This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "OWASP CISO Survey"
(update release dates) |
(update CISO Survey page) |
||
Line 1: | Line 1: | ||
− | + | __NOTOC__ | |
− | |||
− | = | + | {| width="100%" cellspacing="0" cellpadding="10" |
− | + | |- valign="top" | |
+ | | width="70%" style="background:#d9e9f9" | | ||
− | =The CISO | + | = The CISO Guide = |
− | |||
− | + | Version 1.0 to be published in December 2013 / January 2014. | |
− | |||
− | |||
− | |||
− | |||
− | == | + | == Contents == |
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | + | * Preamble | |
− | + | ** [[CISO Survey 2013: Foreword|Foreword]] | |
+ | ** [[CISO Survey 2013: Executive Summary|Executive Summary]] | ||
+ | ** [[CISO Survey 2013: Introduction|Introduction]] | ||
+ | ** [[CISO Survey 2013: Methodology and data collection|Methodology and data collection]] | ||
+ | * The CISO Survey Report | ||
+ | ** [[CISO Survey 2013: Threats and risks|Threats and risks]] | ||
+ | ** [[CISO Survey 2013: Investments and challenges|Investments and challenges]] | ||
+ | ** [[CISO Survey 2013: Tools and technology|Tools and technology]] | ||
+ | ** [[CISO Survey 2013: Governance and control|Governance and control]] | ||
+ | ** [[CISO Survey 2013: Conclusions|Conclusions]] | ||
− | [[ | + | |
+ | * Supporting Information | ||
+ | ** [[CISO Survey 2013: References|References]] | ||
+ | ** [[CISO Survey 2013: About OWASP|About OWASP]] | ||
+ | ** [[CISO Survey 2013: Conclusions|Conclusions]] | ||
+ | |||
+ | * Appendix | ||
+ | ** [[CISO AppSec Guide: Quick Reference to OWASP Guides & Projects|Appendix B: Quick Reference to OWASP Guides & Projects]] | ||
+ | |||
+ | |||
+ | == Licensing == | ||
+ | |||
+ | The OWASP CISO Survey Report is free to use. It is licensed under the [http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one. | ||
+ | |||
+ | | width="100" style="max-height:200px;overflow:hidden;background:#fff;margin:0;padding:0;" cellpadding="0" | | ||
+ | |||
+ | <div style="width:100px;max-height:300px;border:0;margin:0;padding-left:6px;padding-right:6px;overflow:visible;">[[File:CISO-Guide-bar.jpg|link=]]</div> | ||
+ | |||
+ | | width="30%" style="background:#eeeeee" | | ||
+ | |||
+ | =Credits = | ||
+ | |||
+ | == Project lead and main author == | ||
+ | |||
+ | * [[User:Tobias|Tobias Gondrom]] | ||
+ | |||
+ | |||
+ | == Other contributors == | ||
+ | |||
+ | Co-authors, contributors and reviewers: | ||
+ | |||
+ | * [[User:Marco-cincy|Marco Morana]] | ||
+ | * [[User:Stephanie_Tan|Stephanie Tan]] | ||
+ | * [[User:Clerkendweller|Colin Watson]] | ||
+ | |||
+ | |||
+ | = Further Information = | ||
+ | |||
+ | == CISO Survey == | ||
+ | |||
+ | The OWASP CISO Survey is also available as | ||
+ | |||
+ | |||
+ | For full information about the OWASP CISO Survey Report Project, including mailing list details, the forward plan, how to contribute, the project status, and alternative media, see the project page: | ||
+ | * [https://www.owasp.org/index.php/OWASP_CISO_Survey_Project CISO Survey Project Page] | ||
+ | |||
+ | |||
+ | == CISO survey == | ||
+ | |||
+ | The contributors to the OWASP CISO Guide and the Global Industry Committee as well as numerous chapters also provided invaluable data for this guide. | ||
+ | |||
+ | |||
+ | |} | ||
+ | |||
+ | |||
+ | [[Category:OWASP_Application_Security_Guide_For_CISO_Project]] |
Revision as of 23:18, 6 January 2014
The CISO GuideVersion 1.0 to be published in December 2013 / January 2014. Contents
LicensingThe OWASP CISO Survey Report is free to use. It is licensed under the Creative Commons Attribution-ShareAlike 3.0 license, so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one. |
CreditsProject lead and main author
Other contributorsCo-authors, contributors and reviewers:
Further InformationCISO SurveyThe OWASP CISO Survey is also available as
CISO surveyThe contributors to the OWASP CISO Guide and the Global Industry Committee as well as numerous chapters also provided invaluable data for this guide.
|