This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "AppSecEU2013"
(slides violating OWASP speaker's agreement are not online) |
Dirk Wetter (talk | contribs) m |
||
(12 intermediate revisions by 2 users not shown) | |||
Line 15: | Line 15: | ||
=== Videos === | === Videos === | ||
Videos from the talks are available for [https://www.its.fh-muenster.de/owasp-appseceu13/rooms/Grosser_Saal/ Großer Saal] | Videos from the talks are available for [https://www.its.fh-muenster.de/owasp-appseceu13/rooms/Grosser_Saal/ Großer Saal] | ||
− | and [https://www.its.fh-muenster.de/owasp-appseceu13/rooms/Aussichtsreich_+_Freiraum/ Aussichtsreich + Freiraum]. | + | and [https://www.its.fh-muenster.de/owasp-appseceu13/rooms/Aussichtsreich_+_Freiraum/ Aussichtsreich + Freiraum]. There are also [https://ssl.really-force.net/owasp-appseceu13/ Mirror1] and [http://2013.appsec.eu/mirror-videos/ Mirror2]. |
+ | |||
+ | Thx to Christiaan008 the conference videos were uploaded (unofficially but appreciated) to [http://www.youtube.com/playlist?list=PLwP_SiAcdui2WyA6YsaC9av_KHIEn4XRx youtube]. | ||
=== Slides === | === Slides === | ||
Quick links to the presentations. All slides are under [http://creativecommons.org/licenses/by-sa/3.0/ CC-BY-SA] license. | Quick links to the presentations. All slides are under [http://creativecommons.org/licenses/by-sa/3.0/ CC-BY-SA] license. | ||
==== Thursday, August 22nd ==== | ==== Thursday, August 22nd ==== | ||
− | * [[Media:Welcome_Note_-_Dirk_Wetter.pdf|Welcome Note]] | + | * [[Media:Welcome_Note_-_Dirk_Wetter.pdf|Welcome Note]]: Dirk Wetter |
− | * Keynote | + | * Keynote Angela Sasse -- [[Media:OWASP_angela_sasse_appsec_eu_aug2013.pdf|Busting The Myth of Dancing Pigs: Angela's Top 10 list of reasons why users bypass security measures]] |
− | * [[Media:OWASP_Where_we_are.._Where_we_are_going.pdf|OWASP: Where we are... Where we are going]] | + | * OWASP Introduction+Update: Michael Coates, Sarah Baso: [[Media:OWASP_Where_we_are.._Where_we_are_going.pdf|OWASP: Where we are... Where we are going]] |
− | * [[Media:A Qualitative Comparison of SSL Validation Alternatives - Henning Perl+Michael Brenner+Mathew Smith.pdf|A Qualitative Comparison of SSL Validation Alternatives]] | + | * [[Media:A Qualitative Comparison of SSL Validation Alternatives - Henning Perl+Michael Brenner+Mathew Smith.pdf|A Qualitative Comparison of SSL Validation Alternatives]]: Henning Perl, Michael Brenner |
− | * [[Media:Recipes_for_enabling_HTTPS_-_Thomas_Herlea+Neils_Boucke+Johann_Peeters.pdf|Recipes for enabling HTTPS]] | + | * [[Media:Recipes_for_enabling_HTTPS_-_Thomas_Herlea+Neils_Boucke+Johann_Peeters.pdf|Recipes for enabling HTTPS]]: Thomas Herlea, Neils Boucke, Johann Peeters |
− | * [[Media:A_Perfect_CRIME_TIME_Will_Tell_-_Tal_Beery.pdf|A Perfect CRIME? TIME Will Tell]] | + | * [[Media:A_Perfect_CRIME_TIME_Will_Tell_-_Tal_Beery.pdf|A Perfect CRIME? TIME Will Tell]]: Tal Be'ery |
− | * [[Media:Hunting Down Broken SSL in Android Apps - Sascha Fahl+Marian Harbach+Mathew Smith.pdf|Hunting Down Broken SSL in Android Apps]] | + | * [[Media:Hunting Down Broken SSL in Android Apps - Sascha Fahl+Marian Harbach+Mathew Smith.pdf|Hunting Down Broken SSL in Android Apps]]: Marian Harbach, Matthew Smith |
