Application Security and the Bravery of Tactical Execution • Application security programs do much better tactically
4
Lightweight and iterative
5
Focus on operational excellence, less on authority Example: Measure every meaningful aspect of your assessment and incident response programs. Share those results far and wide.
6
A Digression on Authority & Buy-In
7
Assessments have a Flow
8
Tactical Assessment Principles
9
Assessment Tactics
10
Navigating the wilderness of existential assessment questions
11
Pitfalls
12
Critical Security Bugs 77 Critical bugs handled in the past year
13
Handling Outside Reports . On call pentester to handle incoming reports
14
Determining Scope of Impact
15
Bug Classifications and Why We Built It
16
Sample Bug Classification Table
17
Importance of Communication During an Incident Incident success or failure is judged by others in your company • Coordination and communication are key
18
Communication Email Template
19
Reducing the Threat Surface
20
Public Bug Bounties Today • Main motivations for companies to build programs
21
What Do These Ratios Really Mean to Me?!
22
Wrapping Up • Tactical approaches to application security should be • Treat your assessment program like a consultancy • Application incident response may be the most important thing to get right the…
Description:
Explore a tactical approach to application security that challenges conventional wisdom and focuses on getting things done. Learn how to establish a lightweight, high-impact team capable of performing hundreds of assessments, handling numerous bugs, and setting up a private bug bounty program in just one year. Discover actionable advice for program managers and strategies for workers to drive change from within. Gain insights into measuring and sharing assessment and incident response results, navigating assessment principles and tactics, handling critical security bugs, and managing outside reports. Understand the importance of communication during incidents, learn how to reduce the threat surface, and critically examine public bug bounty programs. Walk away with practical strategies for implementing a tactical security program that prioritizes operational excellence and delivers tangible results.
The Tactical Application Security Program - Getting Stuff Done