SlideShare a Scribd company logo
Aspect Security | 9175 Guilford Road, Suite 300 | Columbia, MD 21046 | www.aspectsecurity.com
Achieving Visible Security at Scale with
the NIST Cybersecurity Framework
SRCE Workshop
Atlanta, GA
Nov 17, 2015
Application security that just works
ABOUT US
KEVIN FEALEY
Principal Consultant & Practice Lead
Automation & Integration Services
7 years Cybersec experience, @secfealz
©2015 Aspect Security. All Rights Reserved 2
TONY MILLER
Principal Consultant & Practice Lead
Application Program Services
10 years Cybersec experience, @tjmmgd
Application security that just works
ABOUT YOU
Government, Private Sector?
AppSec Team, Risk Managers?
Used Cybersecurity Framework?
©2015 Aspect Security. All Rights Reserved 3
Application security that just works
APPLICATION SECURITY VS. NETWORK SECURITY
©2015 Aspect Security. All Rights Reserved 4
Application Layer
– Attacker sends attacks inside
valid HTTP requests.
– Custom code is tricked into
doing something it should not.
– Security requires software
development expertise, not
signatures.
Network Layer
– Firewall, hardening, patching,
IDS, and SSL/TLS cannot
detect or stop attacks inside
HTTP requests.
– Security relies on signature
databases.
Firewall
Firewall
Databases
LegacySystems
WebServices
Directories
HumanResrcs
Billing
Custom Code
APPLICATION
ATTACK
NetworkLayerApplicationLayer
Accounts
Finance
Administration
Transactions
Communication
KnowledgeMgmt
E-Commerce
Bus.Functions
Hardened OS
Web Server
App Server
Application security that just works
OWASP TOP TEN: COMMON VULNERABILITIES
©2015 Aspect Security. All Rights Reserved 5
1. Injection Flaws
2. Broken Account and
Session Management
3. Cross-Site Scripting Flaws
4. Direct Object References
5. Web/Application Server
Misconfigurations
6. Sensitive Data Exposure
7. Broken Access Control
8. Cross-Site Request Forgery
9. Using Components with
Known Vulnerabilities
10. Unvalidated Redirects and
Forwards
Application security that just works
STANDARD SDLC
Requirements
Design
DevelopTest
Maintain
©2015 Aspect Security. All Rights Reserved 6
Security
Testing
Application security that just works
CURRENT PIPELINE
©2015 Aspect Security. All Rights Reserved 7
Development Pipeline Security Pipeline Production Pipeline
Manual Security Activities
1-2 week
duration
Prone to
human error
Late in the
SDLC
Application security that just works
MANUAL SECURITY REVIEWS
©2015 Aspect Security. All Rights Reserved 8
Development
Security
Testing
Production
Business
Stakeholders
Risks
Application security that just works
FUTURE PIPELINE (IE. WHAT IS APPSEC AUTOMATION?)
Automate:
©2015 Aspect Security. All Rights Reserved 9
Development Pipeline Security Pipeline Production Pipeline
Tasks that do not require security intelligence
Verification of security policies/requirements
Vulnerability testing
Correlation and reporting
Development, Security, and Operations collaborate early
and often
Application security that just works
APPSEC AUTOMATION PROGRAM DEPENDENCIES
•What are our assets?Application Inventory
•When is automated detection insufficient?Identify Risk Thresholds
•What do we expect from our assets?
Standard Security
Requirements
•How can we maximize our automation capabilities and
mitigate risk?
Common Security
Controls
•How will we support our developers?
Developer Training and
Support
•How will we prioritize and fix issues we identify?
Vulnerability
Management Program
•How will feedback be generated and integrated back?
Continuous
Improvement Process
©2015 Aspect Security. All Rights Reserved 10
Application security that just works
APPSEC AUTOMATION PROGRAM DEPENDENCIES
•What are our assets?Application Inventory
•When is automated detection insufficient?Identify Risk Thresholds
•What do we expect from our assets?
Standard Security
Requirements
•How can we maximize our automation capabilities and
mitigate risk?
Common Security
Controls
•How will we support our developers?
Developer Training and
Support
•How will we prioritize and fix issues we identify?
Vulnerability
Management Program
•How will feedback be generated and integrated back?
Continuous
Improvement Process
©2015 Aspect Security. All Rights Reserved 11
• How can we effectively scale our
security program to achieve business
goals at a more rapid pace?
AppSec
Automation
Program
Application security that just works
CYBERSECURITY FRAMEWORK 3.2
 Software Security Program Review
©2015 Aspect Security. All Rights Reserved 12
Define the
Scope
Analyze
Threats
Current
Capability
Assess Risks
and Gaps
Capability
Goals
Improvement
Initiatives
Execute
Initiatives
1 2
3 4 5
6 7
Application security that just works
TRADITIONAL SDLC
Requirements
Design
DevelopTest
Maintain
©2015 Aspect Security. All Rights Reserved 13
Dynamic
Application
Testing
Threat
Modeling
Architecture
/Design
Reviews
Static Code
Reviews
Periodic
Retesting
Application security that just works
CHALLENGES OF DEV-OPS/AGILE
Requirements & Design Phases
Hardly accommodated
Development to Deployment
Highly compressed timeframes
Traditional Testing Cycles
Can’t accommodate stunning speed
So, how do we integrate security?
©2015 Aspect Security. All Rights Reserved 14
Application security that just works
SECURE DEV-OPS/AGILE MODEL
Proactive Lifecycle Continuous Monitoring
Developer Training Local Security SME
Program
Operational Security
Team
Secure Code &
Architecture Standards
Targeted Security
Activities (small scope)
Risk-Based Security
Assurance Model
Standardized Security
Controls Components
Self-Service Model
Utilizing Automation
Feedback Loop Via
Stories/Features
©2015 Aspect Security. All Rights Reserved 15
Thank you!
©2015 Aspect Security. All Rights Reserved
Kevin Fealey & Tony Miller
Kevin.Fealey@aspectsecurity.com
Tony.Miller@aspectsecurity.com

