SlideShare a Scribd company logo
The “Fantastic 4”
Metrics You Can’t Ignore When Reducing
Application Layer Risk
2
Why application security metrics?
3
Why application security metrics?
Sometimes you need:
1. To communicate to your sponsors what you’re doing with the money they
provided for the program.
2. A way to communicate with your development teams that is anchored in
something more than just encouragement.
3. A tool to show yourself how much progress you’re making.
4
It’s a hostile
environment out there
5
It’s a hostile
environment out there
Applications have been a top vector for data breaches over
the last five years because they’re not coded with security
in mind. The software industry’s shift to composing
applications via pre-built—some would say “pre-0wned”—
components has made it more challenging for security
teams by introducing risk via the software supply chain.
So application security is important, but
how do you show progress?
6
Four key metrics to save the day
7
FANTASTIC
METRIC #1:
POLICY
COMPLIANCE
You have to have
some way of
measuring the quality
of applications; it
should be aligned with
the needs of the
business.
A lot of your program
measurements are
going to be anchored
in how well your
portfolio does against
a policy.
But what sort of
pass rate should
you expect?
9
10
FANTASTIC
METRIC #2:
FLAW
PREVALENCE
11
When vulnerabilities are
all around you might feel
like your world is on fire.
Let’s try to get our arms
around how common
some of these fatal flaws
really are.
12
Top vulnerabilities by industry
13
FANTASTIC
METRIC #3:
FIX RATE
You know that guy,
the one who always
insists that the hole
you’re in isn’t as
deep as you think it
is…
It turns out that’s true
of AppSec. There are
a lot of people out
there making their
applications safer,
never accepting “no”
for an answer. And it
turns out that tracking
the flaws fixed can be
powerfully
motivational.
16
17
Source: Veracode State of Software Security vol. 6: https://info.veracode.com/state-of-
software-security-report-volume6.html
How? Empower developers
• Customers in the financial services and manufacturing verticals are
successfully fixing between 65% and 81% of the flaws found in their
applications. Applications undergoing remediation coaching (readouts)
reduce application risk 2.5x more than those that don’t, as measured by
average flaw density per MB
Source: Veracode State of Software Security vol. 6:
https://info.veracode.com/state-of-software-security-report-volume6.html
18
FANTASTIC
METRIC #4
19
Which One?
20
Which One?
It depends. Just as there’s no “one” lineup of a super hero team, you may find you need a different
set of metrics depending on the goals of your program—developer training completion, for instance,
or percent of applications undergoing automated testing. Ultimately it’s up to you, and the needs of
your business.
21
Answers Key Questions for CISOs
• Which industries are doing the best job of reducing
application-layer risk ?
• Do I have more serious vulnerabilities than my peers?
• What percentage of vulnerabilities do my peers remediate?
• How many of our applications should pass the OWASP
Top 10 when initially assessed?
• What are the Top 10 most common vulnerabilities in our
vertical?
• How can I reduce more risk in my organization’s
applications?

More Related Content

PDF
Selling Your Organization on Application Security
Veracode
 
PDF
Mobile Security: Apps are our digital lives.
Veracode
 
PDF
application-security-fallacies-and-realities-veracode
sciccone
 
PDF
Healthcare application-security-practices-survey-veracode
Veracode
 
PDF
Infosecurity Europe - Infographic
Synopsys Software Integrity Group
 
PPTX
How to prevent data leaks with application security testing strategy
Cigniti Technologies Ltd
 
PPTX
Intelligence on the Intractable Problem of Software Security
Tyler Shields
 
PDF
Next Generation Endpoint Prtection Buyers Guide
Jeremiah Grossman
 
Selling Your Organization on Application Security
Veracode
 
Mobile Security: Apps are our digital lives.
Veracode
 
application-security-fallacies-and-realities-veracode
sciccone
 
Healthcare application-security-practices-survey-veracode
Veracode
 
Infosecurity Europe - Infographic
Synopsys Software Integrity Group
 
How to prevent data leaks with application security testing strategy
Cigniti Technologies Ltd
 
Intelligence on the Intractable Problem of Software Security
Tyler Shields
 
Next Generation Endpoint Prtection Buyers Guide
Jeremiah Grossman
 

What's hot (20)

PDF
Veracode Corporate Overview - Print
Andrew Kanikuru
 
PDF
Web Application Security Statistics Report 2016
Jeremiah Grossman
 
PDF
What are top 7 cyber security trends for 2020
TestingXperts
 
PDF
WhiteHat 2014 Website Security Statistics Report
Jeremiah Grossman
 
PDF
2016 Trends in Security
Ioannis Aligizakis, M.Sc.
 
