SlideShare a Scribd company logo
Developers and
Application Security:
Who is Responsible?
SURVEY RESULTS, November 2014
Mark Miller, Senior Storyteller
Mark Miller
Survey Sponsors
41%
Q5 - In what industry does your business operate?
20%
17%
10%
6%
Technology / ISV
Consulting / SI
Financial Services &
Insurance
Media / Entertain
Public Sector
Telecommunications
Consumer Goods / Retail
Other
14%
10%
6%
Operations
25%
Security
16%
Other
3%
DevOps
30%
Development
26%
Q1 – What is your role within your current
organization?
Senior
Management
8%
Executive
Management
6%
Practitioner
46%
Manager
40%
Q3 – What is your responsibility level?
13%
Q9 - Percentage of open source software?
40%
14%
15%
15%
0% open source
20% open source
40% open source
60% open source
80% open source
100% open source 5%
67% >5000 employees
50% in FSI
41% in Consulting
31% in Government
27% in Tech
44% for Java developers
{What people estimate they are doing
13%
Q9 - Percentage of open source software?
14%
15%
15%
0% open source
20% open source
40% open source
60% open source
80% open source
100% open source 5%
67% >5000 employees
50% in FSI
41% in Consulting
31% in Govt
27% in Tech
44% for Java developers
{What people estimate they are doing
What app scans reveal
40%
57%
Q10 - For custom development, what languages are used?
31%
30%
25%
21%
Java
PHP
.NET
Ruby
C/C++
83% with > 5000 employees
FSI: 82.5%
Banking/Finance: 88%
Government: 74%{
Q11 - Who is the primary driver behind
AppSec initiatives?
40% say dev
(Q14) 76% say dev spends less than 15% time
on AppSec
(Q15) 42% say dev knows its important but
does not have time to spend on it
{40%
Q11 - Who primarily drives AppSec initiatives?
(filtered for developers only) 67% devs think they are the primary driver;
(Q15) 26% say security is not their focus,
40% say they have no time to spend on it;
(Q17) 74% state we have no policies or
policies are not effectively enforced
Observations:
84% w/ >5000 employees think it’s
compliance / risk management
{67%
Q12 – Your role in AppSec? (1=not at all, 10 = highest priority)
w/ >5000 employees,
75% rank security 8+ priority
(Q17 – 58% of >5000 employees feel
there is no clear security policy or that
policy is not effectively enforced; 18% we
don’t have clear policies
81% state Adherence to internal security
policies is a top concern
Conclusion: strong personal sense of
responsibility, but little to not policies to
enforce security standards; people make
up their own standards
w/ 101 – 1000 employees,
76% rank security 8+ priority
Q17 – 67% employees feel there is no clear
security policy or that policy is not effectively
enforced.
Q13 - 74% state adherence to internal security
policies is a top concern
Conclusion:
“App Sec is important to me but we lack corporate
policies so I’ll determine my own.”
Q13 - Are any of these security concerns?
65.03%
{#2 overall issue but only 31% test it
#1 issue for government
Q14 - How much time to developers spend on
security?
Q15 - Interest of in-house developers in regard to
AppSec
41% in FSI know its important but don’t spend time
42% in tech
{
Q16 - When does App Dev spend time with security
group?
Observations:
23% say security checks happen, but (Q17) Only 12% have automated
End of development cycle - 62% in government (#1 answer), 47% in financial services
Historically, ‘end of development cycle’ is the most expensive option
Q17 - Describe your current app security policies
(Overall)
Observations:
67.05% do not have clear, well defined, enforced policies
12.5% have well defined, automated policies
Q17 - Describe your current app security policies
(filtered for government)
59% policies not enforced compared to:
40% in FSI
28% in Tech{
24% don’t have policies in place compared to:
20% in FSI
30% in Tech{Automated late in Development18%
Automated across SW lifecycle12%
Q17 - Describe your current app security policies
(Developers only)
42% Do not have clear policies
Observations:
“I am responsible, but I have:
• No tools
• No policy
• No time
9% Automation across lifecycle
7% Automation late in development cycle
Q20 - If doing CI, how often is code compiled?
Observations:
If there is continuous integration, the percentage of
automated testing increases
40% automate security testing here.
Q23 - Where is security testing automated?
Lower Cost
Highest Cost
High Cost
Lower Cost
Q18 - What are you testing?
Observations:
80%+ of app composition is open source
30% of companies test open source
• 37% tech
• 20% in FSI
• 29% in government
Summary
Get the deck right now, within seconds
Community@Sonatype.com
Survey Sponsors
Developers and
Application Security:
Who is Responsible?
SURVEY RESULTS, November 2014
Mark Miller, Senior Storyteller

More Related Content

PDF
The Hidden Risk of Component Based Software Development
PDF
Sonatype's 2013 OSS Software Survey
PPTX
Live 2014 Survey Results: Open Source Development and Application Security Su...
PPTX
ARC's Bob Mick's Cyber Security Standards Presentation at ARC's 2008 Industry...
PPTX
Survey: Security Analytics and Intelligence
PDF
Meet the Experts
PDF
Meet our Community- Experts Exchange at a Glance
PPTX
Medgate: How Communication Builds Safety Culture
The Hidden Risk of Component Based Software Development
Sonatype's 2013 OSS Software Survey
Live 2014 Survey Results: Open Source Development and Application Security Su...
ARC's Bob Mick's Cyber Security Standards Presentation at ARC's 2008 Industry...
Survey: Security Analytics and Intelligence
Meet the Experts
Meet our Community- Experts Exchange at a Glance
Medgate: How Communication Builds Safety Culture

What's hot (20)

PDF
Managing budgets in the public sector survey - Current challenges and future ...
PDF
InsightsEd - Global EdTech Snapshot - July 2015
PPTX
New Synopsys research uncovers security's biggest challenges
PDF
Infographic 2014 smart_grid_cybersecurity_survey_smart_modular_technologies_z...
PPTX
Survey: IT is Everywhere (End Users’ Perspective, Germany)
PDF
Safety and leadership_impact_its_a_numbers_game
PDF
The IT community's take on Artificial Intelligence
PPTX
Survey: IT is Everywhere (End Users’ Perspective, North America)
PDF
Webinar: Systems Failures Fuel Security-Focused Design Practices
PPTX
Horizon Scan 2016 - Canada
PPTX
Survey: IT is Everywhere (End Users’ Perspective, Singapore)
PDF
Connected Research for Sunday Business Post March 2014
PPTX
Survey: IT is Everywhere (End Users’ Perspective, Hong Kong)
PPTX
Survey: IT is Everywhere (End Users’ Perspective, UK)
PDF
2008 North Bridge Future of Open Source Study
PPTX
2015 Strategic Directions: Smart Utility Report
PDF
2017 Software Developer Productivity Survey in the United States and Great Br...
PPTX
Survey: IT is Everywhere (End Users’ Perspective, Australia)
PDF
Abuse Prevention App PPT (Engr. Madeeha Saeed]
PDF
Pandemic Predictions: Comfort Crushers
Managing budgets in the public sector survey - Current challenges and future ...
InsightsEd - Global EdTech Snapshot - July 2015
New Synopsys research uncovers security's biggest challenges
Infographic 2014 smart_grid_cybersecurity_survey_smart_modular_technologies_z...
Survey: IT is Everywhere (End Users’ Perspective, Germany)
Safety and leadership_impact_its_a_numbers_game
The IT community's take on Artificial Intelligence
Survey: IT is Everywhere (End Users’ Perspective, North America)
Webinar: Systems Failures Fuel Security-Focused Design Practices
Horizon Scan 2016 - Canada
Survey: IT is Everywhere (End Users’ Perspective, Singapore)
Connected Research for Sunday Business Post March 2014
Survey: IT is Everywhere (End Users’ Perspective, Hong Kong)
Survey: IT is Everywhere (End Users’ Perspective, UK)
2008 North Bridge Future of Open Source Study
2015 Strategic Directions: Smart Utility Report
2017 Software Developer Productivity Survey in the United States and Great Br...
Survey: IT is Everywhere (End Users’ Perspective, Australia)
Abuse Prevention App PPT (Engr. Madeeha Saeed]
Pandemic Predictions: Comfort Crushers
Ad