More Related Content

What's hot (18)

PDF
Cybersecurity roadmap : Global healthcare security architecture
Priyanka Aash
 
PDF
NIST Cybersecurity Framework 101
Erick Kish, U.S. Commercial Service
 
PPTX
Cybersecurity Metrics: Reporting to BoD
Pranav Shah
 
PDF
Nist cybersecurity framework isc2 quantico
Tuan Phan
 
PPTX
Cybersecurity Frameworks and You: The Perfect Match
McKonly & Asbury, LLP
 
PDF
Intel Presentation from NIST Cybersecurity Framework Workshop 6
Phil Agcaoili
 
PPTX
Top 20 Security Controls for a More Secure Infrastructure
Infosec
 
PDF
CHIME Lead Forum - Seattle 2015
Health IT Conference – iHT2
 
PDF
Happiest Minds NIST CSF compliance Brochure
Suresh Kanniappan
 
PDF
Cybersecurity Framework - What are Pundits Saying?
Jim Meyer
 
PPTX
Cybersecurity Framework - Introduction
Muhammad Akbar Yasin
 
PDF
Accelerating OT - A Case Study
Digital Bond
 
PDF
For Critical Infrastructure Protection
Priyanka Aash
 
PPTX
Isaca career paths - the highest paying certifications in the industry
Infosec
 
PPTX
How to implement NIST cybersecurity standards in my organization
Exigent Technologies LLC
 
PPTX
Vulnerability Testing Services Case Study
Nandita Nityanandam
 
PPT
2008: Web Application Security Tutorial
Neil Matatall
 
PDF
Helping Utilities with Cybersecurity Preparedness: The C2M2
Smart Grid Interoperability Panel
 
Cybersecurity roadmap : Global healthcare security architecture
Priyanka Aash
 
NIST Cybersecurity Framework 101
Erick Kish, U.S. Commercial Service
 
Cybersecurity Metrics: Reporting to BoD
Pranav Shah
 
Nist cybersecurity framework isc2 quantico
Tuan Phan
 
Cybersecurity Frameworks and You: The Perfect Match
McKonly & Asbury, LLP
 
Intel Presentation from NIST Cybersecurity Framework Workshop 6
Phil Agcaoili
 
Top 20 Security Controls for a More Secure Infrastructure
Infosec
 
CHIME Lead Forum - Seattle 2015
Health IT Conference – iHT2
 
Happiest Minds NIST CSF compliance Brochure
Suresh Kanniappan
 
Cybersecurity Framework - What are Pundits Saying?
Jim Meyer
 
Cybersecurity Framework - Introduction
Muhammad Akbar Yasin
 
Accelerating OT - A Case Study
Digital Bond
 
For Critical Infrastructure Protection
Priyanka Aash
 
Isaca career paths - the highest paying certifications in the industry
Infosec
 
How to implement NIST cybersecurity standards in my organization
Exigent Technologies LLC
 
