SlideShare a Scribd company logo
Make  Security  a  Competitive  Advantage
Mordecai  (Mo)  Rosen  
SECURITY
SECURITY
General  Manager,  Security
CA  Technologies
General  Manager
CA  Veracode
Sam  King
2 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS
Eliminate  Barriers  
Between  Ideas  and  Outcomes
CREATE  AN  AGILE  
BUSINESS
BUILD  BETTER      
APPS  FASTER
MAKE  SECURITY  A  
COMPETITIVE  ADVANTAGE
MAXIMIZE  APPLICATION  
PERFORMANCE
3 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS
HOME  AUTOMATION
PHYSICAL  SECURITY
EHEALTH  DEVICES
WEARABLES
SMART  METERS
SHIPPING  LOGISTICS
PROPERTY  MANAGEMENT  
ECOLOGY
FACTORY  AUTOMATION
SMART  PHONES
TABLETS
CAMERAS
PHONES
TELEVISIONS
AUTOMOBILES
THERMOSTATS
WWW
CHAT  &  IM
API
SERVICES
CLOUD
SERVICES
First  a  Brief  History  of
THE  EXPANDING  
DIGITAL  
EXPERIENCE  
4 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS
THE  DIGITAL  
EXPERIENCE  
Is  Between  Users  
and  Applications
HOME  AUTOMATION
PHYSICAL  SECURITY
EHEALTH  DEVICES
WEARABLES
SMART  METERS
SHIPPING  LOGISTICS
PROPERTY  MANAGEMENT  
ECOLOGY
FACTORY  AUTOMATION
SMART  PHONES
TABLETS
CAMERAS
PHONES
TELEVISIONS
AUTOMOBILES
THERMOSTATS
WWW
CHAT  &  IM
API
SERVICES
CLOUD
SERVICES
5 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS
MAKES  EVERY  COMPANY  A  SOFTWARE  COMPANY
APPLICATION
EXPLOSION
CONSUMERIZED
IT
CONNECTED
ENTERPRISES
DIGITAL
MARKETPLACES
DIGITAL
WORKPLACES
CONNECTED
IOT
The  Application  Economy
6 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS
The  Application  Economy
REQUIRES  NEW  THINKING  ON  SECURITY
FIREWALL
IDS/IPS
WEB  PROXY
ANTI-­VIRUS
ANTI-­MALWARE
100%
INEFFECTIVE
USERS  &  APPS
UNDER  ATTACK
SHADOW  IT
30%
Of  all  attacks  will  be  in  
shadow  IT  resources
APP  DEFECTS
90%
Of  breaches caused  
by  application  defects
3RD  PARTY  RISK
70% Of  attacks  targeted a  
secondary  source  
IDENTITY  FRAUD
80% Of  breaches  used  lost  
stolen  &  weak  credentials
CREDIT  FRAUD
42%
Of  all  data  stolen  is
credit  card  data  
FireEye  Study  of  6  Months  of  Penetration  Testing  
7 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS
A QUESTION
OF TRUST
USERS
INTERACTIONS
APPLICATIONS
Security  Becomes
8 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS
CA  Security  Strategy  To  
SECURING  THE  APPLICATION  ECONOMY
TRUSTED
USERS  &
APPLICATIONS  
PREVENTATIVE  
DETECTION  &
RESPONSIVE
INSIGHT  
ANALYTICS  &
INTELLIGENCE
FRICTIONLESS  
SECURITY  &
EXPERIENCE
CORE  PRINCIPLES  
9 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS
IDENTITY  &
ACCESS  
APPLICATION
SECURITY
API
SECRUITY
PAYMENT
SECURITY
PRODUCT  PORTFOLIO
CA  Security  Strategy  To  
SECURING  THE  APPLICATION  ECONOMY
10 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS
LINES  OF  CODE  
SCANNED6  TRILLION
1400  CUSTOMERS 400K
APPLICATION  
SECURITY  
ADVISORY  
HOURS
35.5M SECURITY  FLAWS  FIXED
4X GARTNER
MQ  LEADER
24 LANGUAGES
77 FRAMEWORKS
APPLICATION
SECURITY
CA  VERACODE
11 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS
Ensuring
GREAT  SOFTWARE  IS  SECURE  SOFTWARE
EMPOWER
DEVELOPERS  TO  
SECURE  CODE
INTEGRATED  INTO
CONTINUOUS  
DELIVERY
EARLY  DETECT
TO  REDUCE  COST
AUTOMATED  TO  
REDUCE  MTTR
12 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS
CODECOMMIT BUILD
TEST
RELEASE OPERATE
SECURITY  INTO  CONTINUOUS  DELIVERY  
TEST TEST
DevSecOps
SECURE  SOFTWARE  
DEVELOPENT
SECURITY  
ASSURANCE
OPERATIONAL  
APPLICATION  SECURITY
Merging
13 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS
CODECOMMIT BUILD
TEST
RELEASE OPERATE
SECURE  SOFTWARE  
DEVELOPENT
SECURITY  
ASSURANCE
OPERATIONAL  
APPLICATION  SECURITY
DevSecOps
TEST TEST
CA  Veracode  Greenlight CA  Veracode  Static  Analysis
CA  Veracode  Web  Application  Scanning
CA  Veracode  Runtime  Protection
CA  Veracode  Software  Composition  Analysis
CA  Veracode  Integrations,  APIs
CA  Veracode  eLearning
14 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS
Securing  Applications  With  
NEXT  GENERATION  IDENTITY  MANAGEMENT
80%of  all  data  breaches  exploit  
lost,  stolen  &  weak  credentials
HYBRID
CLOUD
DEVELOPER
APIs
BEHAVIOR
ANALYTICS
15 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS
API  
ENABLED
HIGH  SCALE  
APPLIANCE
HYBRID
CLOUD
SECURE  
CONTINUOUS
DELIVERY    
PRIVILEGED
GOVERNANCE
Central  Authentication
Credential  Vault
Policy  Enforcement
Role  -­ Based  Access
Federated  Identity Session  Recording
CA  Privileged  Access  Manager
PROTECTING
PRIVILEGED
IDENTITY
16 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS
ENABLING
APP TO APP
TRUST
User  &  App  
Authentication  API
Mobile  
Authentication  API
Secure  Server  
Communications
Context  Based
Risk  Analysis
CA  Rapid  App  Security
Risk  Based  Analytics
17 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS
RISK
ANALYTICS
WORKS
EMPIRICALLY
18 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD        #NOBARRIERS
Digital	
  Payments	
  
Fraud
Directory
Identity	
  
Management
Privileged	
  
Access	
  
Management
Single	
  
Sign-­‐on
Identity	
  
Governance
Risk	
  Based	
  
Authentication
Orchestrating	
  
Identity	
  &	
  
Access
Employees  &  
Administrators
Customers  &  
Partners
Internet  of  Things
Developers
Cloud	
  
Services
On	
  
Premise	
  
Apps
Mobile
Web
API
CA  Security  &  Identity  Management  Portfolio
19 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD        #NOBARRIERS
CONTROLLING  PRIVILEGED  ACCESS
IN  A  WORLD  ON  TIME
20 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD        #NOBARRIERS
CONTROLLING  PRIVILEGED  ACCESS
IN  A  WORLD  ON  TIME
21 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD        #NOBARRIERS
CONTROLLING  PRIVILEGED  ACCESS
IN  A  WORLD  ON  TIME
22 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD        #NOBARRIERS
CONTROLLING  PRIVILEGED  ACCESS
IN  A  WORLD  ON  TIME
23 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD        #NOBARRIERS
CONTROLLING  PRIVILEGED  ACCESS
IN  A  WORLD  ON  TIME
24 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS
APPLICATION
SECURITY
TESTING
FRICTIONLESS  
25 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS
APPLICATION
SECURITY
TESTING
FRICTIONLESS  
26 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS
APPLICATION
SECURITY
TESTING
FRICTIONLESS  
27 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS
ARTHUR
WONG
Interview  With
SVP  &  GM
DXC  Security  
28 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS
ARTHUR
WONG
Interview  With
SVP  &  GM
DXC  Security  
29 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS
ARTHUR
WONG
Interview  With
SVP  &  GM
DXC  Security  
30 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS
ARTHUR
WONG
Interview  With
SVP  &  GM
DXC  Security  
31 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS
BREAKING
BARRIERS
AWARD
Mo  Ahddoud
First  UK  critical  infrastructure  
company  running  100%  in  
the  cloud  
Todd  Oxford
Enabled  disaster  recovery  
access  to  comply  with  FEMA  
first  &  second  line  response  
regulations
Mark  Merkow
Integrating  app  security  
testing  into  SDLC  for  500+  
developer  organization
32 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS
BREAKING
BARRIERS
AWARD
Mo  Ahddoud
First  UK  critical  infrastructure  
company  running  100%  in  
the  cloud  
Todd  Oxford
Enabled  disaster  recovery  
access  to  comply  with  FEMA  
first  &  second  line  response  
regulations
Mark  Merkow
Integrating  app  security  
testing  into  SDLC  for  500+  
developer  organization
33 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS
BREAKING
BARRIERS
AWARD
Mo  Ahddoud
First  UK  critical  infrastructure  
company  running  100%  in  
the  cloud  
Todd  Oxford
Enabled  disaster  recovery  
access  to  comply  with  FEMA  
first  &  second  line  response  
regulations
Mark  Merkow
Integrating  app  security  
testing  into  SDLC  for  500+  
developer  organization
34 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS
BREAKING
BARRIERS
AWARD
Mo  Ahddoud
First  UK  critical  infrastructure  
company  running  100%  in  
the  cloud  
Todd  Oxford
Enabled  disaster  recovery  
access  to  comply  with  FEMA  
first  &  second  line  response  
regulations
Mark  Merkow
Integrating  app  security  
testing  into  SDLC  for  500+  
developer  organization
35 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS
CA  World ’17
See  the  latest  
innovation  in  
the  demo  area  
Immerse  in  all  
of  the  customer  
case  studies  
on  stage
Meet  with  our  
product  teams  
at  the  executive  
center
36 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS
Thank  you.
Stay  connected  at  communities.ca.com
&  community.veracode.com
37 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS
Security  and  DevSecOps
For  more  information  on  Security,
please  visit:  http://cainc.to/CAW17-­Security
For  more  information  on  DevSecOps,
please  visit:  http://cainc.to/CAW17-­DevSecOps
For  more  information  on  Veracode,
please  visit:  http://community.veracode.com

More Related Content

PDF
Establish Digital Trust as the Currency of Digital Enterprise
PDF
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
PDF
Making Security Work—Implementing a Transformational Security Program
PDF
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
PDF
Emerging Managed Services Opportunities in Identity and Access Management
PDF
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
PDF
Case Study: Putting Citizens at The Center of Digital Government
PDF
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Establish Digital Trust as the Currency of Digital Enterprise
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Making Security Work—Implementing a Transformational Security Program
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
Emerging Managed Services Opportunities in Identity and Access Management
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
Case Study: Putting Citizens at The Center of Digital Government
Blockchain: Strategies for Moving From Hype to Realities of Deployment

What's hot (16)

