Using Third-Party Components for Building Secure Software - AppSec EU 2016

Using Third-Party Components for Building Secure Software - AppSec EU 2016

OWASP Foundation via YouTube Direct link

Strategies For Controlling Effort

18 of 19

18 of 19

Strategies For Controlling Effort

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Using Third-Party Components for Building Secure Software - AppSec EU 2016

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Secure Software Development
  3. 3 The Maintenance Challenge
  4. 4 Types of Third-Party Software
  5. 5 Data Sources
  6. 6 FLOSS Usage At SAP
  7. 7 What We Want
  8. 8 Vulnerability Prediction?
  9. 9 Vulnerability Prediction: Problems
  10. 10 Understanding Factors Is More Critical Than Predictions
  11. 11 Which Factors Are Interesting?
  12. 12 Relationships Between Factors
  13. 13 Different Maintenance Models
  14. 14 Centralized Security Maintenance
  15. 15 Distributed Security Maintenance
  16. 16 Hybrid Security Maintenance
  17. 17 Strategies For Controlling Risks (1/2)
  18. 18 Strategies For Controlling Effort
  19. 19 Conclusion

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.