SlideShare une entreprise Scribd logo
1  sur  33
Télécharger pour lire hors ligne
ptsecurity.com
Valery Boronin
R&D – 20 years
Best in class Application & Device Control
as a windows kernel mode developer
RSDN Team member (still #1 in Low-level?!)
Security - began with the last millennium
CTO, small company (30+ subordinates)
Director DLP Research, large (Kaspersky)
DLP, Encryption, Incident Management
Now responsible for SDL and
Application Inspector SSDL Edition
18.05.2016 Positive Hack Days 2016, Moscow 2
About – Valery Boronin
1. Prologue – problem statement
2. Gartner on AST
3. Difficulties with AST Tools
4. What we did against them in AI SSDL
5. Live Demo
6. Our uniqueness & your benefits
7. Future
8. FAQ + Q&A
Agenda  For next one hour
18.05.2016 Positive Hack Days 2016, Moscow 3
Code avalanche
Not enough people to review
In appropriate time frame
18.05.2016 Positive Hack Days 2016, Moscow 4
Problem statement
Quality – Defects cost
huge money and leads to
project failures.
Poor SW quality has
become one of the most
expensive topics in human
history: >$500 billion per
year world wide © Capers
Jones survey 2013
18.05.2016 Positive Hack Days 2016, Moscow 5
Quality? Security even worse…
Security even worse
Security is hard to find
Security is hard to fix
HIGHLIGHTS FROM THE
2015 WORLD SW QUALITY
REPORT: Security is the
most pressing concern
increasing risks
Product quality level is lower than expected
Defect leakage to production
Budget, schedule, effort overruns
Compliance & Litigation
…
increasing losses
Lower-sales
Financial
even human lives
18.05.2016 Positive Hack Days 2016, Moscow 6
It results in
Critical Capabilities for AST, 2014:
1. Enterprise management console, reporting across
multiple testers, RBAC and SDL/SDLC integration.
2. Remediation advices + Reporting + Overall application
portfolio risk trending for the CIO/CISO.
3. Multiple language support for the console and for
services is an enterprise capability.
Not only we think about it….
18.05.2016 Positive Hack Days 2016, Moscow 7
1. Yet another mgmt. console, workflow, reports, ...
2. Helmet Fire + Little / no help with remediation
3. Dedicated to one specific role (or even single-user)
4. No care about CxOs and Auditors
5. Odd Tools + SSDL is not a target
6. Sometimes poor architecture
7. Vendor lock + very long FR/CR cycle, w/o guarantees
18.05.2016 Positive Hack Days 2016, Moscow 8
Difficulties with AST tools
1. Manual or / and Inconvenient use
2. Delays + No guidance over process
3. Bad from compliance prospective
D1: We interacts with developer through code
18.05.2016 Positive Hack Days 2016, Moscow 9
Different developers
assigned different tickets
Work on a fix in
specially prepared,
separate branches
simultaneously!
18.05.2016 Positive Hack Days 2016, Moscow 10
D2: We help with remediation using teamwork
1
2
18.05.2016 Positive Hack Days 2016, Moscow 11
D3: We support roles + RBAC
Admin – to setup + assign roles
Developer – for Dev & QA
Manager – for R&D & Security managers
Auditor – see next slide
…more to come
Operations & BI
Audit
Benchmarking
Tracking from issues to
people …and vice versa
Figure out / probe
Trends
Anomalies
Hypotheses
Customize accordingly
Policy / Reports / Dashboards
18.05.2016 Positive Hack Days 2016, Moscow 12
D4: We take care about CxO and Auditors
Requirements
Design
Implementation
Verification
Deployment
…
18.05.2016 Positive Hack Days 2016, Moscow 13
D5: We are SSDL-aware, SSDL is our target
Automated code commit scan
Scan results delivered ASAP
to all participants using their
preferred way, form and
even language
Code flaws & vulns in VCS
Issues in tracker
Notifications / Reports in
UA-emails
• FYA for responsible
• FYI for observers
18.05.2016 Positive Hack Days 2016, Moscow 14
D : Convenient for each role
Endless event-driven protection
Set your security policy rules
Guidance over Process / Code fix confirmations
Metrics & KPIs
Benchmarking
Proactive mgmt
18.05.2016 Positive Hack Days 2016, Moscow 15
D : Minimal delays + help with guidance
PA DSS & PCI DSS
OWASP
FSTEK
РС БР ИББС-2 6-2014
…
Your policy rules
18.05.2016 Positive Hack Days 2016, Moscow 16
D: Our approach favored by regulators
18.05.2016 Positive Hack Days 2016, Moscow 17
D6: Enterprise architecture – Helicopter view
UX- & UA-aware
Extensible
Secure
• RBAC on data level
• Segregation of duty
• Least privileges
AF
Analyst’s Workplace
to design
Queries
to apply in
Reports
Notifications
Dashboard / UI
Plugins / API
18.05.2016 Positive Hack Days 2016, Moscow 18
D7: We’re open + self-help = No vendor lock
ptsecurity.com
Valery Boronin
Live Demo
Our uniqueness – we’re close to developers
18.05.2016 Positive Hack Days 2016, Moscow 20
1. how to scan sample project on a GitHub (I left it there for your comfortable observation later on, if need)
- AI SSDL may perform his job manually or automatically on any new commit in selected branch of
