This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "OWASP New Zealand Day 2019"
From OWASP
(Add Kirk's CSP talk) |
John dileo (talk | contribs) (Updated slide and video links for Radich presentation) |
||
(20 intermediate revisions by 2 users not shown) | |||
Line 7: | Line 7: | ||
=Introduction= | =Introduction= | ||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
==Introduction== | ==Introduction== | ||
Line 254: | Line 243: | ||
So, far, a fair few kind souls have stepped up to help out: | So, far, a fair few kind souls have stepped up to help out: | ||
− | * John DiLeo - Conference Chair, OWASP New Zealand Leader (Auckland) | + | * John DiLeo - Conference Chair, OWASP New Zealand Chapter Leader (Auckland) |
* Lech Janczewski - Conference Host Liaison, on-site Health & Safety contact - Associate Professor, University of Auckland School of Business | * Lech Janczewski - Conference Host Liaison, on-site Health & Safety contact - Associate Professor, University of Auckland School of Business | ||
+ | * Kirk Jackson - Video post-production, OWASP New Zealand Chapter Leader (Wellington) | ||
* Tess Brothersen | * Tess Brothersen | ||
* Austin Chamberlain | * Austin Chamberlain | ||
* Teresa Chan | * Teresa Chan | ||
+ | * Anna Cupples | ||
* Paul Howarth | * Paul Howarth | ||
* Toni James | * Toni James | ||
− | |||
* Alex McClennan | * Alex McClennan | ||
+ | * Sam Penfold | ||
* Stephen Sherry | * Stephen Sherry | ||
* Anneke Smitheram | * Anneke Smitheram | ||
* Anthony Vargo | * Anthony Vargo | ||
* Anya Yang | * Anya Yang | ||
− | |||
= Training - 21 Feb = | = Training - 21 Feb = | ||
Line 308: | Line 298: | ||
Morning and afternoon tea breaks will be provided; lunch will be on your own. | Morning and afternoon tea breaks will be provided; lunch will be on your own. | ||
− | = | + | =Conference - 22 Feb= |
+ | |||
Line 325: | Line 316: | ||
<td colspan="3" style="background-color: #D98B66; text-align: center"> | <td colspan="3" style="background-color: #D98B66; text-align: center"> | ||
<b>Welcome to OWASP New Zealand Day 2019</b><br /> | <b>Welcome to OWASP New Zealand Day 2019</b><br /> | ||
− | <i>John DiLeo (Conference Chair), Kirk Jackson, and [https://binarymist.io Kim Carter] - OWASP NZ Chapter Leaders<br />Lech Janczewski (Conference Host) - Associate Professor, Univ. of Auckland</i> | + | <i>John DiLeo (Conference Chair), Kirk Jackson, and [https://binarymist.io Kim Carter] - OWASP NZ Chapter Leaders<br />Lech Janczewski (Conference Host) - Associate Professor, Univ. of Auckland</i><br /> |
+ | [[Media:20190222--DiLeo-Opening_Session.pdf|Slides (PDF, 7.0 MB)]] | ||
</tr> | </tr> | ||
Line 342: | Line 334: | ||
<td style="background-color: #EEE; text-align: center"> | <td style="background-color: #EEE; text-align: center"> | ||
<b>Exploiting Vulnerabilities from the OWASP Top 10: SQLi, XSS, XXE, File Injection</b><br /> | <b>Exploiting Vulnerabilities from the OWASP Top 10: SQLi, XSS, XXE, File Injection</b><br /> | ||
− | <i>David Waters and Kieran Molloy - Pushpay</i> | + | <i>David Waters and Kieran Molloy - Pushpay</i><br /> |
+ | [[Media:20190222--Waters Molloy-Exploiting Vulnerabilities.pdf|Slides (PDF, 789 kB)]] | | ||
+ | [https://youtu.be/8TE_peh5Aas Video (YouTube)] | ||
</td> | </td> | ||
<td valign="top" align="right">09:20</td> | <td valign="top" align="right">09:20</td> | ||
<td style="background-color: #EEE; text-align: center"> | <td style="background-color: #EEE; text-align: center"> | ||
<b>Virtual Patching: Does It Work?</b><br /> | <b>Virtual Patching: Does It Work?</b><br /> | ||
− | <i>Kirk Jackson - RedShield</i> | + | <i>Kirk Jackson - RedShield</i><br /> |
+ | [[Media:2019-02-22 - Virtual Patching Does it work - Print.pdf|Slides (PDF, 2.1 MB)]] | | ||
+ | [https://youtu.be/6LqKLILNrko Video (YouTube)] | ||
</td> | </td> | ||
</tr> | </tr> | ||
Line 354: | Line 350: | ||
<td style="background-color: #B9C2DC; text-align: center"> | <td style="background-color: #B9C2DC; text-align: center"> | ||
<b>Threat Modelling When You've Never Done It Before</b><br /> | <b>Threat Modelling When You've Never Done It Before</b><br /> | ||
− | <i>Kade Morton - Quantum Security</i> | + | <i>Kade Morton - Quantum Security</i><br /> |
