SlideShare a Scribd company logo
1 of 26
Protecode Inc. 2015 1
Leveraging Open Source Opportunity in the Public Sector
Without the Risk
February 27th 2015
Protecode Inc. 2015
Agenda
 Open Source Software
– Open source is a huge opportunity for the public sector
– The Benefits of Using Open Source
– Potential challenges
 Mitigating Risk
– Open source software adoption process (OSSAP)
– Establishing a baseline + a policy
 Optimising OSSAP
– When should worry about licence compliance?
– Crowdsourcing OSSAP
 Wrap up and Q/A
2
Tiberius Forrester,
Director, Solution
Architecture, Protecode
Martin Callinan,
Director,
Source Code Control
Protecode Inc. 2015
Opens Source Everywhere
 These companies have dedicated OSS Teams
3
Protecode Inc. 2015
Even Apple
4
Protecode Inc. 2015
OSS Opportunity in the Public Sector
 Create a market of Open Source Solutions
– Applications can be modified to suit individual requirement
 Faster time to market of solutions
 Efficiencies
– Pay for what is needed, use what you pay for
 Create a library of assets for re-use
 Ecosystem of communities
 Avoid individual vendor “lock-in”
5
Protecode Inc. 2015
Open Source Software
 Enables rapid software development
– Easy access to code
– Hundreds of thousands of projects
– Enables new business models
– The original crowd sourcing model (and most successful)
 The good:
– Faster, more functional
– Improves interoperability, adoption of standards
 The challenge:
– Uncertain ownership structure
• Intellectual property - copyright, license
• Maintenance and support
– Potential Security and quality vulnerabilities
– Requires due diligence – and a managed adoption process
6
Why OSS?
Protecode Inc. 2015
Copyright and Licences: It Matters!
 Copyrights are automatic – even when code is made public
– The person/organisation who wrote the code automatically owns the copyright
 Permission to use is contained in a license
– No Licence? Don’t use it
 Open source licences give you the right to use, modify and
(re)distribute, some with conditions, e.g.
– Reveal that you are using it
– Reproduce the full text of the license
– Disclose your entire source code
– Conditions may limit the combinations of licenses you
can use
– Some have bizarre obligations
 Choosing the right licences for the right types of use
– Distributed content and format, tools, etc.
7
Disclaimer: I am not a lawyer, and I don’t provide legal advice!
Protecode Inc. 2015
Security Vulnerabilities
8
 What is a security vulnerability?
“Weakness in an information system, system security procedures,
internal controls, or implementation that could be exploited or
triggered by a threat source.”
Source: http://nvlpubs.nist.gov/nistpubs/ir/2013/NIST.IR.7298r2.pdf
 Security Vulnerabilities are bound to occur
– In both OSS and proprietary software
 Known security vulnerabilities are tracked in the National
Vulnerability Data Base (NVD)
Protecode Inc. 2015
OSS Procurement Involves…
 Taking inventory of 3rd party components
 Clarification of IP ownership and licensing
 Ensuring licence models meet business expectations
 Compliance to license obligations
 Eligibility to export (encryption content)
 Minimising Security Risks
9
Protecode Inc. 2015
OSS Adoption Process (OSSAP)
Maturity Model
Voluntary policy
compliance with
Legal Advice
Manual search
and code review
In-house
Tools
Automated
Scanning with
Reference
Database
Integrated tool
suite within
Software
Development Cycle
10
A clearly defined and well communicated policy is essential in
maturing your OSS adoption processes
Protecode Inc. 2015
OSSAP
Open Source Software Adoption Process
11
Define a
Policy
Establish a
Baseline
Package
Pre-Approval
Scan in
Real-Time
Scan at
Regular
Intervals
Final Build
Analysis
Protecode Inc. 2015
What is in the OSS Policy
 What’s the Strategy
– Why do we need OSS, and why do we need a policy?
 Who are the Stakeholders
– Legal, product management, R&D, Security
– Ownership and buy-in is essential to successfully implement
 What’s the Scope
– Who’s covered, what’s covered
– Different rules for different groups or business units sometimes
necessary
 How to Apply
– Guidelines, whitelists & blacklists, tools, checklists, etc.
 How to Communicate
– Obligations, contributions, public forums
Protecode Inc. 2015
Establishing A Baseline
 Objective: Identify all 3rd party content
and identify licensing attributes
 Tasks:
– Inspect all source code and build
ingredients
to create Bill of Materials (BOM).
– Key files:
• Build files (makefile, POM files, etc.)
• Text files containing license text
• Text files that may make reference to
licenses
• Any other documentation
– Determine the distribution method
• Source? Binary? Deployment?
13
Protecode Inc. 2015
Package Pre-Approval
 Request/Assess/Approve-Reject Process
 Information required for pre-approval
– Project Information
• Project name, URL, license, author(s), type, exportability, etc.
– Package Information
• Package name and version
• Source of package
• Package itself (for scanning)
• Security Vulnerabilities
– Usage Model
• Distribution model
– (binary, source, hosted, internal only, etc.)
• Types of derivatives
– (Modified? Linked? Loosely coupled?)
• Organization specific information
– Business unit
– Business justification
• Maintenance and support
14
Protecode Inc. 2015
Cost of Compliance At Different
Stages Of Development
15
License Management is most effective when applied early in
development life cycle
Development | Build/QA | In The Market
Real-Time
Preventative Measures
Periodic
Analysis
Build-Time & Pre-
Launch Analysis
Post-Launch
Correction
Software Package
Pre-Approval
C
O
S
T
Protecode Inc. 2015
Effort involved in fixing licensing issues at different stages in development
16
# of issues created
E
F
F
O
R
T
Issues are
created here…
…and resolved here
Issues are resolved
as they arise
Developers
Licensing
Team
Protecode Inc. 2015
Reporting Options
 Summary report
– High level view of the findings
– Highlight key findings, areas requiring attention
– Reference material on licenses found, best practices
 Detailed reports
– Detailed file-by-file
– CSV Export
– License obligations
– License incompatibilities
– Text of all licenses applicable to software packages
– Security vulnerabilities
– Export Control Classification Numbers (ECCN)
17
The first scan and review becomes a baseline. Subsequent scans are much
quicker since they leverage existing data.
Protecode Inc. 2015
Analyzer Raw Output
18
Protecode Inc. 2015
Summary Report
19
Protecode Inc. 2015
Licence Obligations Report
20
Protecode Inc. 2015
Security Vulnerability Report
21
Protecode Inc. 2015
Q&A
Please type your questions into the chat box to the right
22
Protecode Inc. 2015
• Software source code audits
• Legal risk/licence compliance
• OSS licence analysis, legal obligations as well as potential intellectual property (IP) risks
• Security vulnerabilities
• security vulnerabilities contained within components
• Operational risk
• evaluates if components meet your technical and architectural standards
• Community support
• Determines developer activity and resulting component viability based on commit history
• Ease the adoption of Open Source Software
• Create a structure to enable compliance with OSS licences requirements
• Enable greater use of OSS across the organisations
• Quality code
• Secure code
• Compliant code
• DevOps services
About Source Code Control Limited
Protecode Inc. 2015
About Protecode
 Open source compliance and security vulnerability management
solutions
– Reduce IP uncertainties, manage security vulnerabilities and ensure compliance
 Accurate, usable and reliable products and services for organizations
worldwide
24
Protecode Inc. 2015
• Book an individual discussion : source@opensourcecontrol.com
• Managing existing OSS projects
• Planning for future OSS adoption
• Code reviews
• Meet us at UK-e-Health Week
• http://ukehealthweek.com/
• Useful resources
• European Commission OSS program
• https://joinup.ec.europa.eu/community/osor/home
• Open Source Initiative
• http://opensource.org/
• BCS Open Source Specialist Group
• http://ossg.bcs.org/
• For more information about Source Code Control Limited
• http://www.opensourcecontrol.com/
• Form more information about Protecode
• http://www.protecode.com/
Next Steps
Protecode Inc. 2015 26
info@protecode.com
www.protecode.com