DOCX
Research Paper
David Chaponniere
 
PDF
Veracode State of Software Security vol 4
stemkat
 
PPTX
How to Gather Global Mobile Threat Intelligence
Zimperium
 
PDF
Five Reasons to Look Beyond Math-based Next-Gen Antivirus
Sarah Vanier
 
PPTX
Mobile Security: Perceptions vs Device-harvested Reality
Zimperium
 
PDF
State of Application Security Vol. 4
IBM Security
 
PDF
Healthcare Cybersecurity Survey 2018 - Sirius
Sirius
 
PPTX
Mobile Protect Pro - Powered by Zimperium
Zimperium
 
PDF
Ey giss-under-cyber-attack
Комсс Файквэе
 
PPTX
Cybersecurity and Healthcare - HIMSS 2018 Survey
Imperva
 
PDF
Secunia Vulnerability Review 2014
Kim Jensen
 
PPTX
Deutsche Telekom Partnering Operating Alliance Summit - Zimperium
Zimperium
 
PPTX
Proatively Engaged: Questions Executives Should Ask Their Security Teams
FireEye, Inc.
 
PDF
Top 10 Ways To Win Budget For Application Security - Cenzic.2013.05.22
Cenzic
 
PDF
State of Web Application Security by Ponemon Institute
Jeremiah Grossman
 
Veracode Corporate Overview - Print
Andrew Kanikuru
 
Web Application Security Statistics Report 2016
Jeremiah Grossman
 
What are top 7 cyber security trends for 2020
TestingXperts
 
WhiteHat 2014 Website Security Statistics Report
Jeremiah Grossman
 
2016 Trends in Security
Ioannis Aligizakis, M.Sc.
 
Research Paper
David Chaponniere
 
Veracode State of Software Security vol 4
stemkat
 
How to Gather Global Mobile Threat Intelligence
Zimperium
 
Five Reasons to Look Beyond Math-based Next-Gen Antivirus
Sarah Vanier
 
Mobile Security: Perceptions vs Device-harvested Reality
Zimperium
 
State of Application Security Vol. 4
IBM Security
 
Healthcare Cybersecurity Survey 2018 - Sirius
Sirius
 
Mobile Protect Pro - Powered by Zimperium
Zimperium
 
Ey giss-under-cyber-attack
Комсс Файквэе
 
Cybersecurity and Healthcare - HIMSS 2018 Survey
Imperva
 
Secunia Vulnerability Review 2014
Kim Jensen
 
Deutsche Telekom Partnering Operating Alliance Summit - Zimperium
Zimperium
 
Proatively Engaged: Questions Executives Should Ask Their Security Teams
FireEye, Inc.
 
Top 10 Ways To Win Budget For Application Security - Cenzic.2013.05.22
Cenzic
 
State of Web Application Security by Ponemon Institute
Jeremiah Grossman
 
Ad

Viewers also liked (9)

PDF
A Secure DevOps Journey
Veracode
 
PDF
The Seven Kinds of Security
Veracode
 
PPTX
Secure Code review - Veracode SaaS Platform - Saudi Green Method
Salil Kumar Subramony
 
PDF
Monitoring Attack Surface to Secure DevOps Pipelines
Denim Group
 
PDF
8 Patterns For Continuous Code Security by Veracode CTO Chris Wysopal
Threat Stack
 
PDF
Automating Security in Building Software
Sonatype
 
PDF
DevSecOps - Building Rugged Software
SeniorStoryteller
 
PDF
Multi Security Checkpoints on DevOps Platform
Sonatype
 
PDF
A Secure DevOps Journey
Sonatype
 
A Secure DevOps Journey
Veracode
 
The Seven Kinds of Security
Veracode
 
Secure Code review - Veracode SaaS Platform - Saudi Green Method
Salil Kumar Subramony
 
Monitoring Attack Surface to Secure DevOps Pipelines
Denim Group
 
8 Patterns For Continuous Code Security by Veracode CTO Chris Wysopal
Threat Stack
 
Automating Security in Building Software
Sonatype
 
DevSecOps - Building Rugged Software
SeniorStoryteller
 
Multi Security Checkpoints on DevOps Platform
Sonatype
 
A Secure DevOps Journey
Sonatype
 
Ad

Similar to The Four(ish) Appsec Metrics You Can’t Ignore (20)

