Presentation is loading. Please wait.

Presentation is loading. Please wait.

Application Security: Bake In or Add (Sometime) Later? Jeff Kalwerisky Security Evangelist for Alpha Tech and VP, Information Security & Technical Training.

Similar presentations


Presentation on theme: "Application Security: Bake In or Add (Sometime) Later? Jeff Kalwerisky Security Evangelist for Alpha Tech and VP, Information Security & Technical Training."— Presentation transcript:

1 Application Security: Bake In or Add (Sometime) Later? Jeff Kalwerisky Security Evangelist for Alpha Tech and VP, Information Security & Technical Training CPEinteractive, Inc.

2 Famous Quote “Who am I and Why Am I Here?”  Admiral James Stockdale, Vietnam war hero & Ross Perot’s V-P candidate in 1992 A recovering software developer Not an Alpha developer Sole focus: Information Security – AKA Keeping “them” away from the crown jewels Security Evangelist for Alpha for many years

3 The $64K question: Should security be baked into all apps or can it be added on later? The answer is Yes! In fact, attention to security begins on that very first design whiteboard It then continues into prototyping, development, testing, live deployment, and maintenance – Whether Alpha Anywhere ©, Xbasic, Java, even COBOL The Title of This Short Talk

4 Thinking About Security Starts Here Information Security

5 “Just the Facts, Ma’am” Of popular mobile apps have security baked in and use tools to defend against hack attacks Of the top 100 Android & iOS apps have been successfully hacked

6 Why Should I Care? Revenue Loss Unauthorized Access to Sensitive Data Intellectual Property Theft Fraud Altered user Experience Brand Damage

7 COMPLIANCE! With an alphabet soup of regulations and standards What Really Keeps CxOs Up at Night PA-DSS 3.0 PCI-DSS 3.0 (GLBA) The Men in Black: Auditors

8 CIO and CEO of Target fired after embarrassing security breach which compromised 40-million(!) customer credit and debit cards Not to Mention Career-Limiting X X

9 Not All (Mobile) Apps Are Equal High Risk Apps... Location-Aware Collect Personal Info Use remote servers to handle user data Access sensitive databases Low(er) Risk Apps... Alarm Clock To-Do List with no connection Apps that never talk to the Web or Corporate databases

10 Basic security is built into the tool – Unlike many other development tools – We’re looking at ya, MS-Access...! But it’s getting much more complex – BYOD, BYOA, COPE*, Cloud, Big Data Analytics, social media, the Internet of Things,... The Way * Corporate-Owned, Personally-Enabled

11 Alpha Anywhere © Security University A series of focused, online sessions Touching on many aspects of “real” security  C-I-A: Confidentiality-Integrity-Availability  The myriad virtues of Encryption Everywhere  Threat Modeling – finding those pesky security vulnerabilities BEFORE they bite you From Design, through Development, into Production Announcing...

12 The Ponemon Institute’s (Sad) Finding* *Exposing the Cybersecurity Cracks, July 2014

13 Another Ponemon Finding, July 2014

14 This is What We Want. Right?

15 Contact Me Jeff Kalwerisky CPE Interactive, Inc. Mobile


Download ppt "Application Security: Bake In or Add (Sometime) Later? Jeff Kalwerisky Security Evangelist for Alpha Tech and VP, Information Security & Technical Training."

Similar presentations


Ads by Google