This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit

Path to a Secure Application

Jump to: navigation, search

Regardless of the software development process, agile or waterfall, XP, being used, it is critical to understand how to implement security into this to eliminiate security vulnerabilities before a hacker does. The best place to do this is while the application is being built and not after the application has already been put into production. This presentation will outline the people, process, and technologies that can and should be leveraged to bring security closer to where the problem first gets introduced, in development.