SlideShare ist ein Scribd-Unternehmen logo
1 von 25
Downloaden Sie, um offline zu lesen
Session ID:
Session Classification:
Jacob West
Chief Technology Officer
HP Enterprise Security
Products
STU-R35A
Intermediate
Who, What, Where,
How: Five Big
Questions in Mobile
Security
Why is mobile security an imperative?
Who will be held accountable?
What platform strategy makes sense?
Where are mobile apps developed?
How do we build secure mobile apps?
Why is mobile
security an
imperative?
Mobile Devices are Taking
Over
12/12 KPCB Trend Report
Mobile Internet Usage
Surpassing Desktop
12/12 KPCB Trend Report
► By 2015, mobile dev projects
targeting smartphones and
tablets will outnumber native
PC projects by a ratio of 4:1
– Gartner 7/12
► By 2016, > 50 percent of
enterprise email users will rely
primarily web or mobile.
–
Gartner 12/11
Not Just for Consumers
0
10
20
30
40
50
60
% of Workforce with
Smartphones
2011
2012
2013
Who will be held
accountable?
What is Mobile?
server
network
device
os
apps
Who Cares?
App
Owners
Device
Builders
Network
Providers
App
Developers
OS
Authors
Who Will Users Hold Accountable?
What platform
strategy makes
sense?
► Web, native, hybrid
► Operating systems
► Developer support
► Application delivery
► Programming language
Platform Tradeoffs
► Native mobile applications
► Persistent
► Hardware support
► Flexible
► Mobile-optimized web apps
► Lightweight
► Multi-platform
► Bolt onto legacy apps
► Hybrid?
► Native container for web content
► Cross-compiled native apps
Web Versus Native
80% by 2015
– Gartner 11/12
► Open app store model (Google Marketplace)
► Enterprise app stores
► Security as a differentiator
► Researcher access?
► Closed app store model (Apple App Store)
► Controlled ecosystem
► Revocation capability
► Compromise: Apple's iOS Developer Enterprise Program
Application Delivery
► Objective-C
► Little-known pre-iOS
► ‘Unsafe’ language
► Limited tool support
► Java
► Widely-known
► No more buffer overflows
► Better tool support
Native Programming
Languages
Where are mobile
apps developed?
► In-house
► Traditional outsourcers
► Boutique firms
Mobile Development
Pros
► Leverage investments
► Easier integration
► Control over full SDLC
In-House Development
Cons
► Must train resources
► Add-ons may add risk
► Hard to outsource
security
Pros
► Well-known
expectations
► Expand on experience
► Control over SDLC
Traditional Outsourcers
Cons
► Harder to find talent
► Add-ons may add risk
► Outsourcing security
(but not accountability)
Pros
► Specialized talent
► Accelerated delivery
► Low-investment for
high-quality result
Boutique Firms
Cons
► Lack of security maturity
► Difficult integration
► Little influence over
SDLC
How do we build
secure mobile apps?
Same Ol’ Server
Operations Software
Information
Explore Accelerate Optimize
Software Security Assurance
Journey
Reactive – Assessing and
remediating code
• Security team alone
responsible for security
• Small set of programs
• Addressing software
security after-the-fact
• High IT value
In Place – Software security
required before production
• Security team works with
Development on security
• All critical software secure
• Solving software security
during development
• High business value
Proactive – Instilling best
practices into future code
• Development takes over
responsibility for security
• All enterprise software
embedding security into
software development
lifecycle (SDLC)
• High strategic value
► Real data from (51) real initiatives
► 95 measurements
► 13 repeat measurements
► McGraw, Migues, & West
www.bsimm.com
Inspiration from the Industry:
BSIMM4
Parting Thoughts
► What do your apps do and for whom?
► What platform(s) do your apps support and
how?
► Who develops your apps and where?
► Is there an existing SDL for other development?
► Do you rely on platform providers or app
distributors for any security assurance?
► Are mobile apps prompting back-end changes?
More Questions to Ask

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

Open Source Security - It can be done easily.
Open Source Security - It can be done easily.Open Source Security - It can be done easily.
Open Source Security - It can be done easily.
 
