<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Bgelbord</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Bgelbord"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Bgelbord"/>
		<updated>2026-05-01T18:01:13Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=78100</id>
		<title>Category:OWASP Security Spending Benchmarks</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=78100"/>
				<updated>2010-02-07T19:17:20Z</updated>
		
		<summary type="html">&lt;p&gt;Bgelbord: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[:Category:OWASP Project]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== NEXT REPORT CURRENTLY COLLECTING RESPONSES - AIMING FOR Q2 DELIVERY ==&lt;br /&gt;
&lt;br /&gt;
== Q2 Report Published - Focus on Cloud Computing ==&lt;br /&gt;
&lt;br /&gt;
The Q2 report of the OWASP Security Spending Benchmarks Project is now available. It can be found at the following link:&lt;br /&gt;
&lt;br /&gt;
[[http://www.owasp.org/images/f/f0/OWASP_SSB_Q2_Project_Report.pdf PDF Download]]&lt;br /&gt;
&lt;br /&gt;
There are a number of key findings in the Q2 09 study:&lt;br /&gt;
&lt;br /&gt;
* Software-as-a-Service is in much greater use than Infrastructure-as-a-Service or Platform-as-a-Service. Over half of respondents make moderate or significant use of SaaS. Less than a quarter of all respondents make any use of either IaaS or PaaS.&lt;br /&gt;
&lt;br /&gt;
* Security spending does not change significantly as a result of cloud computing. Respondents did not report significant spending changes in the areas of network security, third party security reviews, security personnel, or identity management.&lt;br /&gt;
&lt;br /&gt;
* Organizations are not doing their homework when it comes to cloud security. When engaging a cloud partner, only half of organizations inquire about common security-related issues, and only a third require documentation of security measures in place.&lt;br /&gt;
&lt;br /&gt;
* The risk of an undetected data breach is the greatest concern with using cloud computing, closely followed by the risk of a public data breach.&lt;br /&gt;
&lt;br /&gt;
* Compliance and standards requirements related to cloud computing are not well understood. Respondents report having the greatest understanding of PCI requirements relating to cloud computing and the least understanding of HIPAA cloud requirements.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Security Spending Benchmarks Project Report March 2009 ==&lt;br /&gt;
&lt;br /&gt;
The Q1 2009 report of the OWASP Security Spending Benchmarks Project is now available. It can be found at the following link:&lt;br /&gt;
&lt;br /&gt;
[[http://www.owasp.org/images/b/b2/OWASP_SSB_Project_Report_March_2009.pdf PDF Download]].&lt;br /&gt;
&lt;br /&gt;
There are a number of key findings in the Q1 09 study:&lt;br /&gt;
&lt;br /&gt;
* Organizations that have suffered a public data breach spend more on security in the development process than those that have not.&lt;br /&gt;
&lt;br /&gt;
* Web application security spending is expected to either stay flat or increase in nearly two thirds of companies.&lt;br /&gt;
&lt;br /&gt;
* Half of respondents consider security experience important when hiring developers,  and a majority provide their developers with security training. 38% have a third party firm conduct a security review of outsourced code.&lt;br /&gt;
       &lt;br /&gt;
* At least 61% of respondents perform an independent third party security review before deploying a Web application while 17% do not (the remainder do not know or do so when requested by customers).&lt;br /&gt;
&lt;br /&gt;
* Just under half of the surveyed organizations have Web application firewalls deployed for at least some of their Web applications.&lt;br /&gt;
&lt;br /&gt;
== Raw Data ==&lt;br /&gt;
&lt;br /&gt;
Transparency is a key principle of the OWASP SSB Project. For this reason all raw survey results are made available to the community. We welcome additional commentary and interpretations on the survey data. The raw survey data can be found [https://www.surveymonkey.com/sr_detail.aspx?sm=6RXm2J2aqar1MT7JlandR0MYzVFmx25FwQ9trvJH1JG4GcuRCMp3TAkaCJyNCQYrtI1Ny025AnORe0Y3lU%2bj7w%3d%3d here]. &lt;br /&gt;
&lt;br /&gt;
== Inquiries ==&lt;br /&gt;
&lt;br /&gt;
Please contact the project leader Boaz Gelbord (bgelbord at wgen dot net) if you have questions about the project or you would like to inquire about contributing to the project.&lt;br /&gt;
&lt;br /&gt;
== About the Security Spending Benchmarks Project ==&lt;br /&gt;
&lt;br /&gt;
The Security Spending Benchmarks Project seeks to produce guidance and an industry accepted benchmark for justifying overall Web application security spending. We want to quantify how many dollars and human resources should be allocated towards the software development life-cycle, security training, security software/tools, independent third-party reviews, Web application firewalls, etc. This project is motivated by the fact that:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;There are few, if any, industry standard benchmarks for executive management to consider when deciding what is a reasonable amount of resources to spend on Web application security in or out of the software development processes.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Spending on security helps mitigate risks whose potential costs are often difficult to quantify, thereby making justifying and obtaining security budgets difficult.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Many business initiatives require organizations to take “reasonable measures” and “adhere to best practices” for developing, delivering, and/or hosting secure Web application, but there is no industry consensus or data repositories on how this translates into monetary terms.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Smaller organizations outside of highly regulated industries purchase and deploy Web applications with no realistic ability to evaluate their security program.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Producing a less secure Web application may be less expensive than producing a more secure version of the same software. Organization that have invested development resources into software security may not be able to charge a premium for this investment because there is no reference point for the investment.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The survey was formulated with the help of our project partners to address the following questions and many others: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;What percentage of a Web application development groups headcount is dedicated towards security?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards Web application security as a percentage of software development and overall operational IT security costs?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Where do Web application security budget come from?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards security education?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Data Collection &amp;amp; Distribution ==&lt;br /&gt;
&lt;br /&gt;
We utilize the SurveyMonkey system to host surveys conducted for the OWASP SSB Project. We do not collect any publicly identifiable information including names, addresses, employer, email addresses, etc. from the respondents. While we expect a limited number of respondents trying to intentionally skew the results, we take precautions to limit the potential while not creating unnecessary overhead. We control survey access via username/password, as well as through a trusted network of contacts. All information collected is made available through Survey Monkey.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Status  == &lt;br /&gt;
&lt;br /&gt;
Q2 Timeline:&lt;br /&gt;
&lt;br /&gt;
1. April 1-15: Discuss thematic priorities with partners. Expand partner network.&amp;lt;br /&amp;gt;&lt;br /&gt;
2. April 15-30: Formulate survey questions based on identified thematic priorities &amp;lt;br /&amp;gt;&lt;br /&gt;
3. May 1st-June 10th (EXTENDED): Collect survey responses through partner network.&amp;lt;br /&amp;gt;&lt;br /&gt;
4. June 10th-June 20th: Analyze results and produce draft report.&amp;lt;br /&amp;gt;&lt;br /&gt;
5. June 20th - June 25th: Get partner feedback on draft and make edits.&amp;lt;br /&amp;gt;&lt;br /&gt;
6. June 30th: Final report published&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Q1 Timeline:&lt;br /&gt;
&lt;br /&gt;
1. Completing the project description text and finalizing the proposed survey questions. (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
2. January 12th - Open up survey to respondents (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
3. February 6 (extended from Jan 26) - Close survey (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
4. February 6th - Survey Analysis Begins (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
5. February 6th-20th - Boaz Gelbord and Jeremiah Grossman to edit draft report (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
6. February 20th- Decision point whether to include late submissions (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
7. February 20th - Circulate draft report to partners with raw data, request to keep data confidential prior to publication. (DONE) &amp;lt;br/&amp;gt;&lt;br /&gt;
8. March 19th (was March 15th) - Publish report after integrating partner feedback. Generate community interest and discussion around results.(DONE)&amp;lt;br/&amp;gt;&lt;br /&gt;
9. After March 19th - Coordinate formal acceptance of deliverable by OWASP and plan further steps for the project.&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== News Coverage of OWASP SSB Project ==&lt;br /&gt;
&lt;br /&gt;
SC Magazine: [http://www.scmagazineus.com/OWASP-Security-Spending-Benchmarks-Report-published/article/129116/ OWASP Security Spending Benchmarks Report Published]&lt;br /&gt;
&lt;br /&gt;
Dark Reading: [http://www.darkreading.com/security/app-security/showArticle.jhtml?articleID=215901240 Web Application Security Spending Relatively Unscathed by Poor Economy]&lt;br /&gt;
&lt;br /&gt;
Search Security: [http://searchsecurity.techtarget.com/news/article/0,289142,sid14_gci1351731,00.html More companies seek third-party code review, survey finds]&lt;br /&gt;
&lt;br /&gt;
Search Security (Germany): [http://www.searchsecurity.de/themenbereiche/applikationssicherheit/sichere-software-entwicklung/articles/177103 Drittanbieter-Code-Review und geschulte Programmierer bevorzugt]&lt;br /&gt;
&lt;br /&gt;
PC World: [http://www.pcworld.com/businesscenter/article/162012/survey_gauges_web_application_security_spending.html Survey Guages Web Application Security Spending]&lt;br /&gt;
&lt;br /&gt;
Info World [http://www.infoworld.com/article/09/03/26/Survey_gauges_Web_application_security_spending_1.html Survey Gauges Web Application Security Spending]&lt;br /&gt;
&lt;br /&gt;
Network World [http://www.networkworld.com/news/2009/032609-survey-gauges-web-application-security.html Survey Gauges Web Application Security Spending]&lt;br /&gt;
&lt;br /&gt;
The IT Chronicle [http://www.theitchronicle.com/content/survey-gauges-web-application-security-spending Survey Gauges Web Application Security Spending]&lt;br /&gt;
&lt;br /&gt;
The Industry Standard [http://www.thestandard.com/news/2009/03/26/survey-gauges-web-application-security-spending Survey Gauges Web Application Security Spending]&lt;br /&gt;
&lt;br /&gt;
CIO.com [http://www.cio.com/article/486881/Survey_Gauges_Web_Application_Security_Spending Survey Gauges Web Application Security Spending]&lt;br /&gt;
&lt;br /&gt;
CIO Espana [http://www.idg.es/cio/Mas-de-un-25_por_ciento-de-las-empresas-elevara-su-gasto-en-seguridad-de-aplicaciones-Web/doc78597-seguridad.htm Más de un 25% de las empresas elevará su gasto en seguridad de aplicaciones Web]&lt;br /&gt;
&lt;br /&gt;
Information Week [http://www.informationweek.com/blog/main/archives/2009/03/firms_taking_we.html Firms Taking Web App Security (More) Seriously]&lt;br /&gt;
&lt;br /&gt;
Search Security [http://securitywireweekly.blogs.techtarget.com/2009/03/25/owasp-security-benchmark-study-mobile-threats-real/ Podcast]&lt;br /&gt;
&lt;br /&gt;
Search Security [http://searchsecurity.techtarget.com/video/0,297151,sid14_gci1352074,00.html Video Interview with Boaz Gelbord]&lt;br /&gt;
&lt;br /&gt;
CIO India [http://www.cio.in/news/viewArticle/ARTICLEID=5931602 Web Apps Security Spending Rising]&lt;br /&gt;
&lt;br /&gt;
Information Security Magazine [http://searchsecurity.techtarget.com/magazineFeature/0,296894,sid14_gci1352162,00.html Web browsers remain vulnerable to user mistakes]&lt;br /&gt;
&lt;br /&gt;
== Project Leadership ==&lt;br /&gt;
The Security Spending Benchmarks Project Leader is [http://www.boazgelbord.com/ Boaz Gelbord] (Executive Director of Information Security, Wireless Generation and Founder, [http://www.securityscoreboard.com/ Security Scoreboard]). Boaz can be reached directly at '''boaz.gelbord AT owasp.org''' with any questions or feedback. Jeremiah Grossman (Founder &amp;amp; CTO, WhiteHat Security) is also closely assisting in the effort.&lt;br /&gt;
&lt;br /&gt;
== Project Contributors  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:AppSecLogo.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Aspect_logo_resized.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Cenzic.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Cigital_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:CSI.jpg | 200px]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Denim_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:echelonone.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:eema.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Image:Fortify_logo.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:GDS_LOGO_SMALL.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Ifis_logo.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:MetroSITEGroup.jpg]] &amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Imperva_Logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:The-open-group.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Rapid7.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Sectheory-logo-2.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Logo_securosis.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Tssci.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:TTT_logo_2008.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Whitehat_security_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;/div&gt;</summary>
		<author><name>Bgelbord</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=78099</id>
		<title>Category:OWASP Security Spending Benchmarks</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=78099"/>
				<updated>2010-02-07T19:16:39Z</updated>
		
		<summary type="html">&lt;p&gt;Bgelbord: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[:Category:OWASP Project]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== NEXT REPORT CURRENTLY COLLECTING RESPONSES - AIMING FOR Q2 DELIVERY ==&lt;br /&gt;
&lt;br /&gt;
== Q2 Report Published - Focus on Cloud Computing ==&lt;br /&gt;
&lt;br /&gt;
The Q2 report of the OWASP Security Spending Benchmarks Project is now available. It can be found at the following link:&lt;br /&gt;
&lt;br /&gt;
[[http://www.owasp.org/images/f/f0/OWASP_SSB_Q2_Project_Report.pdf PDF Download]]&lt;br /&gt;
&lt;br /&gt;
There are a number of key findings in the Q2 09 study:&lt;br /&gt;
&lt;br /&gt;
* Software-as-a-Service is in much greater use than Infrastructure-as-a-Service or Platform-as-a-Service. Over half of respondents make moderate or significant use of SaaS. Less than a quarter of all respondents make any use of either IaaS or PaaS.&lt;br /&gt;
&lt;br /&gt;
* Security spending does not change significantly as a result of cloud computing. Respondents did not report significant spending changes in the areas of network security, third party security reviews, security personnel, or identity management.&lt;br /&gt;
&lt;br /&gt;
* Organizations are not doing their homework when it comes to cloud security. When engaging a cloud partner, only half of organizations inquire about common security-related issues, and only a third require documentation of security measures in place.&lt;br /&gt;
&lt;br /&gt;
* The risk of an undetected data breach is the greatest concern with using cloud computing, closely followed by the risk of a public data breach.&lt;br /&gt;
&lt;br /&gt;
* Compliance and standards requirements related to cloud computing are not well understood. Respondents report having the greatest understanding of PCI requirements relating to cloud computing and the least understanding of HIPAA cloud requirements.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Security Spending Benchmarks Project Report March 2009 ==&lt;br /&gt;
&lt;br /&gt;
The Q1 2009 report of the OWASP Security Spending Benchmarks Project is now available. It can be found at the following link:&lt;br /&gt;
&lt;br /&gt;
[[http://www.owasp.org/images/b/b2/OWASP_SSB_Project_Report_March_2009.pdf PDF Download]].&lt;br /&gt;
&lt;br /&gt;
There are a number of key findings in the Q1 09 study:&lt;br /&gt;
&lt;br /&gt;
* Organizations that have suffered a public data breach spend more on security in the development process than those that have not.&lt;br /&gt;
&lt;br /&gt;
* Web application security spending is expected to either stay flat or increase in nearly two thirds of companies.&lt;br /&gt;
&lt;br /&gt;
* Half of respondents consider security experience important when hiring developers,  and a majority provide their developers with security training. 38% have a third party firm conduct a security review of outsourced code.&lt;br /&gt;
       &lt;br /&gt;
* At least 61% of respondents perform an independent third party security review before deploying a Web application while 17% do not (the remainder do not know or do so when requested by customers).&lt;br /&gt;
&lt;br /&gt;
* Just under half of the surveyed organizations have Web application firewalls deployed for at least some of their Web applications.&lt;br /&gt;
&lt;br /&gt;
== Raw Data ==&lt;br /&gt;
&lt;br /&gt;
Transparency is a key principle of the OWASP SSB Project. For this reason all raw survey results are made available to the community. We welcome additional commentary and interpretations on the survey data. The raw survey data can be found [https://www.surveymonkey.com/sr_detail.aspx?sm=6RXm2J2aqar1MT7JlandR0MYzVFmx25FwQ9trvJH1JG4GcuRCMp3TAkaCJyNCQYrtI1Ny025AnORe0Y3lU%2bj7w%3d%3d here]. &lt;br /&gt;
&lt;br /&gt;
== Inquiries ==&lt;br /&gt;
&lt;br /&gt;
Please contact the project leader Boaz Gelbord (bgelbord at wgen dot net) if you have questions about the project or you would like to inquire about contributing to the project.&lt;br /&gt;
&lt;br /&gt;
== About the Security Spending Benchmarks Project ==&lt;br /&gt;
&lt;br /&gt;
The Security Spending Benchmarks Project seeks to produce guidance and an industry accepted benchmark for justifying overall Web application security spending. We want to quantify how many dollars and human resources should be allocated towards the software development life-cycle, security training, security software/tools, independent third-party reviews, Web application firewalls, etc. This project is motivated by the fact that:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;There are few, if any, industry standard benchmarks for executive management to consider when deciding what is a reasonable amount of resources to spend on Web application security in or out of the software development processes.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Spending on security helps mitigate risks whose potential costs are often difficult to quantify, thereby making justifying and obtaining security budgets difficult.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Many business initiatives require organizations to take “reasonable measures” and “adhere to best practices” for developing, delivering, and/or hosting secure Web application, but there is no industry consensus or data repositories on how this translates into monetary terms.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Smaller organizations outside of highly regulated industries purchase and deploy Web applications with no realistic ability to evaluate their security program.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Producing a less secure Web application may be less expensive than producing a more secure version of the same software. Organization that have invested development resources into software security may not be able to charge a premium for this investment because there is no reference point for the investment.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The survey was formulated with the help of our project partners to address the following questions and many others: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;What percentage of a Web application development groups headcount is dedicated towards security?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards Web application security as a percentage of software development and overall operational IT security costs?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Where do Web application security budget come from?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards security education?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Data Collection &amp;amp; Distribution ==&lt;br /&gt;
&lt;br /&gt;
We utilize the SurveyMonkey system to host surveys conducted for the OWASP SSB Project. We do not collect any publicly identifiable information including names, addresses, employer, email addresses, etc. from the respondents. While we expect a limited number of respondents trying to intentionally skew the results, we take precautions to limit the potential while not creating unnecessary overhead. We control survey access via username/password, as well as through a trusted network of contacts. All information collected is made available through Survey Monkey.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Status  == &lt;br /&gt;
&lt;br /&gt;
Q2 Timeline:&lt;br /&gt;
&lt;br /&gt;
1. April 1-15: Discuss thematic priorities with partners. Expand partner network.&amp;lt;br /&amp;gt;&lt;br /&gt;
2. April 15-30: Formulate survey questions based on identified thematic priorities &amp;lt;br /&amp;gt;&lt;br /&gt;
3. May 1st-June 10th (EXTENDED): Collect survey responses through partner network.&amp;lt;br /&amp;gt;&lt;br /&gt;
4. June 10th-June 20th: Analyze results and produce draft report.&amp;lt;br /&amp;gt;&lt;br /&gt;
5. June 20th - June 25th: Get partner feedback on draft and make edits.&amp;lt;br /&amp;gt;&lt;br /&gt;
6. June 30th: Final report published&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Q1 Timeline:&lt;br /&gt;
&lt;br /&gt;
1. Completing the project description text and finalizing the proposed survey questions. (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
2. January 12th - Open up survey to respondents (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
3. February 6 (extended from Jan 26) - Close survey (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
4. February 6th - Survey Analysis Begins (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
5. February 6th-20th - Boaz Gelbord and Jeremiah Grossman to edit draft report (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
6. February 20th- Decision point whether to include late submissions (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
7. February 20th - Circulate draft report to partners with raw data, request to keep data confidential prior to publication. (DONE) &amp;lt;br/&amp;gt;&lt;br /&gt;
8. March 19th (was March 15th) - Publish report after integrating partner feedback. Generate community interest and discussion around results.(DONE)&amp;lt;br/&amp;gt;&lt;br /&gt;
9. After March 19th - Coordinate formal acceptance of deliverable by OWASP and plan further steps for the project.&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== News Coverage of OWASP SSB Project ==&lt;br /&gt;
&lt;br /&gt;
SC Magazine: [http://www.scmagazineus.com/OWASP-Security-Spending-Benchmarks-Report-published/article/129116/ OWASP Security Spending Benchmarks Report Published]&lt;br /&gt;
&lt;br /&gt;
Dark Reading: [http://www.darkreading.com/security/app-security/showArticle.jhtml?articleID=215901240 Web Application Security Spending Relatively Unscathed by Poor Economy]&lt;br /&gt;
&lt;br /&gt;
Search Security: [http://searchsecurity.techtarget.com/news/article/0,289142,sid14_gci1351731,00.html More companies seek third-party code review, survey finds]&lt;br /&gt;
&lt;br /&gt;
Search Security (Germany): [http://www.searchsecurity.de/themenbereiche/applikationssicherheit/sichere-software-entwicklung/articles/177103 Drittanbieter-Code-Review und geschulte Programmierer bevorzugt]&lt;br /&gt;
&lt;br /&gt;
PC World: [http://www.pcworld.com/businesscenter/article/162012/survey_gauges_web_application_security_spending.html Survey Guages Web Application Security Spending]&lt;br /&gt;
&lt;br /&gt;
Info World [http://www.infoworld.com/article/09/03/26/Survey_gauges_Web_application_security_spending_1.html Survey Gauges Web Application Security Spending]&lt;br /&gt;
&lt;br /&gt;
Network World [http://www.networkworld.com/news/2009/032609-survey-gauges-web-application-security.html Survey Gauges Web Application Security Spending]&lt;br /&gt;
&lt;br /&gt;
The IT Chronicle [http://www.theitchronicle.com/content/survey-gauges-web-application-security-spending Survey Gauges Web Application Security Spending]&lt;br /&gt;
&lt;br /&gt;
The Industry Standard [http://www.thestandard.com/news/2009/03/26/survey-gauges-web-application-security-spending Survey Gauges Web Application Security Spending]&lt;br /&gt;
&lt;br /&gt;
CIO.com [http://www.cio.com/article/486881/Survey_Gauges_Web_Application_Security_Spending Survey Gauges Web Application Security Spending]&lt;br /&gt;
&lt;br /&gt;
CIO Espana [http://www.idg.es/cio/Mas-de-un-25_por_ciento-de-las-empresas-elevara-su-gasto-en-seguridad-de-aplicaciones-Web/doc78597-seguridad.htm Más de un 25% de las empresas elevará su gasto en seguridad de aplicaciones Web]&lt;br /&gt;
&lt;br /&gt;
Information Week [http://www.informationweek.com/blog/main/archives/2009/03/firms_taking_we.html Firms Taking Web App Security (More) Seriously]&lt;br /&gt;
&lt;br /&gt;
Search Security [http://securitywireweekly.blogs.techtarget.com/2009/03/25/owasp-security-benchmark-study-mobile-threats-real/ Podcast]&lt;br /&gt;
&lt;br /&gt;
Search Security [http://searchsecurity.techtarget.com/video/0,297151,sid14_gci1352074,00.html Video Interview with Boaz Gelbord]&lt;br /&gt;
&lt;br /&gt;
CIO India [http://www.cio.in/news/viewArticle/ARTICLEID=5931602 Web Apps Security Spending Rising]&lt;br /&gt;
&lt;br /&gt;
Information Security Magazine [http://searchsecurity.techtarget.com/magazineFeature/0,296894,sid14_gci1352162,00.html Web browsers remain vulnerable to user mistakes]&lt;br /&gt;
&lt;br /&gt;
== Project Leadership ==&lt;br /&gt;
The Security Spending Benchmarks Project Leader is [http://www.boazgelbord.com/ Boaz Gelbord] (Executive Director of Information Security, Wireless Generation and Founder, [http://securityscoreboard.com/ Security Scoreboard]). Boaz can be reached directly at '''boaz.gelbord AT owasp.org''' with any questions or feedback. Jeremiah Grossman (Founder &amp;amp; CTO, WhiteHat Security) is also closely assisting in the effort.&lt;br /&gt;
&lt;br /&gt;
== Project Contributors  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:AppSecLogo.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Aspect_logo_resized.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Cenzic.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Cigital_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:CSI.jpg | 200px]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Denim_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:echelonone.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:eema.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Image:Fortify_logo.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:GDS_LOGO_SMALL.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Ifis_logo.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:MetroSITEGroup.jpg]] &amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Imperva_Logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:The-open-group.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Rapid7.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Sectheory-logo-2.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Logo_securosis.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Tssci.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:TTT_logo_2008.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Whitehat_security_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;/div&gt;</summary>
		<author><name>Bgelbord</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Podcast_News&amp;diff=76621</id>
		<title>Podcast News</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Podcast_News&amp;diff=76621"/>
				<updated>2010-01-22T01:20:27Z</updated>
		
		<summary type="html">&lt;p&gt;Bgelbord: /* OWASP Podcast Roundtable */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''[[Podcast_News|OWASP Podcast News]]''' &lt;br /&gt;
&lt;br /&gt;
OWASP NEWS October 2009&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== OWASP Podcast Roundtable  ==&lt;br /&gt;
&lt;br /&gt;
'''Next Recording&amp;amp;nbsp;: January 22, 2010''' &lt;br /&gt;
&lt;br /&gt;
==== [Full-disclosure] Microsoft Windows NT #GP Trap Handler Allows Users to Switch Kernel Stack  ====&lt;br /&gt;
&lt;br /&gt;
http://archives.neohapsis.com/archives/fulldisclosure/2010-01/0346.html &lt;br /&gt;
&lt;br /&gt;
''Discussion'':&amp;amp;nbsp;holey OS code, Batman! how do you even start to get a handle on this bugger? this isn't web app specific, but it squarely hits secure coding between the eyes. how does a bug like this survive for 17 years? &lt;br /&gt;
&lt;br /&gt;
==== Top Ten Web Hacking Techniques of 2009 (Official)  ====&lt;br /&gt;
&lt;br /&gt;
http://jeremiahgrossman.blogspot.com/2010/01/top-ten-web-hacking-techniques-of-2009.html &lt;br /&gt;
&lt;br /&gt;
''Discussion'':&amp;amp;nbsp;do you agree? anything jump out? any good back-stories? &lt;br /&gt;
&lt;br /&gt;
==== Google, China, &amp;quot;Aurora&amp;quot;, and Advanced Persistent Threat  ====&lt;br /&gt;
&lt;br /&gt;
(''this makes me want to start chanting &amp;quot;lions and tigers and bears - OH MY!&amp;quot;'') &lt;br /&gt;
&lt;br /&gt;
Google: A new approach to China&amp;lt;br&amp;gt; http://googleblog.blogspot.com/2010/01/new-approach-to-china.html &lt;br /&gt;
&lt;br /&gt;
Operation “Aurora” Hit Google, Others&amp;lt;br&amp;gt; http://siblog.mcafee.com/cto/operation-%E2%80%9Caurora%E2%80%9D-hit-google-others/ &lt;br /&gt;
&lt;br /&gt;
Hack of Google, Adobe Conducted Through Zero-Day IE Flaw&amp;lt;br&amp;gt; http://www.wired.com/threatlevel/2010/01/hack-of-adob/ &lt;br /&gt;
&lt;br /&gt;
Microsoft Security Advisory (979352) Vulnerability in Internet Explorer Could Allow Remote Code Execution&amp;lt;br&amp;gt; http://www.microsoft.com/technet/security/advisory/979352.mspx &lt;br /&gt;
&lt;br /&gt;
Google v China&amp;lt;br&amp;gt; http://taosecurity.blogspot.com/2010/01/google-v-china.html &lt;br /&gt;
&lt;br /&gt;
Web-based systems vs. Advanced Persistent Threat&amp;lt;br&amp;gt; http://jeremiahgrossman.blogspot.com/2010/01/web-based-systems-vs-advanced.html &lt;br /&gt;
&lt;br /&gt;
''Discussion'':&amp;amp;nbsp;is this important news? how does this affect the development community, particularly by extension? has anything really changed? &lt;br /&gt;
&lt;br /&gt;
''Discussion'':&amp;amp;nbsp;A new IE 0-day brings mega-tech-corps to their knees. France and Germany respond by recommending against the use of IE altogether. Is this news? with so many IE6 apps still in use today, does it even matter? &lt;br /&gt;
&lt;br /&gt;
''Discussion'':&amp;amp;nbsp;this is also the source of a couple potential buzzword winners for 2010... &amp;quot;Operation Aurora&amp;quot; and &amp;quot;advanced persistent threat&amp;quot;... &lt;br /&gt;
&lt;br /&gt;
==== Microsoft Advances Search Privacy with Bing  ====&lt;br /&gt;
&lt;br /&gt;
http://microsoftontheissues.com/cs/blogs/mscorp/archive/2010/01/18/microsoft-advances-search-privacy-with-bing.aspx &lt;br /&gt;
&lt;br /&gt;
''Discussion'':&amp;amp;nbsp;is this really that big a deal? do they really need the IP address at all? is this doing enough, or does it fall far short? &lt;br /&gt;
&lt;br /&gt;
==== Microsoft Seeks New Legal Framework For Cloud  ====&lt;br /&gt;
&lt;br /&gt;
http://www.informationweek.com/news/government/policy/showArticle.jhtml?articleID=222301657&amp;amp;amp;cid=IWK_Government-Twitter &lt;br /&gt;
&lt;br /&gt;
''Discussion'':&amp;amp;nbsp;what sort of legislation/regulation do we need? what would be useful? we all know, I think, that's it going to happen one way or another. the question is what is and isn't useful.&lt;br /&gt;
&lt;br /&gt;
==== Imperva Report on Password Practices ====&lt;br /&gt;
&lt;br /&gt;
http://www.imperva.com/docs/WP_Consumer_Password_Worst_Practices.pdf&lt;br /&gt;
&lt;br /&gt;
''Discussion'':&amp;amp;nbsp;is this surprising? Is enforced password complexity the answer? Is this the users' problem and should we care?&lt;/div&gt;</summary>
		<author><name>Bgelbord</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=74617</id>
		<title>Category:OWASP Security Spending Benchmarks</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=74617"/>
				<updated>2009-12-02T22:42:43Z</updated>
		
		<summary type="html">&lt;p&gt;Bgelbord: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[:Category:OWASP Project]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== NEXT REPORT TO BE PUBLISHED IN Q4 ==&lt;br /&gt;
&lt;br /&gt;
== Q2 Report Published - Focus on Cloud Computing ==&lt;br /&gt;
&lt;br /&gt;
The Q2 report of the OWASP Security Spending Benchmarks Project is now available. It can be found at the following link:&lt;br /&gt;
&lt;br /&gt;
[[http://www.owasp.org/images/f/f0/OWASP_SSB_Q2_Project_Report.pdf PDF Download]]&lt;br /&gt;
&lt;br /&gt;
There are a number of key findings in the Q2 09 study:&lt;br /&gt;
&lt;br /&gt;
* Software-as-a-Service is in much greater use than Infrastructure-as-a-Service or Platform-as-a-Service. Over half of respondents make moderate or significant use of SaaS. Less than a quarter of all respondents make any use of either IaaS or PaaS.&lt;br /&gt;
&lt;br /&gt;
* Security spending does not change significantly as a result of cloud computing. Respondents did not report significant spending changes in the areas of network security, third party security reviews, security personnel, or identity management.&lt;br /&gt;
&lt;br /&gt;
* Organizations are not doing their homework when it comes to cloud security. When engaging a cloud partner, only half of organizations inquire about common security-related issues, and only a third require documentation of security measures in place.&lt;br /&gt;
&lt;br /&gt;
* The risk of an undetected data breach is the greatest concern with using cloud computing, closely followed by the risk of a public data breach.&lt;br /&gt;
&lt;br /&gt;
* Compliance and standards requirements related to cloud computing are not well understood. Respondents report having the greatest understanding of PCI requirements relating to cloud computing and the least understanding of HIPAA cloud requirements.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Security Spending Benchmarks Project Report March 2009 ==&lt;br /&gt;
&lt;br /&gt;
The Q1 2009 report of the OWASP Security Spending Benchmarks Project is now available. It can be found at the following link:&lt;br /&gt;
&lt;br /&gt;
[[http://www.owasp.org/images/b/b2/OWASP_SSB_Project_Report_March_2009.pdf PDF Download]].&lt;br /&gt;
&lt;br /&gt;
There are a number of key findings in the Q1 09 study:&lt;br /&gt;
&lt;br /&gt;
* Organizations that have suffered a public data breach spend more on security in the development process than those that have not.&lt;br /&gt;
&lt;br /&gt;
* Web application security spending is expected to either stay flat or increase in nearly two thirds of companies.&lt;br /&gt;
&lt;br /&gt;
* Half of respondents consider security experience important when hiring developers,  and a majority provide their developers with security training. 38% have a third party firm conduct a security review of outsourced code.&lt;br /&gt;
       &lt;br /&gt;
* At least 61% of respondents perform an independent third party security review before deploying a Web application while 17% do not (the remainder do not know or do so when requested by customers).&lt;br /&gt;
&lt;br /&gt;
* Just under half of the surveyed organizations have Web application firewalls deployed for at least some of their Web applications.&lt;br /&gt;
&lt;br /&gt;
== Raw Data ==&lt;br /&gt;
&lt;br /&gt;
Transparency is a key principle of the OWASP SSB Project. For this reason all raw survey results are made available to the community. We welcome additional commentary and interpretations on the survey data. The raw survey data can be found [https://www.surveymonkey.com/sr_detail.aspx?sm=6RXm2J2aqar1MT7JlandR0MYzVFmx25FwQ9trvJH1JG4GcuRCMp3TAkaCJyNCQYrtI1Ny025AnORe0Y3lU%2bj7w%3d%3d here]. &lt;br /&gt;
&lt;br /&gt;
== Inquiries ==&lt;br /&gt;
&lt;br /&gt;
Please contact the project leader Boaz Gelbord (bgelbord at wgen dot net) if you have questions about the project or you would like to inquire about contributing to the project.&lt;br /&gt;
&lt;br /&gt;
== About the Security Spending Benchmarks Project ==&lt;br /&gt;
&lt;br /&gt;
The Security Spending Benchmarks Project seeks to produce guidance and an industry accepted benchmark for justifying overall Web application security spending. We want to quantify how many dollars and human resources should be allocated towards the software development life-cycle, security training, security software/tools, independent third-party reviews, Web application firewalls, etc. This project is motivated by the fact that:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;There are few, if any, industry standard benchmarks for executive management to consider when deciding what is a reasonable amount of resources to spend on Web application security in or out of the software development processes.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Spending on security helps mitigate risks whose potential costs are often difficult to quantify, thereby making justifying and obtaining security budgets difficult.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Many business initiatives require organizations to take “reasonable measures” and “adhere to best practices” for developing, delivering, and/or hosting secure Web application, but there is no industry consensus or data repositories on how this translates into monetary terms.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Smaller organizations outside of highly regulated industries purchase and deploy Web applications with no realistic ability to evaluate their security program.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Producing a less secure Web application may be less expensive than producing a more secure version of the same software. Organization that have invested development resources into software security may not be able to charge a premium for this investment because there is no reference point for the investment.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The survey was formulated with the help of our project partners to address the following questions and many others: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;What percentage of a Web application development groups headcount is dedicated towards security?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards Web application security as a percentage of software development and overall operational IT security costs?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Where do Web application security budget come from?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards security education?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Data Collection &amp;amp; Distribution ==&lt;br /&gt;
&lt;br /&gt;
We utilize the SurveyMonkey system to host surveys conducted for the OWASP SSB Project. We do not collect any publicly identifiable information including names, addresses, employer, email addresses, etc. from the respondents. While we expect a limited number of respondents trying to intentionally skew the results, we take precautions to limit the potential while not creating unnecessary overhead. We control survey access via username/password, as well as through a trusted network of contacts. All information collected is made available through Survey Monkey.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Status  == &lt;br /&gt;
&lt;br /&gt;
Q2 Timeline:&lt;br /&gt;
&lt;br /&gt;
1. April 1-15: Discuss thematic priorities with partners. Expand partner network.&amp;lt;br /&amp;gt;&lt;br /&gt;
2. April 15-30: Formulate survey questions based on identified thematic priorities &amp;lt;br /&amp;gt;&lt;br /&gt;
3. May 1st-June 10th (EXTENDED): Collect survey responses through partner network.&amp;lt;br /&amp;gt;&lt;br /&gt;
4. June 10th-June 20th: Analyze results and produce draft report.&amp;lt;br /&amp;gt;&lt;br /&gt;
5. June 20th - June 25th: Get partner feedback on draft and make edits.&amp;lt;br /&amp;gt;&lt;br /&gt;
6. June 30th: Final report published&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Q1 Timeline:&lt;br /&gt;
&lt;br /&gt;
1. Completing the project description text and finalizing the proposed survey questions. (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
2. January 12th - Open up survey to respondents (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
3. February 6 (extended from Jan 26) - Close survey (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
4. February 6th - Survey Analysis Begins (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
5. February 6th-20th - Boaz Gelbord and Jeremiah Grossman to edit draft report (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
6. February 20th- Decision point whether to include late submissions (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
7. February 20th - Circulate draft report to partners with raw data, request to keep data confidential prior to publication. (DONE) &amp;lt;br/&amp;gt;&lt;br /&gt;
8. March 19th (was March 15th) - Publish report after integrating partner feedback. Generate community interest and discussion around results.(DONE)&amp;lt;br/&amp;gt;&lt;br /&gt;
9. After March 19th - Coordinate formal acceptance of deliverable by OWASP and plan further steps for the project.&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== News Coverage of OWASP SSB Project ==&lt;br /&gt;
&lt;br /&gt;
SC Magazine: [http://www.scmagazineus.com/OWASP-Security-Spending-Benchmarks-Report-published/article/129116/ OWASP Security Spending Benchmarks Report Published]&lt;br /&gt;
&lt;br /&gt;
Dark Reading: [http://www.darkreading.com/security/app-security/showArticle.jhtml?articleID=215901240 Web Application Security Spending Relatively Unscathed by Poor Economy]&lt;br /&gt;
&lt;br /&gt;
Search Security: [http://searchsecurity.techtarget.com/news/article/0,289142,sid14_gci1351731,00.html More companies seek third-party code review, survey finds]&lt;br /&gt;
&lt;br /&gt;
Search Security (Germany): [http://www.searchsecurity.de/themenbereiche/applikationssicherheit/sichere-software-entwicklung/articles/177103 Drittanbieter-Code-Review und geschulte Programmierer bevorzugt]&lt;br /&gt;
&lt;br /&gt;
PC World: [http://www.pcworld.com/businesscenter/article/162012/survey_gauges_web_application_security_spending.html Survey Guages Web Application Security Spending]&lt;br /&gt;
&lt;br /&gt;
Info World [http://www.infoworld.com/article/09/03/26/Survey_gauges_Web_application_security_spending_1.html Survey Gauges Web Application Security Spending]&lt;br /&gt;
&lt;br /&gt;
Network World [http://www.networkworld.com/news/2009/032609-survey-gauges-web-application-security.html Survey Gauges Web Application Security Spending]&lt;br /&gt;
&lt;br /&gt;
The IT Chronicle [http://www.theitchronicle.com/content/survey-gauges-web-application-security-spending Survey Gauges Web Application Security Spending]&lt;br /&gt;
&lt;br /&gt;
The Industry Standard [http://www.thestandard.com/news/2009/03/26/survey-gauges-web-application-security-spending Survey Gauges Web Application Security Spending]&lt;br /&gt;
&lt;br /&gt;
CIO.com [http://www.cio.com/article/486881/Survey_Gauges_Web_Application_Security_Spending Survey Gauges Web Application Security Spending]&lt;br /&gt;
&lt;br /&gt;
CIO Espana [http://www.idg.es/cio/Mas-de-un-25_por_ciento-de-las-empresas-elevara-su-gasto-en-seguridad-de-aplicaciones-Web/doc78597-seguridad.htm Más de un 25% de las empresas elevará su gasto en seguridad de aplicaciones Web]&lt;br /&gt;
&lt;br /&gt;
Information Week [http://www.informationweek.com/blog/main/archives/2009/03/firms_taking_we.html Firms Taking Web App Security (More) Seriously]&lt;br /&gt;
&lt;br /&gt;
Search Security [http://securitywireweekly.blogs.techtarget.com/2009/03/25/owasp-security-benchmark-study-mobile-threats-real/ Podcast]&lt;br /&gt;
&lt;br /&gt;
Search Security [http://searchsecurity.techtarget.com/video/0,297151,sid14_gci1352074,00.html Video Interview with Boaz Gelbord]&lt;br /&gt;
&lt;br /&gt;
CIO India [http://www.cio.in/news/viewArticle/ARTICLEID=5931602 Web Apps Security Spending Rising]&lt;br /&gt;
&lt;br /&gt;
Information Security Magazine [http://searchsecurity.techtarget.com/magazineFeature/0,296894,sid14_gci1352162,00.html Web browsers remain vulnerable to user mistakes]&lt;br /&gt;
&lt;br /&gt;
== Project Leadership ==&lt;br /&gt;
The Security Spending Benchmarks Project Leader is [http://www.boazgelbord.com/ Boaz Gelbord] (Executive Director of Information Security, Wireless Generation). Boaz can be reached directly at '''boaz.gelbord AT owasp.org''' with any questions or feedback. Jeremiah Grossman (Founder &amp;amp; CTO, WhiteHat Security) is also closely assisting in the effort.&lt;br /&gt;
&lt;br /&gt;
== Project Contributors  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:AppSecLogo.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Aspect_logo_resized.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Cenzic.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Cigital_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:CSI.jpg | 200px]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Denim_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:echelonone.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:eema.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Image:Fortify_logo.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:GDS_LOGO_SMALL.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Ifis_logo.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:MetroSITEGroup.jpg]] &amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Imperva_Logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:The-open-group.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Rapid7.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Sectheory-logo-2.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Logo_securosis.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Tssci.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:TTT_logo_2008.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Whitehat_security_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;/div&gt;</summary>
		<author><name>Bgelbord</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=72594</id>
		<title>Category:OWASP Security Spending Benchmarks</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=72594"/>
				<updated>2009-11-02T19:15:57Z</updated>
		