− | * [[Media:HTTP(S)-Based_Clustering_for_Assisted_Cybercrime_Investigations_-_Balduzzi.pdf|HTTP(S) - Based Clustering for Assisted Cybercrime Investigations]] | + | * [[Media:HTTP(S)-Based_Clustering_for_Assisted_Cybercrime_Investigations_-_Balduzzi.pdf|HTTP(S) - Based Clustering for Assisted Cybercrime Investigations]]: Marco Balduzzi |
− | * [[Media:Improving_the_Security_of_Session_Management_in_Web_Applications_-_Philippe_De_Ryck.pdf|Improving the Security of Session Management in Web Applications]] | + | * [[Media:Improving_the_Security_of_Session_Management_in_Web_Applications_-_Philippe_De_Ryck.pdf|Improving the Security of Session Management in Web Applications]]: Philippe DeRyck |
− | * [[Media:A_Doorman_for_Your_Home--Control-Flow_Integrity_Means_in_Web_Frameworks_-_Bastian_Brown.pdf|A Doorman for Your Home - Control-Flow Integrity Means in Web Frameworks]] | + | * [[Media:A_Doorman_for_Your_Home--Control-Flow_Integrity_Means_in_Web_Frameworks_-_Bastian_Brown.pdf|A Doorman for Your Home - Control-Flow Integrity Means in Web Frameworks]]: Bastian Braun |
− | * [[Media:Technical_Due_Diligence_-_Amir_Alsbih.pdf|Experience made in Technical Due Diligence]] | + | * [[Media:Technical_Due_Diligence_-_Amir_Alsbih.pdf|Experience made in Technical Due Diligence]]: Amir Alsbih |
− | * [[Media:OWASP-CISO_Guide_and_CISO_report_2013_for_managers_-_Tobias_Gondrom.pdf|OWASP - CISO Guide and CISO report 2013 for managers]] | + | * [[Media:OWASP-CISO_Guide_and_CISO_report_2013_for_managers_-_Tobias_Gondrom.pdf|OWASP - CISO Guide and CISO report 2013 for managers]]: Tobias Gondrom |
− | * [[Media:Real World Agile SDLC - Chris Eng+Ryan OBoyle.pdf|Real World Agile SDLC]] | + | * [[Media:Real World Agile SDLC - Chris Eng+Ryan OBoyle.pdf|Real World Agile SDLC]]: Chris Eng, Ryan O'Boyle |
− | * OWASP Top 10 Proactive Controls | + | * OWASP Top 10 Proactive Controls: Jim Manico (external link: presentation done by Jason Johnson at http://prezi.com/_oug648-i4yr/owasp-top-ten-defenses ) |
− | * [[Media:CSP--the_panacea_for_XSS_or_placebo_-_Taras_Ivashchenko.pdf|CSP - the panacea for XSS or placebo]] | + | * [[Media:CSP--the_panacea_for_XSS_or_placebo_-_Taras_Ivashchenko.pdf|CSP - the panacea for XSS or placebo]]: Taras Ivashchenko |
− | * [[Media:Security_Testing_Guidelines_for_mobile_Apps_-_Florian_Stahl+Johannes_Stroeher.pdf|Security Testing Guidelines for mobile Apps]] | + | * [[Media:Security_Testing_Guidelines_for_mobile_Apps_-_Florian_Stahl+Johannes_Stroeher.pdf|Security Testing Guidelines for mobile Apps]]: Florian_Stahl, Johannes Stroeher |
+ | |||
+ | * Keynote HackPra Allstars -- [[Media:]]: Jörg Schwenk | ||
+ | * HackPra Allstars -- [[Media:HackPraAllstars_Rooting_Your_Internals_-_Michele_Orru.pdf|Rooting Your Internals]]: Michele Orrù | ||
+ | * HackPra Allstars -- [[Media:HackPra_Allstars-Burp_Pro_Tips_and_Tricks_-_Nicolas_Grégoire.pdf|Burp Pro Tips and Tricks]]: Nicolas Grégoire | ||
+ | * HackPra Allstars -- [[Media:HackPra_Allstars-Augmented_Reality_in_your_web_proxy_-_Roberto_Suggi_Liverani.pdf|Augmented Reality in your web proxy]]: Roberto Suggi Liverani | ||
+ | * HackPra Allstars -- Browser Timing Attacks [http://contextis.co.uk/files/Browser_Timing_Attacks.pdf| (Paper)] and the [[Media:HackPra_Allstars-Browser_Timing_Attacks_-_Paul_Stone.pdf| talk (updated slides)]]: Paul Stone | ||
− | |||
− | |||
− | |||
− | |||
