SlideShare a Scribd company logo
Jump-Start Your Application Security
    p            pp                y
Knowledge: For the Network Security
Guy Who Knows Nothing about
Applications
A li ti
     Jeremiah Grossman
     John B. Dickson, CISSP
Speaker’s Backgrounds

•   Jeremiah Grossman
    – Founder & CTO of WhiteHat Security
    – World-renowned expert in Web security and founder of the Web Application
      Security Consortium (WASC)
    – Former information security officer at Yahoo!
•   John Dickson
    – Denim Group Principal and career security professional
    – Assists CISO’s build application security programs
               CISO s
    – Prior to Denim Group, was a information security consultant at SecureLogix,
      KPMG, Trident Data Systems, and US Air Force




                                                                                    1
Company Backgrounds

•   WhiteHat Security Background
    – WhiteHat Security is the leading provider of website risk management solutions
    – WhiteHat serves hundreds of customers in e-commerce, financial services,
      information technology and healthcare including many of the Fortune 1000
      WhiteHat Sentinel the company’s flagship product family launched in 2003
                Sentinel,    company s                    family,
•   Denim Group Background
    – Denim Group is a professional services company that
       • develops secure software
       • helps organizations assess and mitigate risk with existing software
       • provides training on best practices in software security
    – WhiteHat Security’s Premier Integration Partner
        • Built Snort-Sentinel Integration for real-time application level blocking




                                                                                       2
“Houston we have a Problem”

•   Throughout industry security officers are responsible for the security
    of applications
     – If a breach occurs involving applications, who gets called first?
     – CIO’s largely can’t distinguish between web applications and the infrastructure in
       which applications reside
     – Rarely, if ever, do security manager have control of development efforts to
       remediate
•   It begs the question
     – Why are development colleagues not on the “hot seat” as well?
•   Security professionals are rushing into the application security world
     – New entrants into the field have less background knowledge in applications
                                                 g              g      pp
     – Demand to increase for application-smart security professionals




                                                                                            3
The Key Problem


Security officers worry about application vulnerabilities, but
       have little power to f them…
                            fix

Development managers have power to fix
      application vulnerabilities, but don’t worry about them




                                                                 4
Business Impact of this Problem

•   Many Security professionals are ill-equipped to secure applications
     – Difficulty analyzing application-level scan reports
     – Sometimes powerless to overcome development team objections
     – Network vulnerabilities get fixed relatively quickly – not the case for applications


•   WhiteHat Website Security Statistics Report
     – 82% of websites have had a HIGH, CRITICAL, or URGENT issue
     – V l
       Vulnerability time-to-fix metrics are not changing substantively, t i ll requiring
               bilit ti   t fi     ti          t h    i     b t ti l typically      ii
       weeks to months to achieve resolution
     – Security managers need to do a better job of managing or influencing the solution




                                                                                              5
Results of Denim Group Survey
•   75% of security respondents did not know the likely outcome of the
    exploitation of a Cross-Site Scripting (XSS) vulnerability
•   Nearly 70% did not know that modern development languages like
    Java and .NET could provide protection against buffer overflow
    vulnerabilities
•   Nearly 50% thought developers could perform source code reviews in
    the requirements
•   Nearly 70% of respondents could not identify that logical vulnerabilities
    involving authorization and authentication are typically more difficult to
    remediate than coding flaws such as Cross-Site Scripting (XSS) or
    buffer overflow vulnerabilities




                                                                                 6
A Journey of 1,000 Miles Starts with one Step…

•   Raise the bar on your knowledge of key aspects of software
    development, including:
    – Key coding terms
    – software architecture terms
    – Different software development methodologies
•   Build up a dictionary of terms tailored to your environment
•   Find a trusted development colleague to ask questions you wouldn’t
    ask in a public meeting
•   Understand what SDLC’s their organization uses
    – Different software development methodologies will drive how you want to introduce
      security practices to internal development teams




                                                                                          7
Ask a Better Set of Questions!

•   Consider Participating in Threat Modeling Process
    – A structured approach to understanding where vulnerabilities might exist in complex
      systems such as software applications
    – Enables security professionals to characterize risk and ask a more sophisticated
      set of questions to developers without diving to the level of application source code
    – Will help a non-coder think in more concrete terms by decomposing a complex
      application into its component pieces




