SlideShare a Scribd company logo
A culture change
08/10/2019
Security in development lifecycle
Gemalto / THALES DIS
09.10.19Introducing Gemalto2
We focus on six main markets – but serve many others
9 October 2019Introducing Gemalto3
BANKING &
PAYMENT
ENTERPRISE
SECURITY
GOVERNMENT
MOBILE
IoT
SOFTWARE
MONETIZATION
For the world’s governments & biggest brands
9 October 20194 Introducing Gemalto
200+
GOVERNMENT
PROGRAMS
30,000+
ENTERPRISES
3,000+FINANCIAL
INSTITUTIONS
450
MOBILE
OPERATORS
Connecting elderly patients
to keep them safe
Internet of Things: Connect. Secure. Monetize
9 October 2019Introducing Gemalto5
• Integrators
• Mobile network operators
• Automotive & mobility players
• Consumer electronics
• Smart energy providers
• Healthcare device suppliers
• Smart home device makers
OUR CLIENTS OUR SOLUTIONS
Optimized connectivity:
wireless modules
& terminals, eSIM, MIM
Flexible subscription
management:
On-Demand Connectivity
End-to-end IoT Security:
secure elements, data
encryption, ID management
& verification
OnKöl partners with Gemalto to securely power
health and home monitoring devices that connect
elderly patients with their caregivers.
Mobile: Connecting more. Securing All
9 October 2019Introducing Gemalto6
• Mobile network operators
• Device manufacturers
• Service providers
OUR CLIENTS OUR SOLUTIONS
People & device
authentication:
multi-tenant removable &
embedded secure elements
Subscription management:
eSIM solutions, device
personalization & activation
Trusted Digital Identity:
Digital enrollment and ID
verification, biometrics
Cloud security:
cloud authentication
and data protection
Faster ID checks for
Telefónica Deutschland
Gemalto’s Digital Identity Verification service
optimizes the customer acquisition process and
confirms the authenticity of a vast range of identity
documents (passports, ID cards etc.) in real-time.
Big Data Analytics and AI
Network operations, customer
support, marketing insights
New development challenges
09.10.19Overall challenges7
Connect securely
Cloud resources
Continuous deployment
New generation of customers expect everything to be connected and constant
stream of updates
Customers want their service providers to
deliver faster, more often, with higher
quality and adapt quicker to their needs.
Service providers want to focus on their
services and use secured infrastructures
and platforms as commodities.
Digital devices are not just in our pockets or
our offices, but increasingly in our homes,
buildings, and many places and cities..
Customer and service provider expectations are rising
…and enforced
Respect of privacy is valued
Sharing?Yes, but not everything
People want to share information at scale while respecting privacy
Personal and corporate data should
be kept private and only shared under
clear rules.
Privacy and the right to be forgotten will be
top of mind for consumers when selecting
a merchant or service provider.
Policy makers and regulators are
increasingly vigilant about private
data management.
Data expectations are rising
A product lifecycle view
09.10.19Overall challenges10
Continuous deployment
Security in development lifecycle
09.10.19Security in development lifecycle11
Security actors
As continuous deployment exponentially
speeds
up the pace of development
Bolt-on security by security
specialists won’t scale
… so security MUST be a primary
concern of the development team
09.10.19Security in development lifecycle12
Continuous Secure deployment
Continuous Secure Deployment is…
empowered engineering teams
taking ownership of
how their product performs in production
including security
09.10.19Security in development lifecycle13
“Security teams are no longer gate keepers but rather tool-smiths and advisors"
Larry Maccherone, Comcast Senior Director
Continuous Secure Deployment Manifesto
Build security in
more than bolt it on
Rely on empowered engineering teams
more than security specialists
Implement features securely
more than security features
Rely on continuous learning
more than end-of-phase gates
Build on culture change
more than policy enforcement
09.10.19Security in development lifecycle14
Security in continuous deployment
09.10.19Security in development lifecycle15
Dev Ops
Security by design
Security test plan
ISRA
Threat modelling
Secure coding standards
Static code analysis
Code review
Security test cases
Antivirus scan
OSS vulnerability assessment
OSS assessment
Security test campaign
Penetration test
Compliance validation
Fuzzing
Deployment strategy (canary, red/black)
Traffic shape configuration
Configuration validation
Configuration as code
Vulnerability assessment
Intruder detection
App. attack detection
Service restoring (or maintaining)
Chaos engineering
Security in development lifecycle results
It’s scary to QA and Security, but “shifting left security and handling
it to developers” leads to time and cost benefits and to dramatically
lower rates of customer experienced defects and vulnerabilities
Security crucially impacts any technology choice
Knowing security risks allows to take them into account while
designing
The customer is at ease when we can have a fluent speech
about security in our software
Security processes and checkpoints allow to handle it as any
other functionality
09.10.19Security challenges16
Want to know more?
9 October 201917 Introducing Gemalto

More Related Content

PDF
Cyber-menaces et cyber-préjudices : regards croisés par Gilles DESOBLIN & Red...
PDF
Sécurité by design + Cloud = Infrastructure as Code par Sergio LOURIERO
PDF
Cybersecurity Tools | Popular Tools for Cybersecurity Threats | Cybersecurity...
PPTX
Porque las Amenazas avanzadas requieren de una Seguridad para Aplicaciones av...
PDF
Top 10 Reasons to Learn Cybersecurity | Why Cybersecurity is Important | Edureka
PPTX
Cloud Security Strategy by McAfee
PDF
CyberSecurity Certifications | CyberSecurity Career | CyberSecurity Certifica...
PDF
DTS Solution - Red Team - Penetration Testing
Cyber-menaces et cyber-préjudices : regards croisés par Gilles DESOBLIN & Red...
Sécurité by design + Cloud = Infrastructure as Code par Sergio LOURIERO
Cybersecurity Tools | Popular Tools for Cybersecurity Threats | Cybersecurity...
Porque las Amenazas avanzadas requieren de una Seguridad para Aplicaciones av...
Top 10 Reasons to Learn Cybersecurity | Why Cybersecurity is Important | Edureka
Cloud Security Strategy by McAfee
CyberSecurity Certifications | CyberSecurity Career | CyberSecurity Certifica...
DTS Solution - Red Team - Penetration Testing

What's hot (20)

PDF
Tomorrow Starts Here - Security Everywhere
PDF
Webinar–OWASP Top 10 for JavaScript for Developers
PPTX
A holistic approach to risk management 20210210 w acfe france & cyber rea...
PDF
3 Tips for Choosing a Next Generation Firewall
PDF
ISACA 2019 Amman Chapter - Shah Sheikh - Cyber Resilience
PPTX
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
PPTX
Aprendizado de máquinas aplicado à segurança cibernética de plantas industriais
PPTX
jtsec Arqus Alliance presentation
PPTX
Walls of Steel, Doors of Wood - Relevance of Application Security
PDF
How to become a Cybersecurity Engineer? | Cybersecurity Salary | Cybersecurit...
PDF
Webinar–That is Not How This Works
PDF
Джан Демирел (Турция). Текущий статус регулирования промышленной кибербезопас...
PPTX
How to protect energy distribution for millions of people against cyber attac...
PDF
Cybersecurity Essentials - Certification
PDF
cybersecurity es
PDF
[Round table] zeroing in on zero trust architecture
PPTX
CompTIA CASP+ | Everything you need to know about the new exam
PDF
Infographic: Security for Mobile Service Providers
PDF
API Vulnerabilties and What to Do About Them
PDF
Ignite 2019
Tomorrow Starts Here - Security Everywhere
Webinar–OWASP Top 10 for JavaScript for Developers
A holistic approach to risk management 20210210 w acfe france & cyber rea...
3 Tips for Choosing a Next Generation Firewall
ISACA 2019 Amman Chapter - Shah Sheikh - Cyber Resilience
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Aprendizado de máquinas aplicado à segurança cibernética de plantas industriais
jtsec Arqus Alliance presentation
Walls of Steel, Doors of Wood - Relevance of Application Security
How to become a Cybersecurity Engineer? | Cybersecurity Salary | Cybersecurit...
Webinar–That is Not How This Works
Джан Демирел (Турция). Текущий статус регулирования промышленной кибербезопас...
How to protect energy distribution for millions of people against cyber attac...
Cybersecurity Essentials - Certification
cybersecurity es
[Round table] zeroing in on zero trust architecture
CompTIA CASP+ | Everything you need to know about the new exam
Infographic: Security for Mobile Service Providers
API Vulnerabilties and What to Do About Them
Ignite 2019
Ad

