Blue Goat Cyber

Static Application Security Testing (SAST) Services

Static Code Analysis, Combined with a Manual Code Review

Blue Goat was great to work with. Their team scrubbed our source code and found numerous security flaws. They diligently worked with our development team to fix the vulnerabilities. Highly recommend you use Blue Goat to help with secure application development.
SAST Services
Jesse Norton
Scrum Master

Steps to Schedule Your SAST:

SAST Testing services

Our Static Application Security Testing (SAST) includes a manual source code review. This reduces false positives and expands coverage for a comprehensive test.

SAST Overview

With SAST, we test a system with “administrator” or “root” level access and knowledge. This includes access to architecture diagrams, design documents, specifications, and source code. SAST is the most thorough and time-consuming and includes a manual source code review.
SAST is commonly used in the following scenarios:
  • An organization is developing its own product
  • An organization is developing its own software application
  • An organization is integrating several products or applications
If you are developing your own product or application accessible over a computer network (wired or wireless), you should have it thoroughly tested to ensure it is not “hackable.” SAST is extremely important for devices that process, store, or transmit sensitive data and for devices involved with critical infrastructure, such as Industrial Control Systems (ICS) and Supervisory Control And Data Acquisition (SCADA) systems. SAST should also be a priority for devices used in healthcare or hospital environments where a compromised device could result in a violation of patient privacy, such as the release of Protected Health Information (PHI), or even become a threat to a patient, such as the compromise of a drug infusion pump.
If you are performing systems or product integration, SAST is equally important, especially if you are responsible for integrating components from multiple vendors. We have found numerous bugs and flaws in components designed and developed by a supplier for an integrated critical system.

Our specialized service combines Static Application Security Testing (SAST) with thorough manual source code review to cover a broad spectrum of testing areas, ensuring your software is efficient and secure against potential vulnerabilities. Our approach is designed to scrutinize your code through multiple lenses, focusing on:

  • Path Coverage: Our analysis meticulously examines linearly independent paths throughout your codebase. We aim for complete path coverage, ensuring every conceivable path through the code is tested. This method is crucial for identifying hidden errors that could lead to security vulnerabilities or functional issues, ensuring no stone is left unturned.

  • Statement Coverage: We ensure that every executable statement in your software is executed at least once during testing. This coverage is essential for uncovering any unused, redundant, or missing statements, providing a clean, efficient codebase free of unnoticed flaws.

  • Branch Coverage: Our testing extends to every branch of code, focusing on the conditional logic that dictates the flow of execution. This comprehensive branch analysis ensures that all possible outcomes are tested, validating the logic and integrity of your application under various conditions.

Beyond these primary coverage areas, our service delves deeper into the intricacies of your software through additional testing strategies:

  • Decision Coverage: We assess every decision point in your code, ensuring that all possible outcomes are evaluated. This coverage is vital for understanding the decision-making processes within your application and identifying any logic errors.

  • Condition Coverage: Our review includes testing each Boolean expression at every decision point, verifying that every condition can independently affect the outcome. This rigorous scrutiny helps in pinpointing conditional errors that could lead to unexpected behaviors.

  • Multiple Condition Coverage: We elevate condition testing by examining all possible combinations of conditions and their outcomes, ensuring a comprehensive evaluation of complex decision logic.

  • Finite State Machine Coverage: For applications utilizing state-based logic, we analyze state transitions and interactions to ensure they perform as expected under all conditions, safeguarding against state-related errors.

  • Control Flow Testing: By mapping out the flow of your application, we can identify potential issues in the control structures, ensuring the logic directs the flow of execution correctly.

  • Data Flow Testing: This method focuses on the points where variables receive values and where these values are used, helping to uncover issues related to variable misuse or mismanagement.

Our SAST and manual source code review services are tailored to dive deep into your software’s structure, logic, and security posture. Covering a wide range of testing areas ensures your application is functionally sound and secure from potential threats, giving you peace of mind and a solid foundation for your digital assets.

Our Static Application Security Testing (SAST) Service is meticulously designed to elevate the security standards of your software development lifecycle. By focusing on early detection and remediation of vulnerabilities within your source code, this service ensures that security is integrated into the very foundation of your applications. Unlike traditional penetration testing, which looks for vulnerabilities in deployed applications, our SAST service proactively identifies potential security issues before they become exploitable threats, aligning with industry best practices for secure software development.