                                                                                              8
How Security Guys Think




                          9
How Developers Think




                       10
How Security Guys Should Think




                                 11
WhiteHat Sentinel – Snort Integration
•    Denim Group developed technology based on the WhiteHat’s open
     XML application programming interface (API), allowing for a
     seamless integration with Snort® to block website attacks
              – Highly accurate vulnerability information combined with an open XML API
                allows WhiteHat Sentinel data to be shared and employed within an
                organization s
                organization’s existing communications and reporting infrastructure
              – Integration supports both open source and commercial versions of IPS/IDS
              – Any IDS/IPS that imports these rules will work


•    Sentinel
     S ti l customers can now use vulnerability d t t quickly create
                  t                 l    bilit data to i kl       t
     ultra-targeted Snort rules
              – Expands capability of IPS to detect and block application layer attacks in real-
                time
              – Fine-tunes Snort alerts and correlate findings to reduce noise
              – Leverages existing, deployed infrastructure
                   » 80% Fortune 100 use Snort
                   » No need to retrain employees or reconfigure networks
How the integration works:

•   Implemented as a script, which when executed will securely
                      script             executed,
    connect to the Sentinel open API to extract website’s vulnerability
    details
             – Script translates downloaded data into Snort alert rules
             – Users apply rules to Snort IPS to alert on or block attacks

•   Simple deployment
             – All Sentinel customers have access to Open XML API free of charge

•   WhiteHat Open XML API also enables data exchange with:
             – W b Application Fi
               Web A li ti Firewalls  ll
             – Bug tracking systems
             – Security Information and Event Management systems
Contact Information

•   Jeremiah Grossman
    – jeremiah@whitehatsec.com
    – Twitter @jeremiahg

    www.whitehatsec.com


•   John B. Dickson, CISSP
    – john@denimgroup.com
    – Twitter @johnbdickson

    www.denimgroup.com




                                 14

More Related Content

What's hot (20)

PDF
Security operations center 5 security controls
AlienVault
 
PDF
Building secure mobile apps
Martin Vigo
 
PPTX
Outsmart Fraudsters: Give Customers Great User Experience While Keeping Fraud...
IBM Security
 
PPTX
Cybersecurity Hands-On Training
Tonex
 
PPTX
Vulnerability Assessment
primeteacher32
 
PPTX
An introduction to Cyber Essentials
Jisc
 
PPTX
Understanding Your Attack Surface and Detecting & Mitigating External Threats
Ulf Mattsson
 
PPTX
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
IBM Security
 
PPTX
Career Guidance on Cybersecurity by Mohammed Adam
Mohammed Adam
 
PPT
Ne Course Part Two
backdoor
 
PDF
Vulnerability Management
asherad
 
PDF
Chapter 2 konsep dasar keamanan
newbie2019
 
PPTX
Reducing the Impact of Cyber Attacks
James Cash
 
PDF
Cyber Security - IDS/IPS is not enough
Savvius, Inc
 
PPTX
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
IBM Security
 
PDF
Alien vault sans cyber threat intelligence
AlienVault
 
PDF
2015 Cyber Security
Allen Zhang
 
PPTX
Detect and Respond to Threats Better with IBM Security App Exchange Partners
IBM Security
 
PPTX
Addressing Healthcare Challenges Today
Ivanti
 
DOCX
VAPT- A Service on Eucalyptus Cloud
Swapna Shetye
 
Security operations center 5 security controls
AlienVault
 
Building secure mobile apps
Martin Vigo
 
Outsmart Fraudsters: Give Customers Great User Experience While Keeping Fraud...
IBM Security
 
Cybersecurity Hands-On Training
Tonex
 
Vulnerability Assessment
primeteacher32
 
An introduction to Cyber Essentials
Jisc
 
Understanding Your Attack Surface and Detecting & Mitigating External Threats
Ulf Mattsson
 
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
IBM Security
 
Career Guidance on Cybersecurity by Mohammed Adam
Mohammed Adam
 
Ne Course Part Two
backdoor
 
Vulnerability Management
asherad
 
Chapter 2 konsep dasar keamanan
newbie2019
 
Reducing the Impact of Cyber Attacks
James Cash
 
Cyber Security - IDS/IPS is not enough
Savvius, Inc
 
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
IBM Security
 
Alien vault sans cyber threat intelligence
AlienVault
 
2015 Cyber Security
Allen Zhang
 
Detect and Respond to Threats Better with IBM Security App Exchange Partners
IBM Security
 
Addressing Healthcare Challenges Today
Ivanti
 
VAPT- A Service on Eucalyptus Cloud
Swapna Shetye
 

Viewers also liked (6)

PDF
Agile and Secure
Denim Group
 
PDF
The Need For Open Software Security Standards In A Mobile And Cloudy World
Denim Group
 
PDF
Mobile Browser Content Handling
Denim Group
 
PDF
Software Security: Is OK Good Enough? OWASP AppSec USA 2011
Denim Group
 
PDF
Social Networks and Security: What Your Teenager Likely Won't Tell You
Denim Group
 
PPTX
How is Your AppSec Program Doing Compared to Others
Denim Group
 
Agile and Secure
Denim Group
 
The Need For Open Software Security Standards In A Mobile And Cloudy World
Denim Group
 
Mobile Browser Content Handling
Denim Group
 
Software Security: Is OK Good Enough? OWASP AppSec USA 2011
Denim Group
 
Social Networks and Security: What Your Teenager Likely Won't Tell You
Denim Group
 
How is Your AppSec Program Doing Compared to Others
Denim Group
 
Ad

Similar to Jump Start Your Application Security Knowledge (20)

PPTX
CIO Summit: Data Security in a Mobile World
iMIS
 
PPTX
CIO Summit: Data Security in a Mobile World
iMIS
 
KEY
Application Security Done Right
pvanwoud
 
PPSX
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare ☁
 
PPTX
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare ☁
 
PPTX
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare ☁
 
PDF
Top Strategies to Capture Security Intelligence for Applications
Denim Group
 
PPTX
Managing security threats in today’s enterprise
Quick Heal Technologies Ltd.
 
PDF
Application Security Program Management with Vulnerability Manager
Denim Group
 
PDF
Essentials of Web Application Security: what it is, why it matters and how to...
Cenzic
 
PPTX
Cyber security - It starts with the embedded system
Rogue Wave Software
 
PDF
Skeletons in the Closet: Securing Inherited Applications
Denim Group
 
PDF
Journey to the Cloud: Securing Your AWS Applications - April 2015
Alert Logic
 
PDF
Re-Thinking BYOD Policy.pptx
tmbainjr131
 
PDF
The Future of Software Security Assurance
Rafal Los
 
PPTX
Best Practices for a Mature Application Security Program Webinar - February 2016
Security Innovation
 
DOCX
Project Quality-SIPOCSelect a process of your choice and creat.docx
wkyra78
 
PPTX
Application Hackers Have A Handbook. Why Shouldn't You?
London School of Cyber Security
 
PDF
Streamlining AppSec Policy Definition.pptx
tmbainjr131
 
PPTX
Fortify-Application_Security_Foundation_Training.pptx
VictoriaChavesta
 
CIO Summit: Data Security in a Mobile World
iMIS
 
CIO Summit: Data Security in a Mobile World
iMIS
 
Application Security Done Right
pvanwoud
 
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare ☁
 
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare ☁
 
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare ☁
 
Top Strategies to Capture Security Intelligence for Applications
Denim Group
 
Managing security threats in today’s enterprise
Quick Heal Technologies Ltd.
 
Application Security Program Management with Vulnerability Manager
Denim Group
 
Essentials of Web Application Security: what it is, why it matters and how to...
Cenzic
 
Cyber security - It starts with the embedded system
Rogue Wave Software
 
Skeletons in the Closet: Securing Inherited Applications
Denim Group
 
Journey to the Cloud: Securing Your AWS Applications - April 2015
Alert Logic
 
Re-Thinking BYOD Policy.pptx
tmbainjr131
 
The Future of Software Security Assurance
Rafal Los
 
Best Practices for a Mature Application Security Program Webinar - February 2016
Security Innovation
 
Project Quality-SIPOCSelect a process of your choice and creat.docx
wkyra78
 
Application Hackers Have A Handbook. Why Shouldn't You?
London School of Cyber Security
 
Streamlining AppSec Policy Definition.pptx
tmbainjr131
 
Fortify-Application_Security_Foundation_Training.pptx
VictoriaChavesta
 
Ad

More from Denim Group (20)

PDF
Long-term Impact of Log4J
Denim Group
 
PDF
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
Denim Group
 
PDF
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
Denim Group
 
PDF
Optimizing Security Velocity in Your DevSecOps Pipeline at Scale
Denim Group
 
PDF
Application Asset Management with ThreadFix
Denim Group
 
PDF
OWASP San Antonio Meeting 10/2/20
Denim Group
 
PDF
AppSec Fast and Slow: Your DevSecOps CI/CD Pipeline Isn’t an SSA Program
Denim Group
 
PDF
Using Collaboration to Make Application Vulnerability Management a Team Sport
Denim Group
 
PDF
Managing Penetration Testing Programs and Vulnerability Time to Live with Thr...
Denim Group
 
PDF
Security Champions: Pushing Security Expertise to the Edges of Your Organization
Denim Group
 
PDF
The As, Bs, and Four Cs of Testing Cloud-Native Applications
Denim Group
 
PDF
An Updated Take: Threat Modeling for IoT Systems
Denim Group
 
PPTX
Continuous Authority to Operate (ATO) with ThreadFix – Bringing Commercial In...
Denim Group
 
PDF
A New View of Your Application Security Program with Snyk and ThreadFix
Denim Group
 
PDF
Enabling Developers in Your Application Security Program With Coverity and Th...
Denim Group
 
PDF
AppSec in a World of Digital Transformation
Denim Group
 
PDF
The As, Bs, and Four Cs of Testing Cloud-Native Applications
Denim Group
 
PDF
Enabling Developers in Your Application Security Program With Coverity and Th...
Denim Group
 
PDF
AppSec in a World of Digital Transformation
Denim Group
 
PDF
Enumerating Enterprise Attack Surface
Denim Group
 
Long-term Impact of Log4J
Denim Group
 
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
Denim Group
 
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
Denim Group
 
Optimizing Security Velocity in Your DevSecOps Pipeline at Scale
Denim Group
 
Application Asset Management with ThreadFix
Denim Group
 
OWASP San Antonio Meeting 10/2/20
Denim Group
 
AppSec Fast and Slow: Your DevSecOps CI/CD Pipeline Isn’t an SSA Program
Denim Group
 
Using Collaboration to Make Application Vulnerability Management a Team Sport
Denim Group
 
Managing Penetration Testing Programs and Vulnerability Time to Live with Thr...
Denim Group
 
Security Champions: Pushing Security Expertise to the Edges of Your Organization
Denim Group
 
The As, Bs, and Four Cs of Testing Cloud-Native Applications
Denim Group
 
An Updated Take: Threat Modeling for IoT Systems
Denim Group
 
Continuous Authority to Operate (ATO) with ThreadFix – Bringing Commercial In...
Denim Group
 
A New View of Your Application Security Program with Snyk and ThreadFix
Denim Group
 
Enabling Developers in Your Application Security Program With Coverity and Th...
Denim Group
 
AppSec in a World of Digital Transformation
Denim Group
 
The As, Bs, and Four Cs of Testing Cloud-Native Applications
Denim Group
 
Enabling Developers in Your Application Security Program With Coverity and Th...
Denim Group
 
AppSec in a World of Digital Transformation
Denim Group
 
Enumerating Enterprise Attack Surface
Denim Group
 

Recently uploaded (20)

PDF
The Past, Present & Future of Kenya's Digital Transformation
Moses Kemibaro
 
PDF
State-Dependent Conformal Perception Bounds for Neuro-Symbolic Verification
Ivan Ruchkin
 
PDF
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Neo4j
 
PDF
Structs to JSON: How Go Powers REST APIs
Emily Achieng
 
PDF
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
PDF
Lecture A - AI Workflows for Banking.pdf
Dr. LAM Yat-fai (林日辉)
 
PDF
The Future of Artificial Intelligence (AI)
Mukul
 
PPTX
IT Runs Better with ThousandEyes AI-driven Assurance
ThousandEyes
 
PPTX
AI in Daily Life: How Artificial Intelligence Helps Us Every Day
vanshrpatil7
 
