Secure Product Development With Rapid Start Get started now and launch your secure product on-time. Hal Aldridge

Size: px
Start display at page:

Download "Secure Product Development With Rapid Start Get started now and launch your secure product on-time. Hal Aldridge"

Transcription

1 Secure Product Development With Rapid Start Get started now and launch your secure product on-time Hal Aldridge

2 Secure Product Development With Rapid Start applications that communicate with Cloud services. Rapid Start is based on lightweight processes incorporating established security principles and best practices that provide confidence that the product will be robust to most real-world security threats. Most importantly, Rapid Start keeps the product team focused on launching the product with the features that will make it a success. Common Security Problems in IoT/ICS The first time an organization develops a secure product, it can be difficult getting started. The goal as Executive, Product Manager, Project Manager, Architect, or Developer is to get the security features implemented and the product launched on budget/schedule. The product will likely succeed or fail on the innovations/features unrelated to security. At best, the security features will allow the product to meet requirements and not get in the way. At worst, the security features will end up on the critical path in the product schedule and take away time/money that could be used making the product better. How do does an organization get started developing a secure product? The amount of security information available on the Internet is huge. Assigning an Engineer to search for security technologies and implement them is not an effective solution. General security training and certification is usually targeted at attacking and defending operational IT systems, not implementing security in products. Most security consultants have an operational IT background and have not developed or launched a product. Secure product development is about understating the security risks, determining risks are unacceptable, mitigating the unacceptable risks efficiently, and reducing the other risks as project time/budget will allow. The goal of this white paper is to present practical methods for adding security to a product efficiently reducing risk. The Secmation Rapid Start presented here provides series of actionable steps to build security into a new or existing product. It is tailored for the requirements of Automation, Internet of Things (IoT), Industrial Control Systems (ICS), Supervisory Control and Data Acquisition (SCADA), and other Embedded Security Computer and Network Security is an ongoing source of concern for governments, industries, companies, and individuals worldwide. The most common threats are cataloged in recent reports from organizations including Symantec [1] and HP Security Research [2]. These reports cover a broad-spectrum of applications from mobile to cloud. Specific to IoT Applications, the Open Web Application Security Project (OWASP) in its IoT Top Ten project [3] has determined the most prevalent vulnerabilities in IoT. HP has used that information for a study [4] where they compared the OWASP list to 10 of the most popular IoT devices on the market. HP found that five of the OWASP vulnerabilities were found in 60-80% of the devices. Similar work is available for ICS security. NIST has identified Threat Sources, Vulnerabilities, and Incidents in ICS [5] that show how ICS systems have been successfully attacked. In 2013, the Department of Homeland Security s ICS Computer Emergency Response Team (CERT) cataloged 177 exploitable vulnerabilities found in ICS products from 52 vendors [6]. Many famous ICS attacks like Stuxnet and less famous attacks exploit vulnerabilities like those found in these ICS products. Comparing the OWASP IoT, HP IoT, NIST ICS, and ICS-CERT ICS reports, IoT and ICS applications have common vulnerabilities. For example, HP determined 8 out of 10 IoT devices it studied had authorization issues while ICS-CERT found 44% of the exploitable vulnerabilities found in ICS products were authorization related. IoT and ICS systems share many common characteristics: embedded processing, distributed networks, small form factor, etc. While the security of ICS devices has been of concern since the mid-2000s, IoT security concerns are more recent and security has not been a priority in some existing products. Page 1

3 While neither ICS or IoT security concerns have been studied as long as more general IT systems, the root cause of most of the ICS and IoT issues is the same as the IT systems. For example, OWASP and NIST both link their IoT and ICS studies to the Common Weakness Enumeration (CWE) database. CWE identifies and catalogs common code vulnerabilities found in IT applications and systems. Why is this commonality interesting? One of the principles of security engineering is that most of the real-world security vulnerabilities leading to successful attacks come from the same, preventable root causes. These root causes are common configuration, architecture, and coding issues that have been enumerated in multiple lists such as the CWE SANS Top 25 [7] and the SANS Top 20 Security Controls [8]. Resolving these root causes will not prevent advanced attacks from succeeding, but it will significantly reduce security risks. If these common security issues are known, why is security still an area of significant concern? IT systems are made up of large amounts of code and equipment from multiple sources and IT systems are complex and change configuration regularly. It is difficult to ensure that all the code has been checked to remove the common vulnerabilities and the systems properly configured. As a result, the attacks that exploit these vulnerabilities are used because they work and are commonly available to attackers. The key to developing secure IoT/ICS products is to understand that developers can take advantage of the best practices developed for IT tailored for IoT/ICS. IoT/ICS developers can implement the tailored practices more successfully than possible in an IT application resulting in a more secure product at lower cost. This secure development is possible by leveraging features that make IoT/ICS different than IT such as smaller codebase, established interfaces, functional separation, and required testing. This white paper focuses on actionable processes, techniques, and tools to rapidly enable security in IoT/ICS products. Security Design The goals of security design are: developing a framework robust to most threats the product will see in its planned application, protecting what needs to be protected minimizing risk, minimizing complexity of the system so security can be tested/verified, specifying the security for implementation, and interfering as little as possible with system functionality. Rapid Start uses a simple security design philosophy based on five security principles: Trust, Separation, Least Privilege, CIA, and Secure Coding. A system design using these principles enables secure operation of an IoT/ICS system before, during, and after an attack. Trust Can computer code, a network device, or a file sent by be trusted? Does it come from a known, reputable source? Has it been shown to function properly? Will the organization that created it stand behind their work? Answering these types of questions determine how much trust there is data, code, or systems. Like most things in security, the trust determination is really a risk management decision. For a trusted system, the software that manages start-up, system configuration, security, monitoring, and safe operations must be trusted to reduce risk of it being affected by an attack. Developing trusted code can be expensive and may force rewriting available, running code. For a properly architected system, all software in the system does not need to be trusted enabling faster development and code reuse. However, this untrusted software may contain exploitable security vulnerabilities that could cause a security event (data breach, etc.). The trusted code must be separated from the untrusted code so that exploiting the untrusted code does not gain access to security critical data, control critical system functions, or contaminate the system the interfering with operation of the trusted code. Separation A fundamental concept in security is that the more complex a system is the less likely it is to be secure. Larger codebases have more opportunities to contain vulnerabilities. Complex the networks/protocol are the more opportunities for unsecure configurations or unsecured accesses. Most importantly, more complex systems make it harder to validate the security so the real security risk is unknown. The concept of Separation is a method to manage complexity. Instead of a single, large grouping of functions, data, or networks running in a single, fully connected environment, Separation attempts to more related functions to different environments and provide isolation between environments. A common computing that enforces Separation is Virtualization. The Virtual Machines are isolated form each other by Page 2