More Related Content

What's hot

Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...
Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...
Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...Black Duck by Synopsys
 
Webinar–Is Your Software Security Supply Chain a Security Blind Spot?
Webinar–Is Your Software Security Supply Chain a Security Blind Spot?Webinar–Is Your Software Security Supply Chain a Security Blind Spot?
Webinar–Is Your Software Security Supply Chain a Security Blind Spot?Synopsys Software Integrity Group
 
Open source code
Open source codeOpen source code
Open source codeIntetics
 
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...Black Duck by Synopsys
 
Flight East 2018 Presentation–You've got your open source audit report, now w...
Flight East 2018 Presentation–You've got your open source audit report, now w...Flight East 2018 Presentation–You've got your open source audit report, now w...
Flight East 2018 Presentation–You've got your open source audit report, now w...Synopsys Software Integrity Group
 
Buyer and Seller Perspectives on Open Source in Tech Contracts
Buyer and Seller Perspectives on Open Source in Tech ContractsBuyer and Seller Perspectives on Open Source in Tech Contracts
Buyer and Seller Perspectives on Open Source in Tech ContractsBlack Duck by Synopsys
 
Open Source Insight: You Can’t Beat Hackers and the Pentagon Moves into Open...
Open Source Insight: You Can’t Beat Hackers and the Pentagon Moves into Open...Open Source Insight: You Can’t Beat Hackers and the Pentagon Moves into Open...
Open Source Insight: You Can’t Beat Hackers and the Pentagon Moves into Open...Black Duck by Synopsys
 
