SlideShare a Scribd company logo
Security YMCA
Why shouting into the security echo chamber does no good!




     Are we, as security people reaching the
          people we need to reach the
               most…developers?
Disclaimers
      • Be careful what you say on twitter
      • This started of as a joke
      • We do not represent our employers, these are or
        own opinions
      • Our survey has NO scientific basis
      • Our survey is NOT free of bias
      • The outfits are just so
        you won’t take us
        seriously ;)

Image: YMCA a CC NC image from bogdog Dan’s Flicks stream:
http://www.flickr.com/photos/25689440@N06/2866020311/
Points of order
• We have about 25 minutes left in this
  presentation
• In this 25 minutes we will try to start a discussion
• Maybe we may even get people to do some real
  research
• 10 minutes are reserved for Q&A and YMCA song
• The next 20 slides will auto-advance every 45
  seconds…
• This talk is interactive… so interact!

• Why the f*ck did you guys pick this talk? No Really
Who are we?
• Chris John Riley




• Arron “F1nux” Finnon
Who are we?
• Frank “Seccubus” Breedijk




• Chris “Suggy” Sumner
So what is this about?
Raise of hands:
• Who in this room is not working in info security?
• Who in this room has ever presented at a
  conference?
• Of those, who presented at a non-security
  conference?

• And yet we wonder why “developers don’t get
  it?”
HTTP Parameter Pollution
       • There are multiple ways to send parameters
       • Sending parameters with both GET and
         POST can lead to interesting results
       • This problem has been known for 11 years
       • Yet 30% for the Alexa top 5000 sites has at
         least on page with this problem*
       • Including Microsoft, Google, VMWare,
         Facebook, Symantec and Paypal
* Taken from Marco Balduzzi’s talk “HTTP Parameter Pollution Vulnerabilities in Web Applications”
Black Hat Europe 2011
So we did a survey
• Not scientific (we’re no scientists)
• Bias introduced (but we’re are biased ;)
• Intended to generate discussion and actual
  research

• Writing a survey to prove a point is not good
  science
• We do not know if the participants were actually
  developers
Demographics - Roles
                              Senior
                          management or
                             Sponsor      Application
               Security                    Architect       Application
              Architect                                    Developer
Project Manager

                                                                     Application
                                                                      Support

                                                                  Business Owner




          Other
                                                        Responses from all over the
                                                        geographic spectrum…
                                                        Lots from UK and USA
Demographics -Experience
            more than 15   less than 2 years
               years


                                                2 -4 years




10 - 15 years




                                 4 - 10 years
Demographics -Skillz

50
45
40
35
30
 25
 20
 15
 10
     5
      0

          novice
                   intermediate
                                                      advanced
                                                                                        ninja

                   ... as an application developer?     .... in application security?
What a 12 step program
             boils down to…
•   Recognize /admit there is a problem
•   Accept it needs to be fixed
•   Get to know the problem
•   Fix the problem
•   Learn new rules to avoid the problem
•   Help others avoid the problem
Admitting/recognizing the problem
• Where do you find most problem when it
  comes to securing applications you develop?
    – I'm not able spot security issues

•   Disagree – 25%                        25%
•   Somewhat agree – 28%                         48%
•   Agree – 19%
                                           27%
•   Strongly Agree – 1%
•   No Answer – 27%
Accept that you need to fix it
• Where do you find most problem when it
  comes to securing applications you develop?
    – Security loses out to features

                                       11
•   Disagree – 11%                     %
                                                  63%
•   Somewhat agree – 17%
•   Agree – 25%
                                            26%
•   Strongly Agree – 21%
•   No Answer – 26%
Investigate the problem
• Where do you find most problem when it
  comes to securing applications you develop?
    – Understanding information on how to secure
      things

•   Disagree – 28%                    28%
•   Somewhat agree – 27%                           46%
•   Agree – 16%
•   Strongly Agree – 3%                 26%

•   No Answer – 26%
Fixing the problem
• Where do you find most problem when it
  comes to securing applications you develop?
    – Fitting security into the development timeline

                                       7
•   Disagree – 7%                      %

•   Somewhat agree – 22%                        66%

•   Agree – 21%
•   Strongly Agree – 23%               27%
•   No Answer – 27%
Help others avoid the problem
• Where do you find most problem when it
  comes to securing applications you develop?
    – Finding the right tools to assist in secure
      development

