Difference between revisions of "Application Security Guide For CISOs"

From OWASP
Jump to: navigation, search
m (Use CSS for gaps instead of table cells)
m (Link title)
Line 46: Line 46:
 
== Other contributors ==
 
== Other contributors ==
  
Authors, editors, reviewers and promoters
+
Authors, editors, reviewers and promoters:
  
 
* [[User:Tobias|Tobias Gondrom]]
 
* [[User:Tobias|Tobias Gondrom]]
Line 57: Line 57:
 
= Further Information =
 
= Further Information =
  
== OWASP project ==
+
== CISO guide ==
  
For full information about the Application Security Guide For CISOs Project, including mailing list details, the forward plan, how to contribute, the project status, and alternative media, see the [https://www.owasp.org/index.php/OWASP_Application_Security_Guide_For_CISOs_Project project page].
+
For full information about the Application Security Guide For CISOs Project, including mailing list details, the forward plan, how to contribute, the project status, and alternative media, see the project page:
 +
* [https://www.owasp.org/index.php/OWASP_Application_Security_Guide_For_CISOs_Project CISO Guide Project Page]
  
  

Revision as of 09:19, 16 October 2013


The CISO Guide

Contents


Licensing

The OWASP Application Security Guide For CISOs is free to use. It is licensed under the Creative Commons Attribution-ShareAlike 3.0 license, so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.

CISO-Guide-bar.jpg

Credits

Primary author and editor


Other contributors

Authors, editors, reviewers and promoters:


Further Information

CISO guide

For full information about the Application Security Guide For CISOs Project, including mailing list details, the forward plan, how to contribute, the project status, and alternative media, see the project page:


CISO survey

The contributors to the OWASP CISO Survey also provided invaluable data for this guide.