Owasp_Security_Labeling_System
Owasp_Security_Labeling_SystemOwasp_Security_Labeling_System
Owasp_Security_Labeling_SystemluisenriquezA
 
Open Source Security for Newbies - Best Practices
Open Source Security for Newbies - Best PracticesOpen Source Security for Newbies - Best Practices
Open Source Security for Newbies - Best PracticesBlack Duck by Synopsys
 
The Case for Continuous Open Source Management
The Case for Continuous Open Source ManagementThe Case for Continuous Open Source Management
The Case for Continuous Open Source ManagementBlack Duck by Synopsys
 
ОЛЬГА АКСЬОНЕНКО «Безпечна розробка програмного забезпечення в Agile проектах...
ОЛЬГА АКСЬОНЕНКО «Безпечна розробка програмного забезпечення в Agile проектах...ОЛЬГА АКСЬОНЕНКО «Безпечна розробка програмного забезпечення в Agile проектах...
ОЛЬГА АКСЬОНЕНКО «Безпечна розробка програмного забезпечення в Agile проектах...GoQA
 
FLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your Deal
FLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your DealFLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your Deal
FLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your DealBlack Duck by Synopsys
 
Open Source Insight: GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...
Open Source Insight:GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...Open Source Insight:GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...
Open Source Insight: GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...Black Duck by Synopsys
 
Opensource Presentation
Opensource PresentationOpensource Presentation
Opensource PresentationSarah Cortes
 
What is Penetration Testing?
What is Penetration Testing?What is Penetration Testing?
What is Penetration Testing?btpsec
 
Seminario-15-04-2015-IT_professions_in_the_anti-malware_industry
Seminario-15-04-2015-IT_professions_in_the_anti-malware_industrySeminario-15-04-2015-IT_professions_in_the_anti-malware_industry
Seminario-15-04-2015-IT_professions_in_the_anti-malware_industryRoberto Sponchioni
 
application firewall research proposal
application firewall research proposalapplication firewall research proposal
application firewall research proposalPeter Cheung
 

What's hot (20)

Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...
Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...
Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...
 
Webinar–Is Your Software Security Supply Chain a Security Blind Spot?
Webinar–Is Your Software Security Supply Chain a Security Blind Spot?Webinar–Is Your Software Security Supply Chain a Security Blind Spot?
Webinar–Is Your Software Security Supply Chain a Security Blind Spot?
 
Open source code
Open source codeOpen source code
Open source code
 
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
 
Flight East 2018 Presentation–You've got your open source audit report, now w...
Flight East 2018 Presentation–You've got your open source audit report, now w...Flight East 2018 Presentation–You've got your open source audit report, now w...
Flight East 2018 Presentation–You've got your open source audit report, now w...
 
Buyer and Seller Perspectives on Open Source in Tech Contracts
Buyer and Seller Perspectives on Open Source in Tech ContractsBuyer and Seller Perspectives on Open Source in Tech Contracts
Buyer and Seller Perspectives on Open Source in Tech Contracts
 
Open Source Insight: You Can’t Beat Hackers and the Pentagon Moves into Open...
Open Source Insight: You Can’t Beat Hackers and the Pentagon Moves into Open...Open Source Insight: You Can’t Beat Hackers and the Pentagon Moves into Open...
Open Source Insight: You Can’t Beat Hackers and the Pentagon Moves into Open...
 
Owasp_Security_Labeling_System
Owasp_Security_Labeling_SystemOwasp_Security_Labeling_System
Owasp_Security_Labeling_System
 
Open Source Security for Newbies - Best Practices
Open Source Security for Newbies - Best PracticesOpen Source Security for Newbies - Best Practices
Open Source Security for Newbies - Best Practices
 
The Case for Continuous Open Source Management
The Case for Continuous Open Source ManagementThe Case for Continuous Open Source Management
The Case for Continuous Open Source Management
 
ОЛЬГА АКСЬОНЕНКО «Безпечна розробка програмного забезпечення в Agile проектах...
ОЛЬГА АКСЬОНЕНКО «Безпечна розробка програмного забезпечення в Agile проектах...ОЛЬГА АКСЬОНЕНКО «Безпечна розробка програмного забезпечення в Agile проектах...
ОЛЬГА АКСЬОНЕНКО «Безпечна розробка програмного забезпечення в Agile проектах...
 
FLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your Deal
FLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your DealFLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your Deal
FLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your Deal
 
DevSecOps: The Open Source Way
DevSecOps: The Open Source WayDevSecOps: The Open Source Way
DevSecOps: The Open Source Way
 
National Digital ID Platform Technical Forum
National Digital ID Platform Technical ForumNational Digital ID Platform Technical Forum
National Digital ID Platform Technical Forum
 
Open Source Insight: GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...
Open Source Insight:GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...Open Source Insight:GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...
Open Source Insight: GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...
 