PDF
Economic Impact of Data Centres to the Malaysian Economy
flintglobalapac
 
PDF
Build with AI and GDG Cloud Bydgoszcz- ADK .pdf
jaroslawgajewski1
 
PDF
OFFOFFBOX™ – A New Era for African Film | Startup Presentation
ambaicciwalkerbrian
 
PDF
TrustArc Webinar - Navigating Data Privacy in LATAM: Laws, Trends, and Compli...
TrustArc
 
PDF
Research-Fundamentals-and-Topic-Development.pdf
ayesha butalia
 
PDF
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
 
PPTX
PCU Keynote at IEEE World Congress on Services 250710.pptx
Ramesh Jain
 
PDF
Make GenAI investments go further with the Dell AI Factory
Principled Technologies
 
PDF
Tea4chat - another LLM Project by Kerem Atam
a0m0rajab1
 
PPTX
Agile Chennai 18-19 July 2025 | Emerging patterns in Agentic AI by Bharani Su...
AgileNetwork
 
PPTX
Using Google Data Studio (Looker Studio) to Create Effective and Easy Data Re...
Orage Technologies
 
The Past, Present & Future of Kenya's Digital Transformation
Moses Kemibaro
 
State-Dependent Conformal Perception Bounds for Neuro-Symbolic Verification
Ivan Ruchkin
 
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Neo4j
 
Structs to JSON: How Go Powers REST APIs
Emily Achieng
 
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
Lecture A - AI Workflows for Banking.pdf
Dr. LAM Yat-fai (林日辉)
 
The Future of Artificial Intelligence (AI)
Mukul
 
IT Runs Better with ThousandEyes AI-driven Assurance
ThousandEyes
 
AI in Daily Life: How Artificial Intelligence Helps Us Every Day
vanshrpatil7
 
Economic Impact of Data Centres to the Malaysian Economy
flintglobalapac
 
Build with AI and GDG Cloud Bydgoszcz- ADK .pdf
jaroslawgajewski1
 
OFFOFFBOX™ – A New Era for African Film | Startup Presentation
ambaicciwalkerbrian
 
TrustArc Webinar - Navigating Data Privacy in LATAM: Laws, Trends, and Compli...
TrustArc
 
Research-Fundamentals-and-Topic-Development.pdf
ayesha butalia
 
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
 
PCU Keynote at IEEE World Congress on Services 250710.pptx
Ramesh Jain
 
Make GenAI investments go further with the Dell AI Factory
Principled Technologies
 
Tea4chat - another LLM Project by Kerem Atam
a0m0rajab1
 
Agile Chennai 18-19 July 2025 | Emerging patterns in Agentic AI by Bharani Su...
AgileNetwork
 
Using Google Data Studio (Looker Studio) to Create Effective and Easy Data Re...
Orage Technologies
 

