This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "OWASP AppSec DC 2012/Integrating Application Security into your Lifecycle andProcurement"

From OWASP
Jump to: navigation, search
m (John Steven)
m (Jim Manico)
Line 8: Line 8:
 
<td>
 
<td>
 
===Jim Manico===
 
===Jim Manico===
[[Image:Owasp_logo_normal.jpg|left]]<br/>OWASP Connections Committee chair, VP Security Architecture, WhiteHat Security
+
[[Image:Owasp_logo_normal.jpg|left]]<br/>OWASP Connections Committee chair<br/>VP Security Architecture, WhiteHat Security
 
</td>
 
</td>
 
</tr>
 
</tr>
 
</table>
 
</table>
 
<noinclude>{{:OWASP AppSec DC 2012 Footer}}</noinclude>
 
<noinclude>{{:OWASP AppSec DC 2012 Footer}}</noinclude>

Revision as of 14:31, 26 March 2012

AppSecDC-468x60-banner-2012.jpg

Registration Now OPEN! | Hotel | Schedule | Convention Center | AppSecDC.org

The Presentation

The panel aims to explore how organizations track and improve their coverage of vulnerabilities when they assess the software they build and/or buy. How do your organizations select the most effective tools and techniques to find each kind of vulnerability? What factors aid in choosing whether or not to automate or manually seek out particular vulnerabilities?
...finally, how does your organization track the above selection of assessment tools and techniques, attest to review compliance, and track quality vs cost?

The Speakers

Jim Manico

Owasp logo normal.jpg

OWASP Connections Committee chair
VP Security Architecture, WhiteHat Security

Gold Sponsors

Aspect logo owasp.jpg AppSecDC2009-Sponsor-securicon.gif AppSecDC2009-Sponsor-mandiant.gif AppSecDC2012-ISC2.gif

Silver Sponsors

SPL-LOGO-MED.png

Small Business

AppSecDC2012-Sponsor-sideas.gif BayShoreNetworks.png

Exhibitors

link=http://www.codenomicon.com/ Codenomicon WhiteHat Logo.png AppSecDC2012-HP.jpg WSI - Logo.jpg