Security Touchpoints When Acquiring Software

When the need arises for a certain functionality that can be delivered by software, organizations that have development resources with enough capacity have to decide whether to build it or buy it. Such decision should be based on a cost-benefit analysis and the resulting software should meet the security needs of the organization. The presenters present a process for software acquisition that resembles the one for software development and thus allows for security touchpoints to be applied.

Provided by: SecurityTube.net Topic: Software Date Added: May 2015 Format: Webcast

Find By Topic