SlideShare a Scribd company logo
AppSec USA 2014 
Denver, Colorado 
AppSec Survey 2.0: Fine-Tuning an 
AppSec Training Program Based on 
Data 
John B. Dickson, CISSP 
@johnbdickson 
September 18, 2014
Introduction 
John 
B. 
Dickson, 
CISSP 
• Application Security Enthusiast 
• Ex-AF Guy & ISSA Distinguished Fellow 
• Serial Entrepreneur & MBA Type 
• Dad
When Not Thinking about AppSec… 
I am Snake Hunting on a Ranch in South Texas
Snake Hunting Essentials 
Cooler 
Hat 
Cool 
Hat 
Snake 
Guards 
Common 
Gardening 
Tools 
Guy 
who 
has 
a 
machete 
and 
who 
is 
actually 
good 
at 
“catching” 
snakes 
Machete 
OWASP 
AppSec 
2011 
t-­‐shirt 
© Copyright 2014 Denim Group - All Rights Reserved
• Background 
• Premise 
• AppSec 
Study 
1.0 
Results 
– 
What 
We 
Learned 
• Approach 
and 
Survey 
ParKcipants 
• Key 
Results 
• What 
We 
Can 
Put 
To 
Work 
• Conclusions 
and 
QuesKons 
& 
Answers 
Overview
AppSec Study 1.0 Results 
• Things 
we 
Knew 
Last 
Year 
• Key 
Findings 
of 
Last 
Year’s 
Study 
• AddiKonal 
Stuff 
We 
Learned 
Along 
the 
Way 
• Development 
training 
is 
hard 
• Results 
are 
rarely 
measured 
for 
ROI 
• Training 
is 
typically 
part 
of 
any 
AppSec 
program
AppSec Study 1.0 Results 
• Things 
we 
Knew 
Last 
Year 
• Key 
Findings 
of 
Last 
Year’s 
Study 
• AddiKonal 
Stuff 
We 
Learned 
Long 
the 
Way 
• 25% 
retenKon 
aXer 
training 
• QA 
did 
worse 
than 
architects 
and 
soXware 
developers 
• Respondents 
answered 
basic 
awareness 
quesKons 
but 
not 
coding 
pracKces
• Things 
we 
Knew 
Last 
Year 
• Key 
Findings 
of 
Last 
Year’s 
Study 
• AddiConal 
Stuff 
We 
Learned 
Long 
the 
Way 
• SoXware 
developers 
learn 
differently 
than 
companies 
teach 
• IncenKves 
ma[er 
• Surveys 
are 
hard! 
AppSec Study 1.0 Results
Overview of 2014 “2.0” Study 
• 600 
respondents 
• Represents 
mulKple 
industries 
• Asked 
the 
same 
applicaKon 
security 
quesKons 
as 
2013 
survey 
• Expanded 
to 
include 
training 
method 
quesKons 
• No 
“before” 
and 
“aXer” 
analysis 
• No 
classroom 
training 
opportuniKes 
• Used 
more 
social 
media 
• Data 
collecKon 
ongoing
Approach and Survey Participants 
Sample 
QuesCons 
QuesKons 
that 
tested 
basic 
knowledge 
of 
applicaKon 
security: 
• ApplicaKon 
security 
is 
best 
defined 
as… 
• Threat 
Modeling 
is… 
• Input 
ValidaKon 
is…
Approach and Survey Participants 
Sample 
QuesCons 
QuesKons 
that 
tested 
understanding 
of 
defensive 
coding: 
• Marking 
a 
cookie 
as 
“secure” 
will… 
• Which 
of 
the 
following 
will 
help 
protect 
against 
XSS… 
• Which 
of 
the 
following 
is 
NOT 
an 
example 
of 
good 
session 
policy…
Approach and Survey Participants 
Delivery 
Means 
• Direct 
Delivery 
of 
Customized 
Links 
via 
E-­‐mail 
• Survey 
Monkey 
paid 
• Social 
Media 
– Facebook 
– Linkedin 
Targets 
• SoXware 
Developers 
• Architects 
• Quality 
Assurance
Demographic Questions Asked 
• What 
is 
your 
primary 
job 
funcKon? 
• What 
is 
your 
company's 
size? 
• How 
many 
years 
of 
soXware 
development 
experience 
do 
you 
have? 
• How 
much 
previous 
applicaKon 
security 
training 
have 
you 
received?
2014 Study Demographics 
How 
many 
years 
of 
soMware 
development 
experience 
do 
you 
Less 
than 
a 
Year 
18% 
1-­‐2 
Years 
9% 
2-­‐4 
Years 
10% 
4-­‐7 
Years 
13% 
More 
than 
12 
7-­‐12 
Years 
16% 
Years 
34% 
have?
2014 Study Demographics 
What 
is 
your 
primary 
job 
Other 
35% 
Quality 
Assurance 
6% 
SoXware 
Developer 
53% 
funcCon? 
Architect 
6%
2014 Study Demographics 
What 
is 
your 
company 
size? 
8% 
8% 
29% 
8% 
10% 
37% 
1-­‐24 
Employees 
25-­‐99 
Employees 
100-­‐499 
Employees 
500-­‐2499 
Employees 
2500-­‐9999 
Employees 
10,000 
or 
more 
Employees
2014 Study Demographics 
How 
much 
previous 
applicaCon 
security 
training 
experience 
have 
None 
31% 
Less 
than 
a 
Day 
19% 
More 
than 
3 
At 
least 
1 
day, 
but 
less 
than 
2 
days 
17% 
At 
least 
2 
days, 
but 
less 
than 
3 
days 
8% 
days 
25% 
you 
received?
Key Survey Results 
• Data 
shows 
soXware 
developers 
posiKvely 
answer 
quesKons 
about 
applicaKon 
security 
56% 
of 
the 
Kme 
• 2013 
Denim 
Group 
study 
results: 
58% 
• 2014 
Aspect 
Study: 
60%
Change Implementation 
Did 
your 
organizaCon 
implement 
any 
SDLC 
or 
process 
improvement 
steps 
to 
formalize 
concepts 
learned 
in 
training? 
Yes 
33% 
No 
25% 
I 
don't 
know 
42%
Types of Training Received 
Types 
of 
Training 
Received 
0 
50 
100 
150 
200 
250 
Other 
Wri[en 
Materials 
1-­‐on-­‐1 
Coaching 
Webinars 
or 
Videos 
Websites 
Crowdsourcing 
Sites 
Developer 
E-­‐mail 
Lists 
or 
RSS 
feeds 
Social 
Learning 
Plaqorms 
Social 
Media 
e-­‐Learning, 
CBT 
Instructor-­‐Led 
PresentaKons
E-Learning & Instructor-Led Training 
Types 
of 
Training 
Received 
0 
100 
200 
300 
Other 
Wri[en 
Materials 
1-­‐on-­‐1 
Coaching 
Webinars 
or 
Videos 
Websites 
Crowdsourcing 
Sites 
E-­‐Learning 
& 
Instructor-­‐led 
Training 
are 
SKll 
the 
Primary 
ApplicaKon 
Security 
Training 
Approach 
Developer 
E-­‐mail 
Lists 
or 
RSS 
feeds 
Social 
Learning 
Plaqorms 
Social 
Media 
e-­‐Learning, 
CBT 
Instructor-­‐Led 
PresentaKons
Perceived Effectiveness of Training 
0 
50 
100 
150 
200 
250 
300 
350 
400 
450 
500 
Wri[en 
Materials 
1-­‐on-­‐1 
Coaching 
Webinars 
or 
Videos 
Websites 
Crowdsourcing 
Sites 
Developer 
E-­‐mail 
Lists 
or 
RSS 
feeds 
Social 
Learning 
Plaqorms 
Social 
Media 
e-­‐Learning, 
CBT 
Instructor-­‐Led 
PresentaKons 
1: 
Not 
EffecKve 
2: 
Somewhat 
EffecKve 
3: 
Very 
EffecKve
Question Types 
Respondents 
Fared 
Far 
Worse 
on 
QuesKons 
Involving 
Secure 
Coding 
PracKces 
versus 
ApplicaKon 
Security 
Awareness 
QuesKons 
41% 
59% 
0% 
10% 
20% 
30% 
40% 
50% 
60% 
70% 
Awareness 
QuesKons 
PrescripKve 
QuesKons 
% 
of 
QuesKons 
Answered 
Correctly
Pass Rate by Job Function 
Quality 
Assurance 
respondents 
Fared 
50% 
worse 
than 
soXware 
developers 
and 
architects 
Average 
Pass 
Rate 
25% 
20% 
15% 
10% 
5% 
0% 
Other 
SoXware 
Developer 
Quality 
Assurance 
Architect 
70% 
or 
more 
quesKons 
answered 
correctly
Pass Rate by Previous Training 
The 
Pass 
Rate 
More 
Than 
Doubled 
for 
Respondents 
Who 
Had 
More 
Than 
Three 
Days 
ApplicaKon 
Security 
Training 
Average 
Pass 
Rate 
30% 
25% 
20% 
15% 
10% 
5% 
0% 
Less 
than 
a 
Day 
or 
None 
At 
least 
1 
day, 
but 
less 
than 
3 
days 
More 
than 
3 
days 
70% 
or 
more 
correct
Pass Rate by Job Function: Security 
Respondents 
that 
worked 
for 
security 
organizaKons 
or 
vendors 
DID 
fare 
well 
compared 
to 
other 
respondents 
Average 
Pass 
Rate 
90% 
80% 
70% 
60% 
50% 
40% 
30% 
20% 
10% 
0% 
Security-­‐Related 
Everyone 
Else 
70% 
or 
more 
quesKons 
answered 
correctly
What we Can Put to Work 
• Refresher 
training 
is 
criCcal 
• Even 
with 
3+ 
days 
of 
appsec 
training, 
most 
respondents 
did 
not 
have 
a 
“passing” 
grade 
of 
70% 
• Like 
any 
other 
training 
topic, 
leX 
unreinforced, 
what 
learned 
will 
be 
forgo[en 
over 
Kme 
• ParKcularly 
given 
the 
lack 
of 
SDLC 
changes 
• Likely 
an 
area 
for 
addiKonal 
study 
for 
2015 
appsec 
training 
study
What we Can Put to Work 
• Training 
without 
SDLC 
changes 
likely 
will 
produce 
the 
same 
results 
• 33% 
of 
the 
respondents 
said 
their 
organizaKon 
implemented 
some 
security 
SDLC 
improvements 
• 67% 
either 
answered 
“no” 
or 
“don’t 
know” 
• OrganizaKons 
cannot 
rely 
exclusively 
on 
developers 
retenKon 
and 
iniKaKve 
to 
produce 
long-­‐term 
decline 
in 
applicaKon 
vulnerabiliKes
What we Can Put to Work 
• Augment 
QA 
with 
Focused 
AppSec 
Training 
• QA 
has 
consistently 
responded 
poorly 
relaKve 
to 
developers 
and 
architects 
• Many 
organizaKon 
put 
their 
most 
junior 
developers 
in 
QA 
to 
start 
• QA 
is 
where 
appsec 
“lives” 
in 
many 
organizaKons 
• OrganizaKons 
might 
considering 
“doubling 
down” 
on 
appsec 
training 
for 
QA 
staff 
to 
compensate 
for 
this 
fact
What we Can Put to Work 
• IncenCves 
Ma`er 
When 
Working 
with 
Developers 
• We 
used 
incenKves 
throughout 
the 
study 
to 
collect 
responses 
-­‐ 
#Success! 
• SoXware 
developers 
have 
infinite 
reasons 
to 
ignore 
engagement 
by 
the 
AppSec 
team 
• Rewards 
help 
nudge 
soXware 
developers
What we Can Put to Work 
• Training 
programs 
must 
be 
tailored 
to 
be 
effecCve 
• Formal 
programs 
like 
classroom 
training 
and 
e-­‐ 
Learning 
are 
sKll 
the 
bread 
and 
bu[er 
of 
appsec 
training 
programs 
• ConsumpKon 
rates 
of 
e-­‐Learning 
sKll 
abysmal 
without 
incenKves 
or 
internal 
markeKng 
• Add 
newer 
ways 
of 
learning 
to 
reinforce 
certain 
key 
points 
and 
to 
serve 
AppSec 
corner 
cases 
• Leverage 
current 
events 
to 
reinforce 
other 
key 
points
Conclusions 
• Data 
shows 
soXware 
developers 
posiKvely 
answer 
quesKons 
about 
applicaKon 
security 
56% 
of 
the 
Kme 
• Data-­‐driven 
applicaKon 
security 
programs 
will 
likely 
be 
more 
successful 
and 
chart 
improvement 
• SophisKcated 
security 
managers 
use 
incenKves 
and 
tailor 
programs 
to 
improve 
appsec 
IQ
Questions and Answers 
White 
Paper? 
MenCon 
it 
on 
Twi`er 
John 
B. 
Dickson, 
CISSP 
@johnbdickson 
#appsecstudy
Ad

