Secure Coding mailing list archives

CFP: SecSE Deadline extended to April 4th


From: Martin Gilje Jaatun <secse-chair () sislab no>
Date: Wed, 16 Mar 2011 14:21:32 +0100

Hi SC-L,

For the first time ever, we will have an invited talk specifically for the International Workshop on Secure Software Engineering (SecSE) in Vienna this summer - Gary McGraw will talk about BSIMM2 (see below for an abstract) and lead the ensuing discussion.

If you always wanted to know what BSIMM(2) is all about, you now have a chance to hear it directly from Gary. So, it's time to take all those insights and ideas you have accumulated during your many years in the secure coding universe, and hammer out your own paper to the SecSE workshop - if you start now, you have almost three weeks at your disposal. See http://sintef.org/secse for more information!

Cheers,

Martin Gilje Jaatun

PS:
BSIMM2: The Building Security In Maturity Model http://bsimm2.com

Software security has made great progress over the last decade. The Building Security In Maturity Model (BSIMM, pronounced ³bee simm²) is designed to help understand, measure, and plan a software security initiative. Of the sixty large-scale software security initiatives we are aware of, thirty-two---all household names---are currently included in the BSIMM study. Those companies among the thirty who graciously agreed to be identified include: Adobe, Aon, Bank of America, Capital One, The Depository Trust & Clearing Corporation (DTCC), EMC, Google, Intel, Intuit, McKesson, Microsoft, Nokia, QUALCOMM, Sallie Mae, SAP, Standard Life, SWIFT, Symantec, Telecom Italia, Thomson Reuters, VMware, and Wells
Fargo.   The BSIMM was created by observing and analyzing real-world data
from thirty-two leading software security initiatives. The BSIMM can help a firm determine how its organization compares to other real-world software security initiatives and what steps can be taken to make its approach more effective. The most important use of the BSIMM is as a measuring stick to determine where a particular approach to software security currently stands relative to others.


_______________________________________________
Secure Coding mailing list (SC-L) SC-L () securecoding org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php
SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com)
as a free, non-commercial service to the software security community.
Follow KRvW Associates on Twitter at: http://twitter.com/KRvW_Associates
_______________________________________________


Current thread: