SlideShare uma empresa Scribd logo
1 de 37
Baixar para ler offline
Make  Security  a  Competitive  Advantage
Mordecai  (Mo)  Rosen  
SECURITY
SECURITY
General  Manager,  Security
CA  Technologies
General  Manager
CA  Veracode
Sam  King
2 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS
Eliminate  Barriers  
Between  Ideas  and  Outcomes
CREATE  AN  AGILE  
BUSINESS
BUILD  BETTER      
APPS  FASTER
MAKE  SECURITY  A  
COMPETITIVE  ADVANTAGE
MAXIMIZE  APPLICATION  
PERFORMANCE
3 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS
HOME  AUTOMATION
PHYSICAL  SECURITY
EHEALTH  DEVICES
WEARABLES
SMART  METERS
SHIPPING  LOGISTICS
PROPERTY  MANAGEMENT  
ECOLOGY
FACTORY  AUTOMATION
SMART  PHONES
TABLETS
CAMERAS
PHONES
TELEVISIONS
AUTOMOBILES
THERMOSTATS
WWW
CHAT  &  IM
API
SERVICES
CLOUD
SERVICES
First  a  Brief  History  of
THE  EXPANDING  
DIGITAL  
EXPERIENCE  
4 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS
THE  DIGITAL  
EXPERIENCE  
Is  Between  Users  
and  Applications
HOME  AUTOMATION
PHYSICAL  SECURITY
EHEALTH  DEVICES
WEARABLES
SMART  METERS
SHIPPING  LOGISTICS
PROPERTY  MANAGEMENT  
ECOLOGY
FACTORY  AUTOMATION
SMART  PHONES
TABLETS
CAMERAS
PHONES
TELEVISIONS
AUTOMOBILES
THERMOSTATS
WWW
CHAT  &  IM
API
SERVICES
CLOUD
SERVICES
5 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS
MAKES  EVERY  COMPANY  A  SOFTWARE  COMPANY
APPLICATION
EXPLOSION
CONSUMERIZED
IT
CONNECTED
ENTERPRISES
DIGITAL
MARKETPLACES
DIGITAL
WORKPLACES
CONNECTED
IOT
The  Application  Economy
6 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS
The  Application  Economy
REQUIRES  NEW  THINKING  ON  SECURITY
FIREWALL
IDS/IPS
WEB  PROXY
ANTI-­VIRUS
ANTI-­MALWARE
100%
INEFFECTIVE
USERS  &  APPS
UNDER  ATTACK
SHADOW  IT
30%
Of  all  attacks  will  be  in  
shadow  IT  resources
APP  DEFECTS
90%
Of  breaches caused  
by  application  defects
3RD  PARTY  RISK
70% Of  attacks  targeted a  
secondary  source  
IDENTITY  FRAUD
80% Of  breaches  used  lost  
stolen  &  weak  credentials
CREDIT  FRAUD
42%
Of  all  data  stolen  is
credit  card  data  
FireEye  Study  of  6  Months  of  Penetration  Testing  
7 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS
A QUESTION
OF TRUST
USERS
INTERACTIONS
APPLICATIONS
Security  Becomes
8 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS
CA  Security  Strategy  To  
SECURING  THE  APPLICATION  ECONOMY
TRUSTED
USERS  &
APPLICATIONS  
PREVENTATIVE  
DETECTION  &
RESPONSIVE
INSIGHT  
ANALYTICS  &
INTELLIGENCE
FRICTIONLESS  
SECURITY  &
EXPERIENCE
CORE  PRINCIPLES  
9 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS
IDENTITY  &
ACCESS  
APPLICATION
SECURITY
API
SECRUITY
PAYMENT
SECURITY
PRODUCT  PORTFOLIO
CA  Security  Strategy  To  
SECURING  THE  APPLICATION  ECONOMY
10 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS
LINES  OF  CODE  
SCANNED6  TRILLION
1400  CUSTOMERS 400K
APPLICATION  
SECURITY  
ADVISORY  
HOURS
35.5M SECURITY  FLAWS  FIXED
4X GARTNER
MQ  LEADER
24 LANGUAGES
77 FRAMEWORKS
APPLICATION
SECURITY
CA  VERACODE
11 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS
Ensuring
GREAT  SOFTWARE  IS  SECURE  SOFTWARE
EMPOWER
DEVELOPERS  TO  
SECURE  CODE
INTEGRATED  INTO
CONTINUOUS  
DELIVERY
EARLY  DETECT
TO  REDUCE  COST
AUTOMATED  TO  
REDUCE  MTTR
12 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS
CODECOMMIT BUILD
TEST
RELEASE OPERATE
SECURITY  INTO  CONTINUOUS  DELIVERY  
TEST TEST
DevSecOps
SECURE  SOFTWARE  
DEVELOPENT
SECURITY  
ASSURANCE
OPERATIONAL  
APPLICATION  SECURITY
Merging
13 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS
CODECOMMIT BUILD
TEST
RELEASE OPERATE
SECURE  SOFTWARE  
DEVELOPENT
SECURITY  
ASSURANCE
OPERATIONAL  
APPLICATION  SECURITY
DevSecOps
TEST TEST
CA  Veracode  Greenlight CA  Veracode  Static  Analysis
CA  Veracode  Web  Application  Scanning
CA  Veracode  Runtime  Protection
CA  Veracode  Software  Composition  Analysis
CA  Veracode  Integrations,  APIs
CA  Veracode  eLearning
14 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS
Securing  Applications  With  
NEXT  GENERATION  IDENTITY  MANAGEMENT
80%of  all  data  breaches  exploit  
lost,  stolen  &  weak  credentials
HYBRID
CLOUD
DEVELOPER
APIs
BEHAVIOR
ANALYTICS
15 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS
API  
ENABLED
HIGH  SCALE  
APPLIANCE
HYBRID
CLOUD
SECURE  
CONTINUOUS
DELIVERY    
PRIVILEGED
GOVERNANCE
Central  Authentication
Credential  Vault
Policy  Enforcement
Role  -­ Based  Access
Federated  Identity Session  Recording
CA  Privileged  Access  Manager
PROTECTING
PRIVILEGED
IDENTITY
16 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS
ENABLING
APP TO APP
TRUST
User  &  App  
Authentication  API
Mobile  
Authentication  API
Secure  Server  
Communications
Context  Based
Risk  Analysis
CA  Rapid  App  Security
Risk  Based  Analytics
17 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS
RISK
ANALYTICS
WORKS
EMPIRICALLY
18 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD        #NOBARRIERS
Digital	
  Payments	
  
