SlideShare a Scribd company logo
DESIGN
CHECK YOUR ABILITY TO DETECT & PATCH FASTER
TRADITIONAL FIXES ARE TOO SLOW
$7 MILLION
Average cost of
a data breach
in the US
95%Percentage of web app
breaches that were
financially motivated
4 – 5X
Cost to fix an error
found after product
release vs. during design
100X
Cost to fix an error identified
in maintenance vs. design phase
<30%Percentage of organizations
satisfied with the speed of
repairing vulnerabilities
55 DAYSAverage time it takes
organizations to patch
their systems
6 DAYS
LEARN MORE AT QUALYS.COM/ONECLICK
INSTALL PATCH
Average time for exploit
code to be released to
the public
Can you quickly and accurately scan thousands
of web applications and APIs?
Do you have the capability
to immediately apply
virtual patches for
detected vulnerabilities?
Can your web app scanning
solution scale across
browser-based, mobile
and IoT services?
Can your web app patching
solution simulate attacks
to verify protection is in effect?
Can you detect and patch vulnerabilities
early on in the app development cycle?
SOURCES
Ponemon 2016 Cost of Data Breach Study
Verizon 2016 Data Breach Investigation Report
SANS 2016 State of Application Security Report
OWASP Virtual Patching Best Practices
IBM Systems Sciences Institute
BUSINESS IMPACT
$$$$$$$$
$$$$$$$$
$$$$$$$$
1X 6.5X
15X
100X
Design
Phase/Stage of the S/W Development in Which the Defect is Found
0
20
40
60
80
100
120
Implementation Testing Maintenance
IDENTIFY V
U
LNERABILITYPATCH
D
EVELOPMENTTESTPAT
CH
DEPLOYPATCH
SC
AN/ASSESS
ACCESS DENIED!!
INITIATION
PLANNING
TECHNICAL
ANALYSIS DEVELOPMENT
QA
RELEASE
SECURITY
WEB APP ATTACKS
STATS & REMEDIATION

More Related Content

PPTX
How to Rapidly Identify Assets at Risk to WannaCry Ransomware
PPTX
Automating Critical Security Controls for Threat Remediation and Compliance
PPTX
Webcast Series #1: Continuous Security and Compliance Monitoring for Global I...
PDF
Security Whack-a-Mole: SANS 2017 Threat Landscape Survey
PPTX
Securing Your Public Cloud Infrastructure
PPTX
Improve Situational Awareness for Federal Government with AlienVault USM
PPTX
AWS Security Best Practices for Effective Threat Detection & Response
PPTX
How Malware Works
How to Rapidly Identify Assets at Risk to WannaCry Ransomware
Automating Critical Security Controls for Threat Remediation and Compliance
Webcast Series #1: Continuous Security and Compliance Monitoring for Global I...
Security Whack-a-Mole: SANS 2017 Threat Landscape Survey
Securing Your Public Cloud Infrastructure
Improve Situational Awareness for Federal Government with AlienVault USM
AWS Security Best Practices for Effective Threat Detection & Response
How Malware Works

What's hot (20)

PPTX
IDS for Security Analysts: How to Get Actionable Insights from your IDS
PDF
Next Dimension and Veeam | Solutions for PIPEDA Compliance
PPTX
Incident response live demo slides final
PPTX
Creating Correlation Rules in AlienVault
PPTX
Simplify PCI DSS Compliance with AlienVault USM
PPTX
Using a Network Model to Address SANS Critical Controls 10 and 11
PDF
Top Application Security Threats
PDF
Disaster recovery glossary
PPTX
Anatomy of an Attack - Sophos Day Belux 2014
PPTX
Solnet dev secops meetup
PDF
Cloud Security Myths Vs Facts
PPTX
Equifax Breach Postmortem
PDF
Security Implications of the Cloud - CSS ATX 2017
PPTX
Improve Threat Detection with OSSEC and AlienVault USM
PDF
Kofax Document Security
PPTX
Improve Security Visibility with AlienVault USM Correlation Directives
PDF
Open Source IDS Tools: A Beginner's Guide
PDF
Outpost24 webinar: Security Analytics: what's in a risk score
PDF
Security Starts at the Endpoint
PDF
The Intersection of Security & DevOps
IDS for Security Analysts: How to Get Actionable Insights from your IDS
Next Dimension and Veeam | Solutions for PIPEDA Compliance
Incident response live demo slides final
Creating Correlation Rules in AlienVault
Simplify PCI DSS Compliance with AlienVault USM
Using a Network Model to Address SANS Critical Controls 10 and 11
Top Application Security Threats
Disaster recovery glossary
Anatomy of an Attack - Sophos Day Belux 2014
Solnet dev secops meetup
Cloud Security Myths Vs Facts
Equifax Breach Postmortem
Security Implications of the Cloud - CSS ATX 2017
Improve Threat Detection with OSSEC and AlienVault USM
Kofax Document Security
Improve Security Visibility with AlienVault USM Correlation Directives
Open Source IDS Tools: A Beginner's Guide
Outpost24 webinar: Security Analytics: what's in a risk score
Security Starts at the Endpoint
The Intersection of Security & DevOps
Ad

