SlideShare ist ein Scribd-Unternehmen logo
1 von 30
Leveraging Black Duck Hub to maximize focus
Entersekt’s approach to empowering development teams
By Philip Botha
Making the online world safer
From the Windy City…
…to the Cape Winelands
• Phishing attacks cost global organizations billions every year
• One out of 5 fraudulent transactions originate in the mobile channel
• More than 90% of mobile apps contain basic vulnerabilities
Our problem: A global authentication pandemic
LinkedIn suffers data breach
NEWS
Zeus Botnet Eurograbber Steals
$47 Million
Don’t bank on your phone – it could
be hacked by Zeus ‘trojan horse’
New vulnerabilities
reported on a weekly
basis
Successful attacks
not even making
headlines anymore
• Founded in 2008 by 5 engineering students
• One of the founders’ mother defrauded
• They wanted to do something that matters
• Not daunted by current failings of security solutions
• A novel approach with existing tech
A solution: Entersekt’s story
Going live in 2012: Nedbank as a case study
0
10
20
30
40
50
60
70
80
30-Jan…
03-Feb
07-Feb
11-Feb
15-Feb
19-Feb
23-Feb
27-Feb…
02-Mar
06-Mar
10-Mar
14-Mar
18-Mar
22-Mar
26-Mar…
30-Mar
03-Apr
07-Apr
11-Apr
15-Apr
19-Apr
23-Apr…
27-Apr
01-May
05-May
09-May
13-May
17-May
21-May…
25-May
29-May
02-Jun
06-Jun
10-Jun
14-Jun
18-Jun…
22-Jun
26-Jun
30-Jun
Attempts Fraud
Entersekt go-
live
Nedbank does not even appear on
SARS e-filing phishing site!!
A growing global footprint
Johannesbur
g
Mauritius
Atlanta
Beirut
Dubai
Lago
s
Minneapoli
s
Sydney
Amsterda
m
Cape Town
Zurich
Palo Alto
How we solved the
problem
The 4 pillars of the Entersekt approach
How phishing defeats the one time password
Out of band authentication beats phishing
Product: The Transakt model
Gartner prediction about Entersekt tech
How Black Duck
Hub makes us
better
1. Risk management
• Approved open source?
• How secure?
• Can we be diligent and agile?
2. Ability to identify open source licenses
3. Scaling
• Manual vulnerability assessment process
• Getting behind with updates
Our open source challenges
“Black Duck met Entersekt’s checklist of what we needed
in an open source vulnerability management solution
better than any other vendor.”
The obvious choice was...
1. Seamless integration and ease of
use
2. Relevant feedback
3. Earlier in the SDLC
4. Real-time and continuous monitoring
5. Automated notifications
Black Duck Hub checks the boxes
6. Easy-to-digest reports with minimal
false positives
7. Jenkins support and secure scanning
8. Code doesn’t leave intranet
9. Identify open source licenses
Black Duck Hub checks the boxes (cont.)
Getting the best
out of the Hub
1. Urgent vs important
2. Build pipeline challenges
• Jenkins jobs differ in each team/project
• Black Duck sometimes executed manually
3. No best practice/standard
4. Maintenance owner
Lessons learned
Empowering the development teams
Empowering the development teams (cont.)
Architect Evangelist
Security Evangelist
Toolsmith
1. Phased roll-out in teams
• Phase 1: Education
• Phase 2: Implement a standard pipeline
framework
• Phase 3: Hardening cycle
• Phase 4: Policy Management and Jira
integration
2. Team agreements
Empowering the development teams (cont.)
CI/CD
BUILD
Tool:
Docker/Maven
DEPLOY
•DEV
•QA
•INT
•LT
Tool: Docker
TEST
•J Unit
•Automated
Tool: Docker
Releas
e?
RELEASE
•PROD
•Release
repos
COMMIT
Tool: Git
OS SECURITY
Tool: Black Duck Hub
STATIC CODE
ANALYSIS
Tool: SonarQube
DASHBOARD
Tool: Docker
ALERTS
Tools:
Slack/email
Pull Request
Merge Master
Pipeline framework template
BUILD
Tool:
Docker/Maven
DEPLOY
•DEV
•QA
•INT
•LT
Tool: Docker
TEST
•J Unit
•Automated
Tool: Docker
Releas
e?
RELEASE
•PROD
•Release
repos
COMMIT
Tool: Git
OS SECURITY
Tool: Black Duck Hub
STATIC CODE
ANALYSIS
Tool: SonarQube
DASHBOARD
Tool: Docker
ALERTS
Tools:
Slack/email
Pull Request
Merge Master
Pipeline framework template (cont.)
A winning team
1. Trust
2. Support
3. Ownership
4. Clarity
A tool is only as good as the team
Questions and answers
Philip Botha
Engineering Excellence Manager
philip@entersekt.com
www.entersekt.com

Weitere ähnliche Inhalte

Was ist angesagt?

