HIT Consultant Insightful coverage of healthcare innovation
> HP - Enterprise > A CISO's Guide to Securing Open Source Software

A CISO's Guide to Securing Open Source Software

Webinar Published By: HP - Enterprise
HP - Enterprise
Published:  Nov 19, 2008
Type:  Webinar

For a CISO, open source introduces a new source of risk and unique security challenge: how do you influence developers over whom you have no direct management control? Jennifer Bayuk, former CISO of Bear Stearns, provides insight on best practices for evaluating, deploying and managing open source code.

Tags : 
business risk, security, application security, audit, risk, vulnerabilities, fortify, fortify software, hackers, cyber threats, application security standards, threats, assessment, remediation, jennifer bayuk, bear stearns, ciso, application security best practices