Similar to Web App Attacks - Stats & Remediation (20)

PPTX
Digital Product Security
PDF
Ensure a Secure Shopping Experience with Oracle Security Testing.pdf
PDF
Service now vulnerability patching_move
PDF
Remediation Statistics: What Does Fixing Application Vulnerabilities Cost?
PPTX
Agile and Secure Development
PDF
Web Application Security - Everything You Should Know
PDF
Dan Cornell - The Real Cost of Software Remediation
PDF
Real Cost of Software Remediation
PDF
Using ThreadFix to Manage Application Vulnerabilities
PPTX
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
PDF
The State of Application Security: What Hackers Break
PDF
The State of Application Security: What Hackers Break
PDF
Cost-effective approach to full-cycle vulnerability management
PDF
Faster Secure Software Development with Continuous Deployment - PH Days 2013
PDF
Eliminate the 49% of Documents that Contain Data Breaches Webinar
PPTX
Security Services and Approach by Nazar Tymoshyk
PDF
World best web apps security and Active detection of malicious link
PPTX
Best Security Practices for a Web Application
PDF
The Most Important Thing: How Mozilla Does Security and What You Can Steal
Digital Product Security
Ensure a Secure Shopping Experience with Oracle Security Testing.pdf
Service now vulnerability patching_move
Remediation Statistics: What Does Fixing Application Vulnerabilities Cost?
Agile and Secure Development
Web Application Security - Everything You Should Know
Dan Cornell - The Real Cost of Software Remediation
Real Cost of Software Remediation
Using ThreadFix to Manage Application Vulnerabilities
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
The State of Application Security: What Hackers Break
The State of Application Security: What Hackers Break
Cost-effective approach to full-cycle vulnerability management
Faster Secure Software Development with Continuous Deployment - PH Days 2013
Eliminate the 49% of Documents that Contain Data Breaches Webinar
Security Services and Approach by Nazar Tymoshyk
World best web apps security and Active detection of malicious link
Best Security Practices for a Web Application
The Most Important Thing: How Mozilla Does Security and What You Can Steal
Ad

Recently uploaded (20)

PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Approach and Philosophy of On baking technology
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPT
Teaching material agriculture food technology
PDF
KodekX | Application Modernization Development
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
Understanding_Digital_Forensics_Presentation.pptx
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Approach and Philosophy of On baking technology
Reach Out and Touch Someone: Haptics and Empathic Computing
Digital-Transformation-Roadmap-for-Companies.pptx
Network Security Unit 5.pdf for BCA BBA.
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Chapter 3 Spatial Domain Image Processing.pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Per capita expenditure prediction using model stacking based on satellite ima...
Teaching material agriculture food technology
KodekX | Application Modernization Development
20250228 LYD VKU AI Blended-Learning.pptx
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
The AUB Centre for AI in Media Proposal.docx
NewMind AI Weekly Chronicles - August'25 Week I
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Understanding_Digital_Forensics_Presentation.pptx

Web App Attacks - Stats & Remediation

  • 1. DESIGN CHECK YOUR ABILITY TO DETECT & PATCH FASTER TRADITIONAL FIXES ARE TOO SLOW $7 MILLION Average cost of a data breach in the US 95%Percentage of web app breaches that were financially motivated 4 – 5X Cost to fix an error found after product release vs. during design 100X Cost to fix an error identified in maintenance vs. design phase <30%Percentage of organizations satisfied with the speed of repairing vulnerabilities 55 DAYSAverage time it takes organizations to patch their systems 6 DAYS LEARN MORE AT QUALYS.COM/ONECLICK INSTALL PATCH Average time for exploit code to be released to the public Can you quickly and accurately scan thousands of web applications and APIs? Do you have the capability to immediately apply virtual patches for detected vulnerabilities? Can your web app scanning solution scale across browser-based, mobile and IoT services? Can your web app patching solution simulate attacks to verify protection is in effect? Can you detect and patch vulnerabilities early on in the app development cycle? SOURCES Ponemon 2016 Cost of Data Breach Study Verizon 2016 Data Breach Investigation Report SANS 2016 State of Application Security Report OWASP Virtual Patching Best Practices IBM Systems Sciences Institute BUSINESS IMPACT $$$$$$$$ $$$$$$$$ $$$$$$$$ 1X 6.5X 15X 100X Design Phase/Stage of the S/W Development in Which the Defect is Found 0 20 40 60 80 100 120 Implementation Testing Maintenance IDENTIFY V U LNERABILITYPATCH D EVELOPMENTTESTPAT CH DEPLOYPATCH SC AN/ASSESS ACCESS DENIED!! INITIATION PLANNING TECHNICAL ANALYSIS DEVELOPMENT QA RELEASE SECURITY WEB APP ATTACKS STATS & REMEDIATION