		<summary type="html">&lt;p&gt;Bgelbord: added Aspect logo&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[:Category:OWASP Project]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== NEXT REPORT TO BE PUBLISHED IN Q4 ==&lt;br /&gt;
&lt;br /&gt;
== Q2 Report Published - Focus on Cloud Computing ==&lt;br /&gt;
&lt;br /&gt;
The Q2 report of the OWASP Security Spending Benchmarks Project is now available. It can be found at the following link:&lt;br /&gt;
&lt;br /&gt;
[[http://www.owasp.org/images/f/f0/OWASP_SSB_Q2_Project_Report.pdf PDF Download]]&lt;br /&gt;
&lt;br /&gt;
There are a number of key findings in the Q2 09 study:&lt;br /&gt;
&lt;br /&gt;
* Software-as-a-Service is in much greater use than Infrastructure-as-a-Service or Platform-as-a-Service. Over half of respondents make moderate or significant use of SaaS. Less than a quarter of all respondents make any use of either IaaS or PaaS.&lt;br /&gt;
&lt;br /&gt;
* Security spending does not change significantly as a result of cloud computing. Respondents did not report significant spending changes in the areas of network security, third party security reviews, security personnel, or identity management.&lt;br /&gt;
&lt;br /&gt;
* Organizations are not doing their homework when it comes to cloud security. When engaging a cloud partner, only half of organizations inquire about common security-related issues, and only a third require documentation of security measures in place.&lt;br /&gt;
&lt;br /&gt;
* The risk of an undetected data breach is the greatest concern with using cloud computing, closely followed by the risk of a public data breach.&lt;br /&gt;
&lt;br /&gt;
* Compliance and standards requirements related to cloud computing are not well understood. Respondents report having the greatest understanding of PCI requirements relating to cloud computing and the least understanding of HIPAA cloud requirements.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Security Spending Benchmarks Project Report March 2009 ==&lt;br /&gt;
&lt;br /&gt;
The Q1 2009 report of the OWASP Security Spending Benchmarks Project is now available. It can be found at the following link:&lt;br /&gt;
&lt;br /&gt;
[[http://www.owasp.org/images/b/b2/OWASP_SSB_Project_Report_March_2009.pdf PDF Download]].&lt;br /&gt;
&lt;br /&gt;
There are a number of key findings in the Q1 09 study:&lt;br /&gt;
&lt;br /&gt;
* Organizations that have suffered a public data breach spend more on security in the development process than those that have not.&lt;br /&gt;
&lt;br /&gt;
* Web application security spending is expected to either stay flat or increase in nearly two thirds of companies.&lt;br /&gt;
&lt;br /&gt;
* Half of respondents consider security experience important when hiring developers,  and a majority provide their developers with security training. 38% have a third party firm conduct a security review of outsourced code.&lt;br /&gt;
       &lt;br /&gt;
* At least 61% of respondents perform an independent third party security review before deploying a Web application while 17% do not (the remainder do not know or do so when requested by customers).&lt;br /&gt;
&lt;br /&gt;
* Just under half of the surveyed organizations have Web application firewalls deployed for at least some of their Web applications.&lt;br /&gt;
&lt;br /&gt;
== Raw Data ==&lt;br /&gt;
&lt;br /&gt;
Transparency is a key principle of the OWASP SSB Project. For this reason all raw survey results are made available to the community. We welcome additional commentary and interpretations on the survey data. The raw survey data can be found [https://www.surveymonkey.com/sr_detail.aspx?sm=6RXm2J2aqar1MT7JlandR0MYzVFmx25FwQ9trvJH1JG4GcuRCMp3TAkaCJyNCQYrtI1Ny025AnORe0Y3lU%2bj7w%3d%3d here]. &lt;br /&gt;
&lt;br /&gt;
== Inquiries ==&lt;br /&gt;
&lt;br /&gt;
Please contact the project leader Boaz Gelbord (bgelbord at wgen dot net) if you have questions about the project or you would like to inquire about contributing to the project.&lt;br /&gt;
&lt;br /&gt;
== About the Security Spending Benchmarks Project ==&lt;br /&gt;
&lt;br /&gt;
The Security Spending Benchmarks Project seeks to produce guidance and an industry accepted benchmark for justifying overall Web application security spending. We want to quantify how many dollars and human resources should be allocated towards the software development life-cycle, security training, security software/tools, independent third-party reviews, Web application firewalls, etc. This project is motivated by the fact that:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;There are few, if any, industry standard benchmarks for executive management to consider when deciding what is a reasonable amount of resources to spend on Web application security in or out of the software development processes.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Spending on security helps mitigate risks whose potential costs are often difficult to quantify, thereby making justifying and obtaining security budgets difficult.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Many business initiatives require organizations to take “reasonable measures” and “adhere to best practices” for developing, delivering, and/or hosting secure Web application, but there is no industry consensus or data repositories on how this translates into monetary terms.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Smaller organizations outside of highly regulated industries purchase and deploy Web applications with no realistic ability to evaluate their security program.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Producing a less secure Web application may be less expensive than producing a more secure version of the same software. Organization that have invested development resources into software security may not be able to charge a premium for this investment because there is no reference point for the investment.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The survey was formulated with the help of our project partners to address the following questions and many others: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;What percentage of a Web application development groups headcount is dedicated towards security?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards Web application security as a percentage of software development and overall operational IT security costs?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Where do Web application security budget come from?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards security education?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Data Collection &amp;amp; Distribution ==&lt;br /&gt;
&lt;br /&gt;
We utilize the SurveyMonkey system to host surveys conducted for the OWASP SSB Project. We do not collect any publicly identifiable information including names, addresses, employer, email addresses, etc. from the respondents. While we expect a limited number of respondents trying to intentionally skew the results, we take precautions to limit the potential while not creating unnecessary overhead. We control survey access via username/password, as well as through a trusted network of contacts. All information collected is made available through Survey Monkey.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Status  == &lt;br /&gt;
&lt;br /&gt;
Q2 Timeline:&lt;br /&gt;
&lt;br /&gt;
1. April 1-15: Discuss thematic priorities with partners. Expand partner network.&amp;lt;br /&amp;gt;&lt;br /&gt;
2. April 15-30: Formulate survey questions based on identified thematic priorities &amp;lt;br /&amp;gt;&lt;br /&gt;
3. May 1st-June 10th (EXTENDED): Collect survey responses through partner network.&amp;lt;br /&amp;gt;&lt;br /&gt;
4. June 10th-June 20th: Analyze results and produce draft report.&amp;lt;br /&amp;gt;&lt;br /&gt;
5. June 20th - June 25th: Get partner feedback on draft and make edits.&amp;lt;br /&amp;gt;&lt;br /&gt;
6. June 30th: Final report published&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Q1 Timeline:&lt;br /&gt;
&lt;br /&gt;
1. Completing the project description text and finalizing the proposed survey questions. (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
2. January 12th - Open up survey to respondents (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
3. February 6 (extended from Jan 26) - Close survey (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
4. February 6th - Survey Analysis Begins (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
5. February 6th-20th - Boaz Gelbord and Jeremiah Grossman to edit draft report (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
6. February 20th- Decision point whether to include late submissions (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
7. February 20th - Circulate draft report to partners with raw data, request to keep data confidential prior to publication. (DONE) &amp;lt;br/&amp;gt;&lt;br /&gt;
8. March 19th (was March 15th) - Publish report after integrating partner feedback. Generate community interest and discussion around results.(DONE)&amp;lt;br/&amp;gt;&lt;br /&gt;
9. After March 19th - Coordinate formal acceptance of deliverable by OWASP and plan further steps for the project.&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== News Coverage of OWASP SSB Project ==&lt;br /&gt;
&lt;br /&gt;
SC Magazine: [http://www.scmagazineus.com/OWASP-Security-Spending-Benchmarks-Report-published/article/129116/ OWASP Security Spending Benchmarks Report Published]&lt;br /&gt;
&lt;br /&gt;
Dark Reading: [http://www.darkreading.com/security/app-security/showArticle.jhtml?articleID=215901240 Web Application Security Spending Relatively Unscathed by Poor Economy]&lt;br /&gt;
&lt;br /&gt;
Search Security: [http://searchsecurity.techtarget.com/news/article/0,289142,sid14_gci1351731,00.html More companies seek third-party code review, survey finds]&lt;br /&gt;
&lt;br /&gt;
Search Security (Germany): [http://www.searchsecurity.de/themenbereiche/applikationssicherheit/sichere-software-entwicklung/articles/177103 Drittanbieter-Code-Review und geschulte Programmierer bevorzugt]&lt;br /&gt;
&lt;br /&gt;
PC World: [http://www.pcworld.com/businesscenter/article/162012/survey_gauges_web_application_security_spending.html Survey Guages Web Application Security Spending]&lt;br /&gt;
&lt;br /&gt;
Info World [http://www.infoworld.com/article/09/03/26/Survey_gauges_Web_application_security_spending_1.html Survey Gauges Web Application Security Spending]&lt;br /&gt;
&lt;br /&gt;
Network World [http://www.networkworld.com/news/2009/032609-survey-gauges-web-application-security.html Survey Gauges Web Application Security Spending]&lt;br /&gt;
&lt;br /&gt;
The IT Chronicle [http://www.theitchronicle.com/content/survey-gauges-web-application-security-spending Survey Gauges Web Application Security Spending]&lt;br /&gt;
&lt;br /&gt;
The Industry Standard [http://www.thestandard.com/news/2009/03/26/survey-gauges-web-application-security-spending Survey Gauges Web Application Security Spending]&lt;br /&gt;
&lt;br /&gt;
CIO.com [http://www.cio.com/article/486881/Survey_Gauges_Web_Application_Security_Spending Survey Gauges Web Application Security Spending]&lt;br /&gt;
&lt;br /&gt;
CIO Espana [http://www.idg.es/cio/Mas-de-un-25_por_ciento-de-las-empresas-elevara-su-gasto-en-seguridad-de-aplicaciones-Web/doc78597-seguridad.htm Más de un 25% de las empresas elevará su gasto en seguridad de aplicaciones Web]&lt;br /&gt;
&lt;br /&gt;
Information Week [http://www.informationweek.com/blog/main/archives/2009/03/firms_taking_we.html Firms Taking Web App Security (More) Seriously]&lt;br /&gt;
&lt;br /&gt;
Search Security [http://securitywireweekly.blogs.techtarget.com/2009/03/25/owasp-security-benchmark-study-mobile-threats-real/ Podcast]&lt;br /&gt;
&lt;br /&gt;
Search Security [http://searchsecurity.techtarget.com/video/0,297151,sid14_gci1352074,00.html Video Interview with Boaz Gelbord]&lt;br /&gt;
&lt;br /&gt;
CIO India [http://www.cio.in/news/viewArticle/ARTICLEID=5931602 Web Apps Security Spending Rising]&lt;br /&gt;
&lt;br /&gt;
Information Security Magazine [http://searchsecurity.techtarget.com/magazineFeature/0,296894,sid14_gci1352162,00.html Web browsers remain vulnerable to user mistakes]&lt;br /&gt;
&lt;br /&gt;
== Project Leadership ==&lt;br /&gt;
The Security Spending Benchmarks Project Leader is [http://www.boazgelbord.com/ Boaz Gelbord] (Executive Director of Information Security, Wireless Generation). Boaz can be reached directly at '''boaz.gelbord AT owasp.org''' with any questions or feedback. Jeremiah Grossman (Founder &amp;amp; CTO, WhiteHat Security) is also closely assisting in the effort.&lt;br /&gt;
&lt;br /&gt;
== Project Contributors  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:AppSecLogo.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Aspect_logo_resized.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Cenzic.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Cigital_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:CSI.jpg | 200px]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Denim_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:echelonone.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:eema.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Image:Fortify_logo.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:GDS_LOGO_SMALL.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Ifis_logo.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:MetroSITEGroup.jpg]] &amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:NCircle-logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Imperva_Logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:The-open-group.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Sectheory-logo-2.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Logo_securosis.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Tssci.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:TTT_logo_2008.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Whitehat_security_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;/div&gt;</summary>
		<author><name>Bgelbord</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Aspect_logo_resized.jpg&amp;diff=72591</id>
		<title>File:Aspect logo resized.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Aspect_logo_resized.jpg&amp;diff=72591"/>
				<updated>2009-11-02T19:13:58Z</updated>
		
		<summary type="html">&lt;p&gt;Bgelbord: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Bgelbord</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Podcast_News&amp;diff=69230</id>
		<title>Podcast News</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Podcast_News&amp;diff=69230"/>
				<updated>2009-09-17T19:08:51Z</updated>
		
		<summary type="html">&lt;p&gt;Bgelbord: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''[[Podcast_News|OWASP Podcast News]]'''&lt;br /&gt;
&lt;br /&gt;
OWASP NEWS April 2009&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==OWASP General News==&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Global Committees progress&lt;br /&gt;
https://www.owasp.org/index.php/Global_Committee_Pages&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
What should the next OWASP Top 10 contain? http://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Upcoming Conferences&lt;br /&gt;
http://www.owasp.org/index.php/Category:OWASP_AppSec_Conference&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Season of Code 2009&lt;br /&gt;
http://www.owasp.org/index.php/OWASP_Season_of_Code_2009&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Board Mins.&lt;br /&gt;
http://www.owasp.org/index.php/OWASP_Board_Meetings&lt;br /&gt;
&lt;br /&gt;
==OWASP AppSec News==&lt;br /&gt;
;6/1 The State of Web Application and Data Security http://securosis.com/blog/the-state-of-web-application-and-data-security-mid-2009/&lt;br /&gt;
;6/3 The Encryption Myth http://www.boazgelbord.com/2009/06/encryption-myth.html &lt;br /&gt;
;6/16 Opera Invites You To Join The Cloud http://www.boazgelbord.com/2009/06/opera-invites-you-to-join-cloud.html &lt;br /&gt;
;6/16 Google Cloud Told To Encrypt Itself http://www.theregister.co.uk/2009/06/16/google_and_https/ &lt;br /&gt;
;6/20 Nevada Mandates PCI http://www.boazgelbord.com/2009/06/nevada-mandates-pci-standard.html &lt;br /&gt;
;6/30 OWASP Security Spending Benchmarks Project for Q2 Published http://www.owasp.org/images/f/f0/OWASP_SSB_Q2_Project_Report.pdf&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''August-September 2009'''&lt;br /&gt;
&lt;br /&gt;
1. The Top Cyber Security Risks (SANS) http://www.sans.org/top-cyber-security-risks/ &lt;br /&gt;
&lt;br /&gt;
2. Google to deliver “Government Cloud” in 2010 http://www.computerworld.com/s/article/9138075/Google_to_deliver_government_cloud_to_feds_in_2010 &lt;br /&gt;
&lt;br /&gt;
3. Overcoming Objections to an Application Security Program&lt;br /&gt;
http://jeremiahgrossman.blogspot.com/2009/08/overcoming-objections-to-application.html &lt;br /&gt;
&lt;br /&gt;
4. Wordpress Bugs…A Disturbing Vulnerability http://preachsecurity.blogspot.com/2009/08/wordpress-bugs-disturbing-vulnerability.html &lt;br /&gt;
&lt;br /&gt;
5. SSL Threat Model http://blog.ivanristic.com/2009/09/ssl-threat-model.html&lt;br /&gt;
&lt;br /&gt;
6. Malware Lingers Months on Infected PCs http://www.theregister.co.uk/2009/09/15/malware_persistence/&lt;br /&gt;
&lt;br /&gt;
7. Are Web Application Security Testing Tools a Waste of  Money&lt;br /&gt;
http://blogs.gartner.com/neil_macdonald/2009/08/25/are-web-application-security-testing-tools-a-waste-of-time-and-money/ &lt;br /&gt;
&lt;br /&gt;
8. Application Vulnerability Scanners Should Communicate with Application Firewalls&lt;br /&gt;
http://blogs.gartner.com/neil_macdonald/2009/08/19/security-no-brainer-9-application-vulnerability-scanners-should-communicate-with-application-firewalls/ &lt;br /&gt;
&lt;br /&gt;
9. Flash Cookies and Privacy http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1446862&lt;/div&gt;</summary>
		<author><name>Bgelbord</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Podcast_News&amp;diff=69229</id>
		<title>Podcast News</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Podcast_News&amp;diff=69229"/>
				<updated>2009-09-17T19:08:14Z</updated>
		
		<summary type="html">&lt;p&gt;Bgelbord: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''[[Podcast_News|OWASP Podcast News]]'''&lt;br /&gt;
&lt;br /&gt;
OWASP NEWS April 2009&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==OWASP General News==&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Global Committees progress&lt;br /&gt;
https://www.owasp.org/index.php/Global_Committee_Pages&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
What should the next OWASP Top 10 contain? http://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Upcoming Conferences&lt;br /&gt;
http://www.owasp.org/index.php/Category:OWASP_AppSec_Conference&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Season of Code 2009&lt;br /&gt;
http://www.owasp.org/index.php/OWASP_Season_of_Code_2009&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Board Mins.&lt;br /&gt;
http://www.owasp.org/index.php/OWASP_Board_Meetings&lt;br /&gt;
&lt;br /&gt;
==OWASP AppSec News==&lt;br /&gt;
;6/1 The State of Web Application and Data Security http://securosis.com/blog/the-state-of-web-application-and-data-security-mid-2009/&lt;br /&gt;
;6/3 The Encryption Myth http://www.boazgelbord.com/2009/06/encryption-myth.html &lt;br /&gt;
;6/16 Opera Invites You To Join The Cloud http://www.boazgelbord.com/2009/06/opera-invites-you-to-join-cloud.html &lt;br /&gt;
;6/16 Google Cloud Told To Encrypt Itself http://www.theregister.co.uk/2009/06/16/google_and_https/ &lt;br /&gt;
;6/20 Nevada Mandates PCI http://www.boazgelbord.com/2009/06/nevada-mandates-pci-standard.html &lt;br /&gt;
;6/30 OWASP Security Spending Benchmarks Project for Q2 Published http://www.owasp.org/images/f/f0/OWASP_SSB_Q2_Project_Report.pdf&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''August-September 2009'''&lt;br /&gt;
&lt;br /&gt;
1. The Top Cyber Security Risks (SANS) http://www.sans.org/top-cyber-security-risks/ &lt;br /&gt;
&lt;br /&gt;
2. Google to deliver “Government Cloud” in 2010 http://www.computerworld.com/s/article/9138075/Google_to_deliver_government_cloud_to_feds_in_2010 &lt;br /&gt;
&lt;br /&gt;
3. Overcoming Objections to an Application Security Program&lt;br /&gt;
http://jeremiahgrossman.blogspot.com/2009/08/overcoming-objections-to-application.html &lt;br /&gt;
&lt;br /&gt;
4. Wordpress Bugs…A Disturbing Vulnerability http://preachsecurity.blogspot.com/2009/08/wordpress-bugs-disturbing-vulnerability.html &lt;br /&gt;
&lt;br /&gt;
5. SSL Threat Model http://blog.ivanristic.com/2009/09/ssl-threat-model.html&lt;br /&gt;
&lt;br /&gt;
6. Malware Lingers Months on Infected PCs http://www.theregister.co.uk/2009/09/15/malware_persistence/&lt;br /&gt;
&lt;br /&gt;
7. Are Web Application Security Testing Tools a Waste of  Money&lt;br /&gt;
http://blogs.gartner.com/neil_macdonald/2009/08/25/are-web-application-security-testing-tools-a-waste-of-time-and-money/ &lt;br /&gt;
&lt;br /&gt;
8. Application Vulnerability Scanners Should Communicate with Application Firewalls&lt;br /&gt;
http://blogs.gartner.com/neil_macdonald/2009/08/19/security-no-brainer-9-application-vulnerability-scanners-should-communicate-with-application-firewalls/ &lt;br /&gt;
&lt;br /&gt;
8. Flash Cookies and Privacy http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1446862&lt;/div&gt;</summary>
		<author><name>Bgelbord</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Podcast_News&amp;diff=66445</id>
		<title>Podcast News</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Podcast_News&amp;diff=66445"/>
				<updated>2009-07-23T19:25:04Z</updated>
		
		<summary type="html">&lt;p&gt;Bgelbord: added June articles&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''[[Podcast_News|OWASP Podcast News]]'''&lt;br /&gt;
&lt;br /&gt;
OWASP NEWS April 2009&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==OWASP General News==&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Global Committees progress&lt;br /&gt;
https://www.owasp.org/index.php/Global_Committee_Pages&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
What should the next OWASP Top 10 contain? http://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Upcoming Conferences&lt;br /&gt;
http://www.owasp.org/index.php/Category:OWASP_AppSec_Conference&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Season of Code 2009&lt;br /&gt;
http://www.owasp.org/index.php/OWASP_Season_of_Code_2009&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Board Mins.&lt;br /&gt;
http://www.owasp.org/index.php/OWASP_Board_Meetings&lt;br /&gt;
&lt;br /&gt;
==OWASP AppSec News==&lt;br /&gt;
;5/15 Does Tokenization Solve Anything? http://www.secureconsulting.net/2009/05/does_tokenization_solve_anythi.html&lt;br /&gt;
;5/16 Daily Dave and crew talk browser-based client side crypto http://seclists.org/dailydave/2009/q2/0093.html&lt;br /&gt;
;5/19 It’s No Secret. Measuring the Security and Reliability of Authentication via ‘Secret’ Questions http://newschoolsecurity.com/2009/05/179/&lt;br /&gt;
;5/19 Some Thoughts on the OWASP Top Ten http://blog.ncircle.com/blogs/vert/archives/2009/05/some_thoughts_on_the_owasp_top.html&lt;br /&gt;
;5/19 Making Secure Code Easier http://blogs.msdn.com/sdl/archive/2009/05/19/making-secure-code-easier.aspx&lt;br /&gt;
;5/19 Java deserialization issues http://blog.cr0.org/2009/05/write-once-own-everyone.html&lt;br /&gt;
;5/20 Parameter Pollution http://www.h-online.com/security/New-type-of-attack-on-web-applications-Parameter-Pollution--/news/113333/from/rss&lt;br /&gt;
;5/28 Don Ankney LayerOne XSS Presentation http://hackerco.de/2009/05/layerone-presentation-video.html&lt;br /&gt;
;5/28 Logging in the Age of Web Services http://1raindrop.typepad.com/1_raindrop/2009/05/logging-in-the-age-of-web-services.html&lt;br /&gt;
&lt;br /&gt;
;6/1 The State of Web Application and Data Security http://securosis.com/blog/the-state-of-web-application-and-data-security-mid-2009/&lt;br /&gt;
&lt;br /&gt;
;6/3 The Encryption Myth http://www.boazgelbord.com/2009/06/encryption-myth.html &lt;br /&gt;
&lt;br /&gt;
;6/16 Opera Invites You To Join The Cloud http://www.boazgelbord.com/2009/06/opera-invites-you-to-join-cloud.html &lt;br /&gt;
&lt;br /&gt;
;6/16 Google Cloud Told To Encrypt Itself http://www.theregister.co.uk/2009/06/16/google_and_https/ &lt;br /&gt;
&lt;br /&gt;
;6/20 Nevada Mandates PCI http://www.boazgelbord.com/2009/06/nevada-mandates-pci-standard.html &lt;br /&gt;
&lt;br /&gt;
;6/30 OWASP Security Spending Benchmarks Project for Q2 Published http://www.owasp.org/images/f/f0/OWASP_SSB_Q2_Project_Report.pdf&lt;/div&gt;</summary>
		<author><name>Bgelbord</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=66361</id>
		<title>Category:OWASP Security Spending Benchmarks</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=66361"/>
				<updated>2009-07-21T21:30:00Z</updated>
		
		<summary type="html">&lt;p&gt;Bgelbord: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[:Category:OWASP Project]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== NEXT REPORT TO BE PUBLISHED IN Q4 ==&lt;br /&gt;
&lt;br /&gt;
== Q2 Report Published - Focus on Cloud Computing ==&lt;br /&gt;
&lt;br /&gt;
The Q2 report of the OWASP Security Spending Benchmarks Project is now available. It can be found at the following link:&lt;br /&gt;
&lt;br /&gt;
[[http://www.owasp.org/images/f/f0/OWASP_SSB_Q2_Project_Report.pdf PDF Download]]&lt;br /&gt;
&lt;br /&gt;
There are a number of key findings in the Q2 09 study:&lt;br /&gt;
&lt;br /&gt;
* Software-as-a-Service is in much greater use than Infrastructure-as-a-Service or Platform-as-a-Service. Over half of respondents make moderate or significant use of SaaS. Less than a quarter of all respondents make any use of either IaaS or PaaS.&lt;br /&gt;
&lt;br /&gt;
* Security spending does not change significantly as a result of cloud computing. Respondents did not report significant spending changes in the areas of network security, third party security reviews, security personnel, or identity management.&lt;br /&gt;
&lt;br /&gt;
* Organizations are not doing their homework when it comes to cloud security. When engaging a cloud partner, only half of organizations inquire about common security-related issues, and only a third require documentation of security measures in place.&lt;br /&gt;
&lt;br /&gt;
* The risk of an undetected data breach is the greatest concern with using cloud computing, closely followed by the risk of a public data breach.&lt;br /&gt;
&lt;br /&gt;
* Compliance and standards requirements related to cloud computing are not well understood. Respondents report having the greatest understanding of PCI requirements relating to cloud computing and the least understanding of HIPAA cloud requirements.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Security Spending Benchmarks Project Report March 2009 ==&lt;br /&gt;
&lt;br /&gt;
The Q1 2009 report of the OWASP Security Spending Benchmarks Project is now available. It can be found at the following link:&lt;br /&gt;
&lt;br /&gt;
[[http://www.owasp.org/images/b/b2/OWASP_SSB_Project_Report_March_2009.pdf PDF Download]].&lt;br /&gt;
&lt;br /&gt;
There are a number of key findings in the Q1 09 study:&lt;br /&gt;
&lt;br /&gt;
* Organizations that have suffered a public data breach spend more on security in the development process than those that have not.&lt;br /&gt;
&lt;br /&gt;
* Web application security spending is expected to either stay flat or increase in nearly two thirds of companies.&lt;br /&gt;
&lt;br /&gt;
* Half of respondents consider security experience important when hiring developers,  and a majority provide their developers with security training. 38% have a third party firm conduct a security review of outsourced code.&lt;br /&gt;
       &lt;br /&gt;
* At least 61% of respondents perform an independent third party security review before deploying a Web application while 17% do not (the remainder do not know or do so when requested by customers).&lt;br /&gt;
&lt;br /&gt;
* Just under half of the surveyed organizations have Web application firewalls deployed for at least some of their Web applications.&lt;br /&gt;
&lt;br /&gt;
== Raw Data ==&lt;br /&gt;
&lt;br /&gt;
Transparency is a key principle of the OWASP SSB Project. For this reason all raw survey results are made available to the community. We welcome additional commentary and interpretations on the survey data. The raw survey data can be found [https://www.surveymonkey.com/sr_detail.aspx?sm=6RXm2J2aqar1MT7JlandR0MYzVFmx25FwQ9trvJH1JG4GcuRCMp3TAkaCJyNCQYrtI1Ny025AnORe0Y3lU%2bj7w%3d%3d here]. &lt;br /&gt;
&lt;br /&gt;
== Inquiries ==&lt;br /&gt;
&lt;br /&gt;
Please contact the project leader Boaz Gelbord (bgelbord at wgen dot net) if you have questions about the project or you would like to inquire about contributing to the project.&lt;br /&gt;
&lt;br /&gt;
== About the Security Spending Benchmarks Project ==&lt;br /&gt;
&lt;br /&gt;
The Security Spending Benchmarks Project seeks to produce guidance and an industry accepted benchmark for justifying overall Web application security spending. We want to quantify how many dollars and human resources should be allocated towards the software development life-cycle, security training, security software/tools, independent third-party reviews, Web application firewalls, etc. This project is motivated by the fact that:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;There are few, if any, industry standard benchmarks for executive management to consider when deciding what is a reasonable amount of resources to spend on Web application security in or out of the software development processes.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Spending on security helps mitigate risks whose potential costs are often difficult to quantify, thereby making justifying and obtaining security budgets difficult.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Many business initiatives require organizations to take “reasonable measures” and “adhere to best practices” for developing, delivering, and/or hosting secure Web application, but there is no industry consensus or data repositories on how this translates into monetary terms.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Smaller organizations outside of highly regulated industries purchase and deploy Web applications with no realistic ability to evaluate their security program.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Producing a less secure Web application may be less expensive than producing a more secure version of the same software. Organization that have invested development resources into software security may not be able to charge a premium for this investment because there is no reference point for the investment.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The survey was formulated with the help of our project partners to address the following questions and many others: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;What percentage of a Web application development groups headcount is dedicated towards security?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards Web application security as a percentage of software development and overall operational IT security costs?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Where do Web application security budget come from?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards security education?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Data Collection &amp;amp; Distribution ==&lt;br /&gt;
&lt;br /&gt;
We utilize the SurveyMonkey system to host surveys conducted for the OWASP SSB Project. We do not collect any publicly identifiable information including names, addresses, employer, email addresses, etc. from the respondents. While we expect a limited number of respondents trying to intentionally skew the results, we take precautions to limit the potential while not creating unnecessary overhead. We control survey access via username/password, as well as through a trusted network of contacts. All information collected is made available through Survey Monkey.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Status  == &lt;br /&gt;
&lt;br /&gt;
Q2 Timeline:&lt;br /&gt;
&lt;br /&gt;
1. April 1-15: Discuss thematic priorities with partners. Expand partner network.&amp;lt;br /&amp;gt;&lt;br /&gt;
2. April 15-30: Formulate survey questions based on identified thematic priorities &amp;lt;br /&amp;gt;&lt;br /&gt;
3. May 1st-June 10th (EXTENDED): Collect survey responses through partner network.&amp;lt;br /&amp;gt;&lt;br /&gt;
4. June 10th-June 20th: Analyze results and produce draft report.&amp;lt;br /&amp;gt;&lt;br /&gt;
5. June 20th - June 25th: Get partner feedback on draft and make edits.&amp;lt;br /&amp;gt;&lt;br /&gt;
6. June 30th: Final report published&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Q1 Timeline:&lt;br /&gt;
&lt;br /&gt;
1. Completing the project description text and finalizing the proposed survey questions. (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
2. January 12th - Open up survey to respondents (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
3. February 6 (extended from Jan 26) - Close survey (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
4. February 6th - Survey Analysis Begins (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
5. February 6th-20th - Boaz Gelbord and Jeremiah Grossman to edit draft report (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
6. February 20th- Decision point whether to include late submissions (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
7. February 20th - Circulate draft report to partners with raw data, request to keep data confidential prior to publication. (DONE) &amp;lt;br/&amp;gt;&lt;br /&gt;
8. March 19th (was March 15th) - Publish report after integrating partner feedback. Generate community interest and discussion around results.(DONE)&amp;lt;br/&amp;gt;&lt;br /&gt;
9. After March 19th - Coordinate formal acceptance of deliverable by OWASP and plan further steps for the project.&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== News Coverage of OWASP SSB Project ==&lt;br /&gt;
&lt;br /&gt;
SC Magazine: [http://www.scmagazineus.com/OWASP-Security-Spending-Benchmarks-Report-published/article/129116/ OWASP Security Spending Benchmarks Report Published]&lt;br /&gt;
&lt;br /&gt;
Dark Reading: [http://www.darkreading.com/security/app-security/showArticle.jhtml?articleID=215901240 Web Application Security Spending Relatively Unscathed by Poor Economy]&lt;br /&gt;
&lt;br /&gt;
Search Security: [http://searchsecurity.techtarget.com/news/article/0,289142,sid14_gci1351731,00.html More companies seek third-party code review, survey finds]&lt;br /&gt;
&lt;br /&gt;
Search Security (Germany): [http://www.searchsecurity.de/themenbereiche/applikationssicherheit/sichere-software-entwicklung/articles/177103 Drittanbieter-Code-Review und geschulte Programmierer bevorzugt]&lt;br /&gt;
&lt;br /&gt;
PC World: [http://www.pcworld.com/businesscenter/article/162012/survey_gauges_web_application_security_spending.html Survey Guages Web Application Security Spending]&lt;br /&gt;
&lt;br /&gt;
Info World [http://www.infoworld.com/article/09/03/26/Survey_gauges_Web_application_security_spending_1.html Survey Gauges Web Application Security Spending]&lt;br /&gt;
&lt;br /&gt;
Network World [http://www.networkworld.com/news/2009/032609-survey-gauges-web-application-security.html Survey Gauges Web Application Security Spending]&lt;br /&gt;
&lt;br /&gt;
The IT Chronicle [http://www.theitchronicle.com/content/survey-gauges-web-application-security-spending Survey Gauges Web Application Security Spending]&lt;br /&gt;
&lt;br /&gt;
The Industry Standard [http://www.thestandard.com/news/2009/03/26/survey-gauges-web-application-security-spending Survey Gauges Web Application Security Spending]&lt;br /&gt;
&lt;br /&gt;
CIO.com [http://www.cio.com/article/486881/Survey_Gauges_Web_Application_Security_Spending Survey Gauges Web Application Security Spending]&lt;br /&gt;
&lt;br /&gt;
CIO Espana [http://www.idg.es/cio/Mas-de-un-25_por_ciento-de-las-empresas-elevara-su-gasto-en-seguridad-de-aplicaciones-Web/doc78597-seguridad.htm Más de un 25% de las empresas elevará su gasto en seguridad de aplicaciones Web]&lt;br /&gt;
&lt;br /&gt;
Information Week [http://www.informationweek.com/blog/main/archives/2009/03/firms_taking_we.html Firms Taking Web App Security (More) Seriously]&lt;br /&gt;
&lt;br /&gt;
Search Security [http://securitywireweekly.blogs.techtarget.com/2009/03/25/owasp-security-benchmark-study-mobile-threats-real/ Podcast]&lt;br /&gt;
&lt;br /&gt;
Search Security [http://searchsecurity.techtarget.com/video/0,297151,sid14_gci1352074,00.html Video Interview with Boaz Gelbord]&lt;br /&gt;
&lt;br /&gt;
CIO India [http://www.cio.in/news/viewArticle/ARTICLEID=5931602 Web Apps Security Spending Rising]&lt;br /&gt;
&lt;br /&gt;
Information Security Magazine [http://searchsecurity.techtarget.com/magazineFeature/0,296894,sid14_gci1352162,00.html Web browsers remain vulnerable to user mistakes]&lt;br /&gt;
&lt;br /&gt;
== Project Leadership ==&lt;br /&gt;
The Security Spending Benchmarks Project Leader is [http://www.boazgelbord.com/ Boaz Gelbord] (Executive Director of Information Security, Wireless Generation). Boaz can be reached directly at '''boaz.gelbord AT owasp.org''' with any questions or feedback. Jeremiah Grossman (Founder &amp;amp; CTO, WhiteHat Security) is also closely assisting in the effort.&lt;br /&gt;
&lt;br /&gt;
== Project Contributors  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:AppSecLogo.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Cenzic.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Cigital_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:CSI.jpg | 200px]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Denim_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:echelonone.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:eema.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Image:Fortify_logo.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:GDS_LOGO_SMALL.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Ifis_logo.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:MetroSITEGroup.jpg]] &amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:NCircle-logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Imperva_Logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:The-open-group.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Sectheory-logo-2.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Logo_securosis.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Tssci.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:TTT_logo_2008.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Whitehat_security_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;/div&gt;</summary>
		<author><name>Bgelbord</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=65026</id>
		<title>Category:OWASP Security Spending Benchmarks</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=65026"/>
				<updated>2009-06-30T04:44:31Z</updated>
		
		<summary type="html">&lt;p&gt;Bgelbord: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[:Category:OWASP Project]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Q2 Report Published - Focus on Cloud Computing ==&lt;br /&gt;
&lt;br /&gt;
The Q2 report of the OWASP Security Spending Benchmarks Project is now available. It can be found at the following link:&lt;br /&gt;
&lt;br /&gt;
[[http://www.owasp.org/images/f/f0/OWASP_SSB_Q2_Project_Report.pdf PDF Download]]&lt;br /&gt;
&lt;br /&gt;
There are a number of key findings in the Q2 09 study:&lt;br /&gt;
&lt;br /&gt;
* Software-as-a-Service is in much greater use than Infrastructure-as-a-Service or Platform-as-a-Service. Over half of respondents make moderate or significant use of SaaS. Less than a quarter of all respondents make any use of either IaaS or PaaS.&lt;br /&gt;
&lt;br /&gt;
* Security spending does not change significantly as a result of cloud computing. Respondents did not report significant spending changes in the areas of network security, third party security reviews, security personnel, or identity management.&lt;br /&gt;
&lt;br /&gt;
* Organizations are not doing their homework when it comes to cloud security. When engaging a cloud partner, only half of organizations inquire about common security-related issues, and only a third require documentation of security measures in place.&lt;br /&gt;
&lt;br /&gt;
* The risk of an undetected data breach is the greatest concern with using cloud computing, closely followed by the risk of a public data breach.&lt;br /&gt;
&lt;br /&gt;
* Compliance and standards requirements related to cloud computing are not well understood. Respondents report having the greatest understanding of PCI requirements relating to cloud computing and the least understanding of HIPAA cloud requirements.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Security Spending Benchmarks Project Report March 2009 ==&lt;br /&gt;
&lt;br /&gt;
The Q1 2009 report of the OWASP Security Spending Benchmarks Project is now available. It can be found at the following link:&lt;br /&gt;
&lt;br /&gt;
[[http://www.owasp.org/images/b/b2/OWASP_SSB_Project_Report_March_2009.pdf PDF Download]].&lt;br /&gt;
&lt;br /&gt;
There are a number of key findings in the Q1 09 study:&lt;br /&gt;
&lt;br /&gt;
* Organizations that have suffered a public data breach spend more on security in the development process than those that have not.&lt;br /&gt;
&lt;br /&gt;
* Web application security spending is expected to either stay flat or increase in nearly two thirds of companies.&lt;br /&gt;
&lt;br /&gt;
* Half of respondents consider security experience important when hiring developers,  and a majority provide their developers with security training. 38% have a third party firm conduct a security review of outsourced code.&lt;br /&gt;
       &lt;br /&gt;
* At least 61% of respondents perform an independent third party security review before deploying a Web application while 17% do not (the remainder do not know or do so when requested by customers).&lt;br /&gt;
&lt;br /&gt;
* Just under half of the surveyed organizations have Web application firewalls deployed for at least some of their Web applications.&lt;br /&gt;
&lt;br /&gt;
== Raw Data ==&lt;br /&gt;
&lt;br /&gt;
Transparency is a key principle of the OWASP SSB Project. For this reason all raw survey results are made available to the community. We welcome additional commentary and interpretations on the survey data. The raw survey data can be found [https://www.surveymonkey.com/sr_detail.aspx?sm=6RXm2J2aqar1MT7JlandR0MYzVFmx25FwQ9trvJH1JG4GcuRCMp3TAkaCJyNCQYrtI1Ny025AnORe0Y3lU%2bj7w%3d%3d here]. &lt;br /&gt;
&lt;br /&gt;
== Inquiries ==&lt;br /&gt;
&lt;br /&gt;
Please contact the project leader Boaz Gelbord (bgelbord at wgen dot net) if you have questions about the project or you would like to inquire about contributing to the project.&lt;br /&gt;
&lt;br /&gt;
== About the Security Spending Benchmarks Project ==&lt;br /&gt;
&lt;br /&gt;
The Security Spending Benchmarks Project seeks to produce guidance and an industry accepted benchmark for justifying overall Web application security spending. We want to quantify how many dollars and human resources should be allocated towards the software development life-cycle, security training, security software/tools, independent third-party reviews, Web application firewalls, etc. This project is motivated by the fact that:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;There are few, if any, industry standard benchmarks for executive management to consider when deciding what is a reasonable amount of resources to spend on Web application security in or out of the software development processes.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Spending on security helps mitigate risks whose potential costs are often difficult to quantify, thereby making justifying and obtaining security budgets difficult.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Many business initiatives require organizations to take “reasonable measures” and “adhere to best practices” for developing, delivering, and/or hosting secure Web application, but there is no industry consensus or data repositories on how this translates into monetary terms.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Smaller organizations outside of highly regulated industries purchase and deploy Web applications with no realistic ability to evaluate their security program.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Producing a less secure Web application may be less expensive than producing a more secure version of the same software. Organization that have invested development resources into software security may not be able to charge a premium for this investment because there is no reference point for the investment.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The survey was formulated with the help of our project partners to address the following questions and many others: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;What percentage of a Web application development groups headcount is dedicated towards security?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards Web application security as a percentage of software development and overall operational IT security costs?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Where do Web application security budget come from?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards security education?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Data Collection &amp;amp; Distribution ==&lt;br /&gt;
&lt;br /&gt;
We utilize the SurveyMonkey system to host surveys conducted for the OWASP SSB Project. We do not collect any publicly identifiable information including names, addresses, employer, email addresses, etc. from the respondents. While we expect a limited number of respondents trying to intentionally skew the results, we take precautions to limit the potential while not creating unnecessary overhead. We control survey access via username/password, as well as through a trusted network of contacts. All information collected is made available through Survey Monkey.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Status  == &lt;br /&gt;
&lt;br /&gt;
Q2 Timeline:&lt;br /&gt;
&lt;br /&gt;
1. April 1-15: Discuss thematic priorities with partners. Expand partner network.&amp;lt;br /&amp;gt;&lt;br /&gt;
2. April 15-30: Formulate survey questions based on identified thematic priorities &amp;lt;br /&amp;gt;&lt;br /&gt;
3. May 1st-June 10th (EXTENDED): Collect survey responses through partner network.&amp;lt;br /&amp;gt;&lt;br /&gt;
4. June 10th-June 20th: Analyze results and produce draft report.&amp;lt;br /&amp;gt;&lt;br /&gt;
5. June 20th - June 25th: Get partner feedback on draft and make edits.&amp;lt;br /&amp;gt;&lt;br /&gt;
6. June 30th: Final report published&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Q1 Timeline:&lt;br /&gt;
&lt;br /&gt;
1. Completing the project description text and finalizing the proposed survey questions. (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
2. January 12th - Open up survey to respondents (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
3. February 6 (extended from Jan 26) - Close survey (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
4. February 6th - Survey Analysis Begins (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
5. February 6th-20th - Boaz Gelbord and Jeremiah Grossman to edit draft report (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
6. February 20th- Decision point whether to include late submissions (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
7. February 20th - Circulate draft report to partners with raw data, request to keep data confidential prior to publication. (DONE) &amp;lt;br/&amp;gt;&lt;br /&gt;
8. March 19th (was March 15th) - Publish report after integrating partner feedback. Generate community interest and discussion around results.(DONE)&amp;lt;br/&amp;gt;&lt;br /&gt;
9. After March 19th - Coordinate formal acceptance of deliverable by OWASP and plan further steps for the project.&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== News Coverage of OWASP SSB Project ==&lt;br /&gt;
&lt;br /&gt;
SC Magazine: [http://www.scmagazineus.com/OWASP-Security-Spending-Benchmarks-Report-published/article/129116/ OWASP Security Spending Benchmarks Report Published]&lt;br /&gt;
&lt;br /&gt;
Dark Reading: [http://www.darkreading.com/security/app-security/showArticle.jhtml?articleID=215901240 Web Application Security Spending Relatively Unscathed by Poor Economy]&lt;br /&gt;
&lt;br /&gt;
Search Security: [http://searchsecurity.techtarget.com/news/article/0,289142,sid14_gci1351731,00.html More companies seek third-party code review, survey finds]&lt;br /&gt;
&lt;br /&gt;
Search Security (Germany): [http://www.searchsecurity.de/themenbereiche/applikationssicherheit/sichere-software-entwicklung/articles/177103 Drittanbieter-Code-Review und geschulte Programmierer bevorzugt]&lt;br /&gt;
&lt;br /&gt;
PC World: [http://www.pcworld.com/businesscenter/article/162012/survey_gauges_web_application_security_spending.html Survey Guages Web Application Security Spending]&lt;br /&gt;
&lt;br /&gt;
Info World [http://www.infoworld.com/article/09/03/26/Survey_gauges_Web_application_security_spending_1.html Survey Gauges Web Application Security Spending]&lt;br /&gt;
&lt;br /&gt;
Network World [http://www.networkworld.com/news/2009/032609-survey-gauges-web-application-security.html Survey Gauges Web Application Security Spending]&lt;br /&gt;
&lt;br /&gt;
The IT Chronicle [http://www.theitchronicle.com/content/survey-gauges-web-application-security-spending Survey Gauges Web Application Security Spending]&lt;br /&gt;
&lt;br /&gt;
The Industry Standard [http://www.thestandard.com/news/2009/03/26/survey-gauges-web-application-security-spending Survey Gauges Web Application Security Spending]&lt;br /&gt;
&lt;br /&gt;
CIO.com [http://www.cio.com/article/486881/Survey_Gauges_Web_Application_Security_Spending Survey Gauges Web Application Security Spending]&lt;br /&gt;
&lt;br /&gt;
CIO Espana [http://www.idg.es/cio/Mas-de-un-25_por_ciento-de-las-empresas-elevara-su-gasto-en-seguridad-de-aplicaciones-Web/doc78597-seguridad.htm Más de un 25% de las empresas elevará su gasto en seguridad de aplicaciones Web]&lt;br /&gt;
&lt;br /&gt;
Information Week [http://www.informationweek.com/blog/main/archives/2009/03/firms_taking_we.html Firms Taking Web App Security (More) Seriously]&lt;br /&gt;
&lt;br /&gt;
Search Security [http://securitywireweekly.blogs.techtarget.com/2009/03/25/owasp-security-benchmark-study-mobile-threats-real/ Podcast]&lt;br /&gt;
&lt;br /&gt;
Search Security [http://searchsecurity.techtarget.com/video/0,297151,sid14_gci1352074,00.html Video Interview with Boaz Gelbord]&lt;br /&gt;
&lt;br /&gt;
CIO India [http://www.cio.in/news/viewArticle/ARTICLEID=5931602 Web Apps Security Spending Rising]&lt;br /&gt;
&lt;br /&gt;
Information Security Magazine [http://searchsecurity.techtarget.com/magazineFeature/0,296894,sid14_gci1352162,00.html Web browsers remain vulnerable to user mistakes]&lt;br /&gt;
&lt;br /&gt;
== Project Leadership ==&lt;br /&gt;
The Security Spending Benchmarks Project Leader is [http://www.boazgelbord.com/ Boaz Gelbord] (Executive Director of Information Security, Wireless Generation). Boaz can be reached directly at '''boaz.gelbord AT owasp.org''' with any questions or feedback. Jeremiah Grossman (Founder &amp;amp; CTO, WhiteHat Security) is also closely assisting in the effort.&lt;br /&gt;
&lt;br /&gt;
== Project Contributors  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:AppSecLogo.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Cenzic.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Cigital_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:CSI.jpg | 200px]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Denim_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:echelonone.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:eema.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Image:Fortify_logo.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:GDS_LOGO_SMALL.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Ifis_logo.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:MetroSITEGroup.jpg]] &amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:NCircle-logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Imperva_Logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:The-open-group.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Sectheory-logo-2.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Logo_securosis.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Tssci.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:TTT_logo_2008.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Whitehat_security_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;/div&gt;</summary>
		<author><name>Bgelbord</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:OWASP_SSB_Q2_Project_Report.pdf&amp;diff=65025</id>
		<title>File:OWASP SSB Q2 Project Report.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:OWASP_SSB_Q2_Project_Report.pdf&amp;diff=65025"/>
				<updated>2009-06-30T04:40:11Z</updated>
		
		<summary type="html">&lt;p&gt;Bgelbord: This is the Q2 report of the OWASP Security Spending Benchmarks Project with a focus on cloud computing.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This is the Q2 report of the OWASP Security Spending Benchmarks Project with a focus on cloud computing.&lt;/div&gt;</summary>
		<author><name>Bgelbord</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=65024</id>
		<title>Category:OWASP Security Spending Benchmarks</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=65024"/>
				<updated>2009-06-30T04:38:01Z</updated>
		
