SlideShare a Scribd company logo
DISCOVER 2015
1-3 December, London
Improve the security of your application portfolio
in a few days with on-demand testing services
London, December 2, Yves Le Floch
2Copyright © 2015 Capgemini and Sogeti. All Rights Reserved
Improve the security of your application portfolio | December 2nd, 2015
Capgemini positioning
3Copyright © 2015 Capgemini and Sogeti. All Rights Reserved
Improve the security of your application portfolio | December 2nd, 2015
Cybersecurity services portfolio
4Copyright © 2015 Capgemini and Sogeti. All Rights Reserved
Improve the security of your application portfolio | December 2nd, 2015
Capgemini Cybersecurity video
5Copyright © 2015 Capgemini and Sogeti. All Rights Reserved
Improve the security of your application portfolio | December 2nd, 2015
Improve the security of your applications
! The World Quality Report: Application Security Findings
! Application security: the next challenge
! Best Practice: a secure software development lifecycle
! Application Security Testing as a Service
! Platform demonstration
! Questions & Answers
The World Quality Report: Application Security Findings
7Copyright © 2015 Capgemini and Sogeti. All Rights Reserved
Improve the security of your application portfolio | December 2nd, 2015
The World Quality Report 2015-16
Companysize:1,000–
4,999,5,000–10,000
and10,000+
Controlledmix ofCIOs,
ITDirectors,VP
Applications/QA,Testing
ManagerandCDO/CMO
Seenextslidefor
detailedsplits
1560interviews
CATI25%(390)
CAWI75%(1170) Globalstudy
April– June2015
Allinterviews
conductedabidedby
therulesand
regulationssetbythe
MRS
How
When
Where
Who
What
Studydetails
8Copyright © 2015 Capgemini and Sogeti. All Rights Reserved
Improve the security of your application portfolio | December 2nd, 2015
The Top 5 most important aspects of your IT strategy
9Copyright © 2015 Capgemini and Sogeti. All Rights Reserved
Improve the security of your application portfolio | December 2nd, 2015
Focus areas for IT Strategy
10Copyright © 2015 Capgemini and Sogeti. All Rights Reserved
Improve the security of your application portfolio | December 2nd, 2015
Commonly performed security testing activities
11Copyright © 2015 Capgemini and Sogeti. All Rights Reserved
Improve the security of your application portfolio | December 2nd, 2015
The Top 5 most important aspects of your IT strategy
12Copyright © 2015 Capgemini and Sogeti. All Rights Reserved
Improve the security of your application portfolio | December 2nd, 2015
In what stage of Application Lifecycle is security testing undertaken?
Application security: the next challenge
14Copyright © 2015 Capgemini and Sogeti. All Rights Reserved
Improve the security of your application portfolio | December 2nd, 2015
Giant data breaches!
15Copyright © 2015 Capgemini and Sogeti. All Rights Reserved
Improve the security of your application portfolio | December 2nd, 2015
What is the challenge enterprises are facing?
68%
increase in mobile
application
vulnerability
disclosures
5
Infrastructure security
is rather mature,
when application security
is rather new
16Copyright © 2015 Capgemini and Sogeti. All Rights Reserved
Improve the security of your application portfolio | December 2nd, 2015
How to measure the issue?
17Copyright © 2015 Capgemini and Sogeti. All Rights Reserved
Improve the security of your application portfolio | December 2nd, 2015
The Top 10 Application security risks
18Copyright © 2015 Capgemini and Sogeti. All Rights Reserved
Improve the security of your application portfolio | December 2nd, 2015
The current state of security
Organizations are under increased pressure to develop new applications to support
digital transformation – whether internal or external facing
!  Applications delivered quickly, focus on ergonomics and little focus on governance
!  Many incorporate sensitiv<e data that can be breached, should any vulnerability be left
!  Do you know how many applications your organization has? How many critical applications?
Security checks left to the end of the development lifecycle (penetration testing)
!  Penetration testing is no longer enough: too little too late
!  Too expensive to perform pentests or manual code reviews at each releases
!  Much less costly to fix security issues before the application is deployed (i.e. in QA/integration)
Network and infrastructure security testing now widely covered, but lack of maturity at the
application level
!  Lack of a formal & systematic process to prevent vulnerabilities before the breach
•  Hackers know that : 80%+ of breaches happen at application level
19Copyright © 2015 Capgemini and Sogeti. All Rights Reserved
Improve the security of your application portfolio | December 2nd, 2015
What does a good approach look like?
! Supports your digital transformation
! Proactive instead of reactive
! Includes:
• Building security into the development process
• Comprehensive testing: automated scanning,
expert assessment and penetration testing
• Secure architecture & deployment
! Security issues are fixed before the application goes
into production
! Issues prioritised by risk and business criticality
! Cost effective
! Rapidly implemented
Best Practice: a secure software development lifecycle
21Copyright © 2015 Capgemini and Sogeti. All Rights Reserved
Improve the security of your application portfolio | December 2nd, 2015
Best Practice Approach: Overview
1. Discover 2. Patch 3. Security Gate 4. Shift-Left 5. Mature
1.  Identify the scope of the problem
2.  Fix the critical vulnerabilities in the high risk applications
3.  Establish a Security Gate
4.  Add security controls earlier in the Software Development Life-cycle
5.  Raise the security bar
22Copyright © 2015 Capgemini and Sogeti. All Rights Reserved
Improve the security of your application portfolio | December 2nd, 2015
Best Practice Approach: Discover
1. Discover
Create risk ranked inventory of on-line applications
•  Web, Facebook, mobile
•  In-house developed, out-sourced, third-party
•  Basic risk categorization
Assess sample of applications
•  Dynamic Application Security Testing
Establish the business case
•  Gain executive sponsorship
Don‘t wait for a breach!
