SlideShare a Scribd company logo
Number of software security
activities measured by the BSIMM
BSIMM
0
112
1:75
Numbersby
the
Number of years
BSIMM has been
around (started
in 2008)
Average number of
people in a satellite
13.9
Average
number
of people
in an SSG
Average
ratio of SSG
members to
developers
Percent of BSIMM
participants that
incorporate BSIMM’s
12 core activities
into their SSI 64
100Percent of BSIMM participants that have an SSG and
agree that it’s key to the success of their initiative
10
Average point increase
seen in the raw
scores of the
26 firms
re-measured
131
100
Percent of the 10
lowest-scoring
firms that have
a satellite
Percent of the 10
highest-scoring
firms that have
a satellite
www.BSIMM.com
Total number
of firms studied
by BSIMM.
Copyright © 2015 Cigital, Inc
âś”
1047

More Related Content

PDF
Accenture 2015 North American Insurance Risk Management Study Infographic
PPTX
The Fiction behind IT Security Confidence
PPT
How to Connect Your Server Room to the Board Room – Before a Data Breach Occurs
PPTX
Ernst & Young visuals security survey 2012
PPTX
Data security risks and the cost of business continuity (slideshare) tmcs q...
 
PDF
7 Safety Insights from Industrial Business Leaders
PDF
The Cyber Security Leap
PPTX
Raising your game in behavioural safety
 
Accenture 2015 North American Insurance Risk Management Study Infographic
The Fiction behind IT Security Confidence
How to Connect Your Server Room to the Board Room – Before a Data Breach Occurs
Ernst & Young visuals security survey 2012
Data security risks and the cost of business continuity (slideshare) tmcs q...
 
7 Safety Insights from Industrial Business Leaders
The Cyber Security Leap
Raising your game in behavioural safety
 

Viewers also liked (7)

PDF
Get Your Board to Say "Yes" to a BSIMM Assessment
PPTX
Software Security Initiative Capabilities: Where Do I Begin?
PDF
The Path to Proactive Application Security
PPTX
Video Game Security
PPTX
Software Security Metrics
PPTX
Cyber War, Cyber Peace, Stones, and Glass Houses
PPTX
Static Analysis Tools and Frameworks: Overcoming a Dangerous Blind Spot
Get Your Board to Say "Yes" to a BSIMM Assessment
Software Security Initiative Capabilities: Where Do I Begin?
The Path to Proactive Application Security
Video Game Security
Software Security Metrics
Cyber War, Cyber Peace, Stones, and Glass Houses
Static Analysis Tools and Frameworks: Overcoming a Dangerous Blind Spot
Ad

More from Cigital (13)

PDF
7 Lessons Learned From BSIMM
PPTX
Secure Design: Threat Modeling
PDF
Getting Executive Support for a Software Security Program
PPTX
Handle With Care: You Have My VA Report!
PPTX
Can You Really Automate Yourself Secure
PPTX
How to Choose the Right Security Training for You
PPTX
6 Most Common Threat Modeling Misconceptions
PDF
The Complete Web Application Security Testing Checklist
PDF
SAST vs. DAST: What’s the Best Method For Application Security Testing?
PPTX
BSIMM: Bringing Science to Software Security
PPTX
BSIMM-V: The Building Security In Maturity Model
PPT
5 Models for Enterprise Software Security Management Teams
PPT
How to Avoid the Top Ten Software Security Flaws
7 Lessons Learned From BSIMM
Secure Design: Threat Modeling
Getting Executive Support for a Software Security Program
Handle With Care: You Have My VA Report!
Can You Really Automate Yourself Secure
How to Choose the Right Security Training for You
6 Most Common Threat Modeling Misconceptions
The Complete Web Application Security Testing Checklist
SAST vs. DAST: What’s the Best Method For Application Security Testing?
BSIMM: Bringing Science to Software Security
BSIMM-V: The Building Security In Maturity Model
5 Models for Enterprise Software Security Management Teams
How to Avoid the Top Ten Software Security Flaws
Ad

Recently uploaded (20)

PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
PDF
Audit Checklist Design Aligning with ISO, IATF, and Industry Standards — Omne...
PDF
Design an Analysis of Algorithms II-SECS-1021-03
PDF
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
PDF
top salesforce developer skills in 2025.pdf
PPTX
CHAPTER 12 - CYBER SECURITY AND FUTURE SKILLS (1) (1).pptx
PPTX
Odoo POS Development Services by CandidRoot Solutions
PDF
Digital Strategies for Manufacturing Companies
PDF
Flood Susceptibility Mapping Using Image-Based 2D-CNN Deep Learnin. Overview ...
PPTX
Operating system designcfffgfgggggggvggggggggg
PPTX
VVF-Customer-Presentation2025-Ver1.9.pptx
PPTX
Introduction to Artificial Intelligence
PPTX
CHAPTER 2 - PM Management and IT Context
PDF
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
PDF
System and Network Administration Chapter 2
PDF
Design an Analysis of Algorithms I-SECS-1021-03
PDF
Nekopoi APK 2025 free lastest update
PPTX
history of c programming in notes for students .pptx
PPTX
Lecture 3: Operating Systems Introduction to Computer Hardware Systems
 
PDF
Softaken Excel to vCard Converter Software.pdf
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
Audit Checklist Design Aligning with ISO, IATF, and Industry Standards — Omne...
Design an Analysis of Algorithms II-SECS-1021-03
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
top salesforce developer skills in 2025.pdf
CHAPTER 12 - CYBER SECURITY AND FUTURE SKILLS (1) (1).pptx
Odoo POS Development Services by CandidRoot Solutions
Digital Strategies for Manufacturing Companies
Flood Susceptibility Mapping Using Image-Based 2D-CNN Deep Learnin. Overview ...
Operating system designcfffgfgggggggvggggggggg
VVF-Customer-Presentation2025-Ver1.9.pptx
Introduction to Artificial Intelligence
CHAPTER 2 - PM Management and IT Context
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
System and Network Administration Chapter 2
Design an Analysis of Algorithms I-SECS-1021-03
Nekopoi APK 2025 free lastest update
history of c programming in notes for students .pptx
Lecture 3: Operating Systems Introduction to Computer Hardware Systems
 
Softaken Excel to vCard Converter Software.pdf

BSIMM By The Numbers

  • 1. Number of software security activities measured by the BSIMM BSIMM 0 112 1:75 Numbersby the Number of years BSIMM has been around (started in 2008) Average number of people in a satellite 13.9 Average number of people in an SSG Average ratio of SSG members to developers Percent of BSIMM participants that incorporate BSIMM’s 12 core activities into their SSI 64 100Percent of BSIMM participants that have an SSG and agree that it’s key to the success of their initiative 10 Average point increase seen in the raw scores of the 26 firms re-measured 131 100 Percent of the 10 lowest-scoring firms that have a satellite Percent of the 10 highest-scoring firms that have a satellite www.BSIMM.com Total number of firms studied by BSIMM. Copyright © 2015 Cigital, Inc âś” 1047