Fraud
Directory
Identity	
  
Management
Privileged	
  
Access	
  
Management
Single	
  
Sign-­‐on
Identity	
  
Governance
Risk	
  Based	
  
Authentication
Orchestrating	
  
Identity	
  &	
  
Access
Employees  &  
Administrators
Customers  &  
Partners
Internet  of  Things
Developers
Cloud	
  
Services
On	
  
Premise	
  
Apps
Mobile
Web
API
CA  Security  &  Identity  Management  Portfolio
19 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD        #NOBARRIERS
CONTROLLING  PRIVILEGED  ACCESS
IN  A  WORLD  ON  TIME
20 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD        #NOBARRIERS
CONTROLLING  PRIVILEGED  ACCESS
IN  A  WORLD  ON  TIME
21 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD        #NOBARRIERS
CONTROLLING  PRIVILEGED  ACCESS
IN  A  WORLD  ON  TIME
22 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD        #NOBARRIERS
CONTROLLING  PRIVILEGED  ACCESS
IN  A  WORLD  ON  TIME
23 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD        #NOBARRIERS
CONTROLLING  PRIVILEGED  ACCESS
IN  A  WORLD  ON  TIME
24 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS
APPLICATION
SECURITY
TESTING
FRICTIONLESS  
25 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS
APPLICATION
SECURITY
TESTING
FRICTIONLESS  
26 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS
APPLICATION
SECURITY
TESTING
FRICTIONLESS  
27 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS
ARTHUR
WONG
Interview  With
SVP  &  GM
DXC  Security  
28 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS
ARTHUR
WONG
Interview  With
SVP  &  GM
DXC  Security  
29 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS
ARTHUR
WONG
Interview  With
SVP  &  GM
DXC  Security  
30 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS
ARTHUR
WONG
Interview  With
SVP  &  GM
DXC  Security  
31 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS
BREAKING
BARRIERS
AWARD
Mo  Ahddoud
First  UK  critical  infrastructure  
company  running  100%  in  
the  cloud  
Todd  Oxford
Enabled  disaster  recovery  
access  to  comply  with  FEMA  
first  &  second  line  response  
regulations
Mark  Merkow
Integrating  app  security  
testing  into  SDLC  for  500+  
developer  organization
32 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS
BREAKING
BARRIERS
AWARD
Mo  Ahddoud
First  UK  critical  infrastructure  
company  running  100%  in  
the  cloud  
Todd  Oxford
Enabled  disaster  recovery  
access  to  comply  with  FEMA  
first  &  second  line  response  
regulations
Mark  Merkow
Integrating  app  security  
testing  into  SDLC  for  500+  
developer  organization
33 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS
BREAKING
BARRIERS
AWARD
Mo  Ahddoud
First  UK  critical  infrastructure  
company  running  100%  in  
the  cloud  
Todd  Oxford
Enabled  disaster  recovery  
access  to  comply  with  FEMA  
first  &  second  line  response  
regulations
Mark  Merkow
Integrating  app  security  
testing  into  SDLC  for  500+  
developer  organization
34 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS
BREAKING
BARRIERS
AWARD
Mo  Ahddoud
First  UK  critical  infrastructure  
company  running  100%  in  
the  cloud  
Todd  Oxford
Enabled  disaster  recovery  
access  to  comply  with  FEMA  
first  &  second  line  response  
regulations
Mark  Merkow
Integrating  app  security  
testing  into  SDLC  for  500+  
developer  organization
35 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS
CA  World ’17
See  the  latest  
innovation  in  
the  demo  area  
Immerse  in  all  
of  the  customer  
case  studies  
on  stage
Meet  with  our  
product  teams  
at  the  executive  
center
36 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS
Thank  you.
Stay  connected  at  communities.ca.com
&  community.veracode.com
37 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS
Security  and  DevSecOps
For  more  information  on  Security,
please  visit:  http://cainc.to/CAW17-­Security
For  more  information  on  DevSecOps,
please  visit:  http://cainc.to/CAW17-­DevSecOps
For  more  information  on  Veracode,
please  visit:  http://community.veracode.com

