SlideShare une entreprise Scribd logo
1  sur  28
Télécharger pour lire hors ligne
Cenzic Live! Webinar: Top 7 Strategies For
Overcoming IT Security Talent Shortages

Chris Harget Product Marketing
1
Agenda

 Symptoms

 Strategies

 Finding The Win

2

Cenzic, Inc. - Confidential, All Rights Reserved.
Symptoms Of IT Security Talent Shortage

3
Know The Signs
 Incomplete picture of security posture
 Backlog of untested applications
 Slow remediation when app vulnerabilities discovered
 Things done wrong/done twice
 Too many long shifts

 Open reqs, hiring freezes, “irreplaceable” departures
 No vulnerability monitoring of production apps

 Data Breeches

4

Cenzic, Inc. - Confidential, All Rights Reserved.
The Need Is Significant

Source: Cenzic Application
Vulnerability Trends Report 2013
5

Cenzic, Inc. - Confidential, All Rights Reserved.
Mobile App Vulnerability Types - 2012

Source: Cenzic Application
Vulnerability Trends Report 2013
6

Cenzic, Inc. - Confidential, All Rights Reserved.
Benchmarks For IT Security Staffing…
…Are Really Hard To Come By.
 How many security analysts/100 apps?
 That depends on;
– Size of apps
– Depth of scan desired
– Coding practices

– Scanning frequency
– Quality of scanning tools
– Division of labor with QA/Dev/Production/GRC
7

Cenzic, Inc. - Confidential, All Rights Reserved.
Know Your Specific Shortage
 Not enough bodies

 Not enough time

 Not enough skills

 Not enough tools
8

Cenzic, Inc. - Confidential, All Rights Reserved.
Strategies For Overcoming IT Security Talent Shortage

7.2

9
Bodies: Finding/Hiring/Renting
 Job titles include;
– Application Security Analyst/Architect
– Penetration Tester

– Application Security Engineer/Tester/Specialist
– Ethical Hacker

 If you can’t hire locally, consider managed services
– May be easier/faster than getting increased headcount
– Helps jump-start process

10

Cenzic, Inc. - Confidential, All Rights Reserved.
Time: Prioritize, Specialize, Automate
 Prioritize
– Are you mitigating the biggest risks first?

 Specialize
– What tasks are best done by your team?
– e.g., Remediation, Management,
– What tasks can be offloaded?
– e.g., Dev trains app traversals or Managed Service runs scans

 Automate
– Leverage Enterprise-grade tools

11

Cenzic, Inc. - Confidential, All Rights Reserved.
Talent/Skills: Train, Borrow, Rent
 Train
– How to scan, coding best practices, how to manage

 Borrow
– Get Developers for app training & Remediation
– Get QA for re-running scans

 Rent
– Managed Services can augment specialized tasks

12

Cenzic, Inc. - Confidential, All Rights Reserved.
Tools: Quality and Quantity
 Quality
– More accurate scanners improve security and save time
– Quantified app risk scores enable optimal risk mitigation
– Enterprise dashboard shows total risk and trends

 Quantity
– Web-based app-training tool goes everywhere needed
– Having enough seats for each Analyst, Developer, QA,

GRC, and Executive leverages whole organization

13

Cenzic, Inc. - Confidential, All Rights Reserved.
Top 7 Strategies

1. Hire
2. Prioritize

3. Specialize
4. Automate

5. Train
6. Borrow

7. Rent
8. Quality/Quantity
14

Cenzic, Inc. - Confidential, All Rights Reserved.
Finding The Win

15
Justifying Resources
 Non-technical people need non-technical
explanations
– Keep it simple
– Use cost-benefit for budget

– Use relative-risk for reallocating people

 Quantified risk is easier to understand
– E.g., Cenzic’s HARM™ scores

 Bonus: Watch “Top 10 Ways To Win Budget for
Application Security”
https://info.cenzic.com/webinar-security-budget.html
16

Cenzic, Inc. - Confidential, All Rights Reserved.
Making the Case Simply…

 Hackers use hidden Application commands to
steal data and damage web sites.
 Gartner Group says 75% of attacks now target
the Web Application Layer

 Scanning tools and App Security experts help
efficiently find and patch these vulnerabilities.

