The “Fantastic 4”
Metrics You Can’t Ignore When Reducing
Application Layer Risk
2
Why application security metrics?
3
Why application security metrics?
Sometimes you need:
1. To communicate to your sponsors what you’re doing with the money they
provided for the program.
2. A way to communicate with your development teams that is anchored in
something more than just encouragement.
3. A tool to show yourself how much progress you’re making.
4
It’s a hostile
environment out there
5
It’s a hostile
environment out there
Applications have been a top vector for data breaches over
the last five years because they’re not coded with security
in mind. The software industry’s shift to composing
applications via pre-built—some would say “pre-0wned”—
components has made it more challenging for security
teams by introducing risk via the software supply chain.
So application security is important, but
how do you show progress?
6
Four key metrics to save the day
7
FANTASTIC
METRIC #1:
POLICY
COMPLIANCE
You have to have
some way of
measuring the quality
of applications; it
should be aligned with
the needs of the
business.
A lot of your program
measurements are
going to be anchored
in how well your
portfolio does against
a policy.
But what sort of
pass rate should
you expect?
9
10
FANTASTIC
METRIC #2:
FLAW
PREVALENCE
11
When vulnerabilities are
all around you might feel
like your world is on fire.
Let’s try to get our arms
around how common
some of these fatal flaws
really are.
12
Top vulnerabilities by industry
13
FANTASTIC
METRIC #3:
FIX RATE
You know that guy,
the one who always
insists that the hole
you’re in isn’t as
deep as you think it
is…
It turns out that’s true
of AppSec. There are
a lot of people out
there making their
applications safer,
never accepting “no”
for an answer. And it
turns out that tracking
the flaws fixed can be
powerfully
motivational.
16
17
Source: Veracode State of Software Security vol. 6: https://info.veracode.com/state-of-
software-security-report-volume6.html
How? Empower developers
• Customers in the financial services and manufacturing verticals are
successfully fixing between 65% and 81% of the flaws found in their
applications. Applications undergoing remediation coaching (readouts)
reduce application risk 2.5x more than those that don’t, as measured by
average flaw density per MB
Source: Veracode State of Software Security vol. 6:
https://info.veracode.com/state-of-software-security-report-volume6.html
18
FANTASTIC
METRIC #4
19
Which One?
20
Which One?
It depends. Just as there’s no “one” lineup of a super hero team, you may find you need a different
set of metrics depending on the goals of your program—developer training completion, for instance,
or percent of applications undergoing automated testing. Ultimately it’s up to you, and the needs of
your business.
21
Answers Key Questions for CISOs
• Which industries are doing the best job of reducing
application-layer risk ?
• Do I have more serious vulnerabilities than my peers?
• What percentage of vulnerabilities do my peers remediate?
• How many of our applications should pass the OWASP
Top 10 when initially assessed?
• What are the Top 10 most common vulnerabilities in our
vertical?
• How can I reduce more risk in my organization’s
applications?

More Related Content

PDF
Selling Your Organization on Application Security
PDF
Mobile Security: Apps are our digital lives.
PDF
application-security-fallacies-and-realities-veracode
PDF
Healthcare application-security-practices-survey-veracode
PDF
Infosecurity Europe - Infographic
PPTX
How to prevent data leaks with application security testing strategy
PPTX
Intelligence on the Intractable Problem of Software Security
PDF
Next Generation Endpoint Prtection Buyers Guide
Selling Your Organization on Application Security
Mobile Security: Apps are our digital lives.
application-security-fallacies-and-realities-veracode
Healthcare application-security-practices-survey-veracode
Infosecurity Europe - Infographic
How to prevent data leaks with application security testing strategy
Intelligence on the Intractable Problem of Software Security
Next Generation Endpoint Prtection Buyers Guide

What's hot (20)

PDF
Veracode Corporate Overview - Print
PDF
Web Application Security Statistics Report 2016
PDF
What are top 7 cyber security trends for 2020
PDF
WhiteHat 2014 Website Security Statistics Report
PDF
2016 Trends in Security
DOCX
Research Paper
PDF
Veracode State of Software Security vol 4
PPTX
How to Gather Global Mobile Threat Intelligence
PDF
Five Reasons to Look Beyond Math-based Next-Gen Antivirus
PPTX
Mobile Security: Perceptions vs Device-harvested Reality
PDF
State of Application Security Vol. 4
PDF
Healthcare Cybersecurity Survey 2018 - Sirius
PPTX
Mobile Protect Pro - Powered by Zimperium
PDF
Ey giss-under-cyber-attack
PPTX
Cybersecurity and Healthcare - HIMSS 2018 Survey
PDF
Secunia Vulnerability Review 2014
PPTX
Deutsche Telekom Partnering Operating Alliance Summit - Zimperium
PPTX
Proatively Engaged: Questions Executives Should Ask Their Security Teams
PDF
Top 10 Ways To Win Budget For Application Security - Cenzic.2013.05.22
PDF
State of Web Application Security by Ponemon Institute
Veracode Corporate Overview - Print
Web Application Security Statistics Report 2016
What are top 7 cyber security trends for 2020
WhiteHat 2014 Website Security Statistics Report
2016 Trends in Security
Research Paper
Veracode State of Software Security vol 4
How to Gather Global Mobile Threat Intelligence
Five Reasons to Look Beyond Math-based Next-Gen Antivirus
Mobile Security: Perceptions vs Device-harvested Reality
State of Application Security Vol. 4
Healthcare Cybersecurity Survey 2018 - Sirius
Mobile Protect Pro - Powered by Zimperium
Ey giss-under-cyber-attack
Cybersecurity and Healthcare - HIMSS 2018 Survey
Secunia Vulnerability Review 2014
Deutsche Telekom Partnering Operating Alliance Summit - Zimperium
Proatively Engaged: Questions Executives Should Ask Their Security Teams
Top 10 Ways To Win Budget For Application Security - Cenzic.2013.05.22
State of Web Application Security by Ponemon Institute
Ad

Viewers also liked (9)

PDF
A Secure DevOps Journey
PDF
The Seven Kinds of Security
PPTX
Secure Code review - Veracode SaaS Platform - Saudi Green Method
PDF
Monitoring Attack Surface to Secure DevOps Pipelines
PDF
8 Patterns For Continuous Code Security by Veracode CTO Chris Wysopal
PDF
Automating Security in Building Software
PDF
DevSecOps - Building Rugged Software
PDF
Multi Security Checkpoints on DevOps Platform
PDF
A Secure DevOps Journey
A Secure DevOps Journey
The Seven Kinds of Security
Secure Code review - Veracode SaaS Platform - Saudi Green Method
Monitoring Attack Surface to Secure DevOps Pipelines
8 Patterns For Continuous Code Security by Veracode CTO Chris Wysopal
Automating Security in Building Software
DevSecOps - Building Rugged Software
Multi Security Checkpoints on DevOps Platform
A Secure DevOps Journey
Ad

Similar to The Four(ish) Appsec Metrics You Can’t Ignore (20)

PPTX
Software Security Metrics
PPTX
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
PPTX
Mike Spaulding - Building an Application Security Program
PPTX
Building an AppSec Team Extended Cut
PDF
ultimate-guide-to-getting-started-with-appsec-veracode
PDF
Ultimate_Guide_to_getting_started_with_AppSec
PPTX
How to build app sec team & culture in your organization the hack summi...
PPTX
Best Practices for a Mature Application Security Program Webinar - February 2016
PDF
Outpost24 Webinar - Creating a sustainable application security program to dr...
PDF
Building a business case for expanding your AppSec Program
PDF
Application Security Testing for Software Engineers: An approach to build sof...
PPTX
Rational application-security-071411
PDF
Application Security - Making It Work
PDF
Streamlining AppSec Policy Definition.pptx
PDF
Application Security in an Agile World - Agile Singapore 2016
PPTX
Why 'positive security' is a software security game changer
PDF
Unified application security analyser
PDF
We are excited to announce that our new State of Software Security (SOSS) rep...
PDF
The State of Software Security 2022 SOSS - Solution
PPTX
How to develop an AppSec culture in your project
Software Security Metrics
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
Mike Spaulding - Building an Application Security Program
Building an AppSec Team Extended Cut
ultimate-guide-to-getting-started-with-appsec-veracode
Ultimate_Guide_to_getting_started_with_AppSec
How to build app sec team & culture in your organization the hack summi...
Best Practices for a Mature Application Security Program Webinar - February 2016
Outpost24 Webinar - Creating a sustainable application security program to dr...
Building a business case for expanding your AppSec Program
Application Security Testing for Software Engineers: An approach to build sof...
Rational application-security-071411
Application Security - Making It Work
Streamlining AppSec Policy Definition.pptx
Application Security in an Agile World - Agile Singapore 2016
Why 'positive security' is a software security game changer
Unified application security analyser
We are excited to announce that our new State of Software Security (SOSS) rep...
The State of Software Security 2022 SOSS - Solution
How to develop an AppSec culture in your project

Recently uploaded (20)

