Why care about application security?Paweł Krawczyk (IPSec.pl)pawel.krawczyk@hush.comPresentation licensed under CC BY-NChttp://creativecommons.org/licenses/by-nc/3.0/
Sony PSNApril 2011PSN & Qriosity outage80m records lostMay 3Another 25m recordsSony Online Entertainment outage
Small issues are importantSony 2011Challenger 1986
Top hack (2009)130 million personal recordsCredit card numbers
Fast & furious...Source: datalossdb.org
$$$SettlementsVisa 		= $60.0mAmEx 	= $  3.5mConsumer 	= $  4.8mPonemon Institute estimateAt $60 cost per record = $7.8bNow $140 (2010)Indirect costs (e.g. lost business)Source: datalossdb.org
What indirect costs? NYSESource: datalossdb.org
Side effectCC’s prices drop on „black market”2008	$10-202009	$2-6Numbers from: Finjan, Kaspersky
Is there a grace periodfor startups?
Source: dereknewton.com
FarmingSource: historyforkids.org
Malware farmingMass 500k websites infections2011 (LizaMoon), 2008
Your websiteBlacklistedGoogle Safe Browsing, Microsoft Phishing Filter, OpenDNS etc.
BestwaystogethackedGuaranteedUse ancient Wordpress, Joomla, PHPbb...Use trivial passwords for FTP, SSH...LikelyWrite your own application...
TumblrSource: niebezpiecznik.pl, Reddit
Bad news live longSource: niebezpiecznik.pl
.plAs seen on 23 March 2011
Wyższa Szkoła PolicjiSource: prawo.vagla.pl
Sąd Okręgowy w CzęstochowieSource: prawo.vagla.pl
Data protection lawsPoland - up to 50’000 PLN finesMay issue order to stop processing dataAudit reports are publicWould you trust them in future?
Going international?GBP 5,6mGBP 17,5mGBP 3m
How to fix stuff?Source: NASA, Wikipedia (Apollo 13 - 1970)
IsSecurityEnemy of economy?
SecurityisEconomy
Eliminate bugs earlyEarly code auditApplied Software Measurement, Capers Jones, 1996Building Security Into The Software Life Cycle, Marco M. Morana, 2006
It’s cheaper than...PentestLate code auditApplied Software Measurement, Capers Jones, 1996Building Security Into The Software Life Cycle, Marco M. Morana, 2006
And way cheaper than...Hack!Applied Software Measurement, Capers Jones, 1996Building Security Into The Software Life Cycle, Marco M. Morana, 2006
How?Dough Hubbard „The Failure of Risk Management”Security Assurance Maturity Model (OpenSAMM)Security Development Lifecycle (SDL)
Outsourcing?Tell them what you need (precisely)UML, BPMN Specify assurance levelOWASP ASVSTrust but verifySupplier due dilligence, audit, pentest
Ask peersOWASPOpen Web Application Security Projectwww.owasp.orgISSAInformation Systems Security Associationwww.issa.org.pl

Why care about application security