PDF
Application Experience Analytics Services: The Strategic Digital Transformati...
PDF
Mobile Payment Security with CA Rapid App Security
PDF
CA Microgateway: Deploying, Configuring, and Extending CA Microgateway
PDF
When You Test Matters: Why Testing Early in the SDLC is Important
PPTX
Cisco Connect 2018 Indonesia - Cisco cmx
PPTX
Cisco Connect 2018 Indonesia - Cisco HyperFlex
PDF
API Academy: Microservices - How to Safely Speed Up Your Digital Innovation
PDF
SE-4110, Securing Identities in the Cloud, by Martin Ahlers
PPTX
What's Next in Financial Services Infrastructure Plumbing and APIs
PPTX
Industrial IoT - build your industry 4.0 @techitaly
PDF
Winter is Coming for Microservice Complexity - Challenges with Docker Apps
PPTX
Zscaler mondi webinar
PDF
best commerce cloud consulting | ecom web it solutions | Etisbew
PDF
IntegrationWorks: Grow Your Business with the API Economy
PDF
The Akamai Security Portfolio
PDF
The Microservices Manifesto: How to Get More Out of the Development Lifecycle
Application Experience Analytics Services: The Strategic Digital Transformati...
Mobile Payment Security with CA Rapid App Security
CA Microgateway: Deploying, Configuring, and Extending CA Microgateway
When You Test Matters: Why Testing Early in the SDLC is Important
Cisco Connect 2018 Indonesia - Cisco cmx
Cisco Connect 2018 Indonesia - Cisco HyperFlex
API Academy: Microservices - How to Safely Speed Up Your Digital Innovation
SE-4110, Securing Identities in the Cloud, by Martin Ahlers
What's Next in Financial Services Infrastructure Plumbing and APIs
Industrial IoT - build your industry 4.0 @techitaly
Winter is Coming for Microservice Complexity - Challenges with Docker Apps
Zscaler mondi webinar
best commerce cloud consulting | ecom web it solutions | Etisbew
IntegrationWorks: Grow Your Business with the API Economy
The Akamai Security Portfolio
The Microservices Manifesto: How to Get More Out of the Development Lifecycle
Ad

Similar to Keynote: Making Security a Competitive Advantage (20)

PDF
Application Security in a DevOps World
PDF
Enable and Secure Business Growth in the New Application Economy
PDF
Putting Security in Identity-as-a-Service
PDF
The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...
PPTX
CA API Gateway: Web API and Application Security
PDF
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...
PDF
Creating the Borderless Workplace
PDF
Domenico Maracci, Stefano Sali - Secure Continuous Delivery - Sicurezza e Dev...
PDF
Establish Digital Trust as the Currency of Digital Enterprise
PDF
CA Security - Deloitte IAM Summit - Vasu
PDF
Automating the Modern Software Factory
PDF
5 steps end to end security consumer apps
PDF
How CA Technologies Enables Its Own Employees and Secures Access to Applicati...
PDF
From Rogue One to Rebel Alliance: Building Developers into Security Champions
PDF
CA Identity Suite – Extending Identity Management to the Business User
PDF
Streamlining AppSec Policy Definition.pptx
PDF
Mainframe Opening Keynote Address: Mainframe Reframed for the Application Eco...
PDF
Breached! App Attacks, Application Protection and Incident Response
PPTX
Leveraging Technology for Government Service Delivery
PDF
TW SEAT - DevOps: Security 干我何事?
Application Security in a DevOps World
Enable and Secure Business Growth in the New Application Economy
Putting Security in Identity-as-a-Service
The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...
CA API Gateway: Web API and Application Security
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...
Creating the Borderless Workplace
Domenico Maracci, Stefano Sali - Secure Continuous Delivery - Sicurezza e Dev...
Establish Digital Trust as the Currency of Digital Enterprise
CA Security - Deloitte IAM Summit - Vasu
Automating the Modern Software Factory
5 steps end to end security consumer apps
How CA Technologies Enables Its Own Employees and Secures Access to Applicati...
From Rogue One to Rebel Alliance: Building Developers into Security Champions
CA Identity Suite – Extending Identity Management to the Business User
Streamlining AppSec Policy Definition.pptx
Mainframe Opening Keynote Address: Mainframe Reframed for the Application Eco...
Breached! App Attacks, Application Protection and Incident Response
Leveraging Technology for Government Service Delivery
TW SEAT - DevOps: Security 干我何事?
Ad

More from CA Technologies (17)

PPTX
CA Mainframe Resource Intelligence
PDF
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
PDF
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
PDF
Case Study: How The Home Depot Built Quality Into Software Development
PDF
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
PDF
Case Study: Privileged Access in a World on Time
PDF
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
PDF
Keynote: Making Security a Competitive Advantage
PDF
Application Experience Analytics Services: The Strategic Digital Transformati...
PDF
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
PDF
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
PDF
How Components Increase Speed and Risk
PDF
Case Study: How The Home Depot Built Quality Into Software Development
PDF
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
PDF
Case Study: Continuous Delivery in a Tech Debt Laden World by Talk Talk.
PDF
Case Study: United Airlines Transforms Release Management for Its Modern Soft...
PDF
Keynote: Unlock the Power of Continuous Delivery with End-to-End, Integrated ...
CA Mainframe Resource Intelligence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How The Home Depot Built Quality Into Software Development
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Case Study: Privileged Access in a World on Time
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Keynote: Making Security a Competitive Advantage
Application Experience Analytics Services: The Strategic Digital Transformati...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
How Components Increase Speed and Risk
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: Continuous Delivery in a Tech Debt Laden World by Talk Talk.
Case Study: United Airlines Transforms Release Management for Its Modern Soft...
Keynote: Unlock the Power of Continuous Delivery with End-to-End, Integrated ...

Recently uploaded (20)

PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPTX
A Presentation on Artificial Intelligence
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Electronic commerce courselecture one. Pdf
PPTX
MYSQL Presentation for SQL database connectivity
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Approach and Philosophy of On baking technology
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
cuic standard and advanced reporting.pdf
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Encapsulation theory and applications.pdf
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
A Presentation on Artificial Intelligence
The Rise and Fall of 3GPP – Time for a Sabbatical?
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Network Security Unit 5.pdf for BCA BBA.
Spectral efficient network and resource selection model in 5G networks
Electronic commerce courselecture one. Pdf
MYSQL Presentation for SQL database connectivity
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Approach and Philosophy of On baking technology
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Mobile App Security Testing_ A Comprehensive Guide.pdf
Digital-Transformation-Roadmap-for-Companies.pptx
Advanced methodologies resolving dimensionality complications for autism neur...
cuic standard and advanced reporting.pdf
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Encapsulation theory and applications.pdf
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf

Keynote: Making Security a Competitive Advantage

  • 1. Make  Security  a  Competitive  Advantage Mordecai  (Mo)  Rosen   SECURITY SECURITY General  Manager,  Security CA  Technologies General  Manager CA  Veracode Sam  King
  • 2. 2 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS Eliminate  Barriers   Between  Ideas  and  Outcomes CREATE  AN  AGILE   BUSINESS BUILD  BETTER       APPS  FASTER MAKE  SECURITY  A   COMPETITIVE  ADVANTAGE MAXIMIZE  APPLICATION   PERFORMANCE
  • 3. 3 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS HOME  AUTOMATION PHYSICAL  SECURITY EHEALTH  DEVICES WEARABLES SMART  METERS SHIPPING  LOGISTICS PROPERTY  MANAGEMENT   ECOLOGY FACTORY  AUTOMATION SMART  PHONES TABLETS CAMERAS PHONES TELEVISIONS AUTOMOBILES THERMOSTATS WWW CHAT  &  IM API SERVICES CLOUD SERVICES First  a  Brief  History  of THE  EXPANDING   DIGITAL   EXPERIENCE  
  • 4. 4 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS THE  DIGITAL   EXPERIENCE   Is  Between  Users   and  Applications HOME  AUTOMATION PHYSICAL  SECURITY EHEALTH  DEVICES WEARABLES SMART  METERS SHIPPING  LOGISTICS PROPERTY  MANAGEMENT   ECOLOGY FACTORY  AUTOMATION SMART  PHONES TABLETS CAMERAS PHONES TELEVISIONS AUTOMOBILES THERMOSTATS WWW CHAT  &  IM API SERVICES CLOUD SERVICES
  • 5. 5 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS MAKES  EVERY  COMPANY  A  SOFTWARE  COMPANY APPLICATION EXPLOSION CONSUMERIZED IT CONNECTED ENTERPRISES DIGITAL MARKETPLACES DIGITAL WORKPLACES CONNECTED IOT The  Application  Economy
  • 6. 6 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS The  Application  Economy REQUIRES  NEW  THINKING  ON  SECURITY FIREWALL IDS/IPS WEB  PROXY ANTI-­VIRUS ANTI-­MALWARE 100% INEFFECTIVE USERS  &  APPS UNDER  ATTACK SHADOW  IT 30% Of  all  attacks  will  be  in   shadow  IT  resources APP  DEFECTS 90% Of  breaches caused   by  application  defects 3RD  PARTY  RISK 70% Of  attacks  targeted a   secondary  source   IDENTITY  FRAUD 80% Of  breaches  used  lost   stolen  &  weak  credentials CREDIT  FRAUD 42% Of  all  data  stolen  is credit  card  data   FireEye  Study  of  6  Months  of  Penetration  Testing  
  • 7. 7 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS A QUESTION OF TRUST USERS INTERACTIONS APPLICATIONS Security  Becomes
  • 8. 8 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS CA  Security  Strategy  To   SECURING  THE  APPLICATION  ECONOMY TRUSTED USERS  & APPLICATIONS   PREVENTATIVE   DETECTION  & RESPONSIVE INSIGHT   ANALYTICS  & INTELLIGENCE FRICTIONLESS   SECURITY  & EXPERIENCE CORE  PRINCIPLES  
  • 9. 9 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS IDENTITY  & ACCESS   APPLICATION SECURITY API SECRUITY PAYMENT SECURITY PRODUCT  PORTFOLIO CA  Security  Strategy  To   SECURING  THE  APPLICATION  ECONOMY
  • 10. 10 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS LINES  OF  CODE   SCANNED6  TRILLION 1400  CUSTOMERS 400K APPLICATION   SECURITY   ADVISORY   HOURS 35.5M SECURITY  FLAWS  FIXED 4X GARTNER MQ  LEADER 24 LANGUAGES 77 FRAMEWORKS APPLICATION SECURITY CA  VERACODE
  • 11. 11 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS Ensuring GREAT  SOFTWARE  IS  SECURE  SOFTWARE EMPOWER DEVELOPERS  TO   SECURE  CODE INTEGRATED  INTO CONTINUOUS   DELIVERY EARLY  DETECT TO  REDUCE  COST AUTOMATED  TO   REDUCE  MTTR
  • 12. 12 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS CODECOMMIT BUILD TEST RELEASE OPERATE SECURITY  INTO  CONTINUOUS  DELIVERY   TEST TEST DevSecOps SECURE  SOFTWARE   DEVELOPENT SECURITY   ASSURANCE OPERATIONAL   APPLICATION  SECURITY Merging
  • 13. 13 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS CODECOMMIT BUILD TEST RELEASE OPERATE SECURE  SOFTWARE   DEVELOPENT SECURITY   ASSURANCE OPERATIONAL   APPLICATION  SECURITY DevSecOps TEST TEST CA  Veracode  Greenlight CA  Veracode  Static  Analysis CA  Veracode  Web  Application  Scanning CA  Veracode  Runtime  Protection CA  Veracode  Software  Composition  Analysis CA  Veracode  Integrations,  APIs CA  Veracode  eLearning
  • 14. 14 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS Securing  Applications  With   NEXT  GENERATION  IDENTITY  MANAGEMENT 80%of  all  data  breaches  exploit   lost,  stolen  &  weak  credentials HYBRID CLOUD DEVELOPER APIs BEHAVIOR ANALYTICS
  • 15. 15 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS API   ENABLED HIGH  SCALE   APPLIANCE HYBRID CLOUD SECURE   CONTINUOUS DELIVERY     PRIVILEGED GOVERNANCE Central  Authentication Credential  Vault Policy  Enforcement Role  -­ Based  Access Federated  Identity Session  Recording CA  Privileged  Access  Manager PROTECTING PRIVILEGED IDENTITY
