This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "OWASP New Zealand Day 2019"
From OWASP
John dileo (talk | contribs) (→Speaker Biography) |
John dileo (talk | contribs) (Updated slide and video links for Radich presentation) |
||
(22 intermediate revisions by 2 users not shown) | |||
Line 7: | Line 7: | ||
=Introduction= | =Introduction= | ||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
==Introduction== | ==Introduction== | ||
Line 254: | Line 243: | ||
So, far, a fair few kind souls have stepped up to help out: | So, far, a fair few kind souls have stepped up to help out: | ||
− | * John DiLeo - Conference Chair, OWASP New Zealand Leader (Auckland) | + | * John DiLeo - Conference Chair, OWASP New Zealand Chapter Leader (Auckland) |
* Lech Janczewski - Conference Host Liaison, on-site Health & Safety contact - Associate Professor, University of Auckland School of Business | * Lech Janczewski - Conference Host Liaison, on-site Health & Safety contact - Associate Professor, University of Auckland School of Business | ||
+ | * Kirk Jackson - Video post-production, OWASP New Zealand Chapter Leader (Wellington) | ||
* Tess Brothersen | * Tess Brothersen | ||
* Austin Chamberlain | * Austin Chamberlain | ||
* Teresa Chan | * Teresa Chan | ||
+ | * Anna Cupples | ||
* Paul Howarth | * Paul Howarth | ||
* Toni James | * Toni James | ||
− | |||
* Alex McClennan | * Alex McClennan | ||
+ | * Sam Penfold | ||
* Stephen Sherry | * Stephen Sherry | ||
* Anneke Smitheram | * Anneke Smitheram | ||
* Anthony Vargo | * Anthony Vargo | ||
* Anya Yang | * Anya Yang | ||
− | |||
= Training - 21 Feb = | = Training - 21 Feb = | ||
Line 308: | Line 298: | ||
Morning and afternoon tea breaks will be provided; lunch will be on your own. | Morning and afternoon tea breaks will be provided; lunch will be on your own. | ||
− | = | + | =Conference - 22 Feb= |
+ | |||
+ | |||
==Presentations== | ==Presentations== | ||
Line 324: | Line 316: | ||
<td colspan="3" style="background-color: #D98B66; text-align: center"> | <td colspan="3" style="background-color: #D98B66; text-align: center"> | ||
<b>Welcome to OWASP New Zealand Day 2019</b><br /> | <b>Welcome to OWASP New Zealand Day 2019</b><br /> | ||
− | <i>John DiLeo (Conference Chair), Kirk Jackson, and [https://binarymist.io Kim Carter] - OWASP NZ Chapter Leaders<br />Lech Janczewski (Conference Host) - Associate Professor, Univ. of Auckland</i> | + | <i>John DiLeo (Conference Chair), Kirk Jackson, and [https://binarymist.io Kim Carter] - OWASP NZ Chapter Leaders<br />Lech Janczewski (Conference Host) - Associate Professor, Univ. of Auckland</i><br /> |
+ | [[Media:20190222--DiLeo-Opening_Session.pdf|Slides (PDF, 7.0 MB)]] | ||
</tr> | </tr> | ||
Line 341: | Line 334: | ||
<td style="background-color: #EEE; text-align: center"> | <td style="background-color: #EEE; text-align: center"> | ||
<b>Exploiting Vulnerabilities from the OWASP Top 10: SQLi, XSS, XXE, File Injection</b><br /> | <b>Exploiting Vulnerabilities from the OWASP Top 10: SQLi, XSS, XXE, File Injection</b><br /> | ||