17

Cenzic, Inc. - Confidential, All Rights Reserved.
Detects Web & Mobile App Vulnerabilities
 Easy-to-use Software, DIY Cloud, or Managed Service
 Accurate behavior-based Scanning protects
– 500,000+ online applications
– $Trillion+ of commerce

 Delivers best continuous real-world Risk Management

18

Cenzic, Inc. - Confidential, All Rights Reserved.
Tools
 Cenzic Enterprise
– Unified console
– Web-based app-configuring makes it easier/more

affordable for people all over your enterprise to contribute
– E.g., Developers can define traversals of their own apps

19

Cenzic, Inc. - Confidential, All Rights Reserved.
Application Vulnerability Monitoring In Production

.Identify Risk

=

+
Mitigate
Risk

=

 One-click virtual patching
via tight integration with leading
Web Application Firewalls
20

Cenzic, Inc. - Confidential, All Rights Reserved.
Managed Services Offerings – At-a-glance
Bronze

Silver

Industry BestPractices for
Brochureware
sites

Phishing
Light input
validation
Data Security
Session
management
OWASP
compliance
PCI compliance
Business logic
testing
Application logic
testing
Manual
penetration
testing - Confidential, All Rights Reserved.
21
Cenzic, Inc.

X

Gold

Platinum

Industry BestPractices for forms
and login protected
sites

Compliance for
sites with user
data

X

X

Comprehensive
scans for Mission
critical
applications
x
x

X

X

X

X

X

X

x
x

X

X
x
X
X

x
x
x
x
Compliance in a Hurry
 Who?
– A Health Maintenance Organization

 Need?
– Deep scan of a new application on a tight development

schedule to ensure compliance.

 Solution?
– Cenzic PS performed Manual Penetration testing along

with the comprehensive vulnerability scanning to provide
a very thorough scan which could suffice for any
compliance or audit need.

22

Cenzic, Inc. - Confidential, All Rights Reserved.
Rapid OnBoarding of New Apps
 Who?
– A Fortune-100 Banking and Services company

 Need?
– Quickly begin scanning 110 applications

 Solution?
– Cenzic PS did Custom Onboarding Engagement,

training each app traversal so that the Bank’s IT
Security Analysts could then run scans
themselves using Cenzic Enterprise software.

 Result?
– Met their timeline needs, and kept the scanning

results in-house, per their corporate policy.

23

Cenzic, Inc. - Confidential, All Rights Reserved.
Methodology Assessment With Developers
 Who?
– Global NGO with thousands of web sites

 Need?
– Methodology Assessment of their security posture, and

real-world training of their Developers

 Solution?
– Cenzic PS did a 3-day engagement with their App

Developers.
– Reviewed 10 most common vulnerabilities, found
examples in their production apps.
– Cenzic PS demonstrated on a Live Demo site how a
hacker could exploit those specific types of vulnerabilities
– Reviewed coding best practices to completely eliminate
said vulnerabilities.

24

Cenzic, Inc. - Confidential, All Rights Reserved.
Vulnerability Scanning a Mobile App
 Who?
– High technology company with a mobile

application that accessed sensitive customer
data

 Need?
– Vulnerability Scan a mobile app that

can not be traditionally traversed with a spider.

 Solution?
– Cenzic Mobile Scan service performed a dynamic

analysis by placing a proxy in line to the mobile app,
which allowed technicians to replay various attacks
and coupled it with a thorough forensic analysis of
the application on the device to identify
vulnerabilities that exposed customer data.
25

Cenzic, Inc. - Confidential, All Rights Reserved.
Fitting Strategy to Your Need

1. Hire
2. Prioritize

3. Specialize
4. Automate

5. Train
6. Borrow

7. Rent
8. Quality/Quantity
26

Cenzic, Inc. - Confidential, All Rights Reserved.
Cenzic Can Help
 Train your people
 Give them better gear
 Have someone else carry the baton

27

Cenzic, Inc. - Confidential, All Rights Reserved.
Questions?
request@cenzic.com or 1.866-4-Cenzic
Blog: https://blog.cenzic.com
www.cenzic.com | 1-866-4-CENZIC (1-866-423-6942)

