SlideShare a Scribd company logo
Tackling the Risks of Open
Source Security
5 Things You Need to Know
1
Sharon Sharlin, Product Marketing Manager
2
5 Things To Know About Open Source Security
01
Open Source Risk
Is On The Rise
03
Prioritize Security
Vulnerabilities
02
It’s Time To Change
Your Mindset
04
Delegate Security
Responsibilities
05
Shift Left Is At Its Best
With Open Source
3
01
Open Source Risk
Is On The Rise
4
Are You Spending Enough In AppSec?
The Level of Risk (# of
Breaches Multiplied By
Severeness)
The Level of
Annual Spending
(Investment) in IT Security
Gaps in Security Risks and the Allocation of Spending
Source: Ponemon Institute: The Increasing Risk to Enterprise Applications
Open Source Components Account For 60%-80%
Of The Average Software Product
5%-10%
1998
30%-50%
2008
60%-80%
2018
Proprietary Code
Open Source Code
Source: North Bridge Future Of Open Source Survey
Open Source Code
Proprietary Code
96.8%
of developers rely on open
source components
Frequency of Use of Open Source Components
The Number of Reported Vulnerabilities is Rising
8
02
It’s Time To Change
Your Mindset
Potential vulnerability detected
(SAST & DAST)
No public information
Need to research to find a fix
During development
Detection
Publicity
Remediation
Scan Phase
Known vulnerability
All information is publicly available
Actionable remediation(s) are available
Continuous monitoring (incl. post release)
PROPRIETARY VULNERABILITIES OPEN SOURCE VULNERABILITIES
Open Source Security is a Different Game
It’s time to change your mindset
10
03
Prioritize Security
Vulnerabilities
DEVELOPERS ARE NOT EFFICIENTLY MANAGING
OPEN SOURCE VULNERABILITIES
How much time is spent?
hours/month
None
1 - 10 hours
11 - 20 hours
21 - 35 hours
36 - 60 hours
Over 60 hours
15
spent on average by every developer
on security vulnerabilities
Developers Are Investing Too Much Time On
Vulnerabilities Assessment and Remediation
3.8 hours/month
spent on security vulnerabilities
remediation
EFFECTIVE
VULNERABILITY
INEFFECTIVE
VULNERABILITY
Vulnerability Effectiveness: a novel approach to prioritization
Prioritization Is Key To Save Wasted Time
On Vulnerabilities Management
13
After testing 2,000 Java
applications, WhiteSource
found that 85% of all
detected vulnerabilities
were deemed ineffective.
14
04
Delegate Security
Responsibilities
15
Bridging the Gap is a Must
Security DevOps Developers
16
05
Shift Left Is At Its Best
With Open Source.
17
Turn Developers Into Security Advocates
Empower developers with more flexible selection and approval processes
Project
Planning
Requirements
Definition
Design
Development
Integration &
Test
Installation &
Acceptance
18
Organizations of all sizes are shifting their operational
security to software development teams
Who owns security in your organization, by company size?
19
The impact of developers taking over security is:
Integrating security tools earlier in the SDLC
of developers are taking action towards
application testing on build stage or
before.
66%
In what stage of the SDLC do you spend most of
your time implementing security measures?
20
The cost of fixing security and quality issues is rising significantly, as the development cycle advances.
Coding
$80/Defect
Build
$240/Defect
QA & Security
$960/Defect
Production
$7,600/Defect
Detect Issues As Early As Possible
21
Detect Issues As Early As Possible - Shift Left
The cost of fixing security and quality issues is rising significantly, as the development cycle advances.
22
Analyze and prioritize
open source security vulnerability remediation
Streamline
policies with better integration options
Shift-left
security processes to establish better practices
Thank You!
23

More Related Content

PDF
The State of Open Source Vulnerabilities Management
PDF
Taking Open Source Security to the Next Level
PDF
Open Source Security at Scale- The DevOps Challenge 
PDF
Empowering Financial Institutions to Use Open Source With Confidence
PPTX
5 Things Every CISO Needs To Know About Open Source Security - A WhiteSource ...
PDF
Innocent Vulnerabilities vs. Malicious Backdoors: How to Manage Your Risk
PDF
From Zero to DevSecOps: How to Implement Security at the Speed of DevOps
PDF
Open Source Security: How to Lay the Groundwork for a Secure Culture
The State of Open Source Vulnerabilities Management
Taking Open Source Security to the Next Level
Open Source Security at Scale- The DevOps Challenge 
Empowering Financial Institutions to Use Open Source With Confidence
5 Things Every CISO Needs To Know About Open Source Security - A WhiteSource ...
Innocent Vulnerabilities vs. Malicious Backdoors: How to Manage Your Risk
From Zero to DevSecOps: How to Implement Security at the Speed of DevOps
Open Source Security: How to Lay the Groundwork for a Secure Culture