− | <i>David Waters and Kieran Molloy - Pushpay</i> | + | <i>David Waters and Kieran Molloy - Pushpay</i><br /> |
+ | [[Media:20190222--Waters Molloy-Exploiting Vulnerabilities.pdf|Slides (PDF, 789 kB)]] | | ||
+ | [https://youtu.be/8TE_peh5Aas Video (YouTube)] | ||
</td> | </td> | ||
<td valign="top" align="right">09:20</td> | <td valign="top" align="right">09:20</td> | ||
<td style="background-color: #EEE; text-align: center"> | <td style="background-color: #EEE; text-align: center"> | ||
<b>Virtual Patching: Does It Work?</b><br /> | <b>Virtual Patching: Does It Work?</b><br /> | ||
− | <i>Kirk Jackson - RedShield</i> | + | <i>Kirk Jackson - RedShield</i><br /> |
+ | [[Media:2019-02-22 - Virtual Patching Does it work - Print.pdf|Slides (PDF, 2.1 MB)]] | | ||
+ | [https://youtu.be/6LqKLILNrko Video (YouTube)] | ||
</td> | </td> | ||
</tr> | </tr> | ||
Line 353: | Line 350: | ||
<td style="background-color: #B9C2DC; text-align: center"> | <td style="background-color: #B9C2DC; text-align: center"> | ||
<b>Threat Modelling When You've Never Done It Before</b><br /> | <b>Threat Modelling When You've Never Done It Before</b><br /> | ||
− | <i>Kade Morton - Quantum Security</i> | + | <i>Kade Morton - Quantum Security</i><br /> |
+ | [[Media:20190222--Morton-Threat Modelling-Complete.pdf|Slides (PDF, 5.7 MB)]] | | ||
+ | [https://youtu.be/YeeIf63Thwc Video (YouTube)] | ||
</td> | </td> | ||
<td valign="top" align="right">10:10</td> | <td valign="top" align="right">10:10</td> | ||
<td style="background-color: #B9C2DC; text-align: center"> | <td style="background-color: #B9C2DC; text-align: center"> | ||
<b>Cloud Catastrophes and How to Avoid Them</b><br /> | <b>Cloud Catastrophes and How to Avoid Them</b><br /> | ||
− | <i>Michael Haworth - Insomnia Security</i> | + | <i>Michael Haworth - Insomnia Security</i><br /> |
+ | [[Media:20190222--Haworth-Cloud_Catastrophes.pdf|Slides (PDF, 666 kB)]] | | ||
+ | [https://youtu.be/UqMUNFvnp_E Video (YouTube)] | ||
</td> | </td> | ||
Line 366: | Line 367: | ||
<td style="background-color: #EEE; text-align: center"> | <td style="background-color: #EEE; text-align: center"> | ||
<b>That Vulnerability Looks Quite Risky</b><br /> | <b>That Vulnerability Looks Quite Risky</b><br /> | ||
− | <i>Peter Jakowetz - Quantum Security</i> | + | <i>Peter Jakowetz - Quantum Security</i><br /> |
+ | [[Media:20190222--Jakowetz-Vulnerability Looks Quite Risky.pdf|Slides (PDF, 1.0 MB)]] | | ||
+ | [https://youtu.be/NOed0M0Ec-c Video (YouTube)] | ||
</td> | </td> | ||
<td rowspan="2" valign="top" align="right">10:45</td> | <td rowspan="2" valign="top" align="right">10:45</td> | ||
<td rowspan="2" style="background-color: #EEE; text-align: center"> | <td rowspan="2" style="background-color: #EEE; text-align: center"> | ||
<b>JWAT: Attacking JSON Web Tokens</b><br /> | <b>JWAT: Attacking JSON Web Tokens</b><br /> | ||
− | <i>Louis Nyffenegger - Pentester Lab</i> | + | <i>Louis Nyffenegger - Pentester Lab</i><br /> |
+ | [[Media:20190222--Nyffenegger-JWAT.pdf|Slides (PDF, 3.5 MB)]] | | ||
+ | [https://youtu.be/aYz8yPymyvk Video (YouTube)] | ||
</td> | </td> | ||
</tr> | </tr> | ||
