SlideShare ist ein Scribd-Unternehmen logo
1 von 20
Downloaden Sie, um offline zu lesen
Presented	
  by	
  Alison	
  Giano1o	
  
Foocamp	
  2013	
  
MANAGING RISK IN
HIGH-PERFORMANCE APPS
FAILING
…
ABOUT ME •  I	
  am	
  the	
  CTO/CSO	
  for	
  noise.	
  
•  We	
  build	
  stuff	
  for	
  brands	
  like	
  Intel,	
  
vitaminwater,	
  JPMorgan	
  Chase,	
  GE,	
  Sunkist,	
  
Sears,	
  Unilever,	
  &	
  more.	
  
•  Managing	
  risk	
  is	
  a	
  big	
  part	
  of	
  what	
  I	
  do.	
  
•  Risk	
  management	
  doesn’t	
  have	
  to	
  be	
  boring.	
  	
  
Hi, I’m Alison!
FOOCAMP 2013
@snipeyhead	
  @snipeyhead	
  
Risk is not BAD or GOOD.
It just IS, and it will exist
whether you choose to
acknowledge it or not.
FOOCAMP 2013
THIRD-PARTY DEPENDENCIES
FOOCAMP 2013
RISK:
(APIs,	
  SaaS/PaaS)	
  
APPLICATION SECURITY
FOOCAMP 2013
RISK:
(XSS,	
  CSRF,	
  SQL	
  Injec<on,	
  etc.)	
  
APPLICATION PERFORMANCE
FOOCAMP 2013
RISK:
(Code	
  Errors,	
  Technical	
  Debt,	
  Bad	
  
Queries,	
  Cache	
  Failures)	
  
SERVER PERFORMANCE
FOOCAMP 2013
RISK:
(Misconfigura<ons,	
  Exceeding	
  
Capacity,	
  Hardware/Network	
  
Failure)	
  
BRITTLE DEPLOYMENT
FOOCAMP 2013
RISK:
(Problems	
  during	
  deployment,	
  
par<ally	
  deployed	
  code)	
  
OVERLY COMPLEX SYSTEMS
FOOCAMP 2013
RISK:
(Impossible	
  to	
  debug,	
  difficult	
  to	
  
change)	
  
RISK-MATRIX
•  Every	
  project,	
  every	
  Sme.	
  No	
  excuses.	
  
•  Create	
  a	
  risk	
  matrix	
  	
  
•  Probability	
  of	
  failure	
  
•  Impact	
  of	
  failure	
  
•  Ways	
  to	
  minimize	
  probability	
  
•  Game	
  plan	
  if	
  failure	
  occurs	
  
FOOCAMP 2013
TRANSPARENCY
•  All	
  stakeholders	
  sign-­‐off	
  on	
  the	
  risk	
  
matrix	
  
•  Manages	
  expectaSons	
  	
  
•  Gives	
  you	
  a	
  clear	
  course	
  of	
  acSon	
  during	
  
crisis	
  
FOOCAMP 2013
AKA “COVERING YOUR ASS”
Just because something has
risk doesn’t necessarily mean
it’s a bad decision.
FOOCAMP 2013
Sometimes, the risk is worth
the reward.
FOOCAMP 2013
FOOCAMP 2013
Different	
  perspecSves	
  can	
  uncover	
  more	
  risk	
  
	
  
Counters	
  the	
  sSgma	
  of	
  risk	
  being	
  BAD	
  
	
  
Prevents	
  the	
  sSgma	
  of	
  being	
  the	
  one	
  who	
  always	
  says	
  NO!	
  
Risk Management is
a TEAM EFFORT!
LOG EVERYTHING
FOOCAMP 2013
TIP:
(Automate	
  log	
  parsing	
  to	
  alert	
  if	
  
there’s	
  trouble)	
  
MONITOR ALL THE THINGS!
FOOCAMP 2013
TIP:
(Design	
  your	
  system	
  with	
  
monitoring	
  in	
  mind)	
  
PREMATURE OPTIMIZATION
FOOCAMP 2013
TIP:
(JUST	
  SAY	
  NO!)	
  
GET TO KNOW YOUR USERS
FOOCAMP 2013
TIP:
(If	
  something	
  changes,	
  there’s	
  
probably	
  a	
  reason)	
  
FEWER MOVING PARTS IS
BETTER
FOOCAMP 2013
TIP:
THANK YOU!
FOOCAMP 2013
@snipeyhead	
  

Weitere ähnliche Inhalte

Andere mochten auch

Los movimientos en el plano Ejercicios + Solucionarios
Los movimientos en el plano Ejercicios + SolucionariosLos movimientos en el plano Ejercicios + Solucionarios
Los movimientos en el plano Ejercicios + Solucionarios
Julio López Rodríguez
 
Software Risk Management
Software Risk ManagementSoftware Risk Management
Software Risk Management
Gunjan Patel
 
¿Qué aprendemos en clase de música?
¿Qué aprendemos en clase de música?¿Qué aprendemos en clase de música?
¿Qué aprendemos en clase de música?
mariajesusmusica
 

Andere mochten auch (12)

Claudia Ortega
Claudia OrtegaClaudia Ortega
Claudia Ortega
 
webserver overload
 webserver  overload  webserver  overload
webserver overload
 
Development of TeXShop - The Past and the Future (TUG 2013)
Development of TeXShop - The Past and the Future (TUG 2013)Development of TeXShop - The Past and the Future (TUG 2013)
Development of TeXShop - The Past and the Future (TUG 2013)
 
Proceso de nutrición
Proceso de nutriciónProceso de nutrición
Proceso de nutrición
 
Discovery Phase: Planing Your Web Project
Discovery Phase: Planing Your Web ProjectDiscovery Phase: Planing Your Web Project
Discovery Phase: Planing Your Web Project
 
Risk analysis
Risk analysisRisk analysis
Risk analysis
 
Los movimientos en el plano Ejercicios + Solucionarios
Los movimientos en el plano Ejercicios + SolucionariosLos movimientos en el plano Ejercicios + Solucionarios
Los movimientos en el plano Ejercicios + Solucionarios
 
List of Software Development Model and Methods
List of Software Development Model and MethodsList of Software Development Model and Methods
List of Software Development Model and Methods
 
Software Risk Management
Software Risk ManagementSoftware Risk Management
Software Risk Management
 
Risk management in software engineering
Risk management in software engineeringRisk management in software engineering
Risk management in software engineering
 
¿Qué aprendemos en clase de música?
¿Qué aprendemos en clase de música?¿Qué aprendemos en clase de música?
¿Qué aprendemos en clase de música?
 
Risk Management Framework
Risk Management FrameworkRisk Management Framework
Risk Management Framework
 

Ähnlich wie Failing well: Managing Risk in High Performance Applications

Ähnlich wie Failing well: Managing Risk in High Performance Applications (20)

Deploying Static Application Security Testing on a Large Scale
Deploying Static Application Security Testing on a Large ScaleDeploying Static Application Security Testing on a Large Scale
Deploying Static Application Security Testing on a Large Scale
 
Risk Based Testing in Agile context - Kees Blokland
Risk Based Testing in Agile context - Kees BloklandRisk Based Testing in Agile context - Kees Blokland
Risk Based Testing in Agile context - Kees Blokland
 
Value-driven threat modeling: Security by design - Avi Douglen - DevOpsDays T...
Value-driven threat modeling: Security by design - Avi Douglen - DevOpsDays T...Value-driven threat modeling: Security by design - Avi Douglen - DevOpsDays T...
Value-driven threat modeling: Security by design - Avi Douglen - DevOpsDays T...
 
2016-05-30 risk driven design
2016-05-30 risk driven design2016-05-30 risk driven design
2016-05-30 risk driven design
 
The Most Important Thing: How Mozilla Does Security and What You Can Steal
The Most Important Thing: How Mozilla Does Security and What You Can StealThe Most Important Thing: How Mozilla Does Security and What You Can Steal
The Most Important Thing: How Mozilla Does Security and What You Can Steal
 
Bilot 3mode
Bilot 3modeBilot 3mode
Bilot 3mode
 
Threat Modeling Lessons from Star Wars
Threat Modeling Lessons from Star WarsThreat Modeling Lessons from Star Wars
Threat Modeling Lessons from Star Wars
 
Operational Risk Assessment PowerPoint Presentation Slides
Operational Risk Assessment PowerPoint Presentation SlidesOperational Risk Assessment PowerPoint Presentation Slides
Operational Risk Assessment PowerPoint Presentation Slides
 