Making the Strategic Shift to Open Source at Fujitsu Network Communication
Making the Strategic Shift to Open Source at Fujitsu Network CommunicationMaking the Strategic Shift to Open Source at Fujitsu Network Communication
Making the Strategic Shift to Open Source at Fujitsu Network CommunicationBlack Duck by Synopsys
 
Open Source Insight: Black Duck Now Part of Synopsys, Tackling Container Secu...
Open Source Insight: Black Duck Now Part of Synopsys, Tackling Container Secu...Open Source Insight: Black Duck Now Part of Synopsys, Tackling Container Secu...
Open Source Insight: Black Duck Now Part of Synopsys, Tackling Container Secu...Black Duck by Synopsys
 
The Case for Continuous Open Source Management
The Case for Continuous Open Source ManagementThe Case for Continuous Open Source Management
The Case for Continuous Open Source ManagementBlack Duck by Synopsys
 
Managing Penetration Testing Programs and Vulnerability Time to Live with Thr...
Managing Penetration Testing Programs and Vulnerability Time to Live with Thr...Managing Penetration Testing Programs and Vulnerability Time to Live with Thr...
Managing Penetration Testing Programs and Vulnerability Time to Live with Thr...Denim Group
 
DevSecOps and the CI/CD Pipeline
 DevSecOps and the CI/CD Pipeline DevSecOps and the CI/CD Pipeline
DevSecOps and the CI/CD PipelineJames Wickett
 
Collaborative Development the Gift That Keeps on Giving
Collaborative Development  the Gift That Keeps on GivingCollaborative Development  the Gift That Keeps on Giving
Collaborative Development the Gift That Keeps on GivingBlack Duck by Synopsys
 
Leveraging Black Duck Hub to Maximize Focus - Entersekt's approach to automat...
Leveraging Black Duck Hub to Maximize Focus - Entersekt's approach to automat...Leveraging Black Duck Hub to Maximize Focus - Entersekt's approach to automat...
Leveraging Black Duck Hub to Maximize Focus - Entersekt's approach to automat...Jerika Phelps
 
Integrating Black Duck into your Agile DevOps Environment
Integrating Black Duck into your Agile DevOps EnvironmentIntegrating Black Duck into your Agile DevOps Environment
Integrating Black Duck into your Agile DevOps EnvironmentBlack Duck by Synopsys
 
Security in the age of open source - Myths and misperceptions
Security in the age of open source - Myths and misperceptionsSecurity in the age of open source - Myths and misperceptions
Security in the age of open source - Myths and misperceptionsTim Mackey
 
DevSecOps Singapore introduction
DevSecOps Singapore introductionDevSecOps Singapore introduction
DevSecOps Singapore introductionStefan Streichsbier
 
OSS has taken over the enterprise: The top five OSS trends of 2015
OSS has taken over the enterprise: The top five OSS trends of 2015OSS has taken over the enterprise: The top five OSS trends of 2015
OSS has taken over the enterprise: The top five OSS trends of 2015Rogue Wave Software
 
Top 10 Practices of Highly Successful DevOps Incident Management Teams
Top 10 Practices of Highly Successful DevOps Incident Management TeamsTop 10 Practices of Highly Successful DevOps Incident Management Teams
Top 10 Practices of Highly Successful DevOps Incident Management TeamsDeborah Schalm
 
Dos and Don'ts of DevSecOps
Dos and Don'ts of DevSecOpsDos and Don'ts of DevSecOps
Dos and Don'ts of DevSecOpsPriyanka Aash
 
Secure application deployment in the age of continuous delivery
Secure application deployment in the age of continuous deliverySecure application deployment in the age of continuous delivery
Secure application deployment in the age of continuous deliveryTim Mackey
 
Take Control: Design a Complete DevSecOps Program
Take Control: Design a Complete DevSecOps ProgramTake Control: Design a Complete DevSecOps Program
Take Control: Design a Complete DevSecOps ProgramDeborah Schalm
 
Bridging the Security Testing Gap in Your CI/CD Pipeline
Bridging the Security Testing Gap in Your CI/CD PipelineBridging the Security Testing Gap in Your CI/CD Pipeline
Bridging the Security Testing Gap in Your CI/CD PipelineDevOps.com
 
Application Asset Management with ThreadFix
 Application Asset Management with ThreadFix Application Asset Management with ThreadFix
Application Asset Management with ThreadFixDenim Group
 
Open Source and Cyber Security: Open Source Software's Role in Government Cyb...
Open Source and Cyber Security: Open Source Software's Role in Government Cyb...Open Source and Cyber Security: Open Source Software's Role in Government Cyb...
Open Source and Cyber Security: Open Source Software's Role in Government Cyb...Great Wide Open
 

Was ist angesagt? (20)

Making the Strategic Shift to Open Source at Fujitsu Network Communication
Making the Strategic Shift to Open Source at Fujitsu Network CommunicationMaking the Strategic Shift to Open Source at Fujitsu Network Communication
Making the Strategic Shift to Open Source at Fujitsu Network Communication
 
Open Source Insight: Black Duck Now Part of Synopsys, Tackling Container Secu...
Open Source Insight: Black Duck Now Part of Synopsys, Tackling Container Secu...Open Source Insight: Black Duck Now Part of Synopsys, Tackling Container Secu...
Open Source Insight: Black Duck Now Part of Synopsys, Tackling Container Secu...
 
The Case for Continuous Open Source Management
The Case for Continuous Open Source ManagementThe Case for Continuous Open Source Management
The Case for Continuous Open Source Management
 
Managing Penetration Testing Programs and Vulnerability Time to Live with Thr...
Managing Penetration Testing Programs and Vulnerability Time to Live with Thr...Managing Penetration Testing Programs and Vulnerability Time to Live with Thr...
Managing Penetration Testing Programs and Vulnerability Time to Live with Thr...
 
DevSecOps - The big picture
DevSecOps - The big pictureDevSecOps - The big picture
DevSecOps - The big picture
 
DevSecOps and the CI/CD Pipeline
 DevSecOps and the CI/CD Pipeline DevSecOps and the CI/CD Pipeline
DevSecOps and the CI/CD Pipeline
 
Collaborative Development the Gift That Keeps on Giving
Collaborative Development  the Gift That Keeps on GivingCollaborative Development  the Gift That Keeps on Giving
Collaborative Development the Gift That Keeps on Giving
 
Leveraging Black Duck Hub to Maximize Focus - Entersekt's approach to automat...
Leveraging Black Duck Hub to Maximize Focus - Entersekt's approach to automat...Leveraging Black Duck Hub to Maximize Focus - Entersekt's approach to automat...
Leveraging Black Duck Hub to Maximize Focus - Entersekt's approach to automat...
 