Opensource Presentation
Opensource PresentationOpensource Presentation
Opensource Presentation
 
Bsides
BsidesBsides
Bsides
 
What is Penetration Testing?
What is Penetration Testing?What is Penetration Testing?
What is Penetration Testing?
 
Seminario-15-04-2015-IT_professions_in_the_anti-malware_industry
Seminario-15-04-2015-IT_professions_in_the_anti-malware_industrySeminario-15-04-2015-IT_professions_in_the_anti-malware_industry
Seminario-15-04-2015-IT_professions_in_the_anti-malware_industry
 
application firewall research proposal
application firewall research proposalapplication firewall research proposal
application firewall research proposal
 

Viewers also liked

Ahrend CSR - Because your world matters
Ahrend CSR - Because your world mattersAhrend CSR - Because your world matters
Ahrend CSR - Because your world mattersInarvaez
 
OpenUK A4 x 8pp Re-use Principles June 2016 FINAL
OpenUK A4 x 8pp Re-use Principles June 2016 FINALOpenUK A4 x 8pp Re-use Principles June 2016 FINAL
OpenUK A4 x 8pp Re-use Principles June 2016 FINALSource Code Control Limited
 
New Educational Ahrend
New Educational   AhrendNew Educational   Ahrend
New Educational AhrendInarvaez
 
Product Presentation 2010 (Usa)
Product Presentation 2010 (Usa)Product Presentation 2010 (Usa)
Product Presentation 2010 (Usa)Inarvaez
 
SMX São Paulo 2009 Kavinski Black Hat - O que não fazer
SMX São Paulo 2009 Kavinski Black Hat - O que não fazerSMX São Paulo 2009 Kavinski Black Hat - O que não fazer
SMX São Paulo 2009 Kavinski Black Hat - O que não fazerAlexandre Kavinski
 
2010 Electrical And Data Presentation
2010   Electrical And Data Presentation2010   Electrical And Data Presentation
2010 Electrical And Data PresentationInarvaez
 
Officeinsight6 22 09 Ahrend Allsteel New Relationship
Officeinsight6 22 09 Ahrend Allsteel New RelationshipOfficeinsight6 22 09 Ahrend Allsteel New Relationship
Officeinsight6 22 09 Ahrend Allsteel New RelationshipInarvaez
 
DevOps and Open Source Software Continuous Compliance
DevOps and Open Source Software Continuous ComplianceDevOps and Open Source Software Continuous Compliance
DevOps and Open Source Software Continuous ComplianceSource Code Control Limited
 
SMX São Paulo 2009 Dicas de SEO - Kavinski
SMX São Paulo 2009 Dicas de SEO - KavinskiSMX São Paulo 2009 Dicas de SEO - Kavinski
SMX São Paulo 2009 Dicas de SEO - KavinskiAlexandre Kavinski
 
Historia do SEO - Kavinski - SEOCamp 2009
Historia do SEO - Kavinski - SEOCamp 2009Historia do SEO - Kavinski - SEOCamp 2009
Historia do SEO - Kavinski - SEOCamp 2009Alexandre Kavinski
 
Badasch ppt 01 rev
Badasch ppt 01 revBadasch ppt 01 rev
Badasch ppt 01 revbaezcindy
 
Venture Capitalists Tech Investment Hidden Risks
Venture Capitalists Tech Investment Hidden RisksVenture Capitalists Tech Investment Hidden Risks
Venture Capitalists Tech Investment Hidden RisksSource Code Control Limited
 
Open Source Software GPL Compliance – Should Organisations Care?
Open Source Software GPL Compliance – Should Organisations Care?Open Source Software GPL Compliance – Should Organisations Care?
Open Source Software GPL Compliance – Should Organisations Care?Source Code Control Limited
 
Review For Physical Science Exam #1
Review For Physical Science Exam #1Review For Physical Science Exam #1
Review For Physical Science Exam #1baezcindy
 

Viewers also liked (16)

Ahrend CSR - Because your world matters
Ahrend CSR - Because your world mattersAhrend CSR - Because your world matters
Ahrend CSR - Because your world matters
 
OpenUK A4 x 8pp Re-use Principles June 2016 FINAL
OpenUK A4 x 8pp Re-use Principles June 2016 FINALOpenUK A4 x 8pp Re-use Principles June 2016 FINAL
OpenUK A4 x 8pp Re-use Principles June 2016 FINAL
 
New Educational Ahrend
New Educational   AhrendNew Educational   Ahrend
New Educational Ahrend
 
Product Presentation 2010 (Usa)
Product Presentation 2010 (Usa)Product Presentation 2010 (Usa)
Product Presentation 2010 (Usa)
 