PPTX
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
lior mazor
 
PDF
eb-The-State-of-API-Security.pdf
Sajid Ali
 
PDF
Ultimate_Guide_to_getting_started_with_AppSec
Jessica Lavery Pozerski
 
PDF
ultimate-guide-to-getting-started-with-appsec-veracode
Sean Varga
 
PDF
Website Security Statistics Report 2013
Bee_Ware
 
PDF
Web Application Security - Everything You Should Know
Narola Infotech
 
PDF
Top Practices You Need To Develop Secure Mobile Apps.
Techugo
 
PDF
VER_WP_CrackingCode_FINAL
Jessica Lavery Pozerski
 
PPTX
Software Security Metrics
Cigital
 
PPTX
Web Application Security Vulnerability Management Framework
jpubal
 
PDF
Insider's Guide to the AppExchange Security Review (Dreamforce 2015)
Salesforce Partners
 
PDF
How to Ensure Security in Software Application Development.pdf
himanshuwowit
 
PDF
Apidays Paris 2023 - 7 Mistakes When Putting In Place An API Program, Francoi...
apidays
 
PPT
Custom Software Solutions Provider USA: Top 10 Challenges to Mitigate
WeblineIndia
 
PDF
We are excited to announce that our new State of Software Security (SOSS) rep...
Ampliz
 
PDF
The State of Software Security 2022 SOSS - Solution
NeelKamalSingh8
 
PDF
Outpost24 Webinar - Creating a sustainable application security program to dr...
Outpost24
 
PDF
Building a business case for expanding your AppSec Program
Nicolas Gohmert
 
PDF
Top 6 Web Application Security Best Practices.pdf
SolviosTechnology
 
PPTX
Developing Secure Apps
Livares Technologies Pvt Ltd
 
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
lior mazor
 
eb-The-State-of-API-Security.pdf
Sajid Ali
 
Ultimate_Guide_to_getting_started_with_AppSec
Jessica Lavery Pozerski
 
ultimate-guide-to-getting-started-with-appsec-veracode
Sean Varga
 
Website Security Statistics Report 2013
Bee_Ware
 
Web Application Security - Everything You Should Know
Narola Infotech
 
Top Practices You Need To Develop Secure Mobile Apps.
Techugo
 
VER_WP_CrackingCode_FINAL
Jessica Lavery Pozerski
 
Software Security Metrics
Cigital
 
Web Application Security Vulnerability Management Framework
jpubal
 
Insider's Guide to the AppExchange Security Review (Dreamforce 2015)
Salesforce Partners
 
How to Ensure Security in Software Application Development.pdf
himanshuwowit
 
Apidays Paris 2023 - 7 Mistakes When Putting In Place An API Program, Francoi...
apidays
 
Custom Software Solutions Provider USA: Top 10 Challenges to Mitigate
WeblineIndia
 
We are excited to announce that our new State of Software Security (SOSS) rep...
Ampliz
 
The State of Software Security 2022 SOSS - Solution
NeelKamalSingh8
 
Outpost24 Webinar - Creating a sustainable application security program to dr...
Outpost24
 
Building a business case for expanding your AppSec Program
Nicolas Gohmert
 
Top 6 Web Application Security Best Practices.pdf
SolviosTechnology
 
Developing Secure Apps
Livares Technologies Pvt Ltd
 

Recently uploaded (20)

PDF
New Download MiniTool Partition Wizard Crack Latest Version 2025
imang66g
 
PPTX
Explanation about Structures in C language.pptx
Veeral Rathod
 
PDF
What to consider before purchasing Microsoft 365 Business Premium_PDF.pdf
Q-Advise
 
PPTX
ASSIGNMENT_1[1][1][1][1][1] (1) variables.pptx
kr2589474
 
PDF
An Experience-Based Look at AI Lead Generation Pricing, Features & B2B Results
Thomas albart
 
PDF
Applitools Platform Pulse: What's New and What's Coming - July 2025
Applitools
 
PDF
Balancing Resource Capacity and Workloads with OnePlan – Avoid Overloading Te...
OnePlan Solutions
 
PDF
Enhancing Healthcare RPM Platforms with Contextual AI Integration
Cadabra Studio
 
PPTX
ConcordeApp: Engineering Global Impact & Unlocking Billions in Event ROI with AI
chastechaste14
 
PPTX
AI-Ready Handoff: Auto-Summaries & Draft Emails from MQL to Slack in One Flow
bbedford2
 
PDF
On Software Engineers' Productivity - Beyond Misleading Metrics
Romén Rodríguez-Gil
 
PPTX
TRAVEL APIs | WHITE LABEL TRAVEL API | TOP TRAVEL APIs
philipnathen82
 
DOCX
Can You Build Dashboards Using Open Source Visualization Tool.docx
Varsha Nayak
 