Vulnerability Testing Services Case Study
Nandita Nityanandam
 
2008: Web Application Security Tutorial
Neil Matatall
 
Helping Utilities with Cybersecurity Preparedness: The C2M2
Smart Grid Interoperability Panel
 

Viewers also liked (18)

PDF
NIST Cybersecurity Framework - Mindmap
WAJAHAT IQBAL
 
PPTX
NIST CyberSecurity Framework: An Overview
Tandhy Simanjuntak
 
PPTX
GRC– The Way Forward
Rochester Security Summit
 
PDF
Informe scsi 2012 sobre ciberseguridad
Pablo Heraklio
 
PDF
III Jornada de Ciberseguridad en Andalucía: Mesa redonda Ciberseguridad 4.0
Ingeniería e Integración Avanzadas (Ingenia)
 
PDF
Accountability for Corporate Cybersecurity - Who Owns What?
Henry Draughon
 
PDF
NIST Cybersecurity Framework Cross Reference
Jim Meyer
 
PPT
Ciberseguridad - monográfico
Ramon E. Zorrilla
 
PDF
Protegiendo el Negocio frente al Cumplimiento Legal
Joan Figueras Tugas
 
PDF
Visualization for Security
Raffael Marty
 
PPT
Ciberseguridad en empresas
Pedro De La Torre Rodríguez
 
PDF
Segurinfo colombia Estado de ciberseguridad en latinoamérica
Mateo Martinez
 
PDF
FDA Cybersecurity Recommendations to Comply with NIST - Wearables Crash Cours...
Epstein Becker Green
 
PPTX
Ciberseguridad
Grupo ALUCOM®
 
PPTX
06 Proyecto VISIR+ en la UNSE - DIEEC de la UNED - Modelo Educativo y Colabor...
Manuel Castro
 
PDF
Walk This Way: CIS CSC and NIST CSF is the 80 in the 80/20 rule
EnterpriseGRC Solutions, Inc.
 
PDF
Cybersecurity and Internet Governance
Kenny Huang Ph.D.
 
PDF
Effective Dashboard Design
Aaron Hursman
 
NIST Cybersecurity Framework - Mindmap
WAJAHAT IQBAL
 
NIST CyberSecurity Framework: An Overview
Tandhy Simanjuntak
 
GRC– The Way Forward
Rochester Security Summit
 
Informe scsi 2012 sobre ciberseguridad
Pablo Heraklio
 
III Jornada de Ciberseguridad en Andalucía: Mesa redonda Ciberseguridad 4.0
Ingeniería e Integración Avanzadas (Ingenia)
 
Accountability for Corporate Cybersecurity - Who Owns What?
Henry Draughon
 
NIST Cybersecurity Framework Cross Reference
Jim Meyer
 
Ciberseguridad - monográfico
Ramon E. Zorrilla
 
Protegiendo el Negocio frente al Cumplimiento Legal
Joan Figueras Tugas
 
Visualization for Security
Raffael Marty
 
Ciberseguridad en empresas
Pedro De La Torre Rodríguez
 
Segurinfo colombia Estado de ciberseguridad en latinoamérica
Mateo Martinez
 
FDA Cybersecurity Recommendations to Comply with NIST - Wearables Crash Cours...
Epstein Becker Green
 
Ciberseguridad
Grupo ALUCOM®
 
06 Proyecto VISIR+ en la UNSE - DIEEC de la UNED - Modelo Educativo y Colabor...
Manuel Castro
 
Walk This Way: CIS CSC and NIST CSF is the 80 in the 80/20 rule
EnterpriseGRC Solutions, Inc.
 
Cybersecurity and Internet Governance
Kenny Huang Ph.D.
 
