SlideShare uma empresa Scribd logo
1 de 37
Baixar para ler offline
Make  Security  a  Competitive  Advantage
Mordecai  (Mo)  Rosen  
SECURITY
SECURITY
General  Manager,  Security
CA  Technologies
General  Manager
CA  Veracode
Sam  King
2 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS
Eliminate  Barriers  
Between  Ideas  and  Outcomes
CREATE  AN  AGILE  
BUSINESS
BUILD  BETTER      
APPS  FASTER
MAKE  SECURITY  A  
COMPETITIVE  ADVANTAGE
MAXIMIZE  APPLICATION  
PERFORMANCE
3 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS
HOME  AUTOMATION
PHYSICAL  SECURITY
EHEALTH  DEVICES
WEARABLES
SMART  METERS
SHIPPING  LOGISTICS
PROPERTY  MANAGEMENT  
ECOLOGY
FACTORY  AUTOMATION
SMART  PHONES
TABLETS
CAMERAS
PHONES
TELEVISIONS
AUTOMOBILES
THERMOSTATS
WWW
CHAT  &  IM
API
SERVICES
CLOUD
SERVICES
First  a  Brief  History  of
THE  EXPANDING  
DIGITAL  
EXPERIENCE  
4 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS
THE  DIGITAL  
EXPERIENCE  
Is  Between  Users  
and  Applications
HOME  AUTOMATION
PHYSICAL  SECURITY
EHEALTH  DEVICES
WEARABLES
SMART  METERS
SHIPPING  LOGISTICS
PROPERTY  MANAGEMENT  
ECOLOGY
FACTORY  AUTOMATION
SMART  PHONES
TABLETS
CAMERAS
PHONES
TELEVISIONS
AUTOMOBILES
THERMOSTATS
WWW
CHAT  &  IM
API
SERVICES
CLOUD
SERVICES
5 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS
MAKES  EVERY  COMPANY  A  SOFTWARE  COMPANY
APPLICATION
EXPLOSION
CONSUMERIZED
IT
CONNECTED
ENTERPRISES
DIGITAL
MARKETPLACES
DIGITAL
WORKPLACES
CONNECTED
IOT
The  Application  Economy
6 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS
The  Application  Economy
REQUIRES  NEW  THINKING  ON  SECURITY
FIREWALL
IDS/IPS
WEB  PROXY
ANTI-­VIRUS
ANTI-­MALWARE
100%
INEFFECTIVE
USERS  &  APPS
UNDER  ATTACK
SHADOW  IT
30%
Of  all  attacks  will  be  in  
shadow  IT  resources
APP  DEFECTS
90%
Of  breaches caused  
by  application  defects
3RD  PARTY  RISK
70% Of  attacks  targeted a  
secondary  source  
IDENTITY  FRAUD
80% Of  breaches  used  lost  
stolen  &  weak  credentials
CREDIT  FRAUD
42%
Of  all  data  stolen  is
credit  card  data  
FireEye  Study  of  6  Months  of  Penetration  Testing  
7 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS
A QUESTION
OF TRUST
USERS
INTERACTIONS
APPLICATIONS
Security  Becomes
8 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS
CA  Security  Strategy  To  
SECURING  THE  APPLICATION  ECONOMY
TRUSTED
USERS  &
APPLICATIONS  
PREVENTATIVE  
DETECTION  &
RESPONSIVE
INSIGHT  
ANALYTICS  &
INTELLIGENCE
FRICTIONLESS  
SECURITY  &
EXPERIENCE
CORE  PRINCIPLES  
9 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS
IDENTITY  &
ACCESS  
APPLICATION
SECURITY
API
SECRUITY
PAYMENT
SECURITY
PRODUCT  PORTFOLIO
CA  Security  Strategy  To  
SECURING  THE  APPLICATION  ECONOMY
10 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS
LINES  OF  CODE  
SCANNED6  TRILLION
1400  CUSTOMERS 400K
APPLICATION  
SECURITY  
ADVISORY  
HOURS
35.5M SECURITY  FLAWS  FIXED
4X GARTNER
MQ  LEADER
24 LANGUAGES
77 FRAMEWORKS
APPLICATION
SECURITY
CA  VERACODE
11 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS
Ensuring
GREAT  SOFTWARE  IS  SECURE  SOFTWARE
EMPOWER
DEVELOPERS  TO  
SECURE  CODE
INTEGRATED  INTO
CONTINUOUS  
DELIVERY
EARLY  DETECT
TO  REDUCE  COST
AUTOMATED  TO  
REDUCE  MTTR
12 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS
CODECOMMIT BUILD
TEST
RELEASE OPERATE
SECURITY  INTO  CONTINUOUS  DELIVERY  
TEST TEST
DevSecOps
SECURE  SOFTWARE  
DEVELOPENT
SECURITY  
ASSURANCE
OPERATIONAL  
APPLICATION  SECURITY
Merging
13 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS
CODECOMMIT BUILD
TEST
RELEASE OPERATE
SECURE  SOFTWARE  
DEVELOPENT
SECURITY  
ASSURANCE
OPERATIONAL  
APPLICATION  SECURITY
DevSecOps
TEST TEST
CA  Veracode  Greenlight CA  Veracode  Static  Analysis
CA  Veracode  Web  Application  Scanning
CA  Veracode  Runtime  Protection
CA  Veracode  Software  Composition  Analysis
CA  Veracode  Integrations,  APIs
CA  Veracode  eLearning
14 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS
Securing  Applications  With  
NEXT  GENERATION  IDENTITY  MANAGEMENT
80%of  all  data  breaches  exploit  
lost,  stolen  &  weak  credentials
HYBRID
CLOUD
DEVELOPER
APIs
BEHAVIOR
ANALYTICS
15 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS
API  
ENABLED
HIGH  SCALE  
APPLIANCE
HYBRID
CLOUD
SECURE  
CONTINUOUS
DELIVERY    
PRIVILEGED
GOVERNANCE
Central  Authentication
Credential  Vault
Policy  Enforcement
Role  -­ Based  Access
Federated  Identity Session  Recording
CA  Privileged  Access  Manager
PROTECTING
PRIVILEGED
IDENTITY
16 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS
ENABLING
APP TO APP
TRUST
User  &  App  
Authentication  API
Mobile  
Authentication  API
Secure  Server  
Communications
Context  Based
Risk  Analysis
CA  Rapid  App  Security
Risk  Based  Analytics
17 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS
RISK
ANALYTICS
WORKS
EMPIRICALLY
18 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD        #NOBARRIERS
Digital	
  Payments	
  