		<summary type="html">&lt;p&gt;Bgelbord: Added Q2 report&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[:Category:OWASP Project]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Q2 Report Published - Focus on Cloud Computing ==&lt;br /&gt;
&lt;br /&gt;
The Q2 report of the OWASP Security Spending Benchmarks Project is now available. It can be found at the following link:&lt;br /&gt;
&lt;br /&gt;
There are a number of key findings in the Q2 09 study:&lt;br /&gt;
&lt;br /&gt;
* Software-as-a-Service is in much greater use than Infrastructure-as-a-Service or Platform-as-a-Service. Over half of respondents make moderate or significant use of SaaS. Less than a quarter of all respondents make any use of either IaaS or PaaS.&lt;br /&gt;
&lt;br /&gt;
* Security spending does not change significantly as a result of cloud computing. Respondents did not report significant spending changes in the areas of network security, third party security reviews, security personnel, or identity management.&lt;br /&gt;
&lt;br /&gt;
* Organizations are not doing their homework when it comes to cloud security. When engaging a cloud partner, only half of organizations inquire about common security-related issues, and only a third require documentation of security measures in place.&lt;br /&gt;
&lt;br /&gt;
* The risk of an undetected data breach is the greatest concern with using cloud computing, closely followed by the risk of a public data breach.&lt;br /&gt;
&lt;br /&gt;
* Compliance and standards requirements related to cloud computing are not well understood. Respondents report having the greatest understanding of PCI requirements relating to cloud computing and the least understanding of HIPAA cloud requirements.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Security Spending Benchmarks Project Report March 2009 ==&lt;br /&gt;
&lt;br /&gt;
The Q1 2009 report of the OWASP Security Spending Benchmarks Project is now available. It can be found at the following link:&lt;br /&gt;
&lt;br /&gt;
[[http://www.owasp.org/images/b/b2/OWASP_SSB_Project_Report_March_2009.pdf PDF Download]].&lt;br /&gt;
&lt;br /&gt;
There are a number of key findings in the Q1 09 study:&lt;br /&gt;
&lt;br /&gt;
* Organizations that have suffered a public data breach spend more on security in the development process than those that have not.&lt;br /&gt;
&lt;br /&gt;
* Web application security spending is expected to either stay flat or increase in nearly two thirds of companies.&lt;br /&gt;
&lt;br /&gt;
* Half of respondents consider security experience important when hiring developers,  and a majority provide their developers with security training. 38% have a third party firm conduct a security review of outsourced code.&lt;br /&gt;
       &lt;br /&gt;
* At least 61% of respondents perform an independent third party security review before deploying a Web application while 17% do not (the remainder do not know or do so when requested by customers).&lt;br /&gt;
&lt;br /&gt;
* Just under half of the surveyed organizations have Web application firewalls deployed for at least some of their Web applications.&lt;br /&gt;
&lt;br /&gt;
== Raw Data ==&lt;br /&gt;
&lt;br /&gt;
Transparency is a key principle of the OWASP SSB Project. For this reason all raw survey results are made available to the community. We welcome additional commentary and interpretations on the survey data. The raw survey data can be found [https://www.surveymonkey.com/sr_detail.aspx?sm=6RXm2J2aqar1MT7JlandR0MYzVFmx25FwQ9trvJH1JG4GcuRCMp3TAkaCJyNCQYrtI1Ny025AnORe0Y3lU%2bj7w%3d%3d here]. &lt;br /&gt;
&lt;br /&gt;
== Inquiries ==&lt;br /&gt;
&lt;br /&gt;
Please contact the project leader Boaz Gelbord (bgelbord at wgen dot net) if you have questions about the project or you would like to inquire about contributing to the project.&lt;br /&gt;
&lt;br /&gt;
== About the Security Spending Benchmarks Project ==&lt;br /&gt;
&lt;br /&gt;
The Security Spending Benchmarks Project seeks to produce guidance and an industry accepted benchmark for justifying overall Web application security spending. We want to quantify how many dollars and human resources should be allocated towards the software development life-cycle, security training, security software/tools, independent third-party reviews, Web application firewalls, etc. This project is motivated by the fact that:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;There are few, if any, industry standard benchmarks for executive management to consider when deciding what is a reasonable amount of resources to spend on Web application security in or out of the software development processes.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Spending on security helps mitigate risks whose potential costs are often difficult to quantify, thereby making justifying and obtaining security budgets difficult.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Many business initiatives require organizations to take “reasonable measures” and “adhere to best practices” for developing, delivering, and/or hosting secure Web application, but there is no industry consensus or data repositories on how this translates into monetary terms.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Smaller organizations outside of highly regulated industries purchase and deploy Web applications with no realistic ability to evaluate their security program.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Producing a less secure Web application may be less expensive than producing a more secure version of the same software. Organization that have invested development resources into software security may not be able to charge a premium for this investment because there is no reference point for the investment.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The survey was formulated with the help of our project partners to address the following questions and many others: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;What percentage of a Web application development groups headcount is dedicated towards security?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards Web application security as a percentage of software development and overall operational IT security costs?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Where do Web application security budget come from?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards security education?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Data Collection &amp;amp; Distribution ==&lt;br /&gt;
&lt;br /&gt;
We utilize the SurveyMonkey system to host surveys conducted for the OWASP SSB Project. We do not collect any publicly identifiable information including names, addresses, employer, email addresses, etc. from the respondents. While we expect a limited number of respondents trying to intentionally skew the results, we take precautions to limit the potential while not creating unnecessary overhead. We control survey access via username/password, as well as through a trusted network of contacts. All information collected is made available through Survey Monkey.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Status  == &lt;br /&gt;
&lt;br /&gt;
Q2 Timeline:&lt;br /&gt;
&lt;br /&gt;
1. April 1-15: Discuss thematic priorities with partners. Expand partner network.&amp;lt;br /&amp;gt;&lt;br /&gt;
2. April 15-30: Formulate survey questions based on identified thematic priorities &amp;lt;br /&amp;gt;&lt;br /&gt;
3. May 1st-June 10th (EXTENDED): Collect survey responses through partner network.&amp;lt;br /&amp;gt;&lt;br /&gt;
4. June 10th-June 20th: Analyze results and produce draft report.&amp;lt;br /&amp;gt;&lt;br /&gt;
5. June 20th - June 25th: Get partner feedback on draft and make edits.&amp;lt;br /&amp;gt;&lt;br /&gt;
6. June 30th: Final report published&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Q1 Timeline:&lt;br /&gt;
&lt;br /&gt;
1. Completing the project description text and finalizing the proposed survey questions. (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
2. January 12th - Open up survey to respondents (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
3. February 6 (extended from Jan 26) - Close survey (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
4. February 6th - Survey Analysis Begins (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
5. February 6th-20th - Boaz Gelbord and Jeremiah Grossman to edit draft report (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
6. February 20th- Decision point whether to include late submissions (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
7. February 20th - Circulate draft report to partners with raw data, request to keep data confidential prior to publication. (DONE) &amp;lt;br/&amp;gt;&lt;br /&gt;
8. March 19th (was March 15th) - Publish report after integrating partner feedback. Generate community interest and discussion around results.(DONE)&amp;lt;br/&amp;gt;&lt;br /&gt;
9. After March 19th - Coordinate formal acceptance of deliverable by OWASP and plan further steps for the project.&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== News Coverage of OWASP SSB Project ==&lt;br /&gt;
&lt;br /&gt;
SC Magazine: [http://www.scmagazineus.com/OWASP-Security-Spending-Benchmarks-Report-published/article/129116/ OWASP Security Spending Benchmarks Report Published]&lt;br /&gt;
&lt;br /&gt;
Dark Reading: [http://www.darkreading.com/security/app-security/showArticle.jhtml?articleID=215901240 Web Application Security Spending Relatively Unscathed by Poor Economy]&lt;br /&gt;
&lt;br /&gt;
Search Security: [http://searchsecurity.techtarget.com/news/article/0,289142,sid14_gci1351731,00.html More companies seek third-party code review, survey finds]&lt;br /&gt;
&lt;br /&gt;
Search Security (Germany): [http://www.searchsecurity.de/themenbereiche/applikationssicherheit/sichere-software-entwicklung/articles/177103 Drittanbieter-Code-Review und geschulte Programmierer bevorzugt]&lt;br /&gt;
&lt;br /&gt;
PC World: [http://www.pcworld.com/businesscenter/article/162012/survey_gauges_web_application_security_spending.html Survey Guages Web Application Security Spending]&lt;br /&gt;
&lt;br /&gt;
Info World [http://www.infoworld.com/article/09/03/26/Survey_gauges_Web_application_security_spending_1.html Survey Gauges Web Application Security Spending]&lt;br /&gt;
&lt;br /&gt;
Network World [http://www.networkworld.com/news/2009/032609-survey-gauges-web-application-security.html Survey Gauges Web Application Security Spending]&lt;br /&gt;
&lt;br /&gt;
The IT Chronicle [http://www.theitchronicle.com/content/survey-gauges-web-application-security-spending Survey Gauges Web Application Security Spending]&lt;br /&gt;
&lt;br /&gt;
The Industry Standard [http://www.thestandard.com/news/2009/03/26/survey-gauges-web-application-security-spending Survey Gauges Web Application Security Spending]&lt;br /&gt;
&lt;br /&gt;
CIO.com [http://www.cio.com/article/486881/Survey_Gauges_Web_Application_Security_Spending Survey Gauges Web Application Security Spending]&lt;br /&gt;
&lt;br /&gt;
CIO Espana [http://www.idg.es/cio/Mas-de-un-25_por_ciento-de-las-empresas-elevara-su-gasto-en-seguridad-de-aplicaciones-Web/doc78597-seguridad.htm Más de un 25% de las empresas elevará su gasto en seguridad de aplicaciones Web]&lt;br /&gt;
&lt;br /&gt;
Information Week [http://www.informationweek.com/blog/main/archives/2009/03/firms_taking_we.html Firms Taking Web App Security (More) Seriously]&lt;br /&gt;
&lt;br /&gt;
Search Security [http://securitywireweekly.blogs.techtarget.com/2009/03/25/owasp-security-benchmark-study-mobile-threats-real/ Podcast]&lt;br /&gt;
&lt;br /&gt;
Search Security [http://searchsecurity.techtarget.com/video/0,297151,sid14_gci1352074,00.html Video Interview with Boaz Gelbord]&lt;br /&gt;
&lt;br /&gt;
CIO India [http://www.cio.in/news/viewArticle/ARTICLEID=5931602 Web Apps Security Spending Rising]&lt;br /&gt;
&lt;br /&gt;
Information Security Magazine [http://searchsecurity.techtarget.com/magazineFeature/0,296894,sid14_gci1352162,00.html Web browsers remain vulnerable to user mistakes]&lt;br /&gt;
&lt;br /&gt;
== Project Leadership ==&lt;br /&gt;
The Security Spending Benchmarks Project Leader is [http://www.boazgelbord.com/ Boaz Gelbord] (Executive Director of Information Security, Wireless Generation). Boaz can be reached directly at '''boaz.gelbord AT owasp.org''' with any questions or feedback. Jeremiah Grossman (Founder &amp;amp; CTO, WhiteHat Security) is also closely assisting in the effort.&lt;br /&gt;
&lt;br /&gt;
== Project Contributors  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:AppSecLogo.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Cenzic.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Cigital_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:CSI.jpg | 200px]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Denim_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:echelonone.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:eema.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Image:Fortify_logo.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:GDS_LOGO_SMALL.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Ifis_logo.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:MetroSITEGroup.jpg]] &amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:NCircle-logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Imperva_Logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:The-open-group.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Sectheory-logo-2.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Logo_securosis.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Tssci.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:TTT_logo_2008.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Whitehat_security_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;/div&gt;</summary>
		<author><name>Bgelbord</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Podcast_News&amp;diff=64092</id>
		<title>Podcast News</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Podcast_News&amp;diff=64092"/>
				<updated>2009-06-11T22:08:09Z</updated>
		
		<summary type="html">&lt;p&gt;Bgelbord: removal of duplicates&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''[[Podcast_News|OWASP Podcast News]]'''&lt;br /&gt;
&lt;br /&gt;
OWASP NEWS April 2009&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==OWASP General News==&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Global Committees progress&lt;br /&gt;
https://www.owasp.org/index.php/Global_Committee_Pages&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
What should the next OWASP Top 10 contain? http://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Upcoming Conferences&lt;br /&gt;
http://www.owasp.org/index.php/Category:OWASP_AppSec_Conference&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Season of Code 2009&lt;br /&gt;
http://www.owasp.org/index.php/OWASP_Season_of_Code_2009&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Board Mins.&lt;br /&gt;
http://www.owasp.org/index.php/OWASP_Board_Meetings&lt;br /&gt;
&lt;br /&gt;
==OWASP AppSec News==&lt;br /&gt;
;5/1 Mythbusting – Secure Code is Less Expensive to Develop http://jeremiahgrossman.blogspot.com/2009/05/mythbusting-secure-code-is-less.html&lt;br /&gt;
;5/1 Getting started with the PHPIS Intrusion Detection System http://www.h-online.com/security/Getting-started-with-the-PHPIDS-intrusion-detection-system--/features/113163&lt;br /&gt;
;5/4 http://feedproxy.google.com/~r/mcgovern/~3/k9BoNtavPxQ/conference-is-about-community.html&lt;br /&gt;
;5/5 http://nickcoblentz.blogspot.com/2009/05/light-weight-code-review-as-you-program.html&lt;br /&gt;
&lt;br /&gt;
;5/4 Using Denial of Service for Hacking http://ha.ckers.org/blog/20090504/using-denial-of-service-for-hacking/&lt;br /&gt;
;5/4 OWASP ISWG: Struts 2/WebWork Gap Analysis http://nickcoblentz.blogspot.com/2009/05/owasp-iswg-struts-2webwork-gap-analysis.html http://nickcoblentz.blogspot.com/2009/05/struts-2-security-addons-code.html&lt;br /&gt;
;5/4 Best Practice: Consider External Data Feeds Untrusted http://www.veracode.com/blog/2009/05/best-practice-consider-external-data-feeds-untrusted/&lt;br /&gt;
;5/4 Protection against Forceful Browsing http://coding-insecurity.blogspot.com/2009/05/protection-against-forceful-browsing.html&lt;br /&gt;
;5/5 Moth - A new release from the w3af project http://www.mail-archive.com/w3af-develop@lists.sourceforge.net/msg00369.html http://security-sh3ll.blogspot.com/2009/05/moth.html&lt;br /&gt;
;5/5 Botnets took control of 12 million new IPs this year http://www.wired.com/threatlevel/2009/05/botnets-took-control-of-12-million-new-ips-this-year/&lt;br /&gt;
;5/6 Enter Formjacking http://i8jesus.com/?p=48&lt;br /&gt;
;5/8 8 Reasons Why Website Vulnerabilities Are Not Fixed http://jeremiahgrossman.blogspot.com/2009/05/8-reasons-why-website-vulnerabilities.html&lt;br /&gt;
;5/8 SQL Injection Lessons from X-Force Emergency Response Service Investigations http://blogs.iss.net/archive/sql-injection-ers.html&lt;br /&gt;
;5/12 Delay of FTC Red Flag Rule http://www.bankinfosecurity.com/articles.php?art_id=1457&lt;br /&gt;
;5/13 Botnet is Captured and Studied http://gadgetwise.blogs.nytimes.com/2009/05/13/botnet-is-captured-and-studied-and-the-findings-arent-good/&lt;br /&gt;
;5/13 Effective Account Lockout http://coding-insecurity.blogspot.com/2009/05/effective-account-lockout.html&lt;br /&gt;
;5/13 Sincerest Form of Flattery http://securitylabs.websense.com/content/Blogs/3397.aspx&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
;5/15 Does Tokenization Solve Anything? http://www.secureconsulting.net/2009/05/does_tokenization_solve_anythi.html&lt;br /&gt;
;5/16 Daily Dave and crew talk browser-based client side crypto http://seclists.org/dailydave/2009/q2/0093.html&lt;br /&gt;
;5/19 It’s No Secret. Measuring the Security and Reliability of Authentication via ‘Secret’ Questions http://newschoolsecurity.com/2009/05/179/&lt;br /&gt;
;5/19 Some Thoughts on the OWASP Top Ten http://blog.ncircle.com/blogs/vert/archives/2009/05/some_thoughts_on_the_owasp_top.html&lt;br /&gt;
;5/19 Making Secure Code Easier http://blogs.msdn.com/sdl/archive/2009/05/19/making-secure-code-easier.aspx&lt;br /&gt;
;5/19 Java deserialization issues http://blog.cr0.org/2009/05/write-once-own-everyone.html&lt;br /&gt;
;5/20 Parameter Pollution http://www.h-online.com/security/New-type-of-attack-on-web-applications-Parameter-Pollution--/news/113333/from/rss&lt;br /&gt;
;5/28 Don Ankney LayerOne XSS Presentation http://hackerco.de/2009/05/layerone-presentation-video.html&lt;br /&gt;
;5/28 Logging in the Age of Web Services http://1raindrop.typepad.com/1_raindrop/2009/05/logging-in-the-age-of-web-services.html&lt;/div&gt;</summary>
		<author><name>Bgelbord</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=64048</id>
		<title>Category:OWASP Security Spending Benchmarks</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=64048"/>
				<updated>2009-06-10T20:17:56Z</updated>
		
		<summary type="html">&lt;p&gt;Bgelbord: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[:Category:OWASP Project]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Security Spending Benchmarks Project Report March 2009 ==&lt;br /&gt;
&lt;br /&gt;
The Q1 2009 report of the OWASP Security Spending Benchmarks Report is now available. It can be found at the following link:&lt;br /&gt;
&lt;br /&gt;
[[http://www.owasp.org/images/b/b2/OWASP_SSB_Project_Report_March_2009.pdf PDF Download]].&lt;br /&gt;
&lt;br /&gt;
There are a number of key findings in the Q1 09 study:&lt;br /&gt;
&lt;br /&gt;
* Organizations that have suffered a public data breach spend more on security in the development process than those that have not.&lt;br /&gt;
&lt;br /&gt;
* Web application security spending is expected to either stay flat or increase in nearly two thirds of companies.&lt;br /&gt;
&lt;br /&gt;
* Half of respondents consider security experience important when hiring developers,  and a majority provide their developers with security training. 38% have a third party firm conduct a security review of outsourced code.&lt;br /&gt;
       &lt;br /&gt;
* At least 61% of respondents perform an independent third party security review before deploying a Web application while 17% do not (the remainder do not know or do so when requested by customers).&lt;br /&gt;
&lt;br /&gt;
* Just under half of the surveyed organizations have Web application firewalls deployed for at least some of their Web applications.&lt;br /&gt;
&lt;br /&gt;
== Raw Data ==&lt;br /&gt;
&lt;br /&gt;
Transparency is a key principle of the OWASP SSB Project. For this reason all raw survey results are made available to the community. We welcome additional commentary and interpretations on the survey data. The raw survey data can be found [https://www.surveymonkey.com/sr_detail.aspx?sm=6RXm2J2aqar1MT7JlandR0MYzVFmx25FwQ9trvJH1JG4GcuRCMp3TAkaCJyNCQYrtI1Ny025AnORe0Y3lU%2bj7w%3d%3d here]. &lt;br /&gt;
&lt;br /&gt;
== Inquiries ==&lt;br /&gt;
&lt;br /&gt;
Please contact the project leader Boaz Gelbord (bgelbord at wgen dot net) if you have questions about the project or you would like to inquire about contributing to the project.&lt;br /&gt;
&lt;br /&gt;
== About the Security Spending Benchmarks Project ==&lt;br /&gt;
&lt;br /&gt;
The Security Spending Benchmarks Project seeks to produce guidance and an industry accepted benchmark for justifying overall Web application security spending. We want to quantify how many dollars and human resources should be allocated towards the software development life-cycle, security training, security software/tools, independent third-party reviews, Web application firewalls, etc. This project is motivated by the fact that:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;There are few, if any, industry standard benchmarks for executive management to consider when deciding what is a reasonable amount of resources to spend on Web application security in or out of the software development processes.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Spending on security helps mitigate risks whose potential costs are often difficult to quantify, thereby making justifying and obtaining security budgets difficult.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Many business initiatives require organizations to take “reasonable measures” and “adhere to best practices” for developing, delivering, and/or hosting secure Web application, but there is no industry consensus or data repositories on how this translates into monetary terms.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Smaller organizations outside of highly regulated industries purchase and deploy Web applications with no realistic ability to evaluate their security program.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Producing a less secure Web application may be less expensive than producing a more secure version of the same software. Organization that have invested development resources into software security may not be able to charge a premium for this investment because there is no reference point for the investment.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The survey was formulated with the help of our project partners to address the following questions and many others: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;What percentage of a Web application development groups headcount is dedicated towards security?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards Web application security as a percentage of software development and overall operational IT security costs?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Where do Web application security budget come from?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards security education?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Data Collection &amp;amp; Distribution ==&lt;br /&gt;
&lt;br /&gt;
We utilize the SurveyMonkey system to host surveys conducted for the OWASP SSB Project. We do not collect any publicly identifiable information including names, addresses, employer, email addresses, etc. from the respondents. While we expect a limited number of respondents trying to intentionally skew the results, we take precautions to limit the potential while not creating unnecessary overhead. We control survey access via username/password, as well as through a trusted network of contacts. All information collected is made available through Survey Monkey.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Status  == &lt;br /&gt;
&lt;br /&gt;
Planned Q2 Timeline:&lt;br /&gt;
&lt;br /&gt;
1. April 1-15: Discuss thematic priorities with partners. Expand partner network.&amp;lt;br /&amp;gt;&lt;br /&gt;
2. April 15-30: Formulate survey questions based on identified thematic priorities &amp;lt;br /&amp;gt;&lt;br /&gt;
3. May 1st-June 10th (EXTENDED): Collect survey responses through partner network.&amp;lt;br /&amp;gt;&lt;br /&gt;
4. June 10th-June 20th: Analyze results and produce draft report.&amp;lt;br /&amp;gt;&lt;br /&gt;
5. June 20th - June 25th: Get partner feedback on draft and make edits.&amp;lt;br /&amp;gt;&lt;br /&gt;
6. June 25th: Publish final report&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Q1 Timeline:&lt;br /&gt;
&lt;br /&gt;
1. Completing the project description text and finalizing the proposed survey questions. (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
2. January 12th - Open up survey to respondents (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
3. February 6 (extended from Jan 26) - Close survey (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
4. February 6th - Survey Analysis Begins (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
5. February 6th-20th - Boaz Gelbord and Jeremiah Grossman to edit draft report (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
6. February 20th- Decision point whether to include late submissions (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
7. February 20th - Circulate draft report to partners with raw data, request to keep data confidential prior to publication. (DONE) &amp;lt;br/&amp;gt;&lt;br /&gt;
8. March 19th (was March 15th) - Publish report after integrating partner feedback. Generate community interest and discussion around results.(DONE)&amp;lt;br/&amp;gt;&lt;br /&gt;
9. After March 19th - Coordinate formal acceptance of deliverable by OWASP and plan further steps for the project.&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== News Coverage of OWASP SSB Project ==&lt;br /&gt;
&lt;br /&gt;
SC Magazine: [http://www.scmagazineus.com/OWASP-Security-Spending-Benchmarks-Report-published/article/129116/ OWASP Security Spending Benchmarks Report Published]&lt;br /&gt;
&lt;br /&gt;
Dark Reading: [http://www.darkreading.com/security/app-security/showArticle.jhtml?articleID=215901240 Web Application Security Spending Relatively Unscathed by Poor Economy]&lt;br /&gt;
&lt;br /&gt;
Search Security: [http://searchsecurity.techtarget.com/news/article/0,289142,sid14_gci1351731,00.html More companies seek third-party code review, survey finds]&lt;br /&gt;
&lt;br /&gt;
Search Security (Germany): [http://www.searchsecurity.de/themenbereiche/applikationssicherheit/sichere-software-entwicklung/articles/177103 Drittanbieter-Code-Review und geschulte Programmierer bevorzugt]&lt;br /&gt;
&lt;br /&gt;
PC World: [http://www.pcworld.com/businesscenter/article/162012/survey_gauges_web_application_security_spending.html Survey Guages Web Application Security Spending]&lt;br /&gt;
&lt;br /&gt;
Info World [http://www.infoworld.com/article/09/03/26/Survey_gauges_Web_application_security_spending_1.html Survey Gauges Web Application Security Spending]&lt;br /&gt;
&lt;br /&gt;
Network World [http://www.networkworld.com/news/2009/032609-survey-gauges-web-application-security.html Survey Gauges Web Application Security Spending]&lt;br /&gt;
&lt;br /&gt;
The IT Chronicle [http://www.theitchronicle.com/content/survey-gauges-web-application-security-spending Survey Gauges Web Application Security Spending]&lt;br /&gt;
&lt;br /&gt;
The Industry Standard [http://www.thestandard.com/news/2009/03/26/survey-gauges-web-application-security-spending Survey Gauges Web Application Security Spending]&lt;br /&gt;
&lt;br /&gt;
CIO.com [http://www.cio.com/article/486881/Survey_Gauges_Web_Application_Security_Spending Survey Gauges Web Application Security Spending]&lt;br /&gt;
&lt;br /&gt;
CIO Espana [http://www.idg.es/cio/Mas-de-un-25_por_ciento-de-las-empresas-elevara-su-gasto-en-seguridad-de-aplicaciones-Web/doc78597-seguridad.htm Más de un 25% de las empresas elevará su gasto en seguridad de aplicaciones Web]&lt;br /&gt;
&lt;br /&gt;
Information Week [http://www.informationweek.com/blog/main/archives/2009/03/firms_taking_we.html Firms Taking Web App Security (More) Seriously]&lt;br /&gt;
&lt;br /&gt;
Search Security [http://securitywireweekly.blogs.techtarget.com/2009/03/25/owasp-security-benchmark-study-mobile-threats-real/ Podcast]&lt;br /&gt;
&lt;br /&gt;
Search Security [http://searchsecurity.techtarget.com/video/0,297151,sid14_gci1352074,00.html Video Interview with Boaz Gelbord]&lt;br /&gt;
&lt;br /&gt;
CIO India [http://www.cio.in/news/viewArticle/ARTICLEID=5931602 Web Apps Security Spending Rising]&lt;br /&gt;
&lt;br /&gt;
Information Security Magazine [http://searchsecurity.techtarget.com/magazineFeature/0,296894,sid14_gci1352162,00.html Web browsers remain vulnerable to user mistakes]&lt;br /&gt;
&lt;br /&gt;
== Project Leadership ==&lt;br /&gt;
The Security Spending Benchmarks Project Leader is [http://www.boazgelbord.com/ Boaz Gelbord] (Executive Director of Information Security, Wireless Generation). Boaz can be reached directly at '''boaz.gelbord AT owasp.org''' with any questions or feedback. Jeremiah Grossman (Founder &amp;amp; CTO, WhiteHat Security) is also closely assisting in the effort.&lt;br /&gt;
&lt;br /&gt;
== Project Contributors  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:AppSecLogo.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Cenzic.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Cigital_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:CSI.jpg | 200px]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Denim_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:echelonone.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:eema.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Image:Fortify_logo.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:GDS_LOGO_SMALL.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Ifis_logo.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:MetroSITEGroup.jpg]] &amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:NCircle-logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Imperva_Logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:The-open-group.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Sectheory-logo-2.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Logo_securosis.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Tssci.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:TTT_logo_2008.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Whitehat_security_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;/div&gt;</summary>
		<author><name>Bgelbord</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=64047</id>
		<title>Category:OWASP Security Spending Benchmarks</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=64047"/>
				<updated>2009-06-10T20:10:32Z</updated>
		
		<summary type="html">&lt;p&gt;Bgelbord: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[:Category:OWASP Project]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Security Spending Benchmarks Project Report March 2009 ==&lt;br /&gt;
&lt;br /&gt;
The Q1 2009 report of the OWASP Security Spending Benchmarks Report is now available. It can be found at the following link:&lt;br /&gt;
&lt;br /&gt;
[[http://www.owasp.org/images/b/b2/OWASP_SSB_Project_Report_March_2009.pdf PDF Download]].&lt;br /&gt;
&lt;br /&gt;
There are a number of key findings in the Q1 09 study:&lt;br /&gt;
&lt;br /&gt;
* Organizations that have suffered a public data breach spend more on security in the development process than those that have not.&lt;br /&gt;
&lt;br /&gt;
* Web application security spending is expected to either stay flat or increase in nearly two thirds of companies.&lt;br /&gt;
&lt;br /&gt;
* Half of respondents consider security experience important when hiring developers,  and a majority provide their developers with security training. 38% have a third party firm conduct a security review of outsourced code.&lt;br /&gt;
       &lt;br /&gt;
* At least 61% of respondents perform an independent third party security review before deploying a Web application while 17% do not (the remainder do not know or do so when requested by customers).&lt;br /&gt;
&lt;br /&gt;
* Just under half of the surveyed organizations have Web application firewalls deployed for at least some of their Web applications.&lt;br /&gt;
&lt;br /&gt;
== Raw Data ==&lt;br /&gt;
&lt;br /&gt;
Transparency is a key principle of the OWASP SSB Project. For this reason all raw survey results are made available to the community. We welcome additional commentary and interpretations on the survey data. The raw survey data can be found [https://www.surveymonkey.com/sr_detail.aspx?sm=6RXm2J2aqar1MT7JlandR0MYzVFmx25FwQ9trvJH1JG4GcuRCMp3TAkaCJyNCQYrtI1Ny025AnORe0Y3lU%2bj7w%3d%3d here]. &lt;br /&gt;
&lt;br /&gt;
== Inquiries ==&lt;br /&gt;
&lt;br /&gt;
Please contact the project leader Boaz Gelbord (bgelbord at wgen dot net) if you have questions about the project or you would like to inquire about contributing to the project.&lt;br /&gt;
&lt;br /&gt;
== About the Security Spending Benchmarks Project ==&lt;br /&gt;
&lt;br /&gt;
The Security Spending Benchmarks Project seeks to produce guidance and an industry accepted benchmark for justifying overall Web application security spending. We want to quantify how many dollars and human resources should be allocated towards the software development life-cycle, security training, security software/tools, independent third-party reviews, Web application firewalls, etc. This project is motivated by the fact that:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;There are few, if any, industry standard benchmarks for executive management to consider when deciding what is a reasonable amount of resources to spend on Web application security in or out of the software development processes.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Spending on security helps mitigate risks whose potential costs are often difficult to quantify, thereby making justifying and obtaining security budgets difficult.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Many business initiatives require organizations to take “reasonable measures” and “adhere to best practices” for developing, delivering, and/or hosting secure Web application, but there is no industry consensus or data repositories on how this translates into monetary terms.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Smaller organizations outside of highly regulated industries purchase and deploy Web applications with no realistic ability to evaluate their security program.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Producing a less secure Web application may be less expensive than producing a more secure version of the same software. Organization that have invested development resources into software security may not be able to charge a premium for this investment because there is no reference point for the investment.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The survey was formulated with the help of our project partners to address the following questions and many others: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;What percentage of a Web application development groups headcount is dedicated towards security?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards Web application security as a percentage of software development and overall operational IT security costs?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Where do Web application security budget come from?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards security education?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Data Collection &amp;amp; Distribution ==&lt;br /&gt;
&lt;br /&gt;
We utilize the SurveyMonkey system to host surveys conducted for the OWASP SSB Project. We do not collect any publicly identifiable information including names, addresses, employer, email addresses, etc. from the respondents. While we expect a limited number of respondents trying to intentionally skew the results, we take precautions to limit the potential while not creating unnecessary overhead. We control survey access via username/password, as well as through a trusted network of contacts. All information collected is made available through Survey Monkey.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Status  == &lt;br /&gt;
&lt;br /&gt;
Planned Q2 Timeline:&lt;br /&gt;
&lt;br /&gt;
1. April 1-15: Discuss thematic priorities with partners. Expand partner network.&amp;lt;br /&amp;gt;&lt;br /&gt;
2. April 15-30: Formulate survey questions based on identified thematic priorities &amp;lt;br /&amp;gt;&lt;br /&gt;
3. May 1st-June 10th (EXTENDED): Collect survey responses through partner network.&amp;lt;br /&amp;gt;&lt;br /&gt;
4. June 10th-June 20th: Analyze results and produce draft report.&amp;lt;br /&amp;gt;&lt;br /&gt;
5. June 20th - June 25th: Get partner feedback on draft and make edits.&amp;lt;br /&amp;gt;&lt;br /&gt;
6. June 25th: Publish final report&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Q1 Timeline:&lt;br /&gt;
&lt;br /&gt;
1. Completing the project description text and finalizing the proposed survey questions. (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
2. January 12th - Open up survey to respondents (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
3. February 6 (extended from Jan 26) - Close survey (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
4. February 6th - Survey Analysis Begins (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
5. February 6th-20th - Boaz Gelbord and Jeremiah Grossman to edit draft report (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
6. February 20th- Decision point whether to include late submissions (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
7. February 20th - Circulate draft report to partners with raw data, request to keep data confidential prior to publication. (DONE) &amp;lt;br/&amp;gt;&lt;br /&gt;
8. March 19th (was March 15th) - Publish report after integrating partner feedback. Generate community interest and discussion around results.(DONE)&amp;lt;br/&amp;gt;&lt;br /&gt;
9. After March 19th - Coordinate formal acceptance of deliverable by OWASP and plan further steps for the project.&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== News Coverage of OWASP SSB Project ==&lt;br /&gt;
&lt;br /&gt;
SC Magazine: [http://www.scmagazineus.com/OWASP-Security-Spending-Benchmarks-Report-published/article/129116/ OWASP Security Spending Benchmarks Report Published]&lt;br /&gt;
&lt;br /&gt;
Dark Reading: [http://www.darkreading.com/security/app-security/showArticle.jhtml?articleID=215901240 Web Application Security Spending Relatively Unscathed by Poor Economy]&lt;br /&gt;
&lt;br /&gt;
Search Security: [http://searchsecurity.techtarget.com/news/article/0,289142,sid14_gci1351731,00.html More companies seek third-party code review, survey finds]&lt;br /&gt;
&lt;br /&gt;
Search Security (Germany): [http://www.searchsecurity.de/themenbereiche/applikationssicherheit/sichere-software-entwicklung/articles/177103 Drittanbieter-Code-Review und geschulte Programmierer bevorzugt]&lt;br /&gt;
&lt;br /&gt;
PC World: [http://www.pcworld.com/businesscenter/article/162012/survey_gauges_web_application_security_spending.html Survey Guages Web Application Security Spending]&lt;br /&gt;
&lt;br /&gt;
Info World [http://www.infoworld.com/article/09/03/26/Survey_gauges_Web_application_security_spending_1.html Survey Gauges Web Application Security Spending]&lt;br /&gt;
&lt;br /&gt;
Network World [http://www.networkworld.com/news/2009/032609-survey-gauges-web-application-security.html Survey Gauges Web Application Security Spending]&lt;br /&gt;
&lt;br /&gt;
The IT Chronicle [http://www.theitchronicle.com/content/survey-gauges-web-application-security-spending Survey Gauges Web Application Security Spending]&lt;br /&gt;
&lt;br /&gt;
The Industry Standard [http://www.thestandard.com/news/2009/03/26/survey-gauges-web-application-security-spending Survey Gauges Web Application Security Spending]&lt;br /&gt;
&lt;br /&gt;
CIO.com [http://www.cio.com/article/486881/Survey_Gauges_Web_Application_Security_Spending Survey Gauges Web Application Security Spending]&lt;br /&gt;
&lt;br /&gt;
CIO Espana [http://www.idg.es/cio/Mas-de-un-25_por_ciento-de-las-empresas-elevara-su-gasto-en-seguridad-de-aplicaciones-Web/doc78597-seguridad.htm Más de un 25% de las empresas elevará su gasto en seguridad de aplicaciones Web]&lt;br /&gt;
&lt;br /&gt;
Information Week [http://www.informationweek.com/blog/main/archives/2009/03/firms_taking_we.html Firms Taking Web App Security (More) Seriously]&lt;br /&gt;
&lt;br /&gt;
Search Security [http://securitywireweekly.blogs.techtarget.com/2009/03/25/owasp-security-benchmark-study-mobile-threats-real/ Podcast]&lt;br /&gt;
&lt;br /&gt;
Search Security [http://searchsecurity.techtarget.com/video/0,297151,sid14_gci1352074,00.html Video Interview with Boaz Gelbord]&lt;br /&gt;
&lt;br /&gt;
CIO India [http://www.cio.in/news/viewArticle/ARTICLEID=5931602 Web Apps Security Spending Rising]&lt;br /&gt;
&lt;br /&gt;
Information Security Magazine [http://searchsecurity.techtarget.com/magazineFeature/0,296894,sid14_gci1352162,00.html Web browsers remain vulnerable to user mistakes]&lt;br /&gt;
&lt;br /&gt;
== Project Leadership ==&lt;br /&gt;
The Security Spending Benchmarks Project Leader is [http://www.boazgelbord.com/ Boaz Gelbord] (Executive Director of Information Security, Wireless Generation). Boaz can be reached directly at '''boaz.gelbord AT owasp.org''' with any questions or feedback. Jeremiah Grossman (Founder &amp;amp; CTO, WhiteHat Security) is also closely assisting in the effort.&lt;br /&gt;
&lt;br /&gt;
== Project Contributors  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:AppSecLogo.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Cenzic.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Cigital_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:CSI.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Denim_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:echelonone.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:eema.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Image:Fortify_logo.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:GDS_LOGO_SMALL.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Ifis_logo.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:MetroSITEGroup.jpg]] &amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:NCircle-logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Imperva_Logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:The-open-group.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Sectheory-logo-2.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Logo_securosis.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Tssci.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:TTT_logo_2008.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Whitehat_security_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;/div&gt;</summary>
		<author><name>Bgelbord</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:CSI.jpg&amp;diff=64044</id>
		<title>File:CSI.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:CSI.jpg&amp;diff=64044"/>
				<updated>2009-06-10T20:08:58Z</updated>
		
		<summary type="html">&lt;p&gt;Bgelbord: CSI logo&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;CSI logo&lt;/div&gt;</summary>
		<author><name>Bgelbord</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Podcast_News&amp;diff=63704</id>
		<title>Podcast News</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Podcast_News&amp;diff=63704"/>
				<updated>2009-06-07T00:04:02Z</updated>
		
		<summary type="html">&lt;p&gt;Bgelbord: added some more news stories&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''[[Podcast_News|OWASP Podcast News]]'''&lt;br /&gt;
&lt;br /&gt;
OWASP NEWS April 2009&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==OWASP General News==&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Global Committees progress&lt;br /&gt;
https://www.owasp.org/index.php/Global_Committee_Pages&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
What should the next OWASP Top 10 contain? http://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Upcoming Conferences&lt;br /&gt;
http://www.owasp.org/index.php/Category:OWASP_AppSec_Conference&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Season of Code 2009&lt;br /&gt;
http://www.owasp.org/index.php/OWASP_Season_of_Code_2009&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Board Mins.&lt;br /&gt;
http://www.owasp.org/index.php/OWASP_Board_Meetings&lt;br /&gt;
&lt;br /&gt;
==OWASP AppSec News==&lt;br /&gt;
;5/4 http://nickcoblentz.blogspot.com/2009/05/owasp-iswg-struts-2webwork-gap-analysis.html&lt;br /&gt;
;5/4 http://feedproxy.google.com/~r/mcgovern/~3/k9BoNtavPxQ/conference-is-about-community.html&lt;br /&gt;
;5/5 http://coding-insecurity.blogspot.com/2009/05/protection-against-forceful-browsing.html&lt;br /&gt;
;5/5 http://nickcoblentz.blogspot.com/2009/05/light-weight-code-review-as-you-program.html&lt;br /&gt;
;5/16 Daily Dave and crew talk browser-based client side crypto http://seclists.org/dailydave/2009/q2/0093.html&lt;br /&gt;
&lt;br /&gt;
;5/1 Mythbusting – Secure Code is Less Expensive to Develop http://jeremiahgrossman.blogspot.com/2009/05/mythbusting-secure-code-is-less.html&lt;br /&gt;
;5/5 Botnets took control of 12 million new IPs this year http://www.wired.com/threatlevel/2009/05/botnets-took-control-of-12-million-new-ips-this-year/&lt;br /&gt;
;5/13 Botnet is Captured and Studied http://gadgetwise.blogs.nytimes.com/2009/05/13/botnet-is-captured-and-studied-and-the-findings-arent-good/&lt;br /&gt;
;5/12 Delay of FTC Red Flag Rule http://www.bankinfosecurity.com/articles.php?art_id=1457&lt;br /&gt;
;5/8 8 Reasons Why Website Vulnerabilities Are Not Fixed http://jeremiahgrossman.blogspot.com/2009/05/8-reasons-why-website-vulnerabilities.html&lt;/div&gt;</summary>
		<author><name>Bgelbord</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=63592</id>
		<title>Category:OWASP Security Spending Benchmarks</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=63592"/>
				<updated>2009-06-04T15:14:13Z</updated>
		
		<summary type="html">&lt;p&gt;Bgelbord: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[:Category:OWASP Project]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Security Spending Benchmarks Project Report March 2009 ==&lt;br /&gt;
&lt;br /&gt;
The Q1 2009 report of the OWASP Security Spending Benchmarks Report is now available. It can be found at the following link:&lt;br /&gt;
&lt;br /&gt;
[[http://www.owasp.org/images/b/b2/OWASP_SSB_Project_Report_March_2009.pdf PDF Download]].&lt;br /&gt;
&lt;br /&gt;
There are a number of key findings in the Q1 09 study:&lt;br /&gt;
&lt;br /&gt;
* Organizations that have suffered a public data breach spend more on security in the development process than those that have not.&lt;br /&gt;
&lt;br /&gt;
* Web application security spending is expected to either stay flat or increase in nearly two thirds of companies.&lt;br /&gt;
&lt;br /&gt;
* Half of respondents consider security experience important when hiring developers,  and a majority provide their developers with security training. 38% have a third party firm conduct a security review of outsourced code.&lt;br /&gt;
       &lt;br /&gt;
* At least 61% of respondents perform an independent third party security review before deploying a Web application while 17% do not (the remainder do not know or do so when requested by customers).&lt;br /&gt;
&lt;br /&gt;
* Just under half of the surveyed organizations have Web application firewalls deployed for at least some of their Web applications.&lt;br /&gt;
&lt;br /&gt;
== Raw Data ==&lt;br /&gt;
&lt;br /&gt;
Transparency is a key principle of the OWASP SSB Project. For this reason all raw survey results are made available to the community. We welcome additional commentary and interpretations on the survey data. The raw survey data can be found [https://www.surveymonkey.com/sr_detail.aspx?sm=6RXm2J2aqar1MT7JlandR0MYzVFmx25FwQ9trvJH1JG4GcuRCMp3TAkaCJyNCQYrtI1Ny025AnORe0Y3lU%2bj7w%3d%3d here]. &lt;br /&gt;
&lt;br /&gt;
== Inquiries ==&lt;br /&gt;
&lt;br /&gt;
Please contact the project leader Boaz Gelbord (bgelbord at wgen dot net) if you have questions about the project or you would like to inquire about contributing to the project.&lt;br /&gt;
&lt;br /&gt;
== About the Security Spending Benchmarks Project ==&lt;br /&gt;
&lt;br /&gt;
The Security Spending Benchmarks Project seeks to produce guidance and an industry accepted benchmark for justifying overall Web application security spending. We want to quantify how many dollars and human resources should be allocated towards the software development life-cycle, security training, security software/tools, independent third-party reviews, Web application firewalls, etc. This project is motivated by the fact that:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;There are few, if any, industry standard benchmarks for executive management to consider when deciding what is a reasonable amount of resources to spend on Web application security in or out of the software development processes.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Spending on security helps mitigate risks whose potential costs are often difficult to quantify, thereby making justifying and obtaining security budgets difficult.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Many business initiatives require organizations to take “reasonable measures” and “adhere to best practices” for developing, delivering, and/or hosting secure Web application, but there is no industry consensus or data repositories on how this translates into monetary terms.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Smaller organizations outside of highly regulated industries purchase and deploy Web applications with no realistic ability to evaluate their security program.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Producing a less secure Web application may be less expensive than producing a more secure version of the same software. Organization that have invested development resources into software security may not be able to charge a premium for this investment because there is no reference point for the investment.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The survey was formulated with the help of our project partners to address the following questions and many others: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;What percentage of a Web application development groups headcount is dedicated towards security?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards Web application security as a percentage of software development and overall operational IT security costs?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Where do Web application security budget come from?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards security education?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Data Collection &amp;amp; Distribution ==&lt;br /&gt;
&lt;br /&gt;
We utilize the SurveyMonkey system to host surveys conducted for the OWASP SSB Project. We do not collect any publicly identifiable information including names, addresses, employer, email addresses, etc. from the respondents. While we expect a limited number of respondents trying to intentionally skew the results, we take precautions to limit the potential while not creating unnecessary overhead. We control survey access via username/password, as well as through a trusted network of contacts. All information collected is made available through Survey Monkey.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Status  == &lt;br /&gt;
&lt;br /&gt;
Planned Q2 Timeline:&lt;br /&gt;
&lt;br /&gt;
1. April 1-15: Discuss thematic priorities with partners. Expand partner network.&amp;lt;br /&amp;gt;&lt;br /&gt;
2. April 15-30: Formulate survey questions based on identified thematic priorities &amp;lt;br /&amp;gt;&lt;br /&gt;
3. May 1st-June 10th (EXTENDED): Collect survey responses through partner network.&amp;lt;br /&amp;gt;&lt;br /&gt;
4. June 10th-June 20th: Analyze results and produce draft report.&amp;lt;br /&amp;gt;&lt;br /&gt;
5. June 20th - June 25th: Get partner feedback on draft and make edits.&amp;lt;br /&amp;gt;&lt;br /&gt;
6. June 25th: Publish final report&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Q1 Timeline:&lt;br /&gt;
&lt;br /&gt;
1. Completing the project description text and finalizing the proposed survey questions. (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
2. January 12th - Open up survey to respondents (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
3. February 6 (extended from Jan 26) - Close survey (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
4. February 6th - Survey Analysis Begins (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
5. February 6th-20th - Boaz Gelbord and Jeremiah Grossman to edit draft report (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
6. February 20th- Decision point whether to include late submissions (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
7. February 20th - Circulate draft report to partners with raw data, request to keep data confidential prior to publication. (DONE) &amp;lt;br/&amp;gt;&lt;br /&gt;
8. March 19th (was March 15th) - Publish report after integrating partner feedback. Generate community interest and discussion around results.(DONE)&amp;lt;br/&amp;gt;&lt;br /&gt;
9. After March 19th - Coordinate formal acceptance of deliverable by OWASP and plan further steps for the project.&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== News Coverage of OWASP SSB Project ==&lt;br /&gt;
&lt;br /&gt;
SC Magazine: [http://www.scmagazineus.com/OWASP-Security-Spending-Benchmarks-Report-published/article/129116/ OWASP Security Spending Benchmarks Report Published]&lt;br /&gt;
&lt;br /&gt;
Dark Reading: [http://www.darkreading.com/security/app-security/showArticle.jhtml?articleID=215901240 Web Application Security Spending Relatively Unscathed by Poor Economy]&lt;br /&gt;
&lt;br /&gt;
Search Security: [http://searchsecurity.techtarget.com/news/article/0,289142,sid14_gci1351731,00.html More companies seek third-party code review, survey finds]&lt;br /&gt;
&lt;br /&gt;
Search Security (Germany): [http://www.searchsecurity.de/themenbereiche/applikationssicherheit/sichere-software-entwicklung/articles/177103 Drittanbieter-Code-Review und geschulte Programmierer bevorzugt]&lt;br /&gt;
&lt;br /&gt;
PC World: [http://www.pcworld.com/businesscenter/article/162012/survey_gauges_web_application_security_spending.html Survey Guages Web Application Security Spending]&lt;br /&gt;
&lt;br /&gt;
Info World [http://www.infoworld.com/article/09/03/26/Survey_gauges_Web_application_security_spending_1.html Survey Gauges Web Application Security Spending]&lt;br /&gt;
&lt;br /&gt;
Network World [http://www.networkworld.com/news/2009/032609-survey-gauges-web-application-security.html Survey Gauges Web Application Security Spending]&lt;br /&gt;
&lt;br /&gt;
The IT Chronicle [http://www.theitchronicle.com/content/survey-gauges-web-application-security-spending Survey Gauges Web Application Security Spending]&lt;br /&gt;
&lt;br /&gt;
The Industry Standard [http://www.thestandard.com/news/2009/03/26/survey-gauges-web-application-security-spending Survey Gauges Web Application Security Spending]&lt;br /&gt;
&lt;br /&gt;
CIO.com [http://www.cio.com/article/486881/Survey_Gauges_Web_Application_Security_Spending Survey Gauges Web Application Security Spending]&lt;br /&gt;
&lt;br /&gt;
CIO Espana [http://www.idg.es/cio/Mas-de-un-25_por_ciento-de-las-empresas-elevara-su-gasto-en-seguridad-de-aplicaciones-Web/doc78597-seguridad.htm Más de un 25% de las empresas elevará su gasto en seguridad de aplicaciones Web]&lt;br /&gt;
&lt;br /&gt;
Information Week [http://www.informationweek.com/blog/main/archives/2009/03/firms_taking_we.html Firms Taking Web App Security (More) Seriously]&lt;br /&gt;
&lt;br /&gt;
Search Security [http://securitywireweekly.blogs.techtarget.com/2009/03/25/owasp-security-benchmark-study-mobile-threats-real/ Podcast]&lt;br /&gt;
&lt;br /&gt;
Search Security [http://searchsecurity.techtarget.com/video/0,297151,sid14_gci1352074,00.html Video Interview with Boaz Gelbord]&lt;br /&gt;
&lt;br /&gt;
CIO India [http://www.cio.in/news/viewArticle/ARTICLEID=5931602 Web Apps Security Spending Rising]&lt;br /&gt;
&lt;br /&gt;
Information Security Magazine [http://searchsecurity.techtarget.com/magazineFeature/0,296894,sid14_gci1352162,00.html Web browsers remain vulnerable to user mistakes]&lt;br /&gt;
&lt;br /&gt;
== Project Leadership ==&lt;br /&gt;
The Security Spending Benchmarks Project Leader is [http://www.boazgelbord.com/ Boaz Gelbord] (Executive Director of Information Security, Wireless Generation). Boaz can be reached directly at '''boaz.gelbord AT owasp.org''' with any questions or feedback. Jeremiah Grossman (Founder &amp;amp; CTO, WhiteHat Security) is also closely assisting in the effort.&lt;br /&gt;
&lt;br /&gt;
== Project Contributors  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:AppSecLogo.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Cenzic.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Cigital_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Denim_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:echelonone.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:eema.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Image:Fortify_logo.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:GDS_LOGO_SMALL.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Ifis_logo.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:MetroSITEGroup.jpg]] &amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:NCircle-logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Imperva_Logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:The-open-group.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Sectheory-logo-2.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Logo_securosis.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Tssci.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:TTT_logo_2008.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Whitehat_security_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;/div&gt;</summary>
		<author><name>Bgelbord</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=62927</id>
		<title>Category:OWASP Security Spending Benchmarks</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=62927"/>
				<updated>2009-05-28T19:22:12Z</updated>
		
