Overview
Explore the creation process and underlying principles of the OWASP Top 10 in this informative 26-minute video presentation. Delve into the core principles, data collection methods, and challenges faced in compiling this crucial cybersecurity resource. Learn about managing likelihood, the importance of comprehensive data, and the intricacies of CVSS scoring. Gain insights into the (not so) secret formula used to determine the most critical web application security risks. Understand how the OWASP Foundation navigates through the complexities of data analysis to produce this invaluable guide for developers, security professionals, and organizations worldwide.
Syllabus
Intro
Core Principles
Start with the Data
It can be a little messy
Managing Likelihood
Need More Data
CVSS Scoring
Data Porridge
(Not so) Secret Formula
Taught by
OWASP Foundation