Fraud
Directory
Identity	
  
Management
Privileged	
  
Access	
  
Management
Single	
  
Sign-­‐on
Identity	
  
Governance
Risk	
  Based	
  
Authentication
Orchestrating	
  
Identity	
  &	
  
Access
Employees  &  
Administrators
Customers  &  
Partners
Internet  of  Things
Developers
Cloud	
  
Services
On	
  
Premise	
  
Apps
Mobile
Web
API
CA  Security  &  Identity  Management  Portfolio
19 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD        #NOBARRIERS
CONTROLLING  PRIVILEGED  ACCESS
IN  A  WORLD  ON  TIME
20 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD        #NOBARRIERS
CONTROLLING  PRIVILEGED  ACCESS
IN  A  WORLD  ON  TIME
21 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD        #NOBARRIERS
CONTROLLING  PRIVILEGED  ACCESS
IN  A  WORLD  ON  TIME
22 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD        #NOBARRIERS
CONTROLLING  PRIVILEGED  ACCESS
IN  A  WORLD  ON  TIME
23 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD        #NOBARRIERS
CONTROLLING  PRIVILEGED  ACCESS
IN  A  WORLD  ON  TIME
24 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS
APPLICATION
SECURITY
TESTING
FRICTIONLESS  
25 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS
APPLICATION
SECURITY
TESTING
FRICTIONLESS  
26 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS
APPLICATION
SECURITY
TESTING
FRICTIONLESS  
27 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS
ARTHUR
WONG
Interview  With
SVP  &  GM
DXC  Security  
28 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS
ARTHUR
WONG
Interview  With
SVP  &  GM
DXC  Security  
29 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS
ARTHUR
WONG
Interview  With
SVP  &  GM
DXC  Security  
30 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS
ARTHUR
WONG
Interview  With
SVP  &  GM
DXC  Security  
31 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS
BREAKING
BARRIERS
AWARD
Mo  Ahddoud
First  UK  critical  infrastructure  
company  running  100%  in  
the  cloud  
Todd  Oxford
Enabled  disaster  recovery  
access  to  comply  with  FEMA  
first  &  second  line  response  
regulations
Mark  Merkow
Integrating  app  security  
testing  into  SDLC  for  500+  
developer  organization
32 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS
BREAKING
BARRIERS
AWARD
Mo  Ahddoud
First  UK  critical  infrastructure  
company  running  100%  in  
the  cloud  
Todd  Oxford
Enabled  disaster  recovery  
access  to  comply  with  FEMA  
first  &  second  line  response  
regulations
Mark  Merkow
Integrating  app  security  
testing  into  SDLC  for  500+  
developer  organization
33 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS
BREAKING
BARRIERS
AWARD
Mo  Ahddoud
First  UK  critical  infrastructure  
company  running  100%  in  
the  cloud  
Todd  Oxford
Enabled  disaster  recovery  
access  to  comply  with  FEMA  
first  &  second  line  response  
regulations
Mark  Merkow
Integrating  app  security  
testing  into  SDLC  for  500+  
developer  organization
34 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS
BREAKING
BARRIERS
AWARD
Mo  Ahddoud
First  UK  critical  infrastructure  
company  running  100%  in  
the  cloud  
Todd  Oxford
Enabled  disaster  recovery  
access  to  comply  with  FEMA  
first  &  second  line  response  
regulations
Mark  Merkow
Integrating  app  security  
testing  into  SDLC  for  500+  
developer  organization
35 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS
CA  World ’17
See  the  latest  
innovation  in  
the  demo  area  
Immerse  in  all  
of  the  customer  
case  studies  
on  stage
Meet  with  our  
product  teams  
at  the  executive  
center
36 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS
Thank  you.
Stay  connected  at  communities.ca.com
&  community.veracode.com
37 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS
Security  and  DevSecOps
For  more  information  on  Security,
please  visit:  http://cainc.to/CAW17-­Security
For  more  information  on  DevSecOps,
please  visit:  http://cainc.to/CAW17-­DevSecOps
For  more  information  on  Veracode,
please  visit:  http://community.veracode.com