Methodology

Our SAST process is detailed and methodical, ensuring that your application’s codebase undergoes a thorough security review:

  • Scoping and Planning: We initiate our service by defining the scope of the SAST, focusing on the applications and components critical to your operations. This collaborative phase involves detailed discussions with your development team to ensure a customized approach that fits your unique environment and software development practices.

  • Threat Modeling and Intelligence Gathering: Before scanning, our team undertakes a comprehensive review to understand potential threats and common vulnerabilities relevant to your technology stack. This proactive step informs our scanning strategy, ensuring a focused and efficient analysis.

  • Vulnerability Identification: Leveraging advanced SAST tools, we conduct automated scans of your source code to unearth vulnerabilities. Our analysis encompasses various security issues, including those identified by the OWASP Top 10 and SANS Top 25, tailored to the specific languages and frameworks you use.

  • Analysis and Prioritization: Upon identifying vulnerabilities, our experts meticulously assess each issue to understand its implications. This careful analysis allows us to prioritize findings based on their severity and potential impact on your application’s security and operational integrity.

  • Reporting and Recommendations: You will receive a detailed report summarizing our findings, including a comprehensive overview of identified vulnerabilities, potential risks, and prioritized remediation strategies. We aim to provide actionable insights that empower your development team to strengthen your application’s security posture.

Integration with Development Processes

A key advantage of our SAST service is its seamless integration into your existing development workflows. We help you avoid the costs and complexities associated with late-stage security fixes by identifying and addressing vulnerabilities early in the software development lifecycle. Our approach not only enhances the security of your applications but also supports agile development practices by enabling rapid and secure code releases.

Benefits of Our SAST Service:

  • Proactive Security Measures: By identifying vulnerabilities in the source code, our service helps prevent security issues before they can be exploited, significantly reducing the risk of breaches.

  • Efficiency and Cost Savings: Early detection and remediation of security flaws lead to significant cost savings by avoiding expensive post-deployment fixes and potential security incidents.

  • Compliance and Risk Management: Our SAST service ensures compliance with relevant security standards and regulations, minimizing legal and financial risks.

  • Enhanced Application Quality: Integrating SAST into your development process improves security and contributes to your applications’ overall quality and reliability.

Our Static Application Security Testing (SAST) Service is a comprehensive solution to enhance your software development process by identifying potential vulnerabilities within your source code. This service is instrumental in helping you adhere to industry standards and significantly boost your cybersecurity posture. Our offering culminates in a detailed deliverable package that provides actionable insights and facilitates compliance, ensuring a robust security framework for your applications.

Comprehensive Report

The foundation of our service is the comprehensive SAST report, designed to offer an in-depth analysis of your application’s source code security. This report is accessible to both technical and non-technical stakeholders, promoting understanding and actionability across your organization.

Report Components:

  • Executive Summary: Provides a high-level overview suitable for executives and decision-makers, summarizing the scope of the SAST, key findings, and their potential impacts on your business. This summary concisely evaluates your application’s security status and highlights critical issues.

  • Methodology Overview: Details the approach, tools, and techniques used in the SAST process, ensuring transparency and allowing you to grasp the depth of our analysis.

  • Findings and Vulnerabilities: Each identified vulnerability is thoroughly documented, including:

    • Description: A detailed explanation of the vulnerability, its context, and discovery method.
    • Evidence: Proof of concept, code snippets, or other documentation supporting the finding.
    • Risk Rating: An evaluation of the vulnerability’s severity, considering its potential impact and exploitability.
    • Recommendations: Specific, actionable strategies for remediation to address each identified issue promptly and effectively.
  • Compliance Overview: Analyze how the findings align with industry standards and requirements, identify non-compliance areas, and offer guidance for achieving and maintaining compliance.

  • Appendices: Additional resources, including technical data, analysis methodologies, and best practice references, are valuable for development teams responsible for remediation efforts.

Report Review Session

After delivering the report, we conduct a review session to discuss the findings and clarify any questions. This session ensures that you fully understand the vulnerabilities, their implications for your business, and the recommended remediation strategies.

Session Highlights:

  • Findings Walkthrough: Our security experts guide you through each finding, discussing its technical aspects, business impacts, and addressing any questions.