Line 378: | Line 383: | ||
<td style="background-color: #B9C2DC; text-align: center"> | <td style="background-color: #B9C2DC; text-align: center"> | ||
<b>Mob Learning Using the OWASP Top 10 and 30 Days of Security Testing</b><br /> | <b>Mob Learning Using the OWASP Top 10 and 30 Days of Security Testing</b><br /> | ||
− | <i>Mike Clarke - Erudite Software</i> | + | <i>Mike Clarke - Erudite Software</i><br /> |
+ | [[Media:20190222--Clarke-Mob_Learning.pdf|Slides (PDF, 1.2 MB)]] | | ||
+ | [https://youtu.be/5YIdlFdKV00 Video (YouTube)] | ||
</td> | </td> | ||
</tr> | </tr> | ||
Line 385: | Line 392: | ||
<td style="background-color: #EEE; text-align: center"> | <td style="background-color: #EEE; text-align: center"> | ||
<b>How Can OWASP SAMM Help You Build More Secure Software?</b><br /> | <b>How Can OWASP SAMM Help You Build More Secure Software?</b><br /> | ||
− | <i>Mohamed Hassan - Aura Information Security</i> | + | <i>Mohamed Hassan - Aura Information Security</i><br /> |
+ | <i>Slides not yet available</i> | [https://youtu.be/AEBnmyzDSEo Video (YouTube)] | ||
</td> | </td> | ||
<td valign="top" align="right">11:40</td> | <td valign="top" align="right">11:40</td> | ||
<td style="background-color: #B9C2DC; text-align: center"> | <td style="background-color: #B9C2DC; text-align: center"> | ||
<b>CTF: The Gateway Drug</b><br /> | <b>CTF: The Gateway Drug</b><br /> | ||
− | <i>Toni James - Orion Health</i> | + | <i>Toni James - Orion Health</i><br /> |
+ | <i>Slides not yet available</i> | [https://youtu.be/B1CPimcoE7c Video (YouTube)] | ||
</td> | </td> | ||
</tr> | </tr> | ||
Line 403: | Line 412: | ||
<td style="background-color: #EEE; text-align: center"> | <td style="background-color: #EEE; text-align: center"> | ||
<b>NoHolidayChurchGenius: Password Security with 2020 Vision</b><br /> | <b>NoHolidayChurchGenius: Password Security with 2020 Vision</b><br /> | ||
− | <i>Antonio Radich - Quantum Security</i> | + | <i>Antonio Radich - Quantum Security</i><br /> |
+ | [[Media:20190222--Radich-NoHolidayChurchGenius.pdf|Slides (PDF, 1.4 MB)]] | | ||
+ | [https://www.youtube.com/watch?v=5AaOU5bC2fU Video (YouTube)] | ||
</td> | </td> | ||
<td rowspan="2" valign="top" align="right">13:30</td> | <td rowspan="2" valign="top" align="right">13:30</td> | ||
<td rowspan="2" style="background-color: #EEE; text-align: center"> | <td rowspan="2" style="background-color: #EEE; text-align: center"> | ||
<b>Security Regression Testing on OWASP ZAP Node API</b><br /> | <b>Security Regression Testing on OWASP ZAP Node API</b><br /> | ||
− | <i>Kim Carter - BinaryMist</i> | + | <i>Kim Carter - BinaryMist</i><br /> |
+ | <i>Slides not yet available</i> | <i>Video not published, at presenter's request</i> | ||
</td> | </td> | ||
</tr> | </tr> | ||
Line 415: | Line 427: | ||
<td style="background-color: #B9C2DC; text-align: center"> | <td style="background-color: #B9C2DC; text-align: center"> | ||
<b>Sharing Is Caring: A Beginner's Guide to Security in the Cloud</b><br /> | <b>Sharing Is Caring: A Beginner's Guide to Security in the Cloud</b><br /> | ||