Short introduction to SAP security research (sitNL)
Short introduction to SAP security research (sitNL)Short introduction to SAP security research (sitNL)
Short introduction to SAP security research (sitNL)
 
R3 Process Training
R3 Process TrainingR3 Process Training
R3 Process Training
 
Make it Just So - 4/23/20
Make it Just So - 4/23/20Make it Just So - 4/23/20
Make it Just So - 4/23/20
 
Bug Advocacy
Bug AdvocacyBug Advocacy
Bug Advocacy
 
Risk Management Plan In Business Powerpoint Presentation Slides
Risk Management Plan In Business Powerpoint Presentation SlidesRisk Management Plan In Business Powerpoint Presentation Slides
Risk Management Plan In Business Powerpoint Presentation Slides
 
Risk Management Plan In Business PowerPoint Presentation Slides
Risk Management Plan In Business PowerPoint Presentation Slides Risk Management Plan In Business PowerPoint Presentation Slides
Risk Management Plan In Business PowerPoint Presentation Slides
 
Creating and Implementing Your Analytics Strategy
Creating and Implementing Your Analytics StrategyCreating and Implementing Your Analytics Strategy
Creating and Implementing Your Analytics Strategy
 
Phil Koopman's ISSRE 2016 Keynote
Phil Koopman's ISSRE 2016 KeynotePhil Koopman's ISSRE 2016 Keynote
Phil Koopman's ISSRE 2016 Keynote
 
5 real ways to destroy business by breaking SAP applications
5 real ways to destroy business by breaking SAP applications5 real ways to destroy business by breaking SAP applications
5 real ways to destroy business by breaking SAP applications
 
Protect-Biz for non-profits
Protect-Biz for non-profitsProtect-Biz for non-profits
Protect-Biz for non-profits
 
Mitigation Planning PowerPoint Presentation Slides
Mitigation Planning PowerPoint Presentation Slides Mitigation Planning PowerPoint Presentation Slides
Mitigation Planning PowerPoint Presentation Slides
 
A Practical Security Framework for Website Owners
A Practical Security Framework for Website OwnersA Practical Security Framework for Website Owners
A Practical Security Framework for Website Owners
 

Mehr von Alison Gianotto

Security Bootcamp for Startups and Small Businesses
Security Bootcamp for Startups and Small Businesses Security Bootcamp for Startups and Small Businesses
Security Bootcamp for Startups and Small Businesses
Alison Gianotto
 
Getting users to care about security
Getting users to care about securityGetting users to care about security
Getting users to care about security
Alison Gianotto
 

Mehr von Alison Gianotto (10)

Security Bootcamp for Startups and Small Businesses
Security Bootcamp for Startups and Small Businesses Security Bootcamp for Startups and Small Businesses
Security Bootcamp for Startups and Small Businesses
 
Laravel 5.2 Gates, AuthServiceProvider and Policies
Laravel 5.2 Gates, AuthServiceProvider and PoliciesLaravel 5.2 Gates, AuthServiceProvider and Policies
Laravel 5.2 Gates, AuthServiceProvider and Policies
 
dotScale 2014
dotScale 2014dotScale 2014
dotScale 2014
 
LonestarPHP 2014 Security Keynote
LonestarPHP 2014 Security KeynoteLonestarPHP 2014 Security Keynote
LonestarPHP 2014 Security Keynote
 
MacIT 2014 - Essential Security & Risk Fundamentals
MacIT 2014 - Essential Security & Risk FundamentalsMacIT 2014 - Essential Security & Risk Fundamentals
MacIT 2014 - Essential Security & Risk Fundamentals
 
DNS 101 for Non-Techs
DNS 101 for Non-TechsDNS 101 for Non-Techs
DNS 101 for Non-Techs
 
Security Primer
Security PrimerSecurity Primer
Security Primer
 
Facebook Timeline for Pages
Facebook Timeline for PagesFacebook Timeline for Pages
Facebook Timeline for Pages
 
Getting users to care about security
Getting users to care about securityGetting users to care about security
Getting users to care about security
 
Twitter 101: 140 characters. Don't be a douche.
Twitter 101: 140 characters. Don't be a douche.Twitter 101: 140 characters. Don't be a douche.
Twitter 101: 140 characters. Don't be a douche.
 

Kürzlich hochgeladen

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Kürzlich hochgeladen (20)

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 

Failing well: Managing Risk in High Performance Applications