Mais conteúdo relacionado

Mais procurados

Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseCA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...CA Technologies
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...CA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...CA Technologies
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentCA Technologies
 
When You Test Matters: Why Testing Early in the SDLC is Important
When You Test Matters: Why Testing Early in the SDLC is ImportantWhen You Test Matters: Why Testing Early in the SDLC is Important
When You Test Matters: Why Testing Early in the SDLC is ImportantCA Technologies
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...CA Technologies
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...CA Technologies
 
Mobile Payment Security with CA Rapid App Security
Mobile Payment Security with CA Rapid App SecurityMobile Payment Security with CA Rapid App Security
Mobile Payment Security with CA Rapid App SecurityCA Technologies
 
CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Technologies
 
CA Microgateway: Deploying, Configuring, and Extending CA Microgateway
CA Microgateway: Deploying, Configuring, and Extending CA MicrogatewayCA Microgateway: Deploying, Configuring, and Extending CA Microgateway
CA Microgateway: Deploying, Configuring, and Extending CA MicrogatewayCA Technologies
 
Application Security in a DevOps World
Application Security in a DevOps WorldApplication Security in a DevOps World
Application Security in a DevOps WorldCA Technologies
 
The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...
The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...
The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...CA Technologies
 
Securing Container-Based Applications at the Speed of DevOps
Securing Container-Based Applications at the Speed of DevOpsSecuring Container-Based Applications at the Speed of DevOps
Securing Container-Based Applications at the Speed of DevOpsWhiteSource
 
Keynote: Unlock the Power of Continuous Delivery with End-to-End, Integrated ...
Keynote: Unlock the Power of Continuous Delivery with End-to-End, Integrated ...Keynote: Unlock the Power of Continuous Delivery with End-to-End, Integrated ...
Keynote: Unlock the Power of Continuous Delivery with End-to-End, Integrated ...CA Technologies
 
Zscaler mondi webinar
Zscaler mondi webinarZscaler mondi webinar
Zscaler mondi webinarZscaler
 
apidays LIVE New York 2021 - APIOps: automating API operations for speed and ...
apidays LIVE New York 2021 - APIOps: automating API operations for speed and ...apidays LIVE New York 2021 - APIOps: automating API operations for speed and ...
apidays LIVE New York 2021 - APIOps: automating API operations for speed and ...apidays
 
Esg lab-validation-check-point-cloud guard-mar-2018
Esg lab-validation-check-point-cloud guard-mar-2018Esg lab-validation-check-point-cloud guard-mar-2018
Esg lab-validation-check-point-cloud guard-mar-2018Alejandro Daricz
 
SACON - Beyond corp (Arnab Chattopadhayay)
SACON - Beyond corp (Arnab Chattopadhayay)SACON - Beyond corp (Arnab Chattopadhayay)
SACON - Beyond corp (Arnab Chattopadhayay)Priyanka Aash
 
Protecting Our Cyber-Identity in a Physical and Virtual World for IoT Ecosystem
Protecting Our Cyber-Identity in a Physical and Virtual World for IoT EcosystemProtecting Our Cyber-Identity in a Physical and Virtual World for IoT Ecosystem
Protecting Our Cyber-Identity in a Physical and Virtual World for IoT EcosystemCA Technologies
 

Mais procurados (20)

Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital Enterprise
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of Deployment
 
When You Test Matters: Why Testing Early in the SDLC is Important
When You Test Matters: Why Testing Early in the SDLC is ImportantWhen You Test Matters: Why Testing Early in the SDLC is Important
When You Test Matters: Why Testing Early in the SDLC is Important
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
 
Mobile Payment Security with CA Rapid App Security
Mobile Payment Security with CA Rapid App SecurityMobile Payment Security with CA Rapid App Security
Mobile Payment Security with CA Rapid App Security
 
CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource Intelligence
 
CA Microgateway: Deploying, Configuring, and Extending CA Microgateway
CA Microgateway: Deploying, Configuring, and Extending CA MicrogatewayCA Microgateway: Deploying, Configuring, and Extending CA Microgateway
CA Microgateway: Deploying, Configuring, and Extending CA Microgateway
 
Application Security in a DevOps World
Application Security in a DevOps WorldApplication Security in a DevOps World
Application Security in a DevOps World
 
The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...
The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...
The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...
 