PDF
Adobe Illustrator Crack Full Download (Latest Version 2025) Pre-Activated
imang66g
 
PPTX
Maximizing Revenue with Marketo Measure: A Deep Dive into Multi-Touch Attribu...
bbedford2
 
PPTX
Web Testing.pptx528278vshbuqffqhhqiwnwuq
studylike474
 
PDF
MiniTool Power Data Recovery Crack New Pre Activated Version Latest 2025
imang66g
 
PDF
Summary Of Odoo 18.1 to 18.4 : The Way For Odoo 19
CandidRoot Solutions Private Limited
 
PDF
ChatPharo: an Open Architecture for Understanding How to Talk Live to LLMs
ESUG
 
PDF
10 posting ideas for community engagement with AI prompts
Pankaj Taneja
 
New Download MiniTool Partition Wizard Crack Latest Version 2025
imang66g
 
Explanation about Structures in C language.pptx
Veeral Rathod
 
What to consider before purchasing Microsoft 365 Business Premium_PDF.pdf
Q-Advise
 
ASSIGNMENT_1[1][1][1][1][1] (1) variables.pptx
kr2589474
 
An Experience-Based Look at AI Lead Generation Pricing, Features & B2B Results
Thomas albart
 
Applitools Platform Pulse: What's New and What's Coming - July 2025
Applitools
 
Balancing Resource Capacity and Workloads with OnePlan – Avoid Overloading Te...
OnePlan Solutions
 
Enhancing Healthcare RPM Platforms with Contextual AI Integration
Cadabra Studio
 
ConcordeApp: Engineering Global Impact & Unlocking Billions in Event ROI with AI
chastechaste14
 
AI-Ready Handoff: Auto-Summaries & Draft Emails from MQL to Slack in One Flow
bbedford2
 
On Software Engineers' Productivity - Beyond Misleading Metrics
Romén Rodríguez-Gil
 
TRAVEL APIs | WHITE LABEL TRAVEL API | TOP TRAVEL APIs
philipnathen82
 
Can You Build Dashboards Using Open Source Visualization Tool.docx
Varsha Nayak
 
Adobe Illustrator Crack Full Download (Latest Version 2025) Pre-Activated
imang66g
 
Maximizing Revenue with Marketo Measure: A Deep Dive into Multi-Touch Attribu...
bbedford2
 
Web Testing.pptx528278vshbuqffqhhqiwnwuq
studylike474
 
MiniTool Power Data Recovery Crack New Pre Activated Version Latest 2025
imang66g
 
Summary Of Odoo 18.1 to 18.4 : The Way For Odoo 19
CandidRoot Solutions Private Limited
 
ChatPharo: an Open Architecture for Understanding How to Talk Live to LLMs
ESUG
 
10 posting ideas for community engagement with AI prompts
Pankaj Taneja
 

The Four(ish) Appsec Metrics You Can’t Ignore

  • 1. The “Fantastic 4” Metrics You Can’t Ignore When Reducing Application Layer Risk
  • 3. 3 Why application security metrics? Sometimes you need: 1. To communicate to your sponsors what you’re doing with the money they provided for the program. 2. A way to communicate with your development teams that is anchored in something more than just encouragement. 3. A tool to show yourself how much progress you’re making.
  • 5. 5 It’s a hostile environment out there Applications have been a top vector for data breaches over the last five years because they’re not coded with security in mind. The software industry’s shift to composing applications via pre-built—some would say “pre-0wned”— components has made it more challenging for security teams by introducing risk via the software supply chain. So application security is important, but how do you show progress?
  • 6. 6 Four key metrics to save the day
  • 8. You have to have some way of measuring the quality of applications; it should be aligned with the needs of the business. A lot of your program measurements are going to be anchored in how well your portfolio does against a policy. But what sort of pass rate should you expect?
  • 9. 9
  • 11. 11 When vulnerabilities are all around you might feel like your world is on fire. Let’s try to get our arms around how common some of these fatal flaws really are.
  • 14. You know that guy, the one who always insists that the hole you’re in isn’t as deep as you think it is…
  • 15. It turns out that’s true of AppSec. There are a lot of people out there making their applications safer, never accepting “no” for an answer. And it turns out that tracking the flaws fixed can be powerfully motivational.
  • 16. 16
  • 17. 17 Source: Veracode State of Software Security vol. 6: https://info.veracode.com/state-of- software-security-report-volume6.html How? Empower developers • Customers in the financial services and manufacturing verticals are successfully fixing between 65% and 81% of the flaws found in their applications. Applications undergoing remediation coaching (readouts) reduce application risk 2.5x more than those that don’t, as measured by average flaw density per MB Source: Veracode State of Software Security vol. 6: https://info.veracode.com/state-of-software-security-report-volume6.html
  • 20. 20 Which One? It depends. Just as there’s no “one” lineup of a super hero team, you may find you need a different set of metrics depending on the goals of your program—developer training completion, for instance, or percent of applications undergoing automated testing. Ultimately it’s up to you, and the needs of your business.
  • 21. 21 Answers Key Questions for CISOs • Which industries are doing the best job of reducing application-layer risk ? • Do I have more serious vulnerabilities than my peers? • What percentage of vulnerabilities do my peers remediate? • How many of our applications should pass the OWASP Top 10 when initially assessed? • What are the Top 10 most common vulnerabilities in our vertical? • How can I reduce more risk in my organization’s applications?