•   Disagree – 13%                     13%
•   Somewhat agree – 24%                            60%

•   Agree – 29%
•   Strongly Agree – 7%                  27%
•   No Answer – 27%
Where do you find most problems when it comes to
           securing applications you develop?
                                            Disagree       "Agree"

                                                                   66
                                             60                                      63
                                                                                                       60

                         48
       46

                                           1. Make it easier to find the right information & tools
                                           2. Acknowledge the timeline & features issues
       28
                          25


                                             12                                    11                 13
                                                               7



Understanding    I'm not able spot Finding the correct Fitting security   Security loses out Finding the right
information on     security issues    information          into the          to features     tools to assist in
 how to secure                                          development                               secure
     things                                                timeline                            development
Information Sources
How often to you refer to the following information
sources to ensure the security of your applications?

                     Rarely / Never          Regularly / Constantly



                                                        31                        24
            40                                                          45
                       49               49
     60




                                                        61                        67
            51                                                          47
                       43               43
    32



 Blogs     Social     Books           Forums         Training           Best      Internal
          Networks                                   Material         Practice     Coding
                                                                      Guides     Guidelines
How often to you refer to the following information
    sources to ensure the security of your applications?

                            Rarely / Never         Regularly / Constantly




                                                              31                       24
                   40                                                       45
                              49              49
            60




                                                              61                       67
                   51                                                       47
                              43              43
           32



        Blogs     Social     Books           Forums       Training    Best Practice    Internal
                 Networks                                 Material      Guides          Coding
                                                                                      Guidelines


We don’t suck                                         We suck
Internal Coding Guidelines


                  Constantly
                                            Never
   Regularly




Do you even
                          Rarely
have any?
Detect / Prevent
   When developing applications do you or your
company use any of the following to ensure security
         of the applications developed?
        35

        30

        25

        20                           Code-Review (automated
                                     or manual)
        15                           Penetration Testing
        10
                                     Security Review
         5

             0
                                 Surprised by code review, do
                                 they mean a Security Code
                                 Review or Quality Review?
About tools
• In our survey our audience said: 80.8 % wanted
  more tools, however my 2 pence worth (as
  usual in security your being over charged), is
  that we have too many tools.
• Dare I say too much fragmentation in choice of
  tools.
• I wonder about a world with only x1 port
  scanner, all training material, all methodologies,
  all good practice would reflect the x1 single
  tool.
• So my question is, am i officially crazy?
And now for the singing and dancing




Image: “Chewbacca wasn't sure they had disco on Kashyyyk but he sure as hell wasn't going to put all that practice at looking like an 'M' go to
waste” a CC NC SA image from harold.loyd’s Flickr stream: http://www.flickr.com/photos/14434912@N07/3503661701/

More Related Content

What's hot

SecureWorld Kim - Infosec at Ludicrous Speeds - Rugged DevOps 6a
SecureWorld   Kim - Infosec at Ludicrous Speeds - Rugged DevOps 6aSecureWorld   Kim - Infosec at Ludicrous Speeds - Rugged DevOps 6a
SecureWorld Kim - Infosec at Ludicrous Speeds - Rugged DevOps 6aGene Kim
 
Beyond the Knowledge Base: Turning Data into Wisdom - an ITSM Academy Webinar
Beyond the Knowledge Base: Turning Data into Wisdom - an ITSM Academy WebinarBeyond the Knowledge Base: Turning Data into Wisdom - an ITSM Academy Webinar
Beyond the Knowledge Base: Turning Data into Wisdom - an ITSM Academy Webinar
Karen Skiles
 
Kim IT Pro Forum Eugene: IT at Ludicrous Speeds - rugged dev ops
Kim IT Pro Forum Eugene: IT at Ludicrous Speeds - rugged dev opsKim IT Pro Forum Eugene: IT at Ludicrous Speeds - rugged dev ops
Kim IT Pro Forum Eugene: IT at Ludicrous Speeds - rugged dev opsGene Kim
 
Kim itSMF New England: ITIL at Ludicrous Speeds - Rugged DevOps 6a
Kim itSMF New England: ITIL at Ludicrous Speeds - Rugged DevOps 6aKim itSMF New England: ITIL at Ludicrous Speeds - Rugged DevOps 6a
Kim itSMF New England: ITIL at Ludicrous Speeds - Rugged DevOps 6aGene Kim
 