PPTX
Tech Workshop Escape Room Tech Workshop
PDF
AI/ML Infra Meetup | LLM Agents and Implementation Challenges
PDF
AI-Powered Threat Modeling: The Future of Cybersecurity by Arun Kumar Elengov...
PDF
Workplace Software and Skills - OpenStax
PDF
Practical Indispensable Project Management Tips for Delivering Successful Exp...
PPTX
Cybersecurity: Protecting the Digital World
PDF
MCP Security Tutorial - Beginner to Advanced
PDF
Guide to Food Delivery App Development.pdf
PDF
The Dynamic Duo Transforming Financial Accounting Systems Through Modern Expe...
PPTX
Python is a high-level, interpreted programming language
PPTX
Full-Stack Developer Courses That Actually Land You Jobs
PDF
Visual explanation of Dijkstra's Algorithm using Python
PDF
Internet Download Manager IDM Crack powerful download accelerator New Version...
PDF
DNT Brochure 2025 – ISV Solutions @ D365
PPTX
WiFi Honeypot Detecscfddssdffsedfseztor.pptx
PDF
Multiverse AI Review 2025: Access All TOP AI Model-Versions!
PDF
AI-Powered Fuzz Testing: The Future of QA
PPTX
MLforCyber_MLDataSetsandFeatures_Presentation.pptx
DOCX
Modern SharePoint Intranet Templates That Boost Employee Engagement in 2025.docx
PDF
AI/ML Infra Meetup | Beyond S3's Basics: Architecting for AI-Native Data Access
Tech Workshop Escape Room Tech Workshop
AI/ML Infra Meetup | LLM Agents and Implementation Challenges
AI-Powered Threat Modeling: The Future of Cybersecurity by Arun Kumar Elengov...
Workplace Software and Skills - OpenStax
Practical Indispensable Project Management Tips for Delivering Successful Exp...
Cybersecurity: Protecting the Digital World
MCP Security Tutorial - Beginner to Advanced
Guide to Food Delivery App Development.pdf
The Dynamic Duo Transforming Financial Accounting Systems Through Modern Expe...
Python is a high-level, interpreted programming language
Full-Stack Developer Courses That Actually Land You Jobs
Visual explanation of Dijkstra's Algorithm using Python
Internet Download Manager IDM Crack powerful download accelerator New Version...
DNT Brochure 2025 – ISV Solutions @ D365
WiFi Honeypot Detecscfddssdffsedfseztor.pptx
Multiverse AI Review 2025: Access All TOP AI Model-Versions!
AI-Powered Fuzz Testing: The Future of QA
MLforCyber_MLDataSetsandFeatures_Presentation.pptx
Modern SharePoint Intranet Templates That Boost Employee Engagement in 2025.docx
AI/ML Infra Meetup | Beyond S3's Basics: Architecting for AI-Native Data Access

The Four(ish) Appsec Metrics You Can’t Ignore

  • 1. The “Fantastic 4” Metrics You Can’t Ignore When Reducing Application Layer Risk
  • 3. 3 Why application security metrics? Sometimes you need: 1. To communicate to your sponsors what you’re doing with the money they provided for the program. 2. A way to communicate with your development teams that is anchored in something more than just encouragement. 3. A tool to show yourself how much progress you’re making.
  • 5. 5 It’s a hostile environment out there Applications have been a top vector for data breaches over the last five years because they’re not coded with security in mind. The software industry’s shift to composing applications via pre-built—some would say “pre-0wned”— components has made it more challenging for security teams by introducing risk via the software supply chain. So application security is important, but how do you show progress?
  • 6. 6 Four key metrics to save the day
  • 8. You have to have some way of measuring the quality of applications; it should be aligned with the needs of the business. A lot of your program measurements are going to be anchored in how well your portfolio does against a policy. But what sort of pass rate should you expect?
  • 9. 9
  • 11. 11 When vulnerabilities are all around you might feel like your world is on fire. Let’s try to get our arms around how common some of these fatal flaws really are.
  • 14. You know that guy, the one who always insists that the hole you’re in isn’t as deep as you think it is…
  • 15. It turns out that’s true of AppSec. There are a lot of people out there making their applications safer, never accepting “no” for an answer. And it turns out that tracking the flaws fixed can be powerfully motivational.
  • 16. 16
  • 17. 17 Source: Veracode State of Software Security vol. 6: https://info.veracode.com/state-of- software-security-report-volume6.html How? Empower developers • Customers in the financial services and manufacturing verticals are successfully fixing between 65% and 81% of the flaws found in their applications. Applications undergoing remediation coaching (readouts) reduce application risk 2.5x more than those that don’t, as measured by average flaw density per MB Source: Veracode State of Software Security vol. 6: https://info.veracode.com/state-of-software-security-report-volume6.html
  • 20. 20 Which One? It depends. Just as there’s no “one” lineup of a super hero team, you may find you need a different set of metrics depending on the goals of your program—developer training completion, for instance, or percent of applications undergoing automated testing. Ultimately it’s up to you, and the needs of your business.
  • 21. 21 Answers Key Questions for CISOs • Which industries are doing the best job of reducing application-layer risk ? • Do I have more serious vulnerabilities than my peers? • What percentage of vulnerabilities do my peers remediate? • How many of our applications should pass the OWASP Top 10 when initially assessed? • What are the Top 10 most common vulnerabilities in our vertical? • How can I reduce more risk in my organization’s applications?