4 a Hypervisor. The more Trusted the Hypervisor, the more reliable the isolation. Modern Operating Systems (OS) have been used as Hypervisors and, if properly configured, can enforce Separation and Least Privilege (discussed next) needed for IoT/ICS. Secure system architecture design separates the trusted and untrusted processes, networks, I/O, and other functions and rigorously controls any interfaces between them. Architectural separation is not feasible all of the time. Some sharing of resources by trusted and untrusted processes is inevitable. In the shared case, focus must be on limiting the risk that the untrusted functions will interfere with the secure operation of the trusted functions. Least Privilege An important security concept is that the less access a user/device has to a system, the lower security risk they are. No Privilige would imply the highest security. Least Privilege is the compromise between maximizing security and enabling enough access for reliable operation. Security polices, access control, etc. in OS and security functions have restrictive options. To truly enforce Least Privilege, best practice is to start with the most restrictive configuration and to add the connectivity needed rather than start with full connectivity and take selected connectivity away. Operationally, most IT systems seek a compromise to keep users happy and not require excessive help desk tickets/approvals to add access. For an IoT/ICS applications, the access required is normally well established by design enabling effected Least Privilege configuration. Confidentiality, Integrity, and Availability Confidentiality, Integrity, and Availability (CIA) is a guiding principle in security. Confidentiality relates to protecting data from unauthorized actors from seeing it (i.e. encrypting a database containing private information). Integrity relates to assuring the data has not been corrupted and comes from the authorized source (i.e. a properly signed contract). Availability relates to having access to the information when it is needed (i.e. having the correct password to access the data). The goals of these principles can conflict (ex. All system passwords were reset to protect data confidentiality and now authorized users cannot access the data they need). For IoT/ICS applications, CIA should be considered carefully to ensure effective, reliable system operation. For example, not all data in these applications is confidential, but much of the data must have its integrity verified and be available. Erroneous CIA decisions can lead to poor, unreliable product performance. CIA is important to how IoT/ICS products interact with external trusted computers, networks, clouds, etc. Good security practice is to assume all data is invalid/malicious until checked by a trusted process and proven safe/correct. Focusing on verifying security and implementing protocols correctly will increase the security of the system. Secure Coding Writing trusted code is the same as writing high reliability code. The code is designed to meet a set of specific requirements, implemented using design standards, reviewed by group of peers, and tested to validate it meets the requirements. Like Safety, Security adds its own set of criteria that must be considered in the development process. Effective guidance is available to provide a starting point in secure code design [9], code review [10], and testing [11] including use of Automated Testing. These best practices are adaptable to an organizations preference for Waterfall or Agile [12] process. The security specific activities can be part of a Secure Design Lifecycle Processes (SDLC) such as the Microsoft SDL [13]. Depending on the level of security required, the risk tolerance for the organization, and the threats in an application, the rigor of the SDLC implementation is adjusted to fit the product needs. A Page 3

5 security guidance based approach incorporated with a reasonably rigorous, established software development process will perform the same function as an SDLC for most IoT/ICS applications. The security design philosophy discussed limits the amount of trusted code through good architectural decisions. Trusted code is needed to boot and configure/update the system correctly. During normal operations, trusted code performs security critical functions, monitoring, and configuration changes. During an attack, trusted code provides a trusted fallback mode for safe, minimum operations and/or shutdown. and fix/resolve the issues that lead to the higher risk areas. The use of automated testing tools has become best practice in software design. The ability of these tools to provide reliable coverage and detection of coding problems make them an excellent investment if used correctly and the issues found fixed. Static Analysis Tools are used to test source code when it is not executing. A good starting point for Static Analysis for trusted code and a good compromise to improve untrusted code security quickly is to focus on common security coding issues. The Common Weakness Enumeration program discussed earlier maintains a CWE Compatibility Program [14] with a list of available products that detect issues related to the CWE database. Secmation Rapid Start The Secmation Rapid Start uses principles presented in this white paper to enable development of secure products. It is targeted towards the specific needs of Automation, Internet of Things (IoT), Industrial Control Systems (ICS), Supervisory Control and Data Acquisition (SCADA), and other Embedded Security applications that communicate with Cloud services. The Secmation Rapid Start is a collection of lightweight processes and best practices that: Untrusted functions make up the majority of the code in most applications. The untrusted code can perform functions such as operator interfaces, data reduction, control algorithms, etc. that can be very complex and utilize significant system resources. Much of this code can be pre-existing, open source, and/or of variable quality. The goal of the security design is to protect these untrusted functions from attack. However, some attacks can get through the defenses provided and, at least initially, not be detected. It is difficult and expensive in many applications to start over and develop/re-develop the code in these untrusted functions with the same rigor as trusted code. An effective compromise is to target the most common security issues (i.e. from the CWE/SANS top 25), prioritize the issues found by risk to the system, Enables IoT/Embedded product developers to rapidly implement the level of security that their applications require Provides actionable tasks to implement security, not general process guidance Focuses the product team on development instead of becoming security experts Launches secure products now with path to grow to full Security Design Lifecycle Process The Rapid Start steps that guide the development team in designing, implementing, testing, releasing and maintaining product security are summarized next. The full Rapid Start available from Secmation includes specific, actionable guidance on how the steps can be performed effectively. Page 4