Mais conteúdo relacionado

Mais procurados

Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...CA Technologies
 
Mobile Payment Security with CA Rapid App Security
Mobile Payment Security with CA Rapid App SecurityMobile Payment Security with CA Rapid App Security
Mobile Payment Security with CA Rapid App SecurityCA Technologies
 
CA Microgateway: Deploying, Configuring, and Extending CA Microgateway
CA Microgateway: Deploying, Configuring, and Extending CA MicrogatewayCA Microgateway: Deploying, Configuring, and Extending CA Microgateway
CA Microgateway: Deploying, Configuring, and Extending CA MicrogatewayCA Technologies
 
When You Test Matters: Why Testing Early in the SDLC is Important
When You Test Matters: Why Testing Early in the SDLC is ImportantWhen You Test Matters: Why Testing Early in the SDLC is Important
When You Test Matters: Why Testing Early in the SDLC is ImportantCA Technologies
 
Cisco Connect 2018 Indonesia - Cisco cmx
Cisco Connect 2018 Indonesia - Cisco cmx Cisco Connect 2018 Indonesia - Cisco cmx
Cisco Connect 2018 Indonesia - Cisco cmx NetworkCollaborators
 
Cisco Connect 2018 Indonesia - Cisco HyperFlex
Cisco Connect 2018 Indonesia - Cisco HyperFlexCisco Connect 2018 Indonesia - Cisco HyperFlex
Cisco Connect 2018 Indonesia - Cisco HyperFlexNetworkCollaborators
 
API Academy: Microservices - How to Safely Speed Up Your Digital Innovation
API Academy: Microservices - How to Safely Speed Up Your Digital InnovationAPI Academy: Microservices - How to Safely Speed Up Your Digital Innovation
API Academy: Microservices - How to Safely Speed Up Your Digital InnovationCA Technologies
 
SE-4110, Securing Identities in the Cloud, by Martin Ahlers
SE-4110, Securing Identities in the Cloud, by Martin AhlersSE-4110, Securing Identities in the Cloud, by Martin Ahlers
SE-4110, Securing Identities in the Cloud, by Martin AhlersAMD Developer Central
 
What's Next in Financial Services Infrastructure Plumbing and APIs
What's Next in Financial Services Infrastructure Plumbing and APIs What's Next in Financial Services Infrastructure Plumbing and APIs
What's Next in Financial Services Infrastructure Plumbing and APIs Stephane Dubois
 
Industrial IoT - build your industry 4.0 @techitaly
Industrial IoT - build your industry 4.0 @techitalyIndustrial IoT - build your industry 4.0 @techitaly
Industrial IoT - build your industry 4.0 @techitalyGiacomo Veneri
 
Winter is Coming for Microservice Complexity - Challenges with Docker Apps
Winter is Coming for Microservice Complexity - Challenges with Docker AppsWinter is Coming for Microservice Complexity - Challenges with Docker Apps
Winter is Coming for Microservice Complexity - Challenges with Docker AppsCA Technologies
 
Zscaler mondi webinar
Zscaler mondi webinarZscaler mondi webinar
Zscaler mondi webinarZscaler
 
Industrial IoT: Connecting Existing Machines to Tomorrow's IoT, ft. Deutsche ...
Industrial IoT: Connecting Existing Machines to Tomorrow's IoT, ft. Deutsche ...Industrial IoT: Connecting Existing Machines to Tomorrow's IoT, ft. Deutsche ...
Industrial IoT: Connecting Existing Machines to Tomorrow's IoT, ft. Deutsche ...Amazon Web Services
 
best commerce cloud consulting | ecom web it solutions | Etisbew
best commerce cloud consulting | ecom web it solutions | Etisbewbest commerce cloud consulting | ecom web it solutions | Etisbew
best commerce cloud consulting | ecom web it solutions | EtisbewVaddeboina Sailaja
 
IntegrationWorks: Grow Your Business with the API Economy
IntegrationWorks: Grow Your Business with the API EconomyIntegrationWorks: Grow Your Business with the API Economy
IntegrationWorks: Grow Your Business with the API EconomyLara Pascoe
 
The Microservices Manifesto: How to Get More Out of the Development Lifecycle
The Microservices Manifesto: How to Get More Out of the Development LifecycleThe Microservices Manifesto: How to Get More Out of the Development Lifecycle
The Microservices Manifesto: How to Get More Out of the Development LifecycleDevOps.com
 
Intel IoT Edge Computing 在 AI 領域的應用與商機
Intel IoT Edge Computing 在 AI 領域的應用與商機Intel IoT Edge Computing 在 AI 領域的應用與商機
Intel IoT Edge Computing 在 AI 領域的應用與商機Amazon Web Services
 

