SlideShare a Scribd company logo
1 of 21
Sebastian Holst
Chief Strategy Officer
What risks should I be worried about?
How can I defend myself against these specific risks?
How do I work smart without being paranoid or naive?
How do I integrate all of this into my broader ALM and DevOps practices?
Application Risk Management
Application hardening (managing existing risks)
Application analytics (managing novel risks)
Incorporating risk management into ALM and DevOps
What patterns or practices can improve your chances for success?
Effective Application Risk Management Programs
Roles and workflows: Who’s best equipped to decide how much is
enough – too much – or not enough?
Resources & next steps
When the weight of the likelihood and impact of
an “incident” occurring is deemed to be
intolerably high, then the resulting risk must
either be avoided entirely (stop developing in
managed code or stop distributing your code –
use Azure for example – in this example) or, when
avoidance is not an option, the risk must be
reduced to a tolerable level through the use of a
“control.”
To be effective, a control must reduce the
combined weight of likelihood and impact of an
incident occurrence to a “tolerable” level.
Controls do not eliminate risks – controls make risks tolerable.
To be effective, the control must combine technology to obfuscate and/or monitor applications,
processes that detail how to consistently use the technology, and policies that dictate when to invoke
these processes – thus ensuring consistent and effective risk mitigation.
Controls to mitigate risks stemming from
the use of managed code include
obfuscation to lower the likelihood of an
incident occurrence (a preventative
control) and
tamper detection and defense as well as
application monitoring and analytics to
reduce the impact should an incident
occur (through faster detection and real-
time remediation).
Caution! As with any control, app hardening can
introduce its own set of “intolerable” risks.
These risks can originate from any one its three
“dimensions” of technology, process, and/or policy.
To be effective, application hardening and
analytics controls must:
• Reduce underlying risk to tolerable levels
WHILE ENSURING THAT THERE IS NO
• Negative impact on technology, process,
and/or policy in other risk categories.
Breadth • .NET (Azure, WinRT..), Java (Android, J2ME…)
Framework aware • XAML, BAML, Android…
Cross assembly • Distributed development & architecture
Debugging • Round trip, “incident response”…
Patch generation • Incremental obfuscation
IDE Integration • Visual Studio, MSBuild, command line, Eclipse, Ant…
Manufacturing
• Continuous integration, build farm, hosted, distributed, …
• Injection of tamper, exception, and usage instrumentation
Quality
• Adhere to runtime standards
• Comply with highest quality, security, localization and
accessibility standards
Support • Dedicated and specialized staff
Effective Risk Management
Action
&
Insight
Incidents
Service Levels
Usage & Outcomes
Behavior & Preferences
Reward
Preserve
App
Integrity
Integrate
into SDLC,
ALM &
DevOps
Performance
Privacy & Security
Instrumentation
Deployment & DevOps
Analytics & KPIs
Quality
High Value
Low Impact Low Friction
Day-to-day operations
Future strategies
Preserve service levels Minimize complexity
Effective Application Risk Management programs are
required in order to
Minimize application owner liability
Maximize 3rd party culpability
Patent: strong protection – almost impossible to secure software patents
Copyright: automatic – basis of most software licenses (and thus avoiding
USA’s “first sale” doctrine)
Limited to copying code/executables – not algorithms (and other
categories of “invention”)
Does not apply to independent development (white room)
Trade Secret: covers confidential information (logic) that provides a
company with a competitive edge (protection of last resort – and now
increasingly common)
Must be SECRET (the secret must be proven to have been
attained through “improper means”)
H.R.3326 - Defend Trade Secrets Act of 2015 and
S.1890 - Defend Trade Secrets Act of 2015
Trade Secret Theft: “the acquisition of a trade secret of another by a person
who used improper means to acquire knowledge of the trade secret.”
Improper Means:
(A) including theft, bribery… or espionage through electronic or other
means; and
(B) does not include reverse engineering or independent derivation…. “
What constitutes a material risk?
A: Legal, financial, and executive stakeholders
What are adequate controls?
A: Development and operational leadership
How can this be managed?
A: This might be an issue!
Technical requirements are increasingly showing up in legislation – not
technical guidance! (IP attorneys need to tell development that some reasonable effort
to prevent reverse engineering is required to preserve “trade secret” protection under the
law).
www.oceg.org/resources
• GRC = Governance, Risk, and Compliance
Effective Risk Management
• No policy IS A POLICY
Effective Risk Management
Application Risk and Reward: Protect the value you create