6 Determine What Needs to be Protected and Identify Risks Rely on industry guidance, security providers, and customer requirements to define most security requirements. Use Risk Management process to identify security risks and plan to mitigate them. Keep focus on unacceptable security risks that will stop/delay product launch. Perform limited threat modeling on selected high-risk areas to refine security requirements and assist design process. Design Architecture Based on Simple Security Principles and Properly Configured OS Determine security critical/trusted functions and separate from untrusted functions to simplify system security design. Design I/O and Network topology to maintain separation between critical and non-critical functions. Specify restrictive interfaces between trusted and untrusted functions Harden the Operating System using available security guidance to enable security features and enforce separation. Start with maximum-security settings (e.g. mandatory access control, least privilege) and only lower them when absolutely required for system operation. Build Small Trusted Codebase to Protect Interfaces and Fight Through Attack Developed trusted code is required to implement security critical functions, basic safety systems, minimum operating capability to use if attacked, and protect interfaces between trusted and untrusted code/network. Focus internal resources on product specific elements (safety, minimum operations, specific interfaces). Adopt and use a minimum set of best coding practices, perform code review, and use static analysis tools for unit testing. Outsource security critical functions to experts. Keep product team s focus on launching the product, not developing security expertise. Specify what security critical functions the product needs and purchase existing/contract development for required code. Fix Normally Occurring Security Issues in Existing Code using Automated Tools For an existing codebase the product needs that will not be part of trusted functions, focus on fixing the primary causes of security problems. Goal is to reduce an attackers capability to contaminate a system resources shared with trusted code (e.g. memory) through a successful attack Use automated static analysis tools pre-programmed to rapidly identify the common security issues, prioritize the identified areas to fix, and update Perform Security Testing Focused High Risks using Automated Tools/External Resources Design test plan focusing on unacceptable product security risks with would delay launch. Prioritize other security testing on a cost/risk basis. Integrate system and ensure functionality is operating properly with minimal/no security active. Place under configuration control. Perform security testing using automated dynamic testing tools including fuzzing. Outsource security penetration testing. Select outside testing firm with security expertise in product s application area. Using outside testing experts will find issues unanticipated by development team. Fix security issues found related to unacceptable risks that would stop launch. Prioritize other issues based on risk/cost. Develop Security Response/Maintenance Plan and Release Product Develop security maintenance plan to gather security operational data, collect security related issues, develop patches, and securely distribute updates. Develop security response plan to react to major security issues. Allocate trained response team, have basic code in place to diagnose/remediate, and develop communications plan. Hold final security review and brief management on any remaining security issues. Decision to release product is formal/informal acceptance of those remaining risks Page 5

7 How Secmation Can Help Secmation provides engineering, technology, and tools to add information security to new and existing products. We specialize in emerging security applications that are not well served by traditional IT solutions. Our goal is to demystify security design, manage/develop it like any other technology, and keep product teams focused on the success of their product. We are product developers first and security experts second. We understand the challenges product teams have and integrate with them providing our security experience to support a successful launch. Secmation provides the tools the product team needs to implement security with minimal overhead. Our experts have experience in: secure systems engineering, security architecture, secure software and hardware design, implementation, testing, and support enabling us to assist the full product lifecycle. Secmation expertise can help get secure products launched now and provide a path towards improved security capability reducing time/cost of future products. Secmation provides Security Consulting Services Develop security requirements, provide alternatives for security solutions, evaluate security implementations, participate in design reviews, and assist in remediating security issues Security Architecture and Engineering Design security architectures, develop security specifications, develop security plans, develop secure code, and security testing Security Project Management Project plans, make/buy assistance, and vendor management Training Not general security certification or academic security courses. Targeted/customized technical, process, and tool training to get the product team familiar with best security practices. Proposal Development Sell security to senior management and customers. We Assist in proposal/business case strategy, implementation, review, and presentation. Contact Info For further information on Rapid Start or to discuss your secure product development needs, please visit Secmation s website at or send to info@secmation.com. Page 6

8 References/Links [1] Internet Security Risk Report Volume 20, Symantec, ort.jsp [2] Cyber Risk Report 2015, HP Security Research - [3] OWASP Internet of Things Top Ten Project - _Ten_Project [4] Internet of Things Research Study, HP, ENW [5] Guide to Industrial Control Systems (ICS) Security, NIST Special Publication , Rev 2, Final Public Draft - [6] ICS-Cert Monitor, DHS, January-April 2014 edition - cert.us-cert.gov/sites/default/files/monitors/ics- CERT_Monitor_%20Jan-April2014.pdf [7] CWE/SANS Top 25 Most Dangerous Software Errors - [8] Critical Security Controls, SANS Institute - [9] Fundamental Practices for Secure Code Development, Second Edition, SAFECode, [10] OWASP Code Review Project - _Project [11] OWASP Testing Project - [12] Practical Security Stories and Security Tasks for Agile Development Environments, SAFECode, y0712.pdf [13] Microsoft Security Development Lifecycle - [14] CWE Compatible Products and Services - Page 7

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security SYMANTEC: SECURITY ADVISORY SERVICES Symantec Security Advisory Services The World Leader in Information Security Knowledge, as the saying goes, is power. At Symantec we couldn t agree more. And when it

More information

90% of data breaches are caused by software vulnerabilities.

90% of data breaches are caused by software vulnerabilities. 90% of data breaches are caused by software vulnerabilities. Get the skills you need to build secure software applications Secure Software Development (SSD) www.ce.ucf.edu/ssd Offered in partnership with

More information

Product Security Program

Product Security Program Product Security Program An overview of Carbon Black s Product Security Program and Practices Copyright 2016 Carbon Black, Inc. All rights reserved. Carbon Black is a registered trademark of Carbon Black,

More information

Integrated Access Management Solutions. Access Televentures

Integrated Access Management Solutions. Access Televentures Integrated Access Management Solutions Access Televentures Table of Contents OVERCOMING THE AUTHENTICATION CHALLENGE... 2 1 EXECUTIVE SUMMARY... 2 2 Challenges to Providing Users Secure Access... 2 2.1

More information

SOLUTION BRIEF esentire Risk Advisory and Managed Prevention (RAMP)

SOLUTION BRIEF esentire Risk Advisory and Managed Prevention (RAMP) SOLUTION BRIEF esentire Risk Advisory and Managed Prevention (RAMP) Adaptive Cybersecurity at the Speed of Your Business Attackers Evolve. Risk is in Constant Fluctuation. Security is a Never-ending Cycle.

