Secure Coding mailing list archives
How have you climbed the wall?
From: Rohit Sethi <rklists () gmail com>
Date: Thu, 28 Jul 2011 11:12:10 -0400
Recently I sent a note about the Organic Progression of the Secure SDLC. One of the major points that we raise in that model is the difficulty with "Climbing the Wall": Getting the lines of business to commit resource to application/software security. This is one of the most fundamental challenges in building a secure SDLC. We offer some simple high level thoughts and a PPT deck you can use here: http://www.sdelements.com/secure-sdlc/software-security-throughout-life-cycle-9-steps/how-climb-wall/ I'm curious to see what others have have done / seen to climb the wall effectively -- Rohit Sethi SD Elements http://www.sdelements.com twitter: rksethi
_______________________________________________ Secure Coding mailing list (SC-L) SC-L () securecoding org List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l List charter available at - http://www.securecoding.org/list/charter.php SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com) as a free, non-commercial service to the software security community. Follow KRvW Associates on Twitter at: http://twitter.com/KRvW_Associates _______________________________________________
Current thread:
- How have you climbed the wall? Rohit Sethi (Jul 28)
- Re: How have you climbed the wall? Wall, Kevin (Jul 28)
- Re: How have you climbed the wall? Rohit Sethi (Jul 28)
- Re: How have you climbed the wall? Wall, Kevin (Jul 28)