This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Los Angeles Presentation Archive"
From OWASP
Sarah Baso (talk | contribs) (Created page with "This page contains slides from OWASP Los Angeles Chapter Meetings: ==2011== * December * November * October * September * August * July * June * May * April * March * February ...") |
Sarah Baso (talk | contribs) |
||
Line 34: | Line 34: | ||
==2009== | ==2009== | ||
− | *December - Michael Sutton: [[Media:Sutton_-_Pulling_The_Plug-Security_Risks_in_Next_Generation_Offline_Web_Apps_-_OWASP_LA_OC.pdf|Pulling the Plug PDF]] | + | *December - Michael Sutton: [[Media:Sutton_-_Pulling_The_Plug-Security_Risks_in_Next_Generation_Offline_Web_Apps_-_OWASP_LA_OC.pdf|Pulling the Plug: Security Risks in the Next Generation of Offline Web Applications PDF]] |
*November - Brian Chess: [[Media:Watching_software_run_11.18.09.pptx| Watching Software Run pptx]] | *November - Brian Chess: [[Media:Watching_software_run_11.18.09.pptx| Watching Software Run pptx]] | ||
− | * October - Shankar Subramaniyan: [[Media:ISO27001_OWASPLA_Shankar_10212009.pdf|Enabling Compliance Requirements PDF]] | + | * October - Shankar Subramaniyan: [[Media:ISO27001_OWASPLA_Shankar_10212009.pdf|Enabling Compliance Requirements using Information Security Management System (ISMS) Framework (ISO27001) PDF]] |
− | * September - Matt Tesauro | + | * September - Marco Morana and Tony UcedaVelez: The Rise of Threat Analysis and the Fall of Compliance, Policies, and Standards in mitigating Web Application Security Risks |
− | * August - Pravir Chandra | + | * August - Matt Tesauro: OWASP Live CD Demo and Q&A |
− | * July - David Bryan | + | * August - Pravir Chandra: The Software Assurance Maturity Model (SAMM) |
− | * June - Mikhael Felker | + | * July - David Bryan: Lock picks, BumpKeys, and Hackers oh my! How secure is your application? |
+ | * June - Mikhael Felker: Information Warfare: Past, Present and Future | ||
* May - Jeremiah Grossman: [http://video.google.com/videoplay?docid=2875886330538461390 Top Ten Web Hacking Techniques of 2008] | * May - Jeremiah Grossman: [http://video.google.com/videoplay?docid=2875886330538461390 Top Ten Web Hacking Techniques of 2008] | ||
* April - David Campbell: [[Media:DC_ED_OWASP_XSS_MAY2008_v1.0.pdf| XSS, Exploits and Defenses PDF]] | * April - David Campbell: [[Media:DC_ED_OWASP_XSS_MAY2008_v1.0.pdf| XSS, Exploits and Defenses PDF]] | ||
* March - NETWORK SECURITY DINNER WITH ISSA - CISO'S Security Dashboard Panel | * March - NETWORK SECURITY DINNER WITH ISSA - CISO'S Security Dashboard Panel | ||
* February - Alex Stamos: [[Media:Cloud_Computing_Security.pdf| Cloud Computing and Security PDF]] | * February - Alex Stamos: [[Media:Cloud_Computing_Security.pdf| Cloud Computing and Security PDF]] | ||
− | * January - Ben Walther | + | * January - Ben Walther: Building Security into the Test Organization |
+ | |||
+ | ==2008== | ||
+ | |||
+ | * December - Samy Kamkar: [[Media:OWASP-WASCAppSec2007SanJose_SamyWorm.ppt| The MySpace Worm ppt]] | ||
+ | * November - Stephan Chenette: A new web attack vector: Script Fragmentation | ||
+ | * October - Jonathan Gershater: Entitlements Management: Security and policies for SOA using XML appliances | ||
+ | * September - Ryan C. Barnett: The Web Hacking Incident Database (WHID) 2007 Report | ||
+ | * August - Jeff Williams: Don't Write Your Own Security Code |
Revision as of 05:08, 12 July 2011
This page contains slides from OWASP Los Angeles Chapter Meetings:
2011
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
2010
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
2009
- December - Michael Sutton: Pulling the Plug: Security Risks in the Next Generation of Offline Web Applications PDF
- November - Brian Chess: Watching Software Run pptx
- October - Shankar Subramaniyan: Enabling Compliance Requirements using Information Security Management System (ISMS) Framework (ISO27001) PDF
- September - Marco Morana and Tony UcedaVelez: The Rise of Threat Analysis and the Fall of Compliance, Policies, and Standards in mitigating Web Application Security Risks
- August - Matt Tesauro: OWASP Live CD Demo and Q&A
- August - Pravir Chandra: The Software Assurance Maturity Model (SAMM)
- July - David Bryan: Lock picks, BumpKeys, and Hackers oh my! How secure is your application?
- June - Mikhael Felker: Information Warfare: Past, Present and Future
- May - Jeremiah Grossman: Top Ten Web Hacking Techniques of 2008
- April - David Campbell: XSS, Exploits and Defenses PDF
- March - NETWORK SECURITY DINNER WITH ISSA - CISO'S Security Dashboard Panel
- February - Alex Stamos: Cloud Computing and Security PDF
- January - Ben Walther: Building Security into the Test Organization
2008
- December - Samy Kamkar: The MySpace Worm ppt
- November - Stephan Chenette: A new web attack vector: Script Fragmentation
- October - Jonathan Gershater: Entitlements Management: Security and policies for SOA using XML appliances
- September - Ryan C. Barnett: The Web Hacking Incident Database (WHID) 2007 Report
- August - Jeff Williams: Don't Write Your Own Security Code