Similar to security in development lifecycle (20)

PDF
Security as Code (Second Early Release) Bk Sarthak Das
PDF
Security as Code (Second Early Release) Bk Sarthak Das
PPTX
ABN AMRO DevSecOps Journey
PPTX
Safely Removing the Last Roadblock to Continuous Delivery
PPTX
2016 - Safely Removing the Last Roadblock to Continuous Delivery
PPTX
Product Security
PDF
ScotSecure 2020
PPTX
SCS DevSecOps Seminar - State of DevSecOps
PPTX
DevSecOps - It can change your life (cycle)
PPTX
Achieving Secure DevOps: Overcoming the Risks of Modern Service Delivery
PPTX
Turning security into code by Jeff Williams
PDF
ChefConf 2013 Keynote Session – Opscode – Adam Jacob
PDF
The Evolution of Cybersecurity in Software Development for 2025
PDF
Cloud native patterns antipatterns
PDF
Wfh security risks - Ed Adams, President, Security Innovation
PDF
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
PDF
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
PDF
Webinar–Building A Culture of Secure Programming in Your Organization
PDF
Fixing security by fixing software development
PDF
Agile Relevance in the age of Continuous Everything ....
Security as Code (Second Early Release) Bk Sarthak Das
Security as Code (Second Early Release) Bk Sarthak Das
ABN AMRO DevSecOps Journey
Safely Removing the Last Roadblock to Continuous Delivery
2016 - Safely Removing the Last Roadblock to Continuous Delivery
Product Security
ScotSecure 2020
SCS DevSecOps Seminar - State of DevSecOps
DevSecOps - It can change your life (cycle)
Achieving Secure DevOps: Overcoming the Risks of Modern Service Delivery
Turning security into code by Jeff Williams
ChefConf 2013 Keynote Session – Opscode – Adam Jacob
The Evolution of Cybersecurity in Software Development for 2025
Cloud native patterns antipatterns
Wfh security risks - Ed Adams, President, Security Innovation
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
Webinar–Building A Culture of Secure Programming in Your Organization
Fixing security by fixing software development
Agile Relevance in the age of Continuous Everything ....
Ad

More from TelecomValley (20)