Viewers also liked (7)

ODP
Building an Open Source AppSec Pipeline - 2015 Texas Linux Fest
PDF
Leveraging Your Company's DevOps Transformation (AppSec USA 2014)
PPSX
PPTX
DevOps AppSec Pipeline Velcocity NY 2015
PDF
DevSecCon Asia 2017 Ofer Maor: AppSec DevOps automation – real world cases
PDF
Master Continuous Delivery with CloudBees Jenkins Platform
PDF
How to adapt the SDLC to the era of DevSecOps
Building an Open Source AppSec Pipeline - 2015 Texas Linux Fest
Leveraging Your Company's DevOps Transformation (AppSec USA 2014)
DevOps AppSec Pipeline Velcocity NY 2015
DevSecCon Asia 2017 Ofer Maor: AppSec DevOps automation – real world cases
Master Continuous Delivery with CloudBees Jenkins Platform
How to adapt the SDLC to the era of DevSecOps
Ad

Similar to Lisa Conference 2014: DevOps and AppSec - Who is Responsible (20)

PDF
Cybersecurity Quarterly Benchmarks Q1 2022
PPTX
Survey: Application Use & Challenges in Government IT Infrastructures
PDF
State of observability 2023 - story on the what
PPTX
SolarWinds Federal Cybersecurity Survey
PDF
Cloud Management in the U.S. Federal Government
PPTX
AFCEA Cybersecurity through Continuous Monitoring: SolarWinds Survey Results ...
DOCX
SANS 2013 Critical Security Controls Survey Moving From A.docx
PDF
The State of Remote Work Q4 2021
PDF
CAPP Conference Survey
DOCX
Please read the instructions and source that provided, then decide.docx
PPTX
Cybersecurity Operations: Examining the State of the SOC
PPTX
Cyber Security in the Digital Age: A Survey and its Analysis
PDF
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
PPTX
Preparing for the Future of Enterprise Mobility -- Insights Not to Miss
PPTX
Best Practices for a Mature Application Security Program Webinar - February 2016
PDF
Arkadin Unified Communications Report: The Missing 'U' in UC
PPTX
Automation in Public Sector IT Systems
PDF
SANS 2013 Critical Security Controls Survey
PDF
NEW_Security Priorities 2021_Sample Slides.pdf
PPTX
Idge dell reignite2014 qp #2
Cybersecurity Quarterly Benchmarks Q1 2022
Survey: Application Use & Challenges in Government IT Infrastructures
State of observability 2023 - story on the what
SolarWinds Federal Cybersecurity Survey
Cloud Management in the U.S. Federal Government
AFCEA Cybersecurity through Continuous Monitoring: SolarWinds Survey Results ...
SANS 2013 Critical Security Controls Survey Moving From A.docx
The State of Remote Work Q4 2021
CAPP Conference Survey
Please read the instructions and source that provided, then decide.docx
Cybersecurity Operations: Examining the State of the SOC
Cyber Security in the Digital Age: A Survey and its Analysis
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
Preparing for the Future of Enterprise Mobility -- Insights Not to Miss
Best Practices for a Mature Application Security Program Webinar - February 2016
Arkadin Unified Communications Report: The Missing 'U' in UC
Automation in Public Sector IT Systems
SANS 2013 Critical Security Controls Survey
NEW_Security Priorities 2021_Sample Slides.pdf
Idge dell reignite2014 qp #2

More from SeniorStoryteller (20)

PPTX
Culture Hacker: How to Herd CATTs and Inspire Rebels to Change the World! - S...
PPTX
Where Bits & Bytes Meet Flesh and Blood - Joshua Corman
PDF
Implementing DevOps in a Regulated Environment - DJ Schleen
PPTX
Scaling Rugged DevOps to Thousands of Applications - Panel Discussion
PPTX
Making Security Agile - Oleg Gryb
PDF
What We Learned from Four Years of Sciencing the Crap Out of DevOps - Nicole ...
PDF
Release Engineering & Rugged DevOps: An Intersection - J. Paul Reed
PDF
Requirements Gathering for a Successful Rugged DevOps Implementation - Hasan ...
PDF
Ops Happens: DevOps Beyond Deployment - Damon Edwards
PDF
Building Security In - A Tale of Two Stories - Laksh Raghavan
PDF
Breaking Bad Equilibruim - John Willis
PDF
DevSecOps - Building Rugged Software
PPTX
NuGet Package Management Done Right
PPTX
Hero's Tookit: Start Your Rugged DevOps Journey with Nexus, Jenkins and Docker
PPTX
The End of Security as We Know It - Shannon Lietz
PPTX
Safely Removing the Last Roadblock to Continuous Delivery
PPTX
Software Supply Chain Automation Removes Roadblocks to Rugged DevOps
PDF
Heroes’ Journey: Learning from Successful DevOps Transformations
PPTX
Rugged DevOps: Aligning Your Team and Your Powers for Success
PPTX
Create Rugged Applications: Managing Your Software Supply Chain
Culture Hacker: How to Herd CATTs and Inspire Rebels to Change the World! - S...
Where Bits & Bytes Meet Flesh and Blood - Joshua Corman
Implementing DevOps in a Regulated Environment - DJ Schleen
Scaling Rugged DevOps to Thousands of Applications - Panel Discussion
Making Security Agile - Oleg Gryb
What We Learned from Four Years of Sciencing the Crap Out of DevOps - Nicole ...
Release Engineering & Rugged DevOps: An Intersection - J. Paul Reed
Requirements Gathering for a Successful Rugged DevOps Implementation - Hasan ...
Ops Happens: DevOps Beyond Deployment - Damon Edwards
Building Security In - A Tale of Two Stories - Laksh Raghavan
Breaking Bad Equilibruim - John Willis
DevSecOps - Building Rugged Software
NuGet Package Management Done Right
Hero's Tookit: Start Your Rugged DevOps Journey with Nexus, Jenkins and Docker
The End of Security as We Know It - Shannon Lietz
Safely Removing the Last Roadblock to Continuous Delivery
Software Supply Chain Automation Removes Roadblocks to Rugged DevOps
Heroes’ Journey: Learning from Successful DevOps Transformations
Rugged DevOps: Aligning Your Team and Your Powers for Success
Create Rugged Applications: Managing Your Software Supply Chain

Recently uploaded (20)

PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PPT
Teaching material agriculture food technology
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Encapsulation theory and applications.pdf
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
Cloud computing and distributed systems.
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPTX
Spectroscopy.pptx food analysis technology
PPTX
Big Data Technologies - Introduction.pptx
PDF
Machine learning based COVID-19 study performance prediction
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Approach and Philosophy of On baking technology
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Teaching material agriculture food technology
Unlocking AI with Model Context Protocol (MCP)
Encapsulation theory and applications.pdf
Spectral efficient network and resource selection model in 5G networks
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Cloud computing and distributed systems.
Diabetes mellitus diagnosis method based random forest with bat algorithm
Encapsulation_ Review paper, used for researhc scholars
Network Security Unit 5.pdf for BCA BBA.
Chapter 3 Spatial Domain Image Processing.pdf
Spectroscopy.pptx food analysis technology
Big Data Technologies - Introduction.pptx
Machine learning based COVID-19 study performance prediction
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Agricultural_Statistics_at_a_Glance_2022_0.pdf
“AI and Expert System Decision Support & Business Intelligence Systems”
The Rise and Fall of 3GPP – Time for a Sabbatical?
Approach and Philosophy of On baking technology

Lisa Conference 2014: DevOps and AppSec - Who is Responsible

  • 1. Developers and Application Security: Who is Responsible? SURVEY RESULTS, November 2014 Mark Miller, Senior Storyteller
  • 4. 41% Q5 - In what industry does your business operate? 20% 17% 10% 6% Technology / ISV Consulting / SI Financial Services & Insurance Media / Entertain Public Sector Telecommunications Consumer Goods / Retail Other 14% 10% 6%
  • 7. 13% Q9 - Percentage of open source software? 40% 14% 15% 15% 0% open source 20% open source 40% open source 60% open source 80% open source 100% open source 5% 67% >5000 employees 50% in FSI 41% in Consulting 31% in Government 27% in Tech 44% for Java developers {What people estimate they are doing
  • 8. 13% Q9 - Percentage of open source software? 14% 15% 15% 0% open source 20% open source 40% open source 60% open source 80% open source 100% open source 5% 67% >5000 employees 50% in FSI 41% in Consulting 31% in Govt 27% in Tech 44% for Java developers {What people estimate they are doing What app scans reveal 40%
  • 9. 57% Q10 - For custom development, what languages are used? 31% 30% 25% 21% Java PHP .NET Ruby C/C++ 83% with > 5000 employees FSI: 82.5% Banking/Finance: 88% Government: 74%{
  • 10. Q11 - Who is the primary driver behind AppSec initiatives? 40% say dev (Q14) 76% say dev spends less than 15% time on AppSec (Q15) 42% say dev knows its important but does not have time to spend on it {40%
  • 11. Q11 - Who primarily drives AppSec initiatives? (filtered for developers only) 67% devs think they are the primary driver; (Q15) 26% say security is not their focus, 40% say they have no time to spend on it; (Q17) 74% state we have no policies or policies are not effectively enforced Observations: 84% w/ >5000 employees think it’s compliance / risk management {67%
  • 12. Q12 – Your role in AppSec? (1=not at all, 10 = highest priority) w/ >5000 employees, 75% rank security 8+ priority (Q17 – 58% of >5000 employees feel there is no clear security policy or that policy is not effectively enforced; 18% we don’t have clear policies 81% state Adherence to internal security policies is a top concern Conclusion: strong personal sense of responsibility, but little to not policies to enforce security standards; people make up their own standards w/ 101 – 1000 employees, 76% rank security 8+ priority Q17 – 67% employees feel there is no clear security policy or that policy is not effectively enforced. Q13 - 74% state adherence to internal security policies is a top concern Conclusion: “App Sec is important to me but we lack corporate policies so I’ll determine my own.”
  • 13. Q13 - Are any of these security concerns? 65.03% {#2 overall issue but only 31% test it #1 issue for government
  • 14. Q14 - How much time to developers spend on security?
  • 15. Q15 - Interest of in-house developers in regard to AppSec 41% in FSI know its important but don’t spend time 42% in tech {
  • 16. Q16 - When does App Dev spend time with security group? Observations: 23% say security checks happen, but (Q17) Only 12% have automated End of development cycle - 62% in government (#1 answer), 47% in financial services Historically, ‘end of development cycle’ is the most expensive option
  • 17. Q17 - Describe your current app security policies (Overall) Observations: 67.05% do not have clear, well defined, enforced policies 12.5% have well defined, automated policies
  • 18. Q17 - Describe your current app security policies (filtered for government) 59% policies not enforced compared to: 40% in FSI 28% in Tech{ 24% don’t have policies in place compared to: 20% in FSI 30% in Tech{Automated late in Development18% Automated across SW lifecycle12%
  • 19. Q17 - Describe your current app security policies (Developers only) 42% Do not have clear policies Observations: “I am responsible, but I have: • No tools • No policy • No time 9% Automation across lifecycle 7% Automation late in development cycle
  • 20. Q20 - If doing CI, how often is code compiled? Observations: If there is continuous integration, the percentage of automated testing increases 40% automate security testing here.
  • 21. Q23 - Where is security testing automated? Lower Cost Highest Cost High Cost Lower Cost
  • 22. Q18 - What are you testing? Observations: 80%+ of app composition is open source 30% of companies test open source • 37% tech • 20% in FSI • 29% in government
  • 24. Get the deck right now, within seconds Community@Sonatype.com
  • 26. Developers and Application Security: Who is Responsible? SURVEY RESULTS, November 2014 Mark Miller, Senior Storyteller

Editor's Notes

  • #2: Mark Miller, Senior Storyteller TheNEXUS Community Project http://www.sonatype.org/nexus/
  • #27: Mark Miller, Senior Storyteller TheNEXUS Community Project http://www.sonatype.org/nexus/