Upload

Loading icon Loading...

This video is unavailable.

Vetting 3rd Party Applications

Sign in to YouTube

Sign in with your Google Account (YouTube, Google+, Gmail, Orkut, Picasa, or Chrome) to like OWASP Omaha's video.

Sign in to YouTube

Sign in with your Google Account (YouTube, Google+, Gmail, Orkut, Picasa, or Chrome) to dislike OWASP Omaha's video.

Sign in to YouTube

Sign in with your Google Account (YouTube, Google+, Gmail, Orkut, Picasa, or Chrome) to add OWASP Omaha's video to your playlist.

Streamed live on Mar 13, 2014

Jump to about 8:45 to get to the start

Presented by John Rogers, Lincoln Financial Group

This presentation will discuss how to acquire and validate information that will provide assurance that your third party vendor applications adhere to your standards and are free from the common web application vulnerabilities. The discussion will also include what basic requirements are needed to accept a web application security assessment report from an independent security assessment firm. 

John will hit points covering:
3rd Party Vendor Assessment Requirements
3rd Party Vendor Assessment Public Facing Document
3rd Party Vendor Application Security Standards

Loading icon Loading...

Loading icon Loading...

Loading icon Loading...

The interactive transcript could not be loaded.

Loading icon Loading...

Loading icon Loading...

Ratings have been disabled for this video.
Rating is available when the video has been rented.
This feature is not available right now. Please try again later.

Loading icon Loading...

Loading...
Working...
to add this to Watch Later

Add to