		<summary type="html">&lt;p&gt;Bgelbord: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[:Category:OWASP Project]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Security Spending Benchmarks Project Report March 2009 ==&lt;br /&gt;
&lt;br /&gt;
The Q1 2009 report of the OWASP Security Spending Benchmarks Report is now available. It can be found at the following link:&lt;br /&gt;
&lt;br /&gt;
[[http://www.owasp.org/images/b/b2/OWASP_SSB_Project_Report_March_2009.pdf PDF Download]].&lt;br /&gt;
&lt;br /&gt;
There are a number of key findings in the Q1 09 study:&lt;br /&gt;
&lt;br /&gt;
* Organizations that have suffered a public data breach spend more on security in the development process than those that have not.&lt;br /&gt;
&lt;br /&gt;
* Web application security spending is expected to either stay flat or increase in nearly two thirds of companies.&lt;br /&gt;
&lt;br /&gt;
* Half of respondents consider security experience important when hiring developers,  and a majority provide their developers with security training. 38% have a third party firm conduct a security review of outsourced code.&lt;br /&gt;
       &lt;br /&gt;
* At least 61% of respondents perform an independent third party security review before deploying a Web application while 17% do not (the remainder do not know or do so when requested by customers).&lt;br /&gt;
&lt;br /&gt;
* Just under half of the surveyed organizations have Web application firewalls deployed for at least some of their Web applications.&lt;br /&gt;
&lt;br /&gt;
== Raw Data ==&lt;br /&gt;
&lt;br /&gt;
Transparency is a key principle of the OWASP SSB Project. For this reason all raw survey results are made available to the community. We welcome additional commentary and interpretations on the survey data. The raw survey data can be found [https://www.surveymonkey.com/sr_detail.aspx?sm=6RXm2J2aqar1MT7JlandR0MYzVFmx25FwQ9trvJH1JG4GcuRCMp3TAkaCJyNCQYrtI1Ny025AnORe0Y3lU%2bj7w%3d%3d here]. &lt;br /&gt;
&lt;br /&gt;
== Inquiries ==&lt;br /&gt;
&lt;br /&gt;
Please contact the project leader Boaz Gelbord (bgelbord at wgen dot net) if you have questions about the project or you would like to inquire about contributing to the project.&lt;br /&gt;
&lt;br /&gt;
== About the Security Spending Benchmarks Project ==&lt;br /&gt;
&lt;br /&gt;
The Security Spending Benchmarks Project seeks to produce guidance and an industry accepted benchmark for justifying overall Web application security spending. We want to quantify how many dollars and human resources should be allocated towards the software development life-cycle, security training, security software/tools, independent third-party reviews, Web application firewalls, etc. This project is motivated by the fact that:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;There are few, if any, industry standard benchmarks for executive management to consider when deciding what is a reasonable amount of resources to spend on Web application security in or out of the software development processes.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Spending on security helps mitigate risks whose potential costs are often difficult to quantify, thereby making justifying and obtaining security budgets difficult.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Many business initiatives require organizations to take “reasonable measures” and “adhere to best practices” for developing, delivering, and/or hosting secure Web application, but there is no industry consensus or data repositories on how this translates into monetary terms.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Smaller organizations outside of highly regulated industries purchase and deploy Web applications with no realistic ability to evaluate their security program.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Producing a less secure Web application may be less expensive than producing a more secure version of the same software. Organization that have invested development resources into software security may not be able to charge a premium for this investment because there is no reference point for the investment.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The survey was formulated with the help of our project partners to address the following questions and many others: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;What percentage of a Web application development groups headcount is dedicated towards security?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards Web application security as a percentage of software development and overall operational IT security costs?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Where do Web application security budget come from?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards security education?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Data Collection &amp;amp; Distribution ==&lt;br /&gt;
&lt;br /&gt;
We utilize the SurveyMonkey system to host surveys conducted for the OWASP SSB Project. We do not collect any publicly identifiable information including names, addresses, employer, email addresses, etc. from the respondents. While we expect a limited number of respondents trying to intentionally skew the results, we take precautions to limit the potential while not creating unnecessary overhead. We control survey access via username/password, as well as through a trusted network of contacts. All information collected is made available through Survey Monkey.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Status  == &lt;br /&gt;
&lt;br /&gt;
Planned Q2 Timeline:&lt;br /&gt;
&lt;br /&gt;
1. April 1-15: Discuss thematic priorities with partners. Expand partner network.&amp;lt;br /&amp;gt;&lt;br /&gt;
2. April 15-30: Formulate survey questions based on identified thematic priorities &amp;lt;br /&amp;gt;&lt;br /&gt;
3. May 1st-May 29th (EXTENDED): Collect survey responses through partner network.&amp;lt;br /&amp;gt;&lt;br /&gt;
4. June 1st-June 10th: Analyze results and produce draft report.&amp;lt;br /&amp;gt;&lt;br /&gt;
5. June 10th - June 15th: Get partner feedback on draft and make edits.&amp;lt;br /&amp;gt;&lt;br /&gt;
6. June 15th: Publish final report&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Q1 Timeline:&lt;br /&gt;
&lt;br /&gt;
1. Completing the project description text and finalizing the proposed survey questions. (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
2. January 12th - Open up survey to respondents (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
3. February 6 (extended from Jan 26) - Close survey (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
4. February 6th - Survey Analysis Begins (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
5. February 6th-20th - Boaz Gelbord and Jeremiah Grossman to edit draft report (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
6. February 20th- Decision point whether to include late submissions (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
7. February 20th - Circulate draft report to partners with raw data, request to keep data confidential prior to publication. (DONE) &amp;lt;br/&amp;gt;&lt;br /&gt;
8. March 19th (was March 15th) - Publish report after integrating partner feedback. Generate community interest and discussion around results.(DONE)&amp;lt;br/&amp;gt;&lt;br /&gt;
9. After March 19th - Coordinate formal acceptance of deliverable by OWASP and plan further steps for the project.&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== News Coverage of OWASP SSB Project ==&lt;br /&gt;
&lt;br /&gt;
SC Magazine: [http://www.scmagazineus.com/OWASP-Security-Spending-Benchmarks-Report-published/article/129116/ OWASP Security Spending Benchmarks Report Published]&lt;br /&gt;
&lt;br /&gt;
Dark Reading: [http://www.darkreading.com/security/app-security/showArticle.jhtml?articleID=215901240 Web Application Security Spending Relatively Unscathed by Poor Economy]&lt;br /&gt;
&lt;br /&gt;
Search Security: [http://searchsecurity.techtarget.com/news/article/0,289142,sid14_gci1351731,00.html More companies seek third-party code review, survey finds]&lt;br /&gt;
&lt;br /&gt;
Search Security (Germany): [http://www.searchsecurity.de/themenbereiche/applikationssicherheit/sichere-software-entwicklung/articles/177103 Drittanbieter-Code-Review und geschulte Programmierer bevorzugt]&lt;br /&gt;
&lt;br /&gt;
PC World: [http://www.pcworld.com/businesscenter/article/162012/survey_gauges_web_application_security_spending.html Survey Guages Web Application Security Spending]&lt;br /&gt;
&lt;br /&gt;
Info World [http://www.infoworld.com/article/09/03/26/Survey_gauges_Web_application_security_spending_1.html Survey Gauges Web Application Security Spending]&lt;br /&gt;
&lt;br /&gt;
Network World [http://www.networkworld.com/news/2009/032609-survey-gauges-web-application-security.html Survey Gauges Web Application Security Spending]&lt;br /&gt;
&lt;br /&gt;
The IT Chronicle [http://www.theitchronicle.com/content/survey-gauges-web-application-security-spending Survey Gauges Web Application Security Spending]&lt;br /&gt;
&lt;br /&gt;
The Industry Standard [http://www.thestandard.com/news/2009/03/26/survey-gauges-web-application-security-spending Survey Gauges Web Application Security Spending]&lt;br /&gt;
&lt;br /&gt;
CIO.com [http://www.cio.com/article/486881/Survey_Gauges_Web_Application_Security_Spending Survey Gauges Web Application Security Spending]&lt;br /&gt;
&lt;br /&gt;
CIO Espana [http://www.idg.es/cio/Mas-de-un-25_por_ciento-de-las-empresas-elevara-su-gasto-en-seguridad-de-aplicaciones-Web/doc78597-seguridad.htm Más de un 25% de las empresas elevará su gasto en seguridad de aplicaciones Web]&lt;br /&gt;
&lt;br /&gt;
Information Week [http://www.informationweek.com/blog/main/archives/2009/03/firms_taking_we.html Firms Taking Web App Security (More) Seriously]&lt;br /&gt;
&lt;br /&gt;
Search Security [http://securitywireweekly.blogs.techtarget.com/2009/03/25/owasp-security-benchmark-study-mobile-threats-real/ Podcast]&lt;br /&gt;
&lt;br /&gt;
Search Security [http://searchsecurity.techtarget.com/video/0,297151,sid14_gci1352074,00.html Video Interview with Boaz Gelbord]&lt;br /&gt;
&lt;br /&gt;
CIO India [http://www.cio.in/news/viewArticle/ARTICLEID=5931602 Web Apps Security Spending Rising]&lt;br /&gt;
&lt;br /&gt;
Information Security Magazine [http://searchsecurity.techtarget.com/magazineFeature/0,296894,sid14_gci1352162,00.html Web browsers remain vulnerable to user mistakes]&lt;br /&gt;
&lt;br /&gt;
== Project Leadership ==&lt;br /&gt;
The Security Spending Benchmarks Project Leader is [http://www.boazgelbord.com/ Boaz Gelbord] (Executive Director of Information Security, Wireless Generation). Boaz can be reached directly at '''boaz.gelbord AT owasp.org''' with any questions or feedback. Jeremiah Grossman (Founder &amp;amp; CTO, WhiteHat Security) is also closely assisting in the effort.&lt;br /&gt;
&lt;br /&gt;
== Project Contributors  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:AppSecLogo.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Cenzic.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Cigital_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Denim_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:echelonone.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:eema.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Image:Fortify_logo.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:GDS_LOGO_SMALL.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Ifis_logo.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:MetroSITEGroup.jpg]] &amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:NCircle-logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Imperva_Logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:The-open-group.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Sectheory-logo-2.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Logo_securosis.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Tssci.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:TTT_logo_2008.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Whitehat_security_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;/div&gt;</summary>
		<author><name>Bgelbord</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:The-open-group.gif&amp;diff=62926</id>
		<title>File:The-open-group.gif</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:The-open-group.gif&amp;diff=62926"/>
				<updated>2009-05-28T19:20:53Z</updated>
		
		<summary type="html">&lt;p&gt;Bgelbord: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Bgelbord</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=62924</id>
		<title>Category:OWASP Security Spending Benchmarks</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=62924"/>
				<updated>2009-05-28T18:21:51Z</updated>
		
		<summary type="html">&lt;p&gt;Bgelbord: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[:Category:OWASP Project]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Security Spending Benchmarks Project Report March 2009 ==&lt;br /&gt;
&lt;br /&gt;
The Q1 2009 report of the OWASP Security Spending Benchmarks Report is now available. It can be found at the following link:&lt;br /&gt;
&lt;br /&gt;
[[http://www.owasp.org/images/b/b2/OWASP_SSB_Project_Report_March_2009.pdf PDF Download]].&lt;br /&gt;
&lt;br /&gt;
There are a number of key findings in the Q1 09 study:&lt;br /&gt;
&lt;br /&gt;
* Organizations that have suffered a public data breach spend more on security in the development process than those that have not.&lt;br /&gt;
&lt;br /&gt;
* Web application security spending is expected to either stay flat or increase in nearly two thirds of companies.&lt;br /&gt;
&lt;br /&gt;
* Half of respondents consider security experience important when hiring developers,  and a majority provide their developers with security training. 38% have a third party firm conduct a security review of outsourced code.&lt;br /&gt;
       &lt;br /&gt;
* At least 61% of respondents perform an independent third party security review before deploying a Web application while 17% do not (the remainder do not know or do so when requested by customers).&lt;br /&gt;
&lt;br /&gt;
* Just under half of the surveyed organizations have Web application firewalls deployed for at least some of their Web applications.&lt;br /&gt;
&lt;br /&gt;
== Raw Data ==&lt;br /&gt;
&lt;br /&gt;
Transparency is a key principle of the OWASP SSB Project. For this reason all raw survey results are made available to the community. We welcome additional commentary and interpretations on the survey data. The raw survey data can be found [https://www.surveymonkey.com/sr_detail.aspx?sm=6RXm2J2aqar1MT7JlandR0MYzVFmx25FwQ9trvJH1JG4GcuRCMp3TAkaCJyNCQYrtI1Ny025AnORe0Y3lU%2bj7w%3d%3d here]. &lt;br /&gt;
&lt;br /&gt;
== Inquiries ==&lt;br /&gt;
&lt;br /&gt;
Please contact the project leader Boaz Gelbord (bgelbord at wgen dot net) if you have questions about the project or you would like to inquire about contributing to the project.&lt;br /&gt;
&lt;br /&gt;
== About the Security Spending Benchmarks Project ==&lt;br /&gt;
&lt;br /&gt;
The Security Spending Benchmarks Project seeks to produce guidance and an industry accepted benchmark for justifying overall Web application security spending. We want to quantify how many dollars and human resources should be allocated towards the software development life-cycle, security training, security software/tools, independent third-party reviews, Web application firewalls, etc. This project is motivated by the fact that:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;There are few, if any, industry standard benchmarks for executive management to consider when deciding what is a reasonable amount of resources to spend on Web application security in or out of the software development processes.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Spending on security helps mitigate risks whose potential costs are often difficult to quantify, thereby making justifying and obtaining security budgets difficult.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Many business initiatives require organizations to take “reasonable measures” and “adhere to best practices” for developing, delivering, and/or hosting secure Web application, but there is no industry consensus or data repositories on how this translates into monetary terms.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Smaller organizations outside of highly regulated industries purchase and deploy Web applications with no realistic ability to evaluate their security program.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Producing a less secure Web application may be less expensive than producing a more secure version of the same software. Organization that have invested development resources into software security may not be able to charge a premium for this investment because there is no reference point for the investment.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The survey was formulated with the help of our project partners to address the following questions and many others: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;What percentage of a Web application development groups headcount is dedicated towards security?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards Web application security as a percentage of software development and overall operational IT security costs?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Where do Web application security budget come from?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards security education?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Data Collection &amp;amp; Distribution ==&lt;br /&gt;
&lt;br /&gt;
We utilize the SurveyMonkey system to host surveys conducted for the OWASP SSB Project. We do not collect any publicly identifiable information including names, addresses, employer, email addresses, etc. from the respondents. While we expect a limited number of respondents trying to intentionally skew the results, we take precautions to limit the potential while not creating unnecessary overhead. We control survey access via username/password, as well as through a trusted network of contacts. All information collected is made available through Survey Monkey.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Status  == &lt;br /&gt;
&lt;br /&gt;
Planned Q2 Timeline:&lt;br /&gt;
&lt;br /&gt;
1. April 1-15: Discuss thematic priorities with partners. Expand partner network.&amp;lt;br /&amp;gt;&lt;br /&gt;
2. April 15-30: Formulate survey questions based on identified thematic priorities &amp;lt;br /&amp;gt;&lt;br /&gt;
3. May 1st-May 29th (EXTENDED): Collect survey responses through partner network.&amp;lt;br /&amp;gt;&lt;br /&gt;
4. June 1st-June 10th: Analyze results and produce draft report.&amp;lt;br /&amp;gt;&lt;br /&gt;
5. June 10th - June 15th: Get partner feedback on draft and make edits.&amp;lt;br /&amp;gt;&lt;br /&gt;
6. June 15th: Publish final report&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Q1 Timeline:&lt;br /&gt;
&lt;br /&gt;
1. Completing the project description text and finalizing the proposed survey questions. (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
2. January 12th - Open up survey to respondents (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
3. February 6 (extended from Jan 26) - Close survey (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
4. February 6th - Survey Analysis Begins (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
5. February 6th-20th - Boaz Gelbord and Jeremiah Grossman to edit draft report (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
6. February 20th- Decision point whether to include late submissions (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
7. February 20th - Circulate draft report to partners with raw data, request to keep data confidential prior to publication. (DONE) &amp;lt;br/&amp;gt;&lt;br /&gt;
8. March 19th (was March 15th) - Publish report after integrating partner feedback. Generate community interest and discussion around results.(DONE)&amp;lt;br/&amp;gt;&lt;br /&gt;
9. After March 19th - Coordinate formal acceptance of deliverable by OWASP and plan further steps for the project.&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== News Coverage of OWASP SSB Project ==&lt;br /&gt;
&lt;br /&gt;
SC Magazine: [http://www.scmagazineus.com/OWASP-Security-Spending-Benchmarks-Report-published/article/129116/ OWASP Security Spending Benchmarks Report Published]&lt;br /&gt;
&lt;br /&gt;
Dark Reading: [http://www.darkreading.com/security/app-security/showArticle.jhtml?articleID=215901240 Web Application Security Spending Relatively Unscathed by Poor Economy]&lt;br /&gt;
&lt;br /&gt;
Search Security: [http://searchsecurity.techtarget.com/news/article/0,289142,sid14_gci1351731,00.html More companies seek third-party code review, survey finds]&lt;br /&gt;
&lt;br /&gt;
Search Security (Germany): [http://www.searchsecurity.de/themenbereiche/applikationssicherheit/sichere-software-entwicklung/articles/177103 Drittanbieter-Code-Review und geschulte Programmierer bevorzugt]&lt;br /&gt;
&lt;br /&gt;
PC World: [http://www.pcworld.com/businesscenter/article/162012/survey_gauges_web_application_security_spending.html Survey Guages Web Application Security Spending]&lt;br /&gt;
&lt;br /&gt;
Info World [http://www.infoworld.com/article/09/03/26/Survey_gauges_Web_application_security_spending_1.html Survey Gauges Web Application Security Spending]&lt;br /&gt;
&lt;br /&gt;
Network World [http://www.networkworld.com/news/2009/032609-survey-gauges-web-application-security.html Survey Gauges Web Application Security Spending]&lt;br /&gt;
&lt;br /&gt;
The IT Chronicle [http://www.theitchronicle.com/content/survey-gauges-web-application-security-spending Survey Gauges Web Application Security Spending]&lt;br /&gt;
&lt;br /&gt;
The Industry Standard [http://www.thestandard.com/news/2009/03/26/survey-gauges-web-application-security-spending Survey Gauges Web Application Security Spending]&lt;br /&gt;
&lt;br /&gt;
CIO.com [http://www.cio.com/article/486881/Survey_Gauges_Web_Application_Security_Spending Survey Gauges Web Application Security Spending]&lt;br /&gt;
&lt;br /&gt;
CIO Espana [http://www.idg.es/cio/Mas-de-un-25_por_ciento-de-las-empresas-elevara-su-gasto-en-seguridad-de-aplicaciones-Web/doc78597-seguridad.htm Más de un 25% de las empresas elevará su gasto en seguridad de aplicaciones Web]&lt;br /&gt;
&lt;br /&gt;
Information Week [http://www.informationweek.com/blog/main/archives/2009/03/firms_taking_we.html Firms Taking Web App Security (More) Seriously]&lt;br /&gt;
&lt;br /&gt;
Search Security [http://securitywireweekly.blogs.techtarget.com/2009/03/25/owasp-security-benchmark-study-mobile-threats-real/ Podcast]&lt;br /&gt;
&lt;br /&gt;
Search Security [http://searchsecurity.techtarget.com/video/0,297151,sid14_gci1352074,00.html Video Interview with Boaz Gelbord]&lt;br /&gt;
&lt;br /&gt;
CIO India [http://www.cio.in/news/viewArticle/ARTICLEID=5931602 Web Apps Security Spending Rising]&lt;br /&gt;
&lt;br /&gt;
Information Security Magazine [http://searchsecurity.techtarget.com/magazineFeature/0,296894,sid14_gci1352162,00.html Web browsers remain vulnerable to user mistakes]&lt;br /&gt;
&lt;br /&gt;
== Project Leadership ==&lt;br /&gt;
The Security Spending Benchmarks Project Leader is [http://www.boazgelbord.com/ Boaz Gelbord] (Executive Director of Information Security, Wireless Generation). Boaz can be reached directly at '''boaz.gelbord AT owasp.org''' with any questions or feedback. Jeremiah Grossman (Founder &amp;amp; CTO, WhiteHat Security) is also closely assisting in the effort.&lt;br /&gt;
&lt;br /&gt;
== Project Contributors  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:AppSecLogo.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Cenzic.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Cigital_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Denim_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:echelonone.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:eema.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Image:Fortify_logo.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:GDS_LOGO_SMALL.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Ifis_logo.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:MetroSITEGroup.jpg]] &amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:NCircle-logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Imperva_Logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Sectheory-logo-2.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Logo_securosis.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Tssci.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:TTT_logo_2008.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Whitehat_security_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;/div&gt;</summary>
		<author><name>Bgelbord</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=62013</id>
		<title>Category:OWASP Security Spending Benchmarks</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=62013"/>
				<updated>2009-05-26T17:58:28Z</updated>
		
		<summary type="html">&lt;p&gt;Bgelbord: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[:Category:OWASP Project]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Security Spending Benchmarks Project Report March 2009 ==&lt;br /&gt;
&lt;br /&gt;
The first report of the OWASP Security Spending Benchmarks Report is now available. It can be found at the following link:&lt;br /&gt;
&lt;br /&gt;
[[http://www.owasp.org/images/b/b2/OWASP_SSB_Project_Report_March_2009.pdf PDF Download]].&lt;br /&gt;
&lt;br /&gt;
There are a number of key findings in the study:&lt;br /&gt;
&lt;br /&gt;
* Organizations that have suffered a public data breach spend more on security in the development process than those that have not.&lt;br /&gt;
&lt;br /&gt;
* Web application security spending is expected to either stay flat or increase in nearly two thirds of companies.&lt;br /&gt;
&lt;br /&gt;
* Half of respondents consider security experience important when hiring developers,  and a majority provide their developers with security training. 38% have a third party firm conduct a security review of outsourced code.&lt;br /&gt;
       &lt;br /&gt;
* At least 61% of respondents perform an independent third party security review before deploying a Web application while 17% do not (the remainder do not know or do so when requested by customers).&lt;br /&gt;
&lt;br /&gt;
* Just under half of the surveyed organizations have Web application firewalls deployed for at least some of their Web applications.&lt;br /&gt;
&lt;br /&gt;
== Raw Data ==&lt;br /&gt;
&lt;br /&gt;
Transparency is a key principle of the OWASP SSB Project. For this reason all raw survey results are made available to the community. We welcome additional commentary and interpretations on the survey data. The raw survey data can be found [https://www.surveymonkey.com/sr_detail.aspx?sm=6RXm2J2aqar1MT7JlandR0MYzVFmx25FwQ9trvJH1JG4GcuRCMp3TAkaCJyNCQYrtI1Ny025AnORe0Y3lU%2bj7w%3d%3d here]. &lt;br /&gt;
&lt;br /&gt;
== Inquiries ==&lt;br /&gt;
&lt;br /&gt;
Please contact the project leader Boaz Gelbord (bgelbord at wgen dot net) if you have questions about the project or you would like to inquire about contributing to the project.&lt;br /&gt;
&lt;br /&gt;
== About the Security Spending Benchmarks Project ==&lt;br /&gt;
&lt;br /&gt;
The Security Spending Benchmarks Project seeks to produce guidance and an industry accepted benchmark for justifying overall Web application security spending. We want to quantify how many dollars and human resources should be allocated towards the software development life-cycle, security training, security software/tools, independent third-party reviews, Web application firewalls, etc. This project is motivated by the fact that:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;There are few, if any, industry standard benchmarks for executive management to consider when deciding what is a reasonable amount of resources to spend on Web application security in or out of the software development processes.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Spending on security helps mitigate risks whose potential costs are often difficult to quantify, thereby making justifying and obtaining security budgets difficult.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Many business initiatives require organizations to take “reasonable measures” and “adhere to best practices” for developing, delivering, and/or hosting secure Web application, but there is no industry consensus or data repositories on how this translates into monetary terms.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Smaller organizations outside of highly regulated industries purchase and deploy Web applications with no realistic ability to evaluate their security program.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Producing a less secure Web application may be less expensive than producing a more secure version of the same software. Organization that have invested development resources into software security may not be able to charge a premium for this investment because there is no reference point for the investment.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The survey was formulated with the help of our project partners to address the following questions and many others: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;What percentage of a Web application development groups headcount is dedicated towards security?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards Web application security as a percentage of software development and overall operational IT security costs?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Where do Web application security budget come from?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards security education?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Data Collection &amp;amp; Distribution ==&lt;br /&gt;
&lt;br /&gt;
We utilize the SurveyMonkey system to host surveys conducted for the OWASP SSB Project. We do not collect any publicly identifiable information including names, addresses, employer, email addresses, etc. from the respondents. While we expect a limited number of respondents trying to intentionally skew the results, we take precautions to limit the potential while not creating unnecessary overhead. We control survey access via username/password, as well as through a trusted network of contacts. All information collected is made available through Survey Monkey.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Status  == &lt;br /&gt;
&lt;br /&gt;
Planned Q2 Timeline:&lt;br /&gt;
&lt;br /&gt;
1. April 1-15: Discuss thematic priorities with partners. Expand partner network.&amp;lt;br /&amp;gt;&lt;br /&gt;
2. April 15-30: Formulate survey questions based on identified thematic priorities &amp;lt;br /&amp;gt;&lt;br /&gt;
3. May 1st-May 29th (EXTENDED): Collect survey responses through partner network.&amp;lt;br /&amp;gt;&lt;br /&gt;
4. June 1st-June 10th: Analyze results and produce draft report.&amp;lt;br /&amp;gt;&lt;br /&gt;
5. June 10th - June 15th: Get partner feedback on draft and make edits.&amp;lt;br /&amp;gt;&lt;br /&gt;
6. June 15th: Publish final report&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Q1 Timeline:&lt;br /&gt;
&lt;br /&gt;
1. Completing the project description text and finalizing the proposed survey questions. (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
2. January 12th - Open up survey to respondents (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
3. February 6 (extended from Jan 26) - Close survey (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
4. February 6th - Survey Analysis Begins (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
5. February 6th-20th - Boaz Gelbord and Jeremiah Grossman to edit draft report (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
6. February 20th- Decision point whether to include late submissions (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
7. February 20th - Circulate draft report to partners with raw data, request to keep data confidential prior to publication. (DONE) &amp;lt;br/&amp;gt;&lt;br /&gt;
8. March 19th (was March 15th) - Publish report after integrating partner feedback. Generate community interest and discussion around results.(CURRENT)&amp;lt;br/&amp;gt;&lt;br /&gt;
9. After March 19th - Coordinate formal acceptance of deliverable by OWASP and plan further steps for the project.&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== News Coverage of OWASP SSB Project ==&lt;br /&gt;
&lt;br /&gt;
SC Magazine: [http://www.scmagazineus.com/OWASP-Security-Spending-Benchmarks-Report-published/article/129116/ OWASP Security Spending Benchmarks Report Published]&lt;br /&gt;
&lt;br /&gt;
Dark Reading: [http://www.darkreading.com/security/app-security/showArticle.jhtml?articleID=215901240 Web Application Security Spending Relatively Unscathed by Poor Economy]&lt;br /&gt;
&lt;br /&gt;
Search Security: [http://searchsecurity.techtarget.com/news/article/0,289142,sid14_gci1351731,00.html More companies seek third-party code review, survey finds]&lt;br /&gt;
&lt;br /&gt;
Search Security (Germany): [http://www.searchsecurity.de/themenbereiche/applikationssicherheit/sichere-software-entwicklung/articles/177103 Drittanbieter-Code-Review und geschulte Programmierer bevorzugt]&lt;br /&gt;
&lt;br /&gt;
PC World: [http://www.pcworld.com/businesscenter/article/162012/survey_gauges_web_application_security_spending.html Survey Guages Web Application Security Spending]&lt;br /&gt;
&lt;br /&gt;
Info World [http://www.infoworld.com/article/09/03/26/Survey_gauges_Web_application_security_spending_1.html Survey Gauges Web Application Security Spending]&lt;br /&gt;
&lt;br /&gt;
Network World [http://www.networkworld.com/news/2009/032609-survey-gauges-web-application-security.html Survey Gauges Web Application Security Spending]&lt;br /&gt;
&lt;br /&gt;
The IT Chronicle [http://www.theitchronicle.com/content/survey-gauges-web-application-security-spending Survey Gauges Web Application Security Spending]&lt;br /&gt;
&lt;br /&gt;
The Industry Standard [http://www.thestandard.com/news/2009/03/26/survey-gauges-web-application-security-spending Survey Gauges Web Application Security Spending]&lt;br /&gt;
&lt;br /&gt;
CIO.com [http://www.cio.com/article/486881/Survey_Gauges_Web_Application_Security_Spending Survey Gauges Web Application Security Spending]&lt;br /&gt;
&lt;br /&gt;
CIO Espana [http://www.idg.es/cio/Mas-de-un-25_por_ciento-de-las-empresas-elevara-su-gasto-en-seguridad-de-aplicaciones-Web/doc78597-seguridad.htm Más de un 25% de las empresas elevará su gasto en seguridad de aplicaciones Web]&lt;br /&gt;
&lt;br /&gt;
Information Week [http://www.informationweek.com/blog/main/archives/2009/03/firms_taking_we.html Firms Taking Web App Security (More) Seriously]&lt;br /&gt;
&lt;br /&gt;
Search Security [http://securitywireweekly.blogs.techtarget.com/2009/03/25/owasp-security-benchmark-study-mobile-threats-real/ Podcast]&lt;br /&gt;
&lt;br /&gt;
Search Security [http://searchsecurity.techtarget.com/video/0,297151,sid14_gci1352074,00.html Video Interview with Boaz Gelbord]&lt;br /&gt;
&lt;br /&gt;
CIO India [http://www.cio.in/news/viewArticle/ARTICLEID=5931602 Web Apps Security Spending Rising]&lt;br /&gt;
&lt;br /&gt;
Information Security Magazine [http://searchsecurity.techtarget.com/magazineFeature/0,296894,sid14_gci1352162,00.html Web browsers remain vulnerable to user mistakes]&lt;br /&gt;
&lt;br /&gt;
== Project Leadership ==&lt;br /&gt;
The Security Spending Benchmarks Project Leader is [http://www.boazgelbord.com/ Boaz Gelbord] (Executive Director of Information Security, Wireless Generation). Boaz can be reached directly at '''boaz.gelbord AT owasp.org''' with any questions or feedback. Jeremiah Grossman (Founder &amp;amp; CTO, WhiteHat Security) is also closely assisting in the effort.&lt;br /&gt;
&lt;br /&gt;
== Project Contributors  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:AppSecLogo.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Cenzic.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Cigital_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Denim_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:echelonone.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:eema.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Image:Fortify_logo.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:GDS_LOGO_SMALL.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Ifis_logo.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:MetroSITEGroup.jpg]] &amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:NCircle-logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Imperva_Logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Sectheory-logo-2.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Logo_securosis.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Tssci.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:TTT_logo_2008.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Whitehat_security_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;/div&gt;</summary>
		<author><name>Bgelbord</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=58505</id>
		<title>Category:OWASP Security Spending Benchmarks</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=58505"/>
				<updated>2009-04-08T14:49:38Z</updated>
		
		<summary type="html">&lt;p&gt;Bgelbord: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[:Category:OWASP Project]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Security Spending Benchmarks Project Report March 2009 ==&lt;br /&gt;
&lt;br /&gt;
The first report of the OWASP Security Spending Benchmarks Report is now available. It can be found at the following link:&lt;br /&gt;
&lt;br /&gt;
[[http://www.owasp.org/images/b/b2/OWASP_SSB_Project_Report_March_2009.pdf PDF Download]].&lt;br /&gt;
&lt;br /&gt;
There are a number of key findings in the study:&lt;br /&gt;
&lt;br /&gt;
* Organizations that have suffered a public data breach spend more on security in the development process than those that have not.&lt;br /&gt;
&lt;br /&gt;
* Web application security spending is expected to either stay flat or increase in nearly two thirds of companies.&lt;br /&gt;
&lt;br /&gt;
* Half of respondents consider security experience important when hiring developers,  and a majority provide their developers with security training. 38% have a third party firm conduct a security review of outsourced code.&lt;br /&gt;
       &lt;br /&gt;
* At least 61% of respondents perform an independent third party security review before deploying a Web application while 17% do not (the remainder do not know or do so when requested by customers).&lt;br /&gt;
&lt;br /&gt;
* Just under half of the surveyed organizations have Web application firewalls deployed for at least some of their Web applications.&lt;br /&gt;
&lt;br /&gt;
== Raw Data ==&lt;br /&gt;
&lt;br /&gt;
Transparency is a key principle of the OWASP SSB Project. For this reason all raw survey results are made available to the community. We welcome additional commentary and interpretations on the survey data. The raw survey data can be found [https://www.surveymonkey.com/sr_detail.aspx?sm=6RXm2J2aqar1MT7JlandR0MYzVFmx25FwQ9trvJH1JG4GcuRCMp3TAkaCJyNCQYrtI1Ny025AnORe0Y3lU%2bj7w%3d%3d here]. &lt;br /&gt;
&lt;br /&gt;
== Inquiries ==&lt;br /&gt;
&lt;br /&gt;
Please contact the project leader Boaz Gelbord (bgelbord at wgen dot net) if you have questions about the project or you would like to inquire about contributing to the project.&lt;br /&gt;
&lt;br /&gt;
== About the Security Spending Benchmarks Project ==&lt;br /&gt;
&lt;br /&gt;
The Security Spending Benchmarks Project seeks to produce guidance and an industry accepted benchmark for justifying overall Web application security spending. We want to quantify how many dollars and human resources should be allocated towards the software development life-cycle, security training, security software/tools, independent third-party reviews, Web application firewalls, etc. This project is motivated by the fact that:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;There are few, if any, industry standard benchmarks for executive management to consider when deciding what is a reasonable amount of resources to spend on Web application security in or out of the software development processes.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Spending on security helps mitigate risks whose potential costs are often difficult to quantify, thereby making justifying and obtaining security budgets difficult.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Many business initiatives require organizations to take “reasonable measures” and “adhere to best practices” for developing, delivering, and/or hosting secure Web application, but there is no industry consensus or data repositories on how this translates into monetary terms.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Smaller organizations outside of highly regulated industries purchase and deploy Web applications with no realistic ability to evaluate their security program.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Producing a less secure Web application may be less expensive than producing a more secure version of the same software. Organization that have invested development resources into software security may not be able to charge a premium for this investment because there is no reference point for the investment.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The survey was formulated with the help of our project partners to address the following questions and many others: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;What percentage of a Web application development groups headcount is dedicated towards security?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards Web application security as a percentage of software development and overall operational IT security costs?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Where do Web application security budget come from?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards security education?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Data Collection &amp;amp; Distribution ==&lt;br /&gt;
&lt;br /&gt;
We utilize the SurveyMonkey system to host surveys conducted for the OWASP SSB Project. We do not collect any publicly identifiable information including names, addresses, employer, email addresses, etc. from the respondents. While we expect a limited number of respondents trying to intentionally skew the results, we take precautions to limit the potential while not creating unnecessary overhead. We control survey access via username/password, as well as through a trusted network of contacts. All information collected is made available through Survey Monkey.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Status  == &lt;br /&gt;
&lt;br /&gt;
Planned Q2 Timeline:&lt;br /&gt;
&lt;br /&gt;
1. April 1-15: Discuss thematic priorities with partners. Expand partner network.&amp;lt;br /&amp;gt;&lt;br /&gt;
2. April 15-30: Formulate survey questions based on identified thematic priorities &amp;lt;br /&amp;gt;&lt;br /&gt;
3. May 1st-May 15th: Collect survey responses through partner network.&amp;lt;br /&amp;gt;&lt;br /&gt;
4. May 15th-May 31st: Analyze results and produce draft report.&amp;lt;br /&amp;gt;&lt;br /&gt;
5. June 1st - June 15th: Get partner feedback on draft and make edits.&amp;lt;br /&amp;gt;&lt;br /&gt;
6. June 15th: Publish final report&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Q1 Timeline:&lt;br /&gt;
&lt;br /&gt;
1. Completing the project description text and finalizing the proposed survey questions. (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
2. January 12th - Open up survey to respondents (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
3. February 6 (extended from Jan 26) - Close survey (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
4. February 6th - Survey Analysis Begins (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
5. February 6th-20th - Boaz Gelbord and Jeremiah Grossman to edit draft report (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
6. February 20th- Decision point whether to include late submissions (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
7. February 20th - Circulate draft report to partners with raw data, request to keep data confidential prior to publication. (DONE) &amp;lt;br/&amp;gt;&lt;br /&gt;
8. March 19th (was March 15th) - Publish report after integrating partner feedback. Generate community interest and discussion around results.(CURRENT)&amp;lt;br/&amp;gt;&lt;br /&gt;
9. After March 19th - Coordinate formal acceptance of deliverable by OWASP and plan further steps for the project.&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== News Coverage of OWASP SSB Project ==&lt;br /&gt;
&lt;br /&gt;
SC Magazine: [http://www.scmagazineus.com/OWASP-Security-Spending-Benchmarks-Report-published/article/129116/ OWASP Security Spending Benchmarks Report Published]&lt;br /&gt;
&lt;br /&gt;
Dark Reading: [http://www.darkreading.com/security/app-security/showArticle.jhtml?articleID=215901240 Web Application Security Spending Relatively Unscathed by Poor Economy]&lt;br /&gt;
&lt;br /&gt;
Search Security: [http://searchsecurity.techtarget.com/news/article/0,289142,sid14_gci1351731,00.html More companies seek third-party code review, survey finds]&lt;br /&gt;
&lt;br /&gt;
Search Security (Germany): [http://www.searchsecurity.de/themenbereiche/applikationssicherheit/sichere-software-entwicklung/articles/177103 Drittanbieter-Code-Review und geschulte Programmierer bevorzugt]&lt;br /&gt;
&lt;br /&gt;
PC World: [http://www.pcworld.com/businesscenter/article/162012/survey_gauges_web_application_security_spending.html Survey Guages Web Application Security Spending]&lt;br /&gt;
&lt;br /&gt;
Info World [http://www.infoworld.com/article/09/03/26/Survey_gauges_Web_application_security_spending_1.html Survey Gauges Web Application Security Spending]&lt;br /&gt;
&lt;br /&gt;
Network World [http://www.networkworld.com/news/2009/032609-survey-gauges-web-application-security.html Survey Gauges Web Application Security Spending]&lt;br /&gt;
&lt;br /&gt;
The IT Chronicle [http://www.theitchronicle.com/content/survey-gauges-web-application-security-spending Survey Gauges Web Application Security Spending]&lt;br /&gt;
&lt;br /&gt;
The Industry Standard [http://www.thestandard.com/news/2009/03/26/survey-gauges-web-application-security-spending Survey Gauges Web Application Security Spending]&lt;br /&gt;
&lt;br /&gt;
CIO.com [http://www.cio.com/article/486881/Survey_Gauges_Web_Application_Security_Spending Survey Gauges Web Application Security Spending]&lt;br /&gt;
&lt;br /&gt;
CIO Espana [http://www.idg.es/cio/Mas-de-un-25_por_ciento-de-las-empresas-elevara-su-gasto-en-seguridad-de-aplicaciones-Web/doc78597-seguridad.htm Más de un 25% de las empresas elevará su gasto en seguridad de aplicaciones Web]&lt;br /&gt;
&lt;br /&gt;
Information Week [http://www.informationweek.com/blog/main/archives/2009/03/firms_taking_we.html Firms Taking Web App Security (More) Seriously]&lt;br /&gt;
&lt;br /&gt;
Search Security [http://securitywireweekly.blogs.techtarget.com/2009/03/25/owasp-security-benchmark-study-mobile-threats-real/ Podcast]&lt;br /&gt;
&lt;br /&gt;
Search Security [http://searchsecurity.techtarget.com/video/0,297151,sid14_gci1352074,00.html Video Interview with Boaz Gelbord]&lt;br /&gt;
&lt;br /&gt;
CIO India [http://www.cio.in/news/viewArticle/ARTICLEID=5931602 Web Apps Security Spending Rising]&lt;br /&gt;
&lt;br /&gt;
Information Security Magazine [http://searchsecurity.techtarget.com/magazineFeature/0,296894,sid14_gci1352162,00.html Web browsers remain vulnerable to user mistakes]&lt;br /&gt;
&lt;br /&gt;
== Project Leadership ==&lt;br /&gt;
The Security Spending Benchmarks Project Leader is [http://www.boazgelbord.com/ Boaz Gelbord] (Executive Director of Information Security, Wireless Generation). Boaz can be reached directly at '''boaz.gelbord AT owasp.org''' with any questions or feedback. Jeremiah Grossman (Founder &amp;amp; CTO, WhiteHat Security) is also closely assisting in the effort.&lt;br /&gt;
&lt;br /&gt;
== Project Contributors  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:AppSecLogo.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Cenzic.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Cigital_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Denim_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:echelonone.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:eema.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Image:Fortify_logo.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:GDS_LOGO_SMALL.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Ifis_logo.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:MetroSITEGroup.jpg]] &amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:NCircle-logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Imperva_Logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Sectheory-logo-2.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Logo_securosis.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Tssci.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:TTT_logo_2008.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Whitehat_security_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;/div&gt;</summary>
		<author><name>Bgelbord</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=57876</id>
		<title>Category:OWASP Security Spending Benchmarks</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=57876"/>
				<updated>2009-04-02T17:05:02Z</updated>
		
