Difference between revisions of "CISO AppSec Guide: References"

From OWASP
Jump to: navigation, search
m
Line 5: Line 5:
 
== Metrics and Benchmarking ==
 
== Metrics and Benchmarking ==
 
In order of report release date.
 
In order of report release date.
 +
 +
=== 2013 ===
 +
  
 
=== 2012 ===
 
=== 2012 ===
Line 74: Line 77:
  
 
* State of Application Security - Immature Practices Fuel Inefficiencies, But Positive ROI Is Attainable, Forrester Consulting, 2011 http://www.microsoft.com/downloads/en/details.aspx?FamilyID=813810f9-2a8e-4cbf-bd8f-1b0aca7af61d&displaylang=en
 
* State of Application Security - Immature Practices Fuel Inefficiencies, But Positive ROI Is Attainable, Forrester Consulting, 2011 http://www.microsoft.com/downloads/en/details.aspx?FamilyID=813810f9-2a8e-4cbf-bd8f-1b0aca7af61d&displaylang=en
 +
 +
* Dan E Geer Economics and Strategies of Data Security: http://www.amazon.com/Economics-Strategies-Data-Security-DANIEL/dp/B001LZM1BY
  
 
== NEEDS CATEGORIES ==  
 
== NEEDS CATEGORIES ==  
 
 
 
== DEAD LINKS ==
 
 
* Dan E Geer Economics and Strategies of Data Security: http://www.verdasys.com/thoughtleadership/
 
(Use link to Amazon book page?)
 
  
  
 
[[Category:OWASP_Application_Security_Guide_For_CISO_Project]]
 
[[Category:OWASP_Application_Security_Guide_For_CISO_Project]]

Revision as of 16:46, 23 October 2013

< Back to the Application Security Guide For CISOs

References

Metrics and Benchmarking

In order of report release date.

2013

2012

2011

2010

2009 and prior

Standards

Guidelines and Best Practices

Security Incidents and Data Breaches

Security Investments and Budgets

  • Gordon, L.A. and Loeb, M.P. “The economics of information security investment”, ACM Transactions on Information and Systems Security, Vol.5, No.4, pp.438-457, 2002.

NEEDS CATEGORIES