Securing Container-Based Applications at the Speed of DevOps
Securing Container-Based Applications at the Speed of DevOpsSecuring Container-Based Applications at the Speed of DevOps
Securing Container-Based Applications at the Speed of DevOps
 
Keynote: Unlock the Power of Continuous Delivery with End-to-End, Integrated ...
Keynote: Unlock the Power of Continuous Delivery with End-to-End, Integrated ...Keynote: Unlock the Power of Continuous Delivery with End-to-End, Integrated ...
Keynote: Unlock the Power of Continuous Delivery with End-to-End, Integrated ...
 
Zscaler mondi webinar
Zscaler mondi webinarZscaler mondi webinar
Zscaler mondi webinar
 
apidays LIVE New York 2021 - APIOps: automating API operations for speed and ...
apidays LIVE New York 2021 - APIOps: automating API operations for speed and ...apidays LIVE New York 2021 - APIOps: automating API operations for speed and ...
apidays LIVE New York 2021 - APIOps: automating API operations for speed and ...
 
Esg lab-validation-check-point-cloud guard-mar-2018
Esg lab-validation-check-point-cloud guard-mar-2018Esg lab-validation-check-point-cloud guard-mar-2018
Esg lab-validation-check-point-cloud guard-mar-2018
 
SACON - Beyond corp (Arnab Chattopadhayay)
SACON - Beyond corp (Arnab Chattopadhayay)SACON - Beyond corp (Arnab Chattopadhayay)
SACON - Beyond corp (Arnab Chattopadhayay)
 
Protecting Our Cyber-Identity in a Physical and Virtual World for IoT Ecosystem
Protecting Our Cyber-Identity in a Physical and Virtual World for IoT EcosystemProtecting Our Cyber-Identity in a Physical and Virtual World for IoT Ecosystem
Protecting Our Cyber-Identity in a Physical and Virtual World for IoT Ecosystem
 

Semelhante a Make Security a Competitive Advantage

Automating the Modern Software Factory
Automating the Modern Software FactoryAutomating the Modern Software Factory
Automating the Modern Software FactoryCA Technologies
 
CA's Vision for Business Automation
CA's Vision for Business AutomationCA's Vision for Business Automation
CA's Vision for Business AutomationCA Technologies
 
CA's Vision for Business Automation
CA's Vision for Business AutomationCA's Vision for Business Automation
CA's Vision for Business AutomationCA Technologies
 
CIS 2017 - So you want to use standards to secure your APIs?
CIS 2017 - So you want to use standards to secure your APIs?CIS 2017 - So you want to use standards to secure your APIs?
CIS 2017 - So you want to use standards to secure your APIs?Bertrand Carlier
 
Victor Ake and Chris Kawalek - ForgeRock Identity Live 2017 - Dusseldorf
Victor Ake and Chris Kawalek - ForgeRock Identity Live 2017 - DusseldorfVictor Ake and Chris Kawalek - ForgeRock Identity Live 2017 - Dusseldorf
Victor Ake and Chris Kawalek - ForgeRock Identity Live 2017 - DusseldorfForgeRock
 
Seguridad en Capas: Smart & Actionable Data
Seguridad en Capas: Smart & Actionable DataSeguridad en Capas: Smart & Actionable Data
Seguridad en Capas: Smart & Actionable DataCristian Garcia G.
 
Csa Summit 2017 - Un viaje seguro hacia la nube
Csa Summit 2017 - Un viaje seguro hacia la nubeCsa Summit 2017 - Un viaje seguro hacia la nube
Csa Summit 2017 - Un viaje seguro hacia la nubeCSA Argentina
 
Cisco Cybersecurity #10YearChallenge
Cisco Cybersecurity #10YearChallengeCisco Cybersecurity #10YearChallenge
Cisco Cybersecurity #10YearChallengeCristian Garcia G.
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseCA Technologies
 
The Microservices Manifesto: How to Get More Out of the Development Lifecycle
The Microservices Manifesto: How to Get More Out of the Development LifecycleThe Microservices Manifesto: How to Get More Out of the Development Lifecycle
The Microservices Manifesto: How to Get More Out of the Development LifecycleDevOps.com
 