More Related Content

What's hot (20)

Running a Software Security Program with Open Source Tools
Running a Software Security Program with Open Source ToolsRunning a Software Security Program with Open Source Tools
Running a Software Security Program with Open Source Tools
Denim Group
 
Building Your Application Security Data Hub - OWASP AppSecUSA
Building Your Application Security Data Hub - OWASP AppSecUSABuilding Your Application Security Data Hub - OWASP AppSecUSA
Building Your Application Security Data Hub - OWASP AppSecUSA
Denim Group
 
Mobile Application Assessment - Don't Cheat Yourself
Mobile Application Assessment - Don't Cheat YourselfMobile Application Assessment - Don't Cheat Yourself
Mobile Application Assessment - Don't Cheat Yourself
Denim Group
 
RSA 2015 Blending the Automated and the Manual: Making Application Vulnerabil...
RSA 2015 Blending the Automated and the Manual: Making Application Vulnerabil...RSA 2015 Blending the Automated and the Manual: Making Application Vulnerabil...
RSA 2015 Blending the Automated and the Manual: Making Application Vulnerabil...
Denim Group
 
Application Security Assessments by the Numbers - A Whole-istic View - OWASP ...
Application Security Assessments by the Numbers - A Whole-istic View - OWASP ...Application Security Assessments by the Numbers - A Whole-istic View - OWASP ...
Application Security Assessments by the Numbers - A Whole-istic View - OWASP ...
Denim Group
 
Remediation Statistics: What Does Fixing Application Vulnerabilities Cost?
Remediation Statistics: What Does Fixing Application Vulnerabilities Cost?Remediation Statistics: What Does Fixing Application Vulnerabilities Cost?
Remediation Statistics: What Does Fixing Application Vulnerabilities Cost?
Denim Group
 
How-To-Guide for Software Security Vulnerability Remediation
How-To-Guide for Software Security Vulnerability RemediationHow-To-Guide for Software Security Vulnerability Remediation
How-To-Guide for Software Security Vulnerability Remediation
Denim Group
 
Using ThreadFix to Manage Application Vulnerabilities
Using ThreadFix to Manage Application VulnerabilitiesUsing ThreadFix to Manage Application Vulnerabilities
Using ThreadFix to Manage Application Vulnerabilities
Denim Group
 
Secure DevOps with ThreadFix 2.3
Secure DevOps with ThreadFix 2.3Secure DevOps with ThreadFix 2.3
Secure DevOps with ThreadFix 2.3
Denim Group
 
SecDevOps Risk Workflow - v0.6
SecDevOps Risk Workflow - v0.6SecDevOps Risk Workflow - v0.6
SecDevOps Risk Workflow - v0.6
Dinis Cruz
 
Application Assessment Techniques
Application Assessment TechniquesApplication Assessment Techniques
Application Assessment Techniques
Denim Group
 
