What policies has your security department created in recent years? SANS is seeking input on how you're protecting applications in your organization SANS is looking for feedback about what policies are emerging among organizations with applications to protect. From their press release today: “SANS is conducting this survey to understand what applications and AppSec risks these companies see as most critical to their security, where they are investing in their AppSec programs, what tools they are using and what else they are doing to manage the AppSec challenge,” says survey co-author, Jim Bird. New application vulnerabilities and attacks unfold everyday. Meanwhile, applications are hard to monitor, full of vulnerabilities and easy to manipulate. The data gathered in this survey can help shape the industry, according to SANS Analyst executive editor, Deb Radcliff. “Web, database, mobile and cloud applications—they’re all proving to be stealthy entry points into what should be secure networks,” Radcliff notes. “So the question becomes, how can SANS help the community implement holistic policy that covers the lifecycle of applications and melt away silos between developers, business units and security teams?” As with all surveys, SANS needs the help of the community to share their experiences. The link to the survey is here:https://www.surveymonkey.com/s/56TKYX7 Find examples of many security policies in CSO’s security tools, templates and policies library Related content feature Why CSOs and CISOs need to care about machine learning Michael A. Davis of CounterTack explains the security challenges around machine learning, and how some of the issues can be solved for free (yes, free!) By Joan Goodchild May 03, 2017 2 mins Data and Information Security IT Leadership Security news How CISOs can explain privacy to the C-suite With the recent moves by the FCC, it is imperative that chief security officers make the company aware of privacy issues. By Ryan Francis Apr 13, 2017 5 mins Privacy Careers Security feature Realistic ways to lock down IoT How CSOs can best secure and understand IoT devices that enter their organization's network infrastructure By Joan Goodchild Apr 07, 2017 1 min Application Security Security news Follow the money! Where VC security investment is occurring By Joan Goodchild Mar 22, 2017 1 min Technology Industry IT Leadership Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe