BSIMM 8 is out! Fantastic. The one and only large-scale study on what security practices large organizations put in place to produce secure software. The study is carried out by application security professionals under the supervision of Gary McGraw, making sure the gathered data is consistent, accurate and gives an insight into what 300,000 developers do on a day-to-day basis.
In my latest presentation, I reference BSIMM numbers where I mention that on average, there are 2 application security professional per 100 developers. However, that hasn't been the case since BSIMM4. BSIMM8 reports that this number is even less, now at 1.6 per 100 developers. Hiring more application security professionals will simply not work as there is a shortage of talent. More than ever, we need to give the developers the tools and the training to write secure code that is hands-on, readily available and scalable for organisations.
The report also shows that the most common activity in the Training practice is providing an awareness training to all employees at 67%. I started mapping what we do at Secure Code Warrior (SCW) in the Training practice and realized that our solution can tick off all the 12 activities in the Training practice ranging from level 1 (most companies do it) to level 3 (very few companies do it). One single solution that can be used to cover an entire practice!
Out of the 12 training practices, the most interesting practices for the Secure Code Warrior solution are:
- Level 1: Provide awareness training
- Level 1: Deliver on-demand individual training
- Level 2: Enhance satellite through training (SCW metrics)
- Level 3: Reward progression through curriculum (SCW badges)
- Level 3: Provide training for vendors or outsourced workers (SCW Assessments)
- Level 3: Host external software security events (SCW Tournament mode)
- Level 3: Identify satellite through training (SCW metrics)
Are you confident that your current solution addresses these practices?
Almost 300,000 developers across approximately 95,000 applications use BSIMM8 to help plan, execute and measure their software security initiatives (SSIs). Organizations can use the BSIMM to compare cybersecurity initiatives and determine which additional activities might be useful.