Three Secrets to Becoming a Mobile Security Superhero
Three Secrets to Becoming a Mobile Security SuperheroThree Secrets to Becoming a Mobile Security Superhero
Three Secrets to Becoming a Mobile Security SuperheroSkycure
 
Akamai Intelligent Edge Security
Akamai Intelligent Edge SecurityAkamai Intelligent Edge Security
Akamai Intelligent Edge SecurityAkamai Technologies
 
Presales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptxPresales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptxPawachMetharattanara
 
Presales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptxPresales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptxPawachMetharattanara
 
BlueHat v18 || Dep for the app layer - time for app sec to grow up
BlueHat v18 || Dep for the app layer - time for app sec to grow upBlueHat v18 || Dep for the app layer - time for app sec to grow up
BlueHat v18 || Dep for the app layer - time for app sec to grow upBlueHat Security Conference
 
Enable and Secure Business Growth in the New Application Economy
 Enable and Secure Business Growth in the New Application Economy Enable and Secure Business Growth in the New Application Economy
Enable and Secure Business Growth in the New Application EconomyCA Technologies
 
Network security security landscape-10-11-2016 part i 1200 dpi (vgarr)
Network security security landscape-10-11-2016 part i 1200 dpi (vgarr)Network security security landscape-10-11-2016 part i 1200 dpi (vgarr)
Network security security landscape-10-11-2016 part i 1200 dpi (vgarr)Vince Garr
 
End to End Security - Check Point
End to End Security - Check PointEnd to End Security - Check Point
End to End Security - Check PointHarry Gunns
 
Closed Loop Remediation with CA Automic Service Orchestration
Closed Loop Remediation with CA Automic Service OrchestrationClosed Loop Remediation with CA Automic Service Orchestration
Closed Loop Remediation with CA Automic Service OrchestrationCA Technologies
 
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...CA Technologies
 

Semelhante a Make Security a Competitive Advantage (20)

Automating the Modern Software Factory
Automating the Modern Software FactoryAutomating the Modern Software Factory
Automating the Modern Software Factory
 
CA's Vision for Business Automation
CA's Vision for Business AutomationCA's Vision for Business Automation
CA's Vision for Business Automation
 
CA's Vision for Business Automation
CA's Vision for Business AutomationCA's Vision for Business Automation
CA's Vision for Business Automation
 
CIS 2017 - So you want to use standards to secure your APIs?
CIS 2017 - So you want to use standards to secure your APIs?CIS 2017 - So you want to use standards to secure your APIs?
CIS 2017 - So you want to use standards to secure your APIs?
 
Victor Ake and Chris Kawalek - ForgeRock Identity Live 2017 - Dusseldorf
Victor Ake and Chris Kawalek - ForgeRock Identity Live 2017 - DusseldorfVictor Ake and Chris Kawalek - ForgeRock Identity Live 2017 - Dusseldorf
Victor Ake and Chris Kawalek - ForgeRock Identity Live 2017 - Dusseldorf
 
Seguridad en Capas: Smart & Actionable Data
Seguridad en Capas: Smart & Actionable DataSeguridad en Capas: Smart & Actionable Data
Seguridad en Capas: Smart & Actionable Data
 
Csa Summit 2017 - Un viaje seguro hacia la nube
Csa Summit 2017 - Un viaje seguro hacia la nubeCsa Summit 2017 - Un viaje seguro hacia la nube
Csa Summit 2017 - Un viaje seguro hacia la nube
 
Cisco Cybersecurity #10YearChallenge
Cisco Cybersecurity #10YearChallengeCisco Cybersecurity #10YearChallenge
Cisco Cybersecurity #10YearChallenge
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital Enterprise
 
The Microservices Manifesto: How to Get More Out of the Development Lifecycle
The Microservices Manifesto: How to Get More Out of the Development LifecycleThe Microservices Manifesto: How to Get More Out of the Development Lifecycle
The Microservices Manifesto: How to Get More Out of the Development Lifecycle
 
Three Secrets to Becoming a Mobile Security Superhero
Three Secrets to Becoming a Mobile Security SuperheroThree Secrets to Becoming a Mobile Security Superhero
Three Secrets to Becoming a Mobile Security Superhero
 
Akamai Intelligent Edge Security
Akamai Intelligent Edge SecurityAkamai Intelligent Edge Security
Akamai Intelligent Edge Security
 
Presales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptxPresales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptx
 
Presales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptxPresales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptx
 
BlueHat v18 || Dep for the app layer - time for app sec to grow up
BlueHat v18 || Dep for the app layer - time for app sec to grow upBlueHat v18 || Dep for the app layer - time for app sec to grow up
BlueHat v18 || Dep for the app layer - time for app sec to grow up
 
Enable and Secure Business Growth in the New Application Economy
 Enable and Secure Business Growth in the New Application Economy Enable and Secure Business Growth in the New Application Economy
Enable and Secure Business Growth in the New Application Economy
 
Network security security landscape-10-11-2016 part i 1200 dpi (vgarr)
Network security security landscape-10-11-2016 part i 1200 dpi (vgarr)Network security security landscape-10-11-2016 part i 1200 dpi (vgarr)
Network security security landscape-10-11-2016 part i 1200 dpi (vgarr)
 
End to End Security - Check Point
End to End Security - Check PointEnd to End Security - Check Point
End to End Security - Check Point
 
Closed Loop Remediation with CA Automic Service Orchestration
Closed Loop Remediation with CA Automic Service OrchestrationClosed Loop Remediation with CA Automic Service Orchestration
Closed Loop Remediation with CA Automic Service Orchestration
 
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...
 

Mais de CA Technologies

Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceCA Technologies
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...CA Technologies
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCA Technologies
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCA Technologies
 
How Components Increase Speed and Risk
How Components Increase Speed and RiskHow Components Increase Speed and Risk
How Components Increase Speed and RiskCA Technologies
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCA Technologies
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...CA Technologies
 
Case Study: Continuous Delivery in a Tech Debt Laden World by Talk Talk.
Case Study: Continuous Delivery in a Tech Debt Laden World by Talk Talk.Case Study: Continuous Delivery in a Tech Debt Laden World by Talk Talk.
Case Study: Continuous Delivery in a Tech Debt Laden World by Talk Talk.CA Technologies
 
Case Study: United Airlines Transforms Release Management for Its Modern Soft...
Case Study: United Airlines Transforms Release Management for Its Modern Soft...Case Study: United Airlines Transforms Release Management for Its Modern Soft...
Case Study: United Airlines Transforms Release Management for Its Modern Soft...CA Technologies
 
Keynote: Unlock the Power of Continuous Delivery with End-to-End, Integrated ...
Keynote: Unlock the Power of Continuous Delivery with End-to-End, Integrated ...Keynote: Unlock the Power of Continuous Delivery with End-to-End, Integrated ...
Keynote: Unlock the Power of Continuous Delivery with End-to-End, Integrated ...CA Technologies
 
Industry Keynote: Redefine Operations in a DevOps World—The New Role for Site...
Industry Keynote: Redefine Operations in a DevOps World—The New Role for Site...Industry Keynote: Redefine Operations in a DevOps World—The New Role for Site...
Industry Keynote: Redefine Operations in a DevOps World—The New Role for Site...CA Technologies
 

Mais de CA Technologies (11)

Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software Development
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital Government
 
How Components Increase Speed and Risk
How Components Increase Speed and RiskHow Components Increase Speed and Risk
How Components Increase Speed and Risk
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software Development
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
 
Case Study: Continuous Delivery in a Tech Debt Laden World by Talk Talk.
Case Study: Continuous Delivery in a Tech Debt Laden World by Talk Talk.Case Study: Continuous Delivery in a Tech Debt Laden World by Talk Talk.
Case Study: Continuous Delivery in a Tech Debt Laden World by Talk Talk.
 
Case Study: United Airlines Transforms Release Management for Its Modern Soft...
Case Study: United Airlines Transforms Release Management for Its Modern Soft...Case Study: United Airlines Transforms Release Management for Its Modern Soft...
Case Study: United Airlines Transforms Release Management for Its Modern Soft...
 
Keynote: Unlock the Power of Continuous Delivery with End-to-End, Integrated ...
Keynote: Unlock the Power of Continuous Delivery with End-to-End, Integrated ...Keynote: Unlock the Power of Continuous Delivery with End-to-End, Integrated ...
Keynote: Unlock the Power of Continuous Delivery with End-to-End, Integrated ...
 
Industry Keynote: Redefine Operations in a DevOps World—The New Role for Site...
Industry Keynote: Redefine Operations in a DevOps World—The New Role for Site...Industry Keynote: Redefine Operations in a DevOps World—The New Role for Site...
Industry Keynote: Redefine Operations in a DevOps World—The New Role for Site...
 

