SlideShare a Scribd company logo
Security initiatives commonly start with straightforward activities, such as a security feature review,
before they take on those that require more coordination, such as creating customized rule sets.
You can use BSIMM to assess your level of maturity.
1. gain altitude in stages
2. Move at your own speed
BSIMM shows that the rate of acceleration along the maturity curve is not the same for every
organization, or even every industry. You must launch and navigate your security journey based on
your own risk drivers, budget, and priorities.
4. The right crew is key
BSIMM shows that many organizations rely on security testing tools, but mature organizations know
tools alone are not enough to reduce risk. It takes experts to interpret results, prioritize findings and
fix issues.
3. A pilot is essential
No organization can have a successful software security initiative without leadership. BSIMM shows
that mature initiatives are typically led by a senior executive and managed by a Software Security
Group that establishes governance, policy, and standards.
5. Broad support eases the ride
BSIMM shows that mature initiatives have support from people in functions other than the security
team, such as developers, architects, and product owners. You must develop a “satellite” crew to raise
awareness and ensure security policies are carried out.
6. Conditions will change
Years of BSIMM data show that organizations change their mix of security strategies, adding new
activities and replacing others, as they navigate. It’s essential to stay up to date and regularly evaluate
your own tactics.
HOWHIGHcanyousoar?HOWHIGHcanyousoar?HOWHIGHcanyousoar?HOWHIGHcanyousoar?Eight years of data gathered from 100+ initiatives provide a bird’s eye view of software security.
You can apply lessons from the Building Software Security in Maturity Model (BSIMM) to your
business regardless of your industry, your size, or the mix of your applications.
7UndeniableTruthstoHelpYouMakeBetterSoftwareSecurityDecisions
HOWHIGHcanyousoar?HOWHIGHcanyousoar?HOWHIGHcanyousoar?HOWHIGHcanyousoar?HOWHIGHcanyousoar?HOWHIGHcanyousoar?HOWHIGHcanyousoar?HOWHIGHcanyousoar?HOWHIGHcanyousoar?HOWHIGHcanyousoar?HOWHIGHcanyousoar?HOWHIGHcanyousoar?HOWHIGHcanyousoar?HOWHIGHcanyousoar?HOWHIGHcanyousoar?HOWHIGHcanyousoar?HOWHIGHcanyousoar?HOWHIGHcanyousoar?HOWHIGHcanyousoar?
Don’tjustdriftinthewind
To navigate to your final destination, you must know your launch point and accurately assess the
conditions. Although BSIMM can’t guarantee a smooth ride, it can make it easer to ascend the
maturity curve, even when the wind is blowing.
While these truths are universal, they scratch the surface of what BSIMM can reveal. A BSIMM
assessment compares your software security initiative against your peers, so you can identify
strengths, uncover gaps, and determine strategies that fit your own organization.
BUILDING SECURITY IN
www.cigital.com
7. Chart your own course
BSIMM shows that while companies begin their journey with common practices, as they ascend they
pick and choose among 113 security activities to reduce risk. After you see how you compare, you
can use BSIMM to make decisions that fit your company.
FIRE the burnersWhat can YOU learn from a BSIMM Assessment?
FindOutNow

More Related Content

PDF
7 Undeniable Truths to Making Software Security Better
PDF
10-things-you-ought-to-know-before-you-benchmark(1)
PDF
Transform Your Security Operations with Security Automation and Orchestration
PPTX
Understanding the 8 Keys to Security Success
PDF
SECURITY
PPTX
Cyber Defence - Service portfolio
PDF
Accenture Security Report 2016 Infographic for Insurance
PDF
Forrester Infographic
7 Undeniable Truths to Making Software Security Better
10-things-you-ought-to-know-before-you-benchmark(1)
Transform Your Security Operations with Security Automation and Orchestration
Understanding the 8 Keys to Security Success
SECURITY
Cyber Defence - Service portfolio
Accenture Security Report 2016 Infographic for Insurance
Forrester Infographic

What's hot (20)

PDF
Carey Fagan - SAFETY & SECURITY WORKSHOP - Panel 1: Standards and regulation ...
PDF
The Cyber Security Leap
PDF
MAPPING_ISO27001_TO_COBIT4.1
PDF
7 Lessons Learned From BSIMM
PDF
Security Operations Strategies
PPT
Implementing Business Aligned Security Strategy Dane Warren Li
PPTX
PPTX
Importance Of A Security Policy
PDF
Building A Security Operations Center
PDF
MP_OneSheet_VulnThreat
PDF
Cybersecurity: Quick Preparedness Assessment
PDF
Implement Effective Cybersecurity Practices In 2021 With Top LA Prevention Re...
PDF
Get Connected - Cyber Security Workshop, Prof Tim Watson
PDF
Boosting Your Small Business's Cybersecurity
PDF
The Demystification of successful cybersecurity initiatives.
PDF
Getting Executive Support for a Software Security Program
PPTX
ARC's Bob Mick's Cyber Security Standards Presentation at ARC's 2008 Industry...
PDF
Safety & Asset Integrity Excellence - A Study of Three Mile Island
PPTX
IT Security Incident Response for Nonprofits
PPTX
Security Policies and Standards
Carey Fagan - SAFETY & SECURITY WORKSHOP - Panel 1: Standards and regulation ...
The Cyber Security Leap
MAPPING_ISO27001_TO_COBIT4.1
7 Lessons Learned From BSIMM
Security Operations Strategies
Implementing Business Aligned Security Strategy Dane Warren Li
Importance Of A Security Policy
Building A Security Operations Center
MP_OneSheet_VulnThreat
Cybersecurity: Quick Preparedness Assessment
Implement Effective Cybersecurity Practices In 2021 With Top LA Prevention Re...
Get Connected - Cyber Security Workshop, Prof Tim Watson
Boosting Your Small Business's Cybersecurity
The Demystification of successful cybersecurity initiatives.
Getting Executive Support for a Software Security Program
ARC's Bob Mick's Cyber Security Standards Presentation at ARC's 2008 Industry...
Safety & Asset Integrity Excellence - A Study of Three Mile Island
IT Security Incident Response for Nonprofits
Security Policies and Standards
Ad

Viewers also liked (9)

PPTX
Caeer Development In A Rapid Changing Society
PPTX
Carta para "Patrocinador" Torneo Golf Rotario 2017, Morelia, Michoacan, Mexico
PDF
Variación Porcentual de Precios períododos 2001-2004 y 2005-2011 en Rep. Domi...
PPTX
Informacion del tel
PDF
84bits-slide-deck
PPTX
QUESTIONARIES
PDF
HeadBidding.com - A Condensed Overview for Advanced Publishers
DOCX
Cuadro comparativo de antonia
PDF
Management 3.0 - Scaling an Organization
Caeer Development In A Rapid Changing Society
Carta para "Patrocinador" Torneo Golf Rotario 2017, Morelia, Michoacan, Mexico
Variación Porcentual de Precios períododos 2001-2004 y 2005-2011 en Rep. Domi...
Informacion del tel
84bits-slide-deck
QUESTIONARIES
HeadBidding.com - A Condensed Overview for Advanced Publishers
Cuadro comparativo de antonia
Management 3.0 - Scaling an Organization
Ad

Similar to 7-lessons-learned-from-bsimm (20)