More Related Content

What's hot

MSSP - Security Orchestration & Automation
MSSP - Security Orchestration & AutomationMSSP - Security Orchestration & Automation
MSSP - Security Orchestration & AutomationSiemplify
 
Security Orchestration, Automation & Incident Response
Security Orchestration, Automation & Incident ResponseSecurity Orchestration, Automation & Incident Response
Security Orchestration, Automation & Incident ResponseSiemplify
 
A4 to A10 of security V3.1
A4 to A10 of security V3.1A4 to A10 of security V3.1
A4 to A10 of security V3.1Jorge Sebastiao
 
Providing a Flexible Approach to the Inflexible World of Information Security...
Providing a Flexible Approach to the Inflexible World of Information Security...Providing a Flexible Approach to the Inflexible World of Information Security...
Providing a Flexible Approach to the Inflexible World of Information Security...gemmarie1
 
Incident Response Whitepaper - AlienVault
Incident Response Whitepaper - AlienVaultIncident Response Whitepaper - AlienVault
Incident Response Whitepaper - AlienVaultJermund Ottermo
 
Five Reasons to Look Beyond Math-based Next-Gen Antivirus
Five Reasons to Look Beyond Math-based Next-Gen AntivirusFive Reasons to Look Beyond Math-based Next-Gen Antivirus
Five Reasons to Look Beyond Math-based Next-Gen AntivirusSarah Vanier
 
Vulnerability Assessment & Analysis (VAA) Overview
Vulnerability Assessment & Analysis (VAA) OverviewVulnerability Assessment & Analysis (VAA) Overview
Vulnerability Assessment & Analysis (VAA) OverviewSusan Rantall
 
Information security
Information securityInformation security
Information securityWilliam Moore
 
Best vulnerability assessment training
Best vulnerability assessment trainingBest vulnerability assessment training
Best vulnerability assessment trainingAdarshMathuri
 
Top 10 Questions to Ask Your Vulnerability Management Provider
Top 10 Questions to Ask Your Vulnerability Management ProviderTop 10 Questions to Ask Your Vulnerability Management Provider
Top 10 Questions to Ask Your Vulnerability Management ProviderTawnia Beckwith
 
RSA 2016 Security Analytics Presentation
RSA 2016 Security Analytics PresentationRSA 2016 Security Analytics Presentation
RSA 2016 Security Analytics PresentationAnton Chuvakin
 
Five SIEM Futures (2012)
Five SIEM Futures (2012)Five SIEM Futures (2012)
Five SIEM Futures (2012)Anton Chuvakin
 
Benefits of Semi Automation - Learn Security Analysis A Lot From Football
Benefits of Semi Automation - Learn Security Analysis A Lot From FootballBenefits of Semi Automation - Learn Security Analysis A Lot From Football
Benefits of Semi Automation - Learn Security Analysis A Lot From FootballSiemplify
 
Vulnerability Assessment
Vulnerability AssessmentVulnerability Assessment
Vulnerability Assessmentprimeteacher32
 
What is Security Orchestration?
What is Security Orchestration?What is Security Orchestration?
What is Security Orchestration?Siemplify
 
Security Orchestration Made Simple
Security Orchestration Made SimpleSecurity Orchestration Made Simple
Security Orchestration Made SimpleSiemplify
 
7 Steps to Build a SOC with Limited Resources
7 Steps to Build a SOC with Limited Resources7 Steps to Build a SOC with Limited Resources
7 Steps to Build a SOC with Limited ResourcesLogRhythm
 
Simple and-smart-security-tips-for-website -design-orange949
Simple and-smart-security-tips-for-website -design-orange949Simple and-smart-security-tips-for-website -design-orange949
Simple and-smart-security-tips-for-website -design-orange949Orange949
 