  • Remediation Strategy Discussion: We discuss remediation strategies, prioritizing actions based on risk and business impact, and exploring alternative solutions if necessary.

  • Compliance Guidance: Offers practical advice for addressing compliance gaps highlighted by the testing, emphasizing steps to achieve and maintain industry standards.

  • Next Steps and RVT Planning: We guide subsequent actions, including planning for Remediation Validation Testing (RVT) to confirm the effective resolution of vulnerabilities.

Why Our SAST Service Stands Out

Our SAST Service is designed to provide your organization with the insights, guidance, and support necessary to strengthen your software development lifecycle and achieve compliance with industry standards. The detailed report and personalized review session equip your team to take decisive action toward enhancing your application security.

Engage our Static Application Security Testing service to gain a comprehensive overview of your current security posture and a roadmap to a more secure and compliant software development process.

Investing in our Static Application Security Testing (SAST) Service is a strategic decision to enhance your software development lifecycle to meet compliance requirements and protect your business from the severe impacts of data breaches and cyber-attacks. Our service delivers significant, measurable benefits beyond basic compliance, ensuring a substantial return on investment (ROI) through comprehensive risk management, an improved security posture, and sustained confidence in your brand.

How Our SAST Service Delivers ROI

  • Avoidance of Data Breach Costs: The most direct and significant ROI is achieved by preventing data breaches. The costs associated with breaches—ranging from regulatory fines and legal fees to indirect damages like brand reputation harm and lost customer trust—can be overwhelming. Our SAST service proactively identifies and addresses vulnerabilities within your source code, dramatically reducing the risk of costly security incidents.

  • Streamlined Compliance and Reduced Regulatory Fines: Compliance with industry standards is not merely a regulatory obligation but also a strategic benefit. Our SAST service ensures your software development practices meet the rigorous standards required by regulatory bodies, helping you avoid expensive fines and penalties. This proactive stance on compliance also simplifies the process of future audits, decreasing associated costs.

  • Enhanced Customer Trust and Loyalty: Maintaining customer trust is crucial in today’s digital landscape. Regular and comprehensive SAST assessments demonstrate a commitment to security, reassuring customers and users that their data is handled securely. This trust directly translates into loyalty and retention, positively affecting your bottom line through continued engagement.

  • Optimization of Security Investments: Our SAST service provides in-depth insights into your application’s security status, enabling informed decisions on resource allocation for maximum impact. By identifying critical vulnerabilities early and providing customized remediation strategies, we help you make efficient security investments, ensuring that resources are used effectively to bolster your defenses.

  • Competitive Differentiation: A proactive approach to application security can set you apart in a market increasingly conscious of cybersecurity risks. Our SAST service secures your application codebase and positions your brand as a leader in data protection, differentiating you from competitors and potentially increasing market share.

  • Long-Term Cost Savings Through Effective Remediation: Incorporating Remediation Validation Testing (RVT) as a component of our SAST service ensures vulnerabilities are thoroughly addressed. This validation process eliminates the recurring costs tied to revisiting and rectifying vulnerabilities, leading to significant savings over time.

ROI Beyond Numbers: Building a Secure and Resilient Future

Our SAST Service extends beyond immediate financial gains, contributing to your business’s foundational security and resilience. By identifying and rectifying vulnerabilities early in the development process, ensuring compliance, and fostering customer trust, we help secure your present operations and future growth in the evolving digital domain.

Choose our Static Application Security Testing Service to satisfy compliance demands and cultivate a robust security posture that drives business value, reinforces customer trust, and solidifies your brand’s reputation in a competitive environment.

SAST FAQs

Please schedule a 30-minute Discovery Session with us so we can best understand your objectives.

Static code analysis is not just about finding bugs; it’s about fostering a culture of quality and security in software development. By adopting the right tools and practices, developers can ensure that their code not only works but also adheres to the highest quality and security standards. However, it is important to note that static code analysis and SAST tools, although valuable, are not comprehensive in nature. While they can catch many known vulnerabilities during the pre-production stage, there are still other types of vulnerabilities, such as logical vulnerabilities and security misconfigurations, that these tools may not be equipped to detect. Therefore, while static code analysis plays a crucial role in improving software quality and security, it should be complemented with other security practices and manual code reviews to achieve a more comprehensive vulnerability detection and prevention strategy.