Integrating Black Duck into your Agile DevOps Environment
Integrating Black Duck into your Agile DevOps EnvironmentIntegrating Black Duck into your Agile DevOps Environment
Integrating Black Duck into your Agile DevOps Environment
 
Security in the age of open source - Myths and misperceptions
Security in the age of open source - Myths and misperceptionsSecurity in the age of open source - Myths and misperceptions
Security in the age of open source - Myths and misperceptions
 
DevSecOps Singapore introduction
DevSecOps Singapore introductionDevSecOps Singapore introduction
DevSecOps Singapore introduction
 
OSS has taken over the enterprise: The top five OSS trends of 2015
OSS has taken over the enterprise: The top five OSS trends of 2015OSS has taken over the enterprise: The top five OSS trends of 2015
OSS has taken over the enterprise: The top five OSS trends of 2015
 
The Future of DevSecOps
The Future of DevSecOpsThe Future of DevSecOps
The Future of DevSecOps
 
Top 10 Practices of Highly Successful DevOps Incident Management Teams
Top 10 Practices of Highly Successful DevOps Incident Management TeamsTop 10 Practices of Highly Successful DevOps Incident Management Teams
Top 10 Practices of Highly Successful DevOps Incident Management Teams
 
Dos and Don'ts of DevSecOps
Dos and Don'ts of DevSecOpsDos and Don'ts of DevSecOps
Dos and Don'ts of DevSecOps
 
Secure application deployment in the age of continuous delivery
Secure application deployment in the age of continuous deliverySecure application deployment in the age of continuous delivery
Secure application deployment in the age of continuous delivery
 
Take Control: Design a Complete DevSecOps Program
Take Control: Design a Complete DevSecOps ProgramTake Control: Design a Complete DevSecOps Program
Take Control: Design a Complete DevSecOps Program
 
Bridging the Security Testing Gap in Your CI/CD Pipeline
Bridging the Security Testing Gap in Your CI/CD PipelineBridging the Security Testing Gap in Your CI/CD Pipeline
Bridging the Security Testing Gap in Your CI/CD Pipeline
 
Application Asset Management with ThreadFix
 Application Asset Management with ThreadFix Application Asset Management with ThreadFix
Application Asset Management with ThreadFix
 
Open Source and Cyber Security: Open Source Software's Role in Government Cyb...
Open Source and Cyber Security: Open Source Software's Role in Government Cyb...Open Source and Cyber Security: Open Source Software's Role in Government Cyb...
Open Source and Cyber Security: Open Source Software's Role in Government Cyb...
 

Ähnlich wie Leveraging Black Duck Hub to Maximize Focus - Entersekt’s Approach to Empowering Development Teams

Leveraging Black Duck Hub to Maximize Focus - Entersekt's Approach to Automat...
Leveraging Black Duck Hub to Maximize Focus - Entersekt's Approach to Automat...Leveraging Black Duck Hub to Maximize Focus - Entersekt's Approach to Automat...
Leveraging Black Duck Hub to Maximize Focus - Entersekt's Approach to Automat...Black Duck by Synopsys
 
Qualys user group presentation - vulnerability management - November 2009 v1 3
Qualys user group presentation - vulnerability management - November 2009 v1 3Qualys user group presentation - vulnerability management - November 2009 v1 3
Qualys user group presentation - vulnerability management - November 2009 v1 3Tom King
 
Pistoia Alliance Sequence Services Phase 2 Overview
Pistoia Alliance Sequence Services Phase 2 OverviewPistoia Alliance Sequence Services Phase 2 Overview
Pistoia Alliance Sequence Services Phase 2 OverviewPistoia Alliance
 
Ethical Hacking and Cybersecurity – Key Trends in 2022
Ethical Hacking and Cybersecurity – Key Trends in 2022Ethical Hacking and Cybersecurity – Key Trends in 2022
Ethical Hacking and Cybersecurity – Key Trends in 2022PECB
 
Scot Secure 2015
Scot Secure 2015Scot Secure 2015
Scot Secure 2015Ray Bugg
 
Mengenal ZEUS Botnet Lebih Dekat
Mengenal ZEUS Botnet Lebih DekatMengenal ZEUS Botnet Lebih Dekat
Mengenal ZEUS Botnet Lebih DekatCharles Lim
 
Today's Breach Reality, The IR Imperative, And What You Can Do About It
Today's Breach Reality, The IR Imperative, And What You Can Do About ItToday's Breach Reality, The IR Imperative, And What You Can Do About It
Today's Breach Reality, The IR Imperative, And What You Can Do About ItResilient Systems
 
Secure application deployment in the age of continuous delivery
Secure application deployment in the age of continuous deliverySecure application deployment in the age of continuous delivery
Secure application deployment in the age of continuous deliveryBlack Duck by Synopsys
 
Threat Modeling In 2021
Threat Modeling In 2021Threat Modeling In 2021
Threat Modeling In 2021Adam Shostack
 
The state of web applications (in)security @ ITDays 2016
The state of web applications (in)security @ ITDays 2016The state of web applications (in)security @ ITDays 2016
The state of web applications (in)security @ ITDays 2016Tudor Damian
 
Outpost24 webinar: Turning DevOps and security into DevSecOps
Outpost24 webinar: Turning DevOps and security into DevSecOpsOutpost24 webinar: Turning DevOps and security into DevSecOps
Outpost24 webinar: Turning DevOps and security into DevSecOpsOutpost24
 
Making Sense of Threat Reports
Making Sense of Threat ReportsMaking Sense of Threat Reports
Making Sense of Threat ReportsDLT Solutions
 
Lumension Security - Adjusting our defenses for 2012
Lumension Security - Adjusting our defenses for 2012Lumension Security - Adjusting our defenses for 2012
Lumension Security - Adjusting our defenses for 2012Andris Soroka
 
Open Source Security: How to Lay the Groundwork for a Secure Culture
Open Source Security: How to Lay the Groundwork for a Secure CultureOpen Source Security: How to Lay the Groundwork for a Secure Culture
Open Source Security: How to Lay the Groundwork for a Secure CultureWhiteSource
 
Open Source Security: How to Lay the Groundwork for a Secure Culture
Open Source Security: How to Lay the Groundwork for a Secure CultureOpen Source Security: How to Lay the Groundwork for a Secure Culture
Open Source Security: How to Lay the Groundwork for a Secure CultureDevOps.com
 
Patch Management Best Practices 2019
Patch Management Best Practices 2019Patch Management Best Practices 2019
Patch Management Best Practices 2019Ivanti
 
SOD-Presentation-Des-Moines-10.19.21-v2.pptx
SOD-Presentation-Des-Moines-10.19.21-v2.pptxSOD-Presentation-Des-Moines-10.19.21-v2.pptx
SOD-Presentation-Des-Moines-10.19.21-v2.pptxTamaOlan1
 

Ähnlich wie Leveraging Black Duck Hub to Maximize Focus - Entersekt’s Approach to Empowering Development Teams (20)

Leveraging Black Duck Hub to Maximize Focus - Entersekt's Approach to Automat...
Leveraging Black Duck Hub to Maximize Focus - Entersekt's Approach to Automat...Leveraging Black Duck Hub to Maximize Focus - Entersekt's Approach to Automat...
Leveraging Black Duck Hub to Maximize Focus - Entersekt's Approach to Automat...
 
Qualys user group presentation - vulnerability management - November 2009 v1 3
Qualys user group presentation - vulnerability management - November 2009 v1 3Qualys user group presentation - vulnerability management - November 2009 v1 3
Qualys user group presentation - vulnerability management - November 2009 v1 3
 
Pistoia Alliance Sequence Services Phase 2 Overview
Pistoia Alliance Sequence Services Phase 2 OverviewPistoia Alliance Sequence Services Phase 2 Overview
Pistoia Alliance Sequence Services Phase 2 Overview
 
Ethical Hacking and Cybersecurity – Key Trends in 2022
Ethical Hacking and Cybersecurity – Key Trends in 2022Ethical Hacking and Cybersecurity – Key Trends in 2022
Ethical Hacking and Cybersecurity – Key Trends in 2022
 
Scot Secure 2015
Scot Secure 2015Scot Secure 2015
Scot Secure 2015
 
Mengenal ZEUS Botnet Lebih Dekat
Mengenal ZEUS Botnet Lebih DekatMengenal ZEUS Botnet Lebih Dekat
Mengenal ZEUS Botnet Lebih Dekat
 
Today's Breach Reality, The IR Imperative, And What You Can Do About It
Today's Breach Reality, The IR Imperative, And What You Can Do About ItToday's Breach Reality, The IR Imperative, And What You Can Do About It
Today's Breach Reality, The IR Imperative, And What You Can Do About It
 
Secure application deployment in the age of continuous delivery
Secure application deployment in the age of continuous deliverySecure application deployment in the age of continuous delivery
Secure application deployment in the age of continuous delivery
 
Threat Modeling In 2021
Threat Modeling In 2021Threat Modeling In 2021
Threat Modeling In 2021
 
The state of web applications (in)security @ ITDays 2016
The state of web applications (in)security @ ITDays 2016The state of web applications (in)security @ ITDays 2016
The state of web applications (in)security @ ITDays 2016
 
Outpost24 webinar: Turning DevOps and security into DevSecOps
Outpost24 webinar: Turning DevOps and security into DevSecOpsOutpost24 webinar: Turning DevOps and security into DevSecOps
Outpost24 webinar: Turning DevOps and security into DevSecOps
 
Managing security threats in today’s enterprise
Managing security threats in today’s enterpriseManaging security threats in today’s enterprise
Managing security threats in today’s enterprise
 
Making Sense of Threat Reports
Making Sense of Threat ReportsMaking Sense of Threat Reports
Making Sense of Threat Reports
 
Lumension Security - Adjusting our defenses for 2012
Lumension Security - Adjusting our defenses for 2012Lumension Security - Adjusting our defenses for 2012
Lumension Security - Adjusting our defenses for 2012
 
Open Source Security: How to Lay the Groundwork for a Secure Culture
Open Source Security: How to Lay the Groundwork for a Secure CultureOpen Source Security: How to Lay the Groundwork for a Secure Culture
Open Source Security: How to Lay the Groundwork for a Secure Culture
 
Open Source Security: How to Lay the Groundwork for a Secure Culture
Open Source Security: How to Lay the Groundwork for a Secure CultureOpen Source Security: How to Lay the Groundwork for a Secure Culture
Open Source Security: How to Lay the Groundwork for a Secure Culture
 
Patch Management Best Practices 2019
Patch Management Best Practices 2019Patch Management Best Practices 2019
Patch Management Best Practices 2019
 
Cert adli wahid_iisf2011
Cert adli wahid_iisf2011Cert adli wahid_iisf2011
Cert adli wahid_iisf2011
 
SOD-Presentation-Des-Moines-10.19.21-v2.pptx
SOD-Presentation-Des-Moines-10.19.21-v2.pptxSOD-Presentation-Des-Moines-10.19.21-v2.pptx
SOD-Presentation-Des-Moines-10.19.21-v2.pptx
 
pmp.pptx
pmp.pptxpmp.pptx
pmp.pptx
 

Mehr von Black Duck by Synopsys

Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...
Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...
Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...Black Duck by Synopsys
 
FLIGHT WEST 2018 Presentation - Continuous Monitoring of Open Source Componen...
FLIGHT WEST 2018 Presentation - Continuous Monitoring of Open Source Componen...FLIGHT WEST 2018 Presentation - Continuous Monitoring of Open Source Componen...
FLIGHT WEST 2018 Presentation - Continuous Monitoring of Open Source Componen...Black Duck by Synopsys
 
FLIGHT WEST 2018 Presentation - Open Source License Management in Black Duck Hub
FLIGHT WEST 2018 Presentation - Open Source License Management in Black Duck HubFLIGHT WEST 2018 Presentation - Open Source License Management in Black Duck Hub
FLIGHT WEST 2018 Presentation - Open Source License Management in Black Duck HubBlack Duck by Synopsys
 
FLIGHT WEST 2018 - Presentation - SCA 101: How to Manage Open Source Security...
FLIGHT WEST 2018 - Presentation - SCA 101: How to Manage Open Source Security...FLIGHT WEST 2018 - Presentation - SCA 101: How to Manage Open Source Security...
FLIGHT WEST 2018 - Presentation - SCA 101: How to Manage Open Source Security...Black Duck by Synopsys
 
FLIGHT WEST 2018 Presentation - Integrating Security into Your Development an...
FLIGHT WEST 2018 Presentation - Integrating Security into Your Development an...FLIGHT WEST 2018 Presentation - Integrating Security into Your Development an...
FLIGHT WEST 2018 Presentation - Integrating Security into Your Development an...Black Duck by Synopsys
 
Open-Source- Sicherheits- und Risikoanalyse 2018
Open-Source- Sicherheits- und Risikoanalyse 2018Open-Source- Sicherheits- und Risikoanalyse 2018
Open-Source- Sicherheits- und Risikoanalyse 2018Black Duck by Synopsys
 
FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...
FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...
FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...Black Duck by Synopsys
 
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical GuideFLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical GuideBlack Duck by Synopsys
 
FLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your Deal
FLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your DealFLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your Deal
FLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your DealBlack Duck by Synopsys
 
FLIGHT Amsterdam Presentation - Open Source License Management in the Black D...
FLIGHT Amsterdam Presentation - Open Source License Management in the Black D...FLIGHT Amsterdam Presentation - Open Source License Management in the Black D...
FLIGHT Amsterdam Presentation - Open Source License Management in the Black D...Black Duck by Synopsys
 
FLIGHT Amsterdam Presentation - From Protex to Hub
FLIGHT Amsterdam Presentation - From Protex to Hub FLIGHT Amsterdam Presentation - From Protex to Hub
FLIGHT Amsterdam Presentation - From Protex to Hub Black Duck by Synopsys
 
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...Black Duck by Synopsys
 
Open Source Insight: GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...
Open Source Insight:GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...Open Source Insight:GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...
Open Source Insight: GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...Black Duck by Synopsys
 
Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...
Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...
Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...Black Duck by Synopsys
 
Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...
Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...
Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...Black Duck by Synopsys
 
Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...
Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...
Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...Black Duck by Synopsys
 
Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...
Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...
Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...Black Duck by Synopsys
 
Open Source Insight: Happy Birthday Open Source and Application Security for ...
Open Source Insight: Happy Birthday Open Source and Application Security for ...Open Source Insight: Happy Birthday Open Source and Application Security for ...
Open Source Insight: Happy Birthday Open Source and Application Security for ...Black Duck by Synopsys
 
Open Source Insight: Security Breaches and Cryptocurrency Dominating News
Open Source Insight: Security Breaches and Cryptocurrency Dominating NewsOpen Source Insight: Security Breaches and Cryptocurrency Dominating News
Open Source Insight: Security Breaches and Cryptocurrency Dominating NewsBlack Duck by Synopsys
 

Mehr von Black Duck by Synopsys (20)

Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...
Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...
Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...
 
FLIGHT WEST 2018 Presentation - Continuous Monitoring of Open Source Componen...
FLIGHT WEST 2018 Presentation - Continuous Monitoring of Open Source Componen...FLIGHT WEST 2018 Presentation - Continuous Monitoring of Open Source Componen...
FLIGHT WEST 2018 Presentation - Continuous Monitoring of Open Source Componen...
 
FLIGHT WEST 2018 Presentation - Open Source License Management in Black Duck Hub
FLIGHT WEST 2018 Presentation - Open Source License Management in Black Duck HubFLIGHT WEST 2018 Presentation - Open Source License Management in Black Duck Hub
FLIGHT WEST 2018 Presentation - Open Source License Management in Black Duck Hub
 
FLIGHT WEST 2018 - Presentation - SCA 101: How to Manage Open Source Security...
FLIGHT WEST 2018 - Presentation - SCA 101: How to Manage Open Source Security...FLIGHT WEST 2018 - Presentation - SCA 101: How to Manage Open Source Security...
FLIGHT WEST 2018 - Presentation - SCA 101: How to Manage Open Source Security...
 
FLIGHT WEST 2018 Presentation - Integrating Security into Your Development an...
FLIGHT WEST 2018 Presentation - Integrating Security into Your Development an...FLIGHT WEST 2018 Presentation - Integrating Security into Your Development an...
FLIGHT WEST 2018 Presentation - Integrating Security into Your Development an...
 
Open-Source- Sicherheits- und Risikoanalyse 2018
Open-Source- Sicherheits- und Risikoanalyse 2018Open-Source- Sicherheits- und Risikoanalyse 2018
Open-Source- Sicherheits- und Risikoanalyse 2018
 
FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...
FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...
FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...
 
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical GuideFLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
 
FLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your Deal
FLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your DealFLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your Deal
FLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your Deal
 
FLIGHT Amsterdam Presentation - Open Source License Management in the Black D...
FLIGHT Amsterdam Presentation - Open Source License Management in the Black D...FLIGHT Amsterdam Presentation - Open Source License Management in the Black D...
FLIGHT Amsterdam Presentation - Open Source License Management in the Black D...
 
FLIGHT Amsterdam Presentation - From Protex to Hub
FLIGHT Amsterdam Presentation - From Protex to Hub FLIGHT Amsterdam Presentation - From Protex to Hub
FLIGHT Amsterdam Presentation - From Protex to Hub
 
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
 
Open Source Insight: GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...
Open Source Insight:GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...Open Source Insight:GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...
Open Source Insight: GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...
 
Open Source Rookies and Community
Open Source Rookies and CommunityOpen Source Rookies and Community
Open Source Rookies and Community
 
Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...
Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...
Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...
 
Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...
Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...
Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...
 
Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...
Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...
Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...
 
Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...
Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...
Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...
 
Open Source Insight: Happy Birthday Open Source and Application Security for ...
Open Source Insight: Happy Birthday Open Source and Application Security for ...Open Source Insight: Happy Birthday Open Source and Application Security for ...
Open Source Insight: Happy Birthday Open Source and Application Security for ...
 
Open Source Insight: Security Breaches and Cryptocurrency Dominating News
Open Source Insight: Security Breaches and Cryptocurrency Dominating NewsOpen Source Insight: Security Breaches and Cryptocurrency Dominating News
Open Source Insight: Security Breaches and Cryptocurrency Dominating News
 

Kürzlich hochgeladen

The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️Delhi Call girls
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️anilsa9823
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfkalichargn70th171
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerThousandEyes
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...panagenda
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AIABDERRAOUF MEHENNI
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...harshavardhanraghave
 
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female serviceCALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female serviceanilsa9823
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...OnePlan Solutions
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 

Kürzlich hochgeladen (20)

The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female serviceCALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 

Leveraging Black Duck Hub to Maximize Focus - Entersekt’s Approach to Empowering Development Teams

  • 1. Leveraging Black Duck Hub to maximize focus Entersekt’s approach to empowering development teams By Philip Botha
  • 2. Making the online world safer
  • 3. From the Windy City…
  • 4. …to the Cape Winelands
  • 5. • Phishing attacks cost global organizations billions every year • One out of 5 fraudulent transactions originate in the mobile channel • More than 90% of mobile apps contain basic vulnerabilities Our problem: A global authentication pandemic LinkedIn suffers data breach NEWS Zeus Botnet Eurograbber Steals $47 Million Don’t bank on your phone – it could be hacked by Zeus ‘trojan horse’ New vulnerabilities reported on a weekly basis Successful attacks not even making headlines anymore
  • 6. • Founded in 2008 by 5 engineering students • One of the founders’ mother defrauded • They wanted to do something that matters • Not daunted by current failings of security solutions • A novel approach with existing tech A solution: Entersekt’s story
  • 7. Going live in 2012: Nedbank as a case study 0 10 20 30 40 50 60 70 80 30-Jan… 03-Feb 07-Feb 11-Feb 15-Feb 19-Feb 23-Feb 27-Feb… 02-Mar 06-Mar 10-Mar 14-Mar 18-Mar 22-Mar 26-Mar… 30-Mar 03-Apr 07-Apr 11-Apr 15-Apr 19-Apr 23-Apr… 27-Apr 01-May 05-May 09-May 13-May 17-May 21-May… 25-May 29-May 02-Jun 06-Jun 10-Jun 14-Jun 18-Jun… 22-Jun 26-Jun 30-Jun Attempts Fraud Entersekt go- live Nedbank does not even appear on SARS e-filing phishing site!!
  • 8. A growing global footprint Johannesbur g Mauritius Atlanta Beirut Dubai Lago s Minneapoli s Sydney Amsterda m Cape Town Zurich Palo Alto
  • 9. How we solved the problem
  • 10. The 4 pillars of the Entersekt approach
  • 11. How phishing defeats the one time password
  • 12. Out of band authentication beats phishing
  • 14. Gartner prediction about Entersekt tech
  • 15. How Black Duck Hub makes us better
  • 16. 1. Risk management • Approved open source? • How secure? • Can we be diligent and agile? 2. Ability to identify open source licenses 3. Scaling • Manual vulnerability assessment process • Getting behind with updates Our open source challenges
  • 17. “Black Duck met Entersekt’s checklist of what we needed in an open source vulnerability management solution better than any other vendor.” The obvious choice was...
  • 18. 1. Seamless integration and ease of use 2. Relevant feedback 3. Earlier in the SDLC 4. Real-time and continuous monitoring 5. Automated notifications Black Duck Hub checks the boxes
  • 19. 6. Easy-to-digest reports with minimal false positives 7. Jenkins support and secure scanning 8. Code doesn’t leave intranet 9. Identify open source licenses Black Duck Hub checks the boxes (cont.)
  • 20. Getting the best out of the Hub
  • 21. 1. Urgent vs important 2. Build pipeline challenges • Jenkins jobs differ in each team/project • Black Duck sometimes executed manually 3. No best practice/standard 4. Maintenance owner Lessons learned
  • 23. Empowering the development teams (cont.) Architect Evangelist Security Evangelist Toolsmith
  • 24. 1. Phased roll-out in teams • Phase 1: Education • Phase 2: Implement a standard pipeline framework • Phase 3: Hardening cycle • Phase 4: Policy Management and Jira integration 2. Team agreements Empowering the development teams (cont.)
  • 25. CI/CD BUILD Tool: Docker/Maven DEPLOY •DEV •QA •INT •LT Tool: Docker TEST •J Unit •Automated Tool: Docker Releas e? RELEASE •PROD •Release repos COMMIT Tool: Git OS SECURITY Tool: Black Duck Hub STATIC CODE ANALYSIS Tool: SonarQube DASHBOARD Tool: Docker ALERTS Tools: Slack/email Pull Request Merge Master
  • 26. Pipeline framework template BUILD Tool: Docker/Maven DEPLOY •DEV •QA •INT •LT Tool: Docker TEST •J Unit •Automated Tool: Docker Releas e? RELEASE •PROD •Release repos COMMIT Tool: Git OS SECURITY Tool: Black Duck Hub STATIC CODE ANALYSIS Tool: SonarQube DASHBOARD Tool: Docker ALERTS Tools: Slack/email Pull Request Merge Master
  • 29. 1. Trust 2. Support 3. Ownership 4. Clarity A tool is only as good as the team
  • 30. Questions and answers Philip Botha Engineering Excellence Manager philip@entersekt.com www.entersekt.com