Editor's Notes

  • #3: Sometimes it seems like application security programs are a never ending chasm. Why do we need to measure? For several important reasons— Sometimes you need to communicate to your sponsors what you’re doing with the money they provided for the program. Sometimes you need a way to communicate with your development teams that is anchored in something more than just encouragement. Sometimes you need a tool to show yourself how much progress you’re making.
  • #4: Sometimes it seems like application security programs are a never ending chasm. Why do we need to measure? For several important reasons— Sometimes you need to communicate to your sponsors what you’re doing with the money they provided for the program. Sometimes you need a way to communicate with your development teams that is anchored in something more than just encouragement. Sometimes you need a tool to show yourself how much progress you’re making.
  • #5: Don’t forget – it’s a hostile environment out there. Applications have been a top vector for data breaches over the last five years (see the Verizon Data Breach Reports) because they’re not coded with security in mind. The software industry’s shift to composing applications via pre-built—some would say “pre-0wned”—components has made it more challenging for security teams by introducing risk via the software supply chain. So application security is important, but how do you show progress?
  • #6: Don’t forget – it’s a hostile environment out there. Applications have been a top vector for data breaches over the last five years (see the Verizon Data Breach Reports) because they’re not coded with security in mind. The software industry’s shift to composing applications via pre-built—some would say “pre-0wned”—components has made it more challenging for security teams by introducing risk via the software supply chain. So application security is important, but how do you show progress?
  • #7: We’re going to walk through four ways to look at your portfolio of applications and benchmark it against other organizations. Each metric has its strength but they’re definitely better together. Let’s get started…
  • #9: I think of policy compliance as the bedrock measurement (pardon the pun) of AppSec. You have to have some way of measuring the quality of applications; it should be aligned with the needs of the business. A lot of your program measurements are going to be anchored in how well your portfolio does against a policy. But what sort of pass rate should you expect? There’s the problem…
  • #10: Let’s look at the industry perspective for a second—using a kind-of-generic policy, the OWASP Top 10, to look at how your peers are doing. Not well. (Highlight relatively high pass rate in FinSvc which is still bad news – more than 50% fail)
  • #11: OK, so now that we understand how bad the problem is, how do we fix it? One way is to understand the types of issues we’re facing.
  • #12: When vulnerabilities are all around you might feel like your world is on fire. Let’s try to get our arms around how common some of these fatal flaws really are.
  • #13: It’s important to note that not every application is subject to the same risks. For instance, SQL Injection, a leading cause of data loss, is only present in about 30% of applications (40% if you’re in the government). Note though that crypto is found in 45 to 80% of applications depending on industry—a problem if your customers or regulators require you to protect sensitive data.
  • #14: Okay, so we know how good (or bad) our applications are, and we know what the nature of the vulnerabilities are. Now what?
  • #15: You know that guy, the one who always insists that the hole you’re in isn’t as deep as you think it is… It turns out that’s true of AppSec. There are a lot of people out there making their applications safer, never accepting “no” for an answer. And it turns out that tracking the flaws fixed can be powerfully motivational.
  • #16: You know that guy, the one who always insists that the hole you’re in isn’t as deep as you think it is… It turns out that’s true of AppSec. There are a lot of people out there making their applications safer, never accepting “no” for an answer. And it turns out that tracking the flaws fixed can be powerfully motivational.
  • #17: Some industries are making huge progress in fixing the vulnerabilities they’ve found. In fact across all Veracode’s customers, they fixed 3 out of every four flaws found by automated scans last year.
  • #18: So a strategy for reducing risk is “real-time” developer education, enabling developers to go faster.
  • #19: Policy, top flaw prevalence, fix rate. What’s our fourth metric?