Top Banner
My Super Power is Artificial Intelligence!Michele M. Sullivan Global Application Security Segment Leader [email protected] August 6, 2018
24

My Super Power is Artificial Intelligence! · Forrester: How To Leverage DevOps Trends To Strengthen Applications Dec. 2016 “Approximately 80% to 90% of the code in modern applications

Jun 27, 2020

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: My Super Power is Artificial Intelligence! · Forrester: How To Leverage DevOps Trends To Strengthen Applications Dec. 2016 “Approximately 80% to 90% of the code in modern applications

“My Super Power is Artificial Intelligence!”

Michele M. Sullivan

Global Application Security Segment Leader

[email protected] 6, 2018

Page 2: My Super Power is Artificial Intelligence! · Forrester: How To Leverage DevOps Trends To Strengthen Applications Dec. 2016 “Approximately 80% to 90% of the code in modern applications

2 IBM Security

“Security has and will always be about understanding, managing, and mitigating the risk

to an organization’s most critical assets.” - Dr. Eric Cole, SANS Institute

• According to Ponemon Institute's "2017 Cost of Data Breach Study" sponsored by IBM, the average cost of a data

breach is $3.62 million. Further, by adopting business continuity management practices, organizations are able to

reduce the total cost of a breach by 16.2% and identify and contain a data breach 78 days faster

• IBM’s Application Security Testing solutions provide preemptive protection for mobile and web-based applications. They

secure apps from malicious vulnerabilities and help organizations to remediate potential attacks in the future. The best

application security defense strategy is designing and building secure applications

• There are different techniques, both automated and manual, used to test applications for unknown vulnerabilities.

➢ Dynamic Application Security Testing (DAST)

➢ Static Application Security Testing (SAST)

➢ Interactive Application Security Testing (IAST)

➢ Application Pen Testing

Page 3: My Super Power is Artificial Intelligence! · Forrester: How To Leverage DevOps Trends To Strengthen Applications Dec. 2016 “Approximately 80% to 90% of the code in modern applications

3 IBM Security

IBM Application SecurityApplication security testing solutions provide preemptive protection for mobile & web-based applications

IBM AND BUSINESS PARTNER INTERNAL USE ONLY

Business Value

▪ Provides clear visibility across the

application development infrastructure

▪ Helps identify and prioritize

applications based on their business

impact

▪ Assesses applications for

vulnerabilities

▪ Places vulnerabilities in context to

determine their risk levels

▪ Mitigates risk by correcting

vulnerabilities or implementing

necessary fixes

Highlights

▪ Improves application security program

management

▪ Assesses software code, web and mobile

applications for vulnerabilities

▪ Automates correlation of static, dynamic and

interactive application security testing results

▪ Uses a single console for managing application

testing, reporting and policies

▪ With cognitive capabilities, delivers deeper and

faster scan coverage of applications and

eliminate false positives Integrations

Page 4: My Super Power is Artificial Intelligence! · Forrester: How To Leverage DevOps Trends To Strengthen Applications Dec. 2016 “Approximately 80% to 90% of the code in modern applications

Integrated Application Security Management Dashboard

What is the current state of application

security? Which applications present

the highest risk?

How many of the applications

in our portfolio have we been

able to assess?

Is our application security posture improving?

Page 5: My Super Power is Artificial Intelligence! · Forrester: How To Leverage DevOps Trends To Strengthen Applications Dec. 2016 “Approximately 80% to 90% of the code in modern applications

5 IBM Security

SaaS

On-Premise

Testing focus

• Simple

• Self-Service

• Quick results

Custom program

• Scalable

• Customizable

• Comprehensive

IBM Security

AppScan

IBM Application

Security on Cloud

Application Security Deployment SolutionsEnterprise

class solution

Adaptable to your needs

Holistic, risk-based

approach

On the Cloud

Breadth and depth of Security Portfolio

IBM

Application

Security

Page 6: My Super Power is Artificial Intelligence! · Forrester: How To Leverage DevOps Trends To Strengthen Applications Dec. 2016 “Approximately 80% to 90% of the code in modern applications

Application Security Risk Management Framework

Page 7: My Super Power is Artificial Intelligence! · Forrester: How To Leverage DevOps Trends To Strengthen Applications Dec. 2016 “Approximately 80% to 90% of the code in modern applications