SMX São Paulo 2009 Kavinski Black Hat - O que não fazer
SMX São Paulo 2009 Kavinski Black Hat - O que não fazerSMX São Paulo 2009 Kavinski Black Hat - O que não fazer
SMX São Paulo 2009 Kavinski Black Hat - O que não fazer
 
2010 Electrical And Data Presentation
2010   Electrical And Data Presentation2010   Electrical And Data Presentation
2010 Electrical And Data Presentation
 
Officeinsight6 22 09 Ahrend Allsteel New Relationship
Officeinsight6 22 09 Ahrend Allsteel New RelationshipOfficeinsight6 22 09 Ahrend Allsteel New Relationship
Officeinsight6 22 09 Ahrend Allsteel New Relationship
 
DevOps and Open Source Software Continuous Compliance
DevOps and Open Source Software Continuous ComplianceDevOps and Open Source Software Continuous Compliance
DevOps and Open Source Software Continuous Compliance
 
SMX São Paulo 2009 Dicas de SEO - Kavinski
SMX São Paulo 2009 Dicas de SEO - KavinskiSMX São Paulo 2009 Dicas de SEO - Kavinski
SMX São Paulo 2009 Dicas de SEO - Kavinski
 
Historia do SEO - Kavinski - SEOCamp 2009
Historia do SEO - Kavinski - SEOCamp 2009Historia do SEO - Kavinski - SEOCamp 2009
Historia do SEO - Kavinski - SEOCamp 2009
 
Badasch ppt 01 rev
Badasch ppt 01 revBadasch ppt 01 rev
Badasch ppt 01 rev
 
Venture Capitalists Tech Investment Hidden Risks
Venture Capitalists Tech Investment Hidden RisksVenture Capitalists Tech Investment Hidden Risks
Venture Capitalists Tech Investment Hidden Risks
 
Building the Case for System z Linux
Building the Case for System z LinuxBuilding the Case for System z Linux
Building the Case for System z Linux
 
Open Source Software GPL Compliance – Should Organisations Care?
Open Source Software GPL Compliance – Should Organisations Care?Open Source Software GPL Compliance – Should Organisations Care?
Open Source Software GPL Compliance – Should Organisations Care?
 
Inexact reasoning
Inexact reasoningInexact reasoning
Inexact reasoning
 
Review For Physical Science Exam #1
Review For Physical Science Exam #1Review For Physical Science Exam #1
Review For Physical Science Exam #1
 

Similar to Leveraging Open Source Opportunity in the Public Sector Without the Risk

Software audit strategies: how often is enough?
Software audit strategies: how often is enough? Software audit strategies: how often is enough?
Software audit strategies: how often is enough? Protecode
 
Software Audit Strategies - How often is good enough for a software audit?
Software Audit Strategies - How often is good enough for a software audit? Software Audit Strategies - How often is good enough for a software audit?
Software Audit Strategies - How often is good enough for a software audit? Tiberius Forrester
 
Best practices for simplifying software audits
Best practices for simplifying software auditsBest practices for simplifying software audits
Best practices for simplifying software auditsTiberius Forrester
 
Optimizing The Cost Of Open Source Software Management
Optimizing The Cost Of Open Source Software ManagementOptimizing The Cost Of Open Source Software Management
Optimizing The Cost Of Open Source Software ManagementProtecode
 
Streamline Open Source Compliance with Package Pre-Approval
Streamline Open Source Compliance with Package Pre-ApprovalStreamline Open Source Compliance with Package Pre-Approval
Streamline Open Source Compliance with Package Pre-ApprovalProtecode
 
BlackDuck Suite
BlackDuck SuiteBlackDuck Suite
BlackDuck Suitejeff cheng
 
Open DevSecOps 2019 - Securing the Software Supply Chain - Sonatype
Open DevSecOps 2019 - Securing the Software Supply Chain - SonatypeOpen DevSecOps 2019 - Securing the Software Supply Chain - Sonatype
Open DevSecOps 2019 - Securing the Software Supply Chain - SonatypeEmerasoft, solutions to collaborate
 
Managing the Software Supply Chain: Policies that Promote Innovation While Op...
Managing the Software Supply Chain: Policies that Promote Innovation While Op...Managing the Software Supply Chain: Policies that Promote Innovation While Op...
Managing the Software Supply Chain: Policies that Promote Innovation While Op...FINOS
 
OSS has taken over the enterprise: The top five OSS trends of 2015
OSS has taken over the enterprise: The top five OSS trends of 2015OSS has taken over the enterprise: The top five OSS trends of 2015
OSS has taken over the enterprise: The top five OSS trends of 2015Rogue Wave Software
 
Create code confidence for better application security
Create code confidence for better application security Create code confidence for better application security
Create code confidence for better application security Rogue Wave Software
 
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare ☁
 
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare ☁
 
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare ☁
 
Open Source evaluation: A comprehensive guide on what you are using
Open Source evaluation: A comprehensive guide on what you are usingOpen Source evaluation: A comprehensive guide on what you are using
Open Source evaluation: A comprehensive guide on what you are usingAll Things Open
 
Webinar–You've Got Your Open Source Audit Report–Now What?
Webinar–You've Got Your Open Source Audit Report–Now What? Webinar–You've Got Your Open Source Audit Report–Now What?
Webinar–You've Got Your Open Source Audit Report–Now What? Synopsys Software Integrity Group
 
Best practice recommendations for utilizing open source software (from a lega...
Best practice recommendations for utilizing open source software (from a lega...Best practice recommendations for utilizing open source software (from a lega...
Best practice recommendations for utilizing open source software (from a lega...Rogue Wave Software
 
Martin von Willebrand - Collaborative Open Source Compliance - Mindtrek 2016
Martin von Willebrand - Collaborative Open Source Compliance - Mindtrek 2016Martin von Willebrand - Collaborative Open Source Compliance - Mindtrek 2016
Martin von Willebrand - Collaborative Open Source Compliance - Mindtrek 2016Mindtrek
 
Rightsizing Open Source Software Identification
Rightsizing Open Source Software IdentificationRightsizing Open Source Software Identification
Rightsizing Open Source Software IdentificationnexB Inc.
 
Owasp Summit - Wednesday evening briefing master
Owasp Summit - Wednesday evening briefing masterOwasp Summit - Wednesday evening briefing master
Owasp Summit - Wednesday evening briefing masterDinis Cruz
 
PCI and Vulnerability Assessments - What’s Missing
PCI and Vulnerability Assessments - What’s MissingPCI and Vulnerability Assessments - What’s Missing
PCI and Vulnerability Assessments - What’s MissingBlack Duck by Synopsys
 

Similar to Leveraging Open Source Opportunity in the Public Sector Without the Risk (20)

Software audit strategies: how often is enough?
Software audit strategies: how often is enough? Software audit strategies: how often is enough?
Software audit strategies: how often is enough?
 
Software Audit Strategies - How often is good enough for a software audit?
Software Audit Strategies - How often is good enough for a software audit? Software Audit Strategies - How often is good enough for a software audit?
Software Audit Strategies - How often is good enough for a software audit?
 
Best practices for simplifying software audits
Best practices for simplifying software auditsBest practices for simplifying software audits
Best practices for simplifying software audits
 
Optimizing The Cost Of Open Source Software Management
Optimizing The Cost Of Open Source Software ManagementOptimizing The Cost Of Open Source Software Management
Optimizing The Cost Of Open Source Software Management
 
Streamline Open Source Compliance with Package Pre-Approval
Streamline Open Source Compliance with Package Pre-ApprovalStreamline Open Source Compliance with Package Pre-Approval
Streamline Open Source Compliance with Package Pre-Approval
 
BlackDuck Suite
BlackDuck SuiteBlackDuck Suite
BlackDuck Suite
 
Open DevSecOps 2019 - Securing the Software Supply Chain - Sonatype
Open DevSecOps 2019 - Securing the Software Supply Chain - SonatypeOpen DevSecOps 2019 - Securing the Software Supply Chain - Sonatype
Open DevSecOps 2019 - Securing the Software Supply Chain - Sonatype
 
Managing the Software Supply Chain: Policies that Promote Innovation While Op...
Managing the Software Supply Chain: Policies that Promote Innovation While Op...Managing the Software Supply Chain: Policies that Promote Innovation While Op...
Managing the Software Supply Chain: Policies that Promote Innovation While Op...
 
OSS has taken over the enterprise: The top five OSS trends of 2015
OSS has taken over the enterprise: The top five OSS trends of 2015OSS has taken over the enterprise: The top five OSS trends of 2015
OSS has taken over the enterprise: The top five OSS trends of 2015
 
Create code confidence for better application security
Create code confidence for better application security Create code confidence for better application security
Create code confidence for better application security
 
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
 
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
 
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
 
Open Source evaluation: A comprehensive guide on what you are using
Open Source evaluation: A comprehensive guide on what you are usingOpen Source evaluation: A comprehensive guide on what you are using
Open Source evaluation: A comprehensive guide on what you are using
 
Webinar–You've Got Your Open Source Audit Report–Now What?
Webinar–You've Got Your Open Source Audit Report–Now What? Webinar–You've Got Your Open Source Audit Report–Now What?
Webinar–You've Got Your Open Source Audit Report–Now What?
 
Best practice recommendations for utilizing open source software (from a lega...
Best practice recommendations for utilizing open source software (from a lega...Best practice recommendations for utilizing open source software (from a lega...
Best practice recommendations for utilizing open source software (from a lega...
 
