This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Application Security Guide For CISOs"
From OWASP
(Update Table of Contents with new subpages) |
(Added credits and some formatting bits and bobs) |
||
Line 1: | Line 1: | ||
+ | __NOTOC__ | ||
+ | |||
+ | This is the contents page for the Application Security Guide For CISOs ([https://www.owasp.org/index.php/OWASP_CISO_Survey project details]). | ||
+ | |||
+ | {| width="100%" cellspacing="0" cellpadding="10" | ||
+ | |- valign="top" | ||
+ | | width="66%" style="background:#d9e9f9" | | ||
+ | |||
+ | = Contents = | ||
+ | |||
* [[CISO AppSec Guide: Introduction|Introduction]] | * [[CISO AppSec Guide: Introduction|Introduction]] | ||
* [[CISO AppSec Guide: Foreword|Foreword]] | * [[CISO AppSec Guide: Foreword|Foreword]] | ||
− | * [[CISO AppSec Guide: Reasons for Investing in Application Security|Part I: Reasons for Investing in Application Security]] | + | * The CISO Guide |
− | * [[CISO AppSec Guide: Criteria for Managing Application Security Risks|Part II: Criteria for Managing Application Security Risks]] | + | ** [[CISO AppSec Guide: Reasons for Investing in Application Security|Part I: Reasons for Investing in Application Security]] |
− | * [[CISO AppSec Guide: Selection of Application Security Processes|Part III: Selection of Application Security Processes]] | + | ** [[CISO AppSec Guide: Criteria for Managing Application Security Risks|Part II: Criteria for Managing Application Security Risks]] |
− | * [[CISO AppSec Guide: Metrics For Managing Risks & Application Security Investments|Part IV: Metrics For Managing Risks & Application Security Investments]] | + | ** [[CISO AppSec Guide: Selection of Application Security Processes|Part III: Selection of Application Security Processes]] |
− | * [[CISO AppSec Guide: References|References]] | + | ** [[CISO AppSec Guide: Metrics For Managing Risks & Application Security Investments|Part IV: Metrics For Managing Risks & Application Security Investments]] |
− | * [[CISO AppSec Guide: About OWASP|About OWASP]] | + | * Supporting Information |
− | * [[CISO AppSec Guide: Value of Data & Cost of an Incident|Appendix I-A: Value of Data & Cost of an Incident]] | + | ** [[CISO AppSec Guide: References|References]] |
− | * [[CISO AppSec Guide: Calculation Sheets|Appendix I-B: Calculation Sheets]] | + | ** [[CISO AppSec Guide: About OWASP|About OWASP]] |
− | * [[CISO AppSec Guide: Online Data Breach Cost Calculator|Appendix I-C: Online Data Breach Cost Calculator]] | + | * Appendices |
− | * [[CISO AppSec Guide: Quick Reference to OWASP Guides & Projects|Appendix I-D: Quick Reference to OWASP Guides & Projects]] | + | ** [[CISO AppSec Guide: Value of Data & Cost of an Incident|Appendix I-A: Value of Data & Cost of an Incident]] |
+ | ** [[CISO AppSec Guide: Calculation Sheets|Appendix I-B: Calculation Sheets]] | ||
+ | ** [[CISO AppSec Guide: Online Data Breach Cost Calculator|Appendix I-C: Online Data Breach Cost Calculator]] | ||
+ | ** [[CISO AppSec Guide: Quick Reference to OWASP Guides & Projects|Appendix I-D: Quick Reference to OWASP Guides & Projects]] | ||
+ | |||
+ | | width="1%" style="background:#ffffff" | | ||
+ | |||
+ | | width="33%" style="background:#eeeeee" | | ||
+ | |||
+ | =Credits = | ||
+ | |||
+ | == Primary Author and Editor == | ||
+ | |||
+ | * Marco Marona | ||
+ | |||
+ | == Other Authors and Contributors == | ||
+ | |||
+ | * WHO ELSE???? | ||
+ | * Tobias Gondrom | ||
+ | * Eoin Keary | ||
+ | * Andy Lewis | ||
+ | * Stephanie Tan | ||
+ | * Colin Watson | ||
+ | |||
+ | The contributors to the [[OWASP CISO Survey]] also provided invaluable information to this guide. | ||
+ | |||
+ | |} | ||
− | |||
[[Category:OWASP_Application_Security_Guide_For_CISO_Project]] | [[Category:OWASP_Application_Security_Guide_For_CISO_Project]] |
Revision as of 21:01, 20 September 2013
This is the contents page for the Application Security Guide For CISOs (project details).
Contents
|
CreditsPrimary Author and Editor
Other Authors and Contributors
The contributors to the OWASP CISO Survey also provided invaluable information to this guide. |