Effective Dashboard Design
Aaron Hursman
 
Ad

Similar to Achieving Visible Security at Scale with the NIST Cybersecurity Framework (20)

PPTX
Automating Your Tools: How to Free Up Your Security Professionals for Actual ...
Kevin Fealey
 
PPTX
Interact Differently: Get More From Your Tools Through Exposed APIs
Kevin Fealey
 
PPTX
Simplify Dev with Complicated Security Tools
Kevin Fealey
 
PPTX
Mike Spaulding - Building an Application Security Program
centralohioissa
 
PPTX
Building an AppSec Team Extended Cut
Mike Spaulding
 
PPTX
Forget cyber, it's all about AppSec
Adrien de Beaupre
 
PPTX
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
lior mazor
 
PDF
Application Security Testing for Software Engineers: An approach to build sof...
Michael Hidalgo
 
PDF
Application security Best Practices Framework
Sujata Raskar
 
PDF
Applicaiton Security - Building The Audit Program
Michael Davis
 
PDF
AppSec in an Agile World
David Lindner
 
PPTX
Walls of Steel, Doors of Wood - Relevance of Application Security
Abdul Jaleel
 
PPTX
Best Practices for a Mature Application Security Program Webinar - February 2016
Security Innovation
 
PPT
六合彩香港-六合彩
baoyin
 
PPTX
How to build app sec team & culture in your organization the hack summi...
kunwaratul hax0r
 
PPTX
For Business's Sake, Let's focus on AppSec
Lalit Kale
 
PPTX
Assessing System Risk the Smart Way
Security Innovation
 
PDF
ultimate-guide-to-getting-started-with-appsec-veracode
Sean Varga
 
PPTX
Application Hackers Have A Handbook. Why Shouldn't You?
London School of Cyber Security
 
PDF
Ultimate_Guide_to_getting_started_with_AppSec
Jessica Lavery Pozerski
 
Automating Your Tools: How to Free Up Your Security Professionals for Actual ...
Kevin Fealey
 
Interact Differently: Get More From Your Tools Through Exposed APIs
Kevin Fealey
 
Simplify Dev with Complicated Security Tools
Kevin Fealey
 
Mike Spaulding - Building an Application Security Program
centralohioissa
 
Building an AppSec Team Extended Cut
Mike Spaulding
 
Forget cyber, it's all about AppSec
Adrien de Beaupre
 
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
lior mazor
 
Application Security Testing for Software Engineers: An approach to build sof...
Michael Hidalgo
 
Application security Best Practices Framework
Sujata Raskar
 
Applicaiton Security - Building The Audit Program
Michael Davis
 
AppSec in an Agile World
David Lindner
 
Walls of Steel, Doors of Wood - Relevance of Application Security
Abdul Jaleel
 
Best Practices for a Mature Application Security Program Webinar - February 2016
Security Innovation
 
六合彩香港-六合彩
baoyin
 
How to build app sec team & culture in your organization the hack summi...
kunwaratul hax0r
 
For Business's Sake, Let's focus on AppSec
Lalit Kale
 
Assessing System Risk the Smart Way
Security Innovation
 
ultimate-guide-to-getting-started-with-appsec-veracode
Sean Varga
 
Application Hackers Have A Handbook. Why Shouldn't You?
London School of Cyber Security
 
Ultimate_Guide_to_getting_started_with_AppSec
Jessica Lavery Pozerski
 
Ad

Recently uploaded (20)

PPTX
ERP - FICO Presentation BY BSL BOKARO STEEL LIMITED.pptx
ravisranjan
 
PPTX
Comprehensive Guide: Shoviv Exchange to Office 365 Migration Tool 2025
Shoviv Software
 
PPTX
WYSIWYG Web Builder Crack 2025 – Free Download Full Version with License Key
HyperPc soft
 
PDF
>Wondershare Filmora Crack Free Download 2025
utfefguu
 
PDF
2025年 Linux 核心專題: 探討 sched_ext 及機器學習.pdf
Eric Chou
 
PDF
WholeClear Split vCard Software for Split large vCard file
markwillsonmw004
 
PDF
capitulando la keynote de GrafanaCON 2025 - Madrid
Imma Valls Bernaus
 
PPTX
IObit Uninstaller Pro 14.3.1.8 Crack Free Download 2025
sdfger qwerty
 
PDF
Laboratory Workflows Digitalized and live in 90 days with Scifeon´s SAPPA P...
info969686
 
PDF
Designing Accessible Content Blocks (1).pdf
jaclynmennie1
 
PPTX
Cubase Pro Crack 2025 – Free Download Full Version with Activation Key
HyperPc soft
 