Último

Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 

Último (20)

Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 

Make Security a Competitive Advantage

  • 1. Make  Security  a  Competitive  Advantage Mordecai  (Mo)  Rosen   SECURITY SECURITY General  Manager,  Security CA  Technologies General  Manager CA  Veracode Sam  King
  • 2. 2 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS Eliminate  Barriers   Between  Ideas  and  Outcomes CREATE  AN  AGILE   BUSINESS BUILD  BETTER       APPS  FASTER MAKE  SECURITY  A   COMPETITIVE  ADVANTAGE MAXIMIZE  APPLICATION   PERFORMANCE
  • 3. 3 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS HOME  AUTOMATION PHYSICAL  SECURITY EHEALTH  DEVICES WEARABLES SMART  METERS SHIPPING  LOGISTICS PROPERTY  MANAGEMENT   ECOLOGY FACTORY  AUTOMATION SMART  PHONES TABLETS CAMERAS PHONES TELEVISIONS AUTOMOBILES THERMOSTATS WWW CHAT  &  IM API SERVICES CLOUD SERVICES First  a  Brief  History  of THE  EXPANDING   DIGITAL   EXPERIENCE  
  • 4. 4 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS THE  DIGITAL   EXPERIENCE   Is  Between  Users   and  Applications HOME  AUTOMATION PHYSICAL  SECURITY EHEALTH  DEVICES WEARABLES SMART  METERS SHIPPING  LOGISTICS PROPERTY  MANAGEMENT   ECOLOGY FACTORY  AUTOMATION SMART  PHONES TABLETS CAMERAS PHONES TELEVISIONS AUTOMOBILES THERMOSTATS WWW CHAT  &  IM API SERVICES CLOUD SERVICES
  • 5. 5 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS MAKES  EVERY  COMPANY  A  SOFTWARE  COMPANY APPLICATION EXPLOSION CONSUMERIZED IT CONNECTED ENTERPRISES DIGITAL MARKETPLACES DIGITAL WORKPLACES CONNECTED IOT The  Application  Economy
  • 6. 6 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS The  Application  Economy REQUIRES  NEW  THINKING  ON  SECURITY FIREWALL IDS/IPS WEB  PROXY ANTI-­VIRUS ANTI-­MALWARE 100% INEFFECTIVE USERS  &  APPS UNDER  ATTACK SHADOW  IT 30% Of  all  attacks  will  be  in   shadow  IT  resources APP  DEFECTS 90% Of  breaches caused   by  application  defects 3RD  PARTY  RISK 70% Of  attacks  targeted a   secondary  source   IDENTITY  FRAUD 80% Of  breaches  used  lost   stolen  &  weak  credentials CREDIT  FRAUD 42% Of  all  data  stolen  is credit  card  data   FireEye  Study  of  6  Months  of  Penetration  Testing  
  • 7. 7 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS A QUESTION OF TRUST USERS INTERACTIONS APPLICATIONS Security  Becomes
  • 8. 8 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS CA  Security  Strategy  To   SECURING  THE  APPLICATION  ECONOMY TRUSTED USERS  & APPLICATIONS   PREVENTATIVE   DETECTION  & RESPONSIVE INSIGHT   ANALYTICS  & INTELLIGENCE FRICTIONLESS   SECURITY  & EXPERIENCE CORE  PRINCIPLES  
  • 9. 9 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS IDENTITY  & ACCESS   APPLICATION SECURITY API SECRUITY PAYMENT SECURITY PRODUCT  PORTFOLIO CA  Security  Strategy  To   SECURING  THE  APPLICATION  ECONOMY
  • 10. 10 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS LINES  OF  CODE   SCANNED6  TRILLION 1400  CUSTOMERS 400K APPLICATION   SECURITY   ADVISORY   HOURS 35.5M SECURITY  FLAWS  FIXED 4X GARTNER MQ  LEADER 24 LANGUAGES 77 FRAMEWORKS APPLICATION SECURITY CA  VERACODE
  • 11. 11 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS Ensuring GREAT  SOFTWARE  IS  SECURE  SOFTWARE EMPOWER DEVELOPERS  TO   SECURE  CODE INTEGRATED  INTO CONTINUOUS   DELIVERY EARLY  DETECT TO  REDUCE  COST AUTOMATED  TO   REDUCE  MTTR
  • 12. 12 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS CODECOMMIT BUILD TEST RELEASE OPERATE SECURITY  INTO  CONTINUOUS  DELIVERY   TEST TEST DevSecOps SECURE  SOFTWARE   DEVELOPENT SECURITY   ASSURANCE OPERATIONAL   APPLICATION  SECURITY Merging
  • 13. 13 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS CODECOMMIT BUILD TEST RELEASE OPERATE SECURE  SOFTWARE   DEVELOPENT SECURITY   ASSURANCE OPERATIONAL   APPLICATION  SECURITY DevSecOps TEST TEST CA  Veracode  Greenlight CA  Veracode  Static  Analysis CA  Veracode  Web  Application  Scanning CA  Veracode  Runtime  Protection CA  Veracode  Software  Composition  Analysis CA  Veracode  Integrations,  APIs CA  Veracode  eLearning
  • 14. 14 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS Securing  Applications  With   NEXT  GENERATION  IDENTITY  MANAGEMENT 80%of  all  data  breaches  exploit   lost,  stolen  &  weak  credentials HYBRID CLOUD DEVELOPER APIs BEHAVIOR ANALYTICS
  • 15. 15 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS API   ENABLED HIGH  SCALE   APPLIANCE HYBRID CLOUD SECURE   CONTINUOUS DELIVERY     PRIVILEGED GOVERNANCE Central  Authentication Credential  Vault Policy  Enforcement Role  -­ Based  Access Federated  Identity Session  Recording CA  Privileged  Access  Manager PROTECTING PRIVILEGED IDENTITY
