Difference between revisions of "Application Security Guide For CISOs"

From OWASP
Jump to: navigation, search
m (Other Authors and Contributors: information -> data)
(Further details added)
Line 1: Line 1:
 
__NOTOC__
 
__NOTOC__
 
This is the contents page for the Application Security Guide For CISOs ([https://www.owasp.org/index.php/OWASP_CISO_Survey project details]).
 
  
 
{| width="100%" cellspacing="0" cellpadding="10"
 
{| width="100%" cellspacing="0" cellpadding="10"
Line 9: Line 7:
 
= Contents =
 
= Contents =
  
* [[CISO AppSec Guide: Introduction|Introduction]]
+
 
* [[CISO AppSec Guide: Foreword|Foreword]]
+
* Preamble
 +
** [[CISO AppSec Guide: Introduction|Introduction]]
 +
** [[CISO AppSec Guide: Foreword|Foreword]]
 
* The CISO Guide
 
* The CISO Guide
 
** [[CISO AppSec Guide: Reasons for Investing in Application Security|Part I: Reasons for Investing in Application Security]]
 
** [[CISO AppSec Guide: Reasons for Investing in Application Security|Part I: Reasons for Investing in Application Security]]
Line 31: Line 31:
 
=Credits =
 
=Credits =
  
== Primary Author and Editor ==
+
== Primary author and editor ==
  
 
* Marco Marona
 
* Marco Marona
  
== Other Authors and Contributors ==
+
== Other authors and contributors ==
  
 
* WHO ELSE????
 
* WHO ELSE????
Line 45: Line 45:
  
 
The contributors to the [[OWASP CISO Survey]] also provided invaluable data for this guide.
 
The contributors to the [[OWASP CISO Survey]] also provided invaluable data for this guide.
 +
 +
== Further details ==
 +
 +
For further information about the Application Security Guide For CISOs see the [https://www.owasp.org/index.php/OWASP_CISO_Survey project page].
 +
  
 
|}
 
|}

Revision as of 16:30, 20 September 2013


Contents

Credits

Primary author and editor

  • Marco Marona

Other authors and contributors

  • WHO ELSE????
  • Tobias Gondrom
  • Eoin Keary
  • Andy Lewis
  • Stephanie Tan
  • Colin Watson

The contributors to the OWASP CISO Survey also provided invaluable data for this guide.

Further details

For further information about the Application Security Guide For CISOs see the project page.