23Copyright © 2015 Capgemini and Sogeti. All Rights Reserved
Improve the security of your application portfolio | December 2nd, 2015
Best Practice Approach: Patch
2. Patch
Reduce exposure to critical vulnerabilities in high risk applications
Complete assessment of high risk applications
–  Identify critical vulnerabilities
Remediate
–  Retire or replace application
–  Block with WAF/IPS
–  Work with development to fix
Commence Application Security Awareness program
These can’t wait!
24Copyright © 2015 Capgemini and Sogeti. All Rights Reserved
Improve the security of your application portfolio | December 2nd, 2015
Best Practice Approach: Security Gate
3. Security Gate
Define and Implement Policy
•  Application risk category specific
•  Update Internal Standards
•  Add to Vendor Contracts
Implement a Security Gate
•  Enforce policy for all new apps and major releases
•  Work through backlog by risk category
–  Advisory initially then enforce incrementally
Publicise Program
•  Publish KPI’s
•  Identify Security Champions
25Copyright © 2015 Capgemini and Sogeti. All Rights Reserved
Improve the security of your application portfolio | December 2nd, 2015
Best Practice Approach: Shift-Left
4. Shift-Left
Embed Static Application Security Testing in development process
•  In-house development teams
–  IDE Integration
–  Build Integration
–  Bug-tracking
•  Offer to key out-source suppliers and third-parties
Secure Development Training Program
•  Secure Development Guidelines
•  Mandatory Role-based training
26Copyright © 2015 Capgemini and Sogeti. All Rights Reserved
Improve the security of your application portfolio | December 2nd, 2015
Best Practice Approach: Mature
5. Mature
Raise Security Bar
•  E.g. Policy now includes addressing ‘medium’ rated vulnerabilities for high risk applications
Increase scope
•  Internal Applications
BSIMM assessment of SDLC
•  Identify and implement additional security controls
–  Threat Modelling
–  Security Architecture Review
Use metrics to drive continuous improvement
•  Add application security performance to vendor selection
Move cost of assessments to third-party vendors
27Copyright © 2015 Capgemini and Sogeti. All Rights Reserved
Improve the security of your application portfolio | December 2nd, 2015
Best Practice Approach: Summary
1. Discover 2. Patch 3. Security Gate 4. Shift-Left 5. Mature
1.  Identify the scope of the problem
•  Take advantage of automated discovery approach
2.  Fix the critical vulnerabilities in the high risk applications
•  Retire or block to minimize impact on development. Fix if you have to.
3.  Establish a Security Gate
•  Use cloud–based solution like Fortify on Demand for speed and scalability
4.  Add security controls earlier in the Software Development Life-cycle
•  Add SAST and role-based security training to your SDLC
5.  Raise the security bar
•  Use metrics to drive continuous improvement
Application Security Testing as a Service
29Copyright © 2015 Capgemini and Sogeti. All Rights Reserved
Improve the security of your application portfolio | December 2nd, 2015
An industrial Application Security Testing platform
30Copyright © 2015 Capgemini and Sogeti. All Rights Reserved
Improve the security of your application portfolio | December 2nd, 2015
Delivered by Capgemini/Sogeti, powered by Hewlett Packard Enterprise –
Combining the power of two market leaders
Capgemini - Sogeti recognized as a leader
for independent Testing Services
HP recognized as a leader by Gartner
for Application Security Testing
31Copyright © 2015 Capgemini and Sogeti. All Rights Reserved
Improve the security of your application portfolio | December 2nd, 2015
Combining manual/automated testing, static/dynamic testing, pentest
SAST - Static application security
testing:
Test is done on modules on the written code (not
running)
• Can be performed during of after development process, early in
the lifecycle, no server required
• Manual and automated analysis of the source, bytecode or
binary code
• Linked to code, provides useful and clear clues for remediation
• Integrate application security testing into Development / Quality
Assurance processes -> to be performed early in the process
DAST - Dynamic application security
testing:
Test is done on the running code, which is
challenged to reveal vulnerabilities
• Test the runtime application on integration or production
platform.