PuppetConf2012GeneKim
PuppetConf2012GeneKimPuppetConf2012GeneKim
PuppetConf2012GeneKim
Gene Kim
 
2019 FRSecure CISSP Mentor Program: Class Three
2019 FRSecure CISSP Mentor Program: Class Three 2019 FRSecure CISSP Mentor Program: Class Three
2019 FRSecure CISSP Mentor Program: Class Three
FRSecure
 

What's hot (6)

SecureWorld Kim - Infosec at Ludicrous Speeds - Rugged DevOps 6a
SecureWorld   Kim - Infosec at Ludicrous Speeds - Rugged DevOps 6aSecureWorld   Kim - Infosec at Ludicrous Speeds - Rugged DevOps 6a
SecureWorld Kim - Infosec at Ludicrous Speeds - Rugged DevOps 6a
 
Beyond the Knowledge Base: Turning Data into Wisdom - an ITSM Academy Webinar
Beyond the Knowledge Base: Turning Data into Wisdom - an ITSM Academy WebinarBeyond the Knowledge Base: Turning Data into Wisdom - an ITSM Academy Webinar
Beyond the Knowledge Base: Turning Data into Wisdom - an ITSM Academy Webinar
 
Kim IT Pro Forum Eugene: IT at Ludicrous Speeds - rugged dev ops
Kim IT Pro Forum Eugene: IT at Ludicrous Speeds - rugged dev opsKim IT Pro Forum Eugene: IT at Ludicrous Speeds - rugged dev ops
Kim IT Pro Forum Eugene: IT at Ludicrous Speeds - rugged dev ops
 
Kim itSMF New England: ITIL at Ludicrous Speeds - Rugged DevOps 6a
Kim itSMF New England: ITIL at Ludicrous Speeds - Rugged DevOps 6aKim itSMF New England: ITIL at Ludicrous Speeds - Rugged DevOps 6a
Kim itSMF New England: ITIL at Ludicrous Speeds - Rugged DevOps 6a
 
PuppetConf2012GeneKim
PuppetConf2012GeneKimPuppetConf2012GeneKim
PuppetConf2012GeneKim
 
2019 FRSecure CISSP Mentor Program: Class Three
2019 FRSecure CISSP Mentor Program: Class Three 2019 FRSecure CISSP Mentor Program: Class Three
2019 FRSecure CISSP Mentor Program: Class Three
 

Similar to Security YMCA

DevSecCon Asia 2017 Shannon Lietz: Security is Shifting Left
DevSecCon Asia 2017 Shannon Lietz: Security is Shifting LeftDevSecCon Asia 2017 Shannon Lietz: Security is Shifting Left
DevSecCon Asia 2017 Shannon Lietz: Security is Shifting Left
DevSecCon
 
Devops - Accelerating the Pace and Securing Along the Way - Thaddeus Walsh
Devops - Accelerating the Pace and Securing Along the Way - Thaddeus WalshDevops - Accelerating the Pace and Securing Along the Way - Thaddeus Walsh
Devops - Accelerating the Pace and Securing Along the Way - Thaddeus Walsh
Drew Malone
 
Is Your Vulnerability Management Program Irrelevant?
Is Your Vulnerability Management Program Irrelevant?Is Your Vulnerability Management Program Irrelevant?
Is Your Vulnerability Management Program Irrelevant?
Skybox Security
 
Security and DevOps Overview
Security and DevOps OverviewSecurity and DevOps Overview
Security and DevOps Overview
Adrian Sanabria
 
The Journey to DevSecOps
The Journey to DevSecOpsThe Journey to DevSecOps
The Journey to DevSecOps
SeniorStoryteller
 
The Journey to DevSecOps
The Journey to DevSecOpsThe Journey to DevSecOps
The Journey to DevSecOps
Shannon Lietz
 
VMWare Tech Talk: "The Road from Rugged DevOps to Security Chaos Engineering"
VMWare Tech Talk: "The Road from Rugged DevOps to Security Chaos Engineering"VMWare Tech Talk: "The Road from Rugged DevOps to Security Chaos Engineering"
VMWare Tech Talk: "The Road from Rugged DevOps to Security Chaos Engineering"
Aaron Rinehart
 
