Understanding Factors Is More Critical Than Predictions
11
Which Factors Are Interesting?
12
Relationships Between Factors
13
Different Maintenance Models
14
Centralized Security Maintenance
15
Distributed Security Maintenance
16
Hybrid Security Maintenance
17
Strategies For Controlling Risks (1/2)
18
Strategies For Controlling Effort
19
Conclusion
Description:
Explore a comprehensive conference talk from AppSecEU 2016 in Rome that delves into the challenges and strategies of using third-party components in software development. Learn about secure software development practices, the maintenance challenges associated with third-party software, and different types of components. Discover insights on FLOSS usage at SAP, vulnerability prediction issues, and the importance of understanding factors rather than making predictions. Examine various maintenance models, including centralized, distributed, and hybrid security maintenance approaches. Gain valuable knowledge on strategies for controlling risks and managing effort when incorporating third-party components into your projects. Conclude with key takeaways for effectively leveraging external software while maintaining security and efficiency in your development process.
Using Third-Party Components for Building Secure Software - AppSec EU 2016