What's hot (20)

PDF
Winning open source vulnerabilities without loosing your deveopers - Azure De...
PPTX
From Zero to DevSecOps: How to Implement Security at the Speed of DevOps
PDF
Tackling the Container Iceberg:How to approach security when most of your sof...
PDF
The Challenges of Scaling DevSecOps
PDF
5 things about os sharon webinar final
PPTX
The State of Open Source Vulnerabilities - A WhiteSource Webinar
PDF
Security & DevOps - What We Have Here Is a Failure to Communicate!
PDF
Pentest as a Service Impact 2020
PDF
CI/CD pipeline security from start to finish with WhiteSource & CircleCI
PPTX
The DevSecOps Showdown: How to Bridge the Gap Between Security and Developers
PPTX
SCS DevSecOps Seminar - State of DevSecOps
PPTX
DevSecOps outline
PPTX
The Top 3 Strategies To Reduce Your Open Source Security Risks - A WhiteSour...
PPTX
DevSecOps
PDF
PIACERE - DevSecOps Automated
PDF
Demystifying DevSecOps
PDF
The State of Open Source Vulnerabilities Management
PPTX
DEVSECOPS: Coding DevSecOps journey
PPTX
DevSecOps Beginners Guide : How to secure process in DevOps with OpenSource
Winning open source vulnerabilities without loosing your deveopers - Azure De...
From Zero to DevSecOps: How to Implement Security at the Speed of DevOps
Tackling the Container Iceberg:How to approach security when most of your sof...
The Challenges of Scaling DevSecOps
5 things about os sharon webinar final
The State of Open Source Vulnerabilities - A WhiteSource Webinar
Security & DevOps - What We Have Here Is a Failure to Communicate!
Pentest as a Service Impact 2020
CI/CD pipeline security from start to finish with WhiteSource & CircleCI
The DevSecOps Showdown: How to Bridge the Gap Between Security and Developers
SCS DevSecOps Seminar - State of DevSecOps
DevSecOps outline
The Top 3 Strategies To Reduce Your Open Source Security Risks - A WhiteSour...
DevSecOps
PIACERE - DevSecOps Automated
Demystifying DevSecOps
The State of Open Source Vulnerabilities Management
DEVSECOPS: Coding DevSecOps journey
DevSecOps Beginners Guide : How to secure process in DevOps with OpenSource
Ad

Similar to Tackling the Risks of Open Source Security: 5 Things You Need to Know (20)

PDF
OSSF 2018 - David habusha of Whitesource - Open Source Vulnerabilities 101
PPTX
WhiteSource Webinar-New Research Reveals Key Strategy to Manage Open Source S...
PDF
Open Source Security for Newbies - Best Practices
PPTX
Security in the Age of Open Source
PPTX
Black Duck & IBM Present: Application Security in the Age of Open Source
PPTX
Welcome & The State of Open Source Security
PPTX
Managing Open Source in Application Security and Software Development Lifecycle
PDF
Open Source Security: How to Lay the Groundwork for a Secure Culture
PDF
OWF14 - Plenary Session : David Jones, Chief Solutions Architect, Sonatype
PPTX
A question of trust - understanding Open Source risks
PPTX
DevSecCon London 2017: when good containers go bad by Tim Mackey
PDF
Sonatype's 2013 OSS Software Survey
PDF
White Paper: 7 Security Gaps in the Neglected 90% of your Applications
PDF
Myths and Misperceptions of Open Source Security
PPTX
Open Source 360 Survey Results
PPTX
September 13, 2016: Security in the Age of Open Source:
PPTX
Security in the age of open source - Myths and misperceptions
PPTX
Open Source Insight: CVE-2017-2636 Vuln of the Week & UK National Cyber Secur...
PDF
Webinar–2019 Open Source Risk Analysis Report
PPTX
Shifting the conversation from active interception to proactive neutralization
OSSF 2018 - David habusha of Whitesource - Open Source Vulnerabilities 101
WhiteSource Webinar-New Research Reveals Key Strategy to Manage Open Source S...
Open Source Security for Newbies - Best Practices
Security in the Age of Open Source
Black Duck & IBM Present: Application Security in the Age of Open Source
Welcome & The State of Open Source Security
Managing Open Source in Application Security and Software Development Lifecycle
Open Source Security: How to Lay the Groundwork for a Secure Culture
OWF14 - Plenary Session : David Jones, Chief Solutions Architect, Sonatype
A question of trust - understanding Open Source risks
DevSecCon London 2017: when good containers go bad by Tim Mackey
Sonatype's 2013 OSS Software Survey
White Paper: 7 Security Gaps in the Neglected 90% of your Applications
Myths and Misperceptions of Open Source Security
Open Source 360 Survey Results
September 13, 2016: Security in the Age of Open Source:
Security in the age of open source - Myths and misperceptions
Open Source Insight: CVE-2017-2636 Vuln of the Week & UK National Cyber Secur...
Webinar–2019 Open Source Risk Analysis Report
Shifting the conversation from active interception to proactive neutralization
Ad

More from WhiteSource (15)

PDF
Securing Container-Based Applications at the Speed of DevOps
PDF
Deep Dive into Container Security
PDF
Fire alarms vs. Fire hoses: Keeping up with Dependencies
PDF
DevSecOps: Closing the Loop from Detection to Remediation
PDF
Barriers to Container Security and How to Overcome Them
PDF
SAST (Static Application Security Testing) vs. SCA (Software Composition Anal...
PDF
From Zero To Hero: Continuous Container Security in 4 Simple Steps- A WhiteSo...
PPTX
The Devops Challenge: Open Source Security Throughout the DevOps Pipline- A W...
PPTX
Automating Open Source Security: A SANS Review of WhiteSource
PDF
Top Open Source Licenses Explained
PPTX
WhiteSource Webinar What's New With WhiteSource in December 2018
PDF
Find Out What's New With WhiteSource September 2018- A WhiteSource Webinar
PPTX
Find Out What's New With WhiteSource May 2018- A WhiteSource Webinar
PPTX
Strategies for Improving Enterprise Application Security - a WhiteSource Webinar
PPTX
How temenos manages open source use, the easy way combined
Securing Container-Based Applications at the Speed of DevOps
Deep Dive into Container Security
Fire alarms vs. Fire hoses: Keeping up with Dependencies
DevSecOps: Closing the Loop from Detection to Remediation
Barriers to Container Security and How to Overcome Them
SAST (Static Application Security Testing) vs. SCA (Software Composition Anal...
From Zero To Hero: Continuous Container Security in 4 Simple Steps- A WhiteSo...
The Devops Challenge: Open Source Security Throughout the DevOps Pipline- A W...
Automating Open Source Security: A SANS Review of WhiteSource
Top Open Source Licenses Explained
WhiteSource Webinar What's New With WhiteSource in December 2018
Find Out What's New With WhiteSource September 2018- A WhiteSource Webinar
Find Out What's New With WhiteSource May 2018- A WhiteSource Webinar
Strategies for Improving Enterprise Application Security - a WhiteSource Webinar
How temenos manages open source use, the easy way combined

Recently uploaded (20)

PDF
How Creative Agencies Leverage Project Management Software.pdf
PDF
EN-Survey-Report-SAP-LeanIX-EA-Insights-2025.pdf
PDF
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
PDF
wealthsignaloriginal-com-DS-text-... (1).pdf
PPTX
CHAPTER 2 - PM Management and IT Context
PDF
Design an Analysis of Algorithms II-SECS-1021-03
PDF
System and Network Administraation Chapter 3
PDF
Wondershare Filmora 15 Crack With Activation Key [2025
PDF
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
PPTX
Odoo POS Development Services by CandidRoot Solutions
PDF
Odoo Companies in India – Driving Business Transformation.pdf
PDF
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
PDF
PTS Company Brochure 2025 (1).pdf.......
PPTX
Lecture 3: Operating Systems Introduction to Computer Hardware Systems
PDF
Audit Checklist Design Aligning with ISO, IATF, and Industry Standards — Omne...
PDF
How to Choose the Right IT Partner for Your Business in Malaysia
PPTX
ai tools demonstartion for schools and inter college
PDF
System and Network Administration Chapter 2
PPTX
Reimagine Home Health with the Power of Agentic AI​
PDF
2025 Textile ERP Trends: SAP, Odoo & Oracle
How Creative Agencies Leverage Project Management Software.pdf
EN-Survey-Report-SAP-LeanIX-EA-Insights-2025.pdf
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
wealthsignaloriginal-com-DS-text-... (1).pdf
CHAPTER 2 - PM Management and IT Context
Design an Analysis of Algorithms II-SECS-1021-03
System and Network Administraation Chapter 3
Wondershare Filmora 15 Crack With Activation Key [2025
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
Odoo POS Development Services by CandidRoot Solutions
Odoo Companies in India – Driving Business Transformation.pdf
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
PTS Company Brochure 2025 (1).pdf.......
Lecture 3: Operating Systems Introduction to Computer Hardware Systems
Audit Checklist Design Aligning with ISO, IATF, and Industry Standards — Omne...
How to Choose the Right IT Partner for Your Business in Malaysia
ai tools demonstartion for schools and inter college
System and Network Administration Chapter 2
Reimagine Home Health with the Power of Agentic AI​
2025 Textile ERP Trends: SAP, Odoo & Oracle

