<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/index.php?action=history&amp;feed=atom&amp;title=Application_Security_Guide_For_CISOs_v1.1bis</id>
		<title>Application Security Guide For CISOs v1.1bis - Revision history</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/index.php?action=history&amp;feed=atom&amp;title=Application_Security_Guide_For_CISOs_v1.1bis"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Application_Security_Guide_For_CISOs_v1.1bis&amp;action=history"/>
		<updated>2026-04-29T12:51:44Z</updated>
		<subtitle>Revision history for this page on the wiki</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Application_Security_Guide_For_CISOs_v1.1bis&amp;diff=220472&amp;oldid=prev</id>
		<title>Tgondrom: /* Contents */</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Application_Security_Guide_For_CISOs_v1.1bis&amp;diff=220472&amp;oldid=prev"/>
				<updated>2016-08-18T20:39:08Z</updated>
		
		<summary type="html">&lt;p&gt;‎&lt;span dir=&quot;auto&quot;&gt;&lt;span class=&quot;autocomment&quot;&gt;Contents&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;table class=&quot;diff diff-contentalign-left&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class='diff-marker' /&gt;
				&lt;col class='diff-content' /&gt;
				&lt;col class='diff-marker' /&gt;
				&lt;col class='diff-content' /&gt;
				&lt;tr style='vertical-align: top;' lang='en'&gt;
				&lt;td colspan='2' style=&quot;background-color: white; color:black; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan='2' style=&quot;background-color: white; color:black; text-align: center;&quot;&gt;Revision as of 20:39, 18 August 2016&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l23&quot; &gt;Line 23:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 23:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;** [[CISO AppSec Guide: Application Security Program|Part III: Application Security Program]]&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;** [[CISO AppSec Guide: Application Security Program|Part III: Application Security Program]]&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;** [[CISO AppSec Guide: Metrics For Managing Risks &amp;amp; Application Security Investments|Part IV: Metrics For Managing Risks &amp;amp; Application Security Investments]]&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;** [[CISO AppSec Guide: Metrics For Managing Risks &amp;amp; Application Security Investments|Part IV: Metrics For Managing Risks &amp;amp; Application Security Investments]]&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;** [[CISO AppSec Guide: &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;Metrics For Managing Risks &amp;amp; Application Security Investments&lt;/del&gt;|Part V: People and Organisation]]&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;** [[CISO AppSec Guide: &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;People and Organisation&lt;/ins&gt;|Part V: People and Organisation]]&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* Supporting Information&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* Supporting Information&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;** [[CISO AppSec Guide: References|References]]&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;** [[CISO AppSec Guide: References|References]]&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Tgondrom</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Application_Security_Guide_For_CISOs_v1.1bis&amp;diff=220471&amp;oldid=prev</id>
		<title>Tgondrom: /* Contents */ added chapter 5 people and org</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Application_Security_Guide_For_CISOs_v1.1bis&amp;diff=220471&amp;oldid=prev"/>
				<updated>2016-08-18T20:38:05Z</updated>
		
		<summary type="html">&lt;p&gt;‎&lt;span dir=&quot;auto&quot;&gt;&lt;span class=&quot;autocomment&quot;&gt;Contents: &lt;/span&gt; added chapter 5 people and org&lt;/span&gt;&lt;/p&gt;
&lt;table class=&quot;diff diff-contentalign-left&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class='diff-marker' /&gt;
				&lt;col class='diff-content' /&gt;
				&lt;col class='diff-marker' /&gt;
				&lt;col class='diff-content' /&gt;
