SlideShare a Scribd company logo
SECURE CRYPTO, EVERYWHERE.
2
Cryptography is the essential technology for the
security of the distributed, open IT networks
needed for modern business.
ATMs
Payment
Terminals
Internet
of things
Blockchain
Mobile
Cloud
?
3
Crypto is fragile: a tiny defect can result in complete
loss of security and a massive data breach.
4
of crypto bugs are in applications, not in cryptographic
library code*
crypto misuse vulnerabilities added to the Mitre CVE
database 2013 - 20151806
83%
of crypto flaws cannot be detected by the best
performing static analysis tool**98.3%
* Lazar et al, Why does Cryptographic software fail? APSys ’14
** 2013 NIST SATE Evaluation
5
Cryptosense helps enterprise security teams to:
1.	Discover crypto use in their IT infrastructure
2.	Analyse its security
3.	Fix any errors found
4.	Automate audit reports
5.	Monitor ongoing security
6
!=
!=
!
Application
CryptoLibrary
1. Tracing 2. Analysis* 3. Remediation*
* Either on-premise or in the cloud as SAAS
Our Analyzer tool works by tracing all calls from an application to its crypto library at
run time, then analyzing these with our proprietary algorithms to detect flaws.
7
Crypto Analysis Report
Risks
Each rule has
detailed risk
assessment
information.
Failed Rules
Click on a rule for
more information
on risks and to see
the instances.
Debug View
Links to
stacktraces to
identify where in
the application
the weaknesses
are.Instances
Specific cases of
failed rules. Can be
shared, dismissed,
and starred.
Categories
Easily view rules for
each category type.
DEMO
8
SAST
e.g. Fortify, Veracode
What existing tools cover...
...what Cryptosense covers.
Transport protocol configuration
Key management flaws
Insecure credential storage
Application-level
protocol attacks
Weak Algorithms and Block Modes
Weak randomness
Bad nonce management
Mis-configured crypto in
libraries & frameworks
Insecure interactions
DAST
e.g. SSL Labs, Appscan
Poor data-at-rest protection
9
testmycrypto.com
Try it for yourself
10
Current clients
ABOUT
Funding bodies
Prizes
Academic spin-off
(2013)
»» 3 of top 5 European Banks
»» 2 SIFIs (Financial Services Infrastructure Providers)
»» US and French government agencies
Global Finalist
Future of Finance 2015
Winner
Graham Steel, PhD
CEO & Founder
11
Richard HornePhilippe LangloisRicardo FocardiGraham Steel
Cryptosense is based in Paris where we profit from a talented
pool of French-educated engineers.
Co-founder of Qualys, CEO
and founder of P1 Security
Partner Cyber-Security PWC,
Ex Director of Cyber Security
at Barclays Bank
Founders & Advisors
CEO Chief Scientist Advisor Advisor
World-renowned applied
crypto researcher
Prof at University of Venice
in Formal Analysis of Crypto

More Related Content

PDF
How To Avoid The Top Ten Software Security Flaws
PDF
Intelligent Application Security
PDF
Wireless Infusion Pumps: Securing Hospitals’ Most Ubiquitous Medical Device
PDF
Mapping the EventBot Mobile Banking Trojan with MITRE ATTACK for Mobile
PPTX
Decision criteria and analysis for hardware-based encryption
PDF
Introduction and a Look at Security Trends
PDF
Cylance Information Security: Compromise Assessment Datasheet
PDF
Reveelium Smart Predictive Analytics - Datasheet EN
How To Avoid The Top Ten Software Security Flaws
Intelligent Application Security
Wireless Infusion Pumps: Securing Hospitals’ Most Ubiquitous Medical Device
Mapping the EventBot Mobile Banking Trojan with MITRE ATTACK for Mobile
Decision criteria and analysis for hardware-based encryption
Introduction and a Look at Security Trends
Cylance Information Security: Compromise Assessment Datasheet
Reveelium Smart Predictive Analytics - Datasheet EN

What's hot (20)

PDF
Cylance Protect-Next-Generation Antivirus-Overview
PDF
Implementing An Automated Incident Response Architecture
PPTX
Ethical hacking
PDF
The Seven Most Dangerous New Attack Techniques, and What's Coming Next
PDF
State of Cybersecurity: 2016 Findings and Implications
PDF
AI vs. AI: Can Predictive Models Stop the Tide of Hacker AI?
PDF
Building a Next-Generation Security Operations Center (SOC)
PPTX
Ntxissacsc5 purple 3-cyber insurance essentials-shawn_tuma.pptx
DOCX
Surelog Intelligence
PDF
Evidence-Based Security: The New Top Five Controls
PDF
Advanced Endpoint Protection
PPTX
Protecting application delivery without network security blind spots
PDF
It's just a jump to the left (of boom): Prioritizing detection implementation...
PDF
5 must-have security testing tools for your pentesting tasks
PPTX
Effective Security Operation Center - present by Reza Adineh
PDF
IDC Security 2014, Endpoint Security in Depth
PPTX
Anatomy of an Attack - Sophos Day Belux 2014
PPTX
OWASP Nagpur Meet #4
PPTX
Review on Event Correlation- مروری بر روش های همبسته سازی در مدیریت رخداد
PDF
MITRE ATT&CKcon 2018: Summiting the Pyramid of Pain: Operationalizing ATT&CK,...
Cylance Protect-Next-Generation Antivirus-Overview
Implementing An Automated Incident Response Architecture
Ethical hacking
The Seven Most Dangerous New Attack Techniques, and What's Coming Next
State of Cybersecurity: 2016 Findings and Implications
AI vs. AI: Can Predictive Models Stop the Tide of Hacker AI?
Building a Next-Generation Security Operations Center (SOC)
Ntxissacsc5 purple 3-cyber insurance essentials-shawn_tuma.pptx
Surelog Intelligence
Evidence-Based Security: The New Top Five Controls
Advanced Endpoint Protection
Protecting application delivery without network security blind spots
It's just a jump to the left (of boom): Prioritizing detection implementation...
5 must-have security testing tools for your pentesting tasks
Effective Security Operation Center - present by Reza Adineh
IDC Security 2014, Endpoint Security in Depth
Anatomy of an Attack - Sophos Day Belux 2014
OWASP Nagpur Meet #4
Review on Event Correlation- مروری بر روش های همبسته سازی در مدیریت رخداد
MITRE ATT&CKcon 2018: Summiting the Pyramid of Pain: Operationalizing ATT&CK,...
Ad

Viewers also liked (16)

PPTX
Why Just Making Great Games Is Not Enough | Anders Lykke
PPTX
Blueberray Project - SparksDrone - EN
PPTX
Sedicii Introduction
PDF
Faclon Labs
PDF
Introducing Buddy: Your emotional assistant
PDF
Hackmania Pitch Deck
PDF
Preksh ir50
PDF
GetShift - IoT Devices Done Right.
PPTX
The Lucky Iron Fish: Based on Science Built on Values
PDF
Presentation PickMeApp
PDF
Eticca Compliance - Institutional Presentation
PPT
Leopetra brief product deck
PDF
Scedule pitch deck short
PDF
DragonBill deck for Innovators Race 50.
PDF
The Virtual Insurance Agent that sells push based contextual microinsurance
PPTX
Innovators race50 qlez
Why Just Making Great Games Is Not Enough | Anders Lykke
Blueberray Project - SparksDrone - EN
Sedicii Introduction
Faclon Labs
Introducing Buddy: Your emotional assistant
Hackmania Pitch Deck
Preksh ir50
GetShift - IoT Devices Done Right.
The Lucky Iron Fish: Based on Science Built on Values
Presentation PickMeApp
Eticca Compliance - Institutional Presentation
Leopetra brief product deck
Scedule pitch deck short
DragonBill deck for Innovators Race 50.
The Virtual Insurance Agent that sells push based contextual microinsurance
Innovators race50 qlez
Ad

Similar to Cap gemini pitch (20)

PDF
Why Organisations Need_Barac
PDF
Cyber Defense Automation
PPTX
Security Architecture for Cyber Physical Systems
PDF
CODE INSPECTION VIMRO 2015 MHF
PDF
INTERVIEW QUESTION FOR IT AUDITOR
PDF
Asegurarme de la Seguridad?, Un Vistazo al Penetration Testing
PDF
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
PDF
TechWiseTV Workshop: Encrypted Traffic Analytics
PPTX
Appsec2013 assurance tagging-robert martin
PDF
CompTIA Security+
PDF
Top Interview Questions to Master as a CompTIA Security+ Certified Profession...
PDF
Top Interview Questions for CompTIA Security +
DOCX
Running Head Security Assessment Repot (SAR) .docx
PDF
Adversary Emulation - Red Team Village - Mayhem 2020
PPTX
Presentation_SOC.pptx
PDF
Aujas incident management webinar deck 08162016
PPTX
Security engineering 101 when good design & security work together
PDF
Top 10 Essential Ethical Hacker Tools Everyone Should Know.pdf
PDF
ITCamp 2018 - Tobiasz Koprowski - SECDEV(OPS). How to Brace Your IT Security.
PDF
01_Metasploit - The Elixir of Network Security
Why Organisations Need_Barac
Cyber Defense Automation
Security Architecture for Cyber Physical Systems
CODE INSPECTION VIMRO 2015 MHF
INTERVIEW QUESTION FOR IT AUDITOR
Asegurarme de la Seguridad?, Un Vistazo al Penetration Testing
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
TechWiseTV Workshop: Encrypted Traffic Analytics
Appsec2013 assurance tagging-robert martin
CompTIA Security+
Top Interview Questions to Master as a CompTIA Security+ Certified Profession...
Top Interview Questions for CompTIA Security +
Running Head Security Assessment Repot (SAR) .docx
Adversary Emulation - Red Team Village - Mayhem 2020
Presentation_SOC.pptx
Aujas incident management webinar deck 08162016
Security engineering 101 when good design & security work together
Top 10 Essential Ethical Hacker Tools Everyone Should Know.pdf
ITCamp 2018 - Tobiasz Koprowski - SECDEV(OPS). How to Brace Your IT Security.
01_Metasploit - The Elixir of Network Security

Recently uploaded (20)

PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Modernizing your data center with Dell and AMD
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
DOCX
The AUB Centre for AI in Media Proposal.docx
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPTX
Big Data Technologies - Introduction.pptx
PDF
Empathic Computing: Creating Shared Understanding
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Electronic commerce courselecture one. Pdf
PDF
Approach and Philosophy of On baking technology
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
Cloud computing and distributed systems.
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Spectral efficient network and resource selection model in 5G networks
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Modernizing your data center with Dell and AMD
Per capita expenditure prediction using model stacking based on satellite ima...
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Reach Out and Touch Someone: Haptics and Empathic Computing
The AUB Centre for AI in Media Proposal.docx
“AI and Expert System Decision Support & Business Intelligence Systems”
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Big Data Technologies - Introduction.pptx
Empathic Computing: Creating Shared Understanding
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Digital-Transformation-Roadmap-for-Companies.pptx
20250228 LYD VKU AI Blended-Learning.pptx
Electronic commerce courselecture one. Pdf
Approach and Philosophy of On baking technology
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Cloud computing and distributed systems.

Cap gemini pitch

  • 2. 2 Cryptography is the essential technology for the security of the distributed, open IT networks needed for modern business. ATMs Payment Terminals Internet of things Blockchain Mobile Cloud ?
  • 3. 3 Crypto is fragile: a tiny defect can result in complete loss of security and a massive data breach.
  • 4. 4 of crypto bugs are in applications, not in cryptographic library code* crypto misuse vulnerabilities added to the Mitre CVE database 2013 - 20151806 83% of crypto flaws cannot be detected by the best performing static analysis tool**98.3% * Lazar et al, Why does Cryptographic software fail? APSys ’14 ** 2013 NIST SATE Evaluation
  • 5. 5 Cryptosense helps enterprise security teams to: 1. Discover crypto use in their IT infrastructure 2. Analyse its security 3. Fix any errors found 4. Automate audit reports 5. Monitor ongoing security
  • 6. 6 != != ! Application CryptoLibrary 1. Tracing 2. Analysis* 3. Remediation* * Either on-premise or in the cloud as SAAS Our Analyzer tool works by tracing all calls from an application to its crypto library at run time, then analyzing these with our proprietary algorithms to detect flaws.
  • 7. 7 Crypto Analysis Report Risks Each rule has detailed risk assessment information. Failed Rules Click on a rule for more information on risks and to see the instances. Debug View Links to stacktraces to identify where in the application the weaknesses are.Instances Specific cases of failed rules. Can be shared, dismissed, and starred. Categories Easily view rules for each category type. DEMO
  • 8. 8 SAST e.g. Fortify, Veracode What existing tools cover... ...what Cryptosense covers. Transport protocol configuration Key management flaws Insecure credential storage Application-level protocol attacks Weak Algorithms and Block Modes Weak randomness Bad nonce management Mis-configured crypto in libraries & frameworks Insecure interactions DAST e.g. SSL Labs, Appscan Poor data-at-rest protection
  • 10. 10 Current clients ABOUT Funding bodies Prizes Academic spin-off (2013) »» 3 of top 5 European Banks »» 2 SIFIs (Financial Services Infrastructure Providers) »» US and French government agencies Global Finalist Future of Finance 2015 Winner Graham Steel, PhD CEO & Founder
  • 11. 11 Richard HornePhilippe LangloisRicardo FocardiGraham Steel Cryptosense is based in Paris where we profit from a talented pool of French-educated engineers. Co-founder of Qualys, CEO and founder of P1 Security Partner Cyber-Security PWC, Ex Director of Cyber Security at Barclays Bank Founders & Advisors CEO Chief Scientist Advisor Advisor World-renowned applied crypto researcher Prof at University of Venice in Formal Analysis of Crypto