− | <i>Petra Smith - Aura Information Security</i> | + | <i>Petra Smith - Aura Information Security</i><br /> |
+ | [[Media:20190222--Smith-Sharing Is Caring.pdf|Slides (PDF, 2.1 MB)]] | | ||
+ | [https://youtu.be/DKRlnea2o00 Video (YouTube)] | ||
</td> | </td> | ||
</tr> | </tr> | ||
Line 422: | Line 436: | ||
<td style="background-color: #EEE; text-align: center"> | <td style="background-color: #EEE; text-align: center"> | ||
<b>Eating the Elephant: Application Security When You Aren't a Startup</b><br /> | <b>Eating the Elephant: Application Security When You Aren't a Startup</b><br /> | ||
− | <i>Stephen Morgan - Westpac New Zealand</i> | + | <i>Stephen Morgan - Westpac New Zealand</i><br /> |
+ | [[Media:20190222--Morgan-Eating the Elephant.pdf|Slides (PDF, 2.1 MB)]] | | ||
+ | [https://youtu.be/rfK5bSvmdmw Video (YouTube)] | ||
</td> | </td> | ||
<td valign="top" align="right">14:25</td> | <td valign="top" align="right">14:25</td> | ||
<td style="background-color: #B9C2DC; text-align: center"> | <td style="background-color: #B9C2DC; text-align: center"> | ||
<b>CI Can Make $$$ from Thin Air</b><br /> | <b>CI Can Make $$$ from Thin Air</b><br /> | ||
− | <i>Sajeeb Lohani - Privasec</i> | + | <i>Sajeeb Lohani - Privasec</i><br /> |
+ | <i>Slides and Video not published, at presenter's request</i> | ||
</td> | </td> | ||
</tr> | </tr> | ||
Line 434: | Line 451: | ||
<td style="background-color: #B9C2DC; text-align: center"> | <td style="background-color: #B9C2DC; text-align: center"> | ||
<b>What's In a Name? Law of Agency and Domain Name Registrations</b><br /> | <b>What's In a Name? Law of Agency and Domain Name Registrations</b><br /> | ||
− | <i>Judy Ting-Edwards - Ports of Auckland</i> | + | <i>Judy Ting-Edwards - Ports of Auckland</i><br /> |
+ | [[Media:20190222--Ting-Edwards-Whats_in_a_Name.pdf|Slides (PDF, 4.6 MB)]] | | ||
+ | <i>Video not published, at presenter's request</i> | ||
</td> | </td> | ||
<td valign="top" align="right">15:00</td> | <td valign="top" align="right">15:00</td> | ||
<td style="background-color: #EEE; text-align: center"> | <td style="background-color: #EEE; text-align: center"> | ||
<b>Introduction to Building Secure Electron Applications</b><br /> | <b>Introduction to Building Secure Electron Applications</b><br /> | ||
− | <i>Nawaz Gayoom - Provoke Solutions</i> | + | <i>Nawaz Gayoom - Provoke Solutions</i><br /> |
+ | [[Media:20190222--Gayoom-Secure_Electron_Apps.pdf|Slides (PDF, 587 kB)]] | | ||
+ | [https://youtu.be/6GNTbvNs0tc Video (YouTube)] | ||
</td> | </td> | ||
</tr> | </tr> | ||
Line 452: | Line 473: | ||
<td style="background-color: #EEE; text-align: center"> | <td style="background-color: #EEE; text-align: center"> | ||
<b>How Do I Content Security Policy?</b><br /> | <b>How Do I Content Security Policy?</b><br /> | ||
− | <i>Kirk Jackson - RedShield</i> | + | <i>Kirk Jackson - RedShield</i><br /> |
+ | [[Media:2019-02-22 - How do I Content Security Policy - Print.pdf|Slides (PDF, 1.6 MB)]] | | ||
+ | [https://youtu.be/tlCOd-zjdQM Video (YouTube)] | ||
</td> | </td> | ||
<td valign="top" align="right">16:00</td> | <td valign="top" align="right">16:00</td> | ||