Mais procurados (19)

Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Mobile Payment Security with CA Rapid App Security
Mobile Payment Security with CA Rapid App SecurityMobile Payment Security with CA Rapid App Security
Mobile Payment Security with CA Rapid App Security
 
CA Microgateway: Deploying, Configuring, and Extending CA Microgateway
CA Microgateway: Deploying, Configuring, and Extending CA MicrogatewayCA Microgateway: Deploying, Configuring, and Extending CA Microgateway
CA Microgateway: Deploying, Configuring, and Extending CA Microgateway
 
When You Test Matters: Why Testing Early in the SDLC is Important
When You Test Matters: Why Testing Early in the SDLC is ImportantWhen You Test Matters: Why Testing Early in the SDLC is Important
When You Test Matters: Why Testing Early in the SDLC is Important
 
Cisco Connect 2018 Indonesia - Cisco cmx
Cisco Connect 2018 Indonesia - Cisco cmx Cisco Connect 2018 Indonesia - Cisco cmx
Cisco Connect 2018 Indonesia - Cisco cmx
 
Cisco Connect 2018 Indonesia - Cisco HyperFlex
Cisco Connect 2018 Indonesia - Cisco HyperFlexCisco Connect 2018 Indonesia - Cisco HyperFlex
Cisco Connect 2018 Indonesia - Cisco HyperFlex
 
API Academy: Microservices - How to Safely Speed Up Your Digital Innovation
API Academy: Microservices - How to Safely Speed Up Your Digital InnovationAPI Academy: Microservices - How to Safely Speed Up Your Digital Innovation
API Academy: Microservices - How to Safely Speed Up Your Digital Innovation
 
SE-4110, Securing Identities in the Cloud, by Martin Ahlers
SE-4110, Securing Identities in the Cloud, by Martin AhlersSE-4110, Securing Identities in the Cloud, by Martin Ahlers
SE-4110, Securing Identities in the Cloud, by Martin Ahlers
 
What's Next in Financial Services Infrastructure Plumbing and APIs
What's Next in Financial Services Infrastructure Plumbing and APIs What's Next in Financial Services Infrastructure Plumbing and APIs
What's Next in Financial Services Infrastructure Plumbing and APIs
 
Industrial IoT - build your industry 4.0 @techitaly
Industrial IoT - build your industry 4.0 @techitalyIndustrial IoT - build your industry 4.0 @techitaly
Industrial IoT - build your industry 4.0 @techitaly
 
Winter is Coming for Microservice Complexity - Challenges with Docker Apps
Winter is Coming for Microservice Complexity - Challenges with Docker AppsWinter is Coming for Microservice Complexity - Challenges with Docker Apps
Winter is Coming for Microservice Complexity - Challenges with Docker Apps
 
Zscaler mondi webinar
Zscaler mondi webinarZscaler mondi webinar
Zscaler mondi webinar
 
Industrial IoT: Connecting Existing Machines to Tomorrow's IoT, ft. Deutsche ...
Industrial IoT: Connecting Existing Machines to Tomorrow's IoT, ft. Deutsche ...Industrial IoT: Connecting Existing Machines to Tomorrow's IoT, ft. Deutsche ...
Industrial IoT: Connecting Existing Machines to Tomorrow's IoT, ft. Deutsche ...
 
best commerce cloud consulting | ecom web it solutions | Etisbew
best commerce cloud consulting | ecom web it solutions | Etisbewbest commerce cloud consulting | ecom web it solutions | Etisbew
best commerce cloud consulting | ecom web it solutions | Etisbew
 
IntegrationWorks: Grow Your Business with the API Economy
IntegrationWorks: Grow Your Business with the API EconomyIntegrationWorks: Grow Your Business with the API Economy
IntegrationWorks: Grow Your Business with the API Economy
 
The Akamai Security Portfolio
The Akamai Security PortfolioThe Akamai Security Portfolio
The Akamai Security Portfolio
 
AWS IoT Lab Introduction
AWS IoT Lab IntroductionAWS IoT Lab Introduction
AWS IoT Lab Introduction
 
The Microservices Manifesto: How to Get More Out of the Development Lifecycle
The Microservices Manifesto: How to Get More Out of the Development LifecycleThe Microservices Manifesto: How to Get More Out of the Development Lifecycle
The Microservices Manifesto: How to Get More Out of the Development Lifecycle
 
Intel IoT Edge Computing 在 AI 領域的應用與商機
Intel IoT Edge Computing 在 AI 領域的應用與商機Intel IoT Edge Computing 在 AI 領域的應用與商機
Intel IoT Edge Computing 在 AI 領域的應用與商機
 

Semelhante a Keynote: Making Security a Competitive Advantage

Automating the Modern Software Factory
Automating the Modern Software FactoryAutomating the Modern Software Factory
Automating the Modern Software FactoryCA Technologies
 
CA's Vision for Business Automation
CA's Vision for Business AutomationCA's Vision for Business Automation
CA's Vision for Business AutomationCA Technologies
 