		<summary type="html">&lt;p&gt;Bgelbord: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[:Category:OWASP Project]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Security Spending Benchmarks Project Report March 2009 ==&lt;br /&gt;
&lt;br /&gt;
The first report of the OWASP Security Spending Benchmarks Report is now available. It can be found at the following link:&lt;br /&gt;
&lt;br /&gt;
[[http://www.owasp.org/images/b/b2/OWASP_SSB_Project_Report_March_2009.pdf PDF Download]].&lt;br /&gt;
&lt;br /&gt;
There are a number of key findings in the study:&lt;br /&gt;
&lt;br /&gt;
* Organizations that have suffered a public data breach spend more on security in the development process than those that have not.&lt;br /&gt;
&lt;br /&gt;
* Web application security spending is expected to either stay flat or increase in nearly two thirds of companies.&lt;br /&gt;
&lt;br /&gt;
* Half of respondents consider security experience important when hiring developers,  and a majority provide their developers with security training. 38% have a third party firm conduct a security review of outsourced code.&lt;br /&gt;
       &lt;br /&gt;
* At least 61% of respondents perform an independent third party security review before deploying a Web application while 17% do not (the remainder do not know or do so when requested by customers).&lt;br /&gt;
&lt;br /&gt;
* Just under half of the surveyed organizations have Web application firewalls deployed for at least some of their Web applications.&lt;br /&gt;
&lt;br /&gt;
== Raw Data ==&lt;br /&gt;
&lt;br /&gt;
Transparency is a key principle of the OWASP SSB Project. For this reason all raw survey results are made available to the community. We welcome additional commentary and interpretations on the survey data. The raw survey data can be found [https://www.surveymonkey.com/sr_detail.aspx?sm=6RXm2J2aqar1MT7JlandR0MYzVFmx25FwQ9trvJH1JG4GcuRCMp3TAkaCJyNCQYrtI1Ny025AnORe0Y3lU%2bj7w%3d%3d here]. &lt;br /&gt;
&lt;br /&gt;
== Inquiries ==&lt;br /&gt;
&lt;br /&gt;
Please contact the project leader Boaz Gelbord (bgelbord at wgen dot net) if you have questions about the project or you would like to inquire about contributing to the project.&lt;br /&gt;
&lt;br /&gt;
== About the Security Spending Benchmarks Project ==&lt;br /&gt;
&lt;br /&gt;
The Security Spending Benchmarks Project seeks to produce guidance and an industry accepted benchmark for justifying overall Web application security spending. We want to quantify how many dollars and human resources should be allocated towards the software development life-cycle, security training, security software/tools, independent third-party reviews, Web application firewalls, etc. This project is motivated by the fact that:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;There are few, if any, industry standard benchmarks for executive management to consider when deciding what is a reasonable amount of resources to spend on Web application security in or out of the software development processes.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Spending on security helps mitigate risks whose potential costs are often difficult to quantify, thereby making justifying and obtaining security budgets difficult.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Many business initiatives require organizations to take “reasonable measures” and “adhere to best practices” for developing, delivering, and/or hosting secure Web application, but there is no industry consensus or data repositories on how this translates into monetary terms.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Smaller organizations outside of highly regulated industries purchase and deploy Web applications with no realistic ability to evaluate their security program.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Producing a less secure Web application may be less expensive than producing a more secure version of the same software. Organization that have invested development resources into software security may not be able to charge a premium for this investment because there is no reference point for the investment.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The survey was formulated with the help of our project partners to address the following questions and many others: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;What percentage of a Web application development groups headcount is dedicated towards security?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards Web application security as a percentage of software development and overall operational IT security costs?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Where do Web application security budget come from?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards security education?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Data Collection &amp;amp; Distribution ==&lt;br /&gt;
&lt;br /&gt;
We utilize the SurveyMonkey system to host surveys conducted for the OWASP SSB Project. We do not collect any publicly identifiable information including names, addresses, employer, email addresses, etc. from the respondents. While we expect a limited number of respondents trying to intentionally skew the results, we take precautions to limit the potential while not creating unnecessary overhead. We control survey access via username/password, as well as through a trusted network of contacts. All information collected is made available through Survey Monkey.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Status  == &lt;br /&gt;
&lt;br /&gt;
Planned Q2 Timeline:&lt;br /&gt;
&lt;br /&gt;
1. April 1-15: Discuss thematic priorities with partners. Expand partner network.&amp;lt;br /&amp;gt;&lt;br /&gt;
2. April 15-30: Formulate survey questions based on identified thematic priorities &amp;lt;br /&amp;gt;&lt;br /&gt;
3. May 1st-May 15th: Collect survey responses through partner network.&amp;lt;br /&amp;gt;&lt;br /&gt;
4. May 15th-May 31st: Analyze results and produce draft report.&amp;lt;br /&amp;gt;&lt;br /&gt;
5. June 1st - June 15th: Get partner feedback on draft and make edits.&amp;lt;br /&amp;gt;&lt;br /&gt;
6. June 15th: Publish final report&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Q1 Timeline:&lt;br /&gt;
&lt;br /&gt;
1. Completing the project description text and finalizing the proposed survey questions. (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
2. January 12th - Open up survey to respondents (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
3. February 6 (extended from Jan 26) - Close survey (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
4. February 6th - Survey Analysis Begins (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
5. February 6th-20th - Boaz Gelbord and Jeremiah Grossman to edit draft report (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
6. February 20th- Decision point whether to include late submissions (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
7. February 20th - Circulate draft report to partners with raw data, request to keep data confidential prior to publication. (DONE) &amp;lt;br/&amp;gt;&lt;br /&gt;
8. March 19th (was March 15th) - Publish report after integrating partner feedback. Generate community interest and discussion around results.(CURRENT)&amp;lt;br/&amp;gt;&lt;br /&gt;
9. After March 19th - Coordinate formal acceptance of deliverable by OWASP and plan further steps for the project.&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== News Coverage of OWASP SSB Project ==&lt;br /&gt;
&lt;br /&gt;
SC Magazine: [http://www.scmagazineus.com/OWASP-Security-Spending-Benchmarks-Report-published/article/129116/ OWASP Security Spending Benchmarks Report Published]&lt;br /&gt;
&lt;br /&gt;
Dark Reading: [http://www.darkreading.com/security/app-security/showArticle.jhtml?articleID=215901240 Web Application Security Spending Relatively Unscathed by Poor Economy]&lt;br /&gt;
&lt;br /&gt;
Search Security: [http://searchsecurity.techtarget.com/news/article/0,289142,sid14_gci1351731,00.html More companies seek third-party code review, survey finds]&lt;br /&gt;
&lt;br /&gt;
Search Security (Germany): [http://www.searchsecurity.de/themenbereiche/applikationssicherheit/sichere-software-entwicklung/articles/177103 Drittanbieter-Code-Review und geschulte Programmierer bevorzugt]&lt;br /&gt;
&lt;br /&gt;
PC World: [http://www.pcworld.com/businesscenter/article/162012/survey_gauges_web_application_security_spending.html Survey Guages Web Application Security Spending]&lt;br /&gt;
&lt;br /&gt;
Info World [http://www.infoworld.com/article/09/03/26/Survey_gauges_Web_application_security_spending_1.html Survey Gauges Web Application Security Spending]&lt;br /&gt;
&lt;br /&gt;
Network World [http://www.networkworld.com/news/2009/032609-survey-gauges-web-application-security.html Survey Gauges Web Application Security Spending]&lt;br /&gt;
&lt;br /&gt;
The IT Chronicle [http://www.theitchronicle.com/content/survey-gauges-web-application-security-spending Survey Gauges Web Application Security Spending]&lt;br /&gt;
&lt;br /&gt;
The Industry Standard [http://www.thestandard.com/news/2009/03/26/survey-gauges-web-application-security-spending Survey Gauges Web Application Security Spending]&lt;br /&gt;
&lt;br /&gt;
CIO.com [http://www.cio.com/article/486881/Survey_Gauges_Web_Application_Security_Spending Survey Gauges Web Application Security Spending]&lt;br /&gt;
&lt;br /&gt;
CIO Espana [http://www.idg.es/cio/Mas-de-un-25_por_ciento-de-las-empresas-elevara-su-gasto-en-seguridad-de-aplicaciones-Web/doc78597-seguridad.htm Más de un 25% de las empresas elevará su gasto en seguridad de aplicaciones Web]&lt;br /&gt;
&lt;br /&gt;
Information Week [http://www.informationweek.com/blog/main/archives/2009/03/firms_taking_we.html Firms Taking Web App Security (More) Seriously]&lt;br /&gt;
&lt;br /&gt;
Search Security [http://securitywireweekly.blogs.techtarget.com/2009/03/25/owasp-security-benchmark-study-mobile-threats-real/ Podcast]&lt;br /&gt;
&lt;br /&gt;
Search Security [http://searchsecurity.techtarget.com/video/0,297151,sid14_gci1352074,00.html Video Interview with Boaz Gelbord]&lt;br /&gt;
&lt;br /&gt;
CIO India [http://www.cio.in/news/viewArticle/ARTICLEID=5931602 Web Apps Security Spending Rising]&lt;br /&gt;
&lt;br /&gt;
Information Security Magazine [http://searchsecurity.techtarget.com/magazineFeature/0,296894,sid14_gci1352162,00.html Web browsers remain vulnerable to user mistakes]&lt;br /&gt;
&lt;br /&gt;
== Project Leadership  ==&lt;br /&gt;
The Security Spending Benchmarks Project Leader is [http://www.boazgelbord.com/ Boaz Gelbord] (Executive Director of Information Security, Wireless Generation). Boaz can be reached directly at '''bgelbord AT wgen.net''' with any questions or feedback. Jeremiah Grossman (Founder &amp;amp; CTO, WhiteHat Security) is also closely assisting in the effort.&lt;br /&gt;
&lt;br /&gt;
== Project Contributors  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:AppSecLogo.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Cenzic.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Cigital_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Denim_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:echelonone.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:eema.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Image:Fortify_logo.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:GDS_LOGO_SMALL.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Ifis_logo.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:MetroSITEGroup.jpg]] &amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:NCircle-logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Imperva_Logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Sectheory-logo-2.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Logo_securosis.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Tssci.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:TTT_logo_2008.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Whitehat_security_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;/div&gt;</summary>
		<author><name>Bgelbord</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=57607</id>
		<title>Category:OWASP Security Spending Benchmarks</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=57607"/>
				<updated>2009-03-30T15:42:31Z</updated>
		
		<summary type="html">&lt;p&gt;Bgelbord: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[:Category:OWASP Project]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Security Spending Benchmarks Project Report March 2009 ==&lt;br /&gt;
&lt;br /&gt;
The first report of the OWASP Security Spending Benchmarks Report is now available. It can be found at the following link:&lt;br /&gt;
&lt;br /&gt;
[[http://www.owasp.org/images/b/b2/OWASP_SSB_Project_Report_March_2009.pdf PDF Download]].&lt;br /&gt;
&lt;br /&gt;
There are a number of key findings in the study:&lt;br /&gt;
&lt;br /&gt;
* Organizations that have suffered a public data breach spend more on security in the development process than those that have not.&lt;br /&gt;
&lt;br /&gt;
* Web application security spending is expected to either stay flat or increase in nearly two thirds of companies.&lt;br /&gt;
&lt;br /&gt;
* Half of respondents consider security experience important when hiring developers,  and a majority provide their developers with security training. 38% have a third party firm conduct a security review of outsourced code.&lt;br /&gt;
       &lt;br /&gt;
* At least 61% of respondents perform an independent third party security review before deploying a Web application while 17% do not (the remainder do not know or do so when requested by customers).&lt;br /&gt;
&lt;br /&gt;
* Just under half of the surveyed organizations have Web application firewalls deployed for at least some of their Web applications.&lt;br /&gt;
&lt;br /&gt;
== Raw Data ==&lt;br /&gt;
&lt;br /&gt;
Transparency is a key principle of the OWASP SSB Project. For this reason all raw survey results are made available to the community. We welcome additional commentary and interpretations on the survey data. The raw survey data can be found [https://www.surveymonkey.com/sr_detail.aspx?sm=6RXm2J2aqar1MT7JlandR0MYzVFmx25FwQ9trvJH1JG4GcuRCMp3TAkaCJyNCQYrtI1Ny025AnORe0Y3lU%2bj7w%3d%3d here]. &lt;br /&gt;
&lt;br /&gt;
== Inquiries ==&lt;br /&gt;
&lt;br /&gt;
Please contact the project leader Boaz Gelbord (bgelbord at wgen dot net) if you have questions about the project or you would like to inquire about contributing to the project.&lt;br /&gt;
&lt;br /&gt;
== About the Security Spending Benchmarks Project ==&lt;br /&gt;
&lt;br /&gt;
The Security Spending Benchmarks Project seeks to produce guidance and an industry accepted benchmark for justifying overall Web application security spending. We want to quantify how many dollars and human resources should be allocated towards the software development life-cycle, security training, security software/tools, independent third-party reviews, Web application firewalls, etc. This project is motivated by the fact that:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;There are few, if any, industry standard benchmarks for executive management to consider when deciding what is a reasonable amount of resources to spend on Web application security in or out of the software development processes.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Spending on security helps mitigate risks whose potential costs are often difficult to quantify, thereby making justifying and obtaining security budgets difficult.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Many business initiatives require organizations to take “reasonable measures” and “adhere to best practices” for developing, delivering, and/or hosting secure Web application, but there is no industry consensus or data repositories on how this translates into monetary terms.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Smaller organizations outside of highly regulated industries purchase and deploy Web applications with no realistic ability to evaluate their security program.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Producing a less secure Web application may be less expensive than producing a more secure version of the same software. Organization that have invested development resources into software security may not be able to charge a premium for this investment because there is no reference point for the investment.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The survey was formulated with the help of our project partners to address the following questions and many others: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;What percentage of a Web application development groups headcount is dedicated towards security?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards Web application security as a percentage of software development and overall operational IT security costs?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Where do Web application security budget come from?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards security education?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Data Collection &amp;amp; Distribution ==&lt;br /&gt;
&lt;br /&gt;
We utilize the SurveyMonkey system to host surveys conducted for the OWASP SSB Project. We do not collect any publicly identifiable information including names, addresses, employer, email addresses, etc. from the respondents. While we expect a limited number of respondents trying to intentionally skew the results, we take precautions to limit the potential while not creating unnecessary overhead. We control survey access via username/password, as well as through a trusted network of contacts. All information collected is made available through Survey Monkey.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Status  == &lt;br /&gt;
&lt;br /&gt;
Planned Q2 Timeline:&lt;br /&gt;
&lt;br /&gt;
1. April 1-15: Discuss thematic priorities with partners. Expand partner network.&amp;lt;br /&amp;gt;&lt;br /&gt;
2. April 15-30: Formulate survey questions based on identified thematic priorities &amp;lt;br /&amp;gt;&lt;br /&gt;
3. May 1st-May 15th: Collect survey responses through partner network.&amp;lt;br /&amp;gt;&lt;br /&gt;
4. May 15th-May 31st: Analyze results and produce draft report.&amp;lt;br /&amp;gt;&lt;br /&gt;
5. June 1st - June 15th: Get partner feedback on draft and make edits.&amp;lt;br /&amp;gt;&lt;br /&gt;
6. June 15th: Publish final report&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Q1 Timeline:&lt;br /&gt;
&lt;br /&gt;
1. Completing the project description text and finalizing the proposed survey questions. (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
2. January 12th - Open up survey to respondents (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
3. February 6 (extended from Jan 26) - Close survey (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
4. February 6th - Survey Analysis Begins (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
5. February 6th-20th - Boaz Gelbord and Jeremiah Grossman to edit draft report (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
6. February 20th- Decision point whether to include late submissions (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
7. February 20th - Circulate draft report to partners with raw data, request to keep data confidential prior to publication. (DONE) &amp;lt;br/&amp;gt;&lt;br /&gt;
8. March 19th (was March 15th) - Publish report after integrating partner feedback. Generate community interest and discussion around results.(CURRENT)&amp;lt;br/&amp;gt;&lt;br /&gt;
9. After March 19th - Coordinate formal acceptance of deliverable by OWASP and plan further steps for the project.&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== News Coverage of OWASP SSB Project ==&lt;br /&gt;
&lt;br /&gt;
SC Magazine: [http://www.scmagazineus.com/OWASP-Security-Spending-Benchmarks-Report-published/article/129116/ OWASP Security Spending Benchmarks Report Published]&lt;br /&gt;
&lt;br /&gt;
Dark Reading: [http://www.darkreading.com/security/app-security/showArticle.jhtml?articleID=215901240 Web Application Security Spending Relatively Unscathed by Poor Economy]&lt;br /&gt;
&lt;br /&gt;
Search Security: [http://searchsecurity.techtarget.com/news/article/0,289142,sid14_gci1351731,00.html More companies seek third-party code review, survey finds]&lt;br /&gt;
&lt;br /&gt;
Search Security (Germany): [http://www.searchsecurity.de/themenbereiche/applikationssicherheit/sichere-software-entwicklung/articles/177103 Drittanbieter-Code-Review und geschulte Programmierer bevorzugt]&lt;br /&gt;
&lt;br /&gt;
PC World: [http://www.pcworld.com/businesscenter/article/162012/survey_gauges_web_application_security_spending.html Survey Guages Web Application Security Spending]&lt;br /&gt;
&lt;br /&gt;
Info World [http://www.infoworld.com/article/09/03/26/Survey_gauges_Web_application_security_spending_1.html Survey Gauges Web Application Security Spending]&lt;br /&gt;
&lt;br /&gt;
Network World [http://www.networkworld.com/news/2009/032609-survey-gauges-web-application-security.html Survey Gauges Web Application Security Spending]&lt;br /&gt;
&lt;br /&gt;
The IT Chronicle [http://www.theitchronicle.com/content/survey-gauges-web-application-security-spending Survey Gauges Web Application Security Spending]&lt;br /&gt;
&lt;br /&gt;
The Industry Standard [http://www.thestandard.com/news/2009/03/26/survey-gauges-web-application-security-spending Survey Gauges Web Application Security Spending]&lt;br /&gt;
&lt;br /&gt;
CIO.com [http://www.cio.com/article/486881/Survey_Gauges_Web_Application_Security_Spending Survey Gauges Web Application Security Spending]&lt;br /&gt;
&lt;br /&gt;
CIO Espana [http://www.idg.es/cio/Mas-de-un-25_por_ciento-de-las-empresas-elevara-su-gasto-en-seguridad-de-aplicaciones-Web/doc78597-seguridad.htm Más de un 25% de las empresas elevará su gasto en seguridad de aplicaciones Web]&lt;br /&gt;
&lt;br /&gt;
Information Week [http://www.informationweek.com/blog/main/archives/2009/03/firms_taking_we.html Firms Taking Web App Security (More) Seriously]&lt;br /&gt;
&lt;br /&gt;
Search Security [http://securitywireweekly.blogs.techtarget.com/2009/03/25/owasp-security-benchmark-study-mobile-threats-real/ Podcast]&lt;br /&gt;
&lt;br /&gt;
Search Security [http://searchsecurity.techtarget.com/video/0,297151,sid14_gci1352074,00.html Video Interview with Boaz Gelbord]&lt;br /&gt;
&lt;br /&gt;
CIO India [http://www.cio.in/news/viewArticle/ARTICLEID=5931602 Web Apps Security Spending Rising]&lt;br /&gt;
&lt;br /&gt;
== Project Leadership  ==&lt;br /&gt;
The Security Spending Benchmarks Project Leader is [http://www.boazgelbord.com/ Boaz Gelbord] (Executive Director of Information Security, Wireless Generation). Boaz can be reached directly at '''bgelbord AT wgen.net''' with any questions or feedback. Jeremiah Grossman (Founder &amp;amp; CTO, WhiteHat Security) is also closely assisting in the effort.&lt;br /&gt;
&lt;br /&gt;
== Project Contributors  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:AppSecLogo.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Cenzic.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Cigital_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Denim_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:echelonone.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:eema.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Image:Fortify_logo.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:GDS_LOGO_SMALL.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Ifis_logo.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:MetroSITEGroup.jpg]] &amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:NCircle-logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Imperva_Logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Sectheory-logo-2.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Logo_securosis.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Tssci.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:TTT_logo_2008.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Whitehat_security_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;/div&gt;</summary>
		<author><name>Bgelbord</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=57487</id>
		<title>Category:OWASP Security Spending Benchmarks</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=57487"/>
				<updated>2009-03-27T19:47:26Z</updated>
		
		<summary type="html">&lt;p&gt;Bgelbord: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[:Category:OWASP Project]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Security Spending Benchmarks Project Report March 2009 ==&lt;br /&gt;
&lt;br /&gt;
The first report of the OWASP Security Spending Benchmarks Report is now available. It can be found at the following link:&lt;br /&gt;
&lt;br /&gt;
[[http://www.owasp.org/images/b/b2/OWASP_SSB_Project_Report_March_2009.pdf PDF Download]].&lt;br /&gt;
&lt;br /&gt;
There are a number of key findings in the study:&lt;br /&gt;
&lt;br /&gt;
* Organizations that have suffered a public data breach spend more on security in the development process than those that have not.&lt;br /&gt;
&lt;br /&gt;
* Web application security spending is expected to either stay flat or increase in nearly two thirds of companies.&lt;br /&gt;
&lt;br /&gt;
* Half of respondents consider security experience important when hiring developers,  and a majority provide their developers with security training. 38% have a third party firm conduct a security review of outsourced code.&lt;br /&gt;
       &lt;br /&gt;
* At least 61% of respondents perform an independent third party security review before deploying a Web application while 17% do not (the remainder do not know or do so when requested by customers).&lt;br /&gt;
&lt;br /&gt;
* Just under half of the surveyed organizations have Web application firewalls deployed for at least some of their Web applications.&lt;br /&gt;
&lt;br /&gt;
== Raw Data ==&lt;br /&gt;
&lt;br /&gt;
Transparency is a key principle of the OWASP SSB Project. For this reason all raw survey results are made available to the community. We welcome additional commentary and interpretations on the survey data. The raw survey data can be found [https://www.surveymonkey.com/sr_detail.aspx?sm=6RXm2J2aqar1MT7JlandR0MYzVFmx25FwQ9trvJH1JG4GcuRCMp3TAkaCJyNCQYrtI1Ny025AnORe0Y3lU%2bj7w%3d%3d here]. &lt;br /&gt;
&lt;br /&gt;
== Inquiries ==&lt;br /&gt;
&lt;br /&gt;
Please contact the project leader Boaz Gelbord (bgelbord at wgen dot net) if you have questions about the project or you would like to inquire about contributing to the project.&lt;br /&gt;
&lt;br /&gt;
== About the Security Spending Benchmarks Project ==&lt;br /&gt;
&lt;br /&gt;
The Security Spending Benchmarks Project seeks to produce guidance and an industry accepted benchmark for justifying overall Web application security spending. We want to quantify how many dollars and human resources should be allocated towards the software development life-cycle, security training, security software/tools, independent third-party reviews, Web application firewalls, etc. This project is motivated by the fact that:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;There are few, if any, industry standard benchmarks for executive management to consider when deciding what is a reasonable amount of resources to spend on Web application security in or out of the software development processes.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Spending on security helps mitigate risks whose potential costs are often difficult to quantify, thereby making justifying and obtaining security budgets difficult.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Many business initiatives require organizations to take “reasonable measures” and “adhere to best practices” for developing, delivering, and/or hosting secure Web application, but there is no industry consensus or data repositories on how this translates into monetary terms.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Smaller organizations outside of highly regulated industries purchase and deploy Web applications with no realistic ability to evaluate their security program.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Producing a less secure Web application may be less expensive than producing a more secure version of the same software. Organization that have invested development resources into software security may not be able to charge a premium for this investment because there is no reference point for the investment.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The survey was formulated with the help of our project partners to address the following questions and many others: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;What percentage of a Web application development groups headcount is dedicated towards security?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards Web application security as a percentage of software development and overall operational IT security costs?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Where do Web application security budget come from?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards security education?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Data Collection &amp;amp; Distribution ==&lt;br /&gt;
&lt;br /&gt;
We utilize the SurveyMonkey system to host surveys conducted for the OWASP SSB Project. We do not collect any publicly identifiable information including names, addresses, employer, email addresses, etc. from the respondents. While we expect a limited number of respondents trying to intentionally skew the results, we take precautions to limit the potential while not creating unnecessary overhead. We control survey access via username/password, as well as through a trusted network of contacts. All information collected is made available through Survey Monkey.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Status  == &lt;br /&gt;
&lt;br /&gt;
Planned Q2 Timeline:&lt;br /&gt;
&lt;br /&gt;
1. April 1-15: Discuss thematic priorities with partners. Expand partner network.&amp;lt;br /&amp;gt;&lt;br /&gt;
2. April 15-30: Formulate survey questions based on identified thematic priorities &amp;lt;br /&amp;gt;&lt;br /&gt;
3. May 1st-May 15th: Collect survey responses through partner network.&amp;lt;br /&amp;gt;&lt;br /&gt;
4. May 15th-May 31st: Analyze results and produce draft report.&amp;lt;br /&amp;gt;&lt;br /&gt;
5. June 1st - June 15th: Get partner feedback on draft and make edits.&amp;lt;br /&amp;gt;&lt;br /&gt;
6. June 15th: Publish final report&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Q1 Timeline:&lt;br /&gt;
&lt;br /&gt;
1. Completing the project description text and finalizing the proposed survey questions. (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
2. January 12th - Open up survey to respondents (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
3. February 6 (extended from Jan 26) - Close survey (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
4. February 6th - Survey Analysis Begins (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
5. February 6th-20th - Boaz Gelbord and Jeremiah Grossman to edit draft report (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
6. February 20th- Decision point whether to include late submissions (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
7. February 20th - Circulate draft report to partners with raw data, request to keep data confidential prior to publication. (DONE) &amp;lt;br/&amp;gt;&lt;br /&gt;
8. March 19th (was March 15th) - Publish report after integrating partner feedback. Generate community interest and discussion around results.(CURRENT)&amp;lt;br/&amp;gt;&lt;br /&gt;
9. After March 19th - Coordinate formal acceptance of deliverable by OWASP and plan further steps for the project.&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== News Coverage of OWASP SSB Project ==&lt;br /&gt;
&lt;br /&gt;
SC Magazine: [http://www.scmagazineus.com/OWASP-Security-Spending-Benchmarks-Report-published/article/129116/ OWASP Security Spending Benchmarks Report Published]&lt;br /&gt;
&lt;br /&gt;
Dark Reading: [http://www.darkreading.com/security/app-security/showArticle.jhtml?articleID=215901240 Web Application Security Spending Relatively Unscathed by Poor Economy]&lt;br /&gt;
&lt;br /&gt;
Search Security: [http://searchsecurity.techtarget.com/news/article/0,289142,sid14_gci1351731,00.html More companies seek third-party code review, survey finds]&lt;br /&gt;
&lt;br /&gt;
Search Security (Germany): [http://www.searchsecurity.de/themenbereiche/applikationssicherheit/sichere-software-entwicklung/articles/177103 Drittanbieter-Code-Review und geschulte Programmierer bevorzugt]&lt;br /&gt;
&lt;br /&gt;
PC World: [http://www.pcworld.com/businesscenter/article/162012/survey_gauges_web_application_security_spending.html Survey Guages Web Application Security Spending]&lt;br /&gt;
&lt;br /&gt;
Info World [http://www.infoworld.com/article/09/03/26/Survey_gauges_Web_application_security_spending_1.html Survey Gauges Web Application Security Spending]&lt;br /&gt;
&lt;br /&gt;
Network World [http://www.networkworld.com/news/2009/032609-survey-gauges-web-application-security.html Survey Gauges Web Application Security Spending]&lt;br /&gt;
&lt;br /&gt;
The IT Chronicle [http://www.theitchronicle.com/content/survey-gauges-web-application-security-spending Survey Gauges Web Application Security Spending]&lt;br /&gt;
&lt;br /&gt;
The Industry Standard [http://www.thestandard.com/news/2009/03/26/survey-gauges-web-application-security-spending Survey Gauges Web Application Security Spending]&lt;br /&gt;
&lt;br /&gt;
CIO.com [http://www.cio.com/article/486881/Survey_Gauges_Web_Application_Security_Spending Survey Gauges Web Application Security Spending]&lt;br /&gt;
&lt;br /&gt;
CIO Espana [http://www.idg.es/cio/Mas-de-un-25_por_ciento-de-las-empresas-elevara-su-gasto-en-seguridad-de-aplicaciones-Web/doc78597-seguridad.htm Más de un 25% de las empresas elevará su gasto en seguridad de aplicaciones Web]&lt;br /&gt;
&lt;br /&gt;
Information Week [http://www.informationweek.com/blog/main/archives/2009/03/firms_taking_we.html Firms Taking Web App Security (More) Seriously]&lt;br /&gt;
&lt;br /&gt;
Search Security [http://securitywireweekly.blogs.techtarget.com/2009/03/25/owasp-security-benchmark-study-mobile-threats-real/ Podcast]&lt;br /&gt;
&lt;br /&gt;
Search Security [http://searchsecurity.techtarget.com/video/0,297151,sid14_gci1352074,00.html Video Interview with Boaz Gelbord]&lt;br /&gt;
&lt;br /&gt;
== Project Leadership  ==&lt;br /&gt;
The Security Spending Benchmarks Project Leader is [http://www.boazgelbord.com/ Boaz Gelbord] (Executive Director of Information Security, Wireless Generation). Boaz can be reached directly at '''bgelbord AT wgen.net''' with any questions or feedback. Jeremiah Grossman (Founder &amp;amp; CTO, WhiteHat Security) is also closely assisting in the effort.&lt;br /&gt;
&lt;br /&gt;
== Project Contributors  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:AppSecLogo.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Cenzic.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Cigital_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Denim_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:echelonone.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:eema.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Image:Fortify_logo.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:GDS_LOGO_SMALL.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Ifis_logo.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:MetroSITEGroup.jpg]] &amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:NCircle-logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Imperva_Logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Sectheory-logo-2.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Logo_securosis.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Tssci.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:TTT_logo_2008.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Whitehat_security_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;/div&gt;</summary>
		<author><name>Bgelbord</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=57455</id>
		<title>Category:OWASP Security Spending Benchmarks</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=57455"/>
				<updated>2009-03-27T15:43:15Z</updated>
		
		<summary type="html">&lt;p&gt;Bgelbord: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[:Category:OWASP Project]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Security Spending Benchmarks Project Report March 2009 ==&lt;br /&gt;
&lt;br /&gt;
The first report of the OWASP Security Spending Benchmarks Report is now available. It can be found at the following link:&lt;br /&gt;
&lt;br /&gt;
[[http://www.owasp.org/images/b/b2/OWASP_SSB_Project_Report_March_2009.pdf PDF Download]].&lt;br /&gt;
&lt;br /&gt;
There are a number of key findings in the study:&lt;br /&gt;
&lt;br /&gt;
* Organizations that have suffered a public data breach spend more on security in the development process than those that have not.&lt;br /&gt;
&lt;br /&gt;
* Web application security spending is expected to either stay flat or increase in nearly two thirds of companies.&lt;br /&gt;
&lt;br /&gt;
* Half of respondents consider security experience important when hiring developers,  and a majority provide their developers with security training. 38% have a third party firm conduct a security review of outsourced code.&lt;br /&gt;
       &lt;br /&gt;
* At least 61% of respondents perform an independent third party security review before deploying a Web application while 17% do not (the remainder do not know or do so when requested by customers).&lt;br /&gt;
&lt;br /&gt;
* Just under half of the surveyed organizations have Web application firewalls deployed for at least some of their Web applications.&lt;br /&gt;
&lt;br /&gt;
== Raw Data ==&lt;br /&gt;
&lt;br /&gt;
Transparency is a key principle of the OWASP SSB Project. For this reason all raw survey results are made available to the community. We welcome additional commentary and interpretations on the survey data. The raw survey data can be found [https://www.surveymonkey.com/sr_detail.aspx?sm=6RXm2J2aqar1MT7JlandR0MYzVFmx25FwQ9trvJH1JG4GcuRCMp3TAkaCJyNCQYrtI1Ny025AnORe0Y3lU%2bj7w%3d%3d here]. &lt;br /&gt;
&lt;br /&gt;
== Inquiries ==&lt;br /&gt;
&lt;br /&gt;
Please contact the project leader Boaz Gelbord (bgelbord at wgen dot net) if you have questions about the project or you would like to inquire about contributing to the project.&lt;br /&gt;
&lt;br /&gt;
== About the Security Spending Benchmarks Project ==&lt;br /&gt;
&lt;br /&gt;
The Security Spending Benchmarks Project seeks to produce guidance and an industry accepted benchmark for justifying overall Web application security spending. We want to quantify how many dollars and human resources should be allocated towards the software development life-cycle, security training, security software/tools, independent third-party reviews, Web application firewalls, etc. This project is motivated by the fact that:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;There are few, if any, industry standard benchmarks for executive management to consider when deciding what is a reasonable amount of resources to spend on Web application security in or out of the software development processes.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Spending on security helps mitigate risks whose potential costs are often difficult to quantify, thereby making justifying and obtaining security budgets difficult.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Many business initiatives require organizations to take “reasonable measures” and “adhere to best practices” for developing, delivering, and/or hosting secure Web application, but there is no industry consensus or data repositories on how this translates into monetary terms.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Smaller organizations outside of highly regulated industries purchase and deploy Web applications with no realistic ability to evaluate their security program.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Producing a less secure Web application may be less expensive than producing a more secure version of the same software. Organization that have invested development resources into software security may not be able to charge a premium for this investment because there is no reference point for the investment.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The survey was formulated with the help of our project partners to address the following questions and many others: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;What percentage of a Web application development groups headcount is dedicated towards security?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards Web application security as a percentage of software development and overall operational IT security costs?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Where do Web application security budget come from?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards security education?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Data Collection &amp;amp; Distribution ==&lt;br /&gt;
&lt;br /&gt;
We utilize the SurveyMonkey system to host surveys conducted for the OWASP SSB Project. We do not collect any publicly identifiable information including names, addresses, employer, email addresses, etc. from the respondents. While we expect a limited number of respondents trying to intentionally skew the results, we take precautions to limit the potential while not creating unnecessary overhead. We control survey access via username/password, as well as through a trusted network of contacts. All information collected is made available through Survey Monkey.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Status  == &lt;br /&gt;
&lt;br /&gt;
Planned Q2 Timeline:&lt;br /&gt;
&lt;br /&gt;
1. April 1-15: Discuss thematic priorities with partners. Expand partner network.&amp;lt;br /&amp;gt;&lt;br /&gt;
2. April 15-30: Formulate survey questions based on identified thematic priorities &amp;lt;br /&amp;gt;&lt;br /&gt;
3. May 1st-May 15th: Collect survey responses through partner network.&amp;lt;br /&amp;gt;&lt;br /&gt;
4. May 15th-May 31st: Analyze results and produce draft report.&amp;lt;br /&amp;gt;&lt;br /&gt;
5. June 1st - June 15th: Get partner feedback on draft and make edits.&amp;lt;br /&amp;gt;&lt;br /&gt;
6. June 15th: Publish final report&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Q1 Timeline:&lt;br /&gt;
&lt;br /&gt;
1. Completing the project description text and finalizing the proposed survey questions. (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
2. January 12th - Open up survey to respondents (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
3. February 6 (extended from Jan 26) - Close survey (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
4. February 6th - Survey Analysis Begins (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
5. February 6th-20th - Boaz Gelbord and Jeremiah Grossman to edit draft report (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
6. February 20th- Decision point whether to include late submissions (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
7. February 20th - Circulate draft report to partners with raw data, request to keep data confidential prior to publication. (DONE) &amp;lt;br/&amp;gt;&lt;br /&gt;
8. March 19th (was March 15th) - Publish report after integrating partner feedback. Generate community interest and discussion around results.(CURRENT)&amp;lt;br/&amp;gt;&lt;br /&gt;
9. After March 19th - Coordinate formal acceptance of deliverable by OWASP and plan further steps for the project.&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== News Coverage of OWASP SSB Project ==&lt;br /&gt;
&lt;br /&gt;
SC Magazine: [http://www.scmagazineus.com/OWASP-Security-Spending-Benchmarks-Report-published/article/129116/ OWASP Security Spending Benchmarks Report Published]&lt;br /&gt;
&lt;br /&gt;
Dark Reading: [http://www.darkreading.com/security/app-security/showArticle.jhtml?articleID=215901240 Web Application Security Spending Relatively Unscathed by Poor Economy]&lt;br /&gt;
&lt;br /&gt;
Search Security: [http://searchsecurity.techtarget.com/news/article/0,289142,sid14_gci1351731,00.html More companies seek third-party code review, survey finds]&lt;br /&gt;
&lt;br /&gt;
Search Security (Germany): [http://www.searchsecurity.de/themenbereiche/applikationssicherheit/sichere-software-entwicklung/articles/177103 Drittanbieter-Code-Review und geschulte Programmierer bevorzugt]&lt;br /&gt;
&lt;br /&gt;
PC World: [http://www.pcworld.com/businesscenter/article/162012/survey_gauges_web_application_security_spending.html Survey Guages Web Application Security Spending]&lt;br /&gt;
&lt;br /&gt;
Info World [http://www.infoworld.com/article/09/03/26/Survey_gauges_Web_application_security_spending_1.html Survey Gauges Web Application Security Spending]&lt;br /&gt;
&lt;br /&gt;
Network World [http://www.networkworld.com/news/2009/032609-survey-gauges-web-application-security.html Survey Gauges Web Application Security Spending]&lt;br /&gt;
&lt;br /&gt;
The IT Chronicle [http://www.theitchronicle.com/content/survey-gauges-web-application-security-spending Survey Gauges Web Application Security Spending]&lt;br /&gt;
&lt;br /&gt;
The Industry Standard [http://www.thestandard.com/news/2009/03/26/survey-gauges-web-application-security-spending Survey Gauges Web Application Security Spending]&lt;br /&gt;
&lt;br /&gt;
CIO.com [http://www.cio.com/article/486881/Survey_Gauges_Web_Application_Security_Spending Survey Gauges Web Application Security Spending]&lt;br /&gt;
&lt;br /&gt;
CIO Espana [http://www.idg.es/cio/Mas-de-un-25_por_ciento-de-las-empresas-elevara-su-gasto-en-seguridad-de-aplicaciones-Web/doc78597-seguridad.htm Más de un 25% de las empresas elevará su gasto en seguridad de aplicaciones Web]&lt;br /&gt;
&lt;br /&gt;
Information Week [http://www.informationweek.com/blog/main/archives/2009/03/firms_taking_we.html Firms Taking Web App Security (More) Seriously]&lt;br /&gt;
&lt;br /&gt;
Search Security [http://securitywireweekly.blogs.techtarget.com/2009/03/25/owasp-security-benchmark-study-mobile-threats-real/ Podcast]&lt;br /&gt;
&lt;br /&gt;
== Project Leadership  ==&lt;br /&gt;
The Security Spending Benchmarks Project Leader is [http://www.boazgelbord.com/ Boaz Gelbord] (Executive Director of Information Security, Wireless Generation). Boaz can be reached directly at '''bgelbord AT wgen.net''' with any questions or feedback. Jeremiah Grossman (Founder &amp;amp; CTO, WhiteHat Security) is also closely assisting in the effort.&lt;br /&gt;
&lt;br /&gt;
== Project Contributors  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:AppSecLogo.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Cenzic.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Cigital_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Denim_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:echelonone.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:eema.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Image:Fortify_logo.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:GDS_LOGO_SMALL.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Ifis_logo.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:MetroSITEGroup.jpg]] &amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:NCircle-logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Imperva_Logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Sectheory-logo-2.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Logo_securosis.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Tssci.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:TTT_logo_2008.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Whitehat_security_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;/div&gt;</summary>
		<author><name>Bgelbord</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=57425</id>
		<title>Category:OWASP Security Spending Benchmarks</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=57425"/>
				<updated>2009-03-26T21:16:54Z</updated>
		
