trusted software alliance
DESCRIPTION
The Trusted Software Alliance was founded in May of 2013 to raise public and professional awareness of application security as a major risk in application development. We capture the thoughts, ideas and trends as seen by the most important voices in the appsec industry. This includes a series of “50 in 50 Interviews”, highlighting the most influential people and companies working on application security. We are working with OWASP to define a series of industry best practices for managing vulnerability and risks in open source component usage. The project, Good Component Practices, is a community effort of companies and people interested in managing open source component risk at the enterprise level. A second initiative of TSWA is to promote surveys and major reports created by members of the open source security community. We currently have two ongoing reports. The first is a weekly status update from Central Repository displaying downloads and other information about the previous week’s activities in Central. The second is a Website Security Statistics Report created by Jeremiah Grossman‘s team at WhiteHat Security. As we find more reports, we will make them available. In a third initiative, the Trusted Software Alliance is interested in supporting the work of the top influencers in the industry and is in the process of creating a series based upon our research of the most influential voices in application security. The interview podcast, “50 in 50 Interviews“, is live, one-one conversations with these influencers, examining the ideas and trends within the application security industry. We welcome all members of the appsec community to participate in this initiative, whether it be through article contributions, research reports and survey data.TRANSCRIPT
![Page 1: Trusted Software Alliance](https://reader033.vdocuments.us/reader033/viewer/2022060201/5599ad3d1a28ab511d8b45d5/html5/thumbnails/1.jpg)
TrustedSoftwareAlliance.comThoughts, Ideas and Trends in Application Security
![Page 2: Trusted Software Alliance](https://reader033.vdocuments.us/reader033/viewer/2022060201/5599ad3d1a28ab511d8b45d5/html5/thumbnails/2.jpg)
My SharePoint Destinations
International
Montreal
Ottawa
Toronto
Birmingham, UK
London
Nottingham, UK
Dubai
Sydney
Canberra, AU
Wellington, NZ
Philippines
Beijing
Shanghai
Switzerland
France
Uruguay
Argentian
Chile
Antarctica
United States
Virginia
Michigan
Florida
Denver
New York City
San Francisco
Los Angeles
Washington DC
Baltimore
Philidelphia
Boston
![Page 3: Trusted Software Alliance](https://reader033.vdocuments.us/reader033/viewer/2022060201/5599ad3d1a28ab511d8b45d5/html5/thumbnails/3.jpg)
What is TSWA
![Page 4: Trusted Software Alliance](https://reader033.vdocuments.us/reader033/viewer/2022060201/5599ad3d1a28ab511d8b45d5/html5/thumbnails/4.jpg)
It is an Idea
“Security needs to be pushed as far „left‟
in the application life cycle as possible
through automated discovery and
remediation.” -- TSWA
![Page 5: Trusted Software Alliance](https://reader033.vdocuments.us/reader033/viewer/2022060201/5599ad3d1a28ab511d8b45d5/html5/thumbnails/5.jpg)
It is a Resource
1.Define Good Component Practice
2.Promote industry reports and surveys
3.Support industry influencers
![Page 6: Trusted Software Alliance](https://reader033.vdocuments.us/reader033/viewer/2022060201/5599ad3d1a28ab511d8b45d5/html5/thumbnails/6.jpg)
It is a Web Site
![Page 7: Trusted Software Alliance](https://reader033.vdocuments.us/reader033/viewer/2022060201/5599ad3d1a28ab511d8b45d5/html5/thumbnails/7.jpg)
Our Main Initiatives
![Page 8: Trusted Software Alliance](https://reader033.vdocuments.us/reader033/viewer/2022060201/5599ad3d1a28ab511d8b45d5/html5/thumbnails/8.jpg)
50-in-50 Interview Series