Managing Your Application Security Program with the ThreadFix Ecosystem
Managing Your Application Security Program with the ThreadFix EcosystemManaging Your Application Security Program with the ThreadFix Ecosystem
Managing Your Application Security Program with the ThreadFix Ecosystem
Denim Group
 
Benchmarking Web Application Scanners for YOUR Organization
Benchmarking Web Application Scanners for YOUR OrganizationBenchmarking Web Application Scanners for YOUR Organization
Benchmarking Web Application Scanners for YOUR Organization
Denim Group
 
ThreadFix 2.2 Preview Webinar with Dan Cornell
ThreadFix 2.2 Preview Webinar with Dan CornellThreadFix 2.2 Preview Webinar with Dan Cornell
ThreadFix 2.2 Preview Webinar with Dan Cornell
Denim Group
 
Building an AppSec Pipeline: Keeping your program, and your life, sane
Building an AppSec Pipeline: Keeping your program, and your life, saneBuilding an AppSec Pipeline: Keeping your program, and your life, sane
Building an AppSec Pipeline: Keeping your program, and your life, sane
weaveraaaron
 
Lessons from DevOps: Taking DevOps practices into your AppSec Life
Lessons from DevOps: Taking DevOps practices into your AppSec LifeLessons from DevOps: Taking DevOps practices into your AppSec Life
Lessons from DevOps: Taking DevOps practices into your AppSec Life
Matt Tesauro
 
ThreadFix 2.1 and Your Application Security Program
ThreadFix 2.1 and Your Application Security ProgramThreadFix 2.1 and Your Application Security Program
ThreadFix 2.1 and Your Application Security Program
Denim Group
 
SecDevOps: Development Tools for Security Pros
SecDevOps: Development Tools for Security ProsSecDevOps: Development Tools for Security Pros
SecDevOps: Development Tools for Security Pros
Denim Group
 
The ThreadFix Ecosystem: Vendors, Volunteers, and Versions
The ThreadFix Ecosystem: Vendors, Volunteers, and VersionsThe ThreadFix Ecosystem: Vendors, Volunteers, and Versions
The ThreadFix Ecosystem: Vendors, Volunteers, and Versions
Denim Group
 
OWASP San Antonio Meeting 10/2/20
OWASP San Antonio Meeting 10/2/20OWASP San Antonio Meeting 10/2/20
OWASP San Antonio Meeting 10/2/20
Denim Group
 
Running a Software Security Program with Open Source Tools
Running a Software Security Program with Open Source ToolsRunning a Software Security Program with Open Source Tools
Running a Software Security Program with Open Source Tools
Denim Group
 
Building Your Application Security Data Hub - OWASP AppSecUSA
Building Your Application Security Data Hub - OWASP AppSecUSABuilding Your Application Security Data Hub - OWASP AppSecUSA
Building Your Application Security Data Hub - OWASP AppSecUSA
Denim Group
 
Mobile Application Assessment - Don't Cheat Yourself
Mobile Application Assessment - Don't Cheat YourselfMobile Application Assessment - Don't Cheat Yourself
Mobile Application Assessment - Don't Cheat Yourself
Denim Group
 
RSA 2015 Blending the Automated and the Manual: Making Application Vulnerabil...
RSA 2015 Blending the Automated and the Manual: Making Application Vulnerabil...RSA 2015 Blending the Automated and the Manual: Making Application Vulnerabil...
RSA 2015 Blending the Automated and the Manual: Making Application Vulnerabil...
Denim Group
 
Application Security Assessments by the Numbers - A Whole-istic View - OWASP ...
Application Security Assessments by the Numbers - A Whole-istic View - OWASP ...Application Security Assessments by the Numbers - A Whole-istic View - OWASP ...
Application Security Assessments by the Numbers - A Whole-istic View - OWASP ...
Denim Group
 
Remediation Statistics: What Does Fixing Application Vulnerabilities Cost?
Remediation Statistics: What Does Fixing Application Vulnerabilities Cost?Remediation Statistics: What Does Fixing Application Vulnerabilities Cost?
Remediation Statistics: What Does Fixing Application Vulnerabilities Cost?
Denim Group
 
How-To-Guide for Software Security Vulnerability Remediation
How-To-Guide for Software Security Vulnerability RemediationHow-To-Guide for Software Security Vulnerability Remediation
How-To-Guide for Software Security Vulnerability Remediation
Denim Group
 
Using ThreadFix to Manage Application Vulnerabilities
Using ThreadFix to Manage Application VulnerabilitiesUsing ThreadFix to Manage Application Vulnerabilities
Using ThreadFix to Manage Application Vulnerabilities
Denim Group
 
Secure DevOps with ThreadFix 2.3
Secure DevOps with ThreadFix 2.3Secure DevOps with ThreadFix 2.3
Secure DevOps with ThreadFix 2.3
Denim Group
 
SecDevOps Risk Workflow - v0.6
SecDevOps Risk Workflow - v0.6SecDevOps Risk Workflow - v0.6
SecDevOps Risk Workflow - v0.6
Dinis Cruz
 
Application Assessment Techniques
Application Assessment TechniquesApplication Assessment Techniques
Application Assessment Techniques
Denim Group
 
Managing Your Application Security Program with the ThreadFix Ecosystem
Managing Your Application Security Program with the ThreadFix EcosystemManaging Your Application Security Program with the ThreadFix Ecosystem
Managing Your Application Security Program with the ThreadFix Ecosystem
Denim Group
 
Benchmarking Web Application Scanners for YOUR Organization
Benchmarking Web Application Scanners for YOUR OrganizationBenchmarking Web Application Scanners for YOUR Organization
Benchmarking Web Application Scanners for YOUR Organization
Denim Group
 
ThreadFix 2.2 Preview Webinar with Dan Cornell
ThreadFix 2.2 Preview Webinar with Dan CornellThreadFix 2.2 Preview Webinar with Dan Cornell
ThreadFix 2.2 Preview Webinar with Dan Cornell
Denim Group
 
Building an AppSec Pipeline: Keeping your program, and your life, sane
Building an AppSec Pipeline: Keeping your program, and your life, saneBuilding an AppSec Pipeline: Keeping your program, and your life, sane
Building an AppSec Pipeline: Keeping your program, and your life, sane
weaveraaaron
 
Lessons from DevOps: Taking DevOps practices into your AppSec Life
Lessons from DevOps: Taking DevOps practices into your AppSec LifeLessons from DevOps: Taking DevOps practices into your AppSec Life
Lessons from DevOps: Taking DevOps practices into your AppSec Life
Matt Tesauro
 
ThreadFix 2.1 and Your Application Security Program
ThreadFix 2.1 and Your Application Security ProgramThreadFix 2.1 and Your Application Security Program
ThreadFix 2.1 and Your Application Security Program
Denim Group
 
SecDevOps: Development Tools for Security Pros
SecDevOps: Development Tools for Security ProsSecDevOps: Development Tools for Security Pros
SecDevOps: Development Tools for Security Pros
Denim Group
 
The ThreadFix Ecosystem: Vendors, Volunteers, and Versions
The ThreadFix Ecosystem: Vendors, Volunteers, and VersionsThe ThreadFix Ecosystem: Vendors, Volunteers, and Versions
The ThreadFix Ecosystem: Vendors, Volunteers, and Versions
Denim Group
 
OWASP San Antonio Meeting 10/2/20
OWASP San Antonio Meeting 10/2/20OWASP San Antonio Meeting 10/2/20
OWASP San Antonio Meeting 10/2/20
Denim Group
 

Viewers also liked (20)

Continuous Security Testing in a Devops World #OWASPHelsinki
Continuous Security Testing in a Devops World #OWASPHelsinkiContinuous Security Testing in a Devops World #OWASPHelsinki
Continuous Security Testing in a Devops World #OWASPHelsinki
Stephen de Vries
 
Agile Secure Software Development in a Large Software Development Organisatio...
Agile Secure Software Development in a Large Software Development Organisatio...Agile Secure Software Development in a Large Software Development Organisatio...
Agile Secure Software Development in a Large Software Development Organisatio...
Achim D. Brucker
 