		<summary type="html">&lt;p&gt;Bgelbord: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[:Category:OWASP Project]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Security Spending Benchmarks Project Report March 2009 ==&lt;br /&gt;
&lt;br /&gt;
The first report of the OWASP Security Spending Benchmarks Report is now available. It can be found at the following link:&lt;br /&gt;
&lt;br /&gt;
[[http://www.owasp.org/images/b/b2/OWASP_SSB_Project_Report_March_2009.pdf PDF Download]].&lt;br /&gt;
&lt;br /&gt;
There are a number of key findings in the study:&lt;br /&gt;
&lt;br /&gt;
* Organizations that have suffered a public data breach spend more on security in the development process than those that have not.&lt;br /&gt;
&lt;br /&gt;
* Web application security spending is expected to either stay flat or increase in nearly two thirds of companies.&lt;br /&gt;
&lt;br /&gt;
* Half of respondents consider security experience important when hiring developers,  and a majority provide their developers with security training. 38% have a third party firm conduct a security review of outsourced code.&lt;br /&gt;
       &lt;br /&gt;
* At least 61% of respondents perform an independent third party security review before deploying a Web application while 17% do not (the remainder do not know or do so when requested by customers).&lt;br /&gt;
&lt;br /&gt;
* Just under half of the surveyed organizations have Web application firewalls deployed for at least some of their Web applications.&lt;br /&gt;
&lt;br /&gt;
== Raw Data ==&lt;br /&gt;
&lt;br /&gt;
Transparency is a key principle of the OWASP SSB Project. For this reason all raw survey results are made available to the community. We welcome additional commentary and interpretations on the survey data. The raw survey data can be found [https://www.surveymonkey.com/sr_detail.aspx?sm=6RXm2J2aqar1MT7JlandR0MYzVFmx25FwQ9trvJH1JG4GcuRCMp3TAkaCJyNCQYrtI1Ny025AnORe0Y3lU%2bj7w%3d%3d here]. &lt;br /&gt;
&lt;br /&gt;
== Inquiries ==&lt;br /&gt;
&lt;br /&gt;
Please contact the project leader Boaz Gelbord (bgelbord at wgen dot net) if you have questions about the project or you would like to inquire about contributing to the project.&lt;br /&gt;
&lt;br /&gt;
== About the Security Spending Benchmarks Project ==&lt;br /&gt;
&lt;br /&gt;
The Security Spending Benchmarks Project seeks to produce guidance and an industry accepted benchmark for justifying overall Web application security spending. We want to quantify how many dollars and human resources should be allocated towards the software development life-cycle, security training, security software/tools, independent third-party reviews, Web application firewalls, etc. This project is motivated by the fact that:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;There are few, if any, industry standard benchmarks for executive management to consider when deciding what is a reasonable amount of resources to spend on Web application security in or out of the software development processes.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Spending on security helps mitigate risks whose potential costs are often difficult to quantify, thereby making justifying and obtaining security budgets difficult.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Many business initiatives require organizations to take “reasonable measures” and “adhere to best practices” for developing, delivering, and/or hosting secure Web application, but there is no industry consensus or data repositories on how this translates into monetary terms.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Smaller organizations outside of highly regulated industries purchase and deploy Web applications with no realistic ability to evaluate their security program.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Producing a less secure Web application may be less expensive than producing a more secure version of the same software. Organization that have invested development resources into software security may not be able to charge a premium for this investment because there is no reference point for the investment.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The survey was formulated with the help of our project partners to address the following questions and many others: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;What percentage of a Web application development groups headcount is dedicated towards security?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards Web application security as a percentage of software development and overall operational IT security costs?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Where do Web application security budget come from?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards security education?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Data Collection &amp;amp; Distribution ==&lt;br /&gt;
&lt;br /&gt;
We utilize the SurveyMonkey system to host surveys conducted for the OWASP SSB Project. We do not collect any publicly identifiable information including names, addresses, employer, email addresses, etc. from the respondents. While we expect a limited number of respondents trying to intentionally skew the results, we take precautions to limit the potential while not creating unnecessary overhead. We control survey access via username/password, as well as through a trusted network of contacts. All information collected is made available through Survey Monkey.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Status  == &lt;br /&gt;
&lt;br /&gt;
Planned Q2 Timeline:&lt;br /&gt;
&lt;br /&gt;
1. April 1-15: Discuss thematic priorities with partners. Expand partner network.&amp;lt;br /&amp;gt;&lt;br /&gt;
2. April 15-30: Formulate survey questions based on identified thematic priorities &amp;lt;br /&amp;gt;&lt;br /&gt;
3. May 1st-May 15th: Collect survey responses through partner network.&amp;lt;br /&amp;gt;&lt;br /&gt;
4. May 15th-May 31st: Analyze results and produce draft report.&amp;lt;br /&amp;gt;&lt;br /&gt;
5. June 1st - June 15th: Get partner feedback on draft and make edits.&amp;lt;br /&amp;gt;&lt;br /&gt;
6. June 15th: Publish final report&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Q1 Timeline:&lt;br /&gt;
&lt;br /&gt;
1. Completing the project description text and finalizing the proposed survey questions. (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
2. January 12th - Open up survey to respondents (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
3. February 6 (extended from Jan 26) - Close survey (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
4. February 6th - Survey Analysis Begins (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
5. February 6th-20th - Boaz Gelbord and Jeremiah Grossman to edit draft report (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
6. February 20th- Decision point whether to include late submissions (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
7. February 20th - Circulate draft report to partners with raw data, request to keep data confidential prior to publication. (DONE) &amp;lt;br/&amp;gt;&lt;br /&gt;
8. March 19th (was March 15th) - Publish report after integrating partner feedback. Generate community interest and discussion around results.(CURRENT)&amp;lt;br/&amp;gt;&lt;br /&gt;
9. After March 19th - Coordinate formal acceptance of deliverable by OWASP and plan further steps for the project.&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== News Coverage of OWASP SSB Project ==&lt;br /&gt;
&lt;br /&gt;
SC Magazine: [http://www.scmagazineus.com/OWASP-Security-Spending-Benchmarks-Report-published/article/129116/ OWASP Security Spending Benchmarks Report Published]&lt;br /&gt;
&lt;br /&gt;
Dark Reading: [http://www.darkreading.com/security/app-security/showArticle.jhtml?articleID=215901240 Web Application Security Spending Relatively Unscathed by Poor Economy]&lt;br /&gt;
&lt;br /&gt;
Search Security: [http://searchsecurity.techtarget.com/news/article/0,289142,sid14_gci1351731,00.html More companies seek third-party code review, survey finds]&lt;br /&gt;
&lt;br /&gt;
Search Security (Germany): [http://www.searchsecurity.de/themenbereiche/applikationssicherheit/sichere-software-entwicklung/articles/177103 Drittanbieter-Code-Review und geschulte Programmierer bevorzugt]&lt;br /&gt;
&lt;br /&gt;
PC World: [http://www.pcworld.com/businesscenter/article/162012/survey_gauges_web_application_security_spending.html Survey Guages Web Application Security Spending]&lt;br /&gt;
&lt;br /&gt;
Info World [http://www.infoworld.com/article/09/03/26/Survey_gauges_Web_application_security_spending_1.html Survey Gauges Web Application Security Spending]&lt;br /&gt;
&lt;br /&gt;
Network World [http://www.networkworld.com/news/2009/032609-survey-gauges-web-application-security.html Survey Gauges Web Application Security Spending]&lt;br /&gt;
&lt;br /&gt;
The IT Chronicle [http://www.theitchronicle.com/content/survey-gauges-web-application-security-spending Survey Gauges Web Application Security Spending]&lt;br /&gt;
&lt;br /&gt;
The Industry Standard [http://www.thestandard.com/news/2009/03/26/survey-gauges-web-application-security-spending Survey Gauges Web Application Security Spending]&lt;br /&gt;
&lt;br /&gt;
CIO.com [http://www.cio.com/article/486881/Survey_Gauges_Web_Application_Security_Spending Survey Gauges Web Application Security Spending]&lt;br /&gt;
&lt;br /&gt;
Search Security [http://securitywireweekly.blogs.techtarget.com/2009/03/25/owasp-security-benchmark-study-mobile-threats-real/ Podcast]&lt;br /&gt;
&lt;br /&gt;
== Project Leadership  ==&lt;br /&gt;
The Security Spending Benchmarks Project Leader is [http://www.boazgelbord.com/ Boaz Gelbord] (Executive Director of Information Security, Wireless Generation). Boaz can be reached directly at '''bgelbord AT wgen.net''' with any questions or feedback. Jeremiah Grossman (Founder &amp;amp; CTO, WhiteHat Security) is also closely assisting in the effort.&lt;br /&gt;
&lt;br /&gt;
== Project Contributors  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:AppSecLogo.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Cenzic.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Cigital_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Denim_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:echelonone.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:eema.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Image:Fortify_logo.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:GDS_LOGO_SMALL.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Ifis_logo.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:MetroSITEGroup.jpg]] &amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:NCircle-logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Imperva_Logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Sectheory-logo-2.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Logo_securosis.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Tssci.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:TTT_logo_2008.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Whitehat_security_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;/div&gt;</summary>
		<author><name>Bgelbord</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=57423</id>
		<title>Category:OWASP Security Spending Benchmarks</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=57423"/>
				<updated>2009-03-26T19:09:08Z</updated>
		
		<summary type="html">&lt;p&gt;Bgelbord: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[:Category:OWASP Project]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Security Spending Benchmarks Project Report March 2009 ==&lt;br /&gt;
&lt;br /&gt;
The first report of the OWASP Security Spending Benchmarks Report is now available. It can be found at the following link:&lt;br /&gt;
&lt;br /&gt;
[[http://www.owasp.org/images/b/b2/OWASP_SSB_Project_Report_March_2009.pdf PDF Download]].&lt;br /&gt;
&lt;br /&gt;
There are a number of key findings in the study:&lt;br /&gt;
&lt;br /&gt;
* Organizations that have suffered a public data breach spend more on security in the development process than those that have not.&lt;br /&gt;
&lt;br /&gt;
* Web application security spending is expected to either stay flat or increase in nearly two thirds of companies.&lt;br /&gt;
&lt;br /&gt;
* Half of respondents consider security experience important when hiring developers,  and a majority provide their developers with security training. 38% have a third party firm conduct a security review of outsourced code.&lt;br /&gt;
       &lt;br /&gt;
* At least 61% of respondents perform an independent third party security review before deploying a Web application while 17% do not (the remainder do not know or do so when requested by customers).&lt;br /&gt;
&lt;br /&gt;
* Just under half of the surveyed organizations have Web application firewalls deployed for at least some of their Web applications.&lt;br /&gt;
&lt;br /&gt;
== Raw Data ==&lt;br /&gt;
&lt;br /&gt;
Transparency is a key principle of the OWASP SSB Project. For this reason all raw survey results are made available to the community. We welcome additional commentary and interpretations on the survey data. The raw survey data can be found [https://www.surveymonkey.com/sr_detail.aspx?sm=6RXm2J2aqar1MT7JlandR0MYzVFmx25FwQ9trvJH1JG4GcuRCMp3TAkaCJyNCQYrtI1Ny025AnORe0Y3lU%2bj7w%3d%3d here]. &lt;br /&gt;
&lt;br /&gt;
== Inquiries ==&lt;br /&gt;
&lt;br /&gt;
Please contact the project leader Boaz Gelbord (bgelbord at wgen dot net) if you have questions about the project or you would like to inquire about contributing to the project.&lt;br /&gt;
&lt;br /&gt;
== About the Security Spending Benchmarks Project ==&lt;br /&gt;
&lt;br /&gt;
The Security Spending Benchmarks Project seeks to produce guidance and an industry accepted benchmark for justifying overall Web application security spending. We want to quantify how many dollars and human resources should be allocated towards the software development life-cycle, security training, security software/tools, independent third-party reviews, Web application firewalls, etc. This project is motivated by the fact that:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;There are few, if any, industry standard benchmarks for executive management to consider when deciding what is a reasonable amount of resources to spend on Web application security in or out of the software development processes.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Spending on security helps mitigate risks whose potential costs are often difficult to quantify, thereby making justifying and obtaining security budgets difficult.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Many business initiatives require organizations to take “reasonable measures” and “adhere to best practices” for developing, delivering, and/or hosting secure Web application, but there is no industry consensus or data repositories on how this translates into monetary terms.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Smaller organizations outside of highly regulated industries purchase and deploy Web applications with no realistic ability to evaluate their security program.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Producing a less secure Web application may be less expensive than producing a more secure version of the same software. Organization that have invested development resources into software security may not be able to charge a premium for this investment because there is no reference point for the investment.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The survey was formulated with the help of our project partners to address the following questions and many others: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;What percentage of a Web application development groups headcount is dedicated towards security?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards Web application security as a percentage of software development and overall operational IT security costs?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Where do Web application security budget come from?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards security education?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Data Collection &amp;amp; Distribution ==&lt;br /&gt;
&lt;br /&gt;
We utilize the SurveyMonkey system to host surveys conducted for the OWASP SSB Project. We do not collect any publicly identifiable information including names, addresses, employer, email addresses, etc. from the respondents. While we expect a limited number of respondents trying to intentionally skew the results, we take precautions to limit the potential while not creating unnecessary overhead. We control survey access via username/password, as well as through a trusted network of contacts. All information collected is made available through Survey Monkey.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Status  == &lt;br /&gt;
&lt;br /&gt;
Planned Q2 Timeline:&lt;br /&gt;
&lt;br /&gt;
1. April 1-15: Discuss thematic priorities with partners. Expand partner network.&amp;lt;br /&amp;gt;&lt;br /&gt;
2. April 15-30: Formulate survey questions based on identified thematic priorities &amp;lt;br /&amp;gt;&lt;br /&gt;
3. May 1st-May 15th: Collect survey responses through partner network.&amp;lt;br /&amp;gt;&lt;br /&gt;
4. May 15th-May 31st: Analyze results and produce draft report.&amp;lt;br /&amp;gt;&lt;br /&gt;
5. June 1st - June 15th: Get partner feedback on draft and make edits.&amp;lt;br /&amp;gt;&lt;br /&gt;
6. June 15th: Publish final report&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Q1 Timeline:&lt;br /&gt;
&lt;br /&gt;
1. Completing the project description text and finalizing the proposed survey questions. (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
2. January 12th - Open up survey to respondents (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
3. February 6 (extended from Jan 26) - Close survey (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
4. February 6th - Survey Analysis Begins (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
5. February 6th-20th - Boaz Gelbord and Jeremiah Grossman to edit draft report (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
6. February 20th- Decision point whether to include late submissions (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
7. February 20th - Circulate draft report to partners with raw data, request to keep data confidential prior to publication. (DONE) &amp;lt;br/&amp;gt;&lt;br /&gt;
8. March 19th (was March 15th) - Publish report after integrating partner feedback. Generate community interest and discussion around results.(CURRENT)&amp;lt;br/&amp;gt;&lt;br /&gt;
9. After March 19th - Coordinate formal acceptance of deliverable by OWASP and plan further steps for the project.&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== News Coverage of OWASP SSB Project ==&lt;br /&gt;
&lt;br /&gt;
SC Magazine: [http://www.scmagazineus.com/OWASP-Security-Spending-Benchmarks-Report-published/article/129116/ OWASP Security Spending Benchmarks Report Published]&lt;br /&gt;
&lt;br /&gt;
Dark Reading: [http://www.darkreading.com/security/app-security/showArticle.jhtml?articleID=215901240 Web Application Security Spending Relatively Unscathed by Poor Economy]&lt;br /&gt;
&lt;br /&gt;
Search Security: [http://searchsecurity.techtarget.com/news/article/0,289142,sid14_gci1351731,00.html More companies seek third-party code review, survey finds]&lt;br /&gt;
&lt;br /&gt;
Search Security (Germany): [http://www.searchsecurity.de/themenbereiche/applikationssicherheit/sichere-software-entwicklung/articles/177103 Drittanbieter-Code-Review und geschulte Programmierer bevorzugt]&lt;br /&gt;
&lt;br /&gt;
PC World: [http://www.pcworld.com/businesscenter/article/162012/survey_gauges_web_application_security_spending.html Survey Guages Web Application Security Spending]&lt;br /&gt;
&lt;br /&gt;
Info World [http://www.infoworld.com/article/09/03/26/Survey_gauges_Web_application_security_spending_1.html Survey Gauges Web Application Security Spending]&lt;br /&gt;
&lt;br /&gt;
Network World [http://www.networkworld.com/news/2009/032609-survey-gauges-web-application-security.html Survey Gauges Web Application Security Spending]&lt;br /&gt;
&lt;br /&gt;
The IT Chronicle [http://www.theitchronicle.com/content/survey-gauges-web-application-security-spending Survey Gauges Web Application Security Spending]&lt;br /&gt;
&lt;br /&gt;
The Industry Standard [http://www.thestandard.com/news/2009/03/26/survey-gauges-web-application-security-spending Survey Gauges Web Application Security Spending]&lt;br /&gt;
&lt;br /&gt;
Search Security [http://securitywireweekly.blogs.techtarget.com/2009/03/25/owasp-security-benchmark-study-mobile-threats-real/ Podcast]&lt;br /&gt;
&lt;br /&gt;
== Project Leadership  ==&lt;br /&gt;
The Security Spending Benchmarks Project Leader is [http://www.boazgelbord.com/ Boaz Gelbord] (Executive Director of Information Security, Wireless Generation). Boaz can be reached directly at '''bgelbord AT wgen.net''' with any questions or feedback. Jeremiah Grossman (Founder &amp;amp; CTO, WhiteHat Security) is also closely assisting in the effort.&lt;br /&gt;
&lt;br /&gt;
== Project Contributors  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:AppSecLogo.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Cenzic.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Cigital_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Denim_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:echelonone.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:eema.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Image:Fortify_logo.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:GDS_LOGO_SMALL.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Ifis_logo.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:MetroSITEGroup.jpg]] &amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:NCircle-logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Imperva_Logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Sectheory-logo-2.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Logo_securosis.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Tssci.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:TTT_logo_2008.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Whitehat_security_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;/div&gt;</summary>
		<author><name>Bgelbord</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=57422</id>
		<title>Category:OWASP Security Spending Benchmarks</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=57422"/>
				<updated>2009-03-26T18:32:38Z</updated>
		
		<summary type="html">&lt;p&gt;Bgelbord: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[:Category:OWASP Project]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Security Spending Benchmarks Project Report March 2009 ==&lt;br /&gt;
&lt;br /&gt;
The first report of the OWASP Security Spending Benchmarks Report is now available. It can be found at the following link:&lt;br /&gt;
&lt;br /&gt;
[[http://www.owasp.org/images/b/b2/OWASP_SSB_Project_Report_March_2009.pdf PDF Download]].&lt;br /&gt;
&lt;br /&gt;
There are a number of key findings in the study:&lt;br /&gt;
&lt;br /&gt;
* Organizations that have suffered a public data breach spend more on security in the development process than those that have not.&lt;br /&gt;
&lt;br /&gt;
* Web application security spending is expected to either stay flat or increase in nearly two thirds of companies.&lt;br /&gt;
&lt;br /&gt;
* Half of respondents consider security experience important when hiring developers,  and a majority provide their developers with security training. 38% have a third party firm conduct a security review of outsourced code.&lt;br /&gt;
       &lt;br /&gt;
* At least 61% of respondents perform an independent third party security review before deploying a Web application while 17% do not (the remainder do not know or do so when requested by customers).&lt;br /&gt;
&lt;br /&gt;
* Just under half of the surveyed organizations have Web application firewalls deployed for at least some of their Web applications.&lt;br /&gt;
&lt;br /&gt;
== Raw Data ==&lt;br /&gt;
&lt;br /&gt;
Transparency is a key principle of the OWASP SSB Project. For this reason all raw survey results are made available to the community. We welcome additional commentary and interpretations on the survey data. The raw survey data can be found [https://www.surveymonkey.com/sr_detail.aspx?sm=6RXm2J2aqar1MT7JlandR0MYzVFmx25FwQ9trvJH1JG4GcuRCMp3TAkaCJyNCQYrtI1Ny025AnORe0Y3lU%2bj7w%3d%3d here]. &lt;br /&gt;
&lt;br /&gt;
== Inquiries ==&lt;br /&gt;
&lt;br /&gt;
Please contact the project leader Boaz Gelbord (bgelbord at wgen dot net) if you have questions about the project or you would like to inquire about contributing to the project.&lt;br /&gt;
&lt;br /&gt;
== About the Security Spending Benchmarks Project ==&lt;br /&gt;
&lt;br /&gt;
The Security Spending Benchmarks Project seeks to produce guidance and an industry accepted benchmark for justifying overall Web application security spending. We want to quantify how many dollars and human resources should be allocated towards the software development life-cycle, security training, security software/tools, independent third-party reviews, Web application firewalls, etc. This project is motivated by the fact that:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;There are few, if any, industry standard benchmarks for executive management to consider when deciding what is a reasonable amount of resources to spend on Web application security in or out of the software development processes.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Spending on security helps mitigate risks whose potential costs are often difficult to quantify, thereby making justifying and obtaining security budgets difficult.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Many business initiatives require organizations to take “reasonable measures” and “adhere to best practices” for developing, delivering, and/or hosting secure Web application, but there is no industry consensus or data repositories on how this translates into monetary terms.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Smaller organizations outside of highly regulated industries purchase and deploy Web applications with no realistic ability to evaluate their security program.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Producing a less secure Web application may be less expensive than producing a more secure version of the same software. Organization that have invested development resources into software security may not be able to charge a premium for this investment because there is no reference point for the investment.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The survey was formulated with the help of our project partners to address the following questions and many others: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;What percentage of a Web application development groups headcount is dedicated towards security?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards Web application security as a percentage of software development and overall operational IT security costs?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Where do Web application security budget come from?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards security education?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Data Collection &amp;amp; Distribution ==&lt;br /&gt;
&lt;br /&gt;
We utilize the SurveyMonkey system to host surveys conducted for the OWASP SSB Project. We do not collect any publicly identifiable information including names, addresses, employer, email addresses, etc. from the respondents. While we expect a limited number of respondents trying to intentionally skew the results, we take precautions to limit the potential while not creating unnecessary overhead. We control survey access via username/password, as well as through a trusted network of contacts. All information collected is made available through Survey Monkey.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Status  == &lt;br /&gt;
&lt;br /&gt;
Planned Q2 Timeline:&lt;br /&gt;
&lt;br /&gt;
1. April 1-15: Discuss thematic priorities with partners. Expand partner network.&amp;lt;br /&amp;gt;&lt;br /&gt;
2. April 15-30: Formulate survey questions based on identified thematic priorities &amp;lt;br /&amp;gt;&lt;br /&gt;
3. May 1st-May 15th: Collect survey responses through partner network.&amp;lt;br /&amp;gt;&lt;br /&gt;
4. May 15th-May 31st: Analyze results and produce draft report.&amp;lt;br /&amp;gt;&lt;br /&gt;
5. June 1st - June 15th: Get partner feedback on draft and make edits.&amp;lt;br /&amp;gt;&lt;br /&gt;
6. June 15th: Publish final report&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Q1 Timeline:&lt;br /&gt;
&lt;br /&gt;
1. Completing the project description text and finalizing the proposed survey questions. (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
2. January 12th - Open up survey to respondents (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
3. February 6 (extended from Jan 26) - Close survey (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
4. February 6th - Survey Analysis Begins (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
5. February 6th-20th - Boaz Gelbord and Jeremiah Grossman to edit draft report (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
6. February 20th- Decision point whether to include late submissions (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
7. February 20th - Circulate draft report to partners with raw data, request to keep data confidential prior to publication. (DONE) &amp;lt;br/&amp;gt;&lt;br /&gt;
8. March 19th (was March 15th) - Publish report after integrating partner feedback. Generate community interest and discussion around results.(CURRENT)&amp;lt;br/&amp;gt;&lt;br /&gt;
9. After March 19th - Coordinate formal acceptance of deliverable by OWASP and plan further steps for the project.&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== News Coverage of OWASP SSB Project ==&lt;br /&gt;
&lt;br /&gt;
SC Magazine: [http://www.scmagazineus.com/OWASP-Security-Spending-Benchmarks-Report-published/article/129116/ OWASP Security Spending Benchmarks Report Published]&lt;br /&gt;
&lt;br /&gt;
Dark Reading: [http://www.darkreading.com/security/app-security/showArticle.jhtml?articleID=215901240 Web Application Security Spending Relatively Unscathed by Poor Economy]&lt;br /&gt;
&lt;br /&gt;
Search Security: [http://searchsecurity.techtarget.com/news/article/0,289142,sid14_gci1351731,00.html More companies seek third-party code review, survey finds]&lt;br /&gt;
&lt;br /&gt;
Search Security (Germany): [http://www.searchsecurity.de/themenbereiche/applikationssicherheit/sichere-software-entwicklung/articles/177103 Drittanbieter-Code-Review und geschulte Programmierer bevorzugt]&lt;br /&gt;
&lt;br /&gt;
PC World: [http://www.pcworld.com/businesscenter/article/162012/survey_gauges_web_application_security_spending.html Survey Guages Web Application Security Spending]&lt;br /&gt;
&lt;br /&gt;
Info World [http://www.infoworld.com/article/09/03/26/Survey_gauges_Web_application_security_spending_1.html Survey Gauges Web Application Security Spending]&lt;br /&gt;
&lt;br /&gt;
Network World [http://www.networkworld.com/news/2009/032609-survey-gauges-web-application-security.html Survey Gauges Web Application Security Spending]&lt;br /&gt;
&lt;br /&gt;
The IT Chronicle [http://www.theitchronicle.com/content/survey-gauges-web-application-security-spending Survey Gauges Web Application Security Spending]&lt;br /&gt;
&lt;br /&gt;
The Industry Standard [http://www.thestandard.com/news/2009/03/26/survey-gauges-web-application-security-spending Survey Gauges Web Application Security Spending]&lt;br /&gt;
&lt;br /&gt;
== Project Leadership  ==&lt;br /&gt;
The Security Spending Benchmarks Project Leader is [http://www.boazgelbord.com/ Boaz Gelbord] (Executive Director of Information Security, Wireless Generation). Boaz can be reached directly at '''bgelbord AT wgen.net''' with any questions or feedback. Jeremiah Grossman (Founder &amp;amp; CTO, WhiteHat Security) is also closely assisting in the effort.&lt;br /&gt;
&lt;br /&gt;
== Project Contributors  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:AppSecLogo.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Cenzic.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Cigital_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Denim_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:echelonone.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:eema.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Image:Fortify_logo.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:GDS_LOGO_SMALL.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Ifis_logo.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:MetroSITEGroup.jpg]] &amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:NCircle-logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Imperva_Logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Sectheory-logo-2.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Logo_securosis.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Tssci.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:TTT_logo_2008.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Whitehat_security_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;/div&gt;</summary>
		<author><name>Bgelbord</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=57416</id>
		<title>Category:OWASP Security Spending Benchmarks</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=57416"/>
				<updated>2009-03-26T17:37:28Z</updated>
		
		<summary type="html">&lt;p&gt;Bgelbord: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[:Category:OWASP Project]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Security Spending Benchmarks Project Report March 2009 ==&lt;br /&gt;
&lt;br /&gt;
The first report of the OWASP Security Spending Benchmarks Report is now available. It can be found at the following link:&lt;br /&gt;
&lt;br /&gt;
[[http://www.owasp.org/images/b/b2/OWASP_SSB_Project_Report_March_2009.pdf PDF Download]].&lt;br /&gt;
&lt;br /&gt;
There are a number of key findings in the study:&lt;br /&gt;
&lt;br /&gt;
* Organizations that have suffered a public data breach spend more on security in the development process than those that have not.&lt;br /&gt;
&lt;br /&gt;
* Web application security spending is expected to either stay flat or increase in nearly two thirds of companies.&lt;br /&gt;
&lt;br /&gt;
* Half of respondents consider security experience important when hiring developers,  and a majority provide their developers with security training. 38% have a third party firm conduct a security review of outsourced code.&lt;br /&gt;
       &lt;br /&gt;
* At least 61% of respondents perform an independent third party security review before deploying a Web application while 17% do not (the remainder do not know or do so when requested by customers).&lt;br /&gt;
&lt;br /&gt;
* Just under half of the surveyed organizations have Web application firewalls deployed for at least some of their Web applications.&lt;br /&gt;
&lt;br /&gt;
== Raw Data ==&lt;br /&gt;
&lt;br /&gt;
Transparency is a key principle of the OWASP SSB Project. For this reason all raw survey results are made available to the community. We welcome additional commentary and interpretations on the survey data. The raw survey data can be found [https://www.surveymonkey.com/sr_detail.aspx?sm=6RXm2J2aqar1MT7JlandR0MYzVFmx25FwQ9trvJH1JG4GcuRCMp3TAkaCJyNCQYrtI1Ny025AnORe0Y3lU%2bj7w%3d%3d here]. &lt;br /&gt;
&lt;br /&gt;
== Inquiries ==&lt;br /&gt;
&lt;br /&gt;
Please contact the project leader Boaz Gelbord (bgelbord at wgen dot net) if you have questions about the project or you would like to inquire about contributing to the project.&lt;br /&gt;
&lt;br /&gt;
== About the Security Spending Benchmarks Project ==&lt;br /&gt;
&lt;br /&gt;
The Security Spending Benchmarks Project seeks to produce guidance and an industry accepted benchmark for justifying overall Web application security spending. We want to quantify how many dollars and human resources should be allocated towards the software development life-cycle, security training, security software/tools, independent third-party reviews, Web application firewalls, etc. This project is motivated by the fact that:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;There are few, if any, industry standard benchmarks for executive management to consider when deciding what is a reasonable amount of resources to spend on Web application security in or out of the software development processes.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Spending on security helps mitigate risks whose potential costs are often difficult to quantify, thereby making justifying and obtaining security budgets difficult.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Many business initiatives require organizations to take “reasonable measures” and “adhere to best practices” for developing, delivering, and/or hosting secure Web application, but there is no industry consensus or data repositories on how this translates into monetary terms.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Smaller organizations outside of highly regulated industries purchase and deploy Web applications with no realistic ability to evaluate their security program.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Producing a less secure Web application may be less expensive than producing a more secure version of the same software. Organization that have invested development resources into software security may not be able to charge a premium for this investment because there is no reference point for the investment.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The survey was formulated with the help of our project partners to address the following questions and many others: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;What percentage of a Web application development groups headcount is dedicated towards security?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards Web application security as a percentage of software development and overall operational IT security costs?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Where do Web application security budget come from?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards security education?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Data Collection &amp;amp; Distribution ==&lt;br /&gt;
&lt;br /&gt;
We utilize the SurveyMonkey system to host surveys conducted for the OWASP SSB Project. We do not collect any publicly identifiable information including names, addresses, employer, email addresses, etc. from the respondents. While we expect a limited number of respondents trying to intentionally skew the results, we take precautions to limit the potential while not creating unnecessary overhead. We control survey access via username/password, as well as through a trusted network of contacts. All information collected is made available through Survey Monkey.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Status  == &lt;br /&gt;
&lt;br /&gt;
Planned Q2 Timeline:&lt;br /&gt;
&lt;br /&gt;
1. April 1-15: Discuss thematic priorities with partners. Expand partner network.&amp;lt;br /&amp;gt;&lt;br /&gt;
2. April 15-30: Formulate survey questions based on identified thematic priorities &amp;lt;br /&amp;gt;&lt;br /&gt;
3. May 1st-May 15th: Collect survey responses through partner network.&amp;lt;br /&amp;gt;&lt;br /&gt;
4. May 15th-May 31st: Analyze results and produce draft report.&amp;lt;br /&amp;gt;&lt;br /&gt;
5. June 1st - June 15th: Get partner feedback on draft and make edits.&amp;lt;br /&amp;gt;&lt;br /&gt;
6. June 15th: Publish final report&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Q1 Timeline:&lt;br /&gt;
&lt;br /&gt;
1. Completing the project description text and finalizing the proposed survey questions. (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
2. January 12th - Open up survey to respondents (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
3. February 6 (extended from Jan 26) - Close survey (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
4. February 6th - Survey Analysis Begins (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
5. February 6th-20th - Boaz Gelbord and Jeremiah Grossman to edit draft report (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
6. February 20th- Decision point whether to include late submissions (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
7. February 20th - Circulate draft report to partners with raw data, request to keep data confidential prior to publication. (DONE) &amp;lt;br/&amp;gt;&lt;br /&gt;
8. March 19th (was March 15th) - Publish report after integrating partner feedback. Generate community interest and discussion around results.(CURRENT)&amp;lt;br/&amp;gt;&lt;br /&gt;
9. After March 19th - Coordinate formal acceptance of deliverable by OWASP and plan further steps for the project.&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== News Coverage of OWASP SSB Project ==&lt;br /&gt;
&lt;br /&gt;
SC Magazine: [http://www.scmagazineus.com/OWASP-Security-Spending-Benchmarks-Report-published/article/129116/ OWASP Security Spending Benchmarks Report Published]&lt;br /&gt;
&lt;br /&gt;
Dark Reading: [http://www.darkreading.com/security/app-security/showArticle.jhtml?articleID=215901240 Web Application Security Spending Relatively Unscathed by Poor Economy]&lt;br /&gt;
&lt;br /&gt;
Search Security: [http://searchsecurity.techtarget.com/news/article/0,289142,sid14_gci1351731,00.html More companies seek third-party code review, survey finds]&lt;br /&gt;
&lt;br /&gt;
Search Security (Germany): [http://www.searchsecurity.de/themenbereiche/applikationssicherheit/sichere-software-entwicklung/articles/177103 Drittanbieter-Code-Review und geschulte Programmierer bevorzugt]&lt;br /&gt;
&lt;br /&gt;
PC World: [http://www.pcworld.com/businesscenter/article/162012/survey_gauges_web_application_security_spending.html Survey Guages Web Application Security Spending]&lt;br /&gt;
&lt;br /&gt;
Info World [http://www.infoworld.com/article/09/03/26/Survey_gauges_Web_application_security_spending_1.html Survey Gauges Web Application Security Spending]&lt;br /&gt;
&lt;br /&gt;
Network World [http://www.networkworld.com/news/2009/032609-survey-gauges-web-application-security.html Survey Gauges Web Application Security Spending]&lt;br /&gt;
&lt;br /&gt;
The IT Chronicle [http://www.theitchronicle.com/content/survey-gauges-web-application-security-spending Survey Gauges Web Application Security Spending]&lt;br /&gt;
&lt;br /&gt;
== Project Leadership  ==&lt;br /&gt;
The Security Spending Benchmarks Project Leader is [http://www.boazgelbord.com/ Boaz Gelbord] (Executive Director of Information Security, Wireless Generation). Boaz can be reached directly at '''bgelbord AT wgen.net''' with any questions or feedback. Jeremiah Grossman (Founder &amp;amp; CTO, WhiteHat Security) is also closely assisting in the effort.&lt;br /&gt;
&lt;br /&gt;
== Project Contributors  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:AppSecLogo.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Cenzic.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Cigital_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Denim_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:echelonone.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:eema.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Image:Fortify_logo.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:GDS_LOGO_SMALL.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Ifis_logo.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:MetroSITEGroup.jpg]] &amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:NCircle-logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Imperva_Logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Sectheory-logo-2.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Logo_securosis.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Tssci.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:TTT_logo_2008.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Whitehat_security_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;/div&gt;</summary>
		<author><name>Bgelbord</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=57415</id>
		<title>Category:OWASP Security Spending Benchmarks</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=57415"/>
				<updated>2009-03-26T17:34:35Z</updated>
		
		<summary type="html">&lt;p&gt;Bgelbord: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[:Category:OWASP Project]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Security Spending Benchmarks Project Report March 2009 ==&lt;br /&gt;
&lt;br /&gt;
The first report of the OWASP Security Spending Benchmarks Report is now available. It can be found at the following link:&lt;br /&gt;
&lt;br /&gt;
[[http://www.owasp.org/images/b/b2/OWASP_SSB_Project_Report_March_2009.pdf PDF Download]].&lt;br /&gt;
&lt;br /&gt;
There are a number of key findings in the study:&lt;br /&gt;
&lt;br /&gt;
* Organizations that have suffered a public data breach spend more on security in the development process than those that have not.&lt;br /&gt;
&lt;br /&gt;
* Web application security spending is expected to either stay flat or increase in nearly two thirds of companies.&lt;br /&gt;
&lt;br /&gt;
* Half of respondents consider security experience important when hiring developers,  and a majority provide their developers with security training. 38% have a third party firm conduct a security review of outsourced code.&lt;br /&gt;
       &lt;br /&gt;
* At least 61% of respondents perform an independent third party security review before deploying a Web application while 17% do not (the remainder do not know or do so when requested by customers).&lt;br /&gt;
&lt;br /&gt;
* Just under half of the surveyed organizations have Web application firewalls deployed for at least some of their Web applications.&lt;br /&gt;
&lt;br /&gt;
== Raw Data ==&lt;br /&gt;
&lt;br /&gt;
Transparency is a key principle of the OWASP SSB Project. For this reason all raw survey results are made available to the community. We welcome additional commentary and interpretations on the survey data. The raw survey data can be found [https://www.surveymonkey.com/sr_detail.aspx?sm=6RXm2J2aqar1MT7JlandR0MYzVFmx25FwQ9trvJH1JG4GcuRCMp3TAkaCJyNCQYrtI1Ny025AnORe0Y3lU%2bj7w%3d%3d here]. &lt;br /&gt;
&lt;br /&gt;
== Inquiries ==&lt;br /&gt;
&lt;br /&gt;
Please contact the project leader Boaz Gelbord (bgelbord at wgen dot net) if you have questions about the project or you would like to inquire about contributing to the project.&lt;br /&gt;
&lt;br /&gt;
== About the Security Spending Benchmarks Project ==&lt;br /&gt;
&lt;br /&gt;
The Security Spending Benchmarks Project seeks to produce guidance and an industry accepted benchmark for justifying overall Web application security spending. We want to quantify how many dollars and human resources should be allocated towards the software development life-cycle, security training, security software/tools, independent third-party reviews, Web application firewalls, etc. This project is motivated by the fact that:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;There are few, if any, industry standard benchmarks for executive management to consider when deciding what is a reasonable amount of resources to spend on Web application security in or out of the software development processes.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Spending on security helps mitigate risks whose potential costs are often difficult to quantify, thereby making justifying and obtaining security budgets difficult.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Many business initiatives require organizations to take “reasonable measures” and “adhere to best practices” for developing, delivering, and/or hosting secure Web application, but there is no industry consensus or data repositories on how this translates into monetary terms.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Smaller organizations outside of highly regulated industries purchase and deploy Web applications with no realistic ability to evaluate their security program.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Producing a less secure Web application may be less expensive than producing a more secure version of the same software. Organization that have invested development resources into software security may not be able to charge a premium for this investment because there is no reference point for the investment.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The survey was formulated with the help of our project partners to address the following questions and many others: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;What percentage of a Web application development groups headcount is dedicated towards security?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards Web application security as a percentage of software development and overall operational IT security costs?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Where do Web application security budget come from?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards security education?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Data Collection &amp;amp; Distribution ==&lt;br /&gt;
&lt;br /&gt;
We utilize the SurveyMonkey system to host surveys conducted for the OWASP SSB Project. We do not collect any publicly identifiable information including names, addresses, employer, email addresses, etc. from the respondents. While we expect a limited number of respondents trying to intentionally skew the results, we take precautions to limit the potential while not creating unnecessary overhead. We control survey access via username/password, as well as through a trusted network of contacts. All information collected is made available through Survey Monkey.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Status  == &lt;br /&gt;
&lt;br /&gt;
Planned Q2 Timeline:&lt;br /&gt;
&lt;br /&gt;
1. April 1-15: Discuss thematic priorities with partners. Expand partner network.&amp;lt;br /&amp;gt;&lt;br /&gt;
2. April 15-30: Formulate survey questions based on identified thematic priorities &amp;lt;br /&amp;gt;&lt;br /&gt;
3. May 1st-May 15th: Collect survey responses through partner network.&amp;lt;br /&amp;gt;&lt;br /&gt;
4. May 15th-May 31st: Analyze results and produce draft report.&amp;lt;br /&amp;gt;&lt;br /&gt;
5. June 1st - June 15th: Get partner feedback on draft and make edits.&amp;lt;br /&amp;gt;&lt;br /&gt;
6. June 15th: Publish final report&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Q1 Timeline:&lt;br /&gt;
&lt;br /&gt;
1. Completing the project description text and finalizing the proposed survey questions. (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
2. January 12th - Open up survey to respondents (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
3. February 6 (extended from Jan 26) - Close survey (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
4. February 6th - Survey Analysis Begins (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
5. February 6th-20th - Boaz Gelbord and Jeremiah Grossman to edit draft report (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
6. February 20th- Decision point whether to include late submissions (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
7. February 20th - Circulate draft report to partners with raw data, request to keep data confidential prior to publication. (DONE) &amp;lt;br/&amp;gt;&lt;br /&gt;
8. March 19th (was March 15th) - Publish report after integrating partner feedback. Generate community interest and discussion around results.(CURRENT)&amp;lt;br/&amp;gt;&lt;br /&gt;
9. After March 19th - Coordinate formal acceptance of deliverable by OWASP and plan further steps for the project.&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== News Coverage of OWASP SSB Project ==&lt;br /&gt;
&lt;br /&gt;
SC Magazine: [http://www.scmagazineus.com/OWASP-Security-Spending-Benchmarks-Report-published/article/129116/ OWASP Security Spending Benchmarks Report Published]&lt;br /&gt;
&lt;br /&gt;
Dark Reading: [http://www.darkreading.com/security/app-security/showArticle.jhtml?articleID=215901240 Web Application Security Spending Relatively Unscathed by Poor Economy]&lt;br /&gt;
&lt;br /&gt;
Search Security: [http://searchsecurity.techtarget.com/news/article/0,289142,sid14_gci1351731,00.html More companies seek third-party code review, survey finds]&lt;br /&gt;
&lt;br /&gt;
Search Security (Germany): [http://www.searchsecurity.de/themenbereiche/applikationssicherheit/sichere-software-entwicklung/articles/177103 Drittanbieter-Code-Review und geschulte Programmierer bevorzugt]&lt;br /&gt;
&lt;br /&gt;
PC World: [http://www.pcworld.com/businesscenter/article/162012/survey_gauges_web_application_security_spending.html Survey Guages Web Application Security Spending]&lt;br /&gt;
&lt;br /&gt;
Info World [http://www.infoworld.com/article/09/03/26/Survey_gauges_Web_application_security_spending_1.html Survey Gauges Web Application Security Spending]&lt;br /&gt;
&lt;br /&gt;
== Project Leadership  ==&lt;br /&gt;
The Security Spending Benchmarks Project Leader is [http://www.boazgelbord.com/ Boaz Gelbord] (Executive Director of Information Security, Wireless Generation). Boaz can be reached directly at '''bgelbord AT wgen.net''' with any questions or feedback. Jeremiah Grossman (Founder &amp;amp; CTO, WhiteHat Security) is also closely assisting in the effort.&lt;br /&gt;
&lt;br /&gt;
== Project Contributors  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:AppSecLogo.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Cenzic.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Cigital_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Denim_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:echelonone.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:eema.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Image:Fortify_logo.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:GDS_LOGO_SMALL.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Ifis_logo.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:MetroSITEGroup.jpg]] &amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:NCircle-logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Imperva_Logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Sectheory-logo-2.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Logo_securosis.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Tssci.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:TTT_logo_2008.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Whitehat_security_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;/div&gt;</summary>
		<author><name>Bgelbord</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=57400</id>
		<title>Category:OWASP Security Spending Benchmarks</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=57400"/>
				<updated>2009-03-26T15:05:58Z</updated>
		
		<summary type="html">&lt;p&gt;Bgelbord: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[:Category:OWASP Project]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Security Spending Benchmarks Project Report March 2009 ==&lt;br /&gt;
&lt;br /&gt;
The first report of the OWASP Security Spending Benchmarks Report is now available. It can be found at the following link:&lt;br /&gt;
&lt;br /&gt;
[[http://www.owasp.org/images/b/b2/OWASP_SSB_Project_Report_March_2009.pdf PDF Download]].&lt;br /&gt;
&lt;br /&gt;
There are a number of key findings in the study:&lt;br /&gt;
&lt;br /&gt;
* Organizations that have suffered a public data breach spend more on security in the development process than those that have not.&lt;br /&gt;
&lt;br /&gt;
* Web application security spending is expected to either stay flat or increase in nearly two thirds of companies.&lt;br /&gt;
&lt;br /&gt;
* Half of respondents consider security experience important when hiring developers,  and a majority provide their developers with security training. 38% have a third party firm conduct a security review of outsourced code.&lt;br /&gt;
       &lt;br /&gt;
* At least 61% of respondents perform an independent third party security review before deploying a Web application while 17% do not (the remainder do not know or do so when requested by customers).&lt;br /&gt;
&lt;br /&gt;
* Just under half of the surveyed organizations have Web application firewalls deployed for at least some of their Web applications.&lt;br /&gt;
&lt;br /&gt;
== Raw Data ==&lt;br /&gt;
&lt;br /&gt;
Transparency is a key principle of the OWASP SSB Project. For this reason all raw survey results are made available to the community. We welcome additional commentary and interpretations on the survey data. The raw survey data can be found [https://www.surveymonkey.com/sr_detail.aspx?sm=6RXm2J2aqar1MT7JlandR0MYzVFmx25FwQ9trvJH1JG4GcuRCMp3TAkaCJyNCQYrtI1Ny025AnORe0Y3lU%2bj7w%3d%3d here]. &lt;br /&gt;
&lt;br /&gt;
== Inquiries ==&lt;br /&gt;
&lt;br /&gt;
Please contact the project leader Boaz Gelbord (bgelbord at wgen dot net) if you have questions about the project or you would like to inquire about contributing to the project.&lt;br /&gt;
&lt;br /&gt;
== About the Security Spending Benchmarks Project ==&lt;br /&gt;
&lt;br /&gt;
The Security Spending Benchmarks Project seeks to produce guidance and an industry accepted benchmark for justifying overall Web application security spending. We want to quantify how many dollars and human resources should be allocated towards the software development life-cycle, security training, security software/tools, independent third-party reviews, Web application firewalls, etc. This project is motivated by the fact that:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;There are few, if any, industry standard benchmarks for executive management to consider when deciding what is a reasonable amount of resources to spend on Web application security in or out of the software development processes.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Spending on security helps mitigate risks whose potential costs are often difficult to quantify, thereby making justifying and obtaining security budgets difficult.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Many business initiatives require organizations to take “reasonable measures” and “adhere to best practices” for developing, delivering, and/or hosting secure Web application, but there is no industry consensus or data repositories on how this translates into monetary terms.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Smaller organizations outside of highly regulated industries purchase and deploy Web applications with no realistic ability to evaluate their security program.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Producing a less secure Web application may be less expensive than producing a more secure version of the same software. Organization that have invested development resources into software security may not be able to charge a premium for this investment because there is no reference point for the investment.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The survey was formulated with the help of our project partners to address the following questions and many others: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;What percentage of a Web application development groups headcount is dedicated towards security?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards Web application security as a percentage of software development and overall operational IT security costs?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Where do Web application security budget come from?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards security education?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Data Collection &amp;amp; Distribution ==&lt;br /&gt;
&lt;br /&gt;
We utilize the SurveyMonkey system to host surveys conducted for the OWASP SSB Project. We do not collect any publicly identifiable information including names, addresses, employer, email addresses, etc. from the respondents. While we expect a limited number of respondents trying to intentionally skew the results, we take precautions to limit the potential while not creating unnecessary overhead. We control survey access via username/password, as well as through a trusted network of contacts. All information collected is made available through Survey Monkey.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Status  == &lt;br /&gt;
&lt;br /&gt;
Planned Q2 Timeline:&lt;br /&gt;
&lt;br /&gt;
1. April 1-15: Discuss thematic priorities with partners. Expand partner network.&amp;lt;br /&amp;gt;&lt;br /&gt;
2. April 15-30: Formulate survey questions based on identified thematic priorities &amp;lt;br /&amp;gt;&lt;br /&gt;
3. May 1st-May 15th: Collect survey responses through partner network.&amp;lt;br /&amp;gt;&lt;br /&gt;
4. May 15th-May 31st: Analyze results and produce draft report.&amp;lt;br /&amp;gt;&lt;br /&gt;
5. June 1st - June 15th: Get partner feedback on draft and make edits.&amp;lt;br /&amp;gt;&lt;br /&gt;
6. June 15th: Publish final report&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Q1 Timeline:&lt;br /&gt;
&lt;br /&gt;
1. Completing the project description text and finalizing the proposed survey questions. (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
2. January 12th - Open up survey to respondents (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
3. February 6 (extended from Jan 26) - Close survey (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
4. February 6th - Survey Analysis Begins (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
5. February 6th-20th - Boaz Gelbord and Jeremiah Grossman to edit draft report (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
6. February 20th- Decision point whether to include late submissions (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
7. February 20th - Circulate draft report to partners with raw data, request to keep data confidential prior to publication. (DONE) &amp;lt;br/&amp;gt;&lt;br /&gt;
8. March 19th (was March 15th) - Publish report after integrating partner feedback. Generate community interest and discussion around results.(CURRENT)&amp;lt;br/&amp;gt;&lt;br /&gt;
9. After March 19th - Coordinate formal acceptance of deliverable by OWASP and plan further steps for the project.&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== News Coverage of OWASP SSB Project ==&lt;br /&gt;
&lt;br /&gt;
SC Magazine: [http://www.scmagazineus.com/OWASP-Security-Spending-Benchmarks-Report-published/article/129116/ OWASP Security Spending Benchmarks Report Published]&lt;br /&gt;
&lt;br /&gt;
Dark Reading: [http://www.darkreading.com/security/app-security/showArticle.jhtml?articleID=215901240 Web Application Security Spending Relatively Unscathed by Poor Economy]&lt;br /&gt;
&lt;br /&gt;
Search Security: [http://searchsecurity.techtarget.com/news/article/0,289142,sid14_gci1351731,00.html More companies seek third-party code review, survey finds]&lt;br /&gt;
&lt;br /&gt;
Search Security (Germany): [http://www.searchsecurity.de/themenbereiche/applikationssicherheit/sichere-software-entwicklung/articles/177103 Drittanbieter-Code-Review und geschulte Programmierer bevorzugt]&lt;br /&gt;
&lt;br /&gt;
PC World: [http://www.pcworld.com/businesscenter/article/162012/survey_gauges_web_application_security_spending.html Survey Guages Web Application Security Spending]&lt;br /&gt;
&lt;br /&gt;
== Project Leadership  ==&lt;br /&gt;
The Security Spending Benchmarks Project Leader is [http://www.boazgelbord.com/ Boaz Gelbord] (Executive Director of Information Security, Wireless Generation). Boaz can be reached directly at '''bgelbord AT wgen.net''' with any questions or feedback. Jeremiah Grossman (Founder &amp;amp; CTO, WhiteHat Security) is also closely assisting in the effort.&lt;br /&gt;
&lt;br /&gt;
== Project Contributors  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:AppSecLogo.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Cenzic.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Cigital_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Denim_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:echelonone.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:eema.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Image:Fortify_logo.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:GDS_LOGO_SMALL.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Ifis_logo.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:MetroSITEGroup.jpg]] &amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:NCircle-logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Imperva_Logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Sectheory-logo-2.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Logo_securosis.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Tssci.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:TTT_logo_2008.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Whitehat_security_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;/div&gt;</summary>
		<author><name>Bgelbord</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=57398</id>
		<title>Category:OWASP Security Spending Benchmarks</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=57398"/>
				<updated>2009-03-26T14:17:45Z</updated>
		