It is crucial to go beyond static code analysis in order to achieve robust application security. While static code analysis is indeed a valuable tool, it is not sufficient on its own. There are several reasons why additional measures are necessary.

Firstly, static code analysis typically focuses on identifying potential vulnerabilities by analyzing the source code without taking into account the runtime environment. While this can help catch many security issues, it may not detect certain vulnerabilities that only manifest during the actual execution of the application. By solely relying on static code analysis, these vulnerabilities can go unnoticed, leaving the application exposed to potential threats.

Moreover, static code analysis often fails to consider the complex interactions and dependencies between different components of the application. It may identify vulnerabilities within isolated code segments but miss the broader context in which these vulnerabilities could be exploited. Without considering the overall architecture and logic flow of the application, potential security gaps can remain undetected.

Furthermore, static code analysis can produce false positives or false negatives, which can lead to inefficiencies and oversight in the security assessment process. False positives can result in wasted time and resources, as developers may spend unnecessary effort fixing issues that are not actual vulnerabilities. Conversely, false negatives can give a false sense of security, leaving the application exposed to potential threats. To mitigate these risks, it is essential to go beyond static code analysis and incorporate additional security measures.

To fortify application security effectively, a comprehensive solution is required. This involves combining security tools and testing methods that go beyond static code analysis. One crucial component is the use of an intelligent and comprehensive vulnerability scanner. Such a scanner can identify vulnerabilities during runtime, providing insights into the application's actual behavior and detecting issues that may not be apparent through static analysis alone.

In addition to vulnerability scanning, manual penetration testing and security audits play a vital role. They bring a human element to the security assessment process, allowing for a more thorough examination of the application. Skilled security professionals can identify potential weaknesses that automated tools may not be able to detect. Their expertise and experience in identifying security gaps can greatly enhance the overall security posture of the application.

Static code analysis, while valuable in enhancing web application security, is not a panacea and has certain limitations that must be considered. One of the primary challenges is the prevalence of false positives in the analysis results. This arises from the reliance on abstract models and presentations of program data flow and logic, leading to inaccurate identification of potential vulnerabilities. Addressing false positives requires developers to allocate valuable resources, such as time and effort, in manually verifying the code to ensure its security and free of bugs and vulnerabilities.

It is important to understand that the absence of identified issues through static code analysis does not guarantee the absence of vulnerabilities or misconfigurations in the application. SAST tools, in their current form, are not all-encompassing and cannot detect all types of known vulnerabilities, logical vulnerabilities, and security misconfigurations. While automated tools can often catch many known vulnerabilities during the pre-production stage, they may fail to identify others. Additionally, they are unable to detect run-time errors and misconfigurations, undermining the overall security posture of the application.

Another significant limitation of static code analysis is the impracticality of achieving 100% coverage of the application's code and functionality. Given time and cost constraints faced by developers and organizations, achieving complete coverage through SAST is often unfeasible. This limited coverage inherently increases the risks faced by the application, as potential vulnerabilities or misconfigurations may be overlooked due to resource limitations.

Static code analysis results are prone to false positives due to several reasons. One of the major contributing factors is the reliance on static analysis tools for pattern matching and heuristics to identify potential issues. While these techniques are often effective, they can sometimes result in false positives. The tools may not have complete knowledge of the code context and dependencies, especially when dealing with complex or interconnected systems, which further increases the chances of false positives.

Another aspect to consider is the variation in coding standards and best practices among different projects or organizations. What may be considered a problematic code construct in one context may be intentional or have valid justifications in another. This divergence can lead to static analysis tools flagging certain code segments as problematic, even when they are not.

Moreover, false positives can occur when static analysis tools struggle to accurately distinguish between actual security vulnerabilities and benign coding patterns that may appear similar. This can be particularly challenging when dealing with complex codebases or intricate programming techniques.

To minimize the impact of false positives and ensure accurate identification of potential issues, it is crucial for developers and teams to review and validate the results of static code analysis. This validation process requires careful attention to detail and an understanding of the specific context in which the code is being analyzed. By investing the necessary time and effort in verifying the results, developers can mitigate the risk of false positives and focus on resolving the genuine code issues, ultimately improving the overall code quality and security.