<td style="background-color: #EEE; text-align: center"> | <td style="background-color: #EEE; text-align: center"> | ||
<b>Hardening Your Docker Infrastructure</b><br /> | <b>Hardening Your Docker Infrastructure</b><br /> | ||
− | <i>Kim Carter - BinaryMist</i> | + | <i>Kim Carter - BinaryMist</i><br /> |
+ | <i>Slides not yet available</i> | <i>Video not published, at presenter's request</i> | ||
</td> | </td> | ||
</tr> | </tr> | ||
Line 464: | Line 488: | ||
<td style="background-color: #B9C2DC; text-align: center"> | <td style="background-color: #B9C2DC; text-align: center"> | ||
<b>OWASP Software Assurance Maturity Model (SAMM) 2.0</b><br /> | <b>OWASP Software Assurance Maturity Model (SAMM) 2.0</b><br /> | ||
− | <i>John DiLeo - Orion Health</i> | + | <i>John DiLeo - Orion Health</i><br /> |
+ | [[Media:20190222--DiLeo-OWASP_SAMM_2.pdf|Slides (PDF, 7.1 MB)]] | | ||
+ | [https://youtu.be/o-zoers_ckA Video (YouTube)] | ||
</td> | </td> | ||
<td valign="top" align="right">16:50</td> | <td valign="top" align="right">16:50</td> | ||
<td style="background-color: #B9C2DC; text-align: center"> | <td style="background-color: #B9C2DC; text-align: center"> | ||
<b>Reverse Engineering Mobile Apps: Why, What, and the Hows</b><br /> | <b>Reverse Engineering Mobile Apps: Why, What, and the Hows</b><br /> | ||
− | <i>Karan Sharma</i> | + | <i>Karan Sharma</i><br /> |
+ | Slides (PDF): | ||
+ | [[Media:20190222--Sharma-Mobile App Reverse Engineering-Part1.pdf|Part 1 (4.8 MB)]], | ||
+ | [[Media:20190222--Sharma-Mobile App Reverse Engineering-Part2.pdf|Part 2 (7.1 MB)]], | ||
+ | [[Media:20190222--Sharma-Mobile App Reverse Engineering-Part3.pdf|Part 3 (6.2 MB)]] | | ||
+ | [https://youtu.be/N6ffxIcz0L4 Video (YouTube)] | ||
</td> | </td> | ||
</tr> | </tr> | ||
Line 476: | Line 507: | ||
<td style="background-color: #EEE; text-align: center"> | <td style="background-color: #EEE; text-align: center"> | ||
<b>Why 'Positive Security' Is the Next Software Security Game Changer, and How to Do It</b><br /> | <b>Why 'Positive Security' Is the Next Software Security Game Changer, and How to Do It</b><br /> | ||
− | <i>Jaap Karan Singh - Secure Code Warrior</i> | + | <i>Jaap Karan Singh - Secure Code Warrior</i><br /> |
+ | [[Media:20190222--Singh-Positive Security.pdf|Slides (PDF, 7.1 MB)]] | | ||
+ | [https://youtu.be/kHYdM690hFM Video (YouTube)] | ||
</td> | </td> | ||
<td valign="top" align="right">17:25</td> | <td valign="top" align="right">17:25</td> | ||
<td style="background-color: #EEE; text-align: center"> | <td style="background-color: #EEE; text-align: center"> | ||
<b>Serverless Authentication with JWT</b><br /> | <b>Serverless Authentication with JWT</b><br /> | ||
− | <i>Mehul Patel - Zimbra</i> | + | <i>Mehul Patel - Zimbra</i><br /> |
+ | [https://slides.com/rowdymehul/owaspnz2019 Slides (Slides.com)] | | ||
+ | [https://youtu.be/TSGLddT_eG4 Video (YouTube)] | ||
</td> | </td> | ||
</tr> | </tr> | ||
Line 488: | Line 523: | ||
<td colspan="3" style="background-color: #B9C2DC; text-align: center"> | <td colspan="3" style="background-color: #B9C2DC; text-align: center"> | ||
<b>Wrap Up</b><br /> | <b>Wrap Up</b><br /> | ||
− | <i>Time to go out and socialise, for those interested</i> | + | <i>Time to go out and socialise, for those interested</i><br /> |
+ | [[Media:20190222--DiLeo-Closing_Session.pdf|Slides (PDF, 6.0 MB)]] | ||
</td> | </td> | ||
</tr> | </tr> | ||
Line 503: | Line 539: | ||
---- | ---- | ||
=== David Waters and Kieran Molloy - Pushpay === | === David Waters and Kieran Molloy - Pushpay === | ||
+ | |||
+ | ==== Slide Deck (<i>not yet available</i>) ==== | ||
+ | |||
+ | ==== [https://youtu.be/8TE_peh5Aas Presentation Video (YouTube)] ==== | ||
====Abstract==== | ====Abstract==== | ||
Line 512: | Line 552: | ||
David is a Senior Software Engineer/Tech Lead and one of the leaders of the Secure Coding Guild at Pushpay, David previously worked for 3 years in the security industry including 1 year in the Security Team at Google in London and draws on 20 years experience as a systems and web developer, primarily working in .NET, Java and JavaScript. | David is a Senior Software Engineer/Tech Lead and one of the leaders of the Secure Coding Guild at Pushpay, David previously worked for 3 years in the security industry including 1 year in the Security Team at Google in London and draws on 20 years experience as a systems and web developer, primarily working in .NET, Java and JavaScript. | ||
− | Kieran is a developer with an interest in security. | + | Kieran is a developer with an interest in security. |
=== Threat Modelling When You've Never Done It Before === | === Threat Modelling When You've Never Done It Before === | ||
---- | ---- | ||
=== Kade Morton - Quantum Security === | === Kade Morton - Quantum Security === | ||
+ | |||
+ | ==== [[Media:20190222--Morton-Threat Modelling-Complete.pdf|Slide Deck (PDF, 6.7 MB)]] ==== | ||
+ | |||
+ | ==== [https://youtu.be/YeeIf63Thwc Presentation Video (YouTube)] ==== | ||
====Abstract==== | ====Abstract==== | ||
Line 529: | Line 573: | ||
---- | ---- | ||
=== Peter Jakowetz - Quantum Security === | === Peter Jakowetz - Quantum Security === | ||
+ | |||
+ | ==== Slide Deck (<i>not yet available</i>) ==== | ||
+ | |||
+ | ==== [https://youtu.be/NOed0M0Ec-c Presentation Video (YouTube)] ==== | ||
====Abstract==== | ====Abstract==== | ||
Line 541: | Line 589: | ||
---- | ---- | ||
=== Mike Clarke - Erudite Software === | === Mike Clarke - Erudite Software === | ||
+ | |||
+ | ==== [[Media:20190222--Clarke-Mob_Learning.pdf|Slide Deck (PDF, 1.2 MB)]] ==== | ||
+ | |||
+ | ==== [https://youtu.be/5YIdlFdKV00 Presentation Video (YouTube)] ==== | ||
====Abstract==== | ====Abstract==== | ||
Line 555: | Line 607: | ||
---- | ---- | ||
=== Mohamed Hassan - Aura Information Security === | === Mohamed Hassan - Aura Information Security === | ||
+ | |||
+ | ==== Slide Deck (<i>not yet available</i>) ==== | ||
+ | |||
+ | ==== [https://youtu.be/AEBnmyzDSEo Presentation Video (YouTube)] ==== | ||
====Abstract==== | ====Abstract==== | ||
Line 569: | Line 625: | ||
---- | ---- | ||
=== Kirk Jackson - RedShield === | === Kirk Jackson - RedShield === | ||
