OWASP AppSec DC 2012/Integrating Application Security into your Lifecycle andProcurement

From OWASP
Revision as of 15:46, 2 March 2012 by Mark.bristow (Talk | contribs)

(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to: navigation, search

AppSecDC-468x60-banner-2012.jpg

Registration Now OPEN! | Hotel | Schedule | Convention Center | AppSecDC.org

The Presentation

Owasp logo normal.jpg
The panel aims to explore how organizations track and improve their coverage of vulnerabilities when they assess the software they build and/or buy. How do your organizations select the most effective tools and techniques to find each kind of vulnerability? What factors aid in choosing whether or not to automate or manually seek out particular vulnerabilities?
...finally, how does your organization track the above selection of assessment tools and techniques, attest to review compliance, and track quality vs cost? ===============================
We can populate this panel with vendors, yes, or we can populate it with organizations that use those vendors and get clearer, more actionable advice. I have some people in mind.

The Speakers

John Steven


Gold Sponsors

Aspect logo owasp.jpg AppSecDC2009-Sponsor-securicon.gif AppSecDC2009-Sponsor-mandiant.gif AppSecDC2012-ISC2.gif

Silver Sponsors

SPL-LOGO-MED.png

Small Business

AppSecDC2012-Sponsor-sideas.gif BayShoreNetworks.png

Exhibitors

link=http://www.codenomicon.com/ Codenomicon WhiteHat Logo.png AppSecDC2012-HP.jpg WSI - Logo.jpg