More information

Enhancing the Cybersecurity of Federal Information and Assets through CSIP

Enhancing the Cybersecurity of Federal Information and Assets through CSIP TECH BRIEF How BeyondTrust Helps Government Agencies Address Privileged Access Management to Improve Security Contents Introduction... 2 Achieving CSIP Objectives... 2 Steps to improve protection... 3

More information

Specialized Security Services, Inc. REDUCE RISK WITH CONFIDENCE. s3security.com

Specialized Security Services, Inc. REDUCE RISK WITH CONFIDENCE. s3security.com Specialized Security Services, Inc. REDUCE RISK WITH CONFIDENCE s3security.com Security Professional Services S3 offers security services through its Security Professional Services (SPS) group, the security-consulting

More information

Surprisingly Successful: What Really Works in Cyber Defense. John Pescatore, SANS

Surprisingly Successful: What Really Works in Cyber Defense. John Pescatore, SANS Surprisingly Successful: What Really Works in Cyber Defense John Pescatore, SANS 1 Largest Breach Ever 2 The Business Impact Equation All CEOs know stuff happens in business and in security The goal is

More information

RSA Solution Brief. Managing Risk Within Advanced Security Operations. RSA Solution Brief

RSA Solution Brief. Managing Risk Within Advanced Security Operations. RSA Solution Brief RSA Solution Brief Managing Risk Within Advanced Security Operations RSA Solution Brief How do you advance your security operations function? Increasingly sophisticated security threats and the growing

More information

The University of Queensland

The University of Queensland UQ Cyber Security Strategy 2017-2020 NAME: UQ Cyber Security Strategy DATE: 21/07/2017 RELEASE:0.2 Final AUTHOR: OWNER: CLIENT: Marc Blum Chief Information Officer Strategic Information Technology Council

More information

the SWIFT Customer Security

the SWIFT Customer Security TECH BRIEF Mapping BeyondTrust Solutions to the SWIFT Customer Security Controls Framework Privileged Access Management and Vulnerability Management Table of ContentsTable of Contents... 2 Purpose of This

More information

NEN The Education Network

NEN The Education Network NEN The Education Network School e-security Checklist This checklist sets out 20 e-security controls that, if implemented effectively, will help to ensure that school networks are kept secure and protected

More information

NSTB Assessments Summary Report: Common Industrial Control System Cyber Security Weaknesses

NSTB Assessments Summary Report: Common Industrial Control System Cyber Security Weaknesses INL/EXT-10-18381 NSTB Assessments Summary Report: Common Industrial Control System Cyber Security Weaknesses May 2010 The INL is a U.S. Department of Energy National Laboratory operated by Battelle Energy

More information

Best Practices in ICS Security for System Operators

Best Practices in ICS Security for System Operators Best Practices in ICS Security for System Operators Introduction Industrial automation and control systems have become increasingly connected to internal and external networks. This exposure has resulted

More information

IoT & SCADA Cyber Security Services

IoT & SCADA Cyber Security Services RIOT SOLUTIONS PTY LTD P.O. Box 10087 Adelaide St Brisbane QLD 4000 BRISBANE HEAD OFFICE Level 22, 144 Edward St Brisbane, QLD 4000 T: 1300 744 028 Email: sales@riotsolutions.com.au www.riotsolutions.com.au

More information

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data Kenna Platform Security A technical overview of the comprehensive security measures Kenna uses to protect your data V3.0, MAY 2017 Multiple Layers of Protection Overview Password Salted-Hash Thank you

More information

Meeting PCI DSS 3.2 Compliance with RiskSense Solutions

Meeting PCI DSS 3.2 Compliance with RiskSense Solutions Meeting PCI DSS 3.2 Compliance with Solutions Platform the industry s most comprehensive, intelligent platform for managing cyber risk. 2018, Inc. What s Changing with PCI DSS? Summary of PCI Business

More information

Medical Device Cybersecurity: FDA Perspective

Medical Device Cybersecurity: FDA Perspective Medical Device Cybersecurity: FDA Perspective Suzanne B. Schwartz MD, MBA Associate Director for Science and Strategic Partnerships Office of the Center Director (OCD) Center for Devices and Radiological

More information

IEEE Sec Dev Conference

IEEE Sec Dev Conference IEEE Sec Dev Conference #23, Improving Attention to Security in Software Design with Analytics and Cognitive Techniques Jim Whitmore (former) IBM Distinguished Engineer Carlisle, PA jjwhitmore@ieee.org

More information

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE EXECUTIVE SUMMARY ALIGNING CYBERSECURITY WITH RISK The agility and cost efficiencies

More information

8 Must Have. Features for Risk-Based Vulnerability Management and More

8 Must Have. Features for Risk-Based Vulnerability Management and More 8 Must Have Features for Risk-Based Vulnerability Management and More Introduction Historically, vulnerability management (VM) has been defined as the practice of identifying security vulnerabilities in

More information

Building Trustworthiness The Evolution of Secure Development. Glenn Pittaway and Alex Lucas Trustworthy Computing, Microsoft Corporation

Building Trustworthiness The Evolution of Secure Development. Glenn Pittaway and Alex Lucas Trustworthy Computing, Microsoft Corporation Building Trustworthiness The Evolution of Secure Development Glenn Pittaway and Alex Lucas Trustworthy Computing, Microsoft Corporation Goals Provide an understanding of the Microsoft view of security

More information

Control Systems Cyber Security Awareness

Control Systems Cyber Security Awareness Control Systems Cyber Security Awareness US-CERT Informational Focus Paper July 7, 2005 Produced by: I. Purpose Focus Paper Control Systems Cyber Security Awareness The Department of Homeland Security

More information

Internet Scanner 7.0 Service Pack 2 Frequently Asked Questions

Internet Scanner 7.0 Service Pack 2 Frequently Asked Questions Frequently Asked Questions Internet Scanner 7.0 Service Pack 2 Frequently Asked Questions April 2005 6303 Barfield Road Atlanta, GA 30328 Tel: 404.236.2600 Fax: 404.236.2626 Internet Security Systems (ISS)

More information

Borderless security engineered for your elastic hybrid cloud. Kaspersky Hybrid Cloud Security. #truecybersecurity

Borderless security engineered for your elastic hybrid cloud. Kaspersky Hybrid Cloud Security.  #truecybersecurity Borderless security engineered for your elastic hybrid cloud Kaspersky Hybrid Cloud Security www.kaspersky.com #truecybersecurity Borderless security engineered for your hybrid cloud environment Data

More information

McAfee epolicy Orchestrator

McAfee epolicy Orchestrator McAfee epolicy Orchestrator Centrally get, visualize, share, and act on security insights Security management requires cumbersome juggling between tools and data. This puts the adversary at an advantage

More information

OWASP InfoSec Romania 2013

OWASP InfoSec Romania 2013 OWASP InfoSec Romania 2013 Secure Development Lifecycle, The good, the bad and the ugly! October 25 th 2013 Martin Knobloch OWASP Netherlands Chapter Leader Applications are about information! 3 pillars

More information

Protect Your Organization from Cyber Attacks

Protect Your Organization from Cyber Attacks Protect Your Organization from Cyber Attacks Leverage the advanced skills of our consultants to uncover vulnerabilities our competitors overlook. READY FOR MORE THAN A VA SCAN? Cyber Attacks by the Numbers

More information

Engineering Your Software For Attack

Engineering Your Software For Attack Engineering Your Software For Attack Robert A. Martin Senior Principal Engineer Cyber Security Center Center for National Security The MITRE Corporation 2013 The MITRE Corporation. All rights reserved.