Outpost24 webinar - A day in the life of an information security professional
Outpost24 webinar - A day in the life of an information security professional Outpost24 webinar - A day in the life of an information security professional
Outpost24 webinar - A day in the life of an information security professional
 
Secure Software Development Lifecycle
Secure Software Development LifecycleSecure Software Development Lifecycle
Secure Software Development Lifecycle
 
BSIMM: Bringing Science to Software Security
BSIMM: Bringing Science to Software SecurityBSIMM: Bringing Science to Software Security
BSIMM: Bringing Science to Software Security
 
Get Your Board to Say "Yes" to a BSIMM Assessment
Get Your Board to Say "Yes" to a BSIMM AssessmentGet Your Board to Say "Yes" to a BSIMM Assessment
Get Your Board to Say "Yes" to a BSIMM Assessment
 
Basic of SSDLC
Basic of SSDLCBasic of SSDLC
Basic of SSDLC
 
Dmitriy Desyatkov "Secure SDLC or Security Culture to be or not to be"
Dmitriy Desyatkov "Secure SDLC or Security Culture to be or not to be"Dmitriy Desyatkov "Secure SDLC or Security Culture to be or not to be"
Dmitriy Desyatkov "Secure SDLC or Security Culture to be or not to be"
 
Jack Nichelson - Information Security Metrics - Practical Security Metrics
Jack Nichelson - Information Security Metrics - Practical Security MetricsJack Nichelson - Information Security Metrics - Practical Security Metrics
Jack Nichelson - Information Security Metrics - Practical Security Metrics
 
Cyber security - It starts with the embedded system
Cyber security - It starts with the embedded systemCyber security - It starts with the embedded system
Cyber security - It starts with the embedded system
 
The State of Open Source Vulnerabilities Management
The State of Open Source Vulnerabilities ManagementThe State of Open Source Vulnerabilities Management
The State of Open Source Vulnerabilities Management
 
Outpost24 webinar - The new CISO imperative: connecting technical vulnerabili...
Outpost24 webinar - The new CISO imperative: connecting technical vulnerabili...Outpost24 webinar - The new CISO imperative: connecting technical vulnerabili...
Outpost24 webinar - The new CISO imperative: connecting technical vulnerabili...
 
How to Choose the Right Security Training for You
How to Choose the Right Security Training for YouHow to Choose the Right Security Training for You
How to Choose the Right Security Training for You
 
DevOps Night - Shifting Security to the Left - SCTV Tower - 19 September 2018
DevOps Night - Shifting Security to the Left - SCTV Tower - 19 September 2018DevOps Night - Shifting Security to the Left - SCTV Tower - 19 September 2018
DevOps Night - Shifting Security to the Left - SCTV Tower - 19 September 2018
 
Getting Executive Support for a Software Security Program
Getting Executive Support for a Software Security ProgramGetting Executive Support for a Software Security Program
Getting Executive Support for a Software Security Program
 
Protecting endpoints from targeted attacks
Protecting endpoints from targeted attacksProtecting endpoints from targeted attacks
Protecting endpoints from targeted attacks
 
Are Agile And Secure Development Mutually Exclusive?
Are Agile And Secure Development Mutually Exclusive?Are Agile And Secure Development Mutually Exclusive?
Are Agile And Secure Development Mutually Exclusive?
 
The Path to Proactive Application Security
The Path to Proactive Application SecurityThe Path to Proactive Application Security
The Path to Proactive Application Security
 
Deploying Secure Modern Apps in Evolving Infrastructures
Deploying Secure Modern Apps in Evolving InfrastructuresDeploying Secure Modern Apps in Evolving Infrastructures
Deploying Secure Modern Apps in Evolving Infrastructures
 
What’s making way for secure sdlc
What’s making way for secure sdlcWhat’s making way for secure sdlc
What’s making way for secure sdlc
 
Outpost24 webinar - Improve your organizations security with red teaming
Outpost24 webinar - Improve your organizations security with red teamingOutpost24 webinar - Improve your organizations security with red teaming
Outpost24 webinar - Improve your organizations security with red teaming
 

Ähnlich wie Stu r35 a

Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
VictoriaChavesta
 
SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)
Norm Barber
 
Veracode Corporate Overview - Print
Veracode Corporate Overview - PrintVeracode Corporate Overview - Print
Veracode Corporate Overview - Print
Andrew Kanikuru
 
Appendix AOperating ScenarioGPSCDU Project for Wild B.docx
Appendix AOperating ScenarioGPSCDU Project for Wild B.docxAppendix AOperating ScenarioGPSCDU Project for Wild B.docx
Appendix AOperating ScenarioGPSCDU Project for Wild B.docx
lisandrai1k
 
reStartEvents DC metro & Beyond 11:17 Employer Directory.pdf
reStartEvents DC metro & Beyond 11:17 Employer Directory.pdfreStartEvents DC metro & Beyond 11:17 Employer Directory.pdf
reStartEvents DC metro & Beyond 11:17 Employer Directory.pdf
Ken Fuller
 