<!-- Slides entsprechen nicht dem Speakers Agreement | <!-- Slides entsprechen nicht dem Speakers Agreement | ||
− | + | ||
* HackPra Allstars [[Media:--comming soon--]]; Gareth Heyes | * HackPra Allstars [[Media:--comming soon--]]; Gareth Heyes | ||
* HackPra Allstars [[Media:--comming soon--]]; Eduardo Vela | * HackPra Allstars [[Media:--comming soon--]]; Eduardo Vela | ||
Line 50: | Line 54: | ||
* OSS [[Media:]]; Mario Vilas | * OSS [[Media:]]; Mario Vilas | ||
--> | --> | ||
− | * OSS [[Media:OWTF--Summer_StormShort-newer_-_Abraham_Aranguren.pdf|OWTF Summer StormShort (newer)]] | + | * OSS [[Media:OWTF--Summer_StormShort-newer_-_Abraham_Aranguren.pdf|OWTF Summer StormShort (newer)]]: Abraham Aranguren |
− | <!-- | + | <!-- not provided and we don't worry: |
* OSS [[Media:]]; Christian Bockermann | * OSS [[Media:]]; Christian Bockermann | ||
* OSS [[Media:]]; Guido Witmond | * OSS [[Media:]]; Guido Witmond | ||
Line 59: | Line 63: | ||
==== Friday August, 23rd ==== | ==== Friday August, 23rd ==== | ||
− | * Keynote | + | * Keynote Thomas Roessler -- [[Media:HTML5--ALL_THE_THINGS_-_Thomas_Roessler.pdf|Secure all the things: fiction from the Web’s immediate future]] |
− | * [[Media:OWASP_AppSec_Research_2013_-_Webfingerprinting.pdf|Web Fingerprinting: How, who and why?]] | + | * [[Media:OWASP_AppSec_Research_2013_-_Webfingerprinting.pdf|Web Fingerprinting: How, who and why?]]: Nick Nikiforakis |
− | * [[Media:Making_the_Future_Secure_with_Java_-_Milton_Smith.pdf|Making the Future Secure with Java]] | + | * [[Media:Making_the_Future_Secure_with_Java_-_Milton_Smith.pdf|Making the Future Secure with Java]]: Milton Smith |
− | * [[Media:OWASP_Top-10_2013--AppSec_EU_2013_-_Dave_Wichers.pdf|OWASP Top-10 2013]] | + | * [[Media:OWASP_Top-10_2013--AppSec_EU_2013_-_Dave_Wichers.pdf|OWASP Top-10 2013]]: Dave Wichers |
− | * [[Media:WASC-OWASP_WAFEC_-_Achim_Hoffmann+Ofer_Shezaf.pdf|WASC/OWASP WAFEC]] | + | * [[Media:WASC-OWASP_WAFEC_-_Achim_Hoffmann+Ofer_Shezaf.pdf|WASC/OWASP WAFEC]]: Achim Hoffmann, Ofer Shezaf |
− | * [[Media:An_Alternate_Approach_for_SQLi_Detection_-_Reto_Ischi.pdf|An Alternate Approach for SQLi Detection]] | + | * [[Media:An_Alternate_Approach_for_SQLi_Detection_-_Reto_Ischi.pdf|An Alternate Approach for SQLi Detection]]: Reto Ischi |
− | * [[Media:OWASP_AppSensor--In_Theory,_In_Practice_and_In_Print_-_Colin_Watson.pdf|OWASP AppSensor - In Theory, In Practice and In Print]] | + | * [[Media:OWASP_AppSensor--In_Theory,_In_Practice_and_In_Print_-_Colin_Watson.pdf|OWASP AppSensor - In Theory, In Practice and In Print]]: Colin Watson |
− | * [[Media:Introducing_ASVS_2013_-_Sahba_Kazerooni+Daniel_Cuthbert.pdf|Introducing ASVS 2013]] | + | * [[Media:Introducing_ASVS_2013_-_Sahba_Kazerooni+Daniel_Cuthbert.pdf|Introducing ASVS 2013]]: Sahba Kazerooni, Daniel Cuthbert |
− | * [[Media:--comming soon--]] | + | <!-- Slides entsprechen nicht dem Speakers Agreement |
− | * [[Media:Insane_in_the_IFRAME_-_David_Ross.pdf|Insane in the IFRAME]] | + | * [[Media:--comming soon--]]: Erlend Oftedal |
− | * [[Media:JS_Libraries_Insecurity_-_Stefano_DiPaola.pdf|JS Libraries Insecurity]] | + | --> |
− | * [[Media:Clickjacking_Protection_Under_Non-trivial_Circumstances_-_Sebastian_Lekies+Martin_Johns.pdf|Clickjacking Protection Under Non-trivial Circumstances]] | + | * [[Media:Insane_in_the_IFRAME_-_David_Ross.pdf|Insane in the IFRAME]]: David Ross |
− | * [[Media:Origin_Policy_Enforcement_in_Modern_Browsers_-_Frederik_Braun.pdf|Origin Policy Enforcement in Modern Browsers]] | + | * [[Media:JS_Libraries_Insecurity_-_Stefano_DiPaola.pdf|JS Libraries Insecurity]]: Stefano DiPaola |
− | * [[Media:I_am_in_your_browser,_pwning_your_stuff_-_Krzysztof_Kotowicz.pdf|I am in your browser, pwning your stuff]] | + | * [[Media:Clickjacking_Protection_Under_Non-trivial_Circumstances_-_Sebastian_Lekies+Martin_Johns.pdf|Clickjacking Protection Under Non-trivial Circumstances]]: Sebastian Lekies, Martin Johns |
− | * [[Media:Sandboxing-Javascript_-_Lieven_Desmet+Nick_Nikiforakis.pdf|Sandboxing Javascript]] | + | * [[Media:Origin_Policy_Enforcement_in_Modern_Browsers_-_Frederik_Braun.pdf|Origin Policy Enforcement in Modern Browsers]]: Frederik Braun |
− | * [[Media:RaspberryPi_for_the_Infrasturcture_and_hacker_-_Fred_Donavan.pdf|RaspberryPi for the Infrastructure and hacker]] | + | * [[Media:I_am_in_your_browser,_pwning_your_stuff_-_Krzysztof_Kotowicz.pdf|I am in your browser, pwning your stuff]]: Krzysztof Kotowicz |
− | * [[Media:Minion--Making Security Accessible for Developers - Yvan Boily.tar|Minion - Making Security Accessible for Developers]] | + | * [[Media:Sandboxing-Javascript_-_Lieven_Desmet+Nick_Nikiforakis.pdf|Sandboxing Javascript]]: Lieven Desmet, Nick Nikiforakis |
− | * [[Media:ZAP_Innovations_-_Simon_Benetts.pdf|ZAP Innovations]] | + | * [[Media:RaspberryPi_for_the_Infrasturcture_and_hacker_-_Fred_Donavan.pdf|RaspberryPi for the Infrastructure and hacker]]: Fred Donavan |
− | * [[Media:Do_You_Have_a_Scanner_or_Scanning_Program_-_Dan_Cornell.pdf|Do_You_Have a Scanner or Scanning Program]] | + | * [[Media:Minion--Making Security Accessible for Developers - Yvan Boily.tar|Minion - Making Security Accessible for Developers]]: Yvan Boily (download tar and open index.html in your browser; all sources are [https://github.com/ygjb/appsec-eu-2013 here]) |
− | * [[Media:OWTF--Summer_StormShort_-_Abraham_Aranguren.pdf|OWTF Summer StormShort]] | + | * [[Media:ZAP_Innovations_-_Simon_Benetts.pdf|ZAP Innovations]]: Simon Benetts |
− | * [Media:OWASP_Hackademic_Challenges_-_Konstantinos_Papapanagiotou+Spyros_Gasteratos.pdf|OWASP Hackademic Challenges]] | + | * [[Media:Do_You_Have_a_Scanner_or_Scanning_Program_-_Dan_Cornell.pdf|Do_You_Have a Scanner or Scanning Program]]: Dan Cornell |
− | * [[Media:SPaCIoS_-_Luca_Compagna.pdf|SPaCIoS]] | + | * [[Media:OWTF--Summer_StormShort_-_Abraham_Aranguren.pdf|OWTF Summer StormShort]]: Abraham Aranguren |
− | <!-- | + | * [[Media:OWASP_Hackademic_Challenges_-_Konstantinos_Papapanagiotou+Spyros_Gasteratos.pdf|OWASP Hackademic Challenges]]: Konstantinos Papapanagiotou |
+ | * [[Media:SPaCIoS_-_Luca_Compagna.pdf|SPaCIoS]]: Luca Viganò, Luca Compagna | ||
+ | <!-- see above | ||
* OSS [[Media:]]; Dinis Cruz | * OSS [[Media:]]; Dinis Cruz | ||
* OSS [[Media:]]; Juray Somorowsky | * OSS [[Media:]]; Juray Somorowsky | ||
--> | --> | ||
− | * Closing Note: [[Media:Closing_Note_-_Dieter_Gollmann.pdf|Access Control of the Web – The Web of Access Control]] | + | * Closing Note Dieter Gollmann: [[Media:Closing_Note_-_Dieter_Gollmann.pdf|Access Control of the Web – The Web of Access Control]] |
− | * [[Media:Closing-Ceremony_-_Dirk_Wetter.pdf|Closing Ceremony]] | + | * [[Media:Closing-Ceremony_-_Dirk_Wetter.pdf|Closing Ceremony]]: Dirk Wetter |
== Welcome == | == Welcome == | ||
Line 166: | Line 172: | ||
:[[User:Dirk Wetter|Dirk Wetter]] (Chair) | :[[User:Dirk Wetter|Dirk Wetter]] (Chair) | ||
:[[User:Kai Jendrian|Kai Jendrian]] (Co-Chair) | :[[User:Kai Jendrian|Kai Jendrian]] (Co-Chair) | ||
− | |||
:[[User:Ingo Hanke|Ingo Hanke]] | :[[User:Ingo Hanke|Ingo Hanke]] | ||
:Boris Hemkemeier | :Boris Hemkemeier |
Latest revision as of 10:07, 15 March 2014
For a more detailed description of everything see our main AppSec Research 2013 Web Site.
Presentations
Videos
Videos from the talks are available for Großer Saal and Aussichtsreich + Freiraum. There are also Mirror1 and Mirror2.
Thx to Christiaan008 the conference videos were uploaded (unofficially but appreciated) to youtube.
Slides
Quick links to the presentations. All slides are under CC-BY-SA license.
Thursday, August 22nd
- Welcome Note: Dirk Wetter
- Keynote Angela Sasse -- Busting The Myth of Dancing Pigs: Angela's Top 10 list of reasons why users bypass security measures
- OWASP Introduction+Update: Michael Coates, Sarah Baso: OWASP: Where we are... Where we are going
- A Qualitative Comparison of SSL Validation Alternatives: Henning Perl, Michael Brenner
- Recipes for enabling HTTPS: Thomas Herlea, Neils Boucke, Johann Peeters
- A Perfect CRIME? TIME Will Tell: Tal Be'ery
- Hunting Down Broken SSL in Android Apps: Marian Harbach, Matthew Smith
- HTTP(S) - Based Clustering for Assisted Cybercrime Investigations: Marco Balduzzi
- Improving the Security of Session Management in Web Applications: Philippe DeRyck
- A Doorman for Your Home - Control-Flow Integrity Means in Web Frameworks: Bastian Braun
- Experience made in Technical Due Diligence: Amir Alsbih
- OWASP - CISO Guide and CISO report 2013 for managers: Tobias Gondrom
- Real World Agile SDLC: Chris Eng, Ryan O'Boyle
- OWASP Top 10 Proactive Controls: Jim Manico (external link: presentation done by Jason Johnson at http://prezi.com/_oug648-i4yr/owasp-top-ten-defenses )
- CSP - the panacea for XSS or placebo: Taras Ivashchenko
- Security Testing Guidelines for mobile Apps: Florian_Stahl, Johannes Stroeher
- Keynote HackPra Allstars -- [[Media:]]: Jörg Schwenk
- HackPra Allstars -- Rooting Your Internals: Michele Orrù
- HackPra Allstars -- Burp Pro Tips and Tricks: Nicolas Grégoire
- HackPra Allstars -- Augmented Reality in your web proxy: Roberto Suggi Liverani
- HackPra Allstars -- Browser Timing Attacks (Paper) and the talk (updated slides): Paul Stone
- OSS OWTF Summer StormShort (newer): Abraham Aranguren
Friday August, 23rd
- Keynote Thomas Roessler -- Secure all the things: fiction from the Web’s immediate future
- Web Fingerprinting: How, who and why?: Nick Nikiforakis
- Making the Future Secure with Java: Milton Smith
- OWASP Top-10 2013: Dave Wichers
- WASC/OWASP WAFEC: Achim Hoffmann, Ofer Shezaf
- An Alternate Approach for SQLi Detection: Reto Ischi
- OWASP AppSensor - In Theory, In Practice and In Print: Colin Watson
- Introducing ASVS 2013: Sahba Kazerooni, Daniel Cuthbert
- Insane in the IFRAME: David Ross
- JS Libraries Insecurity: Stefano DiPaola
- Clickjacking Protection Under Non-trivial Circumstances: Sebastian Lekies, Martin Johns
- Origin Policy Enforcement in Modern Browsers: Frederik Braun
- I am in your browser, pwning your stuff: Krzysztof Kotowicz