CA's Vision for Business Automation
CA's Vision for Business AutomationCA's Vision for Business Automation
CA's Vision for Business AutomationCA Technologies
 
CIS 2017 - So you want to use standards to secure your APIs?
CIS 2017 - So you want to use standards to secure your APIs?CIS 2017 - So you want to use standards to secure your APIs?
CIS 2017 - So you want to use standards to secure your APIs?Bertrand Carlier
 
Victor Ake and Chris Kawalek - ForgeRock Identity Live 2017 - Dusseldorf
Victor Ake and Chris Kawalek - ForgeRock Identity Live 2017 - DusseldorfVictor Ake and Chris Kawalek - ForgeRock Identity Live 2017 - Dusseldorf
Victor Ake and Chris Kawalek - ForgeRock Identity Live 2017 - DusseldorfForgeRock
 
Seguridad en Capas: Smart & Actionable Data
Seguridad en Capas: Smart & Actionable DataSeguridad en Capas: Smart & Actionable Data
Seguridad en Capas: Smart & Actionable DataCristian Garcia G.
 
Csa Summit 2017 - Un viaje seguro hacia la nube
Csa Summit 2017 - Un viaje seguro hacia la nubeCsa Summit 2017 - Un viaje seguro hacia la nube
Csa Summit 2017 - Un viaje seguro hacia la nubeCSA Argentina
 
Cisco Cybersecurity #10YearChallenge
Cisco Cybersecurity #10YearChallengeCisco Cybersecurity #10YearChallenge
Cisco Cybersecurity #10YearChallengeCristian Garcia G.
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseCA Technologies
 
Three Secrets to Becoming a Mobile Security Superhero
Three Secrets to Becoming a Mobile Security SuperheroThree Secrets to Becoming a Mobile Security Superhero
Three Secrets to Becoming a Mobile Security SuperheroSkycure
 
Akamai Intelligent Edge Security
Akamai Intelligent Edge SecurityAkamai Intelligent Edge Security
Akamai Intelligent Edge SecurityAkamai Technologies
 
Presales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptxPresales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptxPawachMetharattanara
 
Presales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptxPresales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptxPawachMetharattanara
 
BlueHat v18 || Dep for the app layer - time for app sec to grow up
BlueHat v18 || Dep for the app layer - time for app sec to grow upBlueHat v18 || Dep for the app layer - time for app sec to grow up
BlueHat v18 || Dep for the app layer - time for app sec to grow upBlueHat Security Conference
 
The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...
The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...
The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...CA Technologies
 
Enable and Secure Business Growth in the New Application Economy
 Enable and Secure Business Growth in the New Application Economy Enable and Secure Business Growth in the New Application Economy
Enable and Secure Business Growth in the New Application EconomyCA Technologies
 
Network security security landscape-10-11-2016 part i 1200 dpi (vgarr)
Network security security landscape-10-11-2016 part i 1200 dpi (vgarr)Network security security landscape-10-11-2016 part i 1200 dpi (vgarr)
Network security security landscape-10-11-2016 part i 1200 dpi (vgarr)Vince Garr
 
End to End Security - Check Point
End to End Security - Check PointEnd to End Security - Check Point
End to End Security - Check PointHarry Gunns
 
Closed Loop Remediation with CA Automic Service Orchestration
Closed Loop Remediation with CA Automic Service OrchestrationClosed Loop Remediation with CA Automic Service Orchestration
Closed Loop Remediation with CA Automic Service OrchestrationCA Technologies
 
Application Security in a DevOps World
Application Security in a DevOps WorldApplication Security in a DevOps World
Application Security in a DevOps WorldCA Technologies
 

Semelhante a Keynote: Making Security a Competitive Advantage (20)

Automating the Modern Software Factory
Automating the Modern Software FactoryAutomating the Modern Software Factory
Automating the Modern Software Factory
 
CA's Vision for Business Automation
CA's Vision for Business AutomationCA's Vision for Business Automation
CA's Vision for Business Automation
 
CA's Vision for Business Automation
CA's Vision for Business AutomationCA's Vision for Business Automation
CA's Vision for Business Automation
 
CIS 2017 - So you want to use standards to secure your APIs?
CIS 2017 - So you want to use standards to secure your APIs?CIS 2017 - So you want to use standards to secure your APIs?
CIS 2017 - So you want to use standards to secure your APIs?
 