Continous Integration of (JS) projects & check-build philosophy
Continous Integration of (JS) projects & check-build philosophyContinous Integration of (JS) projects & check-build philosophy
Continous Integration of (JS) projects & check-build philosophy
François-Guillaume Ribreau
 
Pythonista も ls を読むべきか?
Pythonista も ls を読むべきか?Pythonista も ls を読むべきか?
Pythonista も ls を読むべきか?
Katsunori FUJIWARA
 
Rugged DevOps: Bridging Security and DevOps
Rugged DevOps: Bridging Security and DevOpsRugged DevOps: Bridging Security and DevOps
Rugged DevOps: Bridging Security and DevOps
James Wickett
 
DevOps AppSec Pipeline Velcocity NY 2015
DevOps AppSec Pipeline Velcocity NY 2015DevOps AppSec Pipeline Velcocity NY 2015
DevOps AppSec Pipeline Velcocity NY 2015
Aaron Weaver
 
Security testautomation
Security testautomationSecurity testautomation
Security testautomation
Linkesh Kanna Velu
 
Automated Security Testing
Automated Security TestingAutomated Security Testing
Automated Security Testing
seleniumconf
 
Cybersecurity by the numbers
Cybersecurity by the numbersCybersecurity by the numbers
Cybersecurity by the numbers
APNIC
 
Threat Modeling And Analysis
Threat Modeling And AnalysisThreat Modeling And Analysis
Threat Modeling And Analysis
Lalit Kale
 
Continuous and Visible Security Testing with BDD-Security
Continuous and Visible Security Testing with BDD-SecurityContinuous and Visible Security Testing with BDD-Security
Continuous and Visible Security Testing with BDD-Security
Stephen de Vries
 
Building Risk Management into Enterprise Architecture
Building Risk Management into Enterprise ArchitectureBuilding Risk Management into Enterprise Architecture
Building Risk Management into Enterprise Architecture
iasaglobal
 
Automating security tests for Continuous Integration
Automating security tests for Continuous IntegrationAutomating security tests for Continuous Integration
Automating security tests for Continuous Integration
Stephen de Vries
 
Integración contínua con Jenkins
Integración contínua con JenkinsIntegración contínua con Jenkins
Integración contínua con Jenkins
César Hernández
 
OWASP WTE - Now in the Cloud!
OWASP WTE - Now in the Cloud!OWASP WTE - Now in the Cloud!
OWASP WTE - Now in the Cloud!
Matt Tesauro
 
New Farming Methods in the Epistemological Wasteland of Application Security
New Farming Methods in the Epistemological Wasteland of Application SecurityNew Farming Methods in the Epistemological Wasteland of Application Security
New Farming Methods in the Epistemological Wasteland of Application Security
James Wickett
 
Real World Application Threat Modelling By Example
Real World Application Threat Modelling By ExampleReal World Application Threat Modelling By Example
Real World Application Threat Modelling By Example
NCC Group
 
The Journey to DevSecOps
The Journey to DevSecOpsThe Journey to DevSecOps
The Journey to DevSecOps
SeniorStoryteller
 
DevSecOps: Taking a DevOps Approach to Security
DevSecOps: Taking a DevOps Approach to SecurityDevSecOps: Taking a DevOps Approach to Security
DevSecOps: Taking a DevOps Approach to Security
Alert Logic
 
Continuous Security Testing - DevSecCon
Continuous Security Testing - DevSecConContinuous Security Testing - DevSecCon
Continuous Security Testing - DevSecCon
Stephen de Vries
 
Continuous Security Testing in a Devops World #OWASPHelsinki
Continuous Security Testing in a Devops World #OWASPHelsinkiContinuous Security Testing in a Devops World #OWASPHelsinki
Continuous Security Testing in a Devops World #OWASPHelsinki
Stephen de Vries
 
Agile Secure Software Development in a Large Software Development Organisatio...
Agile Secure Software Development in a Large Software Development Organisatio...Agile Secure Software Development in a Large Software Development Organisatio...
Agile Secure Software Development in a Large Software Development Organisatio...
Achim D. Brucker
 
Continous Integration of (JS) projects & check-build philosophy
Continous Integration of (JS) projects & check-build philosophyContinous Integration of (JS) projects & check-build philosophy
Continous Integration of (JS) projects & check-build philosophy
François-Guillaume Ribreau
 
Pythonista も ls を読むべきか?
Pythonista も ls を読むべきか?Pythonista も ls を読むべきか?
Pythonista も ls を読むべきか?
Katsunori FUJIWARA
 
Rugged DevOps: Bridging Security and DevOps
Rugged DevOps: Bridging Security and DevOpsRugged DevOps: Bridging Security and DevOps
Rugged DevOps: Bridging Security and DevOps
James Wickett
 
DevOps AppSec Pipeline Velcocity NY 2015
DevOps AppSec Pipeline Velcocity NY 2015DevOps AppSec Pipeline Velcocity NY 2015
DevOps AppSec Pipeline Velcocity NY 2015
Aaron Weaver
 
Automated Security Testing
Automated Security TestingAutomated Security Testing
Automated Security Testing
seleniumconf
 
Cybersecurity by the numbers
Cybersecurity by the numbersCybersecurity by the numbers
Cybersecurity by the numbers
APNIC
 
Threat Modeling And Analysis
Threat Modeling And AnalysisThreat Modeling And Analysis
Threat Modeling And Analysis
Lalit Kale
 
Continuous and Visible Security Testing with BDD-Security
Continuous and Visible Security Testing with BDD-SecurityContinuous and Visible Security Testing with BDD-Security
Continuous and Visible Security Testing with BDD-Security
Stephen de Vries
 
Building Risk Management into Enterprise Architecture
Building Risk Management into Enterprise ArchitectureBuilding Risk Management into Enterprise Architecture
Building Risk Management into Enterprise Architecture
iasaglobal
 
Automating security tests for Continuous Integration
Automating security tests for Continuous IntegrationAutomating security tests for Continuous Integration
Automating security tests for Continuous Integration
Stephen de Vries
 
Integración contínua con Jenkins
Integración contínua con JenkinsIntegración contínua con Jenkins
Integración contínua con Jenkins
César Hernández
 
OWASP WTE - Now in the Cloud!
OWASP WTE - Now in the Cloud!OWASP WTE - Now in the Cloud!
OWASP WTE - Now in the Cloud!
Matt Tesauro
 
New Farming Methods in the Epistemological Wasteland of Application Security
New Farming Methods in the Epistemological Wasteland of Application SecurityNew Farming Methods in the Epistemological Wasteland of Application Security
New Farming Methods in the Epistemological Wasteland of Application Security
James Wickett
 
Real World Application Threat Modelling By Example
Real World Application Threat Modelling By ExampleReal World Application Threat Modelling By Example
Real World Application Threat Modelling By Example
NCC Group
 
DevSecOps: Taking a DevOps Approach to Security
DevSecOps: Taking a DevOps Approach to SecurityDevSecOps: Taking a DevOps Approach to Security
DevSecOps: Taking a DevOps Approach to Security
Alert Logic
 
Continuous Security Testing - DevSecCon
Continuous Security Testing - DevSecConContinuous Security Testing - DevSecCon
Continuous Security Testing - DevSecCon
Stephen de Vries
 
Ad

Similar to AppSec Survey 2.0 Fine-Tuning an AppSec Training Program Based on Data (20)

Appsec2013 presentation-dickson final-with_all_final_edits
Appsec2013 presentation-dickson final-with_all_final_editsAppsec2013 presentation-dickson final-with_all_final_edits
Appsec2013 presentation-dickson final-with_all_final_edits
drewz lin
 
MEASURING THE BUSINESS IMPACT OF LEARNING: WHAT WE’VE LEARNED
MEASURING THE BUSINESS IMPACT OF LEARNING: WHAT WE’VE LEARNEDMEASURING THE BUSINESS IMPACT OF LEARNING: WHAT WE’VE LEARNED
MEASURING THE BUSINESS IMPACT OF LEARNING: WHAT WE’VE LEARNED
Human Capital Media
 