specified repository.
2. how vulnerabilities found and reported on a GitHub directly.
3. how developer/manager/administrator/etc notified about issues found through special role-based UX /
UA-ready personalized notification emails. btw, this notification emails are customizable - you may
change them how you need per project, per role, etc – no need to rebuild product to get appropriate for
you content.
4. how code flaws / vulns found combined in aggregation tickets by vuln class (LDAP injection issues
is one ticket, XSS issues is another).
5. how AI interacts with developer through code annotation and our special markers (TODO, VERIFY,
FIXED, REOPEN, FP). MS VS, Eclipse, Resharper have built-in support for this markers.
6. how different developers assigned different tickets / issues and work on fix in separate branches
(specially prepared, to keep focus) simultaneously.
7. how their changes are automatically detected and confirmed by AI, we do not trust by word ;-)
8. how policy on a project changes its status (violated red or successful green) depends on master
branch scan results and again how people notified about it by UA-aware emails, with specific actions for
different roles in different situations.
9. how to deal with data collected (scans, commits, workflow, etc.) through analyst’s workplace – special
effort for role of data analyst. Using this tool you may perform benchmarking, tracking from issues to
people or vice versa – and, globally, probe your hypotheses, figure out trends or anomalies.
10.By modifying queries, you may even change certain parts of the product’s UI on the fly (per role, per
project, etc) as you need, w/o firing CR/FR and waiting while vendor implement them few months later
and rolling update out in your infrastructure. In the nearest future in a similar manner this approach will
be reused to customize reports for your needs and to customize dashboards - with key metrics and
indicators per project, per role, etc.
18.05.2016 Positive Hack Days 2016, Moscow 21
For your records - we saw today
ptsecurity.com
Valery Boronin
Benefits / Conclusion
Interaction through source code – no broken habits
Progress via aggregation tickets – in your favorite tracker
Automatic scans & fix confirmations – always helps
18.05.2016 Positive Hack Days 2016, Moscow 23
PT AI SSDL Edition Benefits for Developers
Your product  development more safe, secure, reliable
Less possible damage & cost of incidents
Reduced risks including
• Leak vulnerability in production
• Late vulnerability detection
• Effort overruns
• Schedule overruns
• Budget overruns
• Project failure
• …even intellectual
properties-related
18.05.2016 Positive Hack Days 2016, Moscow 24
PT AI SSDL Edition Benefits for Managers
Power of AI under the hood
Exploits
Endless event-driven protection
Set your security policy rules
Guidance over process
3d-parties code acceptance
BI, Metrics & KPIs
Benchmarking
Audit
18.05.2016 Positive Hack Days 2016, Moscow 25
Benefits for Security guys, CxOs and Auditors
No broken habits + Favorite tools + Clear language
18.05.2016 Positive Hack Days 2016, Moscow 26
Benefits for All
Are your product Popular? Next Target!
Development using SSDL – save costs, reduce risks and
increase quality of your product (why? See this on SSDL)
Development with AI SSDL – your step to more safe,
secure, reliable code and, thus, future
Time to try AI SSDL! 
18.05.2016 Positive Hack Days 2016, Moscow 27
Conclusion
ptsecurity.com
Valery Boronin
Future plans, ideas & FAQ
CI and build servers
IDE
Policy and workflow
mgmt. & enforcement
Flexible classifications
Open API, Plugins SDK
Make Gartner & Co happy:
Overall app portfolio risk trending for CxOCISO
Vulnerability tracking – vulnerability life cycle
18.05.2016 Positive Hack Days 2016, Moscow 29
Future Plans and Ideas
More roles
More policies
More workflows
More compliance
More reports
More tools
More environments
18.05.2016 Positive Hack Days 2016, Moscow 30
Future – Citius, Altius, Fortius
Please, give us an advice
what is important to
you – we plan and
support it a bit later
Q1: AI Desktop vs AI SSDL: what’s difference?
A1: AI Desktop is for security guys, AI SSDL for developers.
Q2: What’s next?
A2: Give us a card and we’ll send you a form to sign up for a CTP
Q3: When it will be available?
A3: CTP (Community Technology Preview) planned for Autumn’16
FAQ
18.05.2016 Positive Hack Days 2016, Moscow 31
Q: But wait! …what if I want it right now?
A: Begin with AI Desktop (analysis engine the same) and
get AI SSDL later, with AI Desktop price reduction!
Is everything clear?
Is there all you need?
Something forgotten?
Questions & clarifications
Ideas
Improvements
Suggestions
Feedback is highly appreciated!
Please, deliver it your preferred way.
Discussion
18.05.2016 Positive Hack Days 2016, Moscow 32
ptsecurity.com
Valery Boronin
Thank you!
Questions?

Contenu connexe

Tendances

On the Static Analysis of Hybrid Mobile Apps: A Report on the State of Apache...
On the Static Analysis of Hybrid Mobile Apps: A Report on the State of Apache...On the Static Analysis of Hybrid Mobile Apps: A Report on the State of Apache...
On the Static Analysis of Hybrid Mobile Apps: A Report on the State of Apache...Achim D. Brucker
 
Desmistificando Tecnologias
Desmistificando TecnologiasDesmistificando Tecnologias
Desmistificando TecnologiasJuliano Martins
 
How to Enable Developers to Deliver Secure Code
How to Enable Developers to Deliver Secure CodeHow to Enable Developers to Deliver Secure Code
How to Enable Developers to Deliver Secure CodeAchim D. Brucker
 
Security Testing: Myths, Challenges, and Opportunities - Experiences in Integ...
Security Testing: Myths, Challenges, and Opportunities - Experiences in Integ...Security Testing: Myths, Challenges, and Opportunities - Experiences in Integ...
Security Testing: Myths, Challenges, and Opportunities - Experiences in Integ...Achim D. Brucker
 
Developing Secure Software: Experiences From an International Software Vendor
Developing Secure Software: Experiences From an International Software VendorDeveloping Secure Software: Experiences From an International Software Vendor
Developing Secure Software: Experiences From an International Software VendorAchim D. Brucker
 
Penetration testing in agile software
Penetration testing in agile softwarePenetration testing in agile software
Penetration testing in agile softwareijcisjournal
 
App Sec Eu08 Sec Frm Not In Code
App Sec Eu08 Sec Frm Not In CodeApp Sec Eu08 Sec Frm Not In Code
App Sec Eu08 Sec Frm Not In CodeSamuele Reghenzi
 
Integrating Application Security into a Software Development Process
Integrating Application Security into a Software Development ProcessIntegrating Application Security into a Software Development Process
Integrating Application Security into a Software Development ProcessAchim D. Brucker
 
Agile Secure Software Development in a Large Software Development Organisatio...
Agile Secure Software Development in a Large Software Development Organisatio...Agile Secure Software Development in a Large Software Development Organisatio...
Agile Secure Software Development in a Large Software Development Organisatio...Achim D. Brucker
 
OSS Metrics for Market Readiness
OSS Metrics for Market ReadinessOSS Metrics for Market Readiness
OSS Metrics for Market ReadinessOW2
 
How enterprises learned to stop worrying and love open source
How enterprises learned to stop worrying and love open sourceHow enterprises learned to stop worrying and love open source
How enterprises learned to stop worrying and love open sourceRogue Wave Software
 

Tendances (13)

On the Static Analysis of Hybrid Mobile Apps: A Report on the State of Apache...
On the Static Analysis of Hybrid Mobile Apps: A Report on the State of Apache...On the Static Analysis of Hybrid Mobile Apps: A Report on the State of Apache...
On the Static Analysis of Hybrid Mobile Apps: A Report on the State of Apache...
 
Product Security
Product SecurityProduct Security
Product Security
 
Desmistificando Tecnologias
Desmistificando TecnologiasDesmistificando Tecnologias
Desmistificando Tecnologias
 
How to Enable Developers to Deliver Secure Code
How to Enable Developers to Deliver Secure CodeHow to Enable Developers to Deliver Secure Code
How to Enable Developers to Deliver Secure Code
 
Security Testing: Myths, Challenges, and Opportunities - Experiences in Integ...
Security Testing: Myths, Challenges, and Opportunities - Experiences in Integ...Security Testing: Myths, Challenges, and Opportunities - Experiences in Integ...
Security Testing: Myths, Challenges, and Opportunities - Experiences in Integ...
 
Dev{sec}ops
Dev{sec}opsDev{sec}ops
Dev{sec}ops
 
Developing Secure Software: Experiences From an International Software Vendor
Developing Secure Software: Experiences From an International Software VendorDeveloping Secure Software: Experiences From an International Software Vendor
Developing Secure Software: Experiences From an International Software Vendor
 
Penetration testing in agile software
Penetration testing in agile softwarePenetration testing in agile software
Penetration testing in agile software
 
App Sec Eu08 Sec Frm Not In Code
App Sec Eu08 Sec Frm Not In CodeApp Sec Eu08 Sec Frm Not In Code
App Sec Eu08 Sec Frm Not In Code
 
Integrating Application Security into a Software Development Process
Integrating Application Security into a Software Development ProcessIntegrating Application Security into a Software Development Process
Integrating Application Security into a Software Development Process
 
Agile Secure Software Development in a Large Software Development Organisatio...
Agile Secure Software Development in a Large Software Development Organisatio...Agile Secure Software Development in a Large Software Development Organisatio...
Agile Secure Software Development in a Large Software Development Organisatio...
 
OSS Metrics for Market Readiness
OSS Metrics for Market ReadinessOSS Metrics for Market Readiness
OSS Metrics for Market Readiness
 
How enterprises learned to stop worrying and love open source
How enterprises learned to stop worrying and love open sourceHow enterprises learned to stop worrying and love open source
How enterprises learned to stop worrying and love open source
 

En vedette

8 gira estudio asv fhwa trentacoste 1997
8  gira estudio asv fhwa trentacoste 19978  gira estudio asv fhwa trentacoste 1997
8 gira estudio asv fhwa trentacoste 1997Sierra Francisco Justo
 
Informe galería balneario
Informe galería balnearioInforme galería balneario
Informe galería balnearioppmarmolejo
 
148909 Anexa 8 raportare lunara locatii implementare activitati mai 2015
148909 Anexa 8 raportare lunara locatii implementare activitati mai 2015148909 Anexa 8 raportare lunara locatii implementare activitati mai 2015
148909 Anexa 8 raportare lunara locatii implementare activitati mai 2015Adrian Dan Pop
 
Gentleman stradivarius (www.sheetmusic-violin.blogspot.com)
Gentleman stradivarius (www.sheetmusic-violin.blogspot.com)Gentleman stradivarius (www.sheetmusic-violin.blogspot.com)
Gentleman stradivarius (www.sheetmusic-violin.blogspot.com)William Soph
 
Version control for spreadsheets - Bjoern Stiel at Eusprig 2014
Version control for spreadsheets - Bjoern Stiel at Eusprig 2014Version control for spreadsheets - Bjoern Stiel at Eusprig 2014
Version control for spreadsheets - Bjoern Stiel at Eusprig 2014eusprig
 
