#MicroFocusCyberSummit
Prioritizing Risk Relative to Mitigating Vulnerabilities
Lucas von Stockhausen, Senior Product Manager & Application Security Strategist Jimmy Rabon, Senior Product Manager
Mitigating Vulnerabilities Lucas von Stockhausen, Senior Product - - PowerPoint PPT Presentation
Prioritizing Risk Relative to Mitigating Vulnerabilities Lucas von Stockhausen, Senior Product Manager & Application Security Strategist Jimmy Rabon, Senior Product Manager #MicroFocusCyberSummit Understanding Risk Relative to Remediation
#MicroFocusCyberSummit
Lucas von Stockhausen, Senior Product Manager & Application Security Strategist Jimmy Rabon, Senior Product Manager
calculate what that risk means to their business
effectively, at scale, and provide best practices with regards to actually fixing these issues
security program is judged by. It’s what you did with that information and how effectively is was used.
2
Prioritization of Security Issues
Remediation of Security Issues
Q&A
3
Application development became a competitive differentiator. Mobile apps are no longer just for banking, telco or tech!
Source: https://medium.com/data-ops/how-software-teams-accelerated-average-release-frequency-from-three-weeks-to-three-minutes-d2aaa9cca918
Average Software Release Cycle 12 months 3 weeks 3 minutes
(anticipated) 2010 2017 2020 ?
7
10
Understanding your application portfolio is the first step to securing it
Discovery Verification Risk profile
Our Process For all customers:
Complimentary annual discovery
Discover
vulnerabilities in deployed products or services so that administrators can decide how to react.
provided by a human reviewer.
when the number of findings is large and the intended audience is small.
11
12
High
High Impact/ Low Likelihood
Critical
High Impact/ High Likelihood
Low
Low Impact/ Low Likelihood
Medium
Low Impact/ High Likelihood Likelihood Impact
Impact is the negative
a vulnerability Likelihood is the probability that the impact will come to pass
13
Auto-train Auto-predict Auto-tag
Unaudited results enter SSC Audited issues arrive in SSC Audit assistant derives anonymous issue metrics and securely sends to scan analytics Classifiers report verified vulnerabilities with up to 98% accuracy
Fortify Software Security Center
Training meta1 meta2 meta2
Issue NAI
Prediction {“Analysis”:”Issue”,”Analyzer”:”Dataflow”,“Inputs”:”8”,“Branches”:”2”}
vuln X
SQLi XSS
Corrections anonymized
Predictions
Fortify Audit Analytics
Results submitted Issues anonymized
F
Issues are audited Prediction & Confidence returned Focus on what counts Correct what is wrong
Fortify Audit Assistant Build accuracy Focus auditing Extend workflows Accelerate DevOps Remediate faster …
Efficient Auditing and Remediation
19
mapping -> Then by Source OR Sink OR Converged Data Flow
issues are related from a data flow perspective
triaging or fixing issues at most efficient point
Efficient Auditing and Remediation
20
the number of issues
issues and is very performant
security issues
Organizational Specific Remediation Guidance by Technology Stack
23
#MicroFocusCyberSummit