OWASP CISO Survey

{| width="100%" cellspacing="0" cellpadding="10"
 * - valign="top"
 * width="70%" style="background:#d9e9f9" |

= The CISO Survey and Report 2013 =

CISO Survey 2013 Version 1.0 is published in January 2014.

Contents

 * Preamble
 * Foreword
 * Executive Summary
 * Introduction


 * The CISO Survey Report
 * Threats and risks
 * Investments and challenges
 * Tools and technology
 * Governance and control
 * Conclusions


 * Supporting Information
 * References
 * About OWASP


 * Appendix
 * Appendix A: Quick Reference to OWASP Guides & Projects
 * Appendix B: References to selection of OWASP Guides and Projects

Licensing
The OWASP CISO Survey Report is free to use. It is licensed under the Creative Commons Attribution-ShareAlike 3.0 license, so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.


 * width="100" style="max-height:200px;overflow:hidden;background:#fff;margin:0;padding:0;" cellpadding="0" |




 * width="30%" style="background:#eeeeee" |

=Credits =

Project lead and main author

 * Tobias Gondrom

Other contributors
Co-authors, contributors and reviewers:


 * Marco Morana
 * Stephanie Tan
 * Colin Watson
 * And further Acknowledgements: many more helping hands from OWASP chapters around the world and the former Global Industry Committee, providing input, designing questions, translating and sending out the survey questions around the globe. Thank you all! We couldn't have done it without you!

= Further Information =

CISO Survey
The OWASP CISO Survey is also available as
 * Free downloadable PDF

For full information about the OWASP CISO Survey Report Project, including mailing list details, the forward plan, how to contribute, the project status, and alternative media, see the project page:
 * CISO Survey Project Page

CISO Guide
The contributors from the Application Security Guide For CISOs also provided invaluable input for this survey report.


 * }