The Role of Analytics in Talent Acquisition
The Role of Analytics in Talent AcquisitionThe Role of Analytics in Talent Acquisition
The Role of Analytics in Talent Acquisition
Human Capital Media
 
Software testing
Software testingSoftware testing
Software testing
anushatadkal
 
SQA Systematic process in every phase of development. Encompasses processes,...
SQA Systematic process in every phase of development.  Encompasses processes,...SQA Systematic process in every phase of development.  Encompasses processes,...
SQA Systematic process in every phase of development. Encompasses processes,...
siamibneedrish1
 
Testing in the Software Development Life Cycle (SDLC) is a systematic process...
Testing in the Software Development Life Cycle (SDLC) is a systematic process...Testing in the Software Development Life Cycle (SDLC) is a systematic process...
Testing in the Software Development Life Cycle (SDLC) is a systematic process...
DanuDriya
 
Beyond surveys
Beyond surveysBeyond surveys
Beyond surveys
Andrew Downes
 
Why Apps Succeed: 4 Keys to Winning the Digital Quality Game
Why Apps Succeed: 4 Keys to Winning the Digital Quality GameWhy Apps Succeed: 4 Keys to Winning the Digital Quality Game
Why Apps Succeed: 4 Keys to Winning the Digital Quality Game
Austin Marie Gay
 
DevSecCon KeyNote London 2015
DevSecCon KeyNote London 2015DevSecCon KeyNote London 2015
DevSecCon KeyNote London 2015
Shannon Lietz
 
DevSecCon Keynote
DevSecCon KeynoteDevSecCon Keynote
DevSecCon Keynote
Shannon Lietz
 
Owasp summit debrief v1.0 (jun 2017)
Owasp summit debrief v1.0 (jun 2017)Owasp summit debrief v1.0 (jun 2017)
Owasp summit debrief v1.0 (jun 2017)
owaspsummit
 
Just4Meeting 2012 - How to protect your web applications
Just4Meeting 2012 -  How to protect your web applicationsJust4Meeting 2012 -  How to protect your web applications
Just4Meeting 2012 - How to protect your web applications
Magno Logan
 
Sophanic's Company Profile
Sophanic's Company ProfileSophanic's Company Profile
Sophanic's Company Profile
Socrates Okonkwo
 
Web Application Security Strategy
Web Application Security Strategy Web Application Security Strategy
Web Application Security Strategy
Network Intelligence India
 
7 Best Practices for your Moodle RFP
7 Best Practices for your Moodle RFP 7 Best Practices for your Moodle RFP
7 Best Practices for your Moodle RFP
Lambda Solutions
 
SDLC & DevSecOps
SDLC & DevSecOpsSDLC & DevSecOps
SDLC & DevSecOps
Irina Kostina
 
Empower your career - Silicon Coder
Empower your career - Silicon CoderEmpower your career - Silicon Coder
Empower your career - Silicon Coder
Arun Gupta
 
Design Secrets Hiding in Your Web Analytics Dataeb analytics
Design Secrets Hiding in Your Web Analytics Dataeb analyticsDesign Secrets Hiding in Your Web Analytics Dataeb analytics
Design Secrets Hiding in Your Web Analytics Dataeb analytics
UXPA International
 
Design Secrets Hiding in Your Web Analytics Data
Design Secrets Hiding in Your Web Analytics DataDesign Secrets Hiding in Your Web Analytics Data
Design Secrets Hiding in Your Web Analytics Data
UXPA International
 
Responsive Design - Driving PS Engagement
Responsive Design - Driving PS EngagementResponsive Design - Driving PS Engagement
Responsive Design - Driving PS Engagement
Upside Learning Solutions
 
Appsec2013 presentation-dickson final-with_all_final_edits
Appsec2013 presentation-dickson final-with_all_final_editsAppsec2013 presentation-dickson final-with_all_final_edits
Appsec2013 presentation-dickson final-with_all_final_edits
drewz lin
 
MEASURING THE BUSINESS IMPACT OF LEARNING: WHAT WE’VE LEARNED
MEASURING THE BUSINESS IMPACT OF LEARNING: WHAT WE’VE LEARNEDMEASURING THE BUSINESS IMPACT OF LEARNING: WHAT WE’VE LEARNED
MEASURING THE BUSINESS IMPACT OF LEARNING: WHAT WE’VE LEARNED
Human Capital Media
 
The Role of Analytics in Talent Acquisition
The Role of Analytics in Talent AcquisitionThe Role of Analytics in Talent Acquisition
The Role of Analytics in Talent Acquisition
Human Capital Media
 
SQA Systematic process in every phase of development. Encompasses processes,...
SQA Systematic process in every phase of development.  Encompasses processes,...SQA Systematic process in every phase of development.  Encompasses processes,...
SQA Systematic process in every phase of development. Encompasses processes,...
siamibneedrish1
 
Testing in the Software Development Life Cycle (SDLC) is a systematic process...
Testing in the Software Development Life Cycle (SDLC) is a systematic process...Testing in the Software Development Life Cycle (SDLC) is a systematic process...
Testing in the Software Development Life Cycle (SDLC) is a systematic process...
DanuDriya
 
Why Apps Succeed: 4 Keys to Winning the Digital Quality Game
Why Apps Succeed: 4 Keys to Winning the Digital Quality GameWhy Apps Succeed: 4 Keys to Winning the Digital Quality Game
Why Apps Succeed: 4 Keys to Winning the Digital Quality Game
Austin Marie Gay
 
DevSecCon KeyNote London 2015
DevSecCon KeyNote London 2015DevSecCon KeyNote London 2015
DevSecCon KeyNote London 2015
Shannon Lietz
 
Owasp summit debrief v1.0 (jun 2017)
Owasp summit debrief v1.0 (jun 2017)Owasp summit debrief v1.0 (jun 2017)
Owasp summit debrief v1.0 (jun 2017)
owaspsummit
 
Just4Meeting 2012 - How to protect your web applications
Just4Meeting 2012 -  How to protect your web applicationsJust4Meeting 2012 -  How to protect your web applications
Just4Meeting 2012 - How to protect your web applications
Magno Logan
 
Sophanic's Company Profile
Sophanic's Company ProfileSophanic's Company Profile
Sophanic's Company Profile
Socrates Okonkwo
 
7 Best Practices for your Moodle RFP
7 Best Practices for your Moodle RFP 7 Best Practices for your Moodle RFP
7 Best Practices for your Moodle RFP
Lambda Solutions
 
Empower your career - Silicon Coder
Empower your career - Silicon CoderEmpower your career - Silicon Coder
Empower your career - Silicon Coder
Arun Gupta
 
Design Secrets Hiding in Your Web Analytics Dataeb analytics
Design Secrets Hiding in Your Web Analytics Dataeb analyticsDesign Secrets Hiding in Your Web Analytics Dataeb analytics
Design Secrets Hiding in Your Web Analytics Dataeb analytics
UXPA International
 
Design Secrets Hiding in Your Web Analytics Data
Design Secrets Hiding in Your Web Analytics DataDesign Secrets Hiding in Your Web Analytics Data
Design Secrets Hiding in Your Web Analytics Data
UXPA International
 
Ad

More from Denim Group (20)

Long-term Impact of Log4J
Long-term Impact of Log4JLong-term Impact of Log4J
Long-term Impact of Log4J
Denim Group
 
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
Denim Group
 
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
Denim Group
 
Optimizing Security Velocity in Your DevSecOps Pipeline at Scale
Optimizing Security Velocity in Your DevSecOps Pipeline at ScaleOptimizing Security Velocity in Your DevSecOps Pipeline at Scale
Optimizing Security Velocity in Your DevSecOps Pipeline at Scale
Denim Group
 
Application Asset Management with ThreadFix
 Application Asset Management with ThreadFix Application Asset Management with ThreadFix
Application Asset Management with ThreadFix
Denim Group
 