		<summary type="html">&lt;p&gt;Bgelbord: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[:Category:OWASP Project]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Security Spending Benchmarks Project Report March 2009 ==&lt;br /&gt;
&lt;br /&gt;
The first report of the OWASP Security Spending Benchmarks Report is now available. It can be found at the following link:&lt;br /&gt;
&lt;br /&gt;
[[http://www.owasp.org/images/b/b2/OWASP_SSB_Project_Report_March_2009.pdf PDF Download]].&lt;br /&gt;
&lt;br /&gt;
There are a number of key findings in the study:&lt;br /&gt;
&lt;br /&gt;
* Organizations that have suffered a public data breach spend more on security in the development process than those that have not.&lt;br /&gt;
&lt;br /&gt;
* Web application security spending is expected to either stay flat or increase in nearly two thirds of companies.&lt;br /&gt;
&lt;br /&gt;
* Half of respondents consider security experience important when hiring developers,  and a majority provide their developers with security training. 38% have a third party firm conduct a security review of outsourced code.&lt;br /&gt;
       &lt;br /&gt;
* At least 61% of respondents perform an independent third party security review before deploying a Web application while 17% do not (the remainder do not know or do so when requested by customers).&lt;br /&gt;
&lt;br /&gt;
* Just under half of the surveyed organizations have Web application firewalls deployed for at least some of their Web applications.&lt;br /&gt;
&lt;br /&gt;
== Raw Data ==&lt;br /&gt;
&lt;br /&gt;
Transparency is a key principle of the OWASP SSB Project. For this reason all raw survey results are made available to the community. We welcome additional commentary and interpretations on the survey data. The raw survey data can be found [https://www.surveymonkey.com/sr_detail.aspx?sm=6RXm2J2aqar1MT7JlandR0MYzVFmx25FwQ9trvJH1JG4GcuRCMp3TAkaCJyNCQYrtI1Ny025AnORe0Y3lU%2bj7w%3d%3d here]. &lt;br /&gt;
&lt;br /&gt;
== Inquiries ==&lt;br /&gt;
&lt;br /&gt;
Please contact the project leader Boaz Gelbord (bgelbord at wgen dot net) if you have questions about the project or you would like to inquire about contributing to the project.&lt;br /&gt;
&lt;br /&gt;
== About the Security Spending Benchmarks Project ==&lt;br /&gt;
&lt;br /&gt;
The Security Spending Benchmarks Project seeks to produce guidance and an industry accepted benchmark for justifying overall Web application security spending. We want to quantify how many dollars and human resources should be allocated towards the software development life-cycle, security training, security software/tools, independent third-party reviews, Web application firewalls, etc. This project is motivated by the fact that:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;There are few, if any, industry standard benchmarks for executive management to consider when deciding what is a reasonable amount of resources to spend on Web application security in or out of the software development processes.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Spending on security helps mitigate risks whose potential costs are often difficult to quantify, thereby making justifying and obtaining security budgets difficult.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Many business initiatives require organizations to take “reasonable measures” and “adhere to best practices” for developing, delivering, and/or hosting secure Web application, but there is no industry consensus or data repositories on how this translates into monetary terms.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Smaller organizations outside of highly regulated industries purchase and deploy Web applications with no realistic ability to evaluate their security program.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Producing a less secure Web application may be less expensive than producing a more secure version of the same software. Organization that have invested development resources into software security may not be able to charge a premium for this investment because there is no reference point for the investment.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The survey was formulated with the help of our project partners to address the following questions and many others: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;What percentage of a Web application development groups headcount is dedicated towards security?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards Web application security as a percentage of software development and overall operational IT security costs?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Where do Web application security budget come from?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards security education?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Data Collection &amp;amp; Distribution ==&lt;br /&gt;
&lt;br /&gt;
We utilize the SurveyMonkey system to host surveys conducted for the OWASP SSB Project. We do not collect any publicly identifiable information including names, addresses, employer, email addresses, etc. from the respondents. While we expect a limited number of respondents trying to intentionally skew the results, we take precautions to limit the potential while not creating unnecessary overhead. We control survey access via username/password, as well as through a trusted network of contacts. All information collected is made available through Survey Monkey.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Status  == &lt;br /&gt;
&lt;br /&gt;
Planned Q2 Timeline:&lt;br /&gt;
&lt;br /&gt;
1. April 1-15: Discuss thematic priorities with partners. Expand partner network.&amp;lt;br /&amp;gt;&lt;br /&gt;
2. April 15-30: Formulate survey questions based on identified thematic priorities &amp;lt;br /&amp;gt;&lt;br /&gt;
3. May 1st-May 15th: Collect survey responses through partner network.&amp;lt;br /&amp;gt;&lt;br /&gt;
4. May 15th-May 31st: Analyze results and produce draft report.&amp;lt;br /&amp;gt;&lt;br /&gt;
5. June 1st - June 15th: Get partner feedback on draft and make edits.&amp;lt;br /&amp;gt;&lt;br /&gt;
6. June 15th: Publish final report&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Q1 Timeline:&lt;br /&gt;
&lt;br /&gt;
1. Completing the project description text and finalizing the proposed survey questions. (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
2. January 12th - Open up survey to respondents (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
3. February 6 (extended from Jan 26) - Close survey (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
4. February 6th - Survey Analysis Begins (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
5. February 6th-20th - Boaz Gelbord and Jeremiah Grossman to edit draft report (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
6. February 20th- Decision point whether to include late submissions (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
7. February 20th - Circulate draft report to partners with raw data, request to keep data confidential prior to publication. (DONE) &amp;lt;br/&amp;gt;&lt;br /&gt;
8. March 19th (was March 15th) - Publish report after integrating partner feedback. Generate community interest and discussion around results.(CURRENT)&amp;lt;br/&amp;gt;&lt;br /&gt;
9. After March 19th - Coordinate formal acceptance of deliverable by OWASP and plan further steps for the project.&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== News Coverage of OWASP SSB Project ==&lt;br /&gt;
&lt;br /&gt;
[http://www.scmagazineus.com/OWASP-Security-Spending-Benchmarks-Report-published/article/129116/ SC Magazine] &amp;quot;OWASP Security Spending Benchmarks Report Published&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[http://www.darkreading.com/security/app-security/showArticle.jhtml?articleID=215901240 Dark Reading] &amp;quot;Web Application Security Spending Relatively Unscathed by Poor Economy&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[http://searchsecurity.techtarget.com/news/article/0,289142,sid14_gci1351731,00.html Search Security] &amp;quot;More companies seek third-party code review, survey finds&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[http://www.pcworld.com/businesscenter/article/162012/survey_gauges_web_application_security_spending.html PC World] &amp;quot;Survey Guages Web Application Security Spending&amp;quot;&lt;br /&gt;
&lt;br /&gt;
== Project Leadership  ==&lt;br /&gt;
The Security Spending Benchmarks Project Leader is [http://www.boazgelbord.com/ Boaz Gelbord] (Executive Director of Information Security, Wireless Generation). Boaz can be reached directly at '''bgelbord AT wgen.net''' with any questions or feedback. Jeremiah Grossman (Founder &amp;amp; CTO, WhiteHat Security) is also closely assisting in the effort.&lt;br /&gt;
&lt;br /&gt;
== Project Contributors  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:AppSecLogo.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Cenzic.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Cigital_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Denim_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:echelonone.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:eema.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Image:Fortify_logo.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:GDS_LOGO_SMALL.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Ifis_logo.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:MetroSITEGroup.jpg]] &amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:NCircle-logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Imperva_Logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Sectheory-logo-2.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Logo_securosis.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Tssci.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:TTT_logo_2008.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Whitehat_security_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;/div&gt;</summary>
		<author><name>Bgelbord</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=57312</id>
		<title>Category:OWASP Security Spending Benchmarks</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=57312"/>
				<updated>2009-03-24T19:02:22Z</updated>
		
		<summary type="html">&lt;p&gt;Bgelbord: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[:Category:OWASP Project]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Security Spending Benchmarks Project Report March 2009 ==&lt;br /&gt;
&lt;br /&gt;
The first report of the OWASP Security Spending Benchmarks Report is now available. It can be found at the following link:&lt;br /&gt;
&lt;br /&gt;
[[http://www.owasp.org/images/b/b2/OWASP_SSB_Project_Report_March_2009.pdf PDF Download]].&lt;br /&gt;
&lt;br /&gt;
There are a number of key findings in the study:&lt;br /&gt;
&lt;br /&gt;
* Organizations that have suffered a public data breach spend more on security in the development process than those that have not.&lt;br /&gt;
&lt;br /&gt;
* Web application security spending is expected to either stay flat or increase in nearly two thirds of companies.&lt;br /&gt;
&lt;br /&gt;
* Half of respondents consider security experience important when hiring developers,  and a majority provide their developers with security training. 38% have a third party firm conduct a security review of outsourced code.&lt;br /&gt;
       &lt;br /&gt;
* At least 61% of respondents perform an independent third party security review before deploying a Web application while 17% do not (the remainder do not know or do so when requested by customers).&lt;br /&gt;
&lt;br /&gt;
* Just under half of the surveyed organizations have Web application firewalls deployed for at least some of their Web applications.&lt;br /&gt;
&lt;br /&gt;
== Raw Data ==&lt;br /&gt;
&lt;br /&gt;
Transparency is a key principle of the OWASP SSB Project. For this reason all raw survey results are made available to the community. We welcome additional commentary and interpretations on the survey data. The raw survey data can be found [https://www.surveymonkey.com/sr_detail.aspx?sm=6RXm2J2aqar1MT7JlandR0MYzVFmx25FwQ9trvJH1JG4GcuRCMp3TAkaCJyNCQYrtI1Ny025AnORe0Y3lU%2bj7w%3d%3d here]. &lt;br /&gt;
&lt;br /&gt;
== Inquiries ==&lt;br /&gt;
&lt;br /&gt;
Please contact the project leader Boaz Gelbord (bgelbord at wgen dot net) if you have questions about the project or you would like to inquire about contributing to the project.&lt;br /&gt;
&lt;br /&gt;
== About the Security Spending Benchmarks Project ==&lt;br /&gt;
&lt;br /&gt;
The Security Spending Benchmarks Project seeks to produce guidance and an industry accepted benchmark for justifying overall Web application security spending. We want to quantify how many dollars and human resources should be allocated towards the software development life-cycle, security training, security software/tools, independent third-party reviews, Web application firewalls, etc. This project is motivated by the fact that:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;There are few, if any, industry standard benchmarks for executive management to consider when deciding what is a reasonable amount of resources to spend on Web application security in or out of the software development processes.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Spending on security helps mitigate risks whose potential costs are often difficult to quantify, thereby making justifying and obtaining security budgets difficult.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Many business initiatives require organizations to take “reasonable measures” and “adhere to best practices” for developing, delivering, and/or hosting secure Web application, but there is no industry consensus or data repositories on how this translates into monetary terms.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Smaller organizations outside of highly regulated industries purchase and deploy Web applications with no realistic ability to evaluate their security program.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Producing a less secure Web application may be less expensive than producing a more secure version of the same software. Organization that have invested development resources into software security may not be able to charge a premium for this investment because there is no reference point for the investment.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The survey was formulated with the help of our project partners to address the following questions and many others: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;What percentage of a Web application development groups headcount is dedicated towards security?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards Web application security as a percentage of software development and overall operational IT security costs?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Where do Web application security budget come from?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards security education?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Data Collection &amp;amp; Distribution ==&lt;br /&gt;
&lt;br /&gt;
We utilize the SurveyMonkey system to host surveys conducted for the OWASP SSB Project. We do not collect any publicly identifiable information including names, addresses, employer, email addresses, etc. from the respondents. While we expect a limited number of respondents trying to intentionally skew the results, we take precautions to limit the potential while not creating unnecessary overhead. We control survey access via username/password, as well as through a trusted network of contacts. All information collected is made available through Survey Monkey.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Status  == &lt;br /&gt;
&lt;br /&gt;
Planned Q2 Timeline:&lt;br /&gt;
&lt;br /&gt;
1. April 1-15: Discuss thematic priorities with partners. Expand partner network.&amp;lt;br /&amp;gt;&lt;br /&gt;
2. April 15-30: Formulate survey questions based on identified thematic priorities &amp;lt;br /&amp;gt;&lt;br /&gt;
3. May 1st-May 15th: Collect survey responses through partner network.&amp;lt;br /&amp;gt;&lt;br /&gt;
4. May 15th-May 31st: Analyze results and produce draft report.&amp;lt;br /&amp;gt;&lt;br /&gt;
5. June 1st - June 15th: Get partner feedback on draft and make edits.&amp;lt;br /&amp;gt;&lt;br /&gt;
6. June 15th: Publish final report&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Q1 Timeline:&lt;br /&gt;
&lt;br /&gt;
1. Completing the project description text and finalizing the proposed survey questions. (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
2. January 12th - Open up survey to respondents (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
3. February 6 (extended from Jan 26) - Close survey (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
4. February 6th - Survey Analysis Begins (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
5. February 6th-20th - Boaz Gelbord and Jeremiah Grossman to edit draft report (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
6. February 20th- Decision point whether to include late submissions (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
7. February 20th - Circulate draft report to partners with raw data, request to keep data confidential prior to publication. (DONE) &amp;lt;br/&amp;gt;&lt;br /&gt;
8. March 19th (was March 15th) - Publish report after integrating partner feedback. Generate community interest and discussion around results.(CURRENT)&amp;lt;br/&amp;gt;&lt;br /&gt;
9. After March 19th - Coordinate formal acceptance of deliverable by OWASP and plan further steps for the project.&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== News Coverage ==&lt;br /&gt;
&lt;br /&gt;
[http://www.scmagazineus.com/OWASP-Security-Spending-Benchmarks-Report-published/article/129116/ SC Magazine] &lt;br /&gt;
&lt;br /&gt;
[http://www.darkreading.com/security/app-security/showArticle.jhtml?articleID=215901240 Dark Reading]&lt;br /&gt;
&lt;br /&gt;
[http://searchsecurity.techtarget.com/news/article/0,289142,sid14_gci1351731,00.html Search Security]&lt;br /&gt;
&lt;br /&gt;
== Project Leadership  ==&lt;br /&gt;
The Security Spending Benchmarks Project Leader is [http://www.boazgelbord.com/ Boaz Gelbord] (Executive Director of Information Security, Wireless Generation). Boaz can be reached directly at '''bgelbord AT wgen.net''' with any questions or feedback. Jeremiah Grossman (Founder &amp;amp; CTO, WhiteHat Security) is also closely assisting in the effort.&lt;br /&gt;
&lt;br /&gt;
== Project Contributors  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:AppSecLogo.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Cenzic.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Cigital_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Denim_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:echelonone.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:eema.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Image:Fortify_logo.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:GDS_LOGO_SMALL.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Ifis_logo.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:MetroSITEGroup.jpg]] &amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:NCircle-logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Imperva_Logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Sectheory-logo-2.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Logo_securosis.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Tssci.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:TTT_logo_2008.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Whitehat_security_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;/div&gt;</summary>
		<author><name>Bgelbord</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=57192</id>
		<title>Category:OWASP Security Spending Benchmarks</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=57192"/>
				<updated>2009-03-22T19:26:46Z</updated>
		
		<summary type="html">&lt;p&gt;Bgelbord: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[:Category:OWASP Project]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Security Spending Benchmarks Project Report March 2009 ==&lt;br /&gt;
&lt;br /&gt;
The first report of the OWASP Security Spending Benchmarks Report is now available. It can be found at the following link:&lt;br /&gt;
&lt;br /&gt;
[[http://www.owasp.org/images/b/b2/OWASP_SSB_Project_Report_March_2009.pdf PDF Download]].&lt;br /&gt;
&lt;br /&gt;
There are a number of key findings in the study:&lt;br /&gt;
&lt;br /&gt;
* Organizations that have suffered a public data breach spend more on security in the development process than those that have not.&lt;br /&gt;
&lt;br /&gt;
* Web application security spending is expected to either stay flat or increase in nearly two thirds of companies.&lt;br /&gt;
&lt;br /&gt;
* Half of respondents consider security experience important when hiring developers,  and a majority provide their developers with security training. 38% have a third party firm conduct a security review of outsourced code.&lt;br /&gt;
       &lt;br /&gt;
* At least 61% of respondents perform an independent third party security review before deploying a Web application while 17% do not (the remainder do not know or do so when requested by customers).&lt;br /&gt;
&lt;br /&gt;
* Just under half of the surveyed organizations have Web application firewalls deployed for at least some of their Web applications.&lt;br /&gt;
&lt;br /&gt;
== Raw Data ==&lt;br /&gt;
&lt;br /&gt;
Transparency is a key principle of the OWASP SSB Project. For this reason all raw survey results are made available to the community. We welcome additional commentary and interpretations on the survey data. The raw survey data can be found [https://www.surveymonkey.com/sr_detail.aspx?sm=6RXm2J2aqar1MT7JlandR0MYzVFmx25FwQ9trvJH1JG4GcuRCMp3TAkaCJyNCQYrtI1Ny025AnORe0Y3lU%2bj7w%3d%3d here]. &lt;br /&gt;
&lt;br /&gt;
== Inquiries ==&lt;br /&gt;
&lt;br /&gt;
Please contact the project leader Boaz Gelbord (bgelbord at wgen dot net) if you have questions about the project or you would like to inquire about contributing to the project.&lt;br /&gt;
&lt;br /&gt;
== About the Security Spending Benchmarks Project ==&lt;br /&gt;
&lt;br /&gt;
The Security Spending Benchmarks Project seeks to produce guidance and an industry accepted benchmark for justifying overall Web application security spending. We want to quantify how many dollars and human resources should be allocated towards the software development life-cycle, security training, security software/tools, independent third-party reviews, Web application firewalls, etc. This project is motivated by the fact that:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;There are few, if any, industry standard benchmarks for executive management to consider when deciding what is a reasonable amount of resources to spend on Web application security in or out of the software development processes.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Spending on security helps mitigate risks whose potential costs are often difficult to quantify, thereby making justifying and obtaining security budgets difficult.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Many business initiatives require organizations to take “reasonable measures” and “adhere to best practices” for developing, delivering, and/or hosting secure Web application, but there is no industry consensus or data repositories on how this translates into monetary terms.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Smaller organizations outside of highly regulated industries purchase and deploy Web applications with no realistic ability to evaluate their security program.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Producing a less secure Web application may be less expensive than producing a more secure version of the same software. Organization that have invested development resources into software security may not be able to charge a premium for this investment because there is no reference point for the investment.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The survey was formulated with the help of our project partners to address the following questions and many others: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;What percentage of a Web application development groups headcount is dedicated towards security?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards Web application security as a percentage of software development and overall operational IT security costs?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Where do Web application security budget come from?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards security education?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Data Collection &amp;amp; Distribution ==&lt;br /&gt;
&lt;br /&gt;
We utilize the SurveyMonkey system to host surveys conducted for the OWASP SSB Project. We do not collect any publicly identifiable information including names, addresses, employer, email addresses, etc. from the respondents. While we expect a limited number of respondents trying to intentionally skew the results, we take precautions to limit the potential while not creating unnecessary overhead. We control survey access via username/password, as well as through a trusted network of contacts. All information collected is made available through Survey Monkey.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Status  == &lt;br /&gt;
&lt;br /&gt;
Planned Q2 Timeline:&lt;br /&gt;
&lt;br /&gt;
1. April 1-15: Discuss thematic priorities with partners. Expand partner network.&amp;lt;br /&amp;gt;&lt;br /&gt;
2. April 15-30: Formulate survey questions based on identified thematic priorities &amp;lt;br /&amp;gt;&lt;br /&gt;
3. May 1st-May 15th: Collect survey responses through partner network.&amp;lt;br /&amp;gt;&lt;br /&gt;
4. May 15th-May 31st: Analyze results and produce draft report.&amp;lt;br /&amp;gt;&lt;br /&gt;
5. June 1st - June 15th: Get partner feedback on draft and make edits.&amp;lt;br /&amp;gt;&lt;br /&gt;
6. June 15th: Publish final report&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Q1 Timeline:&lt;br /&gt;
&lt;br /&gt;
1. Completing the project description text and finalizing the proposed survey questions. (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
2. January 12th - Open up survey to respondents (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
3. February 6 (extended from Jan 26) - Close survey (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
4. February 6th - Survey Analysis Begins (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
5. February 6th-20th - Boaz Gelbord and Jeremiah Grossman to edit draft report (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
6. February 20th- Decision point whether to include late submissions (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
7. February 20th - Circulate draft report to partners with raw data, request to keep data confidential prior to publication. (DONE) &amp;lt;br/&amp;gt;&lt;br /&gt;
8. March 19th (was March 15th) - Publish report after integrating partner feedback. Generate community interest and discussion around results.(CURRENT)&amp;lt;br/&amp;gt;&lt;br /&gt;
9. After March 19th - Coordinate formal acceptance of deliverable by OWASP and plan further steps for the project.&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== News Coverage ==&lt;br /&gt;
&lt;br /&gt;
[http://www.scmagazineus.com/OWASP-Security-Spending-Benchmarks-Report-published/article/129116/ SC Magazine] &lt;br /&gt;
&lt;br /&gt;
[http://www.darkreading.com/security/app-security/showArticle.jhtml?articleID=215901240 Dark Reading]&lt;br /&gt;
&lt;br /&gt;
== Project Leadership  ==&lt;br /&gt;
The Security Spending Benchmarks Project Leader is [http://www.boazgelbord.com/ Boaz Gelbord] (Executive Director of Information Security, Wireless Generation). Boaz can be reached directly at '''bgelbord AT wgen.net''' with any questions or feedback. Jeremiah Grossman (Founder &amp;amp; CTO, WhiteHat Security) is also closely assisting in the effort.&lt;br /&gt;
&lt;br /&gt;
== Project Contributors  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:AppSecLogo.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Cenzic.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Cigital_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Denim_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:echelonone.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:eema.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Image:Fortify_logo.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:GDS_LOGO_SMALL.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Ifis_logo.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:MetroSITEGroup.jpg]] &amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:NCircle-logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Imperva_Logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Sectheory-logo-2.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Logo_securosis.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Tssci.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:TTT_logo_2008.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Whitehat_security_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;/div&gt;</summary>
		<author><name>Bgelbord</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=57191</id>
		<title>Category:OWASP Security Spending Benchmarks</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=57191"/>
				<updated>2009-03-22T19:25:39Z</updated>
		
		<summary type="html">&lt;p&gt;Bgelbord: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[:Category:OWASP Project]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Security Spending Benchmarks Project Report March 2009 ==&lt;br /&gt;
&lt;br /&gt;
The first report of the OWASP Security Spending Benchmarks Report is now available. It can be found at the following link:&lt;br /&gt;
&lt;br /&gt;
[[http://www.owasp.org/images/b/b2/OWASP_SSB_Project_Report_March_2009.pdf PDF Download]].&lt;br /&gt;
&lt;br /&gt;
There are a number of key findings in the study:&lt;br /&gt;
&lt;br /&gt;
* Organizations that have suffered a public data breach spend more on security in the development process than those that have not.&lt;br /&gt;
&lt;br /&gt;
* Web application security spending is expected to either stay flat or increase in nearly two thirds of companies.&lt;br /&gt;
&lt;br /&gt;
* Half of respondents consider security experience important when hiring developers,  and a majority provide their developers with security training. 38% have a third party firm conduct a security review of outsourced code.&lt;br /&gt;
       &lt;br /&gt;
* At least 61% of respondents perform an independent third party security review before deploying a Web application while 17% do not (the remainder do not know or do so when requested by customers).&lt;br /&gt;
&lt;br /&gt;
* Just under half of the surveyed organizations have Web application firewalls deployed for at least some of their Web applications.&lt;br /&gt;
&lt;br /&gt;
== Raw Data ==&lt;br /&gt;
&lt;br /&gt;
Transparency is a key principle of the OWASP SSB Project. For this reason all raw survey results are made available to the community. We welcome additional commentary and interpretations on the survey data. The raw survey data can be found [https://www.surveymonkey.com/sr_detail.aspx?sm=6RXm2J2aqar1MT7JlandR0MYzVFmx25FwQ9trvJH1JG4GcuRCMp3TAkaCJyNCQYrtI1Ny025AnORe0Y3lU%2bj7w%3d%3d here]. &lt;br /&gt;
&lt;br /&gt;
== Inquiries ==&lt;br /&gt;
&lt;br /&gt;
Please contact the project leader Boaz Gelbord (bgelbord at wgen dot net) if you have questions about the project or you would like to inquire about contributing to the project.&lt;br /&gt;
&lt;br /&gt;
== About the Security Spending Benchmarks Project ==&lt;br /&gt;
&lt;br /&gt;
The Security Spending Benchmarks Project seeks to produce guidance and an industry accepted benchmark for justifying overall Web application security spending. We want to quantify how many dollars and human resources should be allocated towards the software development life-cycle, security training, security software/tools, independent third-party reviews, Web application firewalls, etc. This project is motivated by the fact that:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;There are few, if any, industry standard benchmarks for executive management to consider when deciding what is a reasonable amount of resources to spend on Web application security in or out of the software development processes.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Spending on security helps mitigate risks whose potential costs are often difficult to quantify, thereby making justifying and obtaining security budgets difficult.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Many business initiatives require organizations to take “reasonable measures” and “adhere to best practices” for developing, delivering, and/or hosting secure Web application, but there is no industry consensus or data repositories on how this translates into monetary terms.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Smaller organizations outside of highly regulated industries purchase and deploy Web applications with no realistic ability to evaluate their security program.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Producing a less secure Web application may be less expensive than producing a more secure version of the same software. Organization that have invested development resources into software security may not be able to charge a premium for this investment because there is no reference point for the investment.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The survey was formulated with the help of our project partners to address the following questions and many others: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;What percentage of a Web application development groups headcount is dedicated towards security?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards Web application security as a percentage of software development and overall operational IT security costs?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Where do Web application security budget come from?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards security education?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Data Collection &amp;amp; Distribution ==&lt;br /&gt;
&lt;br /&gt;
We utilize the SurveyMonkey system to host surveys conducted for the OWASP SSB Project. We do not collect any publicly identifiable information including names, addresses, employer, email addresses, etc. from the respondents. While we expect a limited number of respondents trying to intentionally skew the results, we take precautions to limit the potential while not creating unnecessary overhead. We control survey access via username/password, as well as through a trusted network of contacts. All information collected is made available through Survey Monkey.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Status  == &lt;br /&gt;
&lt;br /&gt;
Planned Q2 Timeline:&lt;br /&gt;
&lt;br /&gt;
1. April 1-15: Discuss thematic priorities with partners. Expand partner network.&lt;br /&gt;
2. April 15-30: Formulate survey questions based on identified thematic priorities&lt;br /&gt;
3. May 1st-May 15th: Collect survey responses through partner network.&lt;br /&gt;
4. May 15th-May 31st: Analyze results and produce draft report.&lt;br /&gt;
5. June 1st - June 15th: Get partner feedback on draft and make edits.&lt;br /&gt;
6. June 15th: Publish final report&lt;br /&gt;
&lt;br /&gt;
Q1 Timeline:&lt;br /&gt;
&lt;br /&gt;
1. Completing the project description text and finalizing the proposed survey questions. (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
2. January 12th - Open up survey to respondents (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
3. February 6 (extended from Jan 26) - Close survey (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
4. February 6th - Survey Analysis Begins (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
5. February 6th-20th - Boaz Gelbord and Jeremiah Grossman to edit draft report (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
6. February 20th- Decision point whether to include late submissions (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
7. February 20th - Circulate draft report to partners with raw data, request to keep data confidential prior to publication. (DONE) &amp;lt;br/&amp;gt;&lt;br /&gt;
8. March 19th (was March 15th) - Publish report after integrating partner feedback. Generate community interest and discussion around results.(CURRENT)&amp;lt;br/&amp;gt;&lt;br /&gt;
9. After March 19th - Coordinate formal acceptance of deliverable by OWASP and plan further steps for the project.&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== News Coverage ==&lt;br /&gt;
&lt;br /&gt;
[http://www.scmagazineus.com/OWASP-Security-Spending-Benchmarks-Report-published/article/129116/ SC Magazine] &lt;br /&gt;
&lt;br /&gt;
[http://www.darkreading.com/security/app-security/showArticle.jhtml?articleID=215901240 Dark Reading]&lt;br /&gt;
&lt;br /&gt;
== Project Leadership  ==&lt;br /&gt;
The Security Spending Benchmarks Project Leader is [http://www.boazgelbord.com/ Boaz Gelbord] (Executive Director of Information Security, Wireless Generation). Boaz can be reached directly at '''bgelbord AT wgen.net''' with any questions or feedback. Jeremiah Grossman (Founder &amp;amp; CTO, WhiteHat Security) is also closely assisting in the effort.&lt;br /&gt;
&lt;br /&gt;
== Project Contributors  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:AppSecLogo.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Cenzic.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Cigital_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Denim_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:echelonone.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:eema.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Image:Fortify_logo.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:GDS_LOGO_SMALL.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Ifis_logo.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:MetroSITEGroup.jpg]] &amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:NCircle-logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Imperva_Logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Sectheory-logo-2.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Logo_securosis.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Tssci.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:TTT_logo_2008.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Whitehat_security_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;/div&gt;</summary>
		<author><name>Bgelbord</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=57003</id>
		<title>Category:OWASP Security Spending Benchmarks</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=57003"/>
				<updated>2009-03-19T14:33:44Z</updated>
		
		<summary type="html">&lt;p&gt;Bgelbord: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[:Category:OWASP Project]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Security Spending Benchmarks Project Report March 2009 ==&lt;br /&gt;
&lt;br /&gt;
The first report of the OWASP Security Spending Benchmarks Report is now available. It can be found at the following link:&lt;br /&gt;
&lt;br /&gt;
[[http://www.owasp.org/images/b/b2/OWASP_SSB_Project_Report_March_2009.pdf PDF Download]].&lt;br /&gt;
&lt;br /&gt;
There are a number of key findings in the study:&lt;br /&gt;
&lt;br /&gt;
* Organizations that have suffered a public data breach spend more on security in the development process than those that have not.&lt;br /&gt;
&lt;br /&gt;
* Web application security spending is expected to either stay flat or increase in nearly two thirds of companies.&lt;br /&gt;
&lt;br /&gt;
* Half of respondents consider security experience important when hiring developers,  and a majority provide their developers with security training. 38% have a third party firm conduct a security review of outsourced code.&lt;br /&gt;
       &lt;br /&gt;
* At least 61% of respondents perform an independent third party security review before deploying a Web application while 17% do not (the remainder do not know or do so when requested by customers).&lt;br /&gt;
&lt;br /&gt;
* Just under half of the surveyed organizations have Web application firewalls deployed for at least some of their Web applications.&lt;br /&gt;
&lt;br /&gt;
== Raw Data ==&lt;br /&gt;
&lt;br /&gt;
Transparency is a key principle of the OWASP SSB Project. For this reason all raw survey results are made available to the community. We welcome additional commentary and interpretations on the survey data. The raw survey data can be found [https://www.surveymonkey.com/sr_detail.aspx?sm=6RXm2J2aqar1MT7JlandR0MYzVFmx25FwQ9trvJH1JG4GcuRCMp3TAkaCJyNCQYrtI1Ny025AnORe0Y3lU%2bj7w%3d%3d here]. &lt;br /&gt;
&lt;br /&gt;
== Inquiries ==&lt;br /&gt;
&lt;br /&gt;
Please contact the project leader Boaz Gelbord (bgelbord at wgen dot net) if you have questions about the project or you would like to inquire about contributing to the project.&lt;br /&gt;
&lt;br /&gt;
== About the Security Spending Benchmarks Project ==&lt;br /&gt;
&lt;br /&gt;
The Security Spending Benchmarks Project seeks to produce guidance and an industry accepted benchmark for justifying overall Web application security spending. We want to quantify how many dollars and human resources should be allocated towards the software development life-cycle, security training, security software/tools, independent third-party reviews, Web application firewalls, etc. This project is motivated by the fact that:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;There are few, if any, industry standard benchmarks for executive management to consider when deciding what is a reasonable amount of resources to spend on Web application security in or out of the software development processes.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Spending on security helps mitigate risks whose potential costs are often difficult to quantify, thereby making justifying and obtaining security budgets difficult.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Many business initiatives require organizations to take “reasonable measures” and “adhere to best practices” for developing, delivering, and/or hosting secure Web application, but there is no industry consensus or data repositories on how this translates into monetary terms.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Smaller organizations outside of highly regulated industries purchase and deploy Web applications with no realistic ability to evaluate their security program.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Producing a less secure Web application may be less expensive than producing a more secure version of the same software. Organization that have invested development resources into software security may not be able to charge a premium for this investment because there is no reference point for the investment.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The survey was formulated with the help of our project partners to address the following questions and many others: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;What percentage of a Web application development groups headcount is dedicated towards security?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards Web application security as a percentage of software development and overall operational IT security costs?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Where do Web application security budget come from?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards security education?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Data Collection &amp;amp; Distribution ==&lt;br /&gt;
&lt;br /&gt;
We utilize the SurveyMonkey system to host surveys conducted for the OWASP SSB Project. We do not collect any publicly identifiable information including names, addresses, employer, email addresses, etc. from the respondents. While we expect a limited number of respondents trying to intentionally skew the results, we take precautions to limit the potential while not creating unnecessary overhead. We control survey access via username/password, as well as through a trusted network of contacts. All information collected is made available through Survey Monkey.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Status  == &lt;br /&gt;
1. Completing the project description text and finalizing the proposed survey questions. (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
2. January 12th - Open up survey to respondents (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
3. February 6 (extended from Jan 26) - Close survey (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
4. February 6th - Survey Analysis Begins (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
5. February 6th-20th - Boaz Gelbord and Jeremiah Grossman to edit draft report (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
6. February 20th- Decision point whether to include late submissions (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
7. February 20th - Circulate draft report to partners with raw data, request to keep data confidential prior to publication. (DONE) &amp;lt;br/&amp;gt;&lt;br /&gt;
8. March 19th (was March 15th) - Publish report after integrating partner feedback. Generate community interest and discussion around results.(CURRENT)&amp;lt;br/&amp;gt;&lt;br /&gt;
9. After March 19th - Coordinate formal acceptance of deliverable by OWASP and plan further steps for the project.&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Leadership  ==&lt;br /&gt;
The Security Spending Benchmarks Project Leader is [http://www.boazgelbord.com/ Boaz Gelbord] (Executive Director of Information Security, Wireless Generation). Boaz can be reached directly at '''bgelbord AT wgen.net''' with any questions or feedback. Jeremiah Grossman (Founder &amp;amp; CTO, WhiteHat Security) is also closely assisting in the effort.&lt;br /&gt;
&lt;br /&gt;
== Project Contributors  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:AppSecLogo.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Cenzic.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Cigital_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Denim_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:echelonone.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:eema.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Image:Fortify_logo.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:GDS_LOGO_SMALL.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Ifis_logo.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:MetroSITEGroup.jpg]] &amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:NCircle-logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Imperva_Logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Sectheory-logo-2.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Logo_securosis.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Tssci.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:TTT_logo_2008.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Whitehat_security_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;/div&gt;</summary>
		<author><name>Bgelbord</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=56957</id>
		<title>Category:OWASP Security Spending Benchmarks</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=56957"/>
				<updated>2009-03-19T03:28:16Z</updated>
		
		<summary type="html">&lt;p&gt;Bgelbord: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[:Category:OWASP Project]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''UPDATE: SURVEY RESULTS WILL BE PUBLISHED ON THURSDAY MARCH 19TH!'''&lt;br /&gt;
== Security Spending Benchmarks Project Report March 2009 ==&lt;br /&gt;
&lt;br /&gt;
The first report of the OWASP Security Spending Benchmarks Report is now available. It can be found at the following link:&lt;br /&gt;
&lt;br /&gt;
[[http://www.owasp.org/images/b/b2/OWASP_SSB_Project_Report_March_2009.pdf PDF Download]].&lt;br /&gt;
&lt;br /&gt;
There are a number of key findings in the study:&lt;br /&gt;
&lt;br /&gt;
* Organizations that have suffered a public data breach spend more on security in the development process than those that have not.&lt;br /&gt;
&lt;br /&gt;
* Web application security spending is expected to either stay flat or increase in nearly two thirds of companies.&lt;br /&gt;
&lt;br /&gt;
* Half of respondents consider security experience important when hiring developers,  and a majority provide their developers with security training. 38% have a third party firm conduct a security review of outsourced code.&lt;br /&gt;
       &lt;br /&gt;
* At least 61% of respondents perform an independent third party security review before deploying a Web application while 17% do not (the remainder do not know or do so when requested by customers).&lt;br /&gt;
&lt;br /&gt;
* Just under half of the surveyed organizations have Web application firewalls deployed for at least some of their Web applications.&lt;br /&gt;
&lt;br /&gt;
== Raw Data ==&lt;br /&gt;
&lt;br /&gt;
Transparency is a key principle of the OWASP SSB Project. For this reason all raw survey results are made available to the community. We welcome additional commentary and interpretations on the survey data. The raw survey data can be found [https://www.surveymonkey.com/sr_detail.aspx?sm=6RXm2J2aqar1MT7JlandR0MYzVFmx25FwQ9trvJH1JG4GcuRCMp3TAkaCJyNCQYrtI1Ny025AnORe0Y3lU%2bj7w%3d%3d here]. &lt;br /&gt;
&lt;br /&gt;
== Inquiries ==&lt;br /&gt;
&lt;br /&gt;
Please contact the project leader Boaz Gelbord (bgelbord at wgen dot net) if you have questions about the project or you would like to inquire about contributing to the project.&lt;br /&gt;
&lt;br /&gt;
== About the Security Spending Benchmarks Project ==&lt;br /&gt;
&lt;br /&gt;
The Security Spending Benchmarks Project seeks to produce guidance and an industry accepted benchmark for justifying overall Web application security spending. We want to quantify how many dollars and human resources should be allocated towards the software development life-cycle, security training, security software/tools, independent third-party reviews, Web application firewalls, etc. This project is motivated by the fact that:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;There are few, if any, industry standard benchmarks for executive management to consider when deciding what is a reasonable amount of resources to spend on Web application security in or out of the software development processes.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Spending on security helps mitigate risks whose potential costs are often difficult to quantify, thereby making justifying and obtaining security budgets difficult.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Many business initiatives require organizations to take “reasonable measures” and “adhere to best practices” for developing, delivering, and/or hosting secure Web application, but there is no industry consensus or data repositories on how this translates into monetary terms.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Smaller organizations outside of highly regulated industries purchase and deploy Web applications with no realistic ability to evaluate their security program.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Producing a less secure Web application may be less expensive than producing a more secure version of the same software. Organization that have invested development resources into software security may not be able to charge a premium for this investment because there is no reference point for the investment.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The survey was formulated with the help of our project partners to address the following questions and many others: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;What percentage of a Web application development groups headcount is dedicated towards security?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards Web application security as a percentage of software development and overall operational IT security costs?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Where do Web application security budget come from?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards security education?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Data Collection &amp;amp; Distribution ==&lt;br /&gt;
&lt;br /&gt;
We utilize the SurveyMonkey system to host surveys conducted for the OWASP SSB Project. We do not collect any publicly identifiable information including names, addresses, employer, email addresses, etc. from the respondents. While we expect a limited number of respondents trying to intentionally skew the results, we take precautions to limit the potential while not creating unnecessary overhead. We control survey access via username/password, as well as through a trusted network of contacts. All information collected is made available through Survey Monkey.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Status  == &lt;br /&gt;
1. Completing the project description text and finalizing the proposed survey questions. (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
2. January 12th - Open up survey to respondents (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
3. February 6 (extended from Jan 26) - Close survey (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
4. February 6th - Survey Analysis Begins (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
5. February 6th-20th - Boaz Gelbord and Jeremiah Grossman to edit draft report (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
6. February 20th- Decision point whether to include late submissions (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
7. February 20th - Circulate draft report to partners with raw data, request to keep data confidential prior to publication. (DONE) &amp;lt;br/&amp;gt;&lt;br /&gt;
8. March 19th (was March 15th) - Publish report after integrating partner feedback. Generate community interest and discussion around results.(CURRENT)&amp;lt;br/&amp;gt;&lt;br /&gt;
9. After March 19th - Coordinate formal acceptance of deliverable by OWASP and plan further steps for the project.&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Leadership  ==&lt;br /&gt;
The Security Spending Benchmarks Project Leader is [http://www.boazgelbord.com/ Boaz Gelbord] (Executive Director of Information Security, Wireless Generation). Boaz can be reached directly at '''bgelbord AT wgen.net''' with any questions or feedback. Jeremiah Grossman (Founder &amp;amp; CTO, WhiteHat Security) is also closely assisting in the effort.&lt;br /&gt;
&lt;br /&gt;
== Project Contributors  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:AppSecLogo.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Cenzic.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Cigital_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Denim_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:echelonone.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:eema.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Image:Fortify_logo.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:GDS_LOGO_SMALL.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Ifis_logo.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:MetroSITEGroup.jpg]] &amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:NCircle-logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Imperva_Logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Sectheory-logo-2.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Logo_securosis.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Tssci.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:TTT_logo_2008.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Whitehat_security_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;/div&gt;</summary>
		<author><name>Bgelbord</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=56956</id>
		<title>Category:OWASP Security Spending Benchmarks</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=56956"/>
				<updated>2009-03-19T03:26:21Z</updated>
		
		<summary type="html">&lt;p&gt;Bgelbord: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[:Category:OWASP Project]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''UPDATE: SURVEY RESULTS WILL BE PUBLISHED ON THURSDAY MARCH 19TH!'''&lt;br /&gt;
== Security Spending Benchmarks Project Report March 2009 ==&lt;br /&gt;
&lt;br /&gt;
The first report of the OWASP Security Spending Benchmarks Report is now available. It can be found at the following link:&lt;br /&gt;
&lt;br /&gt;
[[http://www.owasp.org/images/b/b2/OWASP_SSB_Project_Report_March_2009.pdf PDF Download]].&lt;br /&gt;
&lt;br /&gt;
There are a number of key findings in the study:&lt;br /&gt;
&lt;br /&gt;
* Organizations that have suffered a public data breach spend more on security in the development process than those that have not.&lt;br /&gt;
&lt;br /&gt;
* Web application security spending is expected to either stay flat or increase in nearly two thirds of companies.&lt;br /&gt;
&lt;br /&gt;
* Half of respondents consider security experience important when hiring developers,  and a majority provide their developers with security training. 38% have a third party firm conduct a security review of outsourced code.&lt;br /&gt;
       &lt;br /&gt;
* At least 61% of respondents perform an independent third party security review before deploying a Web application while 17% do not (the remainder do not know or do so when requested by customers).&lt;br /&gt;
&lt;br /&gt;
* Just under half of the surveyed organizations have Web application firewalls deployed for at least some of their Web applications.&lt;br /&gt;
&lt;br /&gt;
== Raw Data ==&lt;br /&gt;
&lt;br /&gt;
Transparency is a key principle of the OWASP SSB Project. For this reason all raw survey results are made available to the community. We welcome additional commentary and interpretations on the survey data. The raw survey data can be found [https://www.surveymonkey.com/sr_detail.aspx?sm=6RXm2J2aqar1MT7JlandR0MYzVFmx25FwQ9trvJH1JG4GcuRCMp3TAkaCJyNCQYrtI1Ny025AnORe0Y3lU%2bj7w%3d%3d here]. &lt;br /&gt;
&lt;br /&gt;
== Inquiries ==&lt;br /&gt;
&lt;br /&gt;
Please contact the project leader Boaz Gelbord (bgelbord at wgen dot net) if you have questions about the project or you would like to inquire about contributing to the project.&lt;br /&gt;
&lt;br /&gt;
== About the Security Spending Benchmarks Project ==&lt;br /&gt;
&lt;br /&gt;
The Security Spending Benchmarks Project seeks to produce guidance and an industry accepted benchmark for justifying overall Web application security spending. We want to quantify how many dollars and human resources should be allocated towards the software development life-cycle, security training, security software/tools, independent third-party reviews, Web application firewalls, etc. This project is motivated by the fact that:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;There are few, if any, industry standard benchmarks for executive management to consider when deciding what is a reasonable amount of resources to spend on Web application security in or out of the software development processes.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Spending on security helps mitigate risks whose potential costs are often difficult to quantify, thereby making justifying and obtaining security budgets difficult.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Many business initiatives require organizations to take “reasonable measures” and “adhere to best practices” for developing, delivering, and/or hosting secure Web application, but there is no industry consensus or data repositories on how this translates into monetary terms.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Smaller organizations outside of highly regulated industries purchase and deploy Web applications with no realistic ability to evaluate their security program.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Producing a less secure Web application may be less expensive than producing a more secure version of the same software. Organization that have invested development resources into software security may not be able to charge a premium for this investment because there is no reference point for the investment.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The survey was formulated with the help of our project partners to address the following questions and many others: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;What percentage of a Web application development groups headcount is dedicated towards security?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards Web application security as a percentage of software development and overall operational IT security costs?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Where do Web application security budget come from?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards security education?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Survey Questions  ==&lt;br /&gt;
&lt;br /&gt;
The full list of survey questions for the March 2009 report can be found at:&lt;br /&gt;
&lt;br /&gt;
[[https://www.owasp.org/images/7/79/Owasp_ssb_draft7.pdf PDF Download]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Data Collection &amp;amp; Distribution ==&lt;br /&gt;
&lt;br /&gt;
We utilize the SurveyMonkey system to host surveys conducted for the OWASP SSB Project. We do not collect any publicly identifiable information including names, addresses, employer, email addresses, etc. from the respondents. While we expect a limited number of respondents trying to intentionally skew the results, we take precautions to limit the potential while not creating unnecessary overhead. We control survey access via username/password, as well as through a trusted network of contacts. All information collected is made available through Survey Monkey.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Status  == &lt;br /&gt;
1. Completing the project description text and finalizing the proposed survey questions. (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
2. January 12th - Open up survey to respondents (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
3. February 6 (extended from Jan 26) - Close survey (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
4. February 6th - Survey Analysis Begins (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
5. February 6th-20th - Boaz Gelbord and Jeremiah Grossman to edit draft report (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
6. February 20th- Decision point whether to include late submissions (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
7. February 20th - Circulate draft report to partners with raw data, request to keep data confidential prior to publication. (DONE) &amp;lt;br/&amp;gt;&lt;br /&gt;
8. March 19th (was March 15th) - Publish report after integrating partner feedback. Generate community interest and discussion around results.(CURRENT)&amp;lt;br/&amp;gt;&lt;br /&gt;
9. After March 19th - Coordinate formal acceptance of deliverable by OWASP and plan further steps for the project.&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Leadership  ==&lt;br /&gt;
The Security Spending Benchmarks Project Leader is [http://www.boazgelbord.com/ Boaz Gelbord] (Executive Director of Information Security, Wireless Generation). Boaz can be reached directly at '''bgelbord AT wgen.net''' with any questions or feedback. Jeremiah Grossman (Founder &amp;amp; CTO, WhiteHat Security) is also closely assisting in the effort.&lt;br /&gt;
&lt;br /&gt;
== Project Contributors  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:AppSecLogo.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Cenzic.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Cigital_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Denim_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:echelonone.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:eema.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Image:Fortify_logo.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:GDS_LOGO_SMALL.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Ifis_logo.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:MetroSITEGroup.jpg]] &amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:NCircle-logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Imperva_Logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Sectheory-logo-2.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Logo_securosis.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Tssci.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:TTT_logo_2008.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Whitehat_security_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;/div&gt;</summary>
		<author><name>Bgelbord</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=56955</id>
		<title>Category:OWASP Security Spending Benchmarks</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=56955"/>
				<updated>2009-03-19T03:23:46Z</updated>
		
		<summary type="html">&lt;p&gt;Bgelbord: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[:Category:OWASP Project]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''UPDATE: SURVEY RESULTS WILL BE PUBLISHED ON THURSDAY MARCH 19TH!'''&lt;br /&gt;
== Security Spending Benchmarks Project Report March 2009 ==&lt;br /&gt;
&lt;br /&gt;
The first report of the OWASP Security Spending Benchmarks Report is now available. It can be found at the following link:&lt;br /&gt;
&lt;br /&gt;
[[http://www.owasp.org/images/b/b2/OWASP_SSB_Project_Report_March_2009.pdf PDF Download]].&lt;br /&gt;
&lt;br /&gt;
There are a number of key findings in the study:&lt;br /&gt;
&lt;br /&gt;
* Organizations that have suffered a public data breach spend more on security in the development process than those that have not.&lt;br /&gt;
&lt;br /&gt;
* Web application security spending is expected to either stay flat or increase in nearly two thirds of companies.&lt;br /&gt;
&lt;br /&gt;
* Half of respondents consider security experience important when hiring developers,  and a majority provide their developers with security training. 38% have a third party firm conduct a security review of outsourced code.&lt;br /&gt;
       &lt;br /&gt;
* At least 61% of respondents perform an independent third party security review before deploying a Web application while 17% do not (the remainder do not know or do so when requested by customers).&lt;br /&gt;
&lt;br /&gt;
* Just under half of the surveyed organizations have Web application firewalls deployed for at least some of their Web applications.&lt;br /&gt;
&lt;br /&gt;
== Raw Data ==&lt;br /&gt;
&lt;br /&gt;
Transparency is a key principle of the OWASP SSB Project. For this reason all raw survey results are made available to the community. We welcome additional commentary and interpretations on the survey data. The raw survey data can be found [https://www.surveymonkey.com/sr_detail.aspx?sm=6RXm2J2aqar1MT7JlandR0MYzVFmx25FwQ9trvJH1JG4GcuRCMp3TAkaCJyNCQYrtI1Ny025AnORe0Y3lU%2bj7w%3d%3d here]. &lt;br /&gt;
&lt;br /&gt;
== Inquiries ==&lt;br /&gt;
&lt;br /&gt;
Please contact the project leader Boaz Gelbord (bgelbord at wgen dot net) if you have questions about the project or you would like to inquire about contributing to the project.&lt;br /&gt;
&lt;br /&gt;
== About the Security Spending Benchmarks Project ==&lt;br /&gt;
&lt;br /&gt;
The Security Spending Benchmarks Project seeks to produce guidance and an industry accepted benchmark for justifying overall Web application security spending. We want to quantify how many dollars and human resources should be allocated towards the software development life-cycle, security training, security software/tools, independent third-party reviews, Web application firewalls, etc. This project is motivated by the fact that:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;There are few, if any, industry standard benchmarks for executive management to consider when deciding what is a reasonable amount of resources to spend on Web application security in or out of the software development processes.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Spending on security helps mitigate risks whose potential costs are often difficult to quantify, thereby making justifying and obtaining security budgets difficult.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Many business initiatives require organizations to take “reasonable measures” and “adhere to best practices” for developing, delivering, and/or hosting secure Web application, but there is no industry consensus or data repositories on how this translates into monetary terms.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Smaller organizations outside of highly regulated industries purchase and deploy Web applications with no realistic ability to evaluate their security program.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Producing a less secure Web application may be less expensive than producing a more secure version of the same software. Organization that have invested development resources into software security may not be able to charge a premium for this investment because there is no reference point for the investment.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The survey was formulated with the help of our project partners to address the following questions and many others: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;What percentage of a Web application development groups headcount is dedicated towards security?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards Web application security as a percentage of software development and overall operational IT security costs?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Where do Web application security budget come from?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards security education?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Survey Questions  ==&lt;br /&gt;
&lt;br /&gt;
The full list of survey questions can be found at:&lt;br /&gt;
&lt;br /&gt;
[[https://www.owasp.org/images/7/79/Owasp_ssb_draft7.pdf PDF Download]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Data Collection &amp;amp; Distribution ==&lt;br /&gt;
&lt;br /&gt;
We are utilizing the SurveyMonkey system to host the survey. We do not collect any publicly identifiable information including names, addresses, employer, email addresses, etc. from the respondents. While we expect a limited number of respondents trying to intentionally skew the results, we take precautions to limit the potential while not creating unnecessary overhead. We are controlling survey access via username/password, as well as through a trusted network of contacts. All information collected will be made available in report (PDF, HTML) as well as raw (CSV, XML, etc.) form.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Status  == &lt;br /&gt;
1. Completing the project description text and finalizing the proposed survey questions. (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
2. January 12th - Open up survey to respondents (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
3. February 6 (extended from Jan 26) - Close survey (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
4. February 6th - Survey Analysis Begins (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
5. February 6th-20th - Boaz Gelbord and Jeremiah Grossman to edit draft report (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
6. February 20th- Decision point whether to include late submissions (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
7. February 20th - Circulate draft report to partners with raw data, request to keep data confidential prior to publication. (DONE) &amp;lt;br/&amp;gt;&lt;br /&gt;
8. March 19th (was March 15th) - Publish report after integrating partner feedback. Generate community interest and discussion around results.&amp;lt;br/&amp;gt;&lt;br /&gt;
9. After March 19th - Coordinate formal acceptance of deliverable by OWASP and plan further steps for the project.&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Leadership  ==&lt;br /&gt;
The Security Spending Benchmarks Project Leader is [http://www.boazgelbord.com/ Boaz Gelbord] (Executive Director of Information Security, Wireless Generation). Boaz can be reached directly at '''bgelbord AT wgen.net''' with any questions or feedback. Jeremiah Grossman (Founder &amp;amp; CTO, WhiteHat Security) is also closely assisting in the effort.&lt;br /&gt;
&lt;br /&gt;
== Project Contributors  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:AppSecLogo.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Cenzic.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Cigital_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Denim_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:echelonone.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:eema.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Image:Fortify_logo.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:GDS_LOGO_SMALL.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Ifis_logo.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:MetroSITEGroup.jpg]] &amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:NCircle-logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Imperva_Logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Sectheory-logo-2.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Logo_securosis.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Tssci.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:TTT_logo_2008.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Whitehat_security_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;/div&gt;</summary>
		<author><name>Bgelbord</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=56954</id>
		<title>Category:OWASP Security Spending Benchmarks</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=56954"/>
				<updated>2009-03-19T03:22:30Z</updated>
		
		<summary type="html">&lt;p&gt;Bgelbord: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[:Category:OWASP Project]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''UPDATE: SURVEY RESULTS WILL BE PUBLISHED ON THURSDAY MARCH 19TH!'''&lt;br /&gt;
== Security Spending Benchmarks Project Report March 2009 ==&lt;br /&gt;
&lt;br /&gt;
The first report of the OWASP Security Spending Benchmarks Report is now available. It can be found at the following link:&lt;br /&gt;
&lt;br /&gt;
[[http://www.owasp.org/images/b/b2/OWASP_SSB_Project_Report_March_2009.pdf PDF Download]].&lt;br /&gt;
&lt;br /&gt;
There are a number of key findings in the study:&lt;br /&gt;
&lt;br /&gt;
* Organizations that have suffered a public data breach spend more on security in the development process than those that have not.&lt;br /&gt;
&lt;br /&gt;
* Web application security spending is expected to either stay flat or increase in nearly two thirds of companies.&lt;br /&gt;
&lt;br /&gt;
* Half of respondents consider security experience important when hiring developers,  and a majority provide their developers with security training. 38% have a third party firm conduct a security review of outsourced code.&lt;br /&gt;
       &lt;br /&gt;
* At least 61% of respondents perform an independent third party security review before deploying a Web application while 17% do not (the remainder do not know or do so when requested by customers).&lt;br /&gt;
&lt;br /&gt;
* Just under half of the surveyed organizations have Web application firewalls deployed for at least some of their Web applications.&lt;br /&gt;
&lt;br /&gt;
== Raw Data ==&lt;br /&gt;
&lt;br /&gt;
Transparency is a key principle of the OWASP SSB Project. For this reason all raw survey results are made available to the community. We welcome additional commentary and interpretations on the survey data. The raw survey data can be found [https://www.surveymonkey.com/sr_detail.aspx?sm=6RXm2J2aqar1MT7JlandR0MYzVFmx25FwQ9trvJH1JG4GcuRCMp3TAkaCJyNCQYrtI1Ny025AnORe0Y3lU%2bj7w%3d%3d here]. &lt;br /&gt;
&lt;br /&gt;
== Inquiries ==&lt;br /&gt;
&lt;br /&gt;
Please contact the project leader Boaz Gelbord (bgelbord at wgen dot net) if you have questions about the project or you would like to inquire about contributing to the project.&lt;br /&gt;
&lt;br /&gt;
== About the Security Spending Benchmarks Project ==&lt;br /&gt;
&lt;br /&gt;
The Security Spending Benchmarks Project seeks to produce guidance and an industry accepted benchmark for justifying overall Web application security spending. We want to quantify how many dollars and human resources should be allocated towards the software development life-cycle, security training, security software/tools, independent third-party reviews, Web application firewalls, etc. This project is motivated by the fact that:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;There are few, if any, industry standard benchmarks for executive management to consider when deciding what is a reasonable amount of resources to spend on Web application security in or out of the software development processes.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Spending on security helps mitigate risks whose potential costs are often difficult to quantify, thereby making justifying and obtaining security budgets difficult.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Many business initiatives require organizations to take “reasonable measures” and “adhere to best practices” for developing, delivering, and/or hosting secure Web application, but there is no industry consensus or data repositories on how this translates into monetary terms.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Smaller organizations outside of highly regulated industries purchase and deploy Web applications with no realistic ability to evaluate their security program.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Producing a less secure Web application may be less expensive than producing a more secure version of the same software. Organization that have invested development resources into software security may not be able to charge a premium for this investment because there is no reference point for the investment.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The survey was formulated with the help of our project partners to address the following questions and many others: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;What percentage of a Web application development groups headcount is dedicated towards security?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards Web application security as a percentage of software development and overall operational IT security costs?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Where do Web application security budget come from?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards security education?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Survey Questions  ==&lt;br /&gt;
&lt;br /&gt;
The full list of survey questions can be found at:&lt;br /&gt;
&lt;br /&gt;
[[https://www.owasp.org/images/7/79/Owasp_ssb_draft7.pdf PDF Download]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Data Collection &amp;amp; Distribution ==&lt;br /&gt;
&lt;br /&gt;
We are utilizing the SurveyMonkey system to host the survey. We do not collect any publicly identifiable information including names, addresses, employer, email addresses, etc. from the respondents. While we expect a limited number of respondents trying to intentionally skew the results, we take precautions to limit the potential while not creating unnecessary overhead. We are controlling survey access via username/password, as well as through a trusted network of contacts. All information collected will be made available in report (PDF, HTML) as well as raw (CSV, XML, etc.) form.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Status  == &lt;br /&gt;
1. Completing the project description text and finalizing the proposed survey questions. (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
2. January 12th - Open up survey to respondents (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
3. February 6 (extended from Jan 26) - Close survey (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
4. February 6th - Survey Analysis Begins (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
5. February 6th-20th - Boaz Gelbord and Jeremiah Grossman to edit draft report (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
6. February 20th- Decision point whether to include late submissions (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
7. February 20th - Circulate draft report to partners with raw data, request to keep data confidential prior to publication. (DONE) &amp;lt;br/&amp;gt;&lt;br /&gt;
8. March 19th (was March 15th) - Publish report after integrating partner feedback. Generate community interest and discussion around results.&amp;lt;br/&amp;gt;&lt;br /&gt;
9. After March 19th - Coordinate formal acceptance of deliverable by OWASP and plan further steps for the project.&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Leadership  ==&lt;br /&gt;
The Security Spending Benchmarks Project Leader is [http://www.boazgelbord.com/ Boaz Gelbord] (Executive Director of Information Security, Wireless Generation). Boaz can be contacted reached directly at '''bgelbord AT wgen.net''' with any questions or feedback. Jeremiah Grossman (Founder &amp;amp; CTO, WhiteHat Security) is also closely assisting in the effort.&lt;br /&gt;
&lt;br /&gt;
== Project Contributors  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:AppSecLogo.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Cenzic.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Cigital_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Denim_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:echelonone.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:eema.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Image:Fortify_logo.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:GDS_LOGO_SMALL.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Ifis_logo.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:MetroSITEGroup.jpg]] &amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:NCircle-logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Imperva_Logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Sectheory-logo-2.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Logo_securosis.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Tssci.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:TTT_logo_2008.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Whitehat_security_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;/div&gt;</summary>
		<author><name>Bgelbord</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:OWASP_SSB_Project_Report_March_2009.pdf&amp;diff=56953</id>
		<title>File:OWASP SSB Project Report March 2009.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:OWASP_SSB_Project_Report_March_2009.pdf&amp;diff=56953"/>
				<updated>2009-03-19T03:18:09Z</updated>
		
		<summary type="html">&lt;p&gt;Bgelbord: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Bgelbord</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=56952</id>
		<title>Category:OWASP Security Spending Benchmarks</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=56952"/>
				<updated>2009-03-19T03:09:41Z</updated>
		
		<summary type="html">&lt;p&gt;Bgelbord: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[:Category:OWASP Project]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''UPDATE: SURVEY RESULTS WILL BE PUBLISHED ON THURSDAY MARCH 19TH!'''&lt;br /&gt;
== Security Spending Benchmarks Project Report March 2009 ==&lt;br /&gt;
&lt;br /&gt;
The first report of the OWASP Security Spending Benchmarks Report is now available.&lt;br /&gt;
&lt;br /&gt;
There are a number of key findings in the study:&lt;br /&gt;
&lt;br /&gt;
* Organizations that have suffered a public data breach spend more on security in the development process than those that have not.&lt;br /&gt;
&lt;br /&gt;
* Web application security spending is expected to either stay flat or increase in nearly two thirds of companies.&lt;br /&gt;
&lt;br /&gt;
* Half of respondents consider security experience important when hiring developers,  and a majority provide their developers with security training. 38% have a third party firm conduct a security review of outsourced code.&lt;br /&gt;
       &lt;br /&gt;
* At least 61% of respondents perform an independent third party security review before deploying a Web application while 17% do not (the remainder do not know or do so when requested by customers).&lt;br /&gt;
&lt;br /&gt;
* Just under half of the surveyed organizations have Web application firewalls deployed for at least some of their Web applications.&lt;br /&gt;
&lt;br /&gt;
== Raw Data ==&lt;br /&gt;
&lt;br /&gt;
Transparency is a key principle of the OWASP SSB Project. For this reason all raw survey results are made available to the community. We welcome additional commentary and interpretations on the survey data. The raw survey data can be found [https://www.surveymonkey.com/sr_detail.aspx?sm=6RXm2J2aqar1MT7JlandR0MYzVFmx25FwQ9trvJH1JG4GcuRCMp3TAkaCJyNCQYrtI1Ny025AnORe0Y3lU%2bj7w%3d%3d here]. &lt;br /&gt;
&lt;br /&gt;
== Inquiries ==&lt;br /&gt;
&lt;br /&gt;
Please contact the project leader Boaz Gelbord (bgelbord at wgen dot net) if you have questions about the project or are would like to inquire about contributing to the project.&lt;br /&gt;
&lt;br /&gt;
== About the Security Spending Benchmarks Project ==&lt;br /&gt;
&lt;br /&gt;
The Security Spending Benchmarks Project seeks to produce guidance and an industry accepted benchmark for justifying overall Web application security spending. We want to quantify how many dollars and human resources should be allocated towards the software development life-cycle, security training, security software/tools, independent third-party reviews, Web application firewalls, etc. This project is motivated by the fact that:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;There are few, if any, industry standard benchmarks for executive management to consider when deciding what is a reasonable amount of resources to spend on Web application security in or out of the software development processes.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Spending on security helps mitigate risks whose potential costs are often difficult to quantify, thereby making justifying and obtaining security budgets difficult.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Many business initiatives require organizations to take “reasonable measures” and “adhere to best practices” for developing, delivering, and/or hosting secure Web application, but there is no industry consensus or data repositories on how this translates into monetary terms.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Smaller organizations outside of highly regulated industries purchase and deploy Web applications with no realistic ability to evaluate their security program.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Producing a less secure Web application may be less expensive than producing a more secure version of the same software. Organization that have invested development resources into software security may not be able to charge a premium for this investment because there is no reference point for the investment.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The survey was formulated with the help of our project partners to address the following questions and many others: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;What percentage of a Web application development groups headcount is dedicated towards security?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards Web application security as a percentage of software development and overall operational IT security costs?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Where do Web application security budget come from?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards security education?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Survey Questions  ==&lt;br /&gt;
&lt;br /&gt;
The full list of survey questions can be found at:&lt;br /&gt;
&lt;br /&gt;
[[https://www.owasp.org/images/7/79/Owasp_ssb_draft7.pdf PDF Download]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Data Collection &amp;amp; Distribution ==&lt;br /&gt;
&lt;br /&gt;
We are utilizing the SurveyMonkey system to host the survey. We do not collect any publicly identifiable information including names, addresses, employer, email addresses, etc. from the respondents. While we expect a limited number of respondents trying to intentionally skew the results, we take precautions to limit the potential while not creating unnecessary overhead. We are controlling survey access via username/password, as well as through a trusted network of contacts. All information collected will be made available in report (PDF, HTML) as well as raw (CSV, XML, etc.) form.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Status  == &lt;br /&gt;
1. Completing the project description text and finalizing the proposed survey questions. (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
2. January 12th - Open up survey to respondents (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
3. February 6 (extended from Jan 26) - Close survey (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
4. February 6th - Survey Analysis Begins (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
5. February 6th-20th - Boaz Gelbord and Jeremiah Grossman to edit draft report (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
6. February 20th- Decision point whether to include late submissions (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
7. February 20th - Circulate draft report to partners with raw data, request to keep data confidential prior to publication. (DONE) &amp;lt;br/&amp;gt;&lt;br /&gt;
8. March 19th (was March 15th) - Publish report after integrating partner feedback. Generate community interest and discussion around results.&amp;lt;br/&amp;gt;&lt;br /&gt;
9. After March 19th - Coordinate formal acceptance of deliverable by OWASP and plan further steps for the project.&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Leadership  ==&lt;br /&gt;
The Security Spending Benchmarks Project Leader is [http://www.boazgelbord.com/ Boaz Gelbord] (Executive Director of Information Security, Wireless Generation). Boaz can be contacted reached directly at '''bgelbord AT wgen.net''' with any questions or feedback. Jeremiah Grossman (Founder &amp;amp; CTO, WhiteHat Security) is also closely assisting in the effort.&lt;br /&gt;
&lt;br /&gt;
== Project Contributors  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:AppSecLogo.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Cenzic.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Cigital_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Denim_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:echelonone.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:eema.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Image:Fortify_logo.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:GDS_LOGO_SMALL.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Ifis_logo.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:MetroSITEGroup.jpg]] &amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:NCircle-logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Imperva_Logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Sectheory-logo-2.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Logo_securosis.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Tssci.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:TTT_logo_2008.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Whitehat_security_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;/div&gt;</summary>
		<author><name>Bgelbord</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=56670</id>
		<title>Category:OWASP Security Spending Benchmarks</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=56670"/>
				<updated>2009-03-13T21:05:55Z</updated>
		
		<summary type="html">&lt;p&gt;Bgelbord: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[:Category:OWASP Project]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''UPDATE: SURVEY RESULTS WILL BE PUBLISHED ON THURSDAY MARCH 19TH!'''&lt;br /&gt;
&lt;br /&gt;
== About the Security Spending Benchmarks Project ==&lt;br /&gt;
&lt;br /&gt;
The Security Spending Benchmarks Project seeks to produce guidance and an industry accepted benchmark for justifying overall Web application security spending. We want to quantify how many dollars and human resources should be allocated towards the software development life-cycle, security training, security software/tools, independent third-party reviews, Web application firewalls, etc. This project is motivated by the fact that:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;There are few, if any, industry standard benchmarks for executive management to consider when deciding what is a reasonable amount of resources to spend on Web application security in or out of the software development processes.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Spending on security helps mitigate risks whose potential costs are often difficult to quantify, thereby making justifying and obtaining security budgets difficult.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Many business initiatives require organizations to take “reasonable measures” and “adhere to best practices” for developing, delivering, and/or hosting secure Web application, but there is no industry consensus or data repositories on how this translates into monetary terms.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Smaller organizations outside of highly regulated industries purchase and deploy Web applications with no realistic ability to evaluate their security program.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Producing a less secure Web application may be less expensive than producing a more secure version of the same software. Organization that have invested development resources into software security may not be able to charge a premium for this investment because there is no reference point for the investment.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The survey was formulated with the help of our project partners to address the following questions and many others: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;What percentage of a Web application development groups headcount is dedicated towards security?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards Web application security as a percentage of software development and overall operational IT security costs?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Where do Web application security budget come from?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards security education?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Survey Questions  ==&lt;br /&gt;
&lt;br /&gt;
The full list of survey questions can be found at:&lt;br /&gt;
&lt;br /&gt;
[[https://www.owasp.org/images/7/79/Owasp_ssb_draft7.pdf PDF Download]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Data Collection &amp;amp; Distribution ==&lt;br /&gt;
&lt;br /&gt;
We are utilizing the SurveyMonkey system to host the survey. We do not collect any publicly identifiable information including names, addresses, employer, email addresses, etc. from the respondents. While we expect a limited number of respondents trying to intentionally skew the results, we take precautions to limit the potential while not creating unnecessary overhead. We are controlling survey access via username/password, as well as through a trusted network of contacts. All information collected will be made available in report (PDF, HTML) as well as raw (CSV, XML, etc.) form.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Status  == &lt;br /&gt;
1. Completing the project description text and finalizing the proposed survey questions. (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
2. January 12th - Open up survey to respondents (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
3. February 6 (extended from Jan 26) - Close survey (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
4. February 6th - Survey Analysis Begins (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
5. February 6th-20th - Boaz Gelbord and Jeremiah Grossman to edit draft report (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
6. February 20th- Decision point whether to include late submissions (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
7. February 20th - Circulate draft report to partners with raw data, request to keep data confidential prior to publication. (DONE) &amp;lt;br/&amp;gt;&lt;br /&gt;
8. March 19th (was March 15th) - Publish report after integrating partner feedback. Generate community interest and discussion around results.&amp;lt;br/&amp;gt;&lt;br /&gt;
9. After March 19th - Coordinate formal acceptance of deliverable by OWASP and plan further steps for the project.&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Leadership  ==&lt;br /&gt;
The Security Spending Benchmarks Project Leader is [http://www.boazgelbord.com/ Boaz Gelbord] (Executive Director of Information Security, Wireless Generation). Boaz can be contacted reached directly at '''bgelbord AT wgen.net''' with any questions or feedback. Jeremiah Grossman (Founder &amp;amp; CTO, WhiteHat Security) is also closely assisting in the effort.&lt;br /&gt;
&lt;br /&gt;
== Project Contributors  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:AppSecLogo.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Cenzic.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Cigital_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Denim_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:echelonone.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:eema.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Image:Fortify_logo.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:GDS_LOGO_SMALL.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Ifis_logo.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:MetroSITEGroup.jpg]] &amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:NCircle-logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Imperva_Logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Sectheory-logo-2.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Logo_securosis.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Tssci.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:TTT_logo_2008.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Whitehat_security_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;/div&gt;</summary>
		<author><name>Bgelbord</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=56594</id>
		<title>Category:OWASP Security Spending Benchmarks</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=56594"/>
				<updated>2009-03-12T16:13:09Z</updated>
		
		<summary type="html">&lt;p&gt;Bgelbord: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[:Category:OWASP Project]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== About the Security Spending Benchmarks Project ==&lt;br /&gt;
&lt;br /&gt;
The Security Spending Benchmarks Project seeks to produce guidance and an industry accepted benchmark for justifying overall Web application security spending. We want to quantify how many dollars and human resources should be allocated towards the software development life-cycle, security training, security software/tools, independent third-party reviews, Web application firewalls, etc. This project is motivated by the fact that:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;There are few, if any, industry standard benchmarks for executive management to consider when deciding what is a reasonable amount of resources to spend on Web application security in or out of the software development processes.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Spending on security helps mitigate risks whose potential costs are often difficult to quantify, thereby making justifying and obtaining security budgets difficult.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Many business initiatives require organizations to take “reasonable measures” and “adhere to best practices” for developing, delivering, and/or hosting secure Web application, but there is no industry consensus or data repositories on how this translates into monetary terms.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Smaller organizations outside of highly regulated industries purchase and deploy Web applications with no realistic ability to evaluate their security program.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Producing a less secure Web application may be less expensive than producing a more secure version of the same software. Organization that have invested development resources into software security may not be able to charge a premium for this investment because there is no reference point for the investment.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Prior to releasing the survey we are asking colleagues to help us formulate the most appropriate questions. Your feedback is much appreciated. We want to use the survey answers to address the following questions and many others: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;What percentage of a Web application development groups headcount is dedicated towards security?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards Web application security as a percentage of software development and overall operational IT security costs?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Where do Web application security budget come from?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards security education?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
How do the above answers correlate with:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Company size&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Industry vertical&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Sensitivity of the underlying data&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Existence of executive level security oversight&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Role of security in the company’s software development cycle&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Survey Questions  ==&lt;br /&gt;
&lt;br /&gt;
[[https://www.owasp.org/images/7/79/Owasp_ssb_draft7.pdf PDF Download]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Data Collection &amp;amp; Distribution ==&lt;br /&gt;
&lt;br /&gt;
For data collection our current plan is to utilize the SurveyMonkey system for hosting of the survey. We will not be collecting any publicly identifiable information including names, addresses, employer, email addresses, etc. from the respondents. While we expect a limited number of respondents trying to intentionally skew the results, we plan to take precautions to limit the potential while not creating unnecessary overhead. We are controlling survey access via username/password, as well as through a trusted network of contacts. All information collected will be made available in report (PDF, HTML) as well as raw (CSV, XML, etc.) form.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Status  == &lt;br /&gt;
1. Completing the project description text and finalizing the proposed survey questions. (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
2. January 12th - Open up survey to respondents (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
3. February 6 (extended from Jan 26) - Close survey (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
4. February 6th - Survey Analysis Begins (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
5. February 6th-20th - Boaz Gelbord and Jeremiah Grossman to edit draft report (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
6. February 20th- Decision point whether to include late submissions (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
7. February 20th - Circulate draft report to partners with raw data, request to keep data confidential prior to publication. (DONE) &amp;lt;br/&amp;gt;&lt;br /&gt;
8. March 19th (was March 15th) - Publish report after integrating partner feedback. Generate community interest and discussion around results.&amp;lt;br/&amp;gt;&lt;br /&gt;
9. After March 19th - Coordinate formal acceptance of deliverable by OWASP and plan further steps for the project.&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Leadership  ==&lt;br /&gt;
The Security Spending Benchmarks Project Leader is [http://www.boazgelbord.com/ Boaz Gelbord] (Executive Director of Information Security, Wireless Generation). Boaz can be contacted reached directly at '''bgelbord AT wgen.net''' with any questions or feedback. Jeremiah Grossman (Founder &amp;amp; CTO, WhiteHat Security) is also closely assisting in the effort.&lt;br /&gt;
&lt;br /&gt;
== Project Contributors  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:AppSecLogo.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Cenzic.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Cigital_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Denim_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:echelonone.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:eema.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Image:Fortify_logo.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:GDS_LOGO_SMALL.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Ifis_logo.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:MetroSITEGroup.jpg]] &amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:NCircle-logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Imperva_Logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Sectheory-logo-2.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Logo_securosis.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Tssci.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:TTT_logo_2008.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Whitehat_security_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;/div&gt;</summary>
		<author><name>Bgelbord</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=56367</id>
		<title>Category:OWASP Security Spending Benchmarks</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=56367"/>
				<updated>2009-03-09T16:04:30Z</updated>
		
		<summary type="html">&lt;p&gt;Bgelbord: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[:Category:OWASP Project]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== About the Security Spending Benchmarks Project ==&lt;br /&gt;
&lt;br /&gt;
The Security Spending Benchmarks Project seeks to produce guidance and an industry accepted benchmark for justifying overall Web application security spending. We want to quantify how many dollars and human resources should be allocated towards the software development life-cycle, security training, security software/tools, independent third-party reviews, Web application firewalls, etc. This project is motivated by the fact that:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;There are few, if any, industry standard benchmarks for executive management to consider when deciding what is a reasonable amount of resources to spend on Web application security in or out of the software development processes.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Spending on security helps mitigate risks whose potential costs are often difficult to quantify, thereby making justifying and obtaining security budgets difficult.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Many business initiatives require organizations to take “reasonable measures” and “adhere to best practices” for developing, delivering, and/or hosting secure Web application, but there is no industry consensus or data repositories on how this translates into monetary terms.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Smaller organizations outside of highly regulated industries purchase and deploy Web applications with no realistic ability to evaluate their security program.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Producing a less secure Web application may be less expensive than producing a more secure version of the same software. Organization that have invested development resources into software security may not be able to charge a premium for this investment because there is no reference point for the investment.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Prior to releasing the survey we are asking colleagues to help us formulate the most appropriate questions. Your feedback is much appreciated. We want to use the survey answers to address the following questions and many others: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;What percentage of a Web application development groups headcount is dedicated towards security?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards Web application security as a percentage of software development and overall operational IT security costs?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Where do Web application security budget come from?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards security education?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
How do the above answers correlate with:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Company size&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Industry vertical&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Sensitivity of the underlying data&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Existence of executive level security oversight&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Role of security in the company’s software development cycle&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Survey Questions  ==&lt;br /&gt;
&lt;br /&gt;
[[https://www.owasp.org/images/7/79/Owasp_ssb_draft7.pdf PDF Download]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Data Collection &amp;amp; Distribution ==&lt;br /&gt;
&lt;br /&gt;
For data collection our current plan is to utilize the SurveyMonkey system for hosting of the survey. We will not be collecting any publicly identifiable information including names, addresses, employer, email addresses, etc. from the respondents. While we expect a limited number of respondents trying to intentionally skew the results, we plan to take precautions to limit the potential while not creating unnecessary overhead. We are controlling survey access via username/password, as well as through a trusted network of contacts. All information collected will be made available in report (PDF, HTML) as well as raw (CSV, XML, etc.) form.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Status  == &lt;br /&gt;
1. Completing the project description text and finalizing the proposed survey questions. (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
2. January 12th - Open up survey to respondents (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
3. February 6 (extended from Jan 26) - Close survey (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
4. February 6th - Survey Analysis Begins (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
5. February 6th-20th - Boaz Gelbord and Jeremiah Grossman to edit draft report (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
6. February 20th- Decision point whether to include late submissions (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
7. February 20th - Circulate draft report to partners with raw data, request to keep data confidential prior to publication. (DONE) &amp;lt;br/&amp;gt;&lt;br /&gt;
8. March 15th - Publish report after integrating partner feedback. Generate community interest and discussion around results.&amp;lt;br/&amp;gt;&lt;br /&gt;
9. After March 15th - Coordinate formal acceptance of deliverable by OWASP and plan further steps for the project.&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Leadership  ==&lt;br /&gt;
The Security Spending Benchmarks Project Leader is [http://www.boazgelbord.com/ Boaz Gelbord] (Executive Director of Information Security, Wireless Generation). Boaz can be contacted reached directly at '''bgelbord AT wgen.net''' with any questions or feedback. Jeremiah Grossman (Founder &amp;amp; CTO, WhiteHat Security) is also closely assisting in the effort.&lt;br /&gt;
&lt;br /&gt;
== Project Contributors  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:AppSecLogo.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Cenzic.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Cigital_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Denim_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:echelonone.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:eema.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Image:Fortify_logo.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:GDS_LOGO_SMALL.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Ifis_logo.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:MetroSITEGroup.jpg]] &amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:NCircle-logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Imperva_Logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Sectheory-logo-2.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Logo_securosis.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Tssci.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:TTT_logo_2008.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Whitehat_security_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;/div&gt;</summary>
		<author><name>Bgelbord</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=53675</id>
		<title>Category:OWASP Security Spending Benchmarks</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=53675"/>
				<updated>2009-02-09T15:52:02Z</updated>
		
		<summary type="html">&lt;p&gt;Bgelbord: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[:Category:OWASP Project]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== About the Security Spending Benchmarks Project ==&lt;br /&gt;
&lt;br /&gt;
The Security Spending Benchmarks Project seeks to produce guidance and an industry accepted benchmark for justifying overall Web application security spending. We want to quantify how many dollars and human resources should be allocated towards the software development life-cycle, security training, security software/tools, independent third-party reviews, Web application firewalls, etc. This project is motivated by the fact that:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;There are few, if any, industry standard benchmarks for executive management to consider when deciding what is a reasonable amount of resources to spend on Web application security in or out of the software development processes.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Spending on security helps mitigate risks whose potential costs are often difficult to quantify, thereby making justifying and obtaining security budgets difficult.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Many business initiatives require organizations to take “reasonable measures” and “adhere to best practices” for developing, delivering, and/or hosting secure Web application, but there is no industry consensus or data repositories on how this translates into monetary terms.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Smaller organizations outside of highly regulated industries purchase and deploy Web applications with no realistic ability to evaluate their security program.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Producing a less secure Web application may be less expensive than producing a more secure version of the same software. Organization that have invested development resources into software security may not be able to charge a premium for this investment because there is no reference point for the investment.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Prior to releasing the survey we are asking colleagues to help us formulate the most appropriate questions. Your feedback is much appreciated. We want to use the survey answers to address the following questions and many others: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;What percentage of a Web application development groups headcount is dedicated towards security?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards Web application security as a percentage of software development and overall operational IT security costs?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Where do Web application security budget come from?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards security education?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
How do the above answers correlate with:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Company size&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Industry vertical&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Sensitivity of the underlying data&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Existence of executive level security oversight&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Role of security in the company’s software development cycle&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Survey Questions  ==&lt;br /&gt;
&lt;br /&gt;
[[https://www.owasp.org/images/7/79/Owasp_ssb_draft7.pdf PDF Download]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Data Collection &amp;amp; Distribution ==&lt;br /&gt;
&lt;br /&gt;
For data collection our current plan is to utilize the SurveyMonkey system for hosting of the survey. We will not be collecting any publicly identifiable information including names, addresses, employer, email addresses, etc. from the respondents. While we expect a limited number of respondents trying to intentionally skew the results, we plan to take precautions to limit the potential while not creating unnecessary overhead. We are controlling survey access via username/password, as well as through a trusted network of contacts. All information collected will be made available in report (PDF, HTML) as well as raw (CSV, XML, etc.) form.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Status  == &lt;br /&gt;
1. Completing the project description text and finalizing the proposed survey questions. (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
2. Open up survey to respondents (Jan 12, 2009) &amp;lt;br /&amp;gt;&lt;br /&gt;
3. Close survey (Feb 6, 2009 - extended from Jan 26, 2009) &amp;lt;br /&amp;gt;&lt;br /&gt;
4. February 6th - Survey Analysis Begins&amp;lt;br /&amp;gt;&lt;br /&gt;
5. February 6th-20th - Boaz Gelbord and Jeremiah Grossman to edit draft report.&amp;lt;br /&amp;gt;&lt;br /&gt;
6. February 20th- Decision point whether to include late submissions&amp;lt;br /&amp;gt;&lt;br /&gt;
7. February 20th - Circulate draft report to partners with raw data, request to keep data confidential prior to publication.&amp;lt;br/&amp;gt;&lt;br /&gt;
8. March 15th - Publish report after integrating partner feedback. Generate community interest and discussion around results.&amp;lt;br/&amp;gt;&lt;br /&gt;
9. After March 15th - Coordinate formal acceptance of deliverable by OWASP and plan further steps for the project.&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Leadership  ==&lt;br /&gt;
The Security Spending Benchmarks Project Leader is [http://www.boazgelbord.com/ Boaz Gelbord] (Executive Director of Information Security, Wireless Generation). Boaz can be contacted reached directly at '''bgelbord AT wgen.net''' with any questions or feedback. Jeremiah Grossman (Founder &amp;amp; CTO, WhiteHat Security) is also closely assisting in the effort.&lt;br /&gt;
&lt;br /&gt;
== Project Contributors  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:AppSecLogo.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Cenzic.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Cigital_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Denim_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:echelonone.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:eema.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Image:Fortify_logo.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:GDS_LOGO_SMALL.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Ifis_logo.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:MetroSITEGroup.jpg]] &amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:NCircle-logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Imperva_Logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Sectheory-logo-2.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Logo_securosis.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Tssci.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:TTT_logo_2008.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Whitehat_security_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;/div&gt;</summary>
		<author><name>Bgelbord</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=53207</id>
		<title>Category:OWASP Security Spending Benchmarks</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=53207"/>
				<updated>2009-02-07T00:04:23Z</updated>
		
		<summary type="html">&lt;p&gt;Bgelbord: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[:Category:OWASP Project]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== About the Security Spending Benchmarks Project ==&lt;br /&gt;
&lt;br /&gt;
The Security Spending Benchmarks Project seeks to produce guidance and an industry accepted benchmark for justifying overall Web application security spending. We want to quantify how many dollars and human resources should be allocated towards the software development life-cycle, security training, security software/tools, independent third-party reviews, Web application firewalls, etc. This project is motivated by the fact that:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;There are few, if any, industry standard benchmarks for executive management to consider when deciding what is a reasonable amount of resources to spend on Web application security in or out of the software development processes.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Spending on security helps mitigate risks whose potential costs are often difficult to quantify, thereby making justifying and obtaining security budgets difficult.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Many business initiatives require organizations to take “reasonable measures” and “adhere to best practices” for developing, delivering, and/or hosting secure Web application, but there is no industry consensus or data repositories on how this translates into monetary terms.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Smaller organizations outside of highly regulated industries purchase and deploy Web applications with no realistic ability to evaluate their security program.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Producing a less secure Web application may be less expensive than producing a more secure version of the same software. Organization that have invested development resources into software security may not be able to charge a premium for this investment because there is no reference point for the investment.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Prior to releasing the survey we are asking colleagues to help us formulate the most appropriate questions. Your feedback is much appreciated. We want to use the survey answers to address the following questions and many others: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;What percentage of a Web application development groups headcount is dedicated towards security?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards Web application security as a percentage of software development and overall operational IT security costs?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Where do Web application security budget come from?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards security education?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
How do the above answers correlate with:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Company size&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Industry vertical&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Sensitivity of the underlying data&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Existence of executive level security oversight&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Role of security in the company’s software development cycle&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Survey Questions  ==&lt;br /&gt;
&lt;br /&gt;
[[https://www.owasp.org/images/7/79/Owasp_ssb_draft7.pdf PDF Download]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Data Collection &amp;amp; Distribution ==&lt;br /&gt;
&lt;br /&gt;
For data collection our current plan is to utilize the SurveyMonkey system for hosting of the survey. We will not be collecting any publicly identifiable information including names, addresses, employer, email addresses, etc. from the respondents. While we expect a limited number of respondents trying to intentionally skew the results, we plan to take precautions to limit the potential while not creating unnecessary overhead. We are controlling survey access via username/password, as well as through a trusted network of contacts. All information collected will be made available in report (PDF, HTML) as well as raw (CSV, XML, etc.) form.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Status  == &lt;br /&gt;
1. Completing the project description text and finalizing the proposed survey questions. (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
2. Open up survey to respondents (Jan 12, 2009) &amp;lt;br /&amp;gt;&lt;br /&gt;
3. Close survey (Feb 6, 2009 - extended from Jan 26, 2009) &amp;lt;br /&amp;gt;&lt;br /&gt;
4. February 6th - Survey Analysis Begins&amp;lt;br /&amp;gt;&lt;br /&gt;
5. February 6th-20th - Boaz Gelbord and Jeremiah Grossman to edit draft report.&amp;lt;br /&amp;gt;&lt;br /&gt;
6. February 20th- Decision point whether to include late submissions&amp;lt;br /&amp;gt;&lt;br /&gt;
7. February 20th - Circulate draft report to partners with raw data, request to keep data confidential prior to publication.&amp;lt;br/&amp;gt;&lt;br /&gt;
8. March 10th - Publish report after integrating partner feedback. Generate community interest and discussion around results.&amp;lt;br/&amp;gt;&lt;br /&gt;
9. After March 10th - Coordinate formal acceptance of deliverable by OWASP and plan further steps for the project.&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Leadership  ==&lt;br /&gt;
The Security Spending Benchmarks Project Leader is [http://www.boazgelbord.com/ Boaz Gelbord] (Executive Director of Information Security, Wireless Generation). Boaz can be contacted reached directly at '''bgelbord AT wgen.net''' with any questions or feedback. Jeremiah Grossman (Founder &amp;amp; CTO, WhiteHat Security) is also closely assisting in the effort.&lt;br /&gt;
&lt;br /&gt;
== Project Contributors  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:AppSecLogo.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Cenzic.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Cigital_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Denim_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:echelonone.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:eema.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Image:Fortify_logo.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:GDS_LOGO_SMALL.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Ifis_logo.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:MetroSITEGroup.jpg]] &amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:NCircle-logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Imperva_Logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Sectheory-logo-2.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Logo_securosis.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Tssci.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:TTT_logo_2008.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Whitehat_security_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;/div&gt;</summary>
		<author><name>Bgelbord</name></author>	</entry>

	</feed>