+ | |||
+ | ==== [[Media:2019-02-22 - Virtual Patching Does it work - Print.pdf|Slide Deck (PDF, 2.1 MB)]] ==== | ||
+ | |||
+ | ==== [https://youtu.be/6LqKLILNrko Presentation Video (YouTube)] ==== | ||
====Abstract==== | ====Abstract==== | ||
Line 585: | Line 645: | ||
---- | ---- | ||
=== Mike Haworth - Insomnia Security === | === Mike Haworth - Insomnia Security === | ||
+ | |||
+ | ==== Slide Deck (<i>not yet available</i>) ==== | ||
+ | |||
+ | ==== [https://youtu.be/UqMUNFvnp_E Presentation Video (YouTube)] ==== | ||
====Abstract==== | ====Abstract==== | ||
Line 597: | Line 661: | ||
---- | ---- | ||
=== Louis Nyffenegger - Pentester Lab === | === Louis Nyffenegger - Pentester Lab === | ||
+ | |||
+ | ==== [[Media:20190222--Nyffenegger-JWAT.pdf|Slide Deck (3.5 MB)]] ==== | ||
+ | |||
+ | ==== [https://youtu.be/aYz8yPymyvk Presentation Video (YouTube)] ==== | ||
====Abstract==== | ====Abstract==== | ||
Line 609: | Line 677: | ||
---- | ---- | ||
=== Toni James - Orion Health === | === Toni James - Orion Health === | ||
+ | |||
+ | ==== Slide Deck (<i>not yet available</i>) ==== | ||
+ | |||
+ | ==== [https://youtu.be/B1CPimcoE7c Presentation Video (YouTube)] ==== | ||
====Abstract==== | ====Abstract==== | ||
Line 616: | Line 688: | ||
====Speaker Biography==== | ====Speaker Biography==== | ||
− | + | Toni is a snowboarder turned software engineer, with an addiction to security. She's won a few scholarships in her quest to get more women into tech and she's really good at supporting others to do 'all the things'. A firm believer in ‘you need to see it to be it,’ she puts herself out there to enable others to step up and challenge the status quo. She/Her. [https://twitter.com/_tonijames @_tonijames] | |
==Track One - Afternoon 1 (13:30 - 15:30) == | ==Track One - Afternoon 1 (13:30 - 15:30) == | ||
Line 623: | Line 695: | ||
---- | ---- | ||
=== Antonio Radich - Quantum Security === | === Antonio Radich - Quantum Security === | ||
+ | |||
+ | ==== [[Media:20190222--Radich-NoHolidayChurchGenius.pdf|Slide Deck (PDF, 1.4 MB)]] ==== | ||
+ | |||
+ | ==== [https://www.youtube.com/watch?v=5AaOU5bC2fU Presentation Video (YouTube)] ==== | ||
====Abstract==== | ====Abstract==== | ||
Line 635: | Line 711: | ||
---- | ---- | ||
=== Petra Smith - Aura Information Security === | === Petra Smith - Aura Information Security === | ||
+ | |||
+ | ==== Slide Deck (<i>not yet available</i>) ==== | ||
+ | |||
+ | ==== [https://youtu.be/DKRlnea2o00 Presentation Video (YouTube)] ==== | ||
====Abstract==== | ====Abstract==== | ||
Line 647: | Line 727: | ||
---- | ---- | ||
=== Stephen Morgan - Westpac New Zealand === | === Stephen Morgan - Westpac New Zealand === | ||
+ | |||
+ | ==== Slide Deck (<i>not yet available</i>) ==== | ||
+ | |||
+ | ==== [https://youtu.be/rfK5bSvmdmw Presentation Video (YouTube)] ==== | ||
====Abstract==== | ====Abstract==== | ||
Line 659: | Line 743: | ||
---- | ---- | ||
=== Judy Ting-Edwards - Ports of Auckland === | === Judy Ting-Edwards - Ports of Auckland === | ||
+ | |||
+ | ==== [[Media:20190222--Ting-Edwards-Whats_in_a_Name.pdf|Slide Deck (PDF, 4.6 MB)]] ==== | ||