PPTX
Iobit Driver Booster Pro 12 Crack Free Download
chaudhryakashoo065
 
PPTX
EO4EU Ocean Monitoring: Maritime Weather Routing Optimsation Use Case
EO4EU
 
PPTX
ManageIQ - Sprint 264 Review - Slide Deck
ManageIQ
 
PPTX
computer forensics encase emager app exp6 1.pptx
ssuser343e92
 
PDF
GridView,Recycler view, API, SQLITE& NetworkRequest.pdf
Nabin Dhakal
 
PPTX
IObit Driver Booster Pro Crack Download Latest Version
chaudhryakashoo065
 
PPTX
A Complete Guide to Salesforce SMS Integrations Build Scalable Messaging With...
360 SMS APP
 
PDF
The Rise of Sustainable Mobile App Solutions by New York Development Firms
ostechnologies16
 
PPTX
Java Native Memory Leaks: The Hidden Villain Behind JVM Performance Issues
Tier1 app
 
ERP - FICO Presentation BY BSL BOKARO STEEL LIMITED.pptx
ravisranjan
 
Comprehensive Guide: Shoviv Exchange to Office 365 Migration Tool 2025
Shoviv Software
 
WYSIWYG Web Builder Crack 2025 – Free Download Full Version with License Key
HyperPc soft
 
>Wondershare Filmora Crack Free Download 2025
utfefguu
 
2025年 Linux 核心專題: 探討 sched_ext 及機器學習.pdf
Eric Chou
 
WholeClear Split vCard Software for Split large vCard file
markwillsonmw004
 
capitulando la keynote de GrafanaCON 2025 - Madrid
Imma Valls Bernaus
 
IObit Uninstaller Pro 14.3.1.8 Crack Free Download 2025
sdfger qwerty
 
Laboratory Workflows Digitalized and live in 90 days with Scifeon´s SAPPA P...
info969686
 
Designing Accessible Content Blocks (1).pdf
jaclynmennie1
 
Cubase Pro Crack 2025 – Free Download Full Version with Activation Key
HyperPc soft
 
Iobit Driver Booster Pro 12 Crack Free Download
chaudhryakashoo065
 
EO4EU Ocean Monitoring: Maritime Weather Routing Optimsation Use Case
EO4EU
 
ManageIQ - Sprint 264 Review - Slide Deck
ManageIQ
 
computer forensics encase emager app exp6 1.pptx
ssuser343e92
 
GridView,Recycler view, API, SQLITE& NetworkRequest.pdf
Nabin Dhakal
 
IObit Driver Booster Pro Crack Download Latest Version
chaudhryakashoo065
 
A Complete Guide to Salesforce SMS Integrations Build Scalable Messaging With...
360 SMS APP
 
The Rise of Sustainable Mobile App Solutions by New York Development Firms
ostechnologies16
 
Java Native Memory Leaks: The Hidden Villain Behind JVM Performance Issues
Tier1 app
 