PDF
Rapport d'activité SoFAB 2022
PDF
Rapport d'activité 2022
PDF
Rapport d'activité 2021 - Telecom Valley
PDF
Livre blanc "Les métamorphoses de l'entreprise face à l'imprévu - Tome 1 : la...
PDF
Rapport d'activité SoFAB 2020
PDF
Rapport d'activité Telecom Valley 2020
PDF
Rapport d'activité SoFAB 2019
PDF
Rapport d'activité Telecom Valley 2019
PDF
Revue de presse Telecom Valley - Février 2020
PDF
Revue de presse Telecom Valley - Janvier 2020
PDF
Revue de presse Telecom Valley - Décembre 2019
PDF
Revue de presse Telecom Valley - Novembre 2019
PDF
Revue de presse Telecom Valley - Octobre 2019
PDF
Revue de presse Telecom Valley - Septembre 2019
PDF
Présentation Team France Export régionale - 29/11/19
PDF
2019 - NOURI - ALL4TEST- Le BDD pour decouvrir et specifier les besoins metie...
PDF
Tester c'est bien, monitorer c'est mieux - 2019 - KISSI - Soirée du Test Logi...
PPSX
Et si mon test était la spécification de mon application ? - JACOB - iWE - So...
PDF
A la poursuite du bug perdu - 2019 - THEAULT - DI GIORGIO - ACPQUALIFE
PDF
2019 - HAGE CHAHINE - ALTRAN - Presentation-DecouverteMondeAgile_V1.1
Rapport d'activité SoFAB 2022
Rapport d'activité 2022
Rapport d'activité 2021 - Telecom Valley
Livre blanc "Les métamorphoses de l'entreprise face à l'imprévu - Tome 1 : la...
Rapport d'activité SoFAB 2020
Rapport d'activité Telecom Valley 2020
Rapport d'activité SoFAB 2019
Rapport d'activité Telecom Valley 2019
Revue de presse Telecom Valley - Février 2020
Revue de presse Telecom Valley - Janvier 2020
Revue de presse Telecom Valley - Décembre 2019
Revue de presse Telecom Valley - Novembre 2019
Revue de presse Telecom Valley - Octobre 2019
Revue de presse Telecom Valley - Septembre 2019
Présentation Team France Export régionale - 29/11/19
2019 - NOURI - ALL4TEST- Le BDD pour decouvrir et specifier les besoins metie...
Tester c'est bien, monitorer c'est mieux - 2019 - KISSI - Soirée du Test Logi...
Et si mon test était la spécification de mon application ? - JACOB - iWE - So...
A la poursuite du bug perdu - 2019 - THEAULT - DI GIORGIO - ACPQUALIFE
2019 - HAGE CHAHINE - ALTRAN - Presentation-DecouverteMondeAgile_V1.1

Recently uploaded (20)

PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
MYSQL Presentation for SQL database connectivity
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Empathic Computing: Creating Shared Understanding
PDF
cuic standard and advanced reporting.pdf
PDF
KodekX | Application Modernization Development
PDF
Encapsulation theory and applications.pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Modernizing your data center with Dell and AMD
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
Big Data Technologies - Introduction.pptx
PDF
Electronic commerce courselecture one. Pdf
PPTX
A Presentation on Artificial Intelligence
Building Integrated photovoltaic BIPV_UPV.pdf
MYSQL Presentation for SQL database connectivity
NewMind AI Monthly Chronicles - July 2025
Network Security Unit 5.pdf for BCA BBA.
Empathic Computing: Creating Shared Understanding
cuic standard and advanced reporting.pdf
KodekX | Application Modernization Development
Encapsulation theory and applications.pdf
Unlocking AI with Model Context Protocol (MCP)
Per capita expenditure prediction using model stacking based on satellite ima...
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
20250228 LYD VKU AI Blended-Learning.pptx
Modernizing your data center with Dell and AMD
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Review of recent advances in non-invasive hemoglobin estimation
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Big Data Technologies - Introduction.pptx
Electronic commerce courselecture one. Pdf
A Presentation on Artificial Intelligence