AppSec Fast and Slow: Your DevSecOps CI/CD Pipeline Isn’t an SSA Program
AppSec Fast and Slow: Your DevSecOps CI/CD Pipeline Isn’t an SSA ProgramAppSec Fast and Slow: Your DevSecOps CI/CD Pipeline Isn’t an SSA Program
AppSec Fast and Slow: Your DevSecOps CI/CD Pipeline Isn’t an SSA Program
Denim Group
 
Using Collaboration to Make Application Vulnerability Management a Team Sport
Using Collaboration to Make Application Vulnerability Management a Team SportUsing Collaboration to Make Application Vulnerability Management a Team Sport
Using Collaboration to Make Application Vulnerability Management a Team Sport
Denim Group
 
Managing Penetration Testing Programs and Vulnerability Time to Live with Thr...
Managing Penetration Testing Programs and Vulnerability Time to Live with Thr...Managing Penetration Testing Programs and Vulnerability Time to Live with Thr...
Managing Penetration Testing Programs and Vulnerability Time to Live with Thr...
Denim Group
 
Security Champions: Pushing Security Expertise to the Edges of Your Organization
Security Champions: Pushing Security Expertise to the Edges of Your OrganizationSecurity Champions: Pushing Security Expertise to the Edges of Your Organization
Security Champions: Pushing Security Expertise to the Edges of Your Organization
Denim Group
 
The As, Bs, and Four Cs of Testing Cloud-Native Applications
The As, Bs, and Four Cs of Testing Cloud-Native ApplicationsThe As, Bs, and Four Cs of Testing Cloud-Native Applications
The As, Bs, and Four Cs of Testing Cloud-Native Applications
Denim Group
 
An Updated Take: Threat Modeling for IoT Systems
An Updated Take: Threat Modeling for IoT SystemsAn Updated Take: Threat Modeling for IoT Systems
An Updated Take: Threat Modeling for IoT Systems
Denim Group
 
Continuous Authority to Operate (ATO) with ThreadFix – Bringing Commercial In...
Continuous Authority to Operate (ATO) with ThreadFix – Bringing Commercial In...Continuous Authority to Operate (ATO) with ThreadFix – Bringing Commercial In...
Continuous Authority to Operate (ATO) with ThreadFix – Bringing Commercial In...
Denim Group
 
A New View of Your Application Security Program with Snyk and ThreadFix
A New View of Your Application Security Program with Snyk and ThreadFixA New View of Your Application Security Program with Snyk and ThreadFix
A New View of Your Application Security Program with Snyk and ThreadFix
Denim Group
 
Enabling Developers in Your Application Security Program With Coverity and Th...
Enabling Developers in Your Application Security Program With Coverity and Th...Enabling Developers in Your Application Security Program With Coverity and Th...
Enabling Developers in Your Application Security Program With Coverity and Th...
Denim Group
 
AppSec in a World of Digital Transformation
AppSec in a World of Digital TransformationAppSec in a World of Digital Transformation
AppSec in a World of Digital Transformation
Denim Group
 
The As, Bs, and Four Cs of Testing Cloud-Native Applications
The As, Bs, and Four Cs of Testing Cloud-Native ApplicationsThe As, Bs, and Four Cs of Testing Cloud-Native Applications
The As, Bs, and Four Cs of Testing Cloud-Native Applications
Denim Group
 
Enabling Developers in Your Application Security Program With Coverity and Th...
Enabling Developers in Your Application Security Program With Coverity and Th...Enabling Developers in Your Application Security Program With Coverity and Th...
Enabling Developers in Your Application Security Program With Coverity and Th...
Denim Group
 
AppSec in a World of Digital Transformation
 AppSec in a World of Digital Transformation AppSec in a World of Digital Transformation
AppSec in a World of Digital Transformation
Denim Group
 
Enumerating Enterprise Attack Surface
Enumerating Enterprise Attack SurfaceEnumerating Enterprise Attack Surface
Enumerating Enterprise Attack Surface
Denim Group
 
Enumerating Enterprise Attack Surface
Enumerating Enterprise Attack SurfaceEnumerating Enterprise Attack Surface
Enumerating Enterprise Attack Surface
Denim Group
 
Long-term Impact of Log4J
Long-term Impact of Log4JLong-term Impact of Log4J
Long-term Impact of Log4J
Denim Group
 
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
Denim Group
 
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
Denim Group
 
Optimizing Security Velocity in Your DevSecOps Pipeline at Scale
Optimizing Security Velocity in Your DevSecOps Pipeline at ScaleOptimizing Security Velocity in Your DevSecOps Pipeline at Scale
Optimizing Security Velocity in Your DevSecOps Pipeline at Scale
Denim Group
 
Application Asset Management with ThreadFix
 Application Asset Management with ThreadFix Application Asset Management with ThreadFix
Application Asset Management with ThreadFix
Denim Group
 
AppSec Fast and Slow: Your DevSecOps CI/CD Pipeline Isn’t an SSA Program
AppSec Fast and Slow: Your DevSecOps CI/CD Pipeline Isn’t an SSA ProgramAppSec Fast and Slow: Your DevSecOps CI/CD Pipeline Isn’t an SSA Program
AppSec Fast and Slow: Your DevSecOps CI/CD Pipeline Isn’t an SSA Program
Denim Group
 
Using Collaboration to Make Application Vulnerability Management a Team Sport
Using Collaboration to Make Application Vulnerability Management a Team SportUsing Collaboration to Make Application Vulnerability Management a Team Sport
Using Collaboration to Make Application Vulnerability Management a Team Sport
Denim Group
 
Managing Penetration Testing Programs and Vulnerability Time to Live with Thr...
Managing Penetration Testing Programs and Vulnerability Time to Live with Thr...Managing Penetration Testing Programs and Vulnerability Time to Live with Thr...
Managing Penetration Testing Programs and Vulnerability Time to Live with Thr...
Denim Group
 
Security Champions: Pushing Security Expertise to the Edges of Your Organization
Security Champions: Pushing Security Expertise to the Edges of Your OrganizationSecurity Champions: Pushing Security Expertise to the Edges of Your Organization
Security Champions: Pushing Security Expertise to the Edges of Your Organization
Denim Group
 
The As, Bs, and Four Cs of Testing Cloud-Native Applications
The As, Bs, and Four Cs of Testing Cloud-Native ApplicationsThe As, Bs, and Four Cs of Testing Cloud-Native Applications
The As, Bs, and Four Cs of Testing Cloud-Native Applications
Denim Group
 
An Updated Take: Threat Modeling for IoT Systems
An Updated Take: Threat Modeling for IoT SystemsAn Updated Take: Threat Modeling for IoT Systems
An Updated Take: Threat Modeling for IoT Systems
Denim Group
 
Continuous Authority to Operate (ATO) with ThreadFix – Bringing Commercial In...
Continuous Authority to Operate (ATO) with ThreadFix – Bringing Commercial In...Continuous Authority to Operate (ATO) with ThreadFix – Bringing Commercial In...
Continuous Authority to Operate (ATO) with ThreadFix – Bringing Commercial In...
Denim Group
 
A New View of Your Application Security Program with Snyk and ThreadFix
A New View of Your Application Security Program with Snyk and ThreadFixA New View of Your Application Security Program with Snyk and ThreadFix
A New View of Your Application Security Program with Snyk and ThreadFix
Denim Group
 
Enabling Developers in Your Application Security Program With Coverity and Th...
Enabling Developers in Your Application Security Program With Coverity and Th...Enabling Developers in Your Application Security Program With Coverity and Th...
Enabling Developers in Your Application Security Program With Coverity and Th...
Denim Group
 
AppSec in a World of Digital Transformation
AppSec in a World of Digital TransformationAppSec in a World of Digital Transformation
AppSec in a World of Digital Transformation
Denim Group
 
The As, Bs, and Four Cs of Testing Cloud-Native Applications
The As, Bs, and Four Cs of Testing Cloud-Native ApplicationsThe As, Bs, and Four Cs of Testing Cloud-Native Applications
The As, Bs, and Four Cs of Testing Cloud-Native Applications
Denim Group
 