Curriculum vitae
Curriculum vitaeCurriculum vitae
Curriculum vitaerams1989
 
Engaging Physicians In Information Technology
Engaging Physicians In Information TechnologyEngaging Physicians In Information Technology
Engaging Physicians In Information TechnologyMichael Wagner, MD FACP
 
mytaxi w klasie biznes - przejazdy bezgotówkowe dla firm
mytaxi w klasie biznes - przejazdy bezgotówkowe dla firmmytaxi w klasie biznes - przejazdy bezgotówkowe dla firm
mytaxi w klasie biznes - przejazdy bezgotówkowe dla firmPaweł Ptasznik
 
Developing network strategies to support wholesale market operations
Developing network strategies to support wholesale market operationsDeveloping network strategies to support wholesale market operations
Developing network strategies to support wholesale market operationsAgustin Argelich Casals
 
Reseña glandula pineal
Reseña glandula pinealReseña glandula pineal
Reseña glandula pinealCLAUDIO MEZA
 
(38)InvestigacióN 3 Tp 2008
(38)InvestigacióN 3 Tp 2008(38)InvestigacióN 3 Tp 2008
(38)InvestigacióN 3 Tp 2008Víctor Barragán
 
Using ca e rwin modeling to asure data 09162010
Using ca e rwin modeling to asure data 09162010Using ca e rwin modeling to asure data 09162010
Using ca e rwin modeling to asure data 09162010ERwin Modeling
 
AEC2015 Implications on Tourism presented by ASEAN Secretariat
AEC2015 Implications on Tourism presented by ASEAN Secretariat AEC2015 Implications on Tourism presented by ASEAN Secretariat
AEC2015 Implications on Tourism presented by ASEAN Secretariat Ivy Chee
 
Funcional curriculum-vitae-modelo1b-naranja
Funcional  curriculum-vitae-modelo1b-naranjaFuncional  curriculum-vitae-modelo1b-naranja
Funcional curriculum-vitae-modelo1b-naranjaartwo
 
Taj Mahal India Travel
Taj Mahal India TravelTaj Mahal India Travel
Taj Mahal India Travelpjsngh062
 

En vedette (20)

8 gira estudio asv fhwa trentacoste 1997
8  gira estudio asv fhwa trentacoste 19978  gira estudio asv fhwa trentacoste 1997
8 gira estudio asv fhwa trentacoste 1997
 
Informe galería balneario
Informe galería balnearioInforme galería balneario
Informe galería balneario
 
Sala SAP - FEED 25 mayo candidatos
Sala SAP - FEED 25 mayo candidatosSala SAP - FEED 25 mayo candidatos
Sala SAP - FEED 25 mayo candidatos
 
148909 Anexa 8 raportare lunara locatii implementare activitati mai 2015
148909 Anexa 8 raportare lunara locatii implementare activitati mai 2015148909 Anexa 8 raportare lunara locatii implementare activitati mai 2015
148909 Anexa 8 raportare lunara locatii implementare activitati mai 2015
 
Legal Web Site
Legal Web SiteLegal Web Site
Legal Web Site
 
C12 Mexico
C12 MexicoC12 Mexico
C12 Mexico
 
Gentleman stradivarius (www.sheetmusic-violin.blogspot.com)
Gentleman stradivarius (www.sheetmusic-violin.blogspot.com)Gentleman stradivarius (www.sheetmusic-violin.blogspot.com)
Gentleman stradivarius (www.sheetmusic-violin.blogspot.com)
 
CER PUERTO EL SOL
CER PUERTO EL SOLCER PUERTO EL SOL
CER PUERTO EL SOL
 
Version control for spreadsheets - Bjoern Stiel at Eusprig 2014
Version control for spreadsheets - Bjoern Stiel at Eusprig 2014Version control for spreadsheets - Bjoern Stiel at Eusprig 2014
Version control for spreadsheets - Bjoern Stiel at Eusprig 2014
 
Curriculum vitae
Curriculum vitaeCurriculum vitae
Curriculum vitae
 
Engaging Physicians In Information Technology
Engaging Physicians In Information TechnologyEngaging Physicians In Information Technology
Engaging Physicians In Information Technology
 
Dexma
DexmaDexma
Dexma
 
mytaxi w klasie biznes - przejazdy bezgotówkowe dla firm
mytaxi w klasie biznes - przejazdy bezgotówkowe dla firmmytaxi w klasie biznes - przejazdy bezgotówkowe dla firm
mytaxi w klasie biznes - przejazdy bezgotówkowe dla firm
 
Developing network strategies to support wholesale market operations
Developing network strategies to support wholesale market operationsDeveloping network strategies to support wholesale market operations
Developing network strategies to support wholesale market operations
 
Reseña glandula pineal
Reseña glandula pinealReseña glandula pineal
Reseña glandula pineal
 
(38)InvestigacióN 3 Tp 2008
(38)InvestigacióN 3 Tp 2008(38)InvestigacióN 3 Tp 2008
(38)InvestigacióN 3 Tp 2008
 
Using ca e rwin modeling to asure data 09162010
Using ca e rwin modeling to asure data 09162010Using ca e rwin modeling to asure data 09162010
Using ca e rwin modeling to asure data 09162010
 
AEC2015 Implications on Tourism presented by ASEAN Secretariat
AEC2015 Implications on Tourism presented by ASEAN Secretariat AEC2015 Implications on Tourism presented by ASEAN Secretariat
AEC2015 Implications on Tourism presented by ASEAN Secretariat
 