More information

Department of Management Services REQUEST FOR INFORMATION

Department of Management Services REQUEST FOR INFORMATION RESPONSE TO Department of Management Services REQUEST FOR INFORMATION Cyber-Security Assessment, Remediation, and Identity Protection, Monitoring, and Restoration Services September 3, 2015 250 South President

More information

The Center for Internet Security

The Center for Internet Security The Center for Internet Security The CIS Security Metrics Service July 1 2008 Organizations struggle to make cost-effective security investment decisions; information security professionals lack widely

More information

Automating the Top 20 CIS Critical Security Controls

Automating the Top 20 CIS Critical Security Controls 20 Automating the Top 20 CIS Critical Security Controls SUMMARY It s not easy being today s CISO or CIO. With the advent of cloud computing, Shadow IT, and mobility, the risk surface area for enterprises

More information

Implementing Your BYOD Mobility Strategy An IT Checklist and Guide

Implementing Your BYOD Mobility Strategy An IT Checklist and Guide Implementing Your BYOD Mobility Strategy An IT Checklist and Guide 2012 Enterproid IBYOD: 120221 Content 1. Overview... 1 2. The BYOD Checklist... 1 2.1 Application Choice... 1 2.2 Installation and Configuration...

More information

Software Architectural Risk Analysis (SARA): SSAI Roadmap

Software Architectural Risk Analysis (SARA): SSAI Roadmap Software Architectural Risk Analysis (SARA): SSAI Roadmap Frédéric Painchaud DRDC Valcartier / Systems of Systems November 2010 Agenda Introduction Software Architectural Risk Analysis Linking to SSAI

More information

Accelerate Your Enterprise Private Cloud Initiative

Accelerate Your Enterprise Private Cloud Initiative Cisco Cloud Comprehensive, enterprise cloud enablement services help you realize a secure, agile, and highly automated infrastructure-as-a-service (IaaS) environment for cost-effective, rapid IT service

More information

A Government Health Agency Trusts Tenable to Protect Patient Data and Manage Expanding Attack Surface

A Government Health Agency Trusts Tenable to Protect Patient Data and Manage Expanding Attack Surface A Government Health Agency Trusts Tenable to Protect Patient Data and Manage Expanding Attack Surface ORGANIZATION SNAPSHOT The level of visibility Tenable.io provides is phenomenal, something we just

More information

Continuous protection to reduce risk and maintain production availability

Continuous protection to reduce risk and maintain production availability Industry Services Continuous protection to reduce risk and maintain production availability Managed Security Service Answers for industry. Managing your industrial cyber security risk requires world-leading

More information

Carbon Black PCI Compliance Mapping Checklist

Carbon Black PCI Compliance Mapping Checklist Carbon Black PCI Compliance Mapping Checklist The following table identifies selected PCI 3.0 requirements, the test definition per the PCI validation plan and how Carbon Black Enterprise Protection and

More information

Achieving End-to-End Security in the Internet of Things (IoT)

Achieving End-to-End Security in the Internet of Things (IoT) Achieving End-to-End Security in the Internet of Things (IoT) Optimize Your IoT Services with Carrier-Grade Cellular IoT June 2016 Achieving End-to-End Security in the Internet of Things (IoT) Table of

More information

RiskSense Attack Surface Validation for IoT Systems

RiskSense Attack Surface Validation for IoT Systems RiskSense Attack Surface Validation for IoT Systems 2018 RiskSense, Inc. Surfacing Double Exposure Risks Changing Times and Assessment Focus Our view of security assessments has changed. There is diminishing

More information

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO White Paper Incentives for IoT Security May 2018 Author: Dr. Cédric LEVY-BENCHETON, CEO Table of Content Defining the IoT 5 Insecurity by design... 5 But why are IoT systems so vulnerable?... 5 Integrating

More information

Security Solutions. Overview. Business Needs

Security Solutions. Overview. Business Needs Security Solutions Overview Information security is not a one time event. The dynamic nature of computer networks mandates that examining and ensuring information security be a constant and vigilant effort.

More information

Why Crowdsourced Security?

Why Crowdsourced Security? Why Crowdsourced Security? Highlights There is a fundamental imbalance between the creativity and motivations of cyber attackers, and those of enterprise security defenders. rowdsourced Security is a powerful

More information

Achieving Java Application Security With Parasoft Jtest

Achieving Java Application Security With Parasoft Jtest Achieving Java Application Security With Parasoft Jtest Cloud computing continues to gain traction as enterprises increasingly embrace the shift to Internet-based environments. Unfortunately, this also

More information

STUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences

STUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences STUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences Undergraduate Programs - Bachelor B.S. Computer Game Design Upon completion of the B.S. degree in Computer Game Design, students

More information

May 14, :30PM to 2:30PM CST. In Plain English: Cybersecurity and IT Exam Expectations

May 14, :30PM to 2:30PM CST. In Plain English: Cybersecurity and IT Exam Expectations May 14, 2018 1:30PM to 2:30PM CST In Plain English: Cybersecurity and IT Exam Expectations Options to Join Webinar and audio Click on the link: https://www.webcaster4.com/webcast/page/584/24606 Choose

More information

NERC CIP VERSION 6 BACKGROUND COMPLIANCE HIGHLIGHTS

NERC CIP VERSION 6 BACKGROUND COMPLIANCE HIGHLIGHTS NERC CIP VERSION 6 COMPLIANCE BACKGROUND The North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP) Reliability Standards define a comprehensive set of requirements

More information

Addressing Cybersecurity in Infusion Devices

Addressing Cybersecurity in Infusion Devices Addressing Cybersecurity in Infusion Devices Authored by GEORGE W. GRAY Chief Technology Officer / Vice President of Research & Development Ivenix, Inc. INTRODUCTION Cybersecurity has become an increasing

