A CISO's Guide to Securing Open Source Software

HP - Enterprise

For a CISO, open source introduces a new source of risk and unique security challenge: how do you influence developers over whom you have no direct management control? Jennifer Bayuk, former CISO of Bear Stearns, provides insight on best practices for evaluating, deploying and managing open source code.

Tags : business risk, security, application security, audit, risk, vulnerabilities, fortify, fortify software, hackers, cyber threats, application security standards, threats, assessment, remediation, jennifer bayuk, bear stearns, ciso, application security best practices


* Please enter your email address and click the Download Now button to download the white paper.

 Email this page
Published:  Nov 19, 2008
Type:  Webinar