Kaspars Petersons - BYOD - more like BYOP
Kaspars Petersons -  BYOD - more like BYOPKaspars Petersons -  BYOD - more like BYOP
Kaspars Petersons - BYOD - more like BYOP
DevConFu
 
HP2065_TieCon_Presentation_V7
HP2065_TieCon_Presentation_V7HP2065_TieCon_Presentation_V7
HP2065_TieCon_Presentation_V7
Mark Interrante
 

Ähnlich wie Stu r35 a (20)

Security is our duty and we shall deliver it - White Paper
Security is our duty and we shall deliver it - White PaperSecurity is our duty and we shall deliver it - White Paper
Security is our duty and we shall deliver it - White Paper
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
 
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptxEmphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
 
SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)
 
Journey to the Perfect Application: Digital Transformation During a Crisis
Journey to the Perfect Application: Digital Transformation During a CrisisJourney to the Perfect Application: Digital Transformation During a Crisis
Journey to the Perfect Application: Digital Transformation During a Crisis
 
Application Hackers Have A Handbook. Why Shouldn't You?
Application Hackers Have A Handbook. Why Shouldn't You?Application Hackers Have A Handbook. Why Shouldn't You?
Application Hackers Have A Handbook. Why Shouldn't You?
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
 
Synopsys Security Event Israel Presentation: Keynote: Securing Your Software,...
Synopsys Security Event Israel Presentation: Keynote: Securing Your Software,...Synopsys Security Event Israel Presentation: Keynote: Securing Your Software,...
Synopsys Security Event Israel Presentation: Keynote: Securing Your Software,...
 
Veracode Corporate Overview - Print
Veracode Corporate Overview - PrintVeracode Corporate Overview - Print
Veracode Corporate Overview - Print
 
Appendix AOperating ScenarioGPSCDU Project for Wild B.docx
Appendix AOperating ScenarioGPSCDU Project for Wild B.docxAppendix AOperating ScenarioGPSCDU Project for Wild B.docx
Appendix AOperating ScenarioGPSCDU Project for Wild B.docx
 
reStartEvents DC metro & Beyond 11:17 Employer Directory.pdf
reStartEvents DC metro & Beyond 11:17 Employer Directory.pdfreStartEvents DC metro & Beyond 11:17 Employer Directory.pdf
reStartEvents DC metro & Beyond 11:17 Employer Directory.pdf
 
SCS DevSecOps Seminar - State of DevSecOps
SCS DevSecOps Seminar - State of DevSecOpsSCS DevSecOps Seminar - State of DevSecOps
SCS DevSecOps Seminar - State of DevSecOps
 
Fortify Continuous Delivery
Fortify Continuous DeliveryFortify Continuous Delivery
Fortify Continuous Delivery
 
Outpost24 Webinar - Creating a sustainable application security program to dr...
Outpost24 Webinar - Creating a sustainable application security program to dr...Outpost24 Webinar - Creating a sustainable application security program to dr...
Outpost24 Webinar - Creating a sustainable application security program to dr...
 
It's Behind You! Managing Insider Threats to Digital Security with RES Software
It's Behind You! Managing Insider Threats to Digital Security with RES SoftwareIt's Behind You! Managing Insider Threats to Digital Security with RES Software
It's Behind You! Managing Insider Threats to Digital Security with RES Software
 
Kaspars Petersons - BYOD - more like BYOP
Kaspars Petersons -  BYOD - more like BYOPKaspars Petersons -  BYOD - more like BYOP
Kaspars Petersons - BYOD - more like BYOP
 
Cyber Warfare e scenari di mercato
Cyber Warfare e scenari di mercatoCyber Warfare e scenari di mercato
Cyber Warfare e scenari di mercato
 
Best Practices for a Mature Application Security Program Webinar - February 2016
Best Practices for a Mature Application Security Program Webinar - February 2016Best Practices for a Mature Application Security Program Webinar - February 2016
Best Practices for a Mature Application Security Program Webinar - February 2016
 
HP2065_TieCon_Presentation_V7
HP2065_TieCon_Presentation_V7HP2065_TieCon_Presentation_V7
HP2065_TieCon_Presentation_V7
 

Mehr von SelectedPresentations

Mehr von SelectedPresentations (20)

Длительное архивное хранение ЭД: правовые аспекты и технологические решения
Длительное архивное хранение ЭД: правовые аспекты и технологические решенияДлительное архивное хранение ЭД: правовые аспекты и технологические решения
Длительное архивное хранение ЭД: правовые аспекты и технологические решения
 
Трансграничное пространство доверия. Доверенная третья сторона.
Трансграничное пространство доверия. Доверенная третья сторона.Трансграничное пространство доверия. Доверенная третья сторона.
Трансграничное пространство доверия. Доверенная третья сторона.
 