• Manual and automated analysis of the running application
• Can be performed only at the end of the development
process
• Results more difficult to exploit, but closer to a real attack
Code manual review
Expert analysis of the code
• Can be performed early in the lifecycle, no server required
• Linked to code, provides useful and clear clues for remediation
• Find all vulnerabilities with the right criticality analysis
• Expert intensive (expensive, difficult to scale, slow)
Penetration testing:
The ethical hacker performs a real hacking
• Very similar to what a real hacker would do
• Provides a good view of the operational risks
• Exploits vulnerabilities in order to demonstrate exploitability
• Alco covers servers and production vulnerabilities
• Late in the process
• Expert intensive (expensive, difficult to scale, slow)
32Copyright © 2015 Capgemini and Sogeti. All Rights Reserved
Improve the security of your application portfolio | December 2nd, 2015
Objective: an industrial Security testing capacity
Supported by best-in-classApplication security testing tools1
Maximizing the industrialapproach (reduceddelay and cost)2
Entirely managed/hosted by Sogetiin Europe forsecurity and trust reasons3
Offering on-line accessforclients (management,assessments,reports…)4
Allowing maximumadaptationto client risk and budgetpriorities5
Allowing Rightshore delivery upon clientrequestforimproved delay and cost6
Pay peruse: no investment,no license,no hardware,no expertise required7
33Copyright © 2015 Capgemini and Sogeti. All Rights Reserved
Improve the security of your application portfolio | December 2nd, 2015
Platform demonstration
34Copyright © 2015 Capgemini and Sogeti. All Rights Reserved
Improve the security of your application portfolio | December 2nd, 2015
Access to a leading tool and proven expertise
35Copyright © 2015 Capgemini and Sogeti. All Rights Reserved
Improve the security of your application portfolio | December 2nd, 2015
How it works
Customeruploadssoftware
or dynamic accessdata
directly on his portal
Upload
Dynamic,static and/ormobile
automatic testing
Scan
Expertreview and additional
tests to ensure minimalfalse
positives and falsenegatives
Review
36Copyright © 2015 Capgemini and Sogeti. All Rights Reserved
Improve the security of your application portfolio | December 2nd, 2015
The benefits
! Regularly checkedand updated by HP’s Security Researchteam who find four times the number of new critical
vulnerabilities than the rest of the market combined (Frost and Sullivan)
! Easy to purchase
Launchyour application
securityinitiative in < 1 day
! No hardware or software
investments
! No security experts to hire,
train and retain
Simple
Scale to test all sensitive
applicationsin your
organization
! From one-day turn-around on
applicationsecurity results
! Potentially support 1000sof
applicationsfor desktop,
mobile or cloud
! Dynamic and static testing
with manual review
Fast & Comprehensive
Test anyapplication
! Secure commercial, open
source and 3rd party
applications
! Test applications on demand
according to risk and budget
Flexible
37Copyright © 2015 Capgemini and Sogeti. All Rights Reserved
Improve the security of your application portfolio | December 2nd, 2015
Comprehensive and accurate testing
38Copyright © 2015 Capgemini and Sogeti. All Rights Reserved
Improve the security of your application portfolio | December 2nd, 2015
Multiple levels of testing based on application risk
Low Medium High
Basic
assessment
Standard
assessment
Premium
assessment
! Marketing Site ! Personally identifiable
information
! Business useful
! Credit card/ SSN
information
! Business critical
Questions & Answers
40Copyright © 2015 Capgemini and Sogeti. All Rights Reserved
Improve the security of your application portfolio | December 2nd, 2015
Contact information
Yves
Le Floch
VP, Head of CyberSecurity
Business Development
Sogeti
yves.le-floch@sogeti.com
+33 1 55 00 13 41
David
Harper
Fortify on Demand
Practice Principal, EMEA
Hewlett Packard Enterprise
david.harper@hpe.com
+44 751 528 5200
www.sogeti.com
www.capgemini.com
The information contained in this presentation is proprietary and confidential. It is for internal and intermediary use only.
Copyright © 2015 Capgemini and Sogeti. All rights reserved.
Rightshore® is a trademark belonging to Capgemini.
No part of this presentation may be modified, deleted or expanded by any process or means without prior written permission from Capgemini.
About Capgemini and Sogeti
Now with 180,000 people in over 40 countries, Capgemini is one of the world's
foremost providers of consulting, technology and outsourcing services. The Group
reported 2014 global revenues of EUR 10.573 billion. Together with its clients,
Capgemini creates and delivers business, technology and digital solutions that fit
their needs, enabling them to achieve innovation and competitiveness. A deeply
multicultural organization, Capgemini has developed its own way of working,
the Collaborative Business Experience™, and draws on Rightshore®, its worldwide
delivery model.
Sogeti is a leading provider of technology and software testing, specializing in
Application, Infrastructure and Engineering Services. Sogeti offers cutting-edge
solutions around Testing, Business Intelligence & Analytics, Mobile, Cloud and
Cyber Security. Sogeti brings together more than 20,000 professionals in 15
countries and has a strong local presence in over 100 locations in Europe, USA
and India. Sogeti is a wholly-owned subsidiary of Cap Gemini S.A., listed on the
Paris Stock Exchange.