Enabling Developers in Your Application Security Program With Coverity and Th...
Enabling Developers in Your Application Security Program With Coverity and Th...Enabling Developers in Your Application Security Program With Coverity and Th...
Enabling Developers in Your Application Security Program With Coverity and Th...
Denim Group
 
AppSec in a World of Digital Transformation
 AppSec in a World of Digital Transformation AppSec in a World of Digital Transformation
AppSec in a World of Digital Transformation
Denim Group
 
Enumerating Enterprise Attack Surface
Enumerating Enterprise Attack SurfaceEnumerating Enterprise Attack Surface
Enumerating Enterprise Attack Surface
Denim Group
 
Enumerating Enterprise Attack Surface
Enumerating Enterprise Attack SurfaceEnumerating Enterprise Attack Surface
Enumerating Enterprise Attack Surface
Denim Group
 

Recently uploaded (20)

Electronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploitElectronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploit
niftliyevhuseyn
 
Vaibhav Gupta BAML: AI work flows without Hallucinations
Vaibhav Gupta BAML: AI work flows without HallucinationsVaibhav Gupta BAML: AI work flows without Hallucinations
Vaibhav Gupta BAML: AI work flows without Hallucinations
john409870
 
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
organizerofv
 
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Aqusag Technologies
 
Splunk Security Update | Public Sector Summit Germany 2025
Splunk Security Update | Public Sector Summit Germany 2025Splunk Security Update | Public Sector Summit Germany 2025
Splunk Security Update | Public Sector Summit Germany 2025
Splunk
 
MINDCTI revenue release Quarter 1 2025 PR
MINDCTI revenue release Quarter 1 2025 PRMINDCTI revenue release Quarter 1 2025 PR
MINDCTI revenue release Quarter 1 2025 PR
MIND CTI
 
Greenhouse_Monitoring_Presentation.pptx.
Greenhouse_Monitoring_Presentation.pptx.Greenhouse_Monitoring_Presentation.pptx.
Greenhouse_Monitoring_Presentation.pptx.
hpbmnnxrvb
 
Build Your Own Copilot & Agents For Devs
Build Your Own Copilot & Agents For DevsBuild Your Own Copilot & Agents For Devs
Build Your Own Copilot & Agents For Devs
Brian McKeiver
 
Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptxSpecial Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
shyamraj55
 
Rusty Waters: Elevating Lakehouses Beyond Spark
Rusty Waters: Elevating Lakehouses Beyond SparkRusty Waters: Elevating Lakehouses Beyond Spark
Rusty Waters: Elevating Lakehouses Beyond Spark
carlyakerly1
 
Generative Artificial Intelligence (GenAI) in Business
Generative Artificial Intelligence (GenAI) in BusinessGenerative Artificial Intelligence (GenAI) in Business
Generative Artificial Intelligence (GenAI) in Business
Dr. Tathagat Varma
 
Web and Graphics Designing Training in Rajpura
Web and Graphics Designing Training in RajpuraWeb and Graphics Designing Training in Rajpura
Web and Graphics Designing Training in Rajpura
Erginous Technology
 
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager APIUiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPathCommunity
 
Andrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell: Transforming Business Strategy Through Data-Driven InsightsAndrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell
 
Mastering Advance Window Functions in SQL.pdf
Mastering Advance Window Functions in SQL.pdfMastering Advance Window Functions in SQL.pdf
Mastering Advance Window Functions in SQL.pdf
Spiral Mantra
 
Unlocking the Power of IVR: A Comprehensive Guide
Unlocking the Power of IVR: A Comprehensive GuideUnlocking the Power of IVR: A Comprehensive Guide
Unlocking the Power of IVR: A Comprehensive Guide
vikasascentbpo
 
Role of Data Annotation Services in AI-Powered Manufacturing
Role of Data Annotation Services in AI-Powered ManufacturingRole of Data Annotation Services in AI-Powered Manufacturing
Role of Data Annotation Services in AI-Powered Manufacturing
Andrew Leo
 
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc
 
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep DiveDesigning Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
ScyllaDB
 
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
BookNet Canada
 
Electronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploitElectronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploit
niftliyevhuseyn
 
Vaibhav Gupta BAML: AI work flows without Hallucinations
Vaibhav Gupta BAML: AI work flows without HallucinationsVaibhav Gupta BAML: AI work flows without Hallucinations
Vaibhav Gupta BAML: AI work flows without Hallucinations
john409870
 
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
organizerofv
 
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Aqusag Technologies
 
Splunk Security Update | Public Sector Summit Germany 2025
Splunk Security Update | Public Sector Summit Germany 2025Splunk Security Update | Public Sector Summit Germany 2025
Splunk Security Update | Public Sector Summit Germany 2025
Splunk
 
MINDCTI revenue release Quarter 1 2025 PR
MINDCTI revenue release Quarter 1 2025 PRMINDCTI revenue release Quarter 1 2025 PR
MINDCTI revenue release Quarter 1 2025 PR
MIND CTI
 
Greenhouse_Monitoring_Presentation.pptx.
Greenhouse_Monitoring_Presentation.pptx.Greenhouse_Monitoring_Presentation.pptx.
Greenhouse_Monitoring_Presentation.pptx.
hpbmnnxrvb
 
Build Your Own Copilot & Agents For Devs
Build Your Own Copilot & Agents For DevsBuild Your Own Copilot & Agents For Devs
Build Your Own Copilot & Agents For Devs
Brian McKeiver
 
Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptxSpecial Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
shyamraj55
 
Rusty Waters: Elevating Lakehouses Beyond Spark
Rusty Waters: Elevating Lakehouses Beyond SparkRusty Waters: Elevating Lakehouses Beyond Spark
Rusty Waters: Elevating Lakehouses Beyond Spark
carlyakerly1
 
Generative Artificial Intelligence (GenAI) in Business
Generative Artificial Intelligence (GenAI) in BusinessGenerative Artificial Intelligence (GenAI) in Business
Generative Artificial Intelligence (GenAI) in Business
Dr. Tathagat Varma
 
Web and Graphics Designing Training in Rajpura
Web and Graphics Designing Training in RajpuraWeb and Graphics Designing Training in Rajpura
Web and Graphics Designing Training in Rajpura
Erginous Technology
 
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager APIUiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPathCommunity
 
Andrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell: Transforming Business Strategy Through Data-Driven InsightsAndrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell
 
Mastering Advance Window Functions in SQL.pdf
Mastering Advance Window Functions in SQL.pdfMastering Advance Window Functions in SQL.pdf
Mastering Advance Window Functions in SQL.pdf
Spiral Mantra
 
Unlocking the Power of IVR: A Comprehensive Guide
Unlocking the Power of IVR: A Comprehensive GuideUnlocking the Power of IVR: A Comprehensive Guide
Unlocking the Power of IVR: A Comprehensive Guide
vikasascentbpo
 
Role of Data Annotation Services in AI-Powered Manufacturing
Role of Data Annotation Services in AI-Powered ManufacturingRole of Data Annotation Services in AI-Powered Manufacturing
Role of Data Annotation Services in AI-Powered Manufacturing
Andrew Leo
 
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc
 
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep DiveDesigning Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
ScyllaDB
 
