Research Library > HP - Enterprise > A CISO's Guide to Securing Open Source Software

A CISO's Guide to Securing Open Source Software

Webinar Published By: HP - Enterprise
HP - Enterprise
Published:  Nov 19, 2008
Type:  Webinar

For a CISO, open source introduces a new source of risk and unique security challenge: how do you influence developers over whom you have no direct management control? Jennifer Bayuk, former CISO of Bear Stearns, provides insight on best practices for evaluating, deploying and managing open source code.



Tagsbusiness risk, security, application security, audit, risk, vulnerabilities, fortify, fortify software