  • 16. 16 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS ENABLING APP TO APP TRUST User  &  App   Authentication  API Mobile   Authentication  API Secure  Server   Communications Context  Based Risk  Analysis CA  Rapid  App  Security Risk  Based  Analytics
  • 17. 17 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS RISK ANALYTICS WORKS EMPIRICALLY
  • 18. 18 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD        #NOBARRIERS Digital  Payments   Fraud Directory Identity   Management Privileged   Access   Management Single   Sign-­‐on Identity   Governance Risk  Based   Authentication Orchestrating   Identity  &   Access Employees  &   Administrators Customers  &   Partners Internet  of  Things Developers Cloud   Services On   Premise   Apps Mobile Web API CA  Security  &  Identity  Management  Portfolio
  • 19. 19 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD        #NOBARRIERS CONTROLLING  PRIVILEGED  ACCESS IN  A  WORLD  ON  TIME
  • 20. 20 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD        #NOBARRIERS CONTROLLING  PRIVILEGED  ACCESS IN  A  WORLD  ON  TIME
  • 21. 21 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD        #NOBARRIERS CONTROLLING  PRIVILEGED  ACCESS IN  A  WORLD  ON  TIME
  • 22. 22 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD        #NOBARRIERS CONTROLLING  PRIVILEGED  ACCESS IN  A  WORLD  ON  TIME
  • 23. 23 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD        #NOBARRIERS CONTROLLING  PRIVILEGED  ACCESS IN  A  WORLD  ON  TIME
  • 24. 24 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS APPLICATION SECURITY TESTING FRICTIONLESS  
  • 25. 25 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS APPLICATION SECURITY TESTING FRICTIONLESS  
  • 26. 26 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS APPLICATION SECURITY TESTING FRICTIONLESS  
  • 27. 27 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS ARTHUR WONG Interview  With SVP  &  GM DXC  Security  
  • 28. 28 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS ARTHUR WONG Interview  With SVP  &  GM DXC  Security  
  • 29. 29 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS ARTHUR WONG Interview  With SVP  &  GM DXC  Security  
  • 30. 30 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS ARTHUR WONG Interview  With SVP  &  GM DXC  Security  
  • 31. 31 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS BREAKING BARRIERS AWARD Mo  Ahddoud First  UK  critical  infrastructure   company  running  100%  in   the  cloud   Todd  Oxford Enabled  disaster  recovery   access  to  comply  with  FEMA   first  &  second  line  response   regulations Mark  Merkow Integrating  app  security   testing  into  SDLC  for  500+   developer  organization
  • 32. 32 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS BREAKING BARRIERS AWARD Mo  Ahddoud First  UK  critical  infrastructure   company  running  100%  in   the  cloud   Todd  Oxford Enabled  disaster  recovery   access  to  comply  with  FEMA   first  &  second  line  response   regulations Mark  Merkow Integrating  app  security   testing  into  SDLC  for  500+   developer  organization
  • 33. 33 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS BREAKING BARRIERS AWARD Mo  Ahddoud First  UK  critical  infrastructure   company  running  100%  in   the  cloud   Todd  Oxford Enabled  disaster  recovery   access  to  comply  with  FEMA   first  &  second  line  response   regulations Mark  Merkow Integrating  app  security   testing  into  SDLC  for  500+   developer  organization
  • 34. 34 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS BREAKING BARRIERS AWARD Mo  Ahddoud First  UK  critical  infrastructure   company  running  100%  in   the  cloud   Todd  Oxford Enabled  disaster  recovery   access  to  comply  with  FEMA   first  &  second  line  response   regulations Mark  Merkow Integrating  app  security   testing  into  SDLC  for  500+   developer  organization
  • 35. 35 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS CA  World ’17 See  the  latest   innovation  in   the  demo  area   Immerse  in  all   of  the  customer   case  studies   on  stage Meet  with  our   product  teams   at  the  executive   center
  • 36. 36 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS Thank  you. Stay  connected  at  communities.ca.com &  community.veracode.com
  • 37. 37 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS Security  and  DevSecOps For  more  information  on  Security, please  visit:  http://cainc.to/CAW17-­Security For  more  information  on  DevSecOps, please  visit:  http://cainc.to/CAW17-­DevSecOps For  more  information  on  Veracode, please  visit:  http://community.veracode.com