SlideShare ist ein Scribd-Unternehmen logo
1 von 28
TrustedSoftwareAlliance.com
Thoughts, Ideas and Trends in Application Security
My SharePoint Destinations
International
Montreal
Ottawa
Toronto
Birmingham, UK
London
Nottingham, UK
Dubai
Sydney
Canberra, AU
Wellington, NZ
Philippines
Beijing
Shanghai
Switzerland
France
Uruguay
Argentian
Chile
Antarctica
United States
Virginia
Michigan
Florida
Denver
New York City
San Francisco
Los Angeles
Washington DC
Baltimore
Philidelphia
Boston
What is TSWA
It is an Idea
“Security needs to be pushed as far „left‟
in the application life cycle as possible
through automated discovery and
remediation.” -- TSWA
It is a Resource
1.Define Good Component Practice
2.Promote industry reports and surveys
3.Support industry influencers
It is a Web Site
Our Main Initiatives
50-in-50 Interview Series
Survey: October 2013
The Role of DevOps
in Application Security
Good Component Practice
What We Believe
Moving Left Saves Money
The Cost of Change
“100 to 1 cost growth was happening on large,
unenlightened projects.” -- Barry Boehm
What We Have Learned About
Fighting Defects
“Finding and fixing a software problem after
delivery is often 100 times more expensive
than finding and fixing it during the
requirements and design phase.”
-- The Center for Empirically Based Software
Engineering
The Cost of Software Defects
“The cost of correcting a defect rises
exponentially with the time taken to identify
the defect.” -- Jon Strickler
Please Help us “Move Left”
Listen to the Interviews
Provide Content
Support the Survey
The Role of DevOps
in Application Security
TrustedSoftwareAlliance.com
Thoughts, Ideas and Trends in Application Security

Weitere ähnliche Inhalte

Ähnlich wie Trusted Software Alliance

六合彩香港-六合彩
六合彩香港-六合彩六合彩香港-六合彩
六合彩香港-六合彩
baoyin
 
Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Aicpa tech+panel presentation t6 managing risks and security 2014 v3Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Doeren Mayhew
 
Getting started in tech (6 21)
Getting started in tech (6 21)Getting started in tech (6 21)
Getting started in tech (6 21)
Thinkful
 
2013 michael coates-javaone
2013 michael coates-javaone2013 michael coates-javaone
2013 michael coates-javaone
Michael Coates
 
Current & Emerging Cyber Security Threats
Current & Emerging Cyber Security ThreatsCurrent & Emerging Cyber Security Threats
Current & Emerging Cyber Security Threats
NCC Group
 

Ähnlich wie Trusted Software Alliance (20)

Worldwide Intranet Challenge - Intranet end user behavior Sept 2013
Worldwide Intranet Challenge - Intranet end user behavior Sept 2013Worldwide Intranet Challenge - Intranet end user behavior Sept 2013
Worldwide Intranet Challenge - Intranet end user behavior Sept 2013
 
DevSecOps without DevOps is Just Security
DevSecOps without DevOps is Just SecurityDevSecOps without DevOps is Just Security
DevSecOps without DevOps is Just Security
 
Aufbau von agilen und effizienten IT Organisationen mit DevOps
Aufbau von agilen und effizienten IT Organisationen mit DevOpsAufbau von agilen und effizienten IT Organisationen mit DevOps
Aufbau von agilen und effizienten IT Organisationen mit DevOps
 
2016 - Safely Removing the Last Roadblock to Continuous Delivery
2016 - Safely Removing the Last Roadblock to Continuous Delivery2016 - Safely Removing the Last Roadblock to Continuous Delivery
2016 - Safely Removing the Last Roadblock to Continuous Delivery
 
Building an Open Source AppSec Pipeline
Building an Open Source AppSec PipelineBuilding an Open Source AppSec Pipeline
Building an Open Source AppSec Pipeline
 
六合彩香港-六合彩
六合彩香港-六合彩六合彩香港-六合彩
六合彩香港-六合彩
 
Incidents - The Shorter, the Better with the Quality Engineering Discipline
Incidents - The Shorter, the Better with the Quality Engineering DisciplineIncidents - The Shorter, the Better with the Quality Engineering Discipline
Incidents - The Shorter, the Better with the Quality Engineering Discipline
 
Safely Removing the Last Roadblock to Continuous Delivery
Safely Removing the Last Roadblock to Continuous DeliverySafely Removing the Last Roadblock to Continuous Delivery
Safely Removing the Last Roadblock to Continuous Delivery
 
2011 03 14 dev ops meetup - top lessons creating dev-ops super-tribes 2b
2011 03 14   dev ops meetup - top lessons creating dev-ops super-tribes 2b2011 03 14   dev ops meetup - top lessons creating dev-ops super-tribes 2b
2011 03 14 dev ops meetup - top lessons creating dev-ops super-tribes 2b
 
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptxTop_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
 
GITA March 2015 Newsletter
GITA March 2015 NewsletterGITA March 2015 Newsletter
GITA March 2015 Newsletter
 
How will social media and other new technologies impact our industry the next...
How will social media and other new technologies impact our industry the next...How will social media and other new technologies impact our industry the next...
How will social media and other new technologies impact our industry the next...
 
Agile data science
Agile data scienceAgile data science
Agile data science
 
2013 Data Protection Maturity Trends: How Do You Compare?
2013 Data Protection Maturity Trends: How Do You Compare?2013 Data Protection Maturity Trends: How Do You Compare?
2013 Data Protection Maturity Trends: How Do You Compare?
 
A Tech Talks About DevOps Solution With Yann Mulonda
A Tech Talks About DevOps Solution With Yann MulondaA Tech Talks About DevOps Solution With Yann Mulonda
A Tech Talks About DevOps Solution With Yann Mulonda
 
Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Aicpa tech+panel presentation t6 managing risks and security 2014 v3Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Aicpa tech+panel presentation t6 managing risks and security 2014 v3
 
Getting started in tech (6 21)
Getting started in tech (6 21)Getting started in tech (6 21)
Getting started in tech (6 21)
 
2013 michael coates-javaone
2013 michael coates-javaone2013 michael coates-javaone
2013 michael coates-javaone
 
Quality at Speed: The Imperatives of Integration Tomorrow
Quality at Speed: The Imperatives of Integration TomorrowQuality at Speed: The Imperatives of Integration Tomorrow
Quality at Speed: The Imperatives of Integration Tomorrow
 
Current & Emerging Cyber Security Threats
Current & Emerging Cyber Security ThreatsCurrent & Emerging Cyber Security Threats
Current & Emerging Cyber Security Threats
 

Mehr von EndUserSharePoint

Gain Community and Global Visibility: A Five Step Process
Gain Community and Global Visibility: A Five Step ProcessGain Community and Global Visibility: A Five Step Process
Gain Community and Global Visibility: A Five Step Process
EndUserSharePoint
 

Mehr von EndUserSharePoint (8)

DevOps and Application Security: People You Need to Know
DevOps and Application Security: People You Need to KnowDevOps and Application Security: People You Need to Know
DevOps and Application Security: People You Need to Know
 
Community and Global Visibility: Influencer Marketing on a Global Scale
Community and Global Visibility: Influencer Marketing on a Global ScaleCommunity and Global Visibility: Influencer Marketing on a Global Scale
Community and Global Visibility: Influencer Marketing on a Global Scale
 
Gain Community and Global Visibility: A Five Step Process
Gain Community and Global Visibility: A Five Step ProcessGain Community and Global Visibility: A Five Step Process
Gain Community and Global Visibility: A Five Step Process
 
How "Un-Social" is SharePoint?
How "Un-Social" is SharePoint?How "Un-Social" is SharePoint?
How "Un-Social" is SharePoint?
 
Re-Experience SharePoint - Ripping Apart the Interface on SharePoint 2010
Re-Experience SharePoint - Ripping Apart the Interface on SharePoint 2010Re-Experience SharePoint - Ripping Apart the Interface on SharePoint 2010
Re-Experience SharePoint - Ripping Apart the Interface on SharePoint 2010
 
The Missing Link Between SharePoint and the End User Community
The Missing Link Between SharePoint and the End User CommunityThe Missing Link Between SharePoint and the End User Community
The Missing Link Between SharePoint and the End User Community
 
Being agile with SharePoint
Being agile with SharePointBeing agile with SharePoint
Being agile with SharePoint
 
SharePoint Summit 2010 Keynote - Mark Miller
SharePoint Summit 2010 Keynote - Mark MillerSharePoint Summit 2010 Keynote - Mark Miller
SharePoint Summit 2010 Keynote - Mark Miller
 

Kürzlich hochgeladen

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Kürzlich hochgeladen (20)

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 

Trusted Software Alliance

Hinweis der Redaktion

  1. The Trusted Software AllianceMark Miller, Founder and CuratorMark.Miller@TrustedSoftwareAlliance.com@TSWAllianceFacebook: https://www.facebook.com/TrustedSoftwareAlliance
  2. I have spoken throughout the world as keynote speaker at major conferences as well as to small, local enthusiast groups. My main expertise is in simplifying the story of technology into layman terms.
  3. Agile Software Development Systems: The Cost of Change (page 220)http://books.google.com/books?id=uE4FGFOHs2EC&pg
  4. What We Have Learned About Fighting Defects - The Center for Empirically Based Software Engineeringhttp://www.cs.umd.edu/~mvz/pub/eworkshop02.pdf
  5. The Cost of Software Defects – Jon Stricklerhttp://agileelements.wordpress.com/2008/04/22/cost-of-software-defects/
  6. Cost of Software Defects – Jon Stricklerhttp://agileelements.wordpress.com/2008/04/22/cost-of-software-defects/
  7. The Trusted Software AllianceMark Miller, Founder and CuratorMark.Miller@TrustedSoftwareAlliance.com@TSWAllianceFacebook: https://www.facebook.com/TrustedSoftwareAlliance