Martin von Willebrand - Collaborative Open Source Compliance - Mindtrek 2016
Martin von Willebrand - Collaborative Open Source Compliance - Mindtrek 2016Martin von Willebrand - Collaborative Open Source Compliance - Mindtrek 2016
Martin von Willebrand - Collaborative Open Source Compliance - Mindtrek 2016
 
Rightsizing Open Source Software Identification
Rightsizing Open Source Software IdentificationRightsizing Open Source Software Identification
Rightsizing Open Source Software Identification
 
Owasp Summit - Wednesday evening briefing master
Owasp Summit - Wednesday evening briefing masterOwasp Summit - Wednesday evening briefing master
Owasp Summit - Wednesday evening briefing master
 
PCI and Vulnerability Assessments - What’s Missing
PCI and Vulnerability Assessments - What’s MissingPCI and Vulnerability Assessments - What’s Missing
PCI and Vulnerability Assessments - What’s Missing
 

Recently uploaded

ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...Christina Lin
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024StefanoLambiase
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureDinusha Kumarasiri
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesPhilip Schwarz
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based projectAnoyGreter
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptkotipi9215
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsAhmed Mohamed
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaHanief Utama
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - InfographicHr365.us smith
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEEVICTOR MAESTRE RAMIREZ
 
software engineering Chapter 5 System modeling.pptx
software engineering Chapter 5 System modeling.pptxsoftware engineering Chapter 5 System modeling.pptx
software engineering Chapter 5 System modeling.pptxnada99848
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackVICTOR MAESTRE RAMIREZ
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxTier1 app
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 

Recently uploaded (20)

ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with Azure
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a series
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based project
 
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort ServiceHot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.ppt
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML Diagrams
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief Utama
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - Infographic
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEE
 
software engineering Chapter 5 System modeling.pptx
software engineering Chapter 5 System modeling.pptxsoftware engineering Chapter 5 System modeling.pptx
software engineering Chapter 5 System modeling.pptx
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStack
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 

Leveraging Open Source Opportunity in the Public Sector Without the Risk

  • 1. Protecode Inc. 2015 1 Leveraging Open Source Opportunity in the Public Sector Without the Risk February 27th 2015
  • 2. Protecode Inc. 2015 Agenda  Open Source Software – Open source is a huge opportunity for the public sector – The Benefits of Using Open Source – Potential challenges  Mitigating Risk – Open source software adoption process (OSSAP) – Establishing a baseline + a policy  Optimising OSSAP – When should worry about licence compliance? – Crowdsourcing OSSAP  Wrap up and Q/A 2 Tiberius Forrester, Director, Solution Architecture, Protecode Martin Callinan, Director, Source Code Control
  • 3. Protecode Inc. 2015 Opens Source Everywhere  These companies have dedicated OSS Teams 3
  • 5. Protecode Inc. 2015 OSS Opportunity in the Public Sector  Create a market of Open Source Solutions – Applications can be modified to suit individual requirement  Faster time to market of solutions  Efficiencies – Pay for what is needed, use what you pay for  Create a library of assets for re-use  Ecosystem of communities  Avoid individual vendor “lock-in” 5
  • 6. Protecode Inc. 2015 Open Source Software  Enables rapid software development – Easy access to code – Hundreds of thousands of projects – Enables new business models – The original crowd sourcing model (and most successful)  The good: – Faster, more functional – Improves interoperability, adoption of standards  The challenge: – Uncertain ownership structure • Intellectual property - copyright, license • Maintenance and support – Potential Security and quality vulnerabilities – Requires due diligence – and a managed adoption process 6 Why OSS?
  • 7. Protecode Inc. 2015 Copyright and Licences: It Matters!  Copyrights are automatic – even when code is made public – The person/organisation who wrote the code automatically owns the copyright  Permission to use is contained in a license – No Licence? Don’t use it  Open source licences give you the right to use, modify and (re)distribute, some with conditions, e.g. – Reveal that you are using it – Reproduce the full text of the license – Disclose your entire source code – Conditions may limit the combinations of licenses you can use – Some have bizarre obligations  Choosing the right licences for the right types of use – Distributed content and format, tools, etc. 7 Disclaimer: I am not a lawyer, and I don’t provide legal advice!
  • 8. Protecode Inc. 2015 Security Vulnerabilities 8  What is a security vulnerability? “Weakness in an information system, system security procedures, internal controls, or implementation that could be exploited or triggered by a threat source.” Source: http://nvlpubs.nist.gov/nistpubs/ir/2013/NIST.IR.7298r2.pdf  Security Vulnerabilities are bound to occur – In both OSS and proprietary software  Known security vulnerabilities are tracked in the National Vulnerability Data Base (NVD)
  • 9. Protecode Inc. 2015 OSS Procurement Involves…  Taking inventory of 3rd party components  Clarification of IP ownership and licensing  Ensuring licence models meet business expectations  Compliance to license obligations  Eligibility to export (encryption content)  Minimising Security Risks 9
  • 10. Protecode Inc. 2015 OSS Adoption Process (OSSAP) Maturity Model Voluntary policy compliance with Legal Advice Manual search and code review In-house Tools Automated Scanning with Reference Database Integrated tool suite within Software Development Cycle 10 A clearly defined and well communicated policy is essential in maturing your OSS adoption processes
  • 11. Protecode Inc. 2015 OSSAP Open Source Software Adoption Process 11 Define a Policy Establish a Baseline Package Pre-Approval Scan in Real-Time Scan at Regular Intervals Final Build Analysis
  • 12. Protecode Inc. 2015 What is in the OSS Policy  What’s the Strategy – Why do we need OSS, and why do we need a policy?  Who are the Stakeholders – Legal, product management, R&D, Security – Ownership and buy-in is essential to successfully implement  What’s the Scope – Who’s covered, what’s covered – Different rules for different groups or business units sometimes necessary  How to Apply – Guidelines, whitelists & blacklists, tools, checklists, etc.  How to Communicate – Obligations, contributions, public forums
  • 13. Protecode Inc. 2015 Establishing A Baseline  Objective: Identify all 3rd party content and identify licensing attributes  Tasks: – Inspect all source code and build ingredients to create Bill of Materials (BOM). – Key files: • Build files (makefile, POM files, etc.) • Text files containing license text • Text files that may make reference to licenses • Any other documentation – Determine the distribution method • Source? Binary? Deployment? 13
  • 14. Protecode Inc. 2015 Package Pre-Approval  Request/Assess/Approve-Reject Process  Information required for pre-approval – Project Information • Project name, URL, license, author(s), type, exportability, etc. – Package Information • Package name and version • Source of package • Package itself (for scanning) • Security Vulnerabilities – Usage Model • Distribution model – (binary, source, hosted, internal only, etc.) • Types of derivatives – (Modified? Linked? Loosely coupled?) • Organization specific information – Business unit – Business justification • Maintenance and support 14
  • 15. Protecode Inc. 2015 Cost of Compliance At Different Stages Of Development 15 License Management is most effective when applied early in development life cycle Development | Build/QA | In The Market Real-Time Preventative Measures Periodic Analysis Build-Time & Pre- Launch Analysis Post-Launch Correction Software Package Pre-Approval C O S T
  • 16. Protecode Inc. 2015 Effort involved in fixing licensing issues at different stages in development 16 # of issues created E F F O R T Issues are created here… …and resolved here Issues are resolved as they arise Developers Licensing Team
  • 17. Protecode Inc. 2015 Reporting Options  Summary report – High level view of the findings – Highlight key findings, areas requiring attention – Reference material on licenses found, best practices  Detailed reports – Detailed file-by-file – CSV Export – License obligations – License incompatibilities – Text of all licenses applicable to software packages – Security vulnerabilities – Export Control Classification Numbers (ECCN) 17 The first scan and review becomes a baseline. Subsequent scans are much quicker since they leverage existing data.
  • 20. Protecode Inc. 2015 Licence Obligations Report 20
  • 21. Protecode Inc. 2015 Security Vulnerability Report 21
  • 22. Protecode Inc. 2015 Q&A Please type your questions into the chat box to the right 22
  • 23. Protecode Inc. 2015 • Software source code audits • Legal risk/licence compliance • OSS licence analysis, legal obligations as well as potential intellectual property (IP) risks • Security vulnerabilities • security vulnerabilities contained within components • Operational risk • evaluates if components meet your technical and architectural standards • Community support • Determines developer activity and resulting component viability based on commit history • Ease the adoption of Open Source Software • Create a structure to enable compliance with OSS licences requirements • Enable greater use of OSS across the organisations • Quality code • Secure code • Compliant code • DevOps services About Source Code Control Limited
  • 24. Protecode Inc. 2015 About Protecode  Open source compliance and security vulnerability management solutions – Reduce IP uncertainties, manage security vulnerabilities and ensure compliance  Accurate, usable and reliable products and services for organizations worldwide 24
  • 25. Protecode Inc. 2015 • Book an individual discussion : source@opensourcecontrol.com • Managing existing OSS projects • Planning for future OSS adoption • Code reviews • Meet us at UK-e-Health Week • http://ukehealthweek.com/ • Useful resources • European Commission OSS program • https://joinup.ec.europa.eu/community/osor/home • Open Source Initiative • http://opensource.org/ • BCS Open Source Specialist Group • http://ossg.bcs.org/ • For more information about Source Code Control Limited • http://www.opensourcecontrol.com/ • Form more information about Protecode • http://www.protecode.com/ Next Steps
  • 26. Protecode Inc. 2015 26 info@protecode.com www.protecode.com