More information

ДОБРО ПОЖАЛОВАТЬ SIEMENS AG ENERGY MANAGEMENT

ДОБРО ПОЖАЛОВАТЬ SIEMENS AG ENERGY MANAGEMENT ДОБРО ПОЖАЛОВАТЬ SIEMENS AG ENERGY MANAGEMENT ENERGY AUTOMATION - SMART GRID Restricted Siemens AG 20XX All rights reserved. siemens.com/answers Frederic Buchi, Energy Management Division, Siemens AG Cyber

More information

Paper. Delivering Strong Security in a Hyperconverged Data Center Environment

Paper. Delivering Strong Security in a Hyperconverged Data Center Environment Paper Delivering Strong Security in a Hyperconverged Data Center Environment Introduction A new trend is emerging in data center technology that could dramatically change the way enterprises manage and

More information

CYBER SECURITY AIR TRANSPORT IT SUMMIT

CYBER SECURITY AIR TRANSPORT IT SUMMIT CYBER SECURITY AIR TRANSPORT IT SUMMIT SHARING GOOD PRACTICES VIVIEN EBERHARDT, SITA CYBER SECURITY CYBER SECURITY AIR TRANSPORT IT SUMMIT SHARING GOOD PRACTICES VIVIEN EBERHARDT, SITA CYBER SECURITY CYBER

More information

EXPERT SERVICES FOR IoT CYBERSECURITY AND RISK MANAGEMENT. An Insight Cyber White Paper. Copyright Insight Cyber All rights reserved.

EXPERT SERVICES FOR IoT CYBERSECURITY AND RISK MANAGEMENT. An Insight Cyber White Paper. Copyright Insight Cyber All rights reserved. EXPERT SERVICES FOR IoT CYBERSECURITY AND RISK MANAGEMENT An Insight Cyber White Paper Copyright Insight Cyber 2018. All rights reserved. The Need for Expert Monitoring Digitization and external connectivity

More information

RSA RISK FRAMEWORKS MAKING DIGITAL RISK MANAGEABLE

RSA RISK FRAMEWORKS MAKING DIGITAL RISK MANAGEABLE WHITEPAPER RSA RISK FRAMEWORKS MAKING DIGITAL RISK MANAGEABLE CONTENTS Executive Summary........................................ 3 Transforming How We Think About Security.......................... 4 Assessing

More information

Influence and Implementation

Influence and Implementation Influence and Implementation Wes Earnest April 2017 GSEC/GCIA/GCIH/ GWAPT/GPEN/GCCC/GSNA/ PMP/CISA/CISM/CGEIT SANS Technology Institute - Candidate for Master of Science Degree 1 1 Objective What does

More information

Ensuring System Protection throughout the Operational Lifecycle

Ensuring System Protection throughout the Operational Lifecycle Ensuring System Protection throughout the Operational Lifecycle The global cyber landscape is currently occupied with a diversity of security threats, from novice attackers running pre-packaged distributed-denial-of-service

More information

ISO COMPLIANCE GUIDE. How Rapid7 Can Help You Achieve Compliance with ISO 27002

ISO COMPLIANCE GUIDE. How Rapid7 Can Help You Achieve Compliance with ISO 27002 ISO 27002 COMPLIANCE GUIDE How Rapid7 Can Help You Achieve Compliance with ISO 27002 A CONTENTS Introduction 2 Detailed Controls Mapping 3 About Rapid7 8 rapid7.com ISO 27002 Compliance Guide 1 INTRODUCTION

More information

Software Architectural Risk Analysis (SARA) Frédéric Painchaud Robustness and Software Analysis Group

Software Architectural Risk Analysis (SARA) Frédéric Painchaud Robustness and Software Analysis Group Software Architectural Risk Analysis (SARA) Frédéric Painchaud Robustness and Software Analysis Group Defence Research and Development Canada Recherche et développement pour la défense Canada Canada Agenda

More information

Mapping Your Requirements to the NIST Cybersecurity Framework. Industry Perspective

Mapping Your Requirements to the NIST Cybersecurity Framework. Industry Perspective Mapping Your Requirements to the NIST Cybersecurity Framework Industry Perspective 1 Quest has the solutions and services to help your organization identify, protect, detect, respond and recover, better

More information

High-Assurance Cyber Space Systems (HACSS) for Small Satellite Mission Integrity

High-Assurance Cyber Space Systems (HACSS) for Small Satellite Mission Integrity Distribution A: SSC17-V-01 High-Assurance Cyber Space Systems (HACSS) for Small Satellite Mission Integrity Daria C. Lane, Enrique S. Leon, Francisco C. Tacliad, Dexter H. Solio, Ian L. Rodney, Dmitriy

More information

OWASP Top 10 The Ten Most Critical Web Application Security Risks

OWASP Top 10 The Ten Most Critical Web Application Security Risks OWASP Top 10 The Ten Most Critical Web Application Security Risks The Open Web Application Security Project (OWASP) is an open community dedicated to enabling organizations to develop, purchase, and maintain

More information

NCSF Foundation Certification

NCSF Foundation Certification NCSF Foundation Certification Overview This ACQUIROS accredited training program is targeted at IT and Cybersecurity professionals looking to become certified on how to operationalize the NIST Cybersecurity

More information

Five Steps to Improving Security in Embedded Systems

Five Steps to Improving Security in Embedded Systems AN INTEL COMPANY Five Steps to Improving Security in Embedded Systems WHEN IT MATTERS, IT RUNS ON WIND RIVER EXECUTIVE SUMMARY Headline-grabbing security breaches underscore the need for stronger protective

More information

MOBILE OPERATING SYSTEM TRANSITION Insights and Considerations

MOBILE OPERATING SYSTEM TRANSITION Insights and Considerations MOBILE OPERATING SYSTEM TRANSITION Insights and Considerations Mobile Operating System Transition Insights and Considerations www.honeywellaidc.com 1 Introduction A shift in the mobile operating system

More information

The Key Principles of Cyber Security for Connected and Automated Vehicles. Government

The Key Principles of Cyber Security for Connected and Automated Vehicles. Government The Key Principles of Cyber Security for Connected and Automated Vehicles Government Contents Intelligent Transport System (ITS) & Connected and Automated Vehicle (CAV) System Security Principles: 1. Organisational