  • 16. 16 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS ENABLING APP TO APP TRUST User  &  App   Authentication  API Mobile   Authentication  API Secure  Server   Communications Context  Based Risk  Analysis CA  Rapid  App  Security Risk  Based  Analytics
  • 17. 17 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS RISK ANALYTICS WORKS EMPIRICALLY
  • 18. 18 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD        #NOBARRIERS Digital  Payments   Fraud Directory Identity   Management Privileged   Access   Management Single   Sign-­‐on Identity   Governance Risk  Based   Authentication Orchestrating   Identity  &   Access Employees  &   Administrators Customers  &   Partners Internet  of  Things Developers Cloud   Services On   Premise   Apps Mobile Web API CA  Security  &  Identity  Management  Portfolio
  • 19. 19 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD        #NOBARRIERS CONTROLLING  PRIVILEGED  ACCESS IN  A  WORLD  ON  TIME
  • 20. 20 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD        #NOBARRIERS CONTROLLING  PRIVILEGED  ACCESS IN  A  WORLD  ON  TIME
  • 21. 21 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD        #NOBARRIERS CONTROLLING  PRIVILEGED  ACCESS IN  A  WORLD  ON  TIME
  • 22. 22 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD        #NOBARRIERS CONTROLLING  PRIVILEGED  ACCESS IN  A  WORLD  ON  TIME
  • 23. 23 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD        #NOBARRIERS CONTROLLING  PRIVILEGED  ACCESS IN  A  WORLD  ON  TIME
  • 24. 24 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS APPLICATION SECURITY TESTING FRICTIONLESS  
  • 25. 25 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS APPLICATION SECURITY TESTING FRICTIONLESS  
  • 26. 26 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS APPLICATION SECURITY TESTING FRICTIONLESS  
  • 27. 27 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS ARTHUR WONG Interview  With SVP  &  GM DXC  Security  
  • 28. 28 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS ARTHUR WONG Interview  With SVP  &  GM DXC  Security  
  • 29. 29 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS ARTHUR WONG Interview  With SVP  &  GM DXC  Security  
  • 30. 30 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS ARTHUR WONG Interview  With SVP  &  GM DXC  Security  
  • 31. 31 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS BREAKING BARRIERS AWARD Mo  Ahddoud First  UK  critical  infrastructure   company  running  100%  in   the  cloud   Todd  Oxford Enabled  disaster  recovery   access  to  comply  with  FEMA   first  &  second  line  response   regulations Mark  Merkow Integrating  app  security   testing  into  SDLC  for  500+   developer  organization
  • 32. 32 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS BREAKING BARRIERS AWARD Mo  Ahddoud First  UK  critical  infrastructure   company  running  100%  in   the  cloud   Todd  Oxford Enabled  disaster  recovery   access  to  comply  with  FEMA   first  &  second  line  response   regulations Mark  Merkow Integrating  app  security   testing  into  SDLC  for  500+   developer  organization
  • 33. 33 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS BREAKING BARRIERS AWARD Mo  Ahddoud First  UK  critical  infrastructure   company  running  100%  in   the  cloud   Todd  Oxford Enabled  disaster  recovery   access  to  comply  with  FEMA   first  &  second  line  response   regulations Mark  Merkow Integrating  app  security   testing  into  SDLC  for  500+   developer  organization
  • 34. 34 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS BREAKING BARRIERS AWARD Mo  Ahddoud First  UK  critical  infrastructure   company  running  100%  in   the  cloud   Todd  Oxford Enabled  disaster  recovery   access  to  comply  with  FEMA   first  &  second  line  response   regulations Mark  Merkow Integrating  app  security   testing  into  SDLC  for  500+   developer  organization
  • 35. 35 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS CA  World ’17 See  the  latest   innovation  in   the  demo  area   Immerse  in  all   of  the  customer   case  studies   on  stage Meet  with  our   product  teams   at  the  executive   center
  • 36. 36 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS Thank  you. Stay  connected  at  communities.ca.com &  community.veracode.com
  • 37. 37 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS Security  and  DevSecOps For  more  information  on  Security, please  visit:  http://cainc.to/CAW17-­Security For  more  information  on  DevSecOps, please  visit:  http://cainc.to/CAW17-­DevSecOps For  more  information  on  Veracode, please  visit:  http://community.veracode.com