+ | |||
+ | ==== <i>Presentation Video not available, at presenter's request</i> ==== | ||
====Abstract==== | ====Abstract==== | ||
Line 673: | Line 761: | ||
---- | ---- | ||
=== Kim Carter - BinaryMist === | === Kim Carter - BinaryMist === | ||
+ | |||
+ | ==== Slide Deck (<i>not yet available</i>) ==== | ||
+ | |||
+ | ==== <i>Presentation Video not available, at presenter's request</i> ==== | ||
====Abstract==== | ====Abstract==== | ||
Line 685: | Line 777: | ||
---- | ---- | ||
=== Sajeeb Lohani - Privasec === | === Sajeeb Lohani - Privasec === | ||
+ | |||
+ | ==== Slide Deck (<i>not yet available</i>) ==== | ||
+ | |||
+ | ==== <i>Presentation Video not available, at presenter's request</i> ==== | ||
====Abstract==== | ====Abstract==== | ||
Line 697: | Line 793: | ||
---- | ---- | ||
=== Nawaz Gayoom - Provoke Solutions === | === Nawaz Gayoom - Provoke Solutions === | ||
+ | |||
+ | ==== [[Media:20190222--Gayoom-Secure_Electron_Apps.pdf|Slide Deck (PDF, 587 kB)]] ==== | ||
+ | |||
+ | ==== [https://youtu.be/6GNTbvNs0tc Presentation Video (YouTube)] ==== | ||
====Abstract==== | ====Abstract==== | ||
Line 711: | Line 811: | ||
---- | ---- | ||
=== Kirk Jackson - RedShield === | === Kirk Jackson - RedShield === | ||
+ | |||
+ | ==== [[Media:2019-02-22 - How do I Content Security Policy - Print.pdf|Slide Deck (PDF, 1.6 MB)]] ==== | ||
+ | |||
+ | ==== [https://youtu.be/tlCOd-zjdQM Presentation Video (YouTube)] ==== | ||
====Abstract==== | ====Abstract==== | ||
Line 727: | Line 831: | ||
---- | ---- | ||
=== John DiLeo - Orion Health === | === John DiLeo - Orion Health === | ||
+ | |||
+ | ==== [[Media:20190222--DiLeo-OWASP_SAMM_2.pdf|Slide Deck (PDF, 7.1 MB)]] ==== | ||
+ | |||
+ | ==== [https://youtu.be/o-zoers_ckA Presentation Video (YouTube)] ==== | ||
====Abstract==== | ====Abstract==== | ||
Line 741: | Line 849: | ||
---- | ---- | ||
=== Jaap Karan Singh - Secure Code Warrior === | === Jaap Karan Singh - Secure Code Warrior === | ||
+ | |||
+ | ==== Slide Deck (<i>not yet available</i>) ==== | ||
+ | |||
+ | ==== [https://youtu.be/kHYdM690hFM Presentation Video (YouTube)] ==== | ||
====Abstract==== | ====Abstract==== | ||
Line 755: | Line 867: | ||
---- | ---- | ||
=== Kim Carter - BinaryMist === | === Kim Carter - BinaryMist === | ||
+ | |||
+ | ==== Slide Deck (<i>not yet available</i>) ==== | ||
+ | |||
+ | ==== <i>Presentation Video not available, at presenter's request</i> ==== | ||
====Abstract==== | ====Abstract==== | ||
Line 767: | Line 883: | ||
---- | ---- | ||
=== Karan Sharma === | === Karan Sharma === | ||
+ | |||
+ | ==== Slide Deck (<i>not yet available</i>) ==== | ||
+ | |||
+ | ==== [https://youtu.be/N6ffxIcz0L4 Presentation Video (YouTube)] ==== | ||
====Abstract==== | ====Abstract==== | ||
Line 779: | Line 899: | ||
---- | ---- | ||
=== Mehul Patel === | === Mehul Patel === | ||
+ | |||
+ | ==== [https://slides.com/rowdymehul/owaspnz2019 Slide Deck (Slides.com)] ==== | ||
+ | |||
+ | ==== [https://youtu.be/TSGLddT_eG4 Presentation Video (YouTube)] ==== | ||
====Abstract==== | ====Abstract==== |