More Related Content

PDF
PwC Point of View on Cybersecurity Management
PDF
Realizing your AIOps goals with machine learning in Elastic
PDF
Guidewire PaaS
PPTX
Softchoice Security Consolidation Survey Results
PDF
Unlocking the Power of RegTech
PDF
Enterprise mHealth Strategy 2019
PDF
6 Steps to Bringing a Security Offering to Market
PPTX
Intelligent Infrastructures: Unlocking the Digital Business
PwC Point of View on Cybersecurity Management
Realizing your AIOps goals with machine learning in Elastic
Guidewire PaaS
Softchoice Security Consolidation Survey Results
Unlocking the Power of RegTech
Enterprise mHealth Strategy 2019
6 Steps to Bringing a Security Offering to Market
Intelligent Infrastructures: Unlocking the Digital Business

What's hot (20)

PDF
2018 State of Cyber Resilience - New York
PPTX
Automotive Cybersecurity: Shifting into Overdrive
PDF
Technology Vision 2016 - Infographic
PPTX
Equinor: What does normal look like?
RTF
eGestalt Named a 2012 'Emerging Vendor' by CRN and UBM Channel
PPTX
CWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) plan
PDF
eGestalt Named a 2012 ‘Emerging Vendor’by CRN and UBM Channel
PPTX
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal
PDF
Integrated_Insights_Platform_web
PDF
Accenture Cloud Platform: Control, Manage and Govern the Enterprise Cloud
PPTX
Solving Your Top IT Challenges
PDF
Moving to unified PV: Transforming Safety with End-to-end PV Solutions
PDF
Securing the Internet of Things Opportunity: Putting Cybersecurity at the Hea...
PPTX
How to Make Your Enterprise Cyber Resilient
PDF
Complicate, detect, respond: stopping cyber attacks with identity analytics
PDF
Accenture Banking Security Index
PPTX
Digital Outlook: Healthcare Industry
PDF
From Cybersecurity to Cyber Resilience
PPTX
Virtual Gov Day - Security Breakout - Deloitte
PDF
PT on CF
2018 State of Cyber Resilience - New York
Automotive Cybersecurity: Shifting into Overdrive
Technology Vision 2016 - Infographic
Equinor: What does normal look like?
eGestalt Named a 2012 'Emerging Vendor' by CRN and UBM Channel
CWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) plan
eGestalt Named a 2012 ‘Emerging Vendor’by CRN and UBM Channel
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal
Integrated_Insights_Platform_web
Accenture Cloud Platform: Control, Manage and Govern the Enterprise Cloud
Solving Your Top IT Challenges
Moving to unified PV: Transforming Safety with End-to-end PV Solutions
Securing the Internet of Things Opportunity: Putting Cybersecurity at the Hea...
How to Make Your Enterprise Cyber Resilient
Complicate, detect, respond: stopping cyber attacks with identity analytics
Accenture Banking Security Index
Digital Outlook: Healthcare Industry
From Cybersecurity to Cyber Resilience
Virtual Gov Day - Security Breakout - Deloitte
PT on CF
Ad

Viewers also liked (20)

PPT
Get Ready for Web Application Security Testing
PPTX
Story Testing Approach for Enterprise Applications using Selenium Framework
PPTX
Next level of Appium
PPTX
Automate you Appium test like a pro!
PPTX
Gerrit is Getting Native with RPM, Deb and Docker
PPTX
Introduction to Bdd and cucumber
PDF
DevQA: make your testers happier with Groovy, Spock and Geb (Greach 2014)
PDF
Testing Microservices with a Citrus twist
PDF
Capybara testing
PPTX
Testing Java EE apps with Arquillian
PDF
Bdd (Behavior Driven Development)
PDF
Arquillian & Citrus
PPTX
Workshop calabash appium
PDF
Lunch and learn: Cucumber and Capybara
PPTX
Pruebas funcionales de Software
PPTX
Automated Acceptance Tests & Tool choice
PDF
Continuous integration using Jenkins and Sonar
PPTX
Sonar qube to impove code quality
PDF
Design First API's with RAML and SoapUI
PDF
Rspec and Capybara Intro Tutorial at RailsConf 2013
Get Ready for Web Application Security Testing
Story Testing Approach for Enterprise Applications using Selenium Framework
Next level of Appium
Automate you Appium test like a pro!
Gerrit is Getting Native with RPM, Deb and Docker
Introduction to Bdd and cucumber
DevQA: make your testers happier with Groovy, Spock and Geb (Greach 2014)
Testing Microservices with a Citrus twist
Capybara testing
Testing Java EE apps with Arquillian
Bdd (Behavior Driven Development)
Arquillian & Citrus
Workshop calabash appium
Lunch and learn: Cucumber and Capybara
Pruebas funcionales de Software
Automated Acceptance Tests & Tool choice
Continuous integration using Jenkins and Sonar
Sonar qube to impove code quality
Design First API's with RAML and SoapUI
Rspec and Capybara Intro Tutorial at RailsConf 2013
Ad

Similar to Improve the Security of Your Application Portfolio in a Few Days with On-Demand Testing Services (20)

PDF
Integrating IBM PureApplication System and IBM UrbanCode Deploy: A GE Capital...
PPTX
WeSecure Data Security Congres: 5 must haves to safe cloud enablement
PPTX
Automating Your Tools: How to Free Up Your Security Professionals for Actual ...
PDF
Structuring and Scaling an Application Security Program
PPTX
we45 SecDevOps Presentation - ISACA Chennai
PPTX
Protecting Mission-Critical Source Code from Application Security Vulnerabili...
PPTX
Developing Mobile Trust in Today's E-Privacy Landscape - Webinar 11/19/2015
PPTX
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
PPTX
Dual-Track Agile at Scale
PDF
Application Security Testing for a DevOps Mindset
PDF
DevOps – Don’t Be Left Behind
PDF
Delivering Enterprise Applications: Faster. Cheaper. Better
PPTX
Application Hackers Have A Handbook. Why Shouldn't You?
PDF
Infrastructure predictive monitoring with itoa jean louis baudoin, capgemini-...
PDF
Infrastructure predictive monitoring with itoa jean louis baudoin, capgemini-...
PPTX
Navigating agile automotive software development
PPTX
Mobile Security - 2015 Wrap-up and 2016 Predictions
PPTX
Outpost24 webinar - Protecting Cezanne HR’s cloud web application with contin...
PPTX
eFolder Partner Chat Webinar – "How We Minimized Risk": An eFolder and OpenDN...
PDF
HP Software Performance Tour 2014 - Enterprise Agility in the age of Applicat...
Integrating IBM PureApplication System and IBM UrbanCode Deploy: A GE Capital...
WeSecure Data Security Congres: 5 must haves to safe cloud enablement
Automating Your Tools: How to Free Up Your Security Professionals for Actual ...
Structuring and Scaling an Application Security Program
we45 SecDevOps Presentation - ISACA Chennai
Protecting Mission-Critical Source Code from Application Security Vulnerabili...
Developing Mobile Trust in Today's E-Privacy Landscape - Webinar 11/19/2015
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
Dual-Track Agile at Scale
Application Security Testing for a DevOps Mindset
DevOps – Don’t Be Left Behind
Delivering Enterprise Applications: Faster. Cheaper. Better
Application Hackers Have A Handbook. Why Shouldn't You?
Infrastructure predictive monitoring with itoa jean louis baudoin, capgemini-...
Infrastructure predictive monitoring with itoa jean louis baudoin, capgemini-...
Navigating agile automotive software development
Mobile Security - 2015 Wrap-up and 2016 Predictions
Outpost24 webinar - Protecting Cezanne HR’s cloud web application with contin...
eFolder Partner Chat Webinar – "How We Minimized Risk": An eFolder and OpenDN...
HP Software Performance Tour 2014 - Enterprise Agility in the age of Applicat...

More from Capgemini (20)

PPTX
Top Healthcare Trends 2022
PPTX
Top P&C Insurance Trends 2022
PPTX
Commercial Banking Trends book 2022
PPTX
Top Trends in Payments 2022
PPTX
Top Trends in Wealth Management 2022
PPTX
Retail Banking Trends book 2022
PPTX
Top Life Insurance Trends 2022
PPTX
キャップジェミニ、あなたの『RISE WITH SAP』のパートナーです
PPTX
Property & Casualty Insurance Top Trends 2021
PPTX
Life Insurance Top Trends 2021
PPTX
Top Trends in Commercial Banking: 2021
PPTX
Top Trends in Wealth Management: 2021
PPTX
Top Trends in Payments: 2021
PPTX
Health Insurance Top Trends 2021
PPTX
Top Trends in Retail Banking: 2021
PDF
Capgemini’s Connected Autonomous Planning
PPTX
Top Trends in Retail Banking: 2020
PPTX
Top Trends in Life Insurance: 2020
PPTX
Top Trends in Health Insurance: 2020
PPTX
Top Trends in Payments: 2020
Top Healthcare Trends 2022
Top P&C Insurance Trends 2022
Commercial Banking Trends book 2022
Top Trends in Payments 2022
Top Trends in Wealth Management 2022
Retail Banking Trends book 2022
Top Life Insurance Trends 2022
キャップジェミニ、あなたの『RISE WITH SAP』のパートナーです
Property & Casualty Insurance Top Trends 2021
Life Insurance Top Trends 2021
Top Trends in Commercial Banking: 2021
Top Trends in Wealth Management: 2021
Top Trends in Payments: 2021
Health Insurance Top Trends 2021
Top Trends in Retail Banking: 2021
Capgemini’s Connected Autonomous Planning
Top Trends in Retail Banking: 2020
Top Trends in Life Insurance: 2020
Top Trends in Health Insurance: 2020
Top Trends in Payments: 2020

Recently uploaded (20)

PDF
Approach and Philosophy of On baking technology
PDF
Network Security Unit 5.pdf for BCA BBA.
PPT
Teaching material agriculture food technology
PDF
Electronic commerce courselecture one. Pdf
PDF
Getting Started with Data Integration: FME Form 101
PDF
Accuracy of neural networks in brain wave diagnosis of schizophrenia
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
1. Introduction to Computer Programming.pptx
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PPTX
Spectroscopy.pptx food analysis technology
PPTX
Big Data Technologies - Introduction.pptx
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
A comparative analysis of optical character recognition models for extracting...
Approach and Philosophy of On baking technology
Network Security Unit 5.pdf for BCA BBA.