Jump Start Your Application Security Knowledge

  • 1. Jump-Start Your Application Security p pp y Knowledge: For the Network Security Guy Who Knows Nothing about Applications A li ti Jeremiah Grossman John B. Dickson, CISSP
  • 2. Speaker’s Backgrounds • Jeremiah Grossman – Founder & CTO of WhiteHat Security – World-renowned expert in Web security and founder of the Web Application Security Consortium (WASC) – Former information security officer at Yahoo! • John Dickson – Denim Group Principal and career security professional – Assists CISO’s build application security programs CISO s – Prior to Denim Group, was a information security consultant at SecureLogix, KPMG, Trident Data Systems, and US Air Force 1
  • 3. Company Backgrounds • WhiteHat Security Background – WhiteHat Security is the leading provider of website risk management solutions – WhiteHat serves hundreds of customers in e-commerce, financial services, information technology and healthcare including many of the Fortune 1000 WhiteHat Sentinel the company’s flagship product family launched in 2003 Sentinel, company s family, • Denim Group Background – Denim Group is a professional services company that • develops secure software • helps organizations assess and mitigate risk with existing software • provides training on best practices in software security – WhiteHat Security’s Premier Integration Partner • Built Snort-Sentinel Integration for real-time application level blocking 2
  • 4. “Houston we have a Problem” • Throughout industry security officers are responsible for the security of applications – If a breach occurs involving applications, who gets called first? – CIO’s largely can’t distinguish between web applications and the infrastructure in which applications reside – Rarely, if ever, do security manager have control of development efforts to remediate • It begs the question – Why are development colleagues not on the “hot seat” as well? • Security professionals are rushing into the application security world – New entrants into the field have less background knowledge in applications g g pp – Demand to increase for application-smart security professionals 3
  • 5. The Key Problem Security officers worry about application vulnerabilities, but have little power to f them… fix Development managers have power to fix application vulnerabilities, but don’t worry about them 4
  • 6. Business Impact of this Problem • Many Security professionals are ill-equipped to secure applications – Difficulty analyzing application-level scan reports – Sometimes powerless to overcome development team objections – Network vulnerabilities get fixed relatively quickly – not the case for applications • WhiteHat Website Security Statistics Report – 82% of websites have had a HIGH, CRITICAL, or URGENT issue – V l Vulnerability time-to-fix metrics are not changing substantively, t i ll requiring bilit ti t fi ti t h i b t ti l typically ii weeks to months to achieve resolution – Security managers need to do a better job of managing or influencing the solution 5
  • 7. Results of Denim Group Survey • 75% of security respondents did not know the likely outcome of the exploitation of a Cross-Site Scripting (XSS) vulnerability • Nearly 70% did not know that modern development languages like Java and .NET could provide protection against buffer overflow vulnerabilities • Nearly 50% thought developers could perform source code reviews in the requirements • Nearly 70% of respondents could not identify that logical vulnerabilities involving authorization and authentication are typically more difficult to remediate than coding flaws such as Cross-Site Scripting (XSS) or buffer overflow vulnerabilities 6
  • 8. A Journey of 1,000 Miles Starts with one Step… • Raise the bar on your knowledge of key aspects of software development, including: – Key coding terms – software architecture terms – Different software development methodologies • Build up a dictionary of terms tailored to your environment • Find a trusted development colleague to ask questions you wouldn’t ask in a public meeting • Understand what SDLC’s their organization uses – Different software development methodologies will drive how you want to introduce security practices to internal development teams 7
  • 9. Ask a Better Set of Questions! • Consider Participating in Threat Modeling Process – A structured approach to understanding where vulnerabilities might exist in complex systems such as software applications – Enables security professionals to characterize risk and ask a more sophisticated set of questions to developers without diving to the level of application source code – Will help a non-coder think in more concrete terms by decomposing a complex application into its component pieces 8
  • 10. How Security Guys Think 9
  • 12. How Security Guys Should Think 11
  • 13. WhiteHat Sentinel – Snort Integration • Denim Group developed technology based on the WhiteHat’s open XML application programming interface (API), allowing for a seamless integration with Snort® to block website attacks – Highly accurate vulnerability information combined with an open XML API allows WhiteHat Sentinel data to be shared and employed within an organization s organization’s existing communications and reporting infrastructure – Integration supports both open source and commercial versions of IPS/IDS – Any IDS/IPS that imports these rules will work • Sentinel S ti l customers can now use vulnerability d t t quickly create t l bilit data to i kl t ultra-targeted Snort rules – Expands capability of IPS to detect and block application layer attacks in real- time – Fine-tunes Snort alerts and correlate findings to reduce noise – Leverages existing, deployed infrastructure » 80% Fortune 100 use Snort » No need to retrain employees or reconfigure networks
  • 14. How the integration works: • Implemented as a script, which when executed will securely script executed, connect to the Sentinel open API to extract website’s vulnerability details – Script translates downloaded data into Snort alert rules – Users apply rules to Snort IPS to alert on or block attacks • Simple deployment – All Sentinel customers have access to Open XML API free of charge • WhiteHat Open XML API also enables data exchange with: – W b Application Fi Web A li ti Firewalls ll – Bug tracking systems – Security Information and Event Management systems
  • 15. Contact Information • Jeremiah Grossman – [email protected] – Twitter @jeremiahg www.whitehatsec.com • John B. Dickson, CISSP – [email protected] – Twitter @johnbdickson www.denimgroup.com 14