Funcional curriculum-vitae-modelo1b-naranja
Funcional  curriculum-vitae-modelo1b-naranjaFuncional  curriculum-vitae-modelo1b-naranja
Funcional curriculum-vitae-modelo1b-naranja
 
Taj Mahal India Travel
Taj Mahal India TravelTaj Mahal India Travel
Taj Mahal India Travel
 

Similaire à Application Inspector SSDL Edition product

Workshop About Software Engineering Skills 2019
Workshop About Software Engineering Skills 2019Workshop About Software Engineering Skills 2019
Workshop About Software Engineering Skills 2019PhuocNT (Fresher.VN)
 
Tools to create a secure build pipeline
Tools to create a secure build pipelineTools to create a secure build pipeline
Tools to create a secure build pipelineBruno Bossola
 
Application security for the modern web - ISSA South Texas Houston DevOps
Application security for the modern web - ISSA South Texas Houston DevOpsApplication security for the modern web - ISSA South Texas Houston DevOps
Application security for the modern web - ISSA South Texas Houston DevOpsPhillip Maddux
 
Strangle The Monolith: A Data Driven Approach
Strangle The Monolith: A Data Driven ApproachStrangle The Monolith: A Data Driven Approach
Strangle The Monolith: A Data Driven ApproachVMware Tanzu
 
Regular use of static code analysis in team development
Regular use of static code analysis in team developmentRegular use of static code analysis in team development
Regular use of static code analysis in team developmentPVS-Studio
 
Three Interviews About Static Code Analyzers
Three Interviews About Static Code AnalyzersThree Interviews About Static Code Analyzers
Three Interviews About Static Code AnalyzersAndrey Karpov
 
Regular use of static code analysis in team development
Regular use of static code analysis in team developmentRegular use of static code analysis in team development
Regular use of static code analysis in team developmentPVS-Studio
 
Regular use of static code analysis in team development
Regular use of static code analysis in team developmentRegular use of static code analysis in team development
Regular use of static code analysis in team developmentAndrey Karpov
 
ASFWS 2013 - Cryptocat: récents défis en faisant la cryptographie plus facile...
ASFWS 2013 - Cryptocat: récents défis en faisant la cryptographie plus facile...ASFWS 2013 - Cryptocat: récents défis en faisant la cryptographie plus facile...
ASFWS 2013 - Cryptocat: récents défis en faisant la cryptographie plus facile...Cyber Security Alliance
 
SCA in an Agile World | June 2010
SCA in an Agile World | June 2010SCA in an Agile World | June 2010
SCA in an Agile World | June 2010Klocwork
 
TeenaGhongade_Resume_MR
TeenaGhongade_Resume_MRTeenaGhongade_Resume_MR
TeenaGhongade_Resume_MRteena ghongade
 
Dextra mud-sustaining architecture withrefactoring
Dextra mud-sustaining architecture withrefactoringDextra mud-sustaining architecture withrefactoring
Dextra mud-sustaining architecture withrefactoringDextra
 
Production machine learning: Managing models, workflows and risk at scale
Production machine learning: Managing models, workflows and risk at scaleProduction machine learning: Managing models, workflows and risk at scale
Production machine learning: Managing models, workflows and risk at scaleAlex Housley
 
Maintaining and Releasing Open Source Software
Maintaining and Releasing Open Source SoftwareMaintaining and Releasing Open Source Software
Maintaining and Releasing Open Source SoftwareJoel Nothman
 
The Development History of PVS-Studio for Linux
The Development History of PVS-Studio for LinuxThe Development History of PVS-Studio for Linux
The Development History of PVS-Studio for LinuxPVS-Studio
 
Agile experiences from the trenches #DBART 2020
Agile experiences from the trenches #DBART 2020Agile experiences from the trenches #DBART 2020
Agile experiences from the trenches #DBART 2020Patrick Sauerwein
 
Impact of Agile in Software Development Organizations
Impact of Agile in Software Development OrganizationsImpact of Agile in Software Development Organizations
Impact of Agile in Software Development OrganizationsAlvaro Ruiz de Mendarozqueta
 
Scope master introduction presentation feb 2020 w vid
Scope master introduction presentation feb 2020 w vidScope master introduction presentation feb 2020 w vid
Scope master introduction presentation feb 2020 w vidColin Hammond
 

Similaire à Application Inspector SSDL Edition product (20)

Workshop About Software Engineering Skills 2019
Workshop About Software Engineering Skills 2019Workshop About Software Engineering Skills 2019
Workshop About Software Engineering Skills 2019
 
Tools to create a secure build pipeline
Tools to create a secure build pipelineTools to create a secure build pipeline
Tools to create a secure build pipeline
 
Application security for the modern web - ISSA South Texas Houston DevOps
Application security for the modern web - ISSA South Texas Houston DevOpsApplication security for the modern web - ISSA South Texas Houston DevOps
Application security for the modern web - ISSA South Texas Houston DevOps
 
Strangle The Monolith: A Data Driven Approach
Strangle The Monolith: A Data Driven ApproachStrangle The Monolith: A Data Driven Approach
Strangle The Monolith: A Data Driven Approach
 
Regular use of static code analysis in team development
Regular use of static code analysis in team developmentRegular use of static code analysis in team development
Regular use of static code analysis in team development
 
Three Interviews About Static Code Analyzers
Three Interviews About Static Code AnalyzersThree Interviews About Static Code Analyzers
Three Interviews About Static Code Analyzers
 
Regular use of static code analysis in team development
Regular use of static code analysis in team developmentRegular use of static code analysis in team development
Regular use of static code analysis in team development
 
Regular use of static code analysis in team development
Regular use of static code analysis in team developmentRegular use of static code analysis in team development
Regular use of static code analysis in team development
 
ASFWS 2013 - Cryptocat: récents défis en faisant la cryptographie plus facile...
ASFWS 2013 - Cryptocat: récents défis en faisant la cryptographie plus facile...ASFWS 2013 - Cryptocat: récents défis en faisant la cryptographie plus facile...
ASFWS 2013 - Cryptocat: récents défis en faisant la cryptographie plus facile...
 