![Page 9: Trusted Software Alliance](https://reader033.vdocuments.us/reader033/viewer/2022060201/5599ad3d1a28ab511d8b45d5/html5/thumbnails/9.jpg)
![Page 10: Trusted Software Alliance](https://reader033.vdocuments.us/reader033/viewer/2022060201/5599ad3d1a28ab511d8b45d5/html5/thumbnails/10.jpg)
![Page 11: Trusted Software Alliance](https://reader033.vdocuments.us/reader033/viewer/2022060201/5599ad3d1a28ab511d8b45d5/html5/thumbnails/11.jpg)
![Page 12: Trusted Software Alliance](https://reader033.vdocuments.us/reader033/viewer/2022060201/5599ad3d1a28ab511d8b45d5/html5/thumbnails/12.jpg)
![Page 13: Trusted Software Alliance](https://reader033.vdocuments.us/reader033/viewer/2022060201/5599ad3d1a28ab511d8b45d5/html5/thumbnails/13.jpg)
Survey: October 2013
The Role of DevOps
in Application Security
![Page 14: Trusted Software Alliance](https://reader033.vdocuments.us/reader033/viewer/2022060201/5599ad3d1a28ab511d8b45d5/html5/thumbnails/14.jpg)
Good Component Practice
![Page 15: Trusted Software Alliance](https://reader033.vdocuments.us/reader033/viewer/2022060201/5599ad3d1a28ab511d8b45d5/html5/thumbnails/15.jpg)
What We Believe
![Page 16: Trusted Software Alliance](https://reader033.vdocuments.us/reader033/viewer/2022060201/5599ad3d1a28ab511d8b45d5/html5/thumbnails/16.jpg)
![Page 17: Trusted Software Alliance](https://reader033.vdocuments.us/reader033/viewer/2022060201/5599ad3d1a28ab511d8b45d5/html5/thumbnails/17.jpg)
![Page 18: Trusted Software Alliance](https://reader033.vdocuments.us/reader033/viewer/2022060201/5599ad3d1a28ab511d8b45d5/html5/thumbnails/18.jpg)
![Page 19: Trusted Software Alliance](https://reader033.vdocuments.us/reader033/viewer/2022060201/5599ad3d1a28ab511d8b45d5/html5/thumbnails/19.jpg)
Moving Left Saves Money
![Page 20: Trusted Software Alliance](https://reader033.vdocuments.us/reader033/viewer/2022060201/5599ad3d1a28ab511d8b45d5/html5/thumbnails/20.jpg)
The Cost of Change
“100 to 1 cost growth was happening on large,
unenlightened projects.” -- Barry Boehm
![Page 21: Trusted Software Alliance](https://reader033.vdocuments.us/reader033/viewer/2022060201/5599ad3d1a28ab511d8b45d5/html5/thumbnails/21.jpg)
What We Have Learned About
Fighting Defects
“Finding and fixing a software problem after
delivery is often 100 times more expensive
than finding and fixing it during the
requirements and design phase.”
-- The Center for Empirically Based Software
Engineering
![Page 22: Trusted Software Alliance](https://reader033.vdocuments.us/reader033/viewer/2022060201/5599ad3d1a28ab511d8b45d5/html5/thumbnails/22.jpg)
The Cost of Software Defects
“The cost of correcting a defect rises
exponentially with the time taken to identify
the defect.” -- Jon Strickler
![Page 23: Trusted Software Alliance](https://reader033.vdocuments.us/reader033/viewer/2022060201/5599ad3d1a28ab511d8b45d5/html5/thumbnails/23.jpg)
![Page 24: Trusted Software Alliance](https://reader033.vdocuments.us/reader033/viewer/2022060201/5599ad3d1a28ab511d8b45d5/html5/thumbnails/24.jpg)
Please Help us “Move Left”
![Page 25: Trusted Software Alliance](https://reader033.vdocuments.us/reader033/viewer/2022060201/5599ad3d1a28ab511d8b45d5/html5/thumbnails/25.jpg)
Listen to the Interviews
![Page 26: Trusted Software Alliance](https://reader033.vdocuments.us/reader033/viewer/2022060201/5599ad3d1a28ab511d8b45d5/html5/thumbnails/26.jpg)
Provide Content
![Page 27: Trusted Software Alliance](https://reader033.vdocuments.us/reader033/viewer/2022060201/5599ad3d1a28ab511d8b45d5/html5/thumbnails/27.jpg)
Support the Survey
The Role of DevOps
in Application Security
![Page 28: Trusted Software Alliance](https://reader033.vdocuments.us/reader033/viewer/2022060201/5599ad3d1a28ab511d8b45d5/html5/thumbnails/28.jpg)
TrustedSoftwareAlliance.comThoughts, Ideas and Trends in Application Security