Dynamic Application Security Testing (DAST) is an automated process that tests an application from the outside by examining it in its running state. This method is often called "black box" testing because the tester does not know the application's internal workings. DAST tools interact with an application through its user interface and APIs, simulating the actions of a user or an attacker. DAST tools are generally user-friendly and do not require deep knowledge of the application's internal structure. DAST can be used on any application, regardless of the programming language or technology stack.

Penetration testing, often known as "pen testing," is a hands-on approach where security experts actively try to exploit vulnerabilities in an application. Unlike DAST, penetration testing can be performed with varying levels of knowledge about the application (black box, grey box, or white box testing). Pen testers can uncover deeper vulnerabilities that automated tools might miss, including logic flaws and complex security issues. The human element in pen testing allows for creative thinking and adaptation, closely mimicking an intelligent attacker's approach. Penetration tests usually result in detailed reports with context-specific recommendations for remediation.

While both DAST and penetration testing aim to identify vulnerabilities, their methodologies lead to different findings. DAST is automated and focuses on the application's running state from an external perspective. It effectively monitors and identifies common vulnerabilities like SQL injection and cross-site scripting. On the other hand, with its human-centric approach, penetration testing can identify more complex security issues, including business logic errors and insider threat vulnerabilities.

In practice, DAST and penetration testing are not mutually exclusive but complementary. While DAST provides a quick and automated way to identify common vulnerabilities, penetration testing offers a deeper, more nuanced understanding of complex security issues. Combining both approaches can provide a more comprehensive view of an application's security posture.

The choice between DAST and penetration testing often depends on various factors, including the development stage of the application, available resources, and specific security requirements. For ongoing security assurance, DAST can be integrated into the software development lifecycle for continuous monitoring. Penetration testing is more suited for in-depth, periodic security assessments.

Static Application Security Testing (SAST) involves scanning the source code of an application to identify potential security vulnerabilities. Several tools are available for SAST, including Coverity Static Code Analysis by Synopsys.

Coverity Static Code Analysis is a widely used SAST tool with comprehensive analysis capabilities. It works by analyzing the source code of an application, focusing on its structure, control flow, and data flow. This tool can identify security vulnerabilities, including common coding errors, memory leaks, buffer overflows, and injection vulnerabilities.

In addition to Coverity, other notable SAST tools are available in the market. One such tool is Fortify Static Code Analyzer, which Micro Focus developed. This tool helps identify security vulnerabilities in applications by analyzing their source code and providing detailed reports on potential issues.

Another popular SAST tool is Veracode Static Analysis, which offers a cloud-based solution for analyzing application code. Veracode uses a combination of static analysis techniques and proprietary algorithms to identify and prioritize security vulnerabilities based on their potential impact.

SonarQube is yet another SAST tool that continuously inspects code quality and security vulnerabilities in various programming languages. It offers a range of rule sets and plugins that can be customized to suit specific development needs.

These are just a few examples of the many SAST tools available today. It's important to choose a tool that aligns with the specific needs of your development project, ensuring thorough analysis and efficient identification of potential security vulnerabilities in your application's source code.

To run Static Application Security Testing (SAST) effectively, several key steps should be followed:

1. Tool Selection: Begin by selecting a suitable static analysis tool that can perform code reviews for your specific programming languages and comprehend the underlying framework of your software. Ensure the tool aligns with your organization's requirements and supports the necessary features for effective SAST.

2. Infrastructure Setup: Create a scanning infrastructure by handling licensing requirements and setting up access control and authorization. Procure the necessary resources, such as servers and databases, to deploy the selected SAST tool effectively. This step is crucial for ensuring seamless integration and operation of the tool within your development environment.

3. Customization: Fine-tune the selected SAST tool to meet your organization's specific needs. This may involve configuring the tool to reduce false positives or identifying additional security vulnerabilities by writing new rules or updating existing ones. Additionally, integrate the tool into your build environment, create dashboards to track scan results, and generate custom reports for better visibility and analysis.

4. Prioritization and Onboarding: Prioritize scanning high-risk applications first, particularly if you have many applications in your environment. Establish a clear strategy for onboarding all applications onto the SAST tool over time. Sync application scans with release cycles, daily or monthly builds, or code check-ins to ensure regular and comprehensive security assessments.

5. Analysis of Scan Results: After scanning, analyze the results thoroughly. Triage the scan findings to remove false positives, focusing on legitimate security issues that require attention. Track and provide these identified vulnerabilities to the relevant deployment teams for prompt and proper remediation.

6. Governance and Training: Implement proper governance measures to ensure development teams effectively utilize the SAST tool. Integrate software security touchpoints within the Software Development Life Cycle (SDLC) to incorporate SAST as a vital application development and deployment component. Provide adequate training and resources to developers to facilitate their understanding and effective usage of the SAST tool.

By following these key steps, organizations can establish a comprehensive and efficient approach to running SAST, enhancing the overall security of their applications.

Static Application Security Testing (SAST) is critical to securing your products and applications. With SAST, you can thoroughly test your systems, ensuring they are not hackable and safeguarding your business from cybercriminals.

One of the key aspects of SAST is its ability to provide comprehensive coverage through a manual source code review. This review process reduces false positives and expands coverage, allowing you to identify vulnerabilities that may have been missed. SAST uncovers bugs and flaws by thoroughly analyzing the codebase, which is particularly crucial when integrating components from multiple vendors.

SAST is especially vital in environments involving critical infrastructure or healthcare, where the stakes are high. A compromised device in these sectors could lead to severe privacy violations or pose a threat to patients. By conducting in-depth path coverage, statement coverage, and branch coverage, SAST ensures that all paths, statements, and branches are thoroughly tested, leaving no room for vulnerabilities to go unnoticed.

Furthermore, SAST services offer significant benefits and return on investment. They provide details on exploitable vulnerabilities in a prioritized manner, empowering you to understand your application from an attacker's perspective. This perspective allows you to prioritize mitigating risks and reducing the likelihood of a data breach.

As the number and variety of cybersecurity incidents continue to rise, SAST becomes essential for organizations developing their own products or integrating multiple applications. By implementing SAST into your software development life cycle, you can enhance the overall quality of your code and effectively protect your product and business from potential threats.

SAST (Static Application Security Testing) is an essential solution for ensuring the security of your product or application, especially if it is accessible over a computer network. It plays a crucial role in identifying and addressing vulnerabilities before malicious actors exploit them.

Your article highlights the importance of SAST in various scenarios. For instance, it emphasizes the significance of SAST for devices involved in critical infrastructure, such as Industrial Control Systems (ICS) and Supervisory Control And Data Acquisition (SCADA) systems. These systems are vulnerable to cyber threats, and SAST helps identify potential weaknesses that can be exploited.

In addition, Your article stresses the relevance of SAST in healthcare or hospital environments. Healthcare devices often process and store sensitive patient data, making them a prime target for attackers. SAST helps mitigate the risk of a data breach or compromise of patient privacy by identifying vulnerabilities that could lead to such incidents.

Furthermore, Your article emphasizes the importance of SAST in system or product integration, especially when integrating components from multiple vendors. This integration process can introduce additional vulnerabilities, and SAST plays a crucial role in identifying bugs and flaws in these components, ensuring the overall security of the integrated system.

It is worth noting the additional insights from Their article to provide a more comprehensive understanding. SAST offers real-time feedback to developers during the coding process, enabling them to address security issues promptly. It helps developers navigate the code by providing graphical representations highlighting the exact location of vulnerabilities and risky code.

Furthermore, SAST tools offer in-depth guidance on issue resolution, even for developers with limited security expertise. This ensures that vulnerabilities are effectively addressed without requiring extensive security knowledge.

Customized reports generated by SAST tools allow developers to track and prioritize remediation efforts, facilitating the prompt resolution of security issues. By incorporating SAST into the software development life cycle, developers can create a secure development environment and reduce the likelihood of a data breach or compromise.

Static code analysis does not completely cover an application's code and functionality. While this application security testing is valuable and can identify numerous known vulnerabilities during the pre-production stage, it is not without limitations. Automated static code analysis and SAST tools have their constraints, as they may not be capable of detecting all known vulnerabilities, logical vulnerabilities, or security misconfigurations. Therefore, even if no issues are found during static code analysis, it does not guarantee that the application is entirely free of vulnerabilities or misconfigurations. Employing other security practices and comprehensive testing methods is essential to ensure thorough coverage and minimize potential risks.

Our purpose is simple – to secure your product and business from cybercriminals.

The number of cybersecurity incidents continues to climb. The variety of attacks continues to grow. It is no longer a question of if you will have a cyber event.