				&lt;tr style='vertical-align: top;' lang='en'&gt;
				&lt;td colspan='2' style=&quot;background-color: white; color:black; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan='2' style=&quot;background-color: white; color:black; text-align: center;&quot;&gt;Revision as of 20:38, 18 August 2016&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l23&quot; &gt;Line 23:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 23:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;** [[CISO AppSec Guide: Application Security Program|Part III: Application Security Program]]&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;** [[CISO AppSec Guide: Application Security Program|Part III: Application Security Program]]&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;** [[CISO AppSec Guide: Metrics For Managing Risks &amp;amp; Application Security Investments|Part IV: Metrics For Managing Risks &amp;amp; Application Security Investments]]&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;** [[CISO AppSec Guide: Metrics For Managing Risks &amp;amp; Application Security Investments|Part IV: Metrics For Managing Risks &amp;amp; Application Security Investments]]&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&amp;#160;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;** [[CISO AppSec Guide: Metrics For Managing Risks &amp;amp; Application Security Investments|Part V: People and Organisation]]&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* Supporting Information&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* Supporting Information&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;** [[CISO AppSec Guide: References|References]]&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;** [[CISO AppSec Guide: References|References]]&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l29&quot; &gt;Line 29:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 30:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;** [[CISO AppSec Guide: Value of Data &amp;amp; Cost of an Incident|Appendix A: Value of Data &amp;amp; Cost of an Incident]]&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;** [[CISO AppSec Guide: Value of Data &amp;amp; Cost of an Incident|Appendix A: Value of Data &amp;amp; Cost of an Incident]]&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;** [[CISO AppSec Guide: Quick Reference to OWASP Guides &amp;amp; Projects|Appendix B: Quick Reference to OWASP Guides &amp;amp; Projects]]&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;** [[CISO AppSec Guide: Quick Reference to OWASP Guides &amp;amp; Projects|Appendix B: Quick Reference to OWASP Guides &amp;amp; Projects]]&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&lt;/del&gt;&lt;/div&gt;&lt;/td&gt;&lt;td colspan=&quot;2&quot;&gt;&amp;#160;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;== Licensing ==&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;== Licensing ==&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Tgondrom</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Application_Security_Guide_For_CISOs_v1.1bis&amp;diff=220470&amp;oldid=prev</id>
		<title>Tgondrom: creating version 1.1</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Application_Security_Guide_For_CISOs_v1.1bis&amp;diff=220470&amp;oldid=prev"/>
				<updated>2016-08-18T20:35:57Z</updated>
		
		<summary type="html">&lt;p&gt;creating version 1.1&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;__NOTOC__&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;100%&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;10&amp;quot;&lt;br /&gt;
|- valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| width=&amp;quot;70%&amp;quot; style=&amp;quot;background:#d9e9f9&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
= The CISO Guide =&lt;br /&gt;
&lt;br /&gt;
'''Application Security Guide For CISOs''' Version 1.0 was published in November 2013.&lt;br /&gt;
&lt;br /&gt;
La [[Guía de Seguridad en Aplicaciones para CISOs]] versión 1.0 (Español) fue publicada en marzo de 2015. &lt;br /&gt;
&lt;br /&gt;
== Contents ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Preamble&lt;br /&gt;