What is SIEM? A Brilliant Guide to the Basics
What is SIEM? A Brilliant Guide to the BasicsWhat is SIEM? A Brilliant Guide to the Basics
What is SIEM? A Brilliant Guide to the BasicsSagar Joshi
 

What's hot (20)

MSSP - Security Orchestration & Automation
MSSP - Security Orchestration & AutomationMSSP - Security Orchestration & Automation
MSSP - Security Orchestration & Automation
 
Security Orchestration, Automation & Incident Response
Security Orchestration, Automation & Incident ResponseSecurity Orchestration, Automation & Incident Response
Security Orchestration, Automation & Incident Response
 
A4 to A10 of security V3.1
A4 to A10 of security V3.1A4 to A10 of security V3.1
A4 to A10 of security V3.1
 
Providing a Flexible Approach to the Inflexible World of Information Security...
Providing a Flexible Approach to the Inflexible World of Information Security...Providing a Flexible Approach to the Inflexible World of Information Security...
Providing a Flexible Approach to the Inflexible World of Information Security...
 
Incident Response Whitepaper - AlienVault
Incident Response Whitepaper - AlienVaultIncident Response Whitepaper - AlienVault
Incident Response Whitepaper - AlienVault
 
Five Reasons to Look Beyond Math-based Next-Gen Antivirus
Five Reasons to Look Beyond Math-based Next-Gen AntivirusFive Reasons to Look Beyond Math-based Next-Gen Antivirus
Five Reasons to Look Beyond Math-based Next-Gen Antivirus
 
Vulnerability Assessment & Analysis (VAA) Overview
Vulnerability Assessment & Analysis (VAA) OverviewVulnerability Assessment & Analysis (VAA) Overview
Vulnerability Assessment & Analysis (VAA) Overview
 
Information security
Information securityInformation security
Information security
 
Best vulnerability assessment training
Best vulnerability assessment trainingBest vulnerability assessment training
Best vulnerability assessment training
 
Top 10 Questions to Ask Your Vulnerability Management Provider
Top 10 Questions to Ask Your Vulnerability Management ProviderTop 10 Questions to Ask Your Vulnerability Management Provider
Top 10 Questions to Ask Your Vulnerability Management Provider
 
RSA 2016 Security Analytics Presentation
RSA 2016 Security Analytics PresentationRSA 2016 Security Analytics Presentation
RSA 2016 Security Analytics Presentation
 
Five SIEM Futures (2012)
Five SIEM Futures (2012)Five SIEM Futures (2012)
Five SIEM Futures (2012)
 
Benefits of Semi Automation - Learn Security Analysis A Lot From Football
Benefits of Semi Automation - Learn Security Analysis A Lot From FootballBenefits of Semi Automation - Learn Security Analysis A Lot From Football
Benefits of Semi Automation - Learn Security Analysis A Lot From Football
 
Vulnerability Assessment
Vulnerability AssessmentVulnerability Assessment
Vulnerability Assessment
 
What is Security Orchestration?
What is Security Orchestration?What is Security Orchestration?
What is Security Orchestration?
 
Security Orchestration Made Simple
Security Orchestration Made SimpleSecurity Orchestration Made Simple
Security Orchestration Made Simple
 
7 Steps to Build a SOC with Limited Resources
7 Steps to Build a SOC with Limited Resources7 Steps to Build a SOC with Limited Resources
7 Steps to Build a SOC with Limited Resources
 
Simple and-smart-security-tips-for-website -design-orange949
Simple and-smart-security-tips-for-website -design-orange949Simple and-smart-security-tips-for-website -design-orange949
Simple and-smart-security-tips-for-website -design-orange949
 
What is SIEM? A Brilliant Guide to the Basics
What is SIEM? A Brilliant Guide to the BasicsWhat is SIEM? A Brilliant Guide to the Basics
What is SIEM? A Brilliant Guide to the Basics
 
tarunidhar
tarunidhartarunidhar
tarunidhar
 

Viewers also liked

Risk and Reward: Security Threats in the Gulf of Guinea and Investment
Risk and Reward: Security Threats in the Gulf of Guinea and Investment Risk and Reward: Security Threats in the Gulf of Guinea and Investment
Risk and Reward: Security Threats in the Gulf of Guinea and Investment George Kobani
 
