Difference between revisions of "OWASP AppSec DC 2012/Integrating Application Security into your Lifecycle andProcurement"

From OWASP
Jump to: navigation, search
(Created page with "<noinclude>{{:OWASP AppSec DC 2012 Header}}</noinclude> __NOTOC__ == The Presentation == rightThe panel aims to explore how organizations trac...")
 
Line 2: Line 2:
 
__NOTOC__
 
__NOTOC__
 
== The Presentation  ==
 
== The Presentation  ==
[[Image:Owasp_logo_normal.jpg|right]]The panel aims to explore how organizations track and improve their coverage of vulnerabilities when they assess the software they build and/or buy. How do your organizations select the most effective tools and techniques to find each kind of vulnerability? What factors aid in choosing whether or not to automate or manually seek out particular vulnerabilities?<br>...finally, how does your organization track the above selection of assessment tools and techniques, attest to review compliance, and track quality vs cost? ===============================<br>We can populate this panel with vendors, yes, or we can populate it with organizations that use those vendors and get clearer, more actionable advice. I have some people in mind.
+
The panel aims to explore how organizations track and improve their coverage of vulnerabilities when they assess the software they build and/or buy. How do your organizations select the most effective tools and techniques to find each kind of vulnerability? What factors aid in choosing whether or not to automate or manually seek out particular vulnerabilities?<br>...finally, how does your organization track the above selection of assessment tools and techniques, attest to review compliance, and track quality vs cost?  
 
== The Speakers  ==
 
== The Speakers  ==
John Steven
+
<table>
 +
<tr>
 +
<td>
 +
===John Steven===
 +
[[Image:Owasp_logo_normal.jpg|left]]Bio TBA
 +
</td>
 +
</tr>
 +
</table>
 
<noinclude>{{:OWASP AppSec DC 2012 Footer}}</noinclude>
 
<noinclude>{{:OWASP AppSec DC 2012 Footer}}</noinclude>

Revision as of 19:57, 11 March 2012

AppSecDC-468x60-banner-2012.jpg

Registration Now OPEN! | Hotel | Schedule | Convention Center | AppSecDC.org

The Presentation

The panel aims to explore how organizations track and improve their coverage of vulnerabilities when they assess the software they build and/or buy. How do your organizations select the most effective tools and techniques to find each kind of vulnerability? What factors aid in choosing whether or not to automate or manually seek out particular vulnerabilities?
...finally, how does your organization track the above selection of assessment tools and techniques, attest to review compliance, and track quality vs cost?

The Speakers

John Steven

Owasp logo normal.jpg
Bio TBA

Gold Sponsors

Aspect logo owasp.jpg AppSecDC2009-Sponsor-securicon.gif AppSecDC2009-Sponsor-mandiant.gif AppSecDC2012-ISC2.gif

Silver Sponsors

SPL-LOGO-MED.png

Small Business

AppSecDC2012-Sponsor-sideas.gif BayShoreNetworks.png

Exhibitors

link=http://www.codenomicon.com/ Codenomicon WhiteHat Logo.png AppSecDC2012-HP.jpg WSI - Logo.jpg