Ensuring Security through Continuous Testing
Ensuring Security through Continuous TestingEnsuring Security through Continuous Testing
Ensuring Security through Continuous Testing
TechWell
 
Secure DevOps - Evolution or Revolution?
Secure DevOps - Evolution or Revolution?Secure DevOps - Evolution or Revolution?
Secure DevOps - Evolution or Revolution?
Security Innovation
 
Making Apps Work
Making Apps WorkMaking Apps Work
Making Apps Work
William Thomson
 
Bad Advice, Unintended Consequences, and Broken Paradigms: Think & Act Di...
Bad Advice, Unintended Consequences, and Broken Paradigms: Think & Act Di...Bad Advice, Unintended Consequences, and Broken Paradigms: Think & Act Di...
Bad Advice, Unintended Consequences, and Broken Paradigms: Think & Act Di...
Steve Werby
 
Security within Scaled Agile
Security within Scaled AgileSecurity within Scaled Agile
Security within Scaled Agile
Mark Underwood
 
State of DevSecOps - DevSecOpsDays 2019
State of DevSecOps - DevSecOpsDays 2019State of DevSecOps - DevSecOpsDays 2019
State of DevSecOps - DevSecOpsDays 2019
Stefan Streichsbier
 
Vulnerability Management In An Application Security World
Vulnerability Management In An Application Security WorldVulnerability Management In An Application Security World
Vulnerability Management In An Application Security World
Denim Group
 
State of DevSecOps - DevOpsDays Jakarta 2019
State of DevSecOps - DevOpsDays Jakarta 2019State of DevSecOps - DevOpsDays Jakarta 2019
State of DevSecOps - DevOpsDays Jakarta 2019
Stefan Streichsbier
 
The State of DevSecOps
The State of DevSecOpsThe State of DevSecOps
The State of DevSecOps
DevOps Indonesia
 
SAL-DR-01-ELC 10 Understanding the SOC Audience.pptx
SAL-DR-01-ELC 10 Understanding the SOC Audience.pptxSAL-DR-01-ELC 10 Understanding the SOC Audience.pptx
SAL-DR-01-ELC 10 Understanding the SOC Audience.pptx
hforhassan101
 
Rapid Risk Assessment: A New Approach to Risk Management
Rapid Risk Assessment: A New Approach to Risk ManagementRapid Risk Assessment: A New Approach to Risk Management
Rapid Risk Assessment: A New Approach to Risk Management
EnergySec
 
Improve Security through Continuous Testing
Improve Security through Continuous TestingImprove Security through Continuous Testing
Improve Security through Continuous Testing
TechWell
 
The Thing That Should Not Be
The Thing That Should Not BeThe Thing That Should Not Be
The Thing That Should Not Be
morisson
 

Similar to Security YMCA (20)

DevSecCon Asia 2017 Shannon Lietz: Security is Shifting Left
DevSecCon Asia 2017 Shannon Lietz: Security is Shifting LeftDevSecCon Asia 2017 Shannon Lietz: Security is Shifting Left
DevSecCon Asia 2017 Shannon Lietz: Security is Shifting Left
 
Devops - Accelerating the Pace and Securing Along the Way - Thaddeus Walsh
Devops - Accelerating the Pace and Securing Along the Way - Thaddeus WalshDevops - Accelerating the Pace and Securing Along the Way - Thaddeus Walsh
Devops - Accelerating the Pace and Securing Along the Way - Thaddeus Walsh
 
Is Your Vulnerability Management Program Irrelevant?
Is Your Vulnerability Management Program Irrelevant?Is Your Vulnerability Management Program Irrelevant?
Is Your Vulnerability Management Program Irrelevant?
 
Security and DevOps Overview
Security and DevOps OverviewSecurity and DevOps Overview
Security and DevOps Overview
 
The Journey to DevSecOps
The Journey to DevSecOpsThe Journey to DevSecOps
The Journey to DevSecOps
 
The Journey to DevSecOps
The Journey to DevSecOpsThe Journey to DevSecOps
The Journey to DevSecOps
 
VMWare Tech Talk: "The Road from Rugged DevOps to Security Chaos Engineering"
VMWare Tech Talk: "The Road from Rugged DevOps to Security Chaos Engineering"VMWare Tech Talk: "The Road from Rugged DevOps to Security Chaos Engineering"
VMWare Tech Talk: "The Road from Rugged DevOps to Security Chaos Engineering"
 
Ensuring Security through Continuous Testing
Ensuring Security through Continuous TestingEnsuring Security through Continuous Testing
Ensuring Security through Continuous Testing
 
Secure DevOps - Evolution or Revolution?
Secure DevOps - Evolution or Revolution?Secure DevOps - Evolution or Revolution?
Secure DevOps - Evolution or Revolution?
 