More information

THE EFFECTIVE APPROACH TO CYBER SECURITY VALIDATION BREACH & ATTACK SIMULATION

THE EFFECTIVE APPROACH TO CYBER SECURITY VALIDATION BREACH & ATTACK SIMULATION BREACH & ATTACK SIMULATION THE EFFECTIVE APPROACH TO CYBER SECURITY VALIDATION Cymulate s cyber simulation platform allows you to test your security assumptions, identify possible security gaps and receive

More information

align security instill confidence

align security instill confidence align security instill confidence cyber security Securing data has become a top priority across all industries. High-profile data breaches and the proliferation of advanced persistent threats have changed

More information

Cyber Security For Business

Cyber Security For Business Cyber Security For Business In today s hostile digital environment, the importance of securing your data and technology cannot be overstated. From customer assurance, liability mitigation, and even your

More information

You knew the job was dangerous when you took it! Defending against CS malware

You knew the job was dangerous when you took it! Defending against CS malware You knew the job was dangerous when you took it! Defending against CS malware Presented By: Doug Cavit Microsoft Where PI geeks meet 9/23/2010 NERC HILF 6/10 Adequately addressing vulnerabilities will

More information

INFORMATION SECURITY. One line heading. > One line subheading. A briefing on the information security controls at Computershare

INFORMATION SECURITY. One line heading. > One line subheading. A briefing on the information security controls at Computershare INFORMATION SECURITY A briefing on the information security controls at Computershare One line heading > One line subheading INTRODUCTION Information is critical to all of our clients and is therefore

More information

Cybersecurity in Government

Cybersecurity in Government Cybersecurity in Government Executive Development Course: Digital Government Ng Lup Houh, Principal Cybersecurity Specialist Cybersecurity Group 03 April 2018 Agenda Cyber Threats & Vulnerabilities Cyber

More information

Technical Conference on Critical Infrastructure Protection Supply Chain Risk Management

Technical Conference on Critical Infrastructure Protection Supply Chain Risk Management Technical Conference on Critical Infrastructure Protection Supply Chain Risk Management Remarks of Marcus Sachs, Senior Vice President and the Chief Security Officer North American Electric Reliability

More information

Students should have an understanding and a working knowledge in the following topics, or attend these courses as a pre-requisite:

Students should have an understanding and a working knowledge in the following topics, or attend these courses as a pre-requisite: Secure Java Web Application Development Lifecycle - SDL (TT8325-J) Day(s): 5 Course Code: GK1107 Overview Secure Java Web Application Development Lifecycle (SDL) is a lab-intensive, hands-on Java / JEE

More information

Presented by Ingrid Fredeen and Pamela Passman. Copyright 2017NAVEXGlobal,Inc. AllRightsReserved. Page 0

Presented by Ingrid Fredeen and Pamela Passman. Copyright 2017NAVEXGlobal,Inc. AllRightsReserved. Page 0 Cyber Security and Inside Threats: Turning Policies into Practices Presented by Ingrid Fredeen and Pamela Passman Copyright 2017NAVEXGlobal,Inc. AllRightsReserved. Page 0 Presented By Ingrid Fredeen, J.D.

More information

Unit Level Secure by Design Approach

Unit Level Secure by Design Approach Unit Level Secure by Design Approach Abstract Authors: Vasantharaju MS & Joshua Cajetan Rebelo Vasantharaju_MS@McAfee.com Joshua.Rebelo@Siemens.com With cyber-attacks on the rise and high-profile breaches

More information

McAFEE PROFESSIONAL SERVICES. Unisys ClearPath OS 2200 Security Assessment White Paper

McAFEE PROFESSIONAL SERVICES. Unisys ClearPath OS 2200 Security Assessment White Paper McAFEE PROFESSIONAL SERVICES Unisys ClearPath OS 2200 Security Assessment White Paper Prepared for Unisys Corporation April 25, 2017 Table of Contents Executive Summary... 3 ClearPath Forward OS 2200 Summary...

More information

Secure Development Lifecycle

Secure Development Lifecycle Secure Development Lifecycle Strengthening Cisco Products The Cisco Secure Development Lifecycle (SDL) is a repeatable and measurable process designed to increase Cisco product resiliency and trustworthiness.

More information

Cybersecurity-Related Information Sharing Guidelines Draft Document Request For Comment

Cybersecurity-Related Information Sharing Guidelines Draft Document Request For Comment Cybersecurity-Related Information Sharing Guidelines Draft Document Request For Comment SWG G 3 2016 v0.2 ISAO Standards Organization Standards Working Group 3: Information Sharing Kent Landfield, Chair

More information

Gaps in Resources, Risk and Visibility Weaken Cybersecurity Posture

Gaps in Resources, Risk and Visibility Weaken Cybersecurity Posture February 2019 Challenging State of Vulnerability Management Today: Gaps in Resources, Risk and Visibility Weaken Cybersecurity Posture In the last two years, businesses and governments have seen data breaches

More information

locuz.com SOC Services

locuz.com SOC Services locuz.com SOC Services 1 Locuz IT Security Lifecycle services combine people, processes and technologies to provide secure access to business applications, over any network and from any device. Our security

More information

SDLC Maturity Models

SDLC Maturity Models www.pwc.com SDLC Maturity Models SecAppDev 2017 Bart De Win Bart De Win? 20 years of Information Security Experience Ph.D. in Computer Science - Application Security Author of >60 scientific publications

More information

NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS

NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS Scope and Applicability: These Network and Certificate System Security Requirements (Requirements) apply to all publicly trusted Certification Authorities

More information

deep (i) the most advanced solution for managed security services

deep (i) the most advanced solution for managed security services deep (i) the most advanced solution for managed security services TM deep (i) suite provides unparalleled threat intelligence and incident response through cutting edge Managed Security Services Cybersecurity

More information

Advanced Cyber Risk Management Threat Modeling & Cyber Wargaming April 23, 2018

Advanced Cyber Risk Management Threat Modeling & Cyber Wargaming April 23, 2018 Advanced Cyber Risk Management Threat Modeling & Cyber Wargaming April 23, 2018 The Homeland Security Systems Engineering and Development Institute (HSSEDI ) is a trademark of the U.S. Department of Homeland