Utilize resources effectively to identify and mitigate risk

Database

Activity

Monitoring

Web

Application

FirewallSIEM

Mobile

Application

Protection

Monitor and ProtectDeployed Applications

Intrusion

Prevention

Static

Analysis

Dynamic

Analysis

Mobile

Application

Analysis

Interactive

Analysis

TestApplications in Development

Application Security Management

Business Impact

Assessment

Asset

InventoryCompliance

Determination

Status and Progress

Measurement

Vulnerability

Prioritization

IBM Application Security Framework

Page 8: My Super Power is Artificial Intelligence! · Forrester: How To Leverage DevOps Trends To Strengthen Applications Dec. 2016 “Approximately 80% to 90% of the code in modern applications

Risk-based Approach to Application Security Management

• Create an application profile template

• Build an inventory of applications

• Describe each application

• Classify applications

• Determine business impact

• Prioritize assets

• Assess for

vulnerabilities

• Import vulnerabilities

discovered with

third-party tools

or manually

• Prioritize vulnerabilities

based on severity and

application context

• Determine overall risk status

• View applications that present highest risk

• Evaluate progress

• More than 45 compliance reports including PCI, DISA, etc.

Application Security Management

Business Impact

Assessment

Asset

InventoryCompliance

Determination

Status and Progress

Measurement

Vulnerability

Prioritization

Utilize resources effectively to identify and mitigate risk

Page 9: My Super Power is Artificial Intelligence! · Forrester: How To Leverage DevOps Trends To Strengthen Applications Dec. 2016 “Approximately 80% to 90% of the code in modern applications

IBM Application Security on Cloud

Page 10: My Super Power is Artificial Intelligence! · Forrester: How To Leverage DevOps Trends To Strengthen Applications Dec. 2016 “Approximately 80% to 90% of the code in modern applications
Page 11: My Super Power is Artificial Intelligence! · Forrester: How To Leverage DevOps Trends To Strengthen Applications Dec. 2016 “Approximately 80% to 90% of the code in modern applications

Identify and remediate high-priority vulnerabilitiesIBM Application Security on Cloud

SimpleEasy as 1-2-3

FastFully-Automated Solution

ComprehensiveBased on AppScan engines

SafeMeets IBM Security standards

#CoverYourApps

Page 12: My Super Power is Artificial Intelligence! · Forrester: How To Leverage DevOps Trends To Strengthen Applications Dec. 2016 “Approximately 80% to 90% of the code in modern applications

IBM Application Security on CloudEasy as 1, 2, 3!

Simple

Does my application contain security vulnerabilities?

Enter URL /

Upload Application

Scan

application

2

Review

Report

31

Page 13: My Super Power is Artificial Intelligence! · Forrester: How To Leverage DevOps Trends To Strengthen Applications Dec. 2016 “Approximately 80% to 90% of the code in modern applications

Application Security on CloudList of Running & Completed Scans

Start a Scan

Scan Executing

Completed

1

2

3

Page 14: My Super Power is Artificial Intelligence! · Forrester: How To Leverage DevOps Trends To Strengthen Applications Dec. 2016 “Approximately 80% to 90% of the code in modern applications

Results based on Industry-Leading AppScan EnginesSecurity Issues & PCI compliance report examples

Page 15: My Super Power is Artificial Intelligence! · Forrester: How To Leverage DevOps Trends To Strengthen Applications Dec. 2016 “Approximately 80% to 90% of the code in modern applications

Register, test and generate results… Quickly!

• Convenient registration for immediate access to service

• Minimal to no set-up time for your environment

• Launch security scans 24 x 7 x 365

• Superior results without requiring “behind the scenes” experts

Fast

Page 16: My Super Power is Artificial Intelligence! · Forrester: How To Leverage DevOps Trends To Strengthen Applications Dec. 2016 “Approximately 80% to 90% of the code in modern applications

Quickly Plug into Your Application LifecycleStreamlined Incorporation into Existing DevOps / Continuous Integration Frameworks

• UrbanCode, Maven, Bamboo, Jenkins plug-ins available

• IDE Visual Studio, Eclipse, IntelliJ

• Extend your environment with robust REST API

Page 17: My Super Power is Artificial Intelligence! · Forrester: How To Leverage DevOps Trends To Strengthen Applications Dec. 2016 “Approximately 80% to 90% of the code in modern applications

Run all tests:

▪ DAST

▪ SAST

▪ IAST

▪ Open Source

Analyze all app types:

▪ Web apps

▪ Mobile apps

▪ Desktop apps

One-Stop Shop for Application Security Testing

Comprehensive

Page 18: My Super Power is Artificial Intelligence! · Forrester: How To Leverage DevOps Trends To Strengthen Applications Dec. 2016 “Approximately 80% to 90% of the code in modern applications

18 IBM Security

▪ 98.91% accurate in eliminating false positives

▪ Minimize “unlikely attack scenarios”