Resume_Sameer Parihar
Resume_Sameer PariharResume_Sameer Parihar
Resume_Sameer Parihar
 
SCA in an Agile World | June 2010
SCA in an Agile World | June 2010SCA in an Agile World | June 2010
SCA in an Agile World | June 2010
 
Ravi Sundriyal
Ravi SundriyalRavi Sundriyal
Ravi Sundriyal
 
TeenaGhongade_Resume_MR
TeenaGhongade_Resume_MRTeenaGhongade_Resume_MR
TeenaGhongade_Resume_MR
 
Dextra mud-sustaining architecture withrefactoring
Dextra mud-sustaining architecture withrefactoringDextra mud-sustaining architecture withrefactoring
Dextra mud-sustaining architecture withrefactoring
 
Production machine learning: Managing models, workflows and risk at scale
Production machine learning: Managing models, workflows and risk at scaleProduction machine learning: Managing models, workflows and risk at scale
Production machine learning: Managing models, workflows and risk at scale
 
Maintaining and Releasing Open Source Software
Maintaining and Releasing Open Source SoftwareMaintaining and Releasing Open Source Software
Maintaining and Releasing Open Source Software
 
The Development History of PVS-Studio for Linux
The Development History of PVS-Studio for LinuxThe Development History of PVS-Studio for Linux
The Development History of PVS-Studio for Linux
 
Agile experiences from the trenches #DBART 2020
Agile experiences from the trenches #DBART 2020Agile experiences from the trenches #DBART 2020
Agile experiences from the trenches #DBART 2020
 
Impact of Agile in Software Development Organizations
Impact of Agile in Software Development OrganizationsImpact of Agile in Software Development Organizations
Impact of Agile in Software Development Organizations
 
Scope master introduction presentation feb 2020 w vid
Scope master introduction presentation feb 2020 w vidScope master introduction presentation feb 2020 w vid
Scope master introduction presentation feb 2020 w vid
 

Plus de Valery Boronin

Тренды кибербезопасности, угрозы и вызовы в 2018 году
Тренды кибербезопасности, угрозы и вызовы в 2018 годуТренды кибербезопасности, угрозы и вызовы в 2018 году
Тренды кибербезопасности, угрозы и вызовы в 2018 годуValery Boronin
 
SecDevOps. Разработка, DevOps и безопасность.
SecDevOps. Разработка, DevOps и безопасность.SecDevOps. Разработка, DevOps и безопасность.
SecDevOps. Разработка, DevOps и безопасность.Valery Boronin
 
Практика оформления проекта и презентаций
Практика оформления проекта и презентацийПрактика оформления проекта и презентаций
Практика оформления проекта и презентацийValery Boronin
 
SDL/SSDL для руководителей
SDL/SSDL для руководителейSDL/SSDL для руководителей
SDL/SSDL для руководителейValery Boronin
 
PT Application Inspector SSDL Edition product brief
PT Application Inspector SSDL Edition product briefPT Application Inspector SSDL Edition product brief
PT Application Inspector SSDL Edition product briefValery Boronin
 
PT Application Inspector SSDL Edition листовка
PT Application Inspector SSDL Edition листовкаPT Application Inspector SSDL Edition листовка
PT Application Inspector SSDL Edition листовкаValery Boronin
 
Построение процесса безопасной разработки - Стачка 2016
Построение процесса безопасной разработки - Стачка 2016Построение процесса безопасной разработки - Стачка 2016
Построение процесса безопасной разработки - Стачка 2016Valery Boronin
 
Valery Boronin on DLP Russia 2010
Valery Boronin on DLP Russia 2010Valery Boronin on DLP Russia 2010
Valery Boronin on DLP Russia 2010Valery Boronin
 
Humans Are The Weakest Link – How DLP Can Help
Humans Are The Weakest Link – How DLP Can HelpHumans Are The Weakest Link – How DLP Can Help
Humans Are The Weakest Link – How DLP Can HelpValery Boronin
 
Data Luxury Protection - защита данных с удовольствием!
Data Luxury Protection - защита данных с удовольствием!Data Luxury Protection - защита данных с удовольствием!
Data Luxury Protection - защита данных с удовольствием!Valery Boronin
 

Plus de Valery Boronin (10)

Тренды кибербезопасности, угрозы и вызовы в 2018 году
Тренды кибербезопасности, угрозы и вызовы в 2018 годуТренды кибербезопасности, угрозы и вызовы в 2018 году
Тренды кибербезопасности, угрозы и вызовы в 2018 году
 
SecDevOps. Разработка, DevOps и безопасность.
SecDevOps. Разработка, DevOps и безопасность.SecDevOps. Разработка, DevOps и безопасность.
SecDevOps. Разработка, DevOps и безопасность.
 