Making Apps Work
Making Apps WorkMaking Apps Work
Making Apps Work
 
Bad Advice, Unintended Consequences, and Broken Paradigms: Think & Act Di...
Bad Advice, Unintended Consequences, and Broken Paradigms: Think & Act Di...Bad Advice, Unintended Consequences, and Broken Paradigms: Think & Act Di...
Bad Advice, Unintended Consequences, and Broken Paradigms: Think & Act Di...
 
Security within Scaled Agile
Security within Scaled AgileSecurity within Scaled Agile
Security within Scaled Agile
 
State of DevSecOps - DevSecOpsDays 2019
State of DevSecOps - DevSecOpsDays 2019State of DevSecOps - DevSecOpsDays 2019
State of DevSecOps - DevSecOpsDays 2019
 
Vulnerability Management In An Application Security World
Vulnerability Management In An Application Security WorldVulnerability Management In An Application Security World
Vulnerability Management In An Application Security World
 
State of DevSecOps - DevOpsDays Jakarta 2019
State of DevSecOps - DevOpsDays Jakarta 2019State of DevSecOps - DevOpsDays Jakarta 2019
State of DevSecOps - DevOpsDays Jakarta 2019
 
The State of DevSecOps
The State of DevSecOpsThe State of DevSecOps
The State of DevSecOps
 
SAL-DR-01-ELC 10 Understanding the SOC Audience.pptx
SAL-DR-01-ELC 10 Understanding the SOC Audience.pptxSAL-DR-01-ELC 10 Understanding the SOC Audience.pptx
SAL-DR-01-ELC 10 Understanding the SOC Audience.pptx
 
Rapid Risk Assessment: A New Approach to Risk Management
Rapid Risk Assessment: A New Approach to Risk ManagementRapid Risk Assessment: A New Approach to Risk Management
Rapid Risk Assessment: A New Approach to Risk Management
 
Improve Security through Continuous Testing
Improve Security through Continuous TestingImprove Security through Continuous Testing
Improve Security through Continuous Testing
 
The Thing That Should Not Be
The Thing That Should Not BeThe Thing That Should Not Be
The Thing That Should Not Be
 

More from Security BSides London

Penetration testing must die
Penetration testing must diePenetration testing must die
Penetration testing must die
Security BSides London
 
Your money, your media a DRMtastic (reverse|re) eng. tutorial
Your money, your media a DRMtastic (reverse|re) eng. tutorialYour money, your media a DRMtastic (reverse|re) eng. tutorial
Your money, your media a DRMtastic (reverse|re) eng. tutorial
Security BSides London
 
You built a security castle and forgot the bridge…now users are climbing your...
You built a security castle and forgot the bridge…now users are climbing your...You built a security castle and forgot the bridge…now users are climbing your...
You built a security castle and forgot the bridge…now users are climbing your...
Security BSides London
 
Agnitio: its static analysis, but not as we know it
Agnitio: its static analysis, but not as we know itAgnitio: its static analysis, but not as we know it
Agnitio: its static analysis, but not as we know it
Security BSides London
 
The Funny Thing About Information Security
The Funny Thing About Information SecurityThe Funny Thing About Information Security
The Funny Thing About Information Security
Security BSides London
 
Breaking out of restricted RDP
Breaking out of restricted RDPBreaking out of restricted RDP
Breaking out of restricted RDP
Security BSides London
 
Breaking, Entering and Pentesting
Breaking, Entering and Pentesting Breaking, Entering and Pentesting
Breaking, Entering and Pentesting
Security BSides London
 
All your logs are belong to you!
All your logs are belong to you!All your logs are belong to you!
All your logs are belong to you!
Security BSides London
 
Practical Crypto Attacks Against Web Applications
Practical Crypto Attacks Against Web Applications Practical Crypto Attacks Against Web Applications
Practical Crypto Attacks Against Web Applications
Security BSides London
 
