Building Secure Applications:
Avoiding the SANS Top 25 Most Dangerous Programming Errors
The SANs/CWE list of the Top 25 Most Dangerous Programming Errors is already becoming the "standard" for developing secure applications in many large enterprises, and even the State of New York and DTCC plan to implement procurement contracts that include language mandating application security.
TEAM & DETAILS
View the Webinar
WHAT YOU WILL LEARN
Chris Wysopal, security industry guru and one of the 30 contributing authors of the SANs Top 25, discusses the:
- • Prevalence of attacks using vulnerabilities listed in the SANs Top 25
- • Impact of attacks on your application and your customers
- • Methods to identify, track and remediate these vulnerabilities
WHO WILL BENEFIT
The Top 25 list is a tool for education and awareness to help programmers to prevent the kinds of vulnerabilities that plague the software industry, by identifying and avoiding all-too-common mistakes that occur before software is even shipped. Software customers can use the same list to help them to ask for more secure software. Researchers in software security can use the Top 25 to focus on a narrow but important subset of all known security weaknesses. Finally, software managers and CIOs can use the Top 25 list as a measuring stick of progress in their efforts to secure their software.