Teaching material agriculture food technology
Electronic commerce courselecture one. Pdf
Getting Started with Data Integration: FME Form 101
Accuracy of neural networks in brain wave diagnosis of schizophrenia
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Group 1 Presentation -Planning and Decision Making .pptx
Unlocking AI with Model Context Protocol (MCP)
1. Introduction to Computer Programming.pptx
MIND Revenue Release Quarter 2 2025 Press Release
Spectroscopy.pptx food analysis technology
Big Data Technologies - Introduction.pptx
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
“AI and Expert System Decision Support & Business Intelligence Systems”
Digital-Transformation-Roadmap-for-Companies.pptx
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
The Rise and Fall of 3GPP – Time for a Sabbatical?
A comparative analysis of optical character recognition models for extracting...

Improve the Security of Your Application Portfolio in a Few Days with On-Demand Testing Services

  • 1. DISCOVER 2015 1-3 December, London Improve the security of your application portfolio in a few days with on-demand testing services London, December 2, Yves Le Floch
  • 2. 2Copyright © 2015 Capgemini and Sogeti. All Rights Reserved Improve the security of your application portfolio | December 2nd, 2015 Capgemini positioning
  • 3. 3Copyright © 2015 Capgemini and Sogeti. All Rights Reserved Improve the security of your application portfolio | December 2nd, 2015 Cybersecurity services portfolio
  • 4. 4Copyright © 2015 Capgemini and Sogeti. All Rights Reserved Improve the security of your application portfolio | December 2nd, 2015 Capgemini Cybersecurity video
  • 5. 5Copyright © 2015 Capgemini and Sogeti. All Rights Reserved Improve the security of your application portfolio | December 2nd, 2015 Improve the security of your applications ! The World Quality Report: Application Security Findings ! Application security: the next challenge ! Best Practice: a secure software development lifecycle ! Application Security Testing as a Service ! Platform demonstration ! Questions & Answers
  • 6. The World Quality Report: Application Security Findings
  • 7. 7Copyright © 2015 Capgemini and Sogeti. All Rights Reserved Improve the security of your application portfolio | December 2nd, 2015 The World Quality Report 2015-16 Companysize:1,000– 4,999,5,000–10,000 and10,000+ Controlledmix ofCIOs, ITDirectors,VP Applications/QA,Testing ManagerandCDO/CMO Seenextslidefor detailedsplits 1560interviews CATI25%(390) CAWI75%(1170) Globalstudy April– June2015 Allinterviews conductedabidedby therulesand regulationssetbythe MRS How When Where Who What Studydetails
  • 8. 8Copyright © 2015 Capgemini and Sogeti. All Rights Reserved Improve the security of your application portfolio | December 2nd, 2015 The Top 5 most important aspects of your IT strategy
  • 9. 9Copyright © 2015 Capgemini and Sogeti. All Rights Reserved Improve the security of your application portfolio | December 2nd, 2015 Focus areas for IT Strategy
  • 10. 10Copyright © 2015 Capgemini and Sogeti. All Rights Reserved Improve the security of your application portfolio | December 2nd, 2015 Commonly performed security testing activities
  • 11. 11Copyright © 2015 Capgemini and Sogeti. All Rights Reserved Improve the security of your application portfolio | December 2nd, 2015 The Top 5 most important aspects of your IT strategy
  • 12. 12Copyright © 2015 Capgemini and Sogeti. All Rights Reserved Improve the security of your application portfolio | December 2nd, 2015 In what stage of Application Lifecycle is security testing undertaken?
  • 13. Application security: the next challenge
  • 14. 14Copyright © 2015 Capgemini and Sogeti. All Rights Reserved Improve the security of your application portfolio | December 2nd, 2015 Giant data breaches!
  • 15. 15Copyright © 2015 Capgemini and Sogeti. All Rights Reserved Improve the security of your application portfolio | December 2nd, 2015 What is the challenge enterprises are facing? 68% increase in mobile application vulnerability disclosures 5 Infrastructure security is rather mature, when application security is rather new
  • 16. 16Copyright © 2015 Capgemini and Sogeti. All Rights Reserved Improve the security of your application portfolio | December 2nd, 2015 How to measure the issue?
  • 17. 17Copyright © 2015 Capgemini and Sogeti. All Rights Reserved Improve the security of your application portfolio | December 2nd, 2015 The Top 10 Application security risks
  • 18. 18Copyright © 2015 Capgemini and Sogeti. All Rights Reserved Improve the security of your application portfolio | December 2nd, 2015 The current state of security Organizations are under increased pressure to develop new applications to support digital transformation – whether internal or external facing !  Applications delivered quickly, focus on ergonomics and little focus on governance !  Many incorporate sensitiv<e data that can be breached, should any vulnerability be left !  Do you know how many applications your organization has? How many critical applications? Security checks left to the end of the development lifecycle (penetration testing) !  Penetration testing is no longer enough: too little too late !  Too expensive to perform pentests or manual code reviews at each releases !  Much less costly to fix security issues before the application is deployed (i.e. in QA/integration) Network and infrastructure security testing now widely covered, but lack of maturity at the application level !  Lack of a formal & systematic process to prevent vulnerabilities before the breach •  Hackers know that : 80%+ of breaches happen at application level
  • 19. 19Copyright © 2015 Capgemini and Sogeti. All Rights Reserved Improve the security of your application portfolio | December 2nd, 2015 What does a good approach look like? ! Supports your digital transformation ! Proactive instead of reactive ! Includes: • Building security into the development process • Comprehensive testing: automated scanning, expert assessment and penetration testing • Secure architecture & deployment ! Security issues are fixed before the application goes into production ! Issues prioritised by risk and business criticality ! Cost effective ! Rapidly implemented
  • 20. Best Practice: a secure software development lifecycle
  • 21. 21Copyright © 2015 Capgemini and Sogeti. All Rights Reserved Improve the security of your application portfolio | December 2nd, 2015 Best Practice Approach: Overview 1. Discover 2. Patch 3. Security Gate 4. Shift-Left 5. Mature 1.  Identify the scope of the problem 2.  Fix the critical vulnerabilities in the high risk applications 3.  Establish a Security Gate 4.  Add security controls earlier in the Software Development Life-cycle 5.  Raise the security bar
  • 22. 22Copyright © 2015 Capgemini and Sogeti. All Rights Reserved Improve the security of your application portfolio | December 2nd, 2015 Best Practice Approach: Discover 1. Discover Create risk ranked inventory of on-line applications •  Web, Facebook, mobile •  In-house developed, out-sourced, third-party •  Basic risk categorization Assess sample of applications •  Dynamic Application Security Testing Establish the business case •  Gain executive sponsorship Don‘t wait for a breach!
  • 23. 23Copyright © 2015 Capgemini and Sogeti. All Rights Reserved Improve the security of your application portfolio | December 2nd, 2015 Best Practice Approach: Patch 2. Patch Reduce exposure to critical vulnerabilities in high risk applications Complete assessment of high risk applications –  Identify critical vulnerabilities Remediate –  Retire or replace application –  Block with WAF/IPS –  Work with development to fix Commence Application Security Awareness program These can’t wait!
  • 24. 24Copyright © 2015 Capgemini and Sogeti. All Rights Reserved Improve the security of your application portfolio | December 2nd, 2015 Best Practice Approach: Security Gate 3. Security Gate Define and Implement Policy •  Application risk category specific •  Update Internal Standards •  Add to Vendor Contracts Implement a Security Gate •  Enforce policy for all new apps and major releases •  Work through backlog by risk category –  Advisory initially then enforce incrementally Publicise Program •  Publish KPI’s •  Identify Security Champions
  • 25. 25Copyright © 2015 Capgemini and Sogeti. All Rights Reserved Improve the security of your application portfolio | December 2nd, 2015 Best Practice Approach: Shift-Left 4. Shift-Left Embed Static Application Security Testing in development process •  In-house development teams –  IDE Integration –  Build Integration –  Bug-tracking •  Offer to key out-source suppliers and third-parties Secure Development Training Program •  Secure Development Guidelines •  Mandatory Role-based training
  • 26. 26Copyright © 2015 Capgemini and Sogeti. All Rights Reserved Improve the security of your application portfolio | December 2nd, 2015 Best Practice Approach: Mature 5. Mature Raise Security Bar •  E.g. Policy now includes addressing ‘medium’ rated vulnerabilities for high risk applications Increase scope •  Internal Applications BSIMM assessment of SDLC •  Identify and implement additional security controls –  Threat Modelling –  Security Architecture Review Use metrics to drive continuous improvement •  Add application security performance to vendor selection Move cost of assessments to third-party vendors
  • 27. 27Copyright © 2015 Capgemini and Sogeti. All Rights Reserved Improve the security of your application portfolio | December 2nd, 2015 Best Practice Approach: Summary 1. Discover 2. Patch 3. Security Gate 4. Shift-Left 5. Mature 1.  Identify the scope of the problem •  Take advantage of automated discovery approach 2.  Fix the critical vulnerabilities in the high risk applications •  Retire or block to minimize impact on development. Fix if you have to. 3.  Establish a Security Gate •  Use cloud–based solution like Fortify on Demand for speed and scalability 4.  Add security controls earlier in the Software Development Life-cycle •  Add SAST and role-based security training to your SDLC 5.  Raise the security bar •  Use metrics to drive continuous improvement
  • 29. 29Copyright © 2015 Capgemini and Sogeti. All Rights Reserved Improve the security of your application portfolio | December 2nd, 2015 An industrial Application Security Testing platform
  • 30. 30Copyright © 2015 Capgemini and Sogeti. All Rights Reserved Improve the security of your application portfolio | December 2nd, 2015 Delivered by Capgemini/Sogeti, powered by Hewlett Packard Enterprise – Combining the power of two market leaders Capgemini - Sogeti recognized as a leader for independent Testing Services HP recognized as a leader by Gartner for Application Security Testing
  • 31. 31Copyright © 2015 Capgemini and Sogeti. All Rights Reserved Improve the security of your application portfolio | December 2nd, 2015 Combining manual/automated testing, static/dynamic testing, pentest SAST - Static application security testing: Test is done on modules on the written code (not running) • Can be performed during of after development process, early in the lifecycle, no server required • Manual and automated analysis of the source, bytecode or binary code • Linked to code, provides useful and clear clues for remediation • Integrate application security testing into Development / Quality Assurance processes -> to be performed early in the process DAST - Dynamic application security testing: Test is done on the running code, which is challenged to reveal vulnerabilities • Test the runtime application on integration or production platform. • Manual and automated analysis of the running application • Can be performed only at the end of the development process • Results more difficult to exploit, but closer to a real attack Code manual review Expert analysis of the code • Can be performed early in the lifecycle, no server required • Linked to code, provides useful and clear clues for remediation • Find all vulnerabilities with the right criticality analysis • Expert intensive (expensive, difficult to scale, slow) Penetration testing: The ethical hacker performs a real hacking • Very similar to what a real hacker would do • Provides a good view of the operational risks • Exploits vulnerabilities in order to demonstrate exploitability • Alco covers servers and production vulnerabilities • Late in the process • Expert intensive (expensive, difficult to scale, slow)
  • 32. 32Copyright © 2015 Capgemini and Sogeti. All Rights Reserved Improve the security of your application portfolio | December 2nd, 2015 Objective: an industrial Security testing capacity Supported by best-in-classApplication security testing tools1 Maximizing the industrialapproach (reduceddelay and cost)2 Entirely managed/hosted by Sogetiin Europe forsecurity and trust reasons3 Offering on-line accessforclients (management,assessments,reports…)4 Allowing maximumadaptationto client risk and budgetpriorities5 Allowing Rightshore delivery upon clientrequestforimproved delay and cost6 Pay peruse: no investment,no license,no hardware,no expertise required7
  • 33. 33Copyright © 2015 Capgemini and Sogeti. All Rights Reserved Improve the security of your application portfolio | December 2nd, 2015 Platform demonstration
  • 34. 34Copyright © 2015 Capgemini and Sogeti. All Rights Reserved Improve the security of your application portfolio | December 2nd, 2015 Access to a leading tool and proven expertise
  • 35. 35Copyright © 2015 Capgemini and Sogeti. All Rights Reserved Improve the security of your application portfolio | December 2nd, 2015 How it works Customeruploadssoftware or dynamic accessdata directly on his portal Upload Dynamic,static and/ormobile automatic testing Scan Expertreview and additional tests to ensure minimalfalse positives and falsenegatives Review
  • 36. 36Copyright © 2015 Capgemini and Sogeti. All Rights Reserved Improve the security of your application portfolio | December 2nd, 2015 The benefits ! Regularly checkedand updated by HP’s Security Researchteam who find four times the number of new critical vulnerabilities than the rest of the market combined (Frost and Sullivan) ! Easy to purchase Launchyour application securityinitiative in < 1 day ! No hardware or software investments ! No security experts to hire, train and retain Simple Scale to test all sensitive applicationsin your organization ! From one-day turn-around on applicationsecurity results ! Potentially support 1000sof applicationsfor desktop, mobile or cloud ! Dynamic and static testing with manual review Fast & Comprehensive Test anyapplication ! Secure commercial, open source and 3rd party applications ! Test applications on demand according to risk and budget Flexible
  • 37. 37Copyright © 2015 Capgemini and Sogeti. All Rights Reserved Improve the security of your application portfolio | December 2nd, 2015 Comprehensive and accurate testing
  • 38. 38Copyright © 2015 Capgemini and Sogeti. All Rights Reserved Improve the security of your application portfolio | December 2nd, 2015 Multiple levels of testing based on application risk Low Medium High Basic assessment Standard assessment Premium assessment ! Marketing Site ! Personally identifiable information ! Business useful ! Credit card/ SSN information ! Business critical
  • 40. 40Copyright © 2015 Capgemini and Sogeti. All Rights Reserved Improve the security of your application portfolio | December 2nd, 2015 Contact information Yves Le Floch VP, Head of CyberSecurity Business Development Sogeti yves.le-floch@sogeti.com +33 1 55 00 13 41 David Harper Fortify on Demand Practice Principal, EMEA Hewlett Packard Enterprise david.harper@hpe.com +44 751 528 5200
  • 41. www.sogeti.com www.capgemini.com The information contained in this presentation is proprietary and confidential. It is for internal and intermediary use only. Copyright © 2015 Capgemini and Sogeti. All rights reserved. Rightshore® is a trademark belonging to Capgemini. No part of this presentation may be modified, deleted or expanded by any process or means without prior written permission from Capgemini. About Capgemini and Sogeti Now with 180,000 people in over 40 countries, Capgemini is one of the world's foremost providers of consulting, technology and outsourcing services. The Group reported 2014 global revenues of EUR 10.573 billion. Together with its clients, Capgemini creates and delivers business, technology and digital solutions that fit their needs, enabling them to achieve innovation and competitiveness. A deeply multicultural organization, Capgemini has developed its own way of working, the Collaborative Business Experience™, and draws on Rightshore®, its worldwide delivery model. Sogeti is a leading provider of technology and software testing, specializing in Application, Infrastructure and Engineering Services. Sogeti offers cutting-edge solutions around Testing, Business Intelligence & Analytics, Mobile, Cloud and Cyber Security. Sogeti brings together more than 20,000 professionals in 15 countries and has a strong local presence in over 100 locations in Europe, USA and India. Sogeti is a wholly-owned subsidiary of Cap Gemini S.A., listed on the Paris Stock Exchange.