More information

Gujarat Forensic Sciences University

Gujarat Forensic Sciences University Gujarat Forensic Sciences University Knowledge Wisdom Fulfilment Cyber Security Consulting Services Secure Software Engineering Infrastructure Security Digital Forensics SDLC Assurance Review & Threat

More information

Future Challenges and Changes in Industrial Cybersecurity. Sid Snitkin VP Cybersecurity Services ARC Advisory Group

Future Challenges and Changes in Industrial Cybersecurity. Sid Snitkin VP Cybersecurity Services ARC Advisory Group Future Challenges and Changes in Industrial Cybersecurity Sid Snitkin VP Cybersecurity Services ARC Advisory Group Srsnitkin@ARCweb.com Agenda Industrial Cybersecurity Today Scope, Assumptions and Strategies

More information

IT SECURITY FOR NONPROFITS

IT SECURITY FOR NONPROFITS IT SECURITY FOR NONPROFITS COMMUNITY IT INNOVATORS PLAYBOOK April 2016 Community IT Innovators 1101 14th Street NW, Suite 830 Washington, DC 20005 The challenge for a nonprofit organization is to develop

More information

Internet of Things. Internet of Everything. Presented By: Louis McNeil Tom Costin

Internet of Things. Internet of Everything. Presented By: Louis McNeil Tom Costin Internet of Things Internet of Everything Presented By: Louis McNeil Tom Costin Agenda Session Topics What is the IoT (Internet of Things) Key characteristics & components of the IoT Top 10 IoT Risks OWASP

More information

Firewalls (IDS and IPS) MIS 5214 Week 6

Firewalls (IDS and IPS) MIS 5214 Week 6 Firewalls (IDS and IPS) MIS 5214 Week 6 Agenda Defense in Depth Evolution of IT risk in automated control systems Security Domains Where to put firewalls in an N-Tier Architecture? In-class exercise Part

More information

SOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT

SOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT RSA ARCHER IT & SECURITY RISK MANAGEMENT INTRODUCTION Organizations battle growing security challenges by building layer upon layer of defenses: firewalls, antivirus, intrusion prevention systems, intrusion

More information

Building Resilience in a Digital Enterprise

Building Resilience in a Digital Enterprise Building Resilience in a Digital Enterprise Top five steps to help reduce the risk of advanced targeted attacks To be successful in business today, an enterprise must operate securely in the cyberdomain.

More information

McAfee Embedded Control

McAfee Embedded Control McAfee Embedded Control System integrity, change control, and policy compliance in one solution for integrated control systems McAfee Embedded Control for integrated control systems (ICSs) maintains the

More information

Jim Reavis CEO and Founder Cloud Security Alliance December 2017

Jim Reavis CEO and Founder Cloud Security Alliance December 2017 CLOUD THREAT HUNTING Jim Reavis CEO and Founder Cloud Security Alliance December 2017 A B O U T T H E BUILDING SECURITY BEST PRACTICES FOR NEXT GENERATION IT C L O U D S E C U R I T Y A L L I A N C E GLOBAL,

More information

Completing your AWS Cloud SECURING YOUR AMAZON WEB SERVICES ENVIRONMENT

Completing your AWS Cloud SECURING YOUR AMAZON WEB SERVICES ENVIRONMENT Completing your AWS Cloud SECURING YOUR AMAZON WEB SERVICES ENVIRONMENT Introduction Amazon Web Services (AWS) provides Infrastructure as a Service (IaaS) cloud offerings for organizations. Using AWS,

More information

Samu Konttinen, CEO Q3 / 2017 CORPORATE SECURITY REVENUE UP BY 11% - GOOD GROWTH CONTINUED

Samu Konttinen, CEO Q3 / 2017 CORPORATE SECURITY REVENUE UP BY 11% - GOOD GROWTH CONTINUED Samu Konttinen, CEO Q3 / 2017 CORPORATE SECURITY REVENUE UP BY 11% - GOOD GROWTH CONTINUED 1 AGENDA Key takeaways from Q3 Key figures Business updates Outlook Financials FAQ All figures refer to continuing

More information

10 FOCUS AREAS FOR BREACH PREVENTION

10 FOCUS AREAS FOR BREACH PREVENTION 10 FOCUS AREAS FOR BREACH PREVENTION Keith Turpin Chief Information Security Officer Universal Weather and Aviation Why It Matters Loss of Personally Identifiable Information (PII) Loss of Intellectual

More information

BUILDING APPLICATION SECURITY INTO PRODUCTION CONTAINER ENVIRONMENTS Informed by the National Institute of Standards and Technology

BUILDING APPLICATION SECURITY INTO PRODUCTION CONTAINER ENVIRONMENTS Informed by the National Institute of Standards and Technology BUILDING APPLICATION SECURITY INTO PRODUCTION CONTAINER ENVIRONMENTS Informed by the National Institute of Standards and Technology ebook BUILDING APPLICATION SECURITY INTO PRODUCTION CONTAINER ENVIRONMENTS

More information

Jeff Wilbur VP Marketing Iconix

Jeff Wilbur VP Marketing Iconix 2016 Data Protection & Breach Readiness Guide February 3, 2016 Craig Spiezle Executive Director & President Online Trust Alliance Jeff Wilbur VP Marketing Iconix 1 Who is OTA? Mission to enhance online

More information

A Supply Chain Attack Framework to Support Department of Defense Supply Chain Security Risk Management

A Supply Chain Attack Framework to Support Department of Defense Supply Chain Security Risk Management A Supply Chain Attack Framework to Support Department of Defense Supply Chain Security Risk Management D r. J o h n F. M i l l e r T h e M I T R E C o r p o r a t i o n P e t e r D. K e r t z n e r T h

More information

PRACTICAL SECURITY PRINCIPLES FOR THE WORKING ARCHITECT. Eoin Woods,

PRACTICAL SECURITY PRINCIPLES FOR THE WORKING ARCHITECT. Eoin Woods, PRACTICAL SECURITY PRINCIPLES FOR THE WORKING ARCHITECT Eoin Woods, Endava @eoinwoodz BACKGROUND Eoin Woods CTO at Endava (technology services, ~4000 people) 10 years in product development - Bull, Sybase,

More information

ISAO SO Product Outline

ISAO SO Product Outline Draft Document Request For Comment ISAO SO 2016 v0.2 ISAO Standards Organization Dr. Greg White, Executive Director Rick Lipsey, Deputy Director May 2, 2016 Copyright 2016, ISAO SO (Information Sharing

More information