Editor's Notes

  • #3: Sometimes it seems like application security programs are a never ending chasm. Why do we need to measure? For several important reasons— Sometimes you need to communicate to your sponsors what you’re doing with the money they provided for the program. Sometimes you need a way to communicate with your development teams that is anchored in something more than just encouragement. Sometimes you need a tool to show yourself how much progress you’re making.
  • #4: Sometimes it seems like application security programs are a never ending chasm. Why do we need to measure? For several important reasons— Sometimes you need to communicate to your sponsors what you’re doing with the money they provided for the program. Sometimes you need a way to communicate with your development teams that is anchored in something more than just encouragement. Sometimes you need a tool to show yourself how much progress you’re making.
  • #5: Don’t forget – it’s a hostile environment out there. Applications have been a top vector for data breaches over the last five years (see the Verizon Data Breach Reports) because they’re not coded with security in mind. The software industry’s shift to composing applications via pre-built—some would say “pre-0wned”—components has made it more challenging for security teams by introducing risk via the software supply chain. So application security is important, but how do you show progress?
  • #6: Don’t forget – it’s a hostile environment out there. Applications have been a top vector for data breaches over the last five years (see the Verizon Data Breach Reports) because they’re not coded with security in mind. The software industry’s shift to composing applications via pre-built—some would say “pre-0wned”—components has made it more challenging for security teams by introducing risk via the software supply chain. So application security is important, but how do you show progress?
  • #7: We’re going to walk through four ways to look at your portfolio of applications and benchmark it against other organizations. Each metric has its strength but they’re definitely better together. Let’s get started…
  • #9: I think of policy compliance as the bedrock measurement (pardon the pun) of AppSec. You have to have some way of measuring the quality of applications; it should be aligned with the needs of the business. A lot of your program measurements are going to be anchored in how well your portfolio does against a policy. But what sort of pass rate should you expect? There’s the problem…
  • #10: Let’s look at the industry perspective for a second—using a kind-of-generic policy, the OWASP Top 10, to look at how your peers are doing. Not well. (Highlight relatively high pass rate in FinSvc which is still bad news – more than 50% fail)
  • #11: OK, so now that we understand how bad the problem is, how do we fix it? One way is to understand the types of issues we’re facing.
  • #12: When vulnerabilities are all around you might feel like your world is on fire. Let’s try to get our arms around how common some of these fatal flaws really are.
  • #13: It’s important to note that not every application is subject to the same risks. For instance, SQL Injection, a leading cause of data loss, is only present in about 30% of applications (40% if you’re in the government). Note though that crypto is found in 45 to 80% of applications depending on industry—a problem if your customers or regulators require you to protect sensitive data.
  • #14: Okay, so we know how good (or bad) our applications are, and we know what the nature of the vulnerabilities are. Now what?
  • #15: You know that guy, the one who always insists that the hole you’re in isn’t as deep as you think it is… It turns out that’s true of AppSec. There are a lot of people out there making their applications safer, never accepting “no” for an answer. And it turns out that tracking the flaws fixed can be powerfully motivational.
  • #16: You know that guy, the one who always insists that the hole you’re in isn’t as deep as you think it is… It turns out that’s true of AppSec. There are a lot of people out there making their applications safer, never accepting “no” for an answer. And it turns out that tracking the flaws fixed can be powerfully motivational.
  • #17: Some industries are making huge progress in fixing the vulnerabilities they’ve found. In fact across all Veracode’s customers, they fixed 3 out of every four flaws found by automated scans last year.
  • #18: So a strategy for reducing risk is “real-time” developer education, enabling developers to go faster.
  • #19: Policy, top flaw prevalence, fix rate. What’s our fourth metric?