Download - Trusted Software Alliance
![Page 1: Trusted Software Alliance](https://reader033.vdocuments.us/reader033/viewer/2022060201/5599ad3d1a28ab511d8b45d5/html5/thumbnails/1.jpg)
TrustedSoftwareAlliance.comThoughts, Ideas and Trends in Application Security
![Page 2: Trusted Software Alliance](https://reader033.vdocuments.us/reader033/viewer/2022060201/5599ad3d1a28ab511d8b45d5/html5/thumbnails/2.jpg)
My SharePoint Destinations
International
Montreal
Ottawa
Toronto
Birmingham, UK
London
Nottingham, UK
Dubai
Sydney
Canberra, AU
Wellington, NZ
Philippines
Beijing
Shanghai
Switzerland
France
Uruguay
Argentian
Chile
Antarctica
United States
Virginia
Michigan
Florida
Denver
New York City
San Francisco
Los Angeles
Washington DC
Baltimore
Philidelphia
Boston
![Page 3: Trusted Software Alliance](https://reader033.vdocuments.us/reader033/viewer/2022060201/5599ad3d1a28ab511d8b45d5/html5/thumbnails/3.jpg)
What is TSWA
![Page 4: Trusted Software Alliance](https://reader033.vdocuments.us/reader033/viewer/2022060201/5599ad3d1a28ab511d8b45d5/html5/thumbnails/4.jpg)
It is an Idea
“Security needs to be pushed as far „left‟
in the application life cycle as possible
through automated discovery and
remediation.” -- TSWA
![Page 5: Trusted Software Alliance](https://reader033.vdocuments.us/reader033/viewer/2022060201/5599ad3d1a28ab511d8b45d5/html5/thumbnails/5.jpg)
It is a Resource
1.Define Good Component Practice
2.Promote industry reports and surveys
3.Support industry influencers
![Page 6: Trusted Software Alliance](https://reader033.vdocuments.us/reader033/viewer/2022060201/5599ad3d1a28ab511d8b45d5/html5/thumbnails/6.jpg)
It is a Web Site
![Page 7: Trusted Software Alliance](https://reader033.vdocuments.us/reader033/viewer/2022060201/5599ad3d1a28ab511d8b45d5/html5/thumbnails/7.jpg)
Our Main Initiatives
![Page 8: Trusted Software Alliance](https://reader033.vdocuments.us/reader033/viewer/2022060201/5599ad3d1a28ab511d8b45d5/html5/thumbnails/8.jpg)
50-in-50 Interview Series
![Page 9: Trusted Software Alliance](https://reader033.vdocuments.us/reader033/viewer/2022060201/5599ad3d1a28ab511d8b45d5/html5/thumbnails/9.jpg)
![Page 10: Trusted Software Alliance](https://reader033.vdocuments.us/reader033/viewer/2022060201/5599ad3d1a28ab511d8b45d5/html5/thumbnails/10.jpg)
![Page 11: Trusted Software Alliance](https://reader033.vdocuments.us/reader033/viewer/2022060201/5599ad3d1a28ab511d8b45d5/html5/thumbnails/11.jpg)
![Page 12: Trusted Software Alliance](https://reader033.vdocuments.us/reader033/viewer/2022060201/5599ad3d1a28ab511d8b45d5/html5/thumbnails/12.jpg)
![Page 13: Trusted Software Alliance](https://reader033.vdocuments.us/reader033/viewer/2022060201/5599ad3d1a28ab511d8b45d5/html5/thumbnails/13.jpg)
Survey: October 2013
The Role of DevOps
in Application Security
![Page 14: Trusted Software Alliance](https://reader033.vdocuments.us/reader033/viewer/2022060201/5599ad3d1a28ab511d8b45d5/html5/thumbnails/14.jpg)
Good Component Practice
![Page 15: Trusted Software Alliance](https://reader033.vdocuments.us/reader033/viewer/2022060201/5599ad3d1a28ab511d8b45d5/html5/thumbnails/15.jpg)
What We Believe
![Page 16: Trusted Software Alliance](https://reader033.vdocuments.us/reader033/viewer/2022060201/5599ad3d1a28ab511d8b45d5/html5/thumbnails/16.jpg)
![Page 17: Trusted Software Alliance](https://reader033.vdocuments.us/reader033/viewer/2022060201/5599ad3d1a28ab511d8b45d5/html5/thumbnails/17.jpg)
![Page 18: Trusted Software Alliance](https://reader033.vdocuments.us/reader033/viewer/2022060201/5599ad3d1a28ab511d8b45d5/html5/thumbnails/18.jpg)
![Page 19: Trusted Software Alliance](https://reader033.vdocuments.us/reader033/viewer/2022060201/5599ad3d1a28ab511d8b45d5/html5/thumbnails/19.jpg)
Moving Left Saves Money
![Page 20: Trusted Software Alliance](https://reader033.vdocuments.us/reader033/viewer/2022060201/5599ad3d1a28ab511d8b45d5/html5/thumbnails/20.jpg)
The Cost of Change
“100 to 1 cost growth was happening on large,
unenlightened projects.” -- Barry Boehm
![Page 21: Trusted Software Alliance](https://reader033.vdocuments.us/reader033/viewer/2022060201/5599ad3d1a28ab511d8b45d5/html5/thumbnails/21.jpg)
What We Have Learned About
Fighting Defects
“Finding and fixing a software problem after
delivery is often 100 times more expensive
than finding and fixing it during the
requirements and design phase.”
-- The Center for Empirically Based Software
Engineering
![Page 22: Trusted Software Alliance](https://reader033.vdocuments.us/reader033/viewer/2022060201/5599ad3d1a28ab511d8b45d5/html5/thumbnails/22.jpg)
The Cost of Software Defects
“The cost of correcting a defect rises
exponentially with the time taken to identify
the defect.” -- Jon Strickler
![Page 23: Trusted Software Alliance](https://reader033.vdocuments.us/reader033/viewer/2022060201/5599ad3d1a28ab511d8b45d5/html5/thumbnails/23.jpg)
![Page 24: Trusted Software Alliance](https://reader033.vdocuments.us/reader033/viewer/2022060201/5599ad3d1a28ab511d8b45d5/html5/thumbnails/24.jpg)
Please Help us “Move Left”
![Page 25: Trusted Software Alliance](https://reader033.vdocuments.us/reader033/viewer/2022060201/5599ad3d1a28ab511d8b45d5/html5/thumbnails/25.jpg)
Listen to the Interviews
![Page 26: Trusted Software Alliance](https://reader033.vdocuments.us/reader033/viewer/2022060201/5599ad3d1a28ab511d8b45d5/html5/thumbnails/26.jpg)
Provide Content
![Page 27: Trusted Software Alliance](https://reader033.vdocuments.us/reader033/viewer/2022060201/5599ad3d1a28ab511d8b45d5/html5/thumbnails/27.jpg)
Support the Survey
The Role of DevOps
in Application Security
![Page 28: Trusted Software Alliance](https://reader033.vdocuments.us/reader033/viewer/2022060201/5599ad3d1a28ab511d8b45d5/html5/thumbnails/28.jpg)
TrustedSoftwareAlliance.comThoughts, Ideas and Trends in Application Security