Jedi mind tricks for building application security programs
Jedi mind tricks for building application security programsJedi mind tricks for building application security programs
Jedi mind tricks for building application security programs
Security BSides London
 
Dns tunnelling its all in the name
Dns tunnelling its all in the nameDns tunnelling its all in the name
Dns tunnelling its all in the name
Security BSides London
 
Cloud computing due diligence WTF?
Cloud computing due diligence WTF?Cloud computing due diligence WTF?
Cloud computing due diligence WTF?
Security BSides London
 

More from Security BSides London (12)

Penetration testing must die
Penetration testing must diePenetration testing must die
Penetration testing must die
 
Your money, your media a DRMtastic (reverse|re) eng. tutorial
Your money, your media a DRMtastic (reverse|re) eng. tutorialYour money, your media a DRMtastic (reverse|re) eng. tutorial
Your money, your media a DRMtastic (reverse|re) eng. tutorial
 
You built a security castle and forgot the bridge…now users are climbing your...
You built a security castle and forgot the bridge…now users are climbing your...You built a security castle and forgot the bridge…now users are climbing your...
You built a security castle and forgot the bridge…now users are climbing your...
 
Agnitio: its static analysis, but not as we know it
Agnitio: its static analysis, but not as we know itAgnitio: its static analysis, but not as we know it
Agnitio: its static analysis, but not as we know it
 
The Funny Thing About Information Security
The Funny Thing About Information SecurityThe Funny Thing About Information Security
The Funny Thing About Information Security
 
Breaking out of restricted RDP
Breaking out of restricted RDPBreaking out of restricted RDP
Breaking out of restricted RDP
 
Breaking, Entering and Pentesting
Breaking, Entering and Pentesting Breaking, Entering and Pentesting
Breaking, Entering and Pentesting
 
All your logs are belong to you!
All your logs are belong to you!All your logs are belong to you!
All your logs are belong to you!
 
Practical Crypto Attacks Against Web Applications
Practical Crypto Attacks Against Web Applications Practical Crypto Attacks Against Web Applications
Practical Crypto Attacks Against Web Applications
 
Jedi mind tricks for building application security programs
Jedi mind tricks for building application security programsJedi mind tricks for building application security programs
Jedi mind tricks for building application security programs
 
Dns tunnelling its all in the name
Dns tunnelling its all in the nameDns tunnelling its all in the name
Dns tunnelling its all in the name
 
Cloud computing due diligence WTF?
Cloud computing due diligence WTF?Cloud computing due diligence WTF?
Cloud computing due diligence WTF?
 

Recently uploaded

DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
UiPathCommunity
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
Vlad Stirbu
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 

Recently uploaded (20)

DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 

Security YMCA

  • 1. Security YMCA Why shouting into the security echo chamber does no good! Are we, as security people reaching the people we need to reach the most…developers?
  • 2. Disclaimers • Be careful what you say on twitter • This started of as a joke • We do not represent our employers, these are or own opinions • Our survey has NO scientific basis • Our survey is NOT free of bias • The outfits are just so you won’t take us seriously ;) Image: YMCA a CC NC image from bogdog Dan’s Flicks stream: http://www.flickr.com/photos/25689440@N06/2866020311/
  • 3. Points of order • We have about 25 minutes left in this presentation • In this 25 minutes we will try to start a discussion • Maybe we may even get people to do some real research • 10 minutes are reserved for Q&A and YMCA song • The next 20 slides will auto-advance every 45 seconds… • This talk is interactive… so interact! • Why the f*ck did you guys pick this talk? No Really
  • 4. Who are we? • Chris John Riley • Arron “F1nux” Finnon
  • 5. Who are we? • Frank “Seccubus” Breedijk • Chris “Suggy” Sumner
  • 6. So what is this about? Raise of hands: • Who in this room is not working in info security? • Who in this room has ever presented at a conference? • Of those, who presented at a non-security conference? • And yet we wonder why “developers don’t get it?”
  • 7. HTTP Parameter Pollution • There are multiple ways to send parameters • Sending parameters with both GET and POST can lead to interesting results • This problem has been known for 11 years • Yet 30% for the Alexa top 5000 sites has at least on page with this problem* • Including Microsoft, Google, VMWare, Facebook, Symantec and Paypal * Taken from Marco Balduzzi’s talk “HTTP Parameter Pollution Vulnerabilities in Web Applications” Black Hat Europe 2011
  • 8. So we did a survey • Not scientific (we’re no scientists) • Bias introduced (but we’re are biased ;) • Intended to generate discussion and actual research • Writing a survey to prove a point is not good science • We do not know if the participants were actually developers
  • 9. Demographics - Roles Senior management or Sponsor Application Security Architect Application Architect Developer Project Manager Application Support Business Owner Other Responses from all over the geographic spectrum… Lots from UK and USA
  • 10. Demographics -Experience more than 15 less than 2 years years 2 -4 years 10 - 15 years 4 - 10 years
  • 11. Demographics -Skillz 50 45 40 35 30 25 20 15 10 5 0 novice intermediate advanced ninja ... as an application developer? .... in application security?
  • 12. What a 12 step program boils down to… • Recognize /admit there is a problem • Accept it needs to be fixed • Get to know the problem • Fix the problem • Learn new rules to avoid the problem • Help others avoid the problem
  • 13. Admitting/recognizing the problem • Where do you find most problem when it comes to securing applications you develop? – I'm not able spot security issues • Disagree – 25% 25% • Somewhat agree – 28% 48% • Agree – 19% 27% • Strongly Agree – 1% • No Answer – 27%
  • 14. Accept that you need to fix it • Where do you find most problem when it comes to securing applications you develop? – Security loses out to features 11 • Disagree – 11% % 63% • Somewhat agree – 17% • Agree – 25% 26% • Strongly Agree – 21% • No Answer – 26%
  • 15. Investigate the problem • Where do you find most problem when it comes to securing applications you develop? – Understanding information on how to secure things • Disagree – 28% 28% • Somewhat agree – 27% 46% • Agree – 16% • Strongly Agree – 3% 26% • No Answer – 26%
  • 16. Fixing the problem • Where do you find most problem when it comes to securing applications you develop? – Fitting security into the development timeline 7 • Disagree – 7% % • Somewhat agree – 22% 66% • Agree – 21% • Strongly Agree – 23% 27% • No Answer – 27%
  • 17. Help others avoid the problem • Where do you find most problem when it comes to securing applications you develop? – Finding the right tools to assist in secure development • Disagree – 13% 13% • Somewhat agree – 24% 60% • Agree – 29% • Strongly Agree – 7% 27% • No Answer – 27%
  • 18. Where do you find most problems when it comes to securing applications you develop? Disagree "Agree" 66 60 63 60 48 46 1. Make it easier to find the right information & tools 2. Acknowledge the timeline & features issues 28 25 12 11 13 7 Understanding I'm not able spot Finding the correct Fitting security Security loses out Finding the right information on security issues information into the to features tools to assist in how to secure development secure things timeline development
  • 19. Information Sources How often to you refer to the following information sources to ensure the security of your applications? Rarely / Never Regularly / Constantly 31 24 40 45 49 49 60 61 67 51 47 43 43 32 Blogs Social Books Forums Training Best Internal Networks Material Practice Coding Guides Guidelines
  • 20. How often to you refer to the following information sources to ensure the security of your applications? Rarely / Never Regularly / Constantly 31 24 40 45 49 49 60 61 67 51 47 43 43 32 Blogs Social Books Forums Training Best Practice Internal Networks Material Guides Coding Guidelines We don’t suck We suck
  • 21. Internal Coding Guidelines Constantly Never Regularly Do you even Rarely have any?
  • 22. Detect / Prevent When developing applications do you or your company use any of the following to ensure security of the applications developed? 35 30 25 20 Code-Review (automated or manual) 15 Penetration Testing 10 Security Review 5 0 Surprised by code review, do they mean a Security Code Review or Quality Review?
  • 23. About tools • In our survey our audience said: 80.8 % wanted more tools, however my 2 pence worth (as usual in security your being over charged), is that we have too many tools. • Dare I say too much fragmentation in choice of tools. • I wonder about a world with only x1 port scanner, all training material, all methodologies, all good practice would reflect the x1 single tool. • So my question is, am i officially crazy?
  • 24. And now for the singing and dancing Image: “Chewbacca wasn't sure they had disco on Kashyyyk but he sure as hell wasn't going to put all that practice at looking like an 'M' go to waste” a CC NC SA image from harold.loyd’s Flickr stream: http://www.flickr.com/photos/14434912@N07/3503661701/