This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
OWASP AppSec DC 2012/Integrating Application Security into your Lifecycle andProcurement
From OWASP
Revision as of 20:46, 2 March 2012 by Mark.bristow (talk | contribs) (Created page with "<noinclude>{{:OWASP AppSec DC 2012 Header}}</noinclude> __NOTOC__ == The Presentation == rightThe panel aims to explore how organizations trac...")
Registration Now OPEN! | Hotel | Schedule | Convention Center | AppSecDC.org
The Presentation
The panel aims to explore how organizations track and improve their coverage of vulnerabilities when they assess the software they build and/or buy. How do your organizations select the most effective tools and techniques to find each kind of vulnerability? What factors aid in choosing whether or not to automate or manually seek out particular vulnerabilities?...finally, how does your organization track the above selection of assessment tools and techniques, attest to review compliance, and track quality vs cost? ===============================
We can populate this panel with vendors, yes, or we can populate it with organizations that use those vendors and get clearer, more actionable advice. I have some people in mind.
The Speakers
John Steven
Gold Sponsors |
||||
Silver Sponsors |
||||
Small Business |
||||
Exhibitors |