Victor Ake and Chris Kawalek - ForgeRock Identity Live 2017 - Dusseldorf
Victor Ake and Chris Kawalek - ForgeRock Identity Live 2017 - DusseldorfVictor Ake and Chris Kawalek - ForgeRock Identity Live 2017 - Dusseldorf
Victor Ake and Chris Kawalek - ForgeRock Identity Live 2017 - Dusseldorf
 
Seguridad en Capas: Smart & Actionable Data
Seguridad en Capas: Smart & Actionable DataSeguridad en Capas: Smart & Actionable Data
Seguridad en Capas: Smart & Actionable Data
 
Csa Summit 2017 - Un viaje seguro hacia la nube
Csa Summit 2017 - Un viaje seguro hacia la nubeCsa Summit 2017 - Un viaje seguro hacia la nube
Csa Summit 2017 - Un viaje seguro hacia la nube
 
Cisco Cybersecurity #10YearChallenge
Cisco Cybersecurity #10YearChallengeCisco Cybersecurity #10YearChallenge
Cisco Cybersecurity #10YearChallenge
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital Enterprise
 
Three Secrets to Becoming a Mobile Security Superhero
Three Secrets to Becoming a Mobile Security SuperheroThree Secrets to Becoming a Mobile Security Superhero
Three Secrets to Becoming a Mobile Security Superhero
 
Akamai Intelligent Edge Security
Akamai Intelligent Edge SecurityAkamai Intelligent Edge Security
Akamai Intelligent Edge Security
 
Presales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptxPresales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptx
 
Presales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptxPresales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptx
 
BlueHat v18 || Dep for the app layer - time for app sec to grow up
BlueHat v18 || Dep for the app layer - time for app sec to grow upBlueHat v18 || Dep for the app layer - time for app sec to grow up
BlueHat v18 || Dep for the app layer - time for app sec to grow up
 
The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...
The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...
The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...
 
Enable and Secure Business Growth in the New Application Economy
 Enable and Secure Business Growth in the New Application Economy Enable and Secure Business Growth in the New Application Economy
Enable and Secure Business Growth in the New Application Economy
 
Network security security landscape-10-11-2016 part i 1200 dpi (vgarr)
Network security security landscape-10-11-2016 part i 1200 dpi (vgarr)Network security security landscape-10-11-2016 part i 1200 dpi (vgarr)
Network security security landscape-10-11-2016 part i 1200 dpi (vgarr)
 
End to End Security - Check Point
End to End Security - Check PointEnd to End Security - Check Point
End to End Security - Check Point
 
Closed Loop Remediation with CA Automic Service Orchestration
Closed Loop Remediation with CA Automic Service OrchestrationClosed Loop Remediation with CA Automic Service Orchestration
Closed Loop Remediation with CA Automic Service Orchestration
 
Application Security in a DevOps World
Application Security in a DevOps WorldApplication Security in a DevOps World
Application Security in a DevOps World
 

Mais de CA Technologies

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Technologies
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceCA Technologies
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...CA Technologies
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCA Technologies
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...CA Technologies
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCA Technologies
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...CA Technologies
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageCA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...CA Technologies
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...CA Technologies
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...CA Technologies
 
How Components Increase Speed and Risk
How Components Increase Speed and RiskHow Components Increase Speed and Risk
How Components Increase Speed and RiskCA Technologies
 
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...CA Technologies
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCA Technologies
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...CA Technologies
 
Case Study: Continuous Delivery in a Tech Debt Laden World by Talk Talk.
Case Study: Continuous Delivery in a Tech Debt Laden World by Talk Talk.Case Study: Continuous Delivery in a Tech Debt Laden World by Talk Talk.
Case Study: Continuous Delivery in a Tech Debt Laden World by Talk Talk.CA Technologies
 
Case Study: United Airlines Transforms Release Management for Its Modern Soft...
Case Study: United Airlines Transforms Release Management for Its Modern Soft...Case Study: United Airlines Transforms Release Management for Its Modern Soft...
Case Study: United Airlines Transforms Release Management for Its Modern Soft...CA Technologies
 
Keynote: Unlock the Power of Continuous Delivery with End-to-End, Integrated ...
Keynote: Unlock the Power of Continuous Delivery with End-to-End, Integrated ...Keynote: Unlock the Power of Continuous Delivery with End-to-End, Integrated ...
Keynote: Unlock the Power of Continuous Delivery with End-to-End, Integrated ...CA Technologies
 

Mais de CA Technologies (18)

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource Intelligence
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software Development
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on Time
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive Advantage
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
 
How Components Increase Speed and Risk
How Components Increase Speed and RiskHow Components Increase Speed and Risk
How Components Increase Speed and Risk
 
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software Development
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
 
Case Study: Continuous Delivery in a Tech Debt Laden World by Talk Talk.
Case Study: Continuous Delivery in a Tech Debt Laden World by Talk Talk.Case Study: Continuous Delivery in a Tech Debt Laden World by Talk Talk.
Case Study: Continuous Delivery in a Tech Debt Laden World by Talk Talk.
 
Case Study: United Airlines Transforms Release Management for Its Modern Soft...
Case Study: United Airlines Transforms Release Management for Its Modern Soft...Case Study: United Airlines Transforms Release Management for Its Modern Soft...
Case Study: United Airlines Transforms Release Management for Its Modern Soft...
 
Keynote: Unlock the Power of Continuous Delivery with End-to-End, Integrated ...
Keynote: Unlock the Power of Continuous Delivery with End-to-End, Integrated ...Keynote: Unlock the Power of Continuous Delivery with End-to-End, Integrated ...
Keynote: Unlock the Power of Continuous Delivery with End-to-End, Integrated ...
 