▪ Provide fix group recommendations that resolve multiple vulnerabilities

• Patents pending

Applying Cognitive Computing to security vulnerability analysis

Machine learning with Intelligent Findings Analytics*

Learned resultsIntelligent

Findings

Analytics

•Built on Watson Machine Learning

•Trained by IBM Security Experts

•Fully automated review of scan findings

Scan results

Page 19: My Super Power is Artificial Intelligence! · Forrester: How To Leverage DevOps Trends To Strengthen Applications Dec. 2016 “Approximately 80% to 90% of the code in modern applications

19 IBM Security

Intelligent Findings Analytics: Real-World Results

• 90-99% average reduction to security analyst workload

• Equal or exceeds human experts

• Returns results in seconds rather than hours or days required for manual reviews

• Seamless integration into existing development workflow

Real-World Applications

ScanFindings

IFAVulnerabilities

Fix Groups

Application 1 12k 1k 35

Application 2 247k 1.2k 103

Application 3 746k 483 42

Page 20: My Super Power is Artificial Intelligence! · Forrester: How To Leverage DevOps Trends To Strengthen Applications Dec. 2016 “Approximately 80% to 90% of the code in modern applications

20 IBM Security

AppScan applies Cognitive capabilities to application security testing

▪ Intelligent Code Analytics

Expands analysis coverage and eliminates false negatives by generating Security Rules for ANY framework used by an application during trace analysis.

▪ Intelligent Findings Analytics

Reduces false positives by up to 99% & eliminates lengthy manual review processes by provides fully-automated review of Application Security Testing findings.

▪ Simple Fix Group recommendations

Provides fix recommendations that help development teams resolve multiple vulnerabilities with a single code fix.

AppScan Cognitive Application Security Advisor

No Other solution on the market can improve scan times, depth of scan & quality with cognitive capabilities

Page 21: My Super Power is Artificial Intelligence! · Forrester: How To Leverage DevOps Trends To Strengthen Applications Dec. 2016 “Approximately 80% to 90% of the code in modern applications

21 IBM Security

Keys to successfully integrating Security into DevOps

AutomationIntegration into existing Development tooling/processes

Speed

Roundtrip analysis (Submit & Retrieve Scan Results)

Coverage

Breadth and Depth of analysis of your Application Inventory

Page 22: My Super Power is Artificial Intelligence! · Forrester: How To Leverage DevOps Trends To Strengthen Applications Dec. 2016 “Approximately 80% to 90% of the code in modern applications

22 IBM Security

IBM Open Source Analyzer

Ghost(GNU C)

Heartbleed

Shellshock(Bash)

Poodle

Forrester: How To Leverage DevOps Trends To Strengthen

Applications Dec. 2016

“Approximately 80% to 90% of the code in modern applications is from open source

components, and open source components that are at least two years old have

three times the number of vulnerabilities. Even when developers are diligent about

using newer third-party libraries, these libraries often use other libraries of their

own, resulting in latent vulnerabilities that expose themselves at a later date.

ASoC Open Source Analyzer

• Builds a manifest of an application usage of Open Source

• Checks for Open Source vulnerabilities

• Industry leading DB of over 180k vulnerabilities

• Remediation instructions on OSS version to upgrade to

• Integrated into application vulnerability testing

Page 23: My Super Power is Artificial Intelligence! · Forrester: How To Leverage DevOps Trends To Strengthen Applications Dec. 2016 “Approximately 80% to 90% of the code in modern applications

23 IBM Security

Comprehensive Application Security Collateral

Fuel the AppSec Discussion!

➢ IBM Security AppScan Customer Trial: Link to Trial

➢Application Security Customer Brochure

➢Gartner Analyst Report: IBM Maintains Leadership Position in 2018 Gartner Magic

Quadrant for Application Security Testing

➢E-Guide: Mitigate Business Risk Strategically With Application Security Management

➢Forrester Total Economic Impact Study (IBM AppScan Source Client): Forrester

TEI Reveals Triple Digit ROI for IBM AppSec Testing Solution

➢Ponemon 2017 “State of Mobile and IoT Security” Study: Link to Study

Page 24: My Super Power is Artificial Intelligence! · Forrester: How To Leverage DevOps Trends To Strengthen Applications Dec. 2016 “Approximately 80% to 90% of the code in modern applications

ibm.com/security

securityintelligence.com

xforce.ibmcloud.com

@ibmsecurity

youtube/user/ibmsecuritysolutions

© Copyright IBM Corporation 2016. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. Any statement of direction represents IBM's current intent, is subject to change or withdrawal, and represent only goals and objectives. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others.

Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM does not warrant that any systems, products or services are immune from, or will make your enterprise immune from, the malicious or illegal conduct of any party.

FOLLOW US ON:

THANK YOU