Практика оформления проекта и презентаций
Практика оформления проекта и презентацийПрактика оформления проекта и презентаций
Практика оформления проекта и презентаций
 
SDL/SSDL для руководителей
SDL/SSDL для руководителейSDL/SSDL для руководителей
SDL/SSDL для руководителей
 
PT Application Inspector SSDL Edition product brief
PT Application Inspector SSDL Edition product briefPT Application Inspector SSDL Edition product brief
PT Application Inspector SSDL Edition product brief
 
PT Application Inspector SSDL Edition листовка
PT Application Inspector SSDL Edition листовкаPT Application Inspector SSDL Edition листовка
PT Application Inspector SSDL Edition листовка
 
Построение процесса безопасной разработки - Стачка 2016
Построение процесса безопасной разработки - Стачка 2016Построение процесса безопасной разработки - Стачка 2016
Построение процесса безопасной разработки - Стачка 2016
 
Valery Boronin on DLP Russia 2010
Valery Boronin on DLP Russia 2010Valery Boronin on DLP Russia 2010
Valery Boronin on DLP Russia 2010
 
Humans Are The Weakest Link – How DLP Can Help
Humans Are The Weakest Link – How DLP Can HelpHumans Are The Weakest Link – How DLP Can Help
Humans Are The Weakest Link – How DLP Can Help
 
Data Luxury Protection - защита данных с удовольствием!
Data Luxury Protection - защита данных с удовольствием!Data Luxury Protection - защита данных с удовольствием!
Data Luxury Protection - защита данных с удовольствием!
 

Dernier

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Principled Technologies
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024The Digital Insurer
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 

Dernier (20)

