This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "OWASP AppSec DC 2012/Integrating Application Security into your Lifecycle andProcurement"
Mark.bristow (talk | contribs) |
m (→John Steven) |
||
Line 7: | Line 7: | ||
<tr> | <tr> | ||
<td> | <td> | ||
− | === | + | ===Jim Manico=== |
− | [[Image:Owasp_logo_normal.jpg|left]] | + | [[Image:Owasp_logo_normal.jpg|left]]<br/>OWASP Connections Committee chair, VP Security Architecture, WhiteHat Security |
</td> | </td> | ||
</tr> | </tr> | ||
</table> | </table> | ||
<noinclude>{{:OWASP AppSec DC 2012 Footer}}</noinclude> | <noinclude>{{:OWASP AppSec DC 2012 Footer}}</noinclude> |
Revision as of 14:30, 26 March 2012
Registration Now OPEN! | Hotel | Schedule | Convention Center | AppSecDC.org
The Presentation
The panel aims to explore how organizations track and improve their coverage of vulnerabilities when they assess the software they build and/or buy. How do your organizations select the most effective tools and techniques to find each kind of vulnerability? What factors aid in choosing whether or not to automate or manually seek out particular vulnerabilities?
...finally, how does your organization track the above selection of assessment tools and techniques, attest to review compliance, and track quality vs cost?
The Speakers
Jim ManicoOWASP Connections Committee chair, VP Security Architecture, WhiteHat Security |
Gold Sponsors |
||||
Silver Sponsors |
||||
Small Business |
||||
Exhibitors |