SlideShare a Scribd company logo
Battle Tested Application Security
Ty Sbano
October 17, 2018
Bio Ty Sbano
Currently the head of security at Periscope Data. Ty is an Information
Security leader with over 12 years of experience, mainly in Financial
Technology organizations. Ty's career has been focused on developing
application and product security programs for Capital One, JPMorgan
Chase, LendingClub, and Target.
Key areas of knowledge include developing security champions, threat
modeling, secure code training, static code analysis, component analysis,
dynamic analysis, penetration testing, and red teaming. Ty’s security
mentality has been concentrated on enabling engineering and product teams
to securely move at the speed of the business to make it a competitive
advantage. Ty graduated from Penn State University with a B.S. in
Information Science & Technology and from Norwich University with a M.S.
in Information Assurance.
Ty also holds the CISSP, SSCP, CEH and CCSK.
The views and
opinions
expressed in this
discussion are
those of the
authors and do
not necessarily
reflect the official
policy or position
of any company.
How do we build An
Application Security Program?
Step 1 – Learn your internal tech culture
Step 2 – Ignore all the vendors (for now)
Step 3 – Roll up your sleeves and get to work
• Development
• Operations
• Security
• Architecture
General Approach to Application Security
01
• Requirements
• Goals
• Measurements
02
• Retrospectives
• Post Mortems
• Rinse & Repeat
04
Culture 101 Criteria for Success Kaizen to Enhance
• Role Centric
• End Users
• Developers
• Security
• Audit
• Regulators
• Executives
03
Educate for Scale
Set the tone of the program by establishing a mission statement
Software Development Lifecycle (SDLC)
Product Development Lifecycle (PDLC)
Waterfall
• Established Cadence/Gates
• Required Risk Remediation
• Executive Dashboards
Agile
• Constant Releases
• Risk Management, Acceptable Tolerance
• Real-Time, API Friendly Data
Automation
and Self-
Service
Capabilities
Will Enable
Security At
The Speed of
Business
Engineering Team Composition?
In-Sourced
• Education and Training
• Self-Service
• Assessments, Consulting and Support
Out-Sourced
• Contract Requirements
• Vendor Due Diligence
• Attestation and Consulting
• Standards
Commercial Off The Shelf (COTS)
• Contract Requirements
• Customer Advisory Board aka
Influence the feature prioritization / backlog
Where’s the silver bullet solution?
Be Tool Agnostic, Problem Specific
Source: Forrester Wave for SAST, 2017
Security Staffing Strategy
Insourced
• Talent Acquisition / Sourcing
• Talent Management
• Rewarding
Hybrid Approach
• Staff Augmentation
• Cross Training
• Work/Life Balance
Do Outsource
Consistent,
Repeatable
Processes
Do Not
Outsource
Something
You Don’t
Understand
Outsourced
• Scales Quickly
• Cost Opportunities
• Externalized Accountability
Funding the Program?
Project Based (Product)
• Incremental
• Time Consuming
• Cost Avoidance
Internally Funded (Security Budget)
• Annual
• Responsibility on AppSec
• Forecasting and Variance Challenges
Business Owner (Non-IT)
• Annual
• Tracking Challenges
• Cost Avoidance, e.g. Security Avoidance
Remove Budget From The Equation, Your Engineering Teams will be more Engaged
Areas of Focus with High Return On Investment
25%
Training & Education
30%
Embrace Open Source
45%
Asset Management
It’s Less About Financial Investment, More About Engagement
• Real-Time Coaching
• Champion Programs
• Brand and Be Bold
• SneakerNet
• Scanning
Technology
• OWASP???
• Understand the
Business
• Inventory
• Business Oriented
Risk Ranking
• Defect Tracking
Forward Looking Lessons
Hygiene over HYPE
• Inventory, Asset Management, Security Basics over “Silver Bullets”
Dialogue over Confidentiality
• Engage your team, don’t always say everything is confidential – let people help
Carrot beats Stick
• Recognition always trumps reprimands, plus swag helps
Always Be Learning
• Take the opportunity of the rapid development world to learn something new everyday
Contact
Linkedin - https://www.linkedin.com/in/tysbano/
Articles - https://techbeacon.com/contributors/ty-sbano
Website - http://www.tysbano.com
Twitter - @tysbano
Instagram - https://www.instagram.com/takoyakity/
*Nothing to do with
security
https://www.periscopedata.com/careers
Come work with me!
Battle Tested Application Security
Thank You Supporters
Meet me in the Slack channel for Q&A
bit.ly/addo-slack

More Related Content

PDF
Scaling an Application Security Program at the IMF: A Case Study
PPTX
The Economics of Security
PPTX
BTC Quality Assurance and Testing Solutions for the Financial Services industry
PPTX
Business model israel_v1.0
PPTX
How To Become An IT Security Risk Analyst
PPT
The Perspective of Today's Information Security Leader
PDF
Cyber Eleven flyer
PPTX
Yonix presents: Business Analysis: Where transformation and innovation begins
Scaling an Application Security Program at the IMF: A Case Study
The Economics of Security
BTC Quality Assurance and Testing Solutions for the Financial Services industry
Business model israel_v1.0
How To Become An IT Security Risk Analyst
The Perspective of Today's Information Security Leader
Cyber Eleven flyer
Yonix presents: Business Analysis: Where transformation and innovation begins

What's hot (10)

PPTX
Tre Smith - From Decision to Implementation: Who's On First?
PDF
NUS-ISS Digital Architecture Information Session
PDF
What it Takes to be a CISO in 2017
PPTX
Build and Information Security Strategy
PDF
The right technology combined with valuable messaging
PDF
Security of the future - Adapting Approaches to What We Need
PDF
No more security empires - The ciso as an individual contributor
PPT
20th March Session Five by Ramesh Shanmughanathan
PDF
From Cave Man to Business Man, the Evolution of the CISO to CIRO
PDF
Alexander Knorr Transcript
Tre Smith - From Decision to Implementation: Who's On First?
NUS-ISS Digital Architecture Information Session
What it Takes to be a CISO in 2017
Build and Information Security Strategy
The right technology combined with valuable messaging
Security of the future - Adapting Approaches to What We Need
No more security empires - The ciso as an individual contributor
20th March Session Five by Ramesh Shanmughanathan
From Cave Man to Business Man, the Evolution of the CISO to CIRO
Alexander Knorr Transcript
Ad

Similar to Battle Tested Application Security (20)

PDF
Protect Your Customers Data from Cyberattacks
PDF
EDCE 2017 bulletproof better-faster-safer
PPTX
Best Practices for a Mature Application Security Program Webinar - February 2016
PDF
Business Competence Presentation
PDF
Agile Relevance in the age of Continuous Everything ....
PPTX
DevSecOps without DevOps is Just Security
PDF
ScotSecure 2020
PDF
IT Security As A Service
PPTX
Building a Security culture at Skyscanner 2016
PPTX
Amazing Winter Keynote - IT as a Team Sport
PDF
The Future of Software Security Assurance
PPTX
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
PPTX
The Five Essential Truths of the Application Economy
PDF
New Era of Software with modern Application Security (v0.6)
PDF
Unified application security analyser
PPTX
Digital Product Security
PPTX
INTERFACE, by apidays - Driving the business via APIs.pptx
PPTX
Walls of Steel, Doors of Wood - Relevance of Application Security
PPTX
Fortify-Application_Security_Foundation_Training.pptx
PPTX
Fortify-Application_Security_Foundation_Training.pptx
Protect Your Customers Data from Cyberattacks
EDCE 2017 bulletproof better-faster-safer
Best Practices for a Mature Application Security Program Webinar - February 2016
Business Competence Presentation
Agile Relevance in the age of Continuous Everything ....
DevSecOps without DevOps is Just Security
ScotSecure 2020
IT Security As A Service
Building a Security culture at Skyscanner 2016
Amazing Winter Keynote - IT as a Team Sport
The Future of Software Security Assurance
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
The Five Essential Truths of the Application Economy
New Era of Software with modern Application Security (v0.6)
Unified application security analyser
Digital Product Security
INTERFACE, by apidays - Driving the business via APIs.pptx
Walls of Steel, Doors of Wood - Relevance of Application Security
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
Ad

Recently uploaded (20)

PPT
Teaching material agriculture food technology
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Electronic commerce courselecture one. Pdf
DOCX
The AUB Centre for AI in Media Proposal.docx
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Teaching material agriculture food technology
Advanced methodologies resolving dimensionality complications for autism neur...
Unlocking AI with Model Context Protocol (MCP)
Review of recent advances in non-invasive hemoglobin estimation
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Diabetes mellitus diagnosis method based random forest with bat algorithm
Chapter 3 Spatial Domain Image Processing.pdf
“AI and Expert System Decision Support & Business Intelligence Systems”
The Rise and Fall of 3GPP – Time for a Sabbatical?
Mobile App Security Testing_ A Comprehensive Guide.pdf
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Dropbox Q2 2025 Financial Results & Investor Presentation
Building Integrated photovoltaic BIPV_UPV.pdf
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Per capita expenditure prediction using model stacking based on satellite ima...
Electronic commerce courselecture one. Pdf
The AUB Centre for AI in Media Proposal.docx
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy

Battle Tested Application Security

  • 1. Battle Tested Application Security Ty Sbano October 17, 2018
  • 2. Bio Ty Sbano Currently the head of security at Periscope Data. Ty is an Information Security leader with over 12 years of experience, mainly in Financial Technology organizations. Ty's career has been focused on developing application and product security programs for Capital One, JPMorgan Chase, LendingClub, and Target. Key areas of knowledge include developing security champions, threat modeling, secure code training, static code analysis, component analysis, dynamic analysis, penetration testing, and red teaming. Ty’s security mentality has been concentrated on enabling engineering and product teams to securely move at the speed of the business to make it a competitive advantage. Ty graduated from Penn State University with a B.S. in Information Science & Technology and from Norwich University with a M.S. in Information Assurance. Ty also holds the CISSP, SSCP, CEH and CCSK.
  • 3. The views and opinions expressed in this discussion are those of the authors and do not necessarily reflect the official policy or position of any company.
  • 4. How do we build An Application Security Program? Step 1 – Learn your internal tech culture Step 2 – Ignore all the vendors (for now) Step 3 – Roll up your sleeves and get to work
  • 5. • Development • Operations • Security • Architecture General Approach to Application Security 01 • Requirements • Goals • Measurements 02 • Retrospectives • Post Mortems • Rinse & Repeat 04 Culture 101 Criteria for Success Kaizen to Enhance • Role Centric • End Users • Developers • Security • Audit • Regulators • Executives 03 Educate for Scale Set the tone of the program by establishing a mission statement
  • 6. Software Development Lifecycle (SDLC) Product Development Lifecycle (PDLC) Waterfall • Established Cadence/Gates • Required Risk Remediation • Executive Dashboards Agile • Constant Releases • Risk Management, Acceptable Tolerance • Real-Time, API Friendly Data Automation and Self- Service Capabilities Will Enable Security At The Speed of Business
  • 7. Engineering Team Composition? In-Sourced • Education and Training • Self-Service • Assessments, Consulting and Support Out-Sourced • Contract Requirements • Vendor Due Diligence • Attestation and Consulting • Standards Commercial Off The Shelf (COTS) • Contract Requirements • Customer Advisory Board aka Influence the feature prioritization / backlog
  • 8. Where’s the silver bullet solution? Be Tool Agnostic, Problem Specific Source: Forrester Wave for SAST, 2017
  • 9. Security Staffing Strategy Insourced • Talent Acquisition / Sourcing • Talent Management • Rewarding Hybrid Approach • Staff Augmentation • Cross Training • Work/Life Balance Do Outsource Consistent, Repeatable Processes Do Not Outsource Something You Don’t Understand Outsourced • Scales Quickly • Cost Opportunities • Externalized Accountability
  • 10. Funding the Program? Project Based (Product) • Incremental • Time Consuming • Cost Avoidance Internally Funded (Security Budget) • Annual • Responsibility on AppSec • Forecasting and Variance Challenges Business Owner (Non-IT) • Annual • Tracking Challenges • Cost Avoidance, e.g. Security Avoidance Remove Budget From The Equation, Your Engineering Teams will be more Engaged
  • 11. Areas of Focus with High Return On Investment 25% Training & Education 30% Embrace Open Source 45% Asset Management It’s Less About Financial Investment, More About Engagement • Real-Time Coaching • Champion Programs • Brand and Be Bold • SneakerNet • Scanning Technology • OWASP??? • Understand the Business • Inventory • Business Oriented Risk Ranking • Defect Tracking
  • 12. Forward Looking Lessons Hygiene over HYPE • Inventory, Asset Management, Security Basics over “Silver Bullets” Dialogue over Confidentiality • Engage your team, don’t always say everything is confidential – let people help Carrot beats Stick • Recognition always trumps reprimands, plus swag helps Always Be Learning • Take the opportunity of the rapid development world to learn something new everyday
  • 13. Contact Linkedin - https://www.linkedin.com/in/tysbano/ Articles - https://techbeacon.com/contributors/ty-sbano Website - http://www.tysbano.com Twitter - @tysbano Instagram - https://www.instagram.com/takoyakity/ *Nothing to do with security https://www.periscopedata.com/careers Come work with me!
  • 16. Meet me in the Slack channel for Q&A bit.ly/addo-slack