Último

SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 

Último (20)

SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 

Keynote: Making Security a Competitive Advantage

  • 1. Make  Security  a  Competitive  Advantage Mordecai  (Mo)  Rosen   SECURITY SECURITY General  Manager,  Security CA  Technologies General  Manager CA  Veracode Sam  King
  • 2. 2 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS Eliminate  Barriers   Between  Ideas  and  Outcomes CREATE  AN  AGILE   BUSINESS BUILD  BETTER       APPS  FASTER MAKE  SECURITY  A   COMPETITIVE  ADVANTAGE MAXIMIZE  APPLICATION   PERFORMANCE
  • 3. 3 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS HOME  AUTOMATION PHYSICAL  SECURITY EHEALTH  DEVICES WEARABLES SMART  METERS SHIPPING  LOGISTICS PROPERTY  MANAGEMENT   ECOLOGY FACTORY  AUTOMATION SMART  PHONES TABLETS CAMERAS PHONES TELEVISIONS AUTOMOBILES THERMOSTATS WWW CHAT  &  IM API SERVICES CLOUD SERVICES First  a  Brief  History  of THE  EXPANDING   DIGITAL   EXPERIENCE  
  • 4. 4 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS THE  DIGITAL   EXPERIENCE   Is  Between  Users   and  Applications HOME  AUTOMATION PHYSICAL  SECURITY EHEALTH  DEVICES WEARABLES SMART  METERS SHIPPING  LOGISTICS PROPERTY  MANAGEMENT   ECOLOGY FACTORY  AUTOMATION SMART  PHONES TABLETS CAMERAS PHONES TELEVISIONS AUTOMOBILES THERMOSTATS WWW CHAT  &  IM API SERVICES CLOUD SERVICES
  • 5. 5 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS MAKES  EVERY  COMPANY  A  SOFTWARE  COMPANY APPLICATION EXPLOSION CONSUMERIZED IT CONNECTED ENTERPRISES DIGITAL MARKETPLACES DIGITAL WORKPLACES CONNECTED IOT The  Application  Economy
  • 6. 6 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS The  Application  Economy REQUIRES  NEW  THINKING  ON  SECURITY FIREWALL IDS/IPS WEB  PROXY ANTI-­VIRUS ANTI-­MALWARE 100% INEFFECTIVE USERS  &  APPS UNDER  ATTACK SHADOW  IT 30% Of  all  attacks  will  be  in   shadow  IT  resources APP  DEFECTS 90% Of  breaches caused   by  application  defects 3RD  PARTY  RISK 70% Of  attacks  targeted a   secondary  source   IDENTITY  FRAUD 80% Of  breaches  used  lost   stolen  &  weak  credentials CREDIT  FRAUD 42% Of  all  data  stolen  is credit  card  data   FireEye  Study  of  6  Months  of  Penetration  Testing  
  • 7. 7 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS A QUESTION OF TRUST USERS INTERACTIONS APPLICATIONS Security  Becomes
  • 8. 8 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS CA  Security  Strategy  To   SECURING  THE  APPLICATION  ECONOMY TRUSTED USERS  & APPLICATIONS   PREVENTATIVE   DETECTION  & RESPONSIVE INSIGHT   ANALYTICS  & INTELLIGENCE FRICTIONLESS   SECURITY  & EXPERIENCE CORE  PRINCIPLES  
  • 9. 9 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS IDENTITY  & ACCESS   APPLICATION SECURITY API SECRUITY PAYMENT SECURITY PRODUCT  PORTFOLIO CA  Security  Strategy  To   SECURING  THE  APPLICATION  ECONOMY
  • 10. 10 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS LINES  OF  CODE   SCANNED6  TRILLION 1400  CUSTOMERS 400K APPLICATION   SECURITY   ADVISORY   HOURS 35.5M SECURITY  FLAWS  FIXED 4X GARTNER MQ  LEADER 24 LANGUAGES 77 FRAMEWORKS APPLICATION SECURITY CA  VERACODE
  • 11. 11 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS Ensuring GREAT  SOFTWARE  IS  SECURE  SOFTWARE EMPOWER DEVELOPERS  TO   SECURE  CODE INTEGRATED  INTO CONTINUOUS   DELIVERY EARLY  DETECT TO  REDUCE  COST AUTOMATED  TO   REDUCE  MTTR
  • 12. 12 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS CODECOMMIT BUILD TEST RELEASE OPERATE SECURITY  INTO  CONTINUOUS  DELIVERY   TEST TEST DevSecOps SECURE  SOFTWARE   DEVELOPENT SECURITY   ASSURANCE OPERATIONAL   APPLICATION  SECURITY Merging
  • 13. 13 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS CODECOMMIT BUILD TEST RELEASE OPERATE SECURE  SOFTWARE   DEVELOPENT SECURITY   ASSURANCE OPERATIONAL   APPLICATION  SECURITY DevSecOps TEST TEST CA  Veracode  Greenlight CA  Veracode  Static  Analysis CA  Veracode  Web  Application  Scanning CA  Veracode  Runtime  Protection CA  Veracode  Software  Composition  Analysis CA  Veracode  Integrations,  APIs CA  Veracode  eLearning
  • 14. 14 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS Securing  Applications  With   NEXT  GENERATION  IDENTITY  MANAGEMENT 80%of  all  data  breaches  exploit   lost,  stolen  &  weak  credentials HYBRID CLOUD DEVELOPER APIs BEHAVIOR ANALYTICS
  • 15. 15 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS API   ENABLED HIGH  SCALE   APPLIANCE HYBRID CLOUD SECURE   CONTINUOUS DELIVERY     PRIVILEGED GOVERNANCE Central  Authentication Credential  Vault Policy  Enforcement Role  -­ Based  Access Federated  Identity Session  Recording CA  Privileged  Access  Manager PROTECTING PRIVILEGED IDENTITY