ODP
Hack2Secure Assists Organization in Secure Application Development Through BS...
PDF
Introduction to Software Security Initiative
PPT
Software Security Initiatives
PDF
PDF
Emerging Trends in Application Security
PPTX
BSIMM-V: The Building Security In Maturity Model
PDF
Get Your Board to Say "Yes" to a BSIMM Assessment
PDF
Security Metrics Rehab: Breaking Free from Top ‘X’ Lists, Cultivating Organic...
PPTX
Information Security Metrics - Practical Security Metrics
PPTX
Jack Nichelson - Information Security Metrics - Practical Security Metrics
PDF
Webinar – Using Metrics to Drive Your Software Security Initiative
PDF
The Security Ecosystem
PPTX
BSIMM: Bringing Science to Software Security
PPTX
Information Security - Back to Basics - Own Your Vulnerabilities
PDF
Giving your AppSec program the edge - using OpenSAMM for benchmarking and sof...
PPT
Business cases for software security
PDF
Rogers eBook Security
PPTX
How is Your AppSec Program Doing Compared to Others
PDF
Application Risk Prioritization - Overview - Secure360 2015 - Part 1 of 2
PDF
Application Security Maturity Model
Hack2Secure Assists Organization in Secure Application Development Through BS...
Introduction to Software Security Initiative
Software Security Initiatives
Emerging Trends in Application Security
BSIMM-V: The Building Security In Maturity Model
Get Your Board to Say "Yes" to a BSIMM Assessment
Security Metrics Rehab: Breaking Free from Top ‘X’ Lists, Cultivating Organic...
Information Security Metrics - Practical Security Metrics
Jack Nichelson - Information Security Metrics - Practical Security Metrics
Webinar – Using Metrics to Drive Your Software Security Initiative
The Security Ecosystem
BSIMM: Bringing Science to Software Security
Information Security - Back to Basics - Own Your Vulnerabilities
Giving your AppSec program the edge - using OpenSAMM for benchmarking and sof...
Business cases for software security
Rogers eBook Security
How is Your AppSec Program Doing Compared to Others
Application Risk Prioritization - Overview - Secure360 2015 - Part 1 of 2
Application Security Maturity Model

7-lessons-learned-from-bsimm

  • 1. Security initiatives commonly start with straightforward activities, such as a security feature review, before they take on those that require more coordination, such as creating customized rule sets. You can use BSIMM to assess your level of maturity. 1. gain altitude in stages 2. Move at your own speed BSIMM shows that the rate of acceleration along the maturity curve is not the same for every organization, or even every industry. You must launch and navigate your security journey based on your own risk drivers, budget, and priorities. 4. The right crew is key BSIMM shows that many organizations rely on security testing tools, but mature organizations know tools alone are not enough to reduce risk. It takes experts to interpret results, prioritize findings and fix issues. 3. A pilot is essential No organization can have a successful software security initiative without leadership. BSIMM shows that mature initiatives are typically led by a senior executive and managed by a Software Security Group that establishes governance, policy, and standards. 5. Broad support eases the ride BSIMM shows that mature initiatives have support from people in functions other than the security team, such as developers, architects, and product owners. You must develop a “satellite” crew to raise awareness and ensure security policies are carried out. 6. Conditions will change Years of BSIMM data show that organizations change their mix of security strategies, adding new activities and replacing others, as they navigate. It’s essential to stay up to date and regularly evaluate your own tactics. HOWHIGHcanyousoar?HOWHIGHcanyousoar?HOWHIGHcanyousoar?HOWHIGHcanyousoar?Eight years of data gathered from 100+ initiatives provide a bird’s eye view of software security. You can apply lessons from the Building Software Security in Maturity Model (BSIMM) to your business regardless of your industry, your size, or the mix of your applications. 7UndeniableTruthstoHelpYouMakeBetterSoftwareSecurityDecisions HOWHIGHcanyousoar?HOWHIGHcanyousoar?HOWHIGHcanyousoar?HOWHIGHcanyousoar?HOWHIGHcanyousoar?HOWHIGHcanyousoar?HOWHIGHcanyousoar?HOWHIGHcanyousoar?HOWHIGHcanyousoar?HOWHIGHcanyousoar?HOWHIGHcanyousoar?HOWHIGHcanyousoar?HOWHIGHcanyousoar?HOWHIGHcanyousoar?HOWHIGHcanyousoar?HOWHIGHcanyousoar?HOWHIGHcanyousoar?HOWHIGHcanyousoar?HOWHIGHcanyousoar? Don’tjustdriftinthewind To navigate to your final destination, you must know your launch point and accurately assess the conditions. Although BSIMM can’t guarantee a smooth ride, it can make it easer to ascend the maturity curve, even when the wind is blowing. While these truths are universal, they scratch the surface of what BSIMM can reveal. A BSIMM assessment compares your software security initiative against your peers, so you can identify strengths, uncover gaps, and determine strategies that fit your own organization. BUILDING SECURITY IN www.cigital.com 7. Chart your own course BSIMM shows that while companies begin their journey with common practices, as they ascend they pick and choose among 113 security activities to reduce risk. After you see how you compare, you can use BSIMM to make decisions that fit your company. FIRE the burnersWhat can YOU learn from a BSIMM Assessment? FindOutNow