Application Security Guide For CISOs

This is the contents page for the Application Security Guide For CISOs (project details).

{| width="100%" cellspacing="0" cellpadding="10"
 * - valign="top"
 * width="66%" style="background:#d9e9f9" |

= Contents =


 * Introduction
 * Foreword
 * The CISO Guide
 * Part I: Reasons for Investing in Application Security
 * Part II: Criteria for Managing Application Security Risks
 * Part III: Selection of Application Security Processes
 * Part IV: Metrics For Managing Risks & Application Security Investments
 * Supporting Information
 * References
 * About OWASP
 * Appendices
 * Appendix I-A: Value of Data & Cost of an Incident
 * Appendix I-B: Calculation Sheets
 * Appendix I-C: Online Data Breach Cost Calculator
 * Appendix I-D: Quick Reference to OWASP Guides & Projects


 * width="1%" style="background:#ffffff" |


 * width="33%" style="background:#eeeeee" |

=Credits =

Primary Author and Editor

 * Marco Marona

Other Authors and Contributors

 * WHO ELSE????
 * Tobias Gondrom
 * Eoin Keary
 * Andy Lewis
 * Stephanie Tan
 * Colin Watson

The contributors to the OWASP CISO Survey also provided invaluable information to this guide.


 * }