addressalign-toparrow-leftarrow-rightbackbellblockcalendarcameraccwcheckchevron-downchevron-leftchevron-rightchevron-small-downchevron-small-leftchevron-small-rightchevron-small-upchevron-upcircle-with-checkcircle-with-crosscircle-with-pluscontroller-playcrossdots-three-verticaleditemptyheartexporteye-with-lineeyefacebookfolderfullheartglobegmailgooglegroupshelp-with-circleimageimagesinstagramFill 1light-bulblinklocation-pinm-swarmSearchmailmessagesminusmoremuplabelShape 3 + Rectangle 1ShapeoutlookpersonJoin Group on CardStartprice-ribbonprintShapeShapeShapeShapeImported LayersImported LayersImported Layersshieldstartickettrashtriangle-downtriangle-uptwitteruserwarningyahoo

Special Dinner Meeting with Los Angeles Chapters: OWASP, ISSA, ISC2 and CSA

Why Software Still Stinks; Conclusions from a Decade of Research

Insecure software applications are the biggest threat to data breaches & the source of over 90% of all security vulnerabilities according to NIST. Software security tools & training have been available for years. So why do most organizations still produce insecure code? This session discusses a 10-year research study and an Application Security Maturity Model that documents how organizations mature over time and why so many application security initiatives fail.

Ed Adams is a software executive with successful leadership experience in various-sized organizations that serve the IT security and quality assurance industries. He is a Ponemon Institute Fellow and founded the Application Security Industry Consortium, Inc. (AppSIC), a non-profit association established to define cross-industry application security metrics and best practices. He sits on the board of the Massachusetts North Shore Technology Council (NSTC), National Association of Information Security Groups (NAISG), and the International Secure Software Engineering Council (ISSECO).

Please be sure to register at:

http://www.issala.org/events/?event_id=35

Join or login to comment.

  • A former member
    A former member

    This was a really great event! I was really happy to see the four groups in attendance for this and felt it was a very informing.

    September 20, 2012

  • Karl M.

    Great!

    September 20, 2012

  • chengwei c.

    excellent meeting

    September 19, 2012

  • A former member
    A former member

    Looking forward to it!

    1 · September 17, 2012

85 went

Our Sponsors

  • Contrast Security

    Secure Apps at their Source.

  • OWASP - LA

    Sponsorship

  • Riot Games

    Our goal is to become the most player-focused company in the world.

  • AsTech

    AsTech helps customers become application security heroes.

  • incapsula

    incapsula

  • Verizon

    Verizon DEFEND - Comprehensive cloud-based WAF and DDoS protection

  • Bugcrowd

    An innovator in crowdsourced security testing for the enterprise.

  • Absolute Software

    Industry standard in endpoint and management solutions

  • Prevoty

    www.prevoty.com

  • Whitehat Security

    End-to-end solutions for Web security.

  • GreenSQL

    Database Security and Compliance for EVERY organisation.

  • AUTHENTIC8

    Authentic8 puts you back in control.

  • Guidance Software

    Recognized worldwide as the industry leader in endpoint investigation

  • Check Point

    The worldwide leader in securing the Internet

  • WinMagic

    Makes it easy to secure data!

  • ioActive

    IOActive security consultancy with global presence and deep expertise

  • Akana

    Akana

  • Qualys

    QualysGuard Web Application Scanning (WAS)

  • Click below:

    https://www.owasp.org/index.php/Membership

  • Cigital, Inc

    The world’s largest consulting firm specializing in software security

  • Trend Micro

    A global leader in security software

  • Checkmarx

    Ensures your application remains hacker-proof.

  • SecureAuth

    SecureAuth is a technology leader in enterprise identity governance.

  • Symantec Corporation

    Provide security, storage and systems management solutions

  • BeyondTrust

    The global leader in privileged identity and threat management solutions

  • Security Innovation

    The Application Security Company

  • Palo Alto Networks

    Their Next-Generation Firewall enables applications

  • Arxan Technologies

    Sharing thought leadership & best practices on mobile apps security

  • Bay Dynamics

    IT Analytics

  • Venafi

    Inventor and market leader: Enterprise Key & Certificate Management

  • Trustwave

    Simple solutions to your complex security and compliance challenges

  • Phone Factor

    Multi-factor authentication to protect against today's threats

  • Gemalto

    Gemalto (formerly SafeNet)

  • PhishMe

    PhishMe

  • Contrast Security

    Empower developers to build secure applications.

People in this
Meetup are also in:

Sign up

Meetup members, Log in

By clicking "Sign up" or "Sign up using Facebook", you confirm that you accept our Terms of Service & Privacy Policy