security in development lifecycle

  • 1. A culture change 08/10/2019 Security in development lifecycle
  • 2. Gemalto / THALES DIS 09.10.19Introducing Gemalto2
  • 3. We focus on six main markets – but serve many others 9 October 2019Introducing Gemalto3 BANKING & PAYMENT ENTERPRISE SECURITY GOVERNMENT MOBILE IoT SOFTWARE MONETIZATION
  • 4. For the world’s governments & biggest brands 9 October 20194 Introducing Gemalto 200+ GOVERNMENT PROGRAMS 30,000+ ENTERPRISES 3,000+FINANCIAL INSTITUTIONS 450 MOBILE OPERATORS
  • 5. Connecting elderly patients to keep them safe Internet of Things: Connect. Secure. Monetize 9 October 2019Introducing Gemalto5 • Integrators • Mobile network operators • Automotive & mobility players • Consumer electronics • Smart energy providers • Healthcare device suppliers • Smart home device makers OUR CLIENTS OUR SOLUTIONS Optimized connectivity: wireless modules & terminals, eSIM, MIM Flexible subscription management: On-Demand Connectivity End-to-end IoT Security: secure elements, data encryption, ID management & verification OnKöl partners with Gemalto to securely power health and home monitoring devices that connect elderly patients with their caregivers.
  • 6. Mobile: Connecting more. Securing All 9 October 2019Introducing Gemalto6 • Mobile network operators • Device manufacturers • Service providers OUR CLIENTS OUR SOLUTIONS People & device authentication: multi-tenant removable & embedded secure elements Subscription management: eSIM solutions, device personalization & activation Trusted Digital Identity: Digital enrollment and ID verification, biometrics Cloud security: cloud authentication and data protection Faster ID checks for Telefónica Deutschland Gemalto’s Digital Identity Verification service optimizes the customer acquisition process and confirms the authenticity of a vast range of identity documents (passports, ID cards etc.) in real-time. Big Data Analytics and AI Network operations, customer support, marketing insights
  • 8. Connect securely Cloud resources Continuous deployment New generation of customers expect everything to be connected and constant stream of updates Customers want their service providers to deliver faster, more often, with higher quality and adapt quicker to their needs. Service providers want to focus on their services and use secured infrastructures and platforms as commodities. Digital devices are not just in our pockets or our offices, but increasingly in our homes, buildings, and many places and cities.. Customer and service provider expectations are rising
  • 9. …and enforced Respect of privacy is valued Sharing?Yes, but not everything People want to share information at scale while respecting privacy Personal and corporate data should be kept private and only shared under clear rules. Privacy and the right to be forgotten will be top of mind for consumers when selecting a merchant or service provider. Policy makers and regulators are increasingly vigilant about private data management. Data expectations are rising
  • 10. A product lifecycle view 09.10.19Overall challenges10 Continuous deployment
  • 11. Security in development lifecycle 09.10.19Security in development lifecycle11
  • 12. Security actors As continuous deployment exponentially speeds up the pace of development Bolt-on security by security specialists won’t scale … so security MUST be a primary concern of the development team 09.10.19Security in development lifecycle12
  • 13. Continuous Secure deployment Continuous Secure Deployment is… empowered engineering teams taking ownership of how their product performs in production including security 09.10.19Security in development lifecycle13 “Security teams are no longer gate keepers but rather tool-smiths and advisors" Larry Maccherone, Comcast Senior Director
  • 14. Continuous Secure Deployment Manifesto Build security in more than bolt it on Rely on empowered engineering teams more than security specialists Implement features securely more than security features Rely on continuous learning more than end-of-phase gates Build on culture change more than policy enforcement 09.10.19Security in development lifecycle14
  • 15. Security in continuous deployment 09.10.19Security in development lifecycle15 Dev Ops Security by design Security test plan ISRA Threat modelling Secure coding standards Static code analysis Code review Security test cases Antivirus scan OSS vulnerability assessment OSS assessment Security test campaign Penetration test Compliance validation Fuzzing Deployment strategy (canary, red/black) Traffic shape configuration Configuration validation Configuration as code Vulnerability assessment Intruder detection App. attack detection Service restoring (or maintaining) Chaos engineering
  • 16. Security in development lifecycle results It’s scary to QA and Security, but “shifting left security and handling it to developers” leads to time and cost benefits and to dramatically lower rates of customer experienced defects and vulnerabilities Security crucially impacts any technology choice Knowing security risks allows to take them into account while designing The customer is at ease when we can have a fluent speech about security in our software Security processes and checkpoints allow to handle it as any other functionality 09.10.19Security challenges16
  • 17. Want to know more? 9 October 201917 Introducing Gemalto