** [[CISO AppSec Guide: Introduction|Introduction]]&lt;br /&gt;
** [[CISO AppSec Guide: Executive Summary|Executive Summary]]&lt;br /&gt;
** [[CISO AppSec Guide: Foreword|Foreword]]&lt;br /&gt;
* The CISO Guide&lt;br /&gt;
** [[CISO AppSec Guide: Reasons for Investing in Application Security|Part I: Reasons for Investing in Application Security]]&lt;br /&gt;
** [[CISO AppSec Guide: Criteria for Managing Application Security Risks|Part II: Criteria for Managing Application Security Risks]]&lt;br /&gt;
** [[CISO AppSec Guide: Application Security Program|Part III: Application Security Program]]&lt;br /&gt;
** [[CISO AppSec Guide: Metrics For Managing Risks &amp;amp; Application Security Investments|Part IV: Metrics For Managing Risks &amp;amp; Application Security Investments]]&lt;br /&gt;
* Supporting Information&lt;br /&gt;
** [[CISO AppSec Guide: References|References]]&lt;br /&gt;
** [[CISO AppSec Guide: About OWASP|About OWASP]]&lt;br /&gt;
* Appendix&lt;br /&gt;
** [[CISO AppSec Guide: Value of Data &amp;amp; Cost of an Incident|Appendix A: Value of Data &amp;amp; Cost of an Incident]]&lt;br /&gt;
** [[CISO AppSec Guide: Quick Reference to OWASP Guides &amp;amp; Projects|Appendix B: Quick Reference to OWASP Guides &amp;amp; Projects]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Licensing ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Application Security Guide For CISOs is free to use. It is licensed under the [http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;100&amp;quot; style=&amp;quot;max-height:200px;overflow:hidden;background:#fff;margin:0;padding:0;&amp;quot; cellpadding=&amp;quot;0&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100px;max-height:300px;border:0;margin:0;padding-left:6px;padding-right:6px;overflow:visible;&amp;quot;&amp;gt;[[File:CISO-Guide-bar.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;30%&amp;quot; style=&amp;quot;background:#eeeeee&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
=Credits =&lt;br /&gt;
&lt;br /&gt;
== Project lead and main author ==&lt;br /&gt;
&lt;br /&gt;
* [[User:Marco-cincy|Marco Morana]]&lt;br /&gt;
&lt;br /&gt;
== Other contributors ==&lt;br /&gt;
&lt;br /&gt;
Co-authors, contributors and reviewers:&lt;br /&gt;
&lt;br /&gt;
* [[User:Tobias|Tobias Gondrom]]&lt;br /&gt;
* [[Eoin_Keary|Eoin Keary]]&lt;br /&gt;
* [[User:Andylew|Andy Lewis]]&lt;br /&gt;
* [[User:Stephanie_Tan|Stephanie Tan]]&lt;br /&gt;
* [[User:Clerkendweller|Colin Watson]]&lt;br /&gt;
&lt;br /&gt;
== Versión en español ==&lt;br /&gt;
&lt;br /&gt;
La [[Guía de Seguridad en Aplicaciones para CISOs]] (Español) fue editada y corregida por Mauro Gioino, Mauro Graziosi y [[User:Cristian_Borghello|Cristian Borghello]].&lt;br /&gt;
&lt;br /&gt;
=== Traductores al español ===&lt;br /&gt;
&lt;br /&gt;
* Daniel J. Fernández&lt;br /&gt;
* Franco Cian&lt;br /&gt;
* German Chiovetta&lt;br /&gt;
* Javier Albano&lt;br /&gt;
* Lucas Barbero&lt;br /&gt;
* [[User:Walter_Heffel|Walter Heffel]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Further Information =&lt;br /&gt;
&lt;br /&gt;
== CISO guide ==&lt;br /&gt;
&lt;br /&gt;
The OWASP CISO Guide is also available as&lt;br /&gt;
* [https://www.owasp.org/index.php/File:Owasp-ciso-guide.pdf [EN] Download PDF] &lt;br /&gt;
* [https://www.owasp.org/index.php/File:Owasp-ciso-guide_es.pdf [ES] Descarga PDF] &lt;br /&gt;
* [http://www.lulu.com/shop/owasp-foundation/application-security-guide-for-cisos-v10-nov-2013/paperback/product-21288580.html At cost print on demand monochrome book].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For full information about the Application Security Guide For CISOs Project, including mailing list details, the forward plan, how to contribute, the project status, and alternative media, see the project page:&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Application_Security_Guide_For_CISOs_Project CISO Guide Project Page]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== CISO survey ==&lt;br /&gt;
&lt;br /&gt;
The contributors to the [[OWASP CISO Survey]] also provided invaluable data for this guide.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Application_Security_Guide_For_CISO_Project]]&lt;/div&gt;</summary>
		<author><name>Tgondrom</name></author>	</entry>

	</feed>