Difference between revisions of "Application Security Guide For CISOs"

From OWASP
Jump to: navigation, search
m
(Re-brand based on 10/1/2013 meeting)
(One intermediate revision by one user not shown)
Line 16: Line 16:
 
** [[CISO AppSec Guide: Reasons for Investing in Application Security|Part I: Reasons for Investing in Application Security]]
 
** [[CISO AppSec Guide: Reasons for Investing in Application Security|Part I: Reasons for Investing in Application Security]]
 
** [[CISO AppSec Guide: Criteria for Managing Application Security Risks|Part II: Criteria for Managing Application Security Risks]]
 
** [[CISO AppSec Guide: Criteria for Managing Application Security Risks|Part II: Criteria for Managing Application Security Risks]]
** [[CISO AppSec Guide: Selection of Application Security Processes|Part III: Selection of Application Security Processes]]
+
** [[CISO AppSec Guide: Application Security Program|Part III: Application Security Program]]
 
** [[CISO AppSec Guide: Metrics For Managing Risks & Application Security Investments|Part IV: Metrics For Managing Risks & Application Security Investments]]
 
** [[CISO AppSec Guide: Metrics For Managing Risks & Application Security Investments|Part IV: Metrics For Managing Risks & Application Security Investments]]
 
* Supporting Information
 
* Supporting Information
Line 53: Line 53:
 
== Further details ==
 
== Further details ==
  
If you wish to know more about this guide or to contribute, please visit the project page and subscribe to the mailing list.
+
If you wish to either know more about this guide or to contribute, please visit the project page and subscribe to the mailing list.
  
 
== Related projects ==
 
== Related projects ==

Revision as of 13:28, 1 October 2013


The Guide

Contents


Licensing

The OWASP Application Security Guide For CISOs is free to use. It is licensed under the Creative Commons Attribution-ShareAlike 3.0 license, so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.

Credits

Primary author and editor


Other authors and contributors

Further details

If you wish to either know more about this guide or to contribute, please visit the project page and subscribe to the mailing list.

Related projects

The contributors to the OWASP CISO Survey also provided invaluable data for this guide.


Project details

For further information about the Application Security Guide For CISOs see the project page.