Hinweis der Redaktion

  1. Description: Learn how fast-growing authentication and mobile security solutions provider Entersekt leverages Black Duck Hub for competitive advantage by empowering teams and automating open source security risk management throughout the Software Development Lifecycle (SDLC)
  2. Key Takeaway (s): Who, why and what Who am I: Philip - I work for a company called Entersekt - a software product company and our mission is to make the internet a safer place Presented at Flight Amsterdam – shared some of the challenges we had and lessons we learned a fast growing organization. Why am I talking about Black Duck Hub: Since our mission is to make the internet a safer place and we leverage Open Source technologies it would be quite unfortunate if we introduce vulnerabilities into a customer’s operations. What will I tell people: I believe that tools only as valuable to the organization as the people that use it and how they use it. At Entersekt we trust and entrust our people with a lot of responsibility and it has resulted in a highly engaged and high performing culture Our Software Engineering team haven’t had a single resignation in 26 months and counting and clients only report 1 bug for every 10 releases (and we do about 20 releases a month) I’d like to share some of our ideas with everyone here how we organize and empower our teams in an agile environment especially with a powerful tool like the Black Duck Hub and my hope is that you may take home some thoughts or ideas on how to get the most out of the Hub and your people OR even give me some of thoughts or ideas. But before I do I just want to set the stage by telling you a little bit about myself and the company that I work for.
  3. Key takeaway: Studied & worked in Chicago Originally from South Africa, but lived in Chicago for 10 years were I studied Computer Engineering & Business then worked for CSC a large consulting firm for 4 years. Baseball quiz - Scott Podsednik – walk-off home run in 9th inning of Game 2 of the 2005 World Series (White Sox vs Houston Astros) There was also a grandslam home run by Paul Konerko in the 7th Reference: https://en.wikipedia.org/wiki/2005_World_Series#Game_4 **Houston Astros won 2017
  4. Key takeaway: Moved back to South Africa in 2010 Joined Entersekt in 2014 (Situated in Stellenbosch – heart of the Cape Winelands) As the Engineering Excellence Manager my responsibilities include software quality, hiring the right people, making sure they are trained and equip to build excellent software. [joke] Hopefully the origins of my somewhat confused accent make sense.
  5. Key takeaway: Phishing is a global problem – results in lack of trust in mobile channel Phishing is still a huge problem today costing companies billions every year 20% of transaction fraud occur in the mobile channel Most mobile apps are compromised (making app, esp banking app security crucial) NET: This results in a lot of fear from bank customers to adopt the online and mobile banking channels. Many still prefer to go into a branch or just limit the type of services References: http://www.techrepublic.com/article/report-90-of-mobile-health-and-finance-apps-vulnerable-to-critical-security-risks/ http://bgr.com/2014/01/14/mobile-banking-apps-security-vulnerabilities/ https://www.mobilepaymentstoday.com/articles/the-merchants-role-in-mobile-fraud/ http://blogs.rsa.com/2017-global-fraud-cybercrime-forecast/
  6. Key takeaway: Entersekt’s journey started with family falling for a phishing scam Founded by 5 Engineering students from Stellenbosch University Desired to start their own company and make an impact in the world Christiaan’s mother lost money due to online fraud (or phishing) They realized that current online security solutions were failing and decided to solve the problem They created a solution that creates a fully encrypted channel between end user and bank using their mobile phone & digital certificates **Christiaan now Product Manager of Identity & Security at Google
  7. Key takeaway: This is how effective OOB2FA is with end-to-end encryption Our first customer went live in 2012 Immediately saw a 99% reduction in fraud caused by phishing Nedbank not even listed on the warning page of South Africa’s tax collection agency Nedbank had to repurpose an entire department
  8. Key takeaway: The demand for our solution is growing 5 years on from our first live customer we are in over 40 countries Include our strategic partners & resellers Lots of opportunity in the gray areas Not bad for a company with just over a hundred employees
  9. Note: Run through this kinda quickly
  10. Key takeaway: This is what makes our product really cool Use the Mobile phone because we always have it with us User experience must not be cumbersome Secure all attach vectors from mobile app integrity (Jailbreak and keystore compromise detection, code obfuscation) We don’t story any sensitive user data so we are PCI-DSS and GDPR compliant
  11. Key takeaway: OTPs does not provide adequate second factor authentication Examples of OTP: SMS, email & hardware token Walk-thru steps 1 thru 7
  12. Key takeaway: Out-of-band authentication allows user to authenticate each transaction Instead of entering OTP in the compromised channel, user responds back directly to bank. The mobile app is enrolled with bank and identified with a unique digital certificate Authentication can be set for sensitive transactions such as adding beneficiaries, doing transfers, payments, etc
  13. Key takeaway: The components necessary to make this end-to-end encrypted channel possible Mention mobile SDKs, EMR & TSG Lots of open source libraries (e.g. openSSL, ZeroMQ, Docker, Tomcat, node.js, Cassandra, etc) combined with proprietary cryptography protocol stack From a code and technology perspective these are our risk areas
  14. Key takeaway: Entersekt ahead of it’s time Solution we came up with in 2008 will 12 years later become a standard/best practice We about 2 years ahead of our competition per Gartner
  15. Key takeaway: Why we need a tool to automate open source risk management In an Agile environment I ask my team: Does the build contain only approved open source components How secure is build? Does it have any security vulnerabilities Can we add diligence and remain agile? Ability to identify open source licenses (Need to make sure what we are using is legal because as a small company we are dependent on funding. Black Duck give us the power to know what we are using and if it is exposing us.) As a small but fast growing company our success is based on worker smarter not harder Keeping an eye out for news on big vulnerabilities not going to scale We are on three platforms, need to support our banks who don’t upgrade a lot, we have to keep clients working. Maintain backward compatibility when you don’t have control over upgrades - you will break upgrade paths. Need long enough support. So we choose our versions more intentional bc we will have to support it and can’t just change to new tech.
  16. Key takeaway: Why we need a tool to automate open source risk management Completed two trials with two SAST vendors. We didn’t feel either had an adequate solution for open source security management Our research identified Black Duck as a market leader in that field, and we had Black Duck provide us with a trial of their solution.
  17. Key takeaway: What we need from Black Duck Hub The set-up process was straightforward, and the feedback from Black Duck demonstrably helped improve our product’s quality. The report output was clear and provided solutions on how to mitigate the risks discovered. The responsiveness and support from both its customer success and technical support teams also led us to make the business decision to select Black Duck
  18. Key takeaway: What we need from Black Duck Hub
  19. Key takeaway: Initially we struggled to get the most out of the tool Everything is urgent in a fast growing company Symptoms of capacity challenges: Build pipeline challenges: Engineering teams all implementing CI pipelines a bit differently because the range from mobile, cloud to server architecture Black Duck is part of build phase and sometimes executed manually Everyone used tool differently in terms of how often to run scans, how and when to do triage when issues were found, who was involved. Getting to update and maintain the server was often a pain or after thought
  20. Key takeaway: We don’t want silos in our development organization How do we support and empower our development teams without creating silos? How do we not suffocate our high performing and highly engaged culture by too much beaurrocracy? We haven’t had a single resignation in 26 months now The law is based on the reasoning that in order for a software module to function, multiple authors must communicate frequently with each other. Therefore, the software interface structure of a system will reflect the social boundaries of the organization(s) that produced it, across which communication is more difficult. https://en.wikipedia.org/wiki/Conway%27s_law
  21. Key takeaway: We created cross functional and agile teams (w/ Automation Engineer) Our Software Engineering structure based on Spotify model - Cross functional & agile teams We have 7 teams (between 4 to 6 team members) all in one city Have the rights skills and knowledge in each team  Avoid silos or dependencies on other departments or teams Empowered through tools and privileges (Examples roles in the Hub) Automation Engineer in each team Part DevOps, part test automation, 100% developer In-house test automation framework built on open source tech (node.js, cucumber, gherkin, appium, etc) Have a passion for software quality and efficiency Their mandate is to serve their team – implement build pipelines that will kick of Black Duck Scans Architect Evangelist position (part of the tribe) Sits in planning and grooming meetings Coach teams on technical design decisions Bridge gap in-between dev teams and also between dev teams and Product Owners Security Evangelist  not DevSecOps (https://www.entersekt.com/all-careers/software-security-evangelist) Lot like Architect evangelist Coach/support teams on secure design & implementation Will do pen testing & keen interest in Black Duck reports Lead general education and mindshares of security issues & topics Toolsmith  Maintains & updates Portus, Jenkins, ESXi resources A bit like in-house infrastructure/sys admin person but that can also code if needed. Not needed in every team https://www.entersekt.com/all-careers/toolsmith
  22. Key takeaway: How we got back on track Tools only as valuable to the organization as the people that use it and how they use it. Thus important to support and empower teams as much as possible. Phased roll-out: Black Duck Academy & Security Evangelist Automation Engineers implement a standard pipeline framework. This include a CI/pipeline template and shared tools, workers and dashboard. Pipeline template version controlled in Git for new projects. Save weeks of effort. Teams had to plan and dedicate time to review all existing projects and clean/fix all issues found by Black Duck. Once projects good state enabled policy management to fail builds and create tickets via Jira Team agrees on standard This is not an enforced internal compliance policy enforced by a Security or Risk Officers but rather self imposed by teams When to fail builds (will inform Policy Management rules) How to triage results (comments & ignore) Do reporting, etc
  23. Key takeaway: Automation Engineers are responsible for this process in each of the teams The Jenkins phases (in yellow) occur twice: Pull request --> automated once reviews complete Merge to Master  Manual
  24. Key takeaway: Explain concept of build pipeline template The Jenkins phases (in yellow) occur twice: Pull request --> automated once reviews complete Merge to Master  Manual Infrastructure as code
  25. Key takeaway: Explain concept of build pipeline template
  26. Key takeaway: Key ingredients Trust your people to do the right thing Support them with the necessary resources and tools They need to way-in before they buy-in and that is how they will demonstrate ownership Clarity of expectations and what success looks like (i.e. security and due diligence) CLOSING: I sincerely hope the story of our journey so far was informative and perhaps gave you some good ideas for your own context. I thank you for your time and listening to me and I’m happy to answers any questions if you have any. Thanks. References: https://blackducksoftware.atlassian.net/wiki/spaces/INTDOCS/pages/49843511/Hub+SonarQube https://blackducksoftware.wistia.com/medias/dbpsb3xszr