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 

Application Inspector SSDL Edition product

  • 2. R&D – 20 years Best in class Application & Device Control as a windows kernel mode developer RSDN Team member (still #1 in Low-level?!) Security - began with the last millennium CTO, small company (30+ subordinates) Director DLP Research, large (Kaspersky) DLP, Encryption, Incident Management Now responsible for SDL and Application Inspector SSDL Edition 18.05.2016 Positive Hack Days 2016, Moscow 2 About – Valery Boronin
  • 3. 1. Prologue – problem statement 2. Gartner on AST 3. Difficulties with AST Tools 4. What we did against them in AI SSDL 5. Live Demo 6. Our uniqueness & your benefits 7. Future 8. FAQ + Q&A Agenda For next one hour 18.05.2016 Positive Hack Days 2016, Moscow 3
  • 4. Code avalanche Not enough people to review In appropriate time frame 18.05.2016 Positive Hack Days 2016, Moscow 4 Problem statement
  • 5. Quality – Defects cost huge money and leads to project failures. Poor SW quality has become one of the most expensive topics in human history: >$500 billion per year world wide © Capers Jones survey 2013 18.05.2016 Positive Hack Days 2016, Moscow 5 Quality? Security even worse… Security even worse Security is hard to find Security is hard to fix HIGHLIGHTS FROM THE 2015 WORLD SW QUALITY REPORT: Security is the most pressing concern
  • 6. increasing risks Product quality level is lower than expected Defect leakage to production Budget, schedule, effort overruns Compliance & Litigation … increasing losses Lower-sales Financial even human lives 18.05.2016 Positive Hack Days 2016, Moscow 6 It results in
  • 7. Critical Capabilities for AST, 2014: 1. Enterprise management console, reporting across multiple testers, RBAC and SDL/SDLC integration. 2. Remediation advices + Reporting + Overall application portfolio risk trending for the CIO/CISO. 3. Multiple language support for the console and for services is an enterprise capability. Not only we think about it…. 18.05.2016 Positive Hack Days 2016, Moscow 7
  • 8. 1. Yet another mgmt. console, workflow, reports, ... 2. Helmet Fire + Little / no help with remediation 3. Dedicated to one specific role (or even single-user) 4. No care about CxOs and Auditors 5. Odd Tools + SSDL is not a target 6. Sometimes poor architecture 7. Vendor lock + very long FR/CR cycle, w/o guarantees 18.05.2016 Positive Hack Days 2016, Moscow 8 Difficulties with AST tools 1. Manual or / and Inconvenient use 2. Delays + No guidance over process 3. Bad from compliance prospective
  • 9. D1: We interacts with developer through code 18.05.2016 Positive Hack Days 2016, Moscow 9
  • 10. Different developers assigned different tickets Work on a fix in specially prepared, separate branches simultaneously! 18.05.2016 Positive Hack Days 2016, Moscow 10 D2: We help with remediation using teamwork 1 2
  • 11. 18.05.2016 Positive Hack Days 2016, Moscow 11 D3: We support roles + RBAC Admin – to setup + assign roles Developer – for Dev & QA Manager – for R&D & Security managers Auditor – see next slide …more to come
  • 12. Operations & BI Audit Benchmarking Tracking from issues to people …and vice versa Figure out / probe Trends Anomalies Hypotheses Customize accordingly Policy / Reports / Dashboards 18.05.2016 Positive Hack Days 2016, Moscow 12 D4: We take care about CxO and Auditors
  • 13. Requirements Design Implementation Verification Deployment … 18.05.2016 Positive Hack Days 2016, Moscow 13 D5: We are SSDL-aware, SSDL is our target
  • 14. Automated code commit scan Scan results delivered ASAP to all participants using their preferred way, form and even language Code flaws & vulns in VCS Issues in tracker Notifications / Reports in UA-emails • FYA for responsible • FYI for observers 18.05.2016 Positive Hack Days 2016, Moscow 14 D : Convenient for each role
  • 15. Endless event-driven protection Set your security policy rules Guidance over Process / Code fix confirmations Metrics & KPIs Benchmarking Proactive mgmt 18.05.2016 Positive Hack Days 2016, Moscow 15 D : Minimal delays + help with guidance
  • 16. PA DSS & PCI DSS OWASP FSTEK РС БР ИББС-2 6-2014 … Your policy rules 18.05.2016 Positive Hack Days 2016, Moscow 16 D: Our approach favored by regulators
  • 17. 18.05.2016 Positive Hack Days 2016, Moscow 17 D6: Enterprise architecture – Helicopter view UX- & UA-aware Extensible Secure • RBAC on data level • Segregation of duty • Least privileges AF
  • 18. Analyst’s Workplace to design Queries to apply in Reports Notifications Dashboard / UI Plugins / API 18.05.2016 Positive Hack Days 2016, Moscow 18 D7: We’re open + self-help = No vendor lock
  • 20. Our uniqueness – we’re close to developers 18.05.2016 Positive Hack Days 2016, Moscow 20
  • 21. 1. how to scan sample project on a GitHub (I left it there for your comfortable observation later on, if need) - AI SSDL may perform his job manually or automatically on any new commit in selected branch of specified repository. 2. how vulnerabilities found and reported on a GitHub directly. 3. how developer/manager/administrator/etc notified about issues found through special role-based UX / UA-ready personalized notification emails. btw, this notification emails are customizable - you may change them how you need per project, per role, etc – no need to rebuild product to get appropriate for you content. 4. how code flaws / vulns found combined in aggregation tickets by vuln class (LDAP injection issues is one ticket, XSS issues is another). 5. how AI interacts with developer through code annotation and our special markers (TODO, VERIFY, FIXED, REOPEN, FP). MS VS, Eclipse, Resharper have built-in support for this markers. 6. how different developers assigned different tickets / issues and work on fix in separate branches (specially prepared, to keep focus) simultaneously. 7. how their changes are automatically detected and confirmed by AI, we do not trust by word ;-) 8. how policy on a project changes its status (violated red or successful green) depends on master branch scan results and again how people notified about it by UA-aware emails, with specific actions for different roles in different situations. 9. how to deal with data collected (scans, commits, workflow, etc.) through analyst’s workplace – special effort for role of data analyst. Using this tool you may perform benchmarking, tracking from issues to people or vice versa – and, globally, probe your hypotheses, figure out trends or anomalies. 10.By modifying queries, you may even change certain parts of the product’s UI on the fly (per role, per project, etc) as you need, w/o firing CR/FR and waiting while vendor implement them few months later and rolling update out in your infrastructure. In the nearest future in a similar manner this approach will be reused to customize reports for your needs and to customize dashboards - with key metrics and indicators per project, per role, etc. 18.05.2016 Positive Hack Days 2016, Moscow 21 For your records - we saw today
  • 23. Interaction through source code – no broken habits Progress via aggregation tickets – in your favorite tracker Automatic scans & fix confirmations – always helps 18.05.2016 Positive Hack Days 2016, Moscow 23 PT AI SSDL Edition Benefits for Developers
  • 24. Your product development more safe, secure, reliable Less possible damage & cost of incidents Reduced risks including • Leak vulnerability in production • Late vulnerability detection • Effort overruns • Schedule overruns • Budget overruns • Project failure • …even intellectual properties-related 18.05.2016 Positive Hack Days 2016, Moscow 24 PT AI SSDL Edition Benefits for Managers
  • 25. Power of AI under the hood Exploits Endless event-driven protection Set your security policy rules Guidance over process 3d-parties code acceptance BI, Metrics & KPIs Benchmarking Audit 18.05.2016 Positive Hack Days 2016, Moscow 25 Benefits for Security guys, CxOs and Auditors
  • 26. No broken habits + Favorite tools + Clear language 18.05.2016 Positive Hack Days 2016, Moscow 26 Benefits for All
  • 27. Are your product Popular? Next Target! Development using SSDL – save costs, reduce risks and increase quality of your product (why? See this on SSDL) Development with AI SSDL – your step to more safe, secure, reliable code and, thus, future Time to try AI SSDL!  18.05.2016 Positive Hack Days 2016, Moscow 27 Conclusion
  • 29. CI and build servers IDE Policy and workflow mgmt. & enforcement Flexible classifications Open API, Plugins SDK Make Gartner & Co happy: Overall app portfolio risk trending for CxOCISO Vulnerability tracking – vulnerability life cycle 18.05.2016 Positive Hack Days 2016, Moscow 29 Future Plans and Ideas
  • 30. More roles More policies More workflows More compliance More reports More tools More environments 18.05.2016 Positive Hack Days 2016, Moscow 30 Future – Citius, Altius, Fortius Please, give us an advice what is important to you – we plan and support it a bit later
  • 31. Q1: AI Desktop vs AI SSDL: what’s difference? A1: AI Desktop is for security guys, AI SSDL for developers. Q2: What’s next? A2: Give us a card and we’ll send you a form to sign up for a CTP Q3: When it will be available? A3: CTP (Community Technology Preview) planned for Autumn’16 FAQ 18.05.2016 Positive Hack Days 2016, Moscow 31 Q: But wait! …what if I want it right now? A: Begin with AI Desktop (analysis engine the same) and get AI SSDL later, with AI Desktop price reduction!
  • 32. Is everything clear? Is there all you need? Something forgotten? Questions & clarifications Ideas Improvements Suggestions Feedback is highly appreciated! Please, deliver it your preferred way. Discussion 18.05.2016 Positive Hack Days 2016, Moscow 32