  • 16. 16 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS ENABLING APP TO APP TRUST User  &  App   Authentication  API Mobile   Authentication  API Secure  Server   Communications Context  Based Risk  Analysis CA  Rapid  App  Security Risk  Based  Analytics
  • 17. 17 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS RISK ANALYTICS WORKS EMPIRICALLY
  • 18. 18 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD        #NOBARRIERS Digital  Payments   Fraud Directory Identity   Management Privileged   Access   Management Single   Sign-­‐on Identity   Governance Risk  Based   Authentication Orchestrating   Identity  &   Access Employees  &   Administrators Customers  &   Partners Internet  of  Things Developers Cloud   Services On   Premise   Apps Mobile Web API CA  Security  &  Identity  Management  Portfolio
  • 19. 19 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD        #NOBARRIERS CONTROLLING  PRIVILEGED  ACCESS IN  A  WORLD  ON  TIME
  • 20. 20 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD        #NOBARRIERS CONTROLLING  PRIVILEGED  ACCESS IN  A  WORLD  ON  TIME
  • 21. 21 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD        #NOBARRIERS CONTROLLING  PRIVILEGED  ACCESS IN  A  WORLD  ON  TIME
  • 22. 22 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD        #NOBARRIERS CONTROLLING  PRIVILEGED  ACCESS IN  A  WORLD  ON  TIME
  • 23. 23 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD        #NOBARRIERS CONTROLLING  PRIVILEGED  ACCESS IN  A  WORLD  ON  TIME
  • 24. 24 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS APPLICATION SECURITY TESTING FRICTIONLESS  
  • 25. 25 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS APPLICATION SECURITY TESTING FRICTIONLESS  
  • 26. 26 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS APPLICATION SECURITY TESTING FRICTIONLESS  
  • 27. 27 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS ARTHUR WONG Interview  With SVP  &  GM DXC  Security  
  • 28. 28 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS ARTHUR WONG Interview  With SVP  &  GM DXC  Security  
  • 29. 29 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS ARTHUR WONG Interview  With SVP  &  GM DXC  Security  
  • 30. 30 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS ARTHUR WONG Interview  With SVP  &  GM DXC  Security  
  • 31. 31 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS BREAKING BARRIERS AWARD Mo  Ahddoud First  UK  critical  infrastructure   company  running  100%  in   the  cloud   Todd  Oxford Enabled  disaster  recovery   access  to  comply  with  FEMA   first  &  second  line  response   regulations Mark  Merkow Integrating  app  security   testing  into  SDLC  for  500+   developer  organization
  • 32. 32 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS BREAKING BARRIERS AWARD Mo  Ahddoud First  UK  critical  infrastructure   company  running  100%  in   the  cloud   Todd  Oxford Enabled  disaster  recovery   access  to  comply  with  FEMA   first  &  second  line  response   regulations Mark  Merkow Integrating  app  security   testing  into  SDLC  for  500+   developer  organization
  • 33. 33 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS BREAKING BARRIERS AWARD Mo  Ahddoud First  UK  critical  infrastructure   company  running  100%  in   the  cloud   Todd  Oxford Enabled  disaster  recovery   access  to  comply  with  FEMA   first  &  second  line  response   regulations Mark  Merkow Integrating  app  security   testing  into  SDLC  for  500+   developer  organization
  • 34. 34 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS BREAKING BARRIERS AWARD Mo  Ahddoud First  UK  critical  infrastructure   company  running  100%  in   the  cloud   Todd  Oxford Enabled  disaster  recovery   access  to  comply  with  FEMA   first  &  second  line  response   regulations Mark  Merkow Integrating  app  security   testing  into  SDLC  for  500+   developer  organization
  • 35. 35 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS CA  World ’17 See  the  latest   innovation  in   the  demo  area   Immerse  in  all   of  the  customer   case  studies   on  stage Meet  with  our   product  teams   at  the  executive   center
  • 36. 36 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS Thank  you. Stay  connected  at  communities.ca.com &  community.veracode.com
  • 37. 37 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS Security  and  DevSecOps For  more  information  on  Security, please  visit:  http://cainc.to/CAW17-­Security For  more  information  on  DevSecOps, please  visit:  http://cainc.to/CAW17-­DevSecOps For  more  information  on  Veracode, please  visit:  http://community.veracode.com