Contenu connexe

Dernier

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Dernier (20)

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 

En vedette

How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
ThinkNow
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 

En vedette (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

Top 7 Strategies for Overcoming IT Talent Shortages

  • 1. Cenzic Live! Webinar: Top 7 Strategies For Overcoming IT Security Talent Shortages Chris Harget Product Marketing 1
  • 2. Agenda  Symptoms  Strategies  Finding The Win 2 Cenzic, Inc. - Confidential, All Rights Reserved.
  • 3. Symptoms Of IT Security Talent Shortage 3
  • 4. Know The Signs  Incomplete picture of security posture  Backlog of untested applications  Slow remediation when app vulnerabilities discovered  Things done wrong/done twice  Too many long shifts  Open reqs, hiring freezes, “irreplaceable” departures  No vulnerability monitoring of production apps  Data Breeches 4 Cenzic, Inc. - Confidential, All Rights Reserved.
  • 5. The Need Is Significant Source: Cenzic Application Vulnerability Trends Report 2013 5 Cenzic, Inc. - Confidential, All Rights Reserved.
  • 6. Mobile App Vulnerability Types - 2012 Source: Cenzic Application Vulnerability Trends Report 2013 6 Cenzic, Inc. - Confidential, All Rights Reserved.
  • 7. Benchmarks For IT Security Staffing… …Are Really Hard To Come By.  How many security analysts/100 apps?  That depends on; – Size of apps – Depth of scan desired – Coding practices – Scanning frequency – Quality of scanning tools – Division of labor with QA/Dev/Production/GRC 7 Cenzic, Inc. - Confidential, All Rights Reserved.
  • 8. Know Your Specific Shortage  Not enough bodies  Not enough time  Not enough skills  Not enough tools 8 Cenzic, Inc. - Confidential, All Rights Reserved.
  • 9. Strategies For Overcoming IT Security Talent Shortage 7.2 9
  • 10. Bodies: Finding/Hiring/Renting  Job titles include; – Application Security Analyst/Architect – Penetration Tester – Application Security Engineer/Tester/Specialist – Ethical Hacker  If you can’t hire locally, consider managed services – May be easier/faster than getting increased headcount – Helps jump-start process 10 Cenzic, Inc. - Confidential, All Rights Reserved.
  • 11. Time: Prioritize, Specialize, Automate  Prioritize – Are you mitigating the biggest risks first?  Specialize – What tasks are best done by your team? – e.g., Remediation, Management, – What tasks can be offloaded? – e.g., Dev trains app traversals or Managed Service runs scans  Automate – Leverage Enterprise-grade tools 11 Cenzic, Inc. - Confidential, All Rights Reserved.
  • 12. Talent/Skills: Train, Borrow, Rent  Train – How to scan, coding best practices, how to manage  Borrow – Get Developers for app training & Remediation – Get QA for re-running scans  Rent – Managed Services can augment specialized tasks 12 Cenzic, Inc. - Confidential, All Rights Reserved.
  • 13. Tools: Quality and Quantity  Quality – More accurate scanners improve security and save time – Quantified app risk scores enable optimal risk mitigation – Enterprise dashboard shows total risk and trends  Quantity – Web-based app-training tool goes everywhere needed – Having enough seats for each Analyst, Developer, QA, GRC, and Executive leverages whole organization 13 Cenzic, Inc. - Confidential, All Rights Reserved.
  • 14. Top 7 Strategies 1. Hire 2. Prioritize 3. Specialize 4. Automate 5. Train 6. Borrow 7. Rent 8. Quality/Quantity 14 Cenzic, Inc. - Confidential, All Rights Reserved.
  • 16. Justifying Resources  Non-technical people need non-technical explanations – Keep it simple – Use cost-benefit for budget – Use relative-risk for reallocating people  Quantified risk is easier to understand – E.g., Cenzic’s HARM™ scores  Bonus: Watch “Top 10 Ways To Win Budget for Application Security” https://info.cenzic.com/webinar-security-budget.html 16 Cenzic, Inc. - Confidential, All Rights Reserved.
