .pdf03_Discai_Dagmar Schouterden.       .pdf
03_Discai_Dagmar Schouterden. .pdf
 
01_DLA Piper_Nicolas Kalokyris. .pptx
01_DLA Piper_Nicolas Kalokyris.    .pptx01_DLA Piper_Nicolas Kalokyris.    .pptx
01_DLA Piper_Nicolas Kalokyris. .pptx
 
00_Main ppt_AI Act & EU AI Regulation.pptx
00_Main ppt_AI Act & EU AI Regulation.pptx00_Main ppt_AI Act & EU AI Regulation.pptx
00_Main ppt_AI Act & EU AI Regulation.pptx
 
00_MAIN_ppt Antwerp Acceleration Day.pptx.pdf
00_MAIN_ppt Antwerp Acceleration Day.pptx.pdf00_MAIN_ppt Antwerp Acceleration Day.pptx.pdf
00_MAIN_ppt Antwerp Acceleration Day.pptx.pdf
 
Fintech Belgium_Keynote_30012024[52].pdf
Fintech Belgium_Keynote_30012024[52].pdfFintech Belgium_Keynote_30012024[52].pdf
Fintech Belgium_Keynote_30012024[52].pdf
 
01_Voorstelling Argenta (Antwerp Acceleration Day).pptx
01_Voorstelling Argenta (Antwerp Acceleration Day).pptx01_Voorstelling Argenta (Antwerp Acceleration Day).pptx
01_Voorstelling Argenta (Antwerp Acceleration Day).pptx
 
AMS_04 Toon Daenen. .pptx
AMS_04 Toon Daenen.                .pptxAMS_04 Toon Daenen.                .pptx
AMS_04 Toon Daenen. .pptx
 
AMS_03 François De Witte_. .pptx
AMS_03 François De Witte_.         .pptxAMS_03 François De Witte_.         .pptx
AMS_03 François De Witte_. .pptx
 

Recently uploaded

how to swap pi coins to foreign currency withdrawable.
how to swap pi coins to foreign currency withdrawable.how to swap pi coins to foreign currency withdrawable.
how to swap pi coins to foreign currency withdrawable.
DOT TECH
 
Summary of financial results for 1Q2024
Summary of financial  results for 1Q2024Summary of financial  results for 1Q2024
Summary of financial results for 1Q2024
InterCars
 
Scope Of Macroeconomics introduction and basic theories
Scope Of Macroeconomics introduction and basic theoriesScope Of Macroeconomics introduction and basic theories
Scope Of Macroeconomics introduction and basic theories
nomankalyar153
 
Empowering the Unbanked: The Vital Role of NBFCs in Promoting Financial Inclu...
Empowering the Unbanked: The Vital Role of NBFCs in Promoting Financial Inclu...Empowering the Unbanked: The Vital Role of NBFCs in Promoting Financial Inclu...
Empowering the Unbanked: The Vital Role of NBFCs in Promoting Financial Inclu...
Vighnesh Shashtri
 
Economics and Economic reasoning Chap. 1
Economics and Economic reasoning Chap. 1Economics and Economic reasoning Chap. 1
Economics and Economic reasoning Chap. 1
Fitri Safira
 
how can i use my minded pi coins I need some funds.
how can i use my minded pi coins I need some funds.how can i use my minded pi coins I need some funds.
how can i use my minded pi coins I need some funds.
DOT TECH
 
NO1 Uk Rohani Baba In Karachi Bangali Baba Karachi Online Amil Baba WorldWide...
NO1 Uk Rohani Baba In Karachi Bangali Baba Karachi Online Amil Baba WorldWide...NO1 Uk Rohani Baba In Karachi Bangali Baba Karachi Online Amil Baba WorldWide...
NO1 Uk Rohani Baba In Karachi Bangali Baba Karachi Online Amil Baba WorldWide...
Amil baba
 