Tackling the Risks of Open Source Security: 5 Things You Need to Know

  • 1. Tackling the Risks of Open Source Security 5 Things You Need to Know 1 Sharon Sharlin, Product Marketing Manager
  • 2. 2 5 Things To Know About Open Source Security 01 Open Source Risk Is On The Rise 03 Prioritize Security Vulnerabilities 02 It’s Time To Change Your Mindset 04 Delegate Security Responsibilities 05 Shift Left Is At Its Best With Open Source
  • 4. 4 Are You Spending Enough In AppSec? The Level of Risk (# of Breaches Multiplied By Severeness) The Level of Annual Spending (Investment) in IT Security Gaps in Security Risks and the Allocation of Spending Source: Ponemon Institute: The Increasing Risk to Enterprise Applications
  • 5. Open Source Components Account For 60%-80% Of The Average Software Product 5%-10% 1998 30%-50% 2008 60%-80% 2018 Proprietary Code Open Source Code Source: North Bridge Future Of Open Source Survey Open Source Code Proprietary Code
  • 6. 96.8% of developers rely on open source components Frequency of Use of Open Source Components
  • 7. The Number of Reported Vulnerabilities is Rising
  • 8. 8 02 It’s Time To Change Your Mindset
  • 9. Potential vulnerability detected (SAST & DAST) No public information Need to research to find a fix During development Detection Publicity Remediation Scan Phase Known vulnerability All information is publicly available Actionable remediation(s) are available Continuous monitoring (incl. post release) PROPRIETARY VULNERABILITIES OPEN SOURCE VULNERABILITIES Open Source Security is a Different Game It’s time to change your mindset
  • 11. DEVELOPERS ARE NOT EFFICIENTLY MANAGING OPEN SOURCE VULNERABILITIES How much time is spent? hours/month None 1 - 10 hours 11 - 20 hours 21 - 35 hours 36 - 60 hours Over 60 hours 15 spent on average by every developer on security vulnerabilities Developers Are Investing Too Much Time On Vulnerabilities Assessment and Remediation 3.8 hours/month spent on security vulnerabilities remediation
  • 12. EFFECTIVE VULNERABILITY INEFFECTIVE VULNERABILITY Vulnerability Effectiveness: a novel approach to prioritization Prioritization Is Key To Save Wasted Time On Vulnerabilities Management
  • 13. 13 After testing 2,000 Java applications, WhiteSource found that 85% of all detected vulnerabilities were deemed ineffective.
  • 15. 15 Bridging the Gap is a Must Security DevOps Developers
  • 16. 16 05 Shift Left Is At Its Best With Open Source.
  • 17. 17 Turn Developers Into Security Advocates Empower developers with more flexible selection and approval processes Project Planning Requirements Definition Design Development Integration & Test Installation & Acceptance
  • 18. 18 Organizations of all sizes are shifting their operational security to software development teams Who owns security in your organization, by company size?
  • 19. 19 The impact of developers taking over security is: Integrating security tools earlier in the SDLC of developers are taking action towards application testing on build stage or before. 66% In what stage of the SDLC do you spend most of your time implementing security measures?
  • 20. 20 The cost of fixing security and quality issues is rising significantly, as the development cycle advances. Coding $80/Defect Build $240/Defect QA & Security $960/Defect Production $7,600/Defect Detect Issues As Early As Possible
  • 21. 21 Detect Issues As Early As Possible - Shift Left The cost of fixing security and quality issues is rising significantly, as the development cycle advances.
  • 22. 22 Analyze and prioritize open source security vulnerability remediation Streamline policies with better integration options Shift-left security processes to establish better practices