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
BookNet Canada
 

AppSec Survey 2.0 Fine-Tuning an AppSec Training Program Based on Data

  • 1. AppSec USA 2014 Denver, Colorado AppSec Survey 2.0: Fine-Tuning an AppSec Training Program Based on Data John B. Dickson, CISSP @johnbdickson September 18, 2014
  • 2. Introduction John B. Dickson, CISSP • Application Security Enthusiast • Ex-AF Guy & ISSA Distinguished Fellow • Serial Entrepreneur & MBA Type • Dad
  • 3. When Not Thinking about AppSec… I am Snake Hunting on a Ranch in South Texas
  • 4. Snake Hunting Essentials Cooler Hat Cool Hat Snake Guards Common Gardening Tools Guy who has a machete and who is actually good at “catching” snakes Machete OWASP AppSec 2011 t-­‐shirt © Copyright 2014 Denim Group - All Rights Reserved
  • 5. • Background • Premise • AppSec Study 1.0 Results – What We Learned • Approach and Survey ParKcipants • Key Results • What We Can Put To Work • Conclusions and QuesKons & Answers Overview
  • 6. AppSec Study 1.0 Results • Things we Knew Last Year • Key Findings of Last Year’s Study • AddiKonal Stuff We Learned Along the Way • Development training is hard • Results are rarely measured for ROI • Training is typically part of any AppSec program
  • 7. AppSec Study 1.0 Results • Things we Knew Last Year • Key Findings of Last Year’s Study • AddiKonal Stuff We Learned Long the Way • 25% retenKon aXer training • QA did worse than architects and soXware developers • Respondents answered basic awareness quesKons but not coding pracKces
  • 8. • Things we Knew Last Year • Key Findings of Last Year’s Study • AddiConal Stuff We Learned Long the Way • SoXware developers learn differently than companies teach • IncenKves ma[er • Surveys are hard! AppSec Study 1.0 Results
  • 9. Overview of 2014 “2.0” Study • 600 respondents • Represents mulKple industries • Asked the same applicaKon security quesKons as 2013 survey • Expanded to include training method quesKons • No “before” and “aXer” analysis • No classroom training opportuniKes • Used more social media • Data collecKon ongoing
  • 10. Approach and Survey Participants Sample QuesCons QuesKons that tested basic knowledge of applicaKon security: • ApplicaKon security is best defined as… • Threat Modeling is… • Input ValidaKon is…
  • 11. Approach and Survey Participants Sample QuesCons QuesKons that tested understanding of defensive coding: • Marking a cookie as “secure” will… • Which of the following will help protect against XSS… • Which of the following is NOT an example of good session policy…
  • 12. Approach and Survey Participants Delivery Means • Direct Delivery of Customized Links via E-­‐mail • Survey Monkey paid • Social Media – Facebook – Linkedin Targets • SoXware Developers • Architects • Quality Assurance
  • 13. Demographic Questions Asked • What is your primary job funcKon? • What is your company's size? • How many years of soXware development experience do you have? • How much previous applicaKon security training have you received?
  • 14. 2014 Study Demographics How many years of soMware development experience do you Less than a Year 18% 1-­‐2 Years 9% 2-­‐4 Years 10% 4-­‐7 Years 13% More than 12 7-­‐12 Years 16% Years 34% have?
  • 15. 2014 Study Demographics What is your primary job Other 35% Quality Assurance 6% SoXware Developer 53% funcCon? Architect 6%
  • 16. 2014 Study Demographics What is your company size? 8% 8% 29% 8% 10% 37% 1-­‐24 Employees 25-­‐99 Employees 100-­‐499 Employees 500-­‐2499 Employees 2500-­‐9999 Employees 10,000 or more Employees
  • 17. 2014 Study Demographics How much previous applicaCon security training experience have None 31% Less than a Day 19% More than 3 At least 1 day, but less than 2 days 17% At least 2 days, but less than 3 days 8% days 25% you received?
  • 18. Key Survey Results • Data shows soXware developers posiKvely answer quesKons about applicaKon security 56% of the Kme • 2013 Denim Group study results: 58% • 2014 Aspect Study: 60%
  • 19. Change Implementation Did your organizaCon implement any SDLC or process improvement steps to formalize concepts learned in training? Yes 33% No 25% I don't know 42%
  • 20. Types of Training Received Types of Training Received 0 50 100 150 200 250 Other Wri[en Materials 1-­‐on-­‐1 Coaching Webinars or Videos Websites Crowdsourcing Sites Developer E-­‐mail Lists or RSS feeds Social Learning Plaqorms Social Media e-­‐Learning, CBT Instructor-­‐Led PresentaKons
  • 21. E-Learning & Instructor-Led Training Types of Training Received 0 100 200 300 Other Wri[en Materials 1-­‐on-­‐1 Coaching Webinars or Videos Websites Crowdsourcing Sites E-­‐Learning & Instructor-­‐led Training are SKll the Primary ApplicaKon Security Training Approach Developer E-­‐mail Lists or RSS feeds Social Learning Plaqorms Social Media e-­‐Learning, CBT Instructor-­‐Led PresentaKons
  • 22. Perceived Effectiveness of Training 0 50 100 150 200 250 300 350 400 450 500 Wri[en Materials 1-­‐on-­‐1 Coaching Webinars or Videos Websites Crowdsourcing Sites Developer E-­‐mail Lists or RSS feeds Social Learning Plaqorms Social Media e-­‐Learning, CBT Instructor-­‐Led PresentaKons 1: Not EffecKve 2: Somewhat EffecKve 3: Very EffecKve
  • 23. Question Types Respondents Fared Far Worse on QuesKons Involving Secure Coding PracKces versus ApplicaKon Security Awareness QuesKons 41% 59% 0% 10% 20% 30% 40% 50% 60% 70% Awareness QuesKons PrescripKve QuesKons % of QuesKons Answered Correctly
  • 24. Pass Rate by Job Function Quality Assurance respondents Fared 50% worse than soXware developers and architects Average Pass Rate 25% 20% 15% 10% 5% 0% Other SoXware Developer Quality Assurance Architect 70% or more quesKons answered correctly
  • 25. Pass Rate by Previous Training The Pass Rate More Than Doubled for Respondents Who Had More Than Three Days ApplicaKon Security Training Average Pass Rate 30% 25% 20% 15% 10% 5% 0% Less than a Day or None At least 1 day, but less than 3 days More than 3 days 70% or more correct
  • 26. Pass Rate by Job Function: Security Respondents that worked for security organizaKons or vendors DID fare well compared to other respondents Average Pass Rate 90% 80% 70% 60% 50% 40% 30% 20% 10% 0% Security-­‐Related Everyone Else 70% or more quesKons answered correctly
  • 27. What we Can Put to Work • Refresher training is criCcal • Even with 3+ days of appsec training, most respondents did not have a “passing” grade of 70% • Like any other training topic, leX unreinforced, what learned will be forgo[en over Kme • ParKcularly given the lack of SDLC changes • Likely an area for addiKonal study for 2015 appsec training study
  • 28. What we Can Put to Work • Training without SDLC changes likely will produce the same results • 33% of the respondents said their organizaKon implemented some security SDLC improvements • 67% either answered “no” or “don’t know” • OrganizaKons cannot rely exclusively on developers retenKon and iniKaKve to produce long-­‐term decline in applicaKon vulnerabiliKes
  • 29. What we Can Put to Work • Augment QA with Focused AppSec Training • QA has consistently responded poorly relaKve to developers and architects • Many organizaKon put their most junior developers in QA to start • QA is where appsec “lives” in many organizaKons • OrganizaKons might considering “doubling down” on appsec training for QA staff to compensate for this fact
  • 30. What we Can Put to Work • IncenCves Ma`er When Working with Developers • We used incenKves throughout the study to collect responses -­‐ #Success! • SoXware developers have infinite reasons to ignore engagement by the AppSec team • Rewards help nudge soXware developers
  • 31. What we Can Put to Work • Training programs must be tailored to be effecCve • Formal programs like classroom training and e-­‐ Learning are sKll the bread and bu[er of appsec training programs • ConsumpKon rates of e-­‐Learning sKll abysmal without incenKves or internal markeKng • Add newer ways of learning to reinforce certain key points and to serve AppSec corner cases • Leverage current events to reinforce other key points
  • 32. Conclusions • Data shows soXware developers posiKvely answer quesKons about applicaKon security 56% of the Kme • Data-­‐driven applicaKon security programs will likely be more successful and chart improvement • SophisKcated security managers use incenKves and tailor programs to improve appsec IQ
  • 33. Questions and Answers White Paper? MenCon it on Twi`er John B. Dickson, CISSP @johnbdickson #appsecstudy