Turin Startup Ecosystem 2024 - Ricerca sulle Startup e il Sistema dell'Innov...
Turin Startup Ecosystem 2024  - Ricerca sulle Startup e il Sistema dell'Innov...Turin Startup Ecosystem 2024  - Ricerca sulle Startup e il Sistema dell'Innov...
Turin Startup Ecosystem 2024 - Ricerca sulle Startup e il Sistema dell'Innov...
Quotidiano Piemontese
 
What website can I sell pi coins securely.
What website can I sell pi coins securely.What website can I sell pi coins securely.
What website can I sell pi coins securely.
DOT TECH
 
Falcon Invoice Discounting: Optimizing Returns with Minimal Risk
Falcon Invoice Discounting: Optimizing Returns with Minimal RiskFalcon Invoice Discounting: Optimizing Returns with Minimal Risk
Falcon Invoice Discounting: Optimizing Returns with Minimal Risk
Falcon Invoice Discounting
 
The European Unemployment Puzzle: implications from population aging
The European Unemployment Puzzle: implications from population agingThe European Unemployment Puzzle: implications from population aging
The European Unemployment Puzzle: implications from population aging
GRAPE
 
how can I sell/buy bulk pi coins securely
how can I sell/buy bulk pi coins securelyhow can I sell/buy bulk pi coins securely
how can I sell/buy bulk pi coins securely
DOT TECH
 
NO1 Uk Black Magic Specialist Expert In Sahiwal, Okara, Hafizabad, Mandi Bah...
NO1 Uk Black Magic Specialist Expert In Sahiwal, Okara, Hafizabad,  Mandi Bah...NO1 Uk Black Magic Specialist Expert In Sahiwal, Okara, Hafizabad,  Mandi Bah...
NO1 Uk Black Magic Specialist Expert In Sahiwal, Okara, Hafizabad, Mandi Bah...
Amil Baba Dawood bangali
 
US Economic Outlook - Being Decided - M Capital Group August 2021.pdf
US Economic Outlook - Being Decided - M Capital Group August 2021.pdfUS Economic Outlook - Being Decided - M Capital Group August 2021.pdf
US Economic Outlook - Being Decided - M Capital Group August 2021.pdf
pchutichetpong
 
Which Crypto to Buy Today for Short-Term in May-June 2024.pdf
Which Crypto to Buy Today for Short-Term in May-June 2024.pdfWhich Crypto to Buy Today for Short-Term in May-June 2024.pdf
Which Crypto to Buy Today for Short-Term in May-June 2024.pdf
Kezex (KZX)
 
what is the best method to sell pi coins in 2024
what is the best method to sell pi coins in 2024what is the best method to sell pi coins in 2024
what is the best method to sell pi coins in 2024
DOT TECH
 
Commercial Bank Economic Capsule - May 2024
Commercial Bank Economic Capsule - May 2024Commercial Bank Economic Capsule - May 2024
Commercial Bank Economic Capsule - May 2024
Commercial Bank of Ceylon PLC
 
Chương 6. Ancol - phenol - ether (1).pdf
Chương 6. Ancol - phenol - ether (1).pdfChương 6. Ancol - phenol - ether (1).pdf
Chương 6. Ancol - phenol - ether (1).pdf
va2132004
 
Isios-2024-Professional-Independent-Trustee-Survey.pdf
Isios-2024-Professional-Independent-Trustee-Survey.pdfIsios-2024-Professional-Independent-Trustee-Survey.pdf
Isios-2024-Professional-Independent-Trustee-Survey.pdf
Henry Tapper
 
PF-Wagner's Theory of Public Expenditure.pptx
PF-Wagner's Theory of Public Expenditure.pptxPF-Wagner's Theory of Public Expenditure.pptx
PF-Wagner's Theory of Public Expenditure.pptx
GunjanSharma28848
 

Recently uploaded (20)

how to swap pi coins to foreign currency withdrawable.
how to swap pi coins to foreign currency withdrawable.how to swap pi coins to foreign currency withdrawable.
how to swap pi coins to foreign currency withdrawable.
 