Варианты реализации атак через мобильные устройства
Варианты реализации атак через мобильные устройстваВарианты реализации атак через мобильные устройства
Варианты реализации атак через мобильные устройства
 
Новые технологические возможности и безопасность мобильных решений
Новые технологические возможности и безопасность мобильных решенийНовые технологические возможности и безопасность мобильных решений
Новые технологические возможности и безопасность мобильных решений
 
Управление безопасностью мобильных устройств
Управление безопасностью мобильных устройствУправление безопасностью мобильных устройств
Управление безопасностью мобильных устройств
 
Современные технологии контроля и защиты мобильных устройств, тенденции рынка...
Современные технологии контроля и защиты мобильных устройств, тенденции рынка...Современные технологии контроля и защиты мобильных устройств, тенденции рынка...
Современные технологии контроля и защиты мобильных устройств, тенденции рынка...
 
Кадровое агентство отрасли информационной безопасности
Кадровое агентство отрасли информационной безопасностиКадровое агентство отрасли информационной безопасности
Кадровое агентство отрасли информационной безопасности
 
Основное содержание профессионального стандарта «Специалист по безопасности и...
Основное содержание профессионального стандарта «Специалист по безопасности и...Основное содержание профессионального стандарта «Специалист по безопасности и...
Основное содержание профессионального стандарта «Специалист по безопасности и...
 
Основное содержание профессионального стандарта «Специалист по безопасности а...
Основное содержание профессионального стандарта «Специалист по безопасности а...Основное содержание профессионального стандарта «Специалист по безопасности а...
Основное содержание профессионального стандарта «Специалист по безопасности а...
 
Основное содержание профессионального стандарта «Специалист по технической за...
Основное содержание профессионального стандарта «Специалист по технической за...Основное содержание профессионального стандарта «Специалист по технической за...
Основное содержание профессионального стандарта «Специалист по технической за...
 
Основное содержание профессионального стандарта «Специалист по безопасности т...
Основное содержание профессионального стандарта «Специалист по безопасности т...Основное содержание профессионального стандарта «Специалист по безопасности т...
Основное содержание профессионального стандарта «Специалист по безопасности т...
 
О профессиональных стандартах по группе занятий (профессий) «Специалисты в об...
О профессиональных стандартах по группе занятий (профессий) «Специалисты в об...О профессиональных стандартах по группе занятий (профессий) «Специалисты в об...
О профессиональных стандартах по группе занятий (профессий) «Специалисты в об...
 
Запись активности пользователей с интеллектуальным анализом данных
Запись активности пользователей с интеллектуальным анализом данныхЗапись активности пользователей с интеллектуальным анализом данных
Запись активности пользователей с интеллектуальным анализом данных
 
Импортозамещение в системах ИБ банков. Практические аспекты перехода на росси...
Импортозамещение в системах ИБ банков. Практические аспекты перехода на росси...Импортозамещение в системах ИБ банков. Практические аспекты перехода на росси...
Импортозамещение в системах ИБ банков. Практические аспекты перехода на росси...
 
Обеспечение защиты информации на стадиях жизненного цикла ИС
Обеспечение защиты информации на стадиях жизненного цикла ИСОбеспечение защиты информации на стадиях жизненного цикла ИС
Обеспечение защиты информации на стадиях жизненного цикла ИС
 
Документ, как средство защиты: ОРД как основа обеспечения ИБ
Документ, как средство защиты: ОРД как основа обеспечения ИБДокумент, как средство защиты: ОРД как основа обеспечения ИБ
Документ, как средство защиты: ОРД как основа обеспечения ИБ
 
Чего не хватает в современных ids для защиты банковских приложений
Чего не хватает в современных ids для защиты банковских приложенийЧего не хватает в современных ids для защиты банковских приложений
Чего не хватает в современных ids для защиты банковских приложений
 
Об участии МОО «АЗИ» в разработке профессиональных стандартов в области инфор...
Об участии МОО «АЗИ» в разработке профессиональных стандартов в области инфор...Об участии МОО «АЗИ» в разработке профессиональных стандартов в области инфор...
Об участии МОО «АЗИ» в разработке профессиональных стандартов в области инфор...
 
Оценка состояния, меры формирования индустрии информационной безопасности Рос...
Оценка состояния, меры формирования индустрии информационной безопасности Рос...Оценка состояния, меры формирования индустрии информационной безопасности Рос...
Оценка состояния, меры формирования индустрии информационной безопасности Рос...
 
Об угрозах информационной безопасности, актуальных для разработчика СЗИ
Об угрозах информационной безопасности, актуальных для разработчика СЗИОб угрозах информационной безопасности, актуальных для разработчика СЗИ
Об угрозах информационной безопасности, актуальных для разработчика СЗИ
 

Stu r35 a

  • 1. Session ID: Session Classification: Jacob West Chief Technology Officer HP Enterprise Security Products STU-R35A Intermediate Who, What, Where, How: Five Big Questions in Mobile Security
  • 2. Why is mobile security an imperative? Who will be held accountable? What platform strategy makes sense? Where are mobile apps developed? How do we build secure mobile apps?
  • 3. Why is mobile security an imperative?
  • 4. Mobile Devices are Taking Over 12/12 KPCB Trend Report
  • 5. Mobile Internet Usage Surpassing Desktop 12/12 KPCB Trend Report
  • 6. ► By 2015, mobile dev projects targeting smartphones and tablets will outnumber native PC projects by a ratio of 4:1 – Gartner 7/12 ► By 2016, > 50 percent of enterprise email users will rely primarily web or mobile. – Gartner 12/11 Not Just for Consumers 0 10 20 30 40 50 60 % of Workforce with Smartphones 2011 2012 2013
  • 7. Who will be held accountable?
  • 11. ► Web, native, hybrid ► Operating systems ► Developer support ► Application delivery ► Programming language Platform Tradeoffs
  • 12. ► Native mobile applications ► Persistent ► Hardware support ► Flexible ► Mobile-optimized web apps ► Lightweight ► Multi-platform ► Bolt onto legacy apps ► Hybrid? ► Native container for web content ► Cross-compiled native apps Web Versus Native 80% by 2015 – Gartner 11/12
  • 13. ► Open app store model (Google Marketplace) ► Enterprise app stores ► Security as a differentiator ► Researcher access? ► Closed app store model (Apple App Store) ► Controlled ecosystem ► Revocation capability ► Compromise: Apple's iOS Developer Enterprise Program Application Delivery
  • 14. ► Objective-C ► Little-known pre-iOS ► ‘Unsafe’ language ► Limited tool support ► Java ► Widely-known ► No more buffer overflows ► Better tool support Native Programming Languages
  • 15. Where are mobile apps developed?
  • 16. ► In-house ► Traditional outsourcers ► Boutique firms Mobile Development
  • 17. Pros ► Leverage investments ► Easier integration ► Control over full SDLC In-House Development Cons ► Must train resources ► Add-ons may add risk ► Hard to outsource security
  • 18. Pros ► Well-known expectations ► Expand on experience ► Control over SDLC Traditional Outsourcers Cons ► Harder to find talent ► Add-ons may add risk ► Outsourcing security (but not accountability)
  • 19. Pros ► Specialized talent ► Accelerated delivery ► Low-investment for high-quality result Boutique Firms Cons ► Lack of security maturity ► Difficult integration ► Little influence over SDLC
  • 20. How do we build secure mobile apps?
  • 21. Same Ol’ Server Operations Software Information
  • 22. Explore Accelerate Optimize Software Security Assurance Journey Reactive – Assessing and remediating code • Security team alone responsible for security • Small set of programs • Addressing software security after-the-fact • High IT value In Place – Software security required before production • Security team works with Development on security • All critical software secure • Solving software security during development • High business value Proactive – Instilling best practices into future code • Development takes over responsibility for security • All enterprise software embedding security into software development lifecycle (SDLC) • High strategic value
  • 23. ► Real data from (51) real initiatives ► 95 measurements ► 13 repeat measurements ► McGraw, Migues, & West www.bsimm.com Inspiration from the Industry: BSIMM4
  • 25. ► What do your apps do and for whom? ► What platform(s) do your apps support and how? ► Who develops your apps and where? ► Is there an existing SDL for other development? ► Do you rely on platform providers or app distributors for any security assurance? ► Are mobile apps prompting back-end changes? More Questions to Ask