  • 17. Making the Case Simply…  Hackers use hidden Application commands to steal data and damage web sites.  Gartner Group says 75% of attacks now target the Web Application Layer  Scanning tools and App Security experts help efficiently find and patch these vulnerabilities. 17 Cenzic, Inc. - Confidential, All Rights Reserved.
  • 18. Detects Web & Mobile App Vulnerabilities  Easy-to-use Software, DIY Cloud, or Managed Service  Accurate behavior-based Scanning protects – 500,000+ online applications – $Trillion+ of commerce  Delivers best continuous real-world Risk Management 18 Cenzic, Inc. - Confidential, All Rights Reserved.
  • 19. Tools  Cenzic Enterprise – Unified console – Web-based app-configuring makes it easier/more affordable for people all over your enterprise to contribute – E.g., Developers can define traversals of their own apps 19 Cenzic, Inc. - Confidential, All Rights Reserved.
  • 20. Application Vulnerability Monitoring In Production .Identify Risk = + Mitigate Risk =  One-click virtual patching via tight integration with leading Web Application Firewalls 20 Cenzic, Inc. - Confidential, All Rights Reserved.
  • 21. Managed Services Offerings – At-a-glance Bronze Silver Industry BestPractices for Brochureware sites Phishing Light input validation Data Security Session management OWASP compliance PCI compliance Business logic testing Application logic testing Manual penetration testing - Confidential, All Rights Reserved. 21 Cenzic, Inc. X Gold Platinum Industry BestPractices for forms and login protected sites Compliance for sites with user data X X Comprehensive scans for Mission critical applications x x X X X X X X x x X X x X X x x x x
  • 22. Compliance in a Hurry  Who? – A Health Maintenance Organization  Need? – Deep scan of a new application on a tight development schedule to ensure compliance.  Solution? – Cenzic PS performed Manual Penetration testing along with the comprehensive vulnerability scanning to provide a very thorough scan which could suffice for any compliance or audit need. 22 Cenzic, Inc. - Confidential, All Rights Reserved.
  • 23. Rapid OnBoarding of New Apps  Who? – A Fortune-100 Banking and Services company  Need? – Quickly begin scanning 110 applications  Solution? – Cenzic PS did Custom Onboarding Engagement, training each app traversal so that the Bank’s IT Security Analysts could then run scans themselves using Cenzic Enterprise software.  Result? – Met their timeline needs, and kept the scanning results in-house, per their corporate policy. 23 Cenzic, Inc. - Confidential, All Rights Reserved.
  • 24. Methodology Assessment With Developers  Who? – Global NGO with thousands of web sites  Need? – Methodology Assessment of their security posture, and real-world training of their Developers  Solution? – Cenzic PS did a 3-day engagement with their App Developers. – Reviewed 10 most common vulnerabilities, found examples in their production apps. – Cenzic PS demonstrated on a Live Demo site how a hacker could exploit those specific types of vulnerabilities – Reviewed coding best practices to completely eliminate said vulnerabilities. 24 Cenzic, Inc. - Confidential, All Rights Reserved.
  • 25. Vulnerability Scanning a Mobile App  Who? – High technology company with a mobile application that accessed sensitive customer data  Need? – Vulnerability Scan a mobile app that can not be traditionally traversed with a spider.  Solution? – Cenzic Mobile Scan service performed a dynamic analysis by placing a proxy in line to the mobile app, which allowed technicians to replay various attacks and coupled it with a thorough forensic analysis of the application on the device to identify vulnerabilities that exposed customer data. 25 Cenzic, Inc. - Confidential, All Rights Reserved.
  • 26. Fitting Strategy to Your Need 1. Hire 2. Prioritize 3. Specialize 4. Automate 5. Train 6. Borrow 7. Rent 8. Quality/Quantity 26 Cenzic, Inc. - Confidential, All Rights Reserved.
  • 27. Cenzic Can Help  Train your people  Give them better gear  Have someone else carry the baton 27 Cenzic, Inc. - Confidential, All Rights Reserved.
  • 28. Questions? request@cenzic.com or 1.866-4-Cenzic Blog: https://blog.cenzic.com www.cenzic.com | 1-866-4-CENZIC (1-866-423-6942)