Achieving Visible Security at Scale with the NIST Cybersecurity Framework

  • 1. Aspect Security | 9175 Guilford Road, Suite 300 | Columbia, MD 21046 | www.aspectsecurity.com Achieving Visible Security at Scale with the NIST Cybersecurity Framework SRCE Workshop Atlanta, GA Nov 17, 2015
  • 2. Application security that just works ABOUT US KEVIN FEALEY Principal Consultant & Practice Lead Automation & Integration Services 7 years Cybersec experience, @secfealz ©2015 Aspect Security. All Rights Reserved 2 TONY MILLER Principal Consultant & Practice Lead Application Program Services 10 years Cybersec experience, @tjmmgd
  • 3. Application security that just works ABOUT YOU Government, Private Sector? AppSec Team, Risk Managers? Used Cybersecurity Framework? ©2015 Aspect Security. All Rights Reserved 3
  • 4. Application security that just works APPLICATION SECURITY VS. NETWORK SECURITY ©2015 Aspect Security. All Rights Reserved 4 Application Layer – Attacker sends attacks inside valid HTTP requests. – Custom code is tricked into doing something it should not. – Security requires software development expertise, not signatures. Network Layer – Firewall, hardening, patching, IDS, and SSL/TLS cannot detect or stop attacks inside HTTP requests. – Security relies on signature databases. Firewall Firewall Databases LegacySystems WebServices Directories HumanResrcs Billing Custom Code APPLICATION ATTACK NetworkLayerApplicationLayer Accounts Finance Administration Transactions Communication KnowledgeMgmt E-Commerce Bus.Functions Hardened OS Web Server App Server
  • 5. Application security that just works OWASP TOP TEN: COMMON VULNERABILITIES ©2015 Aspect Security. All Rights Reserved 5 1. Injection Flaws 2. Broken Account and Session Management 3. Cross-Site Scripting Flaws 4. Direct Object References 5. Web/Application Server Misconfigurations 6. Sensitive Data Exposure 7. Broken Access Control 8. Cross-Site Request Forgery 9. Using Components with Known Vulnerabilities 10. Unvalidated Redirects and Forwards
  • 6. Application security that just works STANDARD SDLC Requirements Design DevelopTest Maintain ©2015 Aspect Security. All Rights Reserved 6 Security Testing
  • 7. Application security that just works CURRENT PIPELINE ©2015 Aspect Security. All Rights Reserved 7 Development Pipeline Security Pipeline Production Pipeline Manual Security Activities 1-2 week duration Prone to human error Late in the SDLC
  • 8. Application security that just works MANUAL SECURITY REVIEWS ©2015 Aspect Security. All Rights Reserved 8 Development Security Testing Production Business Stakeholders Risks
  • 9. Application security that just works FUTURE PIPELINE (IE. WHAT IS APPSEC AUTOMATION?) Automate: ©2015 Aspect Security. All Rights Reserved 9 Development Pipeline Security Pipeline Production Pipeline Tasks that do not require security intelligence Verification of security policies/requirements Vulnerability testing Correlation and reporting Development, Security, and Operations collaborate early and often
  • 10. Application security that just works APPSEC AUTOMATION PROGRAM DEPENDENCIES •What are our assets?Application Inventory •When is automated detection insufficient?Identify Risk Thresholds •What do we expect from our assets? Standard Security Requirements •How can we maximize our automation capabilities and mitigate risk? Common Security Controls •How will we support our developers? Developer Training and Support •How will we prioritize and fix issues we identify? Vulnerability Management Program •How will feedback be generated and integrated back? Continuous Improvement Process ©2015 Aspect Security. All Rights Reserved 10
  • 11. Application security that just works APPSEC AUTOMATION PROGRAM DEPENDENCIES •What are our assets?Application Inventory •When is automated detection insufficient?Identify Risk Thresholds •What do we expect from our assets? Standard Security Requirements •How can we maximize our automation capabilities and mitigate risk? Common Security Controls •How will we support our developers? Developer Training and Support •How will we prioritize and fix issues we identify? Vulnerability Management Program •How will feedback be generated and integrated back? Continuous Improvement Process ©2015 Aspect Security. All Rights Reserved 11 • How can we effectively scale our security program to achieve business goals at a more rapid pace? AppSec Automation Program
  • 12. Application security that just works CYBERSECURITY FRAMEWORK 3.2  Software Security Program Review ©2015 Aspect Security. All Rights Reserved 12 Define the Scope Analyze Threats Current Capability Assess Risks and Gaps Capability Goals Improvement Initiatives Execute Initiatives 1 2 3 4 5 6 7
  • 13. Application security that just works TRADITIONAL SDLC Requirements Design DevelopTest Maintain ©2015 Aspect Security. All Rights Reserved 13 Dynamic Application Testing Threat Modeling Architecture /Design Reviews Static Code Reviews Periodic Retesting
  • 14. Application security that just works CHALLENGES OF DEV-OPS/AGILE Requirements & Design Phases Hardly accommodated Development to Deployment Highly compressed timeframes Traditional Testing Cycles Can’t accommodate stunning speed So, how do we integrate security? ©2015 Aspect Security. All Rights Reserved 14
  • 15. Application security that just works SECURE DEV-OPS/AGILE MODEL Proactive Lifecycle Continuous Monitoring Developer Training Local Security SME Program Operational Security Team Secure Code & Architecture Standards Targeted Security Activities (small scope) Risk-Based Security Assurance Model Standardized Security Controls Components Self-Service Model Utilizing Automation Feedback Loop Via Stories/Features ©2015 Aspect Security. All Rights Reserved 15
  • 16. Thank you! ©2015 Aspect Security. All Rights Reserved Kevin Fealey & Tony Miller [email protected] [email protected]