- Sandboxing Javascript: Lieven Desmet, Nick Nikiforakis
- RaspberryPi for the Infrastructure and hacker: Fred Donavan
- Minion - Making Security Accessible for Developers: Yvan Boily (download tar and open index.html in your browser; all sources are here)
- ZAP Innovations: Simon Benetts
- Do_You_Have a Scanner or Scanning Program: Dan Cornell
- OWTF Summer StormShort: Abraham Aranguren
- OWASP Hackademic Challenges: Konstantinos Papapanagiotou
- SPaCIoS: Luca Viganò, Luca Compagna
- Closing Note Dieter Gollmann: Access Control of the Web – The Web of Access Control
- Closing Ceremony: Dirk Wetter
Welcome
The German OWASP Chapter is hosting the global OWASP AppSec Research 2013 conference in Hamburg, Germany from August 20-23. Hamburg is the second biggest city in Germany, located in the north. To quote New York Times: No one tells you how pretty Hamburg is. We do.
The AppSec Research conference will be a premier gathering of Information Security leaders, also it has a research part.
Executives from Fortune 500 firms along with technical thought leaders such as security architects and lead developers will be traveling to hear the cutting-edge ideas presented by Information Security’s top talent. OWASP events attract a worldwide audience interested in “what’s next”. The conference is expected to draw 400-500 technologists from Government, Financial Services, Media, Pharmaceuticals, Healthcare, Technology and many other verticals.
The conference will be held from August 20-23, 2013 at the Emporio Hamburg. It's centrally located in the heart of the city with a splendid view over Binnen-, Aussenalster and River Elbe.
Facts in a nutshell
- Date
- Trainings: August 20-21, 2013
- Conference: August 22-23, 2013
- Location
- Emporio Hamburg
- Program
- Complete Program
- Trainings
- Open Source (Security) Showcase
- HackPra Allstars Track
- Events
- Dinner ...
- Sponsors
- Sponsorship Description, find out more here.
- Call for ...
- Closed:
May 15, was extended: May 22: Papers(Research). - Closed:
Presentations(Industry). Talk teasers are here, Program comming soon. - Closed:
Call for Trainings. Program is published - Closed:
OWASP Open Source (Security) Showcase (OSS) - Registration
- Is open, please see http://2013.appsec.eu/registration/ .
- Mailinglist
- please subscribe to: https://lists.owasp.org/mailman/listinfo/appseceu2013
- Partners + Supporters
- External Web Site
Sponsorship
AppSec Research is seeking for sponsors. We have several possibilities how you can promote your company, seek for employees and on the other side support the conference. Please find the description, pricing and possible items in a PDF here.
Thanks to our following sponsors
Platin | ||
| ||
Gold | Silver | Bronze |
|
||
Call for {Presentations,Papers,Trainings}
We had there separate "Calls":
- Closed:
The Call for Papers is for the Research track - Closed:
Call for Presentations is the standard one for the regular tracks - Closed:
Call for Trainings
Ticket Challenge
Teams
Conference Orga
- Dirk Wetter (Chair)
- Kai Jendrian (Co-Chair)
- Ingo Hanke
- Boris Hemkemeier
- Achim Hoffmann
- Martin Johns
- Hartwig Gelhausen
- Tobias Glemser
- Sebastien Deleersnyder
- Kelly Santalucia
- Sarah Baso
Contact: orga2013//lists/appsec/eu
- Twitter: @appseceu
- Twitter: @OWASP_de (German account)