Slides money banking risk reward capm
Slides money banking risk reward capmSlides money banking risk reward capm
Slides money banking risk reward capmJulio Huato
 
Trends in Portfolio Management: How organisations are learning new ways to ba...
Trends in Portfolio Management: How organisations are learning new ways to ba...Trends in Portfolio Management: How organisations are learning new ways to ba...
Trends in Portfolio Management: How organisations are learning new ways to ba...Peter Carr
 
Find the Risk vs. Reward Balance in Social Media
Find the Risk vs. Reward Balance in Social MediaFind the Risk vs. Reward Balance in Social Media
Find the Risk vs. Reward Balance in Social MediaGerardo A Dada
 

Viewers also liked (8)

Fin sys
Fin sysFin sys
Fin sys
 
Risk and Reward: Security Threats in the Gulf of Guinea and Investment
Risk and Reward: Security Threats in the Gulf of Guinea and Investment Risk and Reward: Security Threats in the Gulf of Guinea and Investment
Risk and Reward: Security Threats in the Gulf of Guinea and Investment
 
Slides money banking risk reward capm
Slides money banking risk reward capmSlides money banking risk reward capm
Slides money banking risk reward capm
 
Trends in Portfolio Management: How organisations are learning new ways to ba...
Trends in Portfolio Management: How organisations are learning new ways to ba...Trends in Portfolio Management: How organisations are learning new ways to ba...
Trends in Portfolio Management: How organisations are learning new ways to ba...
 
Find the Risk vs. Reward Balance in Social Media
Find the Risk vs. Reward Balance in Social MediaFind the Risk vs. Reward Balance in Social Media
Find the Risk vs. Reward Balance in Social Media
 
The risk reward diagram
The risk reward diagramThe risk reward diagram
The risk reward diagram
 
Risk vs. reward decision matrix
Risk vs. reward decision matrixRisk vs. reward decision matrix
Risk vs. reward decision matrix
 
Risk management
Risk managementRisk management
Risk management
 

Similar to Application Risk and Reward: Protect the value you create

Risk management planExecutive SummaryThe past.docx
Risk management planExecutive SummaryThe past.docxRisk management planExecutive SummaryThe past.docx
Risk management planExecutive SummaryThe past.docxSUBHI7
 
Five Mistakes of Vulnerability Management
Five Mistakes of Vulnerability ManagementFive Mistakes of Vulnerability Management
Five Mistakes of Vulnerability ManagementAnton Chuvakin
 
CompTIA CySA Domain 1 Threat and Vulnerability Management.pptx
CompTIA CySA Domain 1 Threat and Vulnerability Management.pptxCompTIA CySA Domain 1 Threat and Vulnerability Management.pptx
CompTIA CySA Domain 1 Threat and Vulnerability Management.pptxInfosectrain3
 
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hackamrutharam
 
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare ☁
 
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare ☁
 
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare ☁
 
2010 Sc World Congress Nyc
2010 Sc World Congress Nyc2010 Sc World Congress Nyc
2010 Sc World Congress NycBob Maley
 
What is Enterprise Security Architecture (ESA)?
What is Enterprise Security Architecture (ESA)?What is Enterprise Security Architecture (ESA)?
What is Enterprise Security Architecture (ESA)?John Gardner, CMC
 
What i learned at issa international summit 2019
What i learned at issa international summit 2019What i learned at issa international summit 2019
What i learned at issa international summit 2019Ulf Mattsson
 
Veracode Corporate Overview - Print
Veracode Corporate Overview - PrintVeracode Corporate Overview - Print
Veracode Corporate Overview - PrintAndrew Kanikuru
 
key metrics and process in cyber security case scenario
key metrics and process in cyber security case scenario key metrics and process in cyber security case scenario
key metrics and process in cyber security case scenario Skillweed
 
六合彩香港-六合彩
六合彩香港-六合彩六合彩香港-六合彩
六合彩香港-六合彩baoyin
 
How to improve endpoint security on a SMB budget
How to improve endpoint security on a SMB budgetHow to improve endpoint security on a SMB budget
How to improve endpoint security on a SMB budgetLumension
 
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdfFor Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdfJustinBrown267905
 
Phi 235 social media security users guide presentation
Phi 235 social media security users guide presentationPhi 235 social media security users guide presentation
Phi 235 social media security users guide presentationAlan Holyoke
 

Similar to Application Risk and Reward: Protect the value you create (20)

Risk management planExecutive SummaryThe past.docx
Risk management planExecutive SummaryThe past.docxRisk management planExecutive SummaryThe past.docx
Risk management planExecutive SummaryThe past.docx
 
Five Mistakes of Vulnerability Management
Five Mistakes of Vulnerability ManagementFive Mistakes of Vulnerability Management
Five Mistakes of Vulnerability Management
 
CompTIA CySA Domain 1 Threat and Vulnerability Management.pptx
CompTIA CySA Domain 1 Threat and Vulnerability Management.pptxCompTIA CySA Domain 1 Threat and Vulnerability Management.pptx
CompTIA CySA Domain 1 Threat and Vulnerability Management.pptx
 
Veracode - Overview
Veracode - OverviewVeracode - Overview
Veracode - Overview
 
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hack
 
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
 
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
 
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
 
2010 Sc World Congress Nyc
2010 Sc World Congress Nyc2010 Sc World Congress Nyc
2010 Sc World Congress Nyc
 
What is Enterprise Security Architecture (ESA)?
What is Enterprise Security Architecture (ESA)?What is Enterprise Security Architecture (ESA)?
What is Enterprise Security Architecture (ESA)?
 
What i learned at issa international summit 2019
What i learned at issa international summit 2019What i learned at issa international summit 2019
What i learned at issa international summit 2019
 
Veracode Corporate Overview - Print
Veracode Corporate Overview - PrintVeracode Corporate Overview - Print
Veracode Corporate Overview - Print
 
key metrics and process in cyber security case scenario
key metrics and process in cyber security case scenario key metrics and process in cyber security case scenario
key metrics and process in cyber security case scenario
 
Security assessment with a hint of CISSP Prep
Security assessment with a hint of CISSP PrepSecurity assessment with a hint of CISSP Prep
Security assessment with a hint of CISSP Prep
 
六合彩香港-六合彩
六合彩香港-六合彩六合彩香港-六合彩
六合彩香港-六合彩
 
How to improve endpoint security on a SMB budget
How to improve endpoint security on a SMB budgetHow to improve endpoint security on a SMB budget
How to improve endpoint security on a SMB budget
 
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdfFor Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
 
Phi 235 social media security users guide presentation
Phi 235 social media security users guide presentationPhi 235 social media security users guide presentation
Phi 235 social media security users guide presentation
 
Risk Assessment Methodologies
Risk Assessment MethodologiesRisk Assessment Methodologies
Risk Assessment Methodologies
 
Security overview 2
Security overview 2Security overview 2
Security overview 2
 

Recently uploaded

Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataBradBedford3
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based projectAnoyGreter
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfPower Karaoke
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaHanief Utama
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024StefanoLambiase
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样umasea
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfAlina Yurenko
 
software engineering Chapter 5 System modeling.pptx
software engineering Chapter 5 System modeling.pptxsoftware engineering Chapter 5 System modeling.pptx
software engineering Chapter 5 System modeling.pptxnada99848
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - InfographicHr365.us smith
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackVICTOR MAESTRE RAMIREZ
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsAhmed Mohamed
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmSujith Sukumaran
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
 

Recently uploaded (20)

Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based project
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdf
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief Utama
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
 
software engineering Chapter 5 System modeling.pptx
software engineering Chapter 5 System modeling.pptxsoftware engineering Chapter 5 System modeling.pptx
software engineering Chapter 5 System modeling.pptx
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - Infographic
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStack
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML Diagrams
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalm
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
 

Application Risk and Reward: Protect the value you create

  • 2. What risks should I be worried about? How can I defend myself against these specific risks? How do I work smart without being paranoid or naive? How do I integrate all of this into my broader ALM and DevOps practices?
  • 3. Application Risk Management Application hardening (managing existing risks) Application analytics (managing novel risks) Incorporating risk management into ALM and DevOps What patterns or practices can improve your chances for success? Effective Application Risk Management Programs Roles and workflows: Who’s best equipped to decide how much is enough – too much – or not enough? Resources & next steps
  • 4.
  • 5.
  • 6.
  • 7. When the weight of the likelihood and impact of an “incident” occurring is deemed to be intolerably high, then the resulting risk must either be avoided entirely (stop developing in managed code or stop distributing your code – use Azure for example – in this example) or, when avoidance is not an option, the risk must be reduced to a tolerable level through the use of a “control.” To be effective, a control must reduce the combined weight of likelihood and impact of an incident occurrence to a “tolerable” level. Controls do not eliminate risks – controls make risks tolerable.
  • 8. To be effective, the control must combine technology to obfuscate and/or monitor applications, processes that detail how to consistently use the technology, and policies that dictate when to invoke these processes – thus ensuring consistent and effective risk mitigation. Controls to mitigate risks stemming from the use of managed code include obfuscation to lower the likelihood of an incident occurrence (a preventative control) and tamper detection and defense as well as application monitoring and analytics to reduce the impact should an incident occur (through faster detection and real- time remediation).
  • 9. Caution! As with any control, app hardening can introduce its own set of “intolerable” risks. These risks can originate from any one its three “dimensions” of technology, process, and/or policy. To be effective, application hardening and analytics controls must: • Reduce underlying risk to tolerable levels WHILE ENSURING THAT THERE IS NO • Negative impact on technology, process, and/or policy in other risk categories.
  • 10. Breadth • .NET (Azure, WinRT..), Java (Android, J2ME…) Framework aware • XAML, BAML, Android… Cross assembly • Distributed development & architecture Debugging • Round trip, “incident response”… Patch generation • Incremental obfuscation IDE Integration • Visual Studio, MSBuild, command line, Eclipse, Ant… Manufacturing • Continuous integration, build farm, hosted, distributed, … • Injection of tamper, exception, and usage instrumentation Quality • Adhere to runtime standards • Comply with highest quality, security, localization and accessibility standards Support • Dedicated and specialized staff
  • 12. Action & Insight Incidents Service Levels Usage & Outcomes Behavior & Preferences Reward Preserve App Integrity Integrate into SDLC, ALM & DevOps Performance Privacy & Security Instrumentation Deployment & DevOps Analytics & KPIs Quality High Value Low Impact Low Friction Day-to-day operations Future strategies Preserve service levels Minimize complexity
  • 13.
  • 14. Effective Application Risk Management programs are required in order to Minimize application owner liability Maximize 3rd party culpability
  • 15. Patent: strong protection – almost impossible to secure software patents Copyright: automatic – basis of most software licenses (and thus avoiding USA’s “first sale” doctrine) Limited to copying code/executables – not algorithms (and other categories of “invention”) Does not apply to independent development (white room) Trade Secret: covers confidential information (logic) that provides a company with a competitive edge (protection of last resort – and now increasingly common) Must be SECRET (the secret must be proven to have been attained through “improper means”)
  • 16. H.R.3326 - Defend Trade Secrets Act of 2015 and S.1890 - Defend Trade Secrets Act of 2015 Trade Secret Theft: “the acquisition of a trade secret of another by a person who used improper means to acquire knowledge of the trade secret.” Improper Means: (A) including theft, bribery… or espionage through electronic or other means; and (B) does not include reverse engineering or independent derivation…. “
  • 17. What constitutes a material risk? A: Legal, financial, and executive stakeholders What are adequate controls? A: Development and operational leadership How can this be managed? A: This might be an issue! Technical requirements are increasingly showing up in legislation – not technical guidance! (IP attorneys need to tell development that some reasonable effort to prevent reverse engineering is required to preserve “trade secret” protection under the law).
  • 18. www.oceg.org/resources • GRC = Governance, Risk, and Compliance
  • 19. Effective Risk Management • No policy IS A POLICY

Editor's Notes

  1. Incorporating ALM and DevOps into Risk Management