Summary of financial results for 1Q2024
Summary of financial  results for 1Q2024Summary of financial  results for 1Q2024
Summary of financial results for 1Q2024
 
Scope Of Macroeconomics introduction and basic theories
Scope Of Macroeconomics introduction and basic theoriesScope Of Macroeconomics introduction and basic theories
Scope Of Macroeconomics introduction and basic theories
 
Empowering the Unbanked: The Vital Role of NBFCs in Promoting Financial Inclu...
Empowering the Unbanked: The Vital Role of NBFCs in Promoting Financial Inclu...Empowering the Unbanked: The Vital Role of NBFCs in Promoting Financial Inclu...
Empowering the Unbanked: The Vital Role of NBFCs in Promoting Financial Inclu...
 
Economics and Economic reasoning Chap. 1
Economics and Economic reasoning Chap. 1Economics and Economic reasoning Chap. 1
Economics and Economic reasoning Chap. 1
 
how can i use my minded pi coins I need some funds.
how can i use my minded pi coins I need some funds.how can i use my minded pi coins I need some funds.
how can i use my minded pi coins I need some funds.
 
NO1 Uk Rohani Baba In Karachi Bangali Baba Karachi Online Amil Baba WorldWide...
NO1 Uk Rohani Baba In Karachi Bangali Baba Karachi Online Amil Baba WorldWide...NO1 Uk Rohani Baba In Karachi Bangali Baba Karachi Online Amil Baba WorldWide...
NO1 Uk Rohani Baba In Karachi Bangali Baba Karachi Online Amil Baba WorldWide...
 
Turin Startup Ecosystem 2024 - Ricerca sulle Startup e il Sistema dell'Innov...
Turin Startup Ecosystem 2024  - Ricerca sulle Startup e il Sistema dell'Innov...Turin Startup Ecosystem 2024  - Ricerca sulle Startup e il Sistema dell'Innov...
Turin Startup Ecosystem 2024 - Ricerca sulle Startup e il Sistema dell'Innov...
 
What website can I sell pi coins securely.
What website can I sell pi coins securely.What website can I sell pi coins securely.
What website can I sell pi coins securely.
 
Falcon Invoice Discounting: Optimizing Returns with Minimal Risk
Falcon Invoice Discounting: Optimizing Returns with Minimal RiskFalcon Invoice Discounting: Optimizing Returns with Minimal Risk
Falcon Invoice Discounting: Optimizing Returns with Minimal Risk
 
The European Unemployment Puzzle: implications from population aging
The European Unemployment Puzzle: implications from population agingThe European Unemployment Puzzle: implications from population aging
The European Unemployment Puzzle: implications from population aging
 
how can I sell/buy bulk pi coins securely
how can I sell/buy bulk pi coins securelyhow can I sell/buy bulk pi coins securely
how can I sell/buy bulk pi coins securely
 
NO1 Uk Black Magic Specialist Expert In Sahiwal, Okara, Hafizabad, Mandi Bah...
NO1 Uk Black Magic Specialist Expert In Sahiwal, Okara, Hafizabad,  Mandi Bah...NO1 Uk Black Magic Specialist Expert In Sahiwal, Okara, Hafizabad,  Mandi Bah...
NO1 Uk Black Magic Specialist Expert In Sahiwal, Okara, Hafizabad, Mandi Bah...
 
US Economic Outlook - Being Decided - M Capital Group August 2021.pdf
US Economic Outlook - Being Decided - M Capital Group August 2021.pdfUS Economic Outlook - Being Decided - M Capital Group August 2021.pdf
US Economic Outlook - Being Decided - M Capital Group August 2021.pdf
 
Which Crypto to Buy Today for Short-Term in May-June 2024.pdf
Which Crypto to Buy Today for Short-Term in May-June 2024.pdfWhich Crypto to Buy Today for Short-Term in May-June 2024.pdf
Which Crypto to Buy Today for Short-Term in May-June 2024.pdf
 
what is the best method to sell pi coins in 2024
what is the best method to sell pi coins in 2024what is the best method to sell pi coins in 2024
what is the best method to sell pi coins in 2024
 
Commercial Bank Economic Capsule - May 2024
Commercial Bank Economic Capsule - May 2024Commercial Bank Economic Capsule - May 2024
Commercial Bank Economic Capsule - May 2024
 
Chương 6. Ancol - phenol - ether (1).pdf
Chương 6. Ancol - phenol - ether (1).pdfChương 6. Ancol - phenol - ether (1).pdf
Chương 6. Ancol - phenol - ether (1).pdf
 
Isios-2024-Professional-Independent-Trustee-Survey.pdf
Isios-2024-Professional-Independent-Trustee-Survey.pdfIsios-2024-Professional-Independent-Trustee-Survey.pdf
Isios-2024-Professional-Independent-Trustee-Survey.pdf
 
PF-Wagner's Theory of Public Expenditure.pptx
PF-Wagner's Theory of Public Expenditure.pptxPF-Wagner's Theory of Public Expenditure.pptx
PF-Wagner's Theory of Public Expenditure.pptx
 

Fintech Belgium - MeetUp on The Right Tech for your FinTech - Philippe Cornette - Digitribe - 18-12-18

  • 1. Security & data privacy by design for new applications development Philippe Cornette Partner
  • 2. | 2 DigiTribe is an IT & business Consulting company specialized in Digital enablement & execution 30+ Hands-on Experts & former C-level managers 3 Tribes: Cybersecurity, Digital enablement, Data Science Customers: Large & Mid-sized organizations & Fintech Mission Bring innovation, relevant digital practices and start- up mindset to large corporate organizations
  • 3. | 32018 | DigiTribe | Confidential 63% of data breaches linked to a third-party component 56% of companies have experienced a 3rd-party breach in 2017 Data security laws and regulators increasingly require Banks & Insurance companies to perform sufficient oversight of their third-party vendor’s data security protocols By 2020, 75% of Fortune Global 500 companies will treat vendor risk management as a Board-level initiative(Source: Gartner) IOT, Open Banking APIs under PSD2, outsourcing, … and the FINTECHs create new risks & opportunities EBA & NBB “While staying behind and ignoring fintech is a real risk for banks, they should still tread carefully when implementing fintech or, of course, any change. Banks should fully take into account the EBA’s 2018 “report on the prudential risks and opportunities arising for institutions from fintech” when considering, implementing or using fintech technologies, in the sense that they should take the necessary precautions to avoid, mitigate or reduce certain risks.” Why Financial institutions are increasing the number of Information Security Due Diligences / TPSA ?
  • 4. | 42018 | DigiTribe | Confidential
  • 5. | 52018 | DigiTribe | Confidential Reduce the risk of information security incidents Ensure that their offerings are secure and dependable Gain active assurance that suppliers are protecting their data Comply with legal and policy requirements Enable informed decision making when selecting new suppliers What do your customers expect ?
  • 6. | 62018 | DigiTribe | Confidential Entry ticket for new contracts (Third-party assessment, due diligence requirements) Compliance (e.g. GDPR, NIS, PCI DSS,…) Key differentiator / marketing advantages Reduce costs of fixing bugs Why security by design is important for the Fintechs
  • 7. | 72018 | DigiTribe | Confidential Defense in Depth
  • 8. | 82018 | DigiTribe | Confidential System layers where security may be compromised
  • 9. | 92018 | DigiTribe | Confidential Software Security requirements
  • 10. Security by Design principles • Secure the weakest link • Minimize attack surface area • Establish secure defaults • Principle of Least privilege • Principle of Defense in depth • Fail securely • Don’t trust services • Separation of duties • Avoid security by obscurity • Keep security simple • Fix security issues correctly • Promote privacy | 10
  • 12. | 122018 | DigiTribe | Confidential Requirements • Do you gather security objectives? • How are they mapped to the rest of the design process? Design • Does your team conduct security architecture and design reviews? • Do you use checklists to drive the process? Do you revise them over time? • Does your team create threat models to understand and prioritize risk? Coding • Does your team use a formalized set of security coding best practices? • What type of code scanning tools do you use? • Do you perform code reviews against security best practices? Testing • Does your team conduct 3rd party or internal penetration tests? • Are your testers QA trained on the latest attack trends and test techniques? • Do you use security testing tools? Questions to ask yourself
  • 14. Secure Coding Secure software does not happen by itself. It requires consistently applied methodologies across the organization Securing coding is the practice of developing computer software in a way that guards against the accidental introduction of security vulnerabilities. Defects, bugs and logic flaws are consistently the primary cause of commonly exploited software vulnerabilities. This includes acceptance tests for third-parties code (e.g. : libraries downloaded from internet)
  • 15. | 152018 | DigiTribe | Confidential The importance of knowing how to code with style… guide
  • 16. | 162018 | DigiTribe | Confidential Coding Standards Benefits • Code Clarity/Easier to Understand • Easier to Maintain • Reduces Bugs • Simplifies Code Reviews • Shorter learning curve for new team members • Consistency across large and distributed teams • Comply with internal or regulatory quality initiatives Business Benefits • Improve software quality • Accelerate time to market • Enhance customer satisfaction • Reduce long term cost • Improve productivity Coding Style guide
  • 17.
  • 18. | 182018 | DigiTribe | Confidential Component • The average application consists of 106 open source components. Vulnerability • A typical application contains 23 known vulnerabilities. License • Most applications indicate at least 8 GPL licensed components. Architecture • Many components in use are old, unsupported, and unpopular. The need for open source security management became front-page news in 2017 owing to a major data breach at Equifax (Consumer credit rating agency). The breach (due to a Apache Struts security hole) has compromised the information of over 148 million U.S. consumers, nearly 700,000 U.K. residents, and more than 19,000 Canadian customers. Open Source Security
  • 19. Open source, Libraries and Frameworks: Best Practices • Use libraries and frameworks from trusted sources actively maintained and widely used. • Create and maintain an inventory catalogue of all the third party libraries. • Proactively keep libraries and components up to date; use tools, like OWASP Dependency Check, Retire.JS, to identify project dependencies and check if there are known, publicly disclosed vulnerabilities for all third party code. • Reduce the attack surface by encapsulating the library and expose only the required behaviour into your software. • Manage your technical debt • Create a concise Open Source Security Policy
  • 20. | 202018 | DigiTribe | Confidential
  • 21. | 212018 | DigiTribe | Confidential Risk, Cybersecurity & GDPR assessment & gap analysis (ISO27001, NIST, SWIFT CSP, GDPR,…) IT Strategy, architecture and governance Cybersecurity strategy, roadmap & implementation CISO & DPO as a service Support to answer TPSA Third-party assessment of your suppliers Partnership on solutions with our customers Second opinion as a service What can Digitribe do for you ?
  • 22. To contact us www.digitribe.be philippe.cornette@digitribe.be +32 478403012 | 222018 | DigiTribe | Confidential

Editor's Notes

  1. Use libraries and frameworks from trusted sources that are actively maintained and widely used by many applications. Create and maintain an inventory catalogue of all the third party libraries. Proactively keep libraries and components up to date. Use tools to identify project dependencies and check if there are any known, publicly disclosed vulnerabilities for all third party code, like: OWASP Dependency Check Retire.JS. Reduce the attack surface by encapsulating the library and expose only the required behaviour into your software