+ | [[Media:20190222--Morton-Threat Modelling-Complete.pdf|Slides (PDF, 5.7 MB)]] | | ||
+ | [https://youtu.be/YeeIf63Thwc Video (YouTube)] | ||
</td> | </td> | ||
<td valign="top" align="right">10:10</td> | <td valign="top" align="right">10:10</td> | ||
<td style="background-color: #B9C2DC; text-align: center"> | <td style="background-color: #B9C2DC; text-align: center"> | ||
<b>Cloud Catastrophes and How to Avoid Them</b><br /> | <b>Cloud Catastrophes and How to Avoid Them</b><br /> | ||
− | <i>Michael Haworth - Insomnia Security</i> | + | <i>Michael Haworth - Insomnia Security</i><br /> |
+ | [[Media:20190222--Haworth-Cloud_Catastrophes.pdf|Slides (PDF, 666 kB)]] | | ||
+ | [https://youtu.be/UqMUNFvnp_E Video (YouTube)] | ||
</td> | </td> | ||
Line 367: | Line 367: | ||
<td style="background-color: #EEE; text-align: center"> | <td style="background-color: #EEE; text-align: center"> | ||
<b>That Vulnerability Looks Quite Risky</b><br /> | <b>That Vulnerability Looks Quite Risky</b><br /> | ||
− | <i>Peter Jakowetz - Quantum Security</i> | + | <i>Peter Jakowetz - Quantum Security</i><br /> |
+ | [[Media:20190222--Jakowetz-Vulnerability Looks Quite Risky.pdf|Slides (PDF, 1.0 MB)]] | | ||
+ | [https://youtu.be/NOed0M0Ec-c Video (YouTube)] | ||
</td> | </td> | ||
<td rowspan="2" valign="top" align="right">10:45</td> | <td rowspan="2" valign="top" align="right">10:45</td> | ||
<td rowspan="2" style="background-color: #EEE; text-align: center"> | <td rowspan="2" style="background-color: #EEE; text-align: center"> | ||
<b>JWAT: Attacking JSON Web Tokens</b><br /> | <b>JWAT: Attacking JSON Web Tokens</b><br /> | ||
− | <i>Louis Nyffenegger - Pentester Lab</i> | + | <i>Louis Nyffenegger - Pentester Lab</i><br /> |
+ | [[Media:20190222--Nyffenegger-JWAT.pdf|Slides (PDF, 3.5 MB)]] | | ||
+ | [https://youtu.be/aYz8yPymyvk Video (YouTube)] | ||
</td> | </td> | ||
</tr> | </tr> | ||
Line 379: | Line 383: | ||
<td style="background-color: #B9C2DC; text-align: center"> | <td style="background-color: #B9C2DC; text-align: center"> | ||
<b>Mob Learning Using the OWASP Top 10 and 30 Days of Security Testing</b><br /> | <b>Mob Learning Using the OWASP Top 10 and 30 Days of Security Testing</b><br /> | ||
− | <i>Mike Clarke - Erudite Software</i> | + | <i>Mike Clarke - Erudite Software</i><br /> |
+ | [[Media:20190222--Clarke-Mob_Learning.pdf|Slides (PDF, 1.2 MB)]] | | ||
+ | [https://youtu.be/5YIdlFdKV00 Video (YouTube)] | ||
</td> | </td> | ||
</tr> | </tr> | ||
Line 386: | Line 392: | ||
<td style="background-color: #EEE; text-align: center"> | <td style="background-color: #EEE; text-align: center"> | ||
<b>How Can OWASP SAMM Help You Build More Secure Software?</b><br /> | <b>How Can OWASP SAMM Help You Build More Secure Software?</b><br /> | ||
− | <i>Mohamed Hassan - Aura Information Security</i> | + | <i>Mohamed Hassan - Aura Information Security</i><br /> |
+ | <i>Slides not yet available</i> | [https://youtu.be/AEBnmyzDSEo Video (YouTube)] | ||
</td> | </td> | ||
<td valign="top" align="right">11:40</td> | <td valign="top" align="right">11:40</td> | ||
<td style="background-color: #B9C2DC; text-align: center"> | <td style="background-color: #B9C2DC; text-align: center"> | ||
<b>CTF: The Gateway Drug</b><br /> | <b>CTF: The Gateway Drug</b><br /> | ||
− | <i>Toni James - Orion Health</i> | + | <i>Toni James - Orion Health</i><br /> |
+ | <i>Slides not yet available</i> | [https://youtu.be/B1CPimcoE7c Video (YouTube)] | ||
</td> | </td> | ||
</tr> | </tr> | ||
Line 404: | Line 412: | ||
<td style="background-color: #EEE; text-align: center"> | <td style="background-color: #EEE; text-align: center"> | ||
<b>NoHolidayChurchGenius: Password Security with 2020 Vision</b><br /> | <b>NoHolidayChurchGenius: Password Security with 2020 Vision</b><br /> | ||
− | <i>Antonio Radich - Quantum Security</i> | + | <i>Antonio Radich - Quantum Security</i><br /> |
+ | [[Media:20190222--Radich-NoHolidayChurchGenius.pdf|Slides (PDF, 1.4 MB)]] | | ||
+ | [https://www.youtube.com/watch?v=5AaOU5bC2fU Video (YouTube)] | ||
</td> | </td> | ||
<td rowspan="2" valign="top" align="right">13:30</td> | <td rowspan="2" valign="top" align="right">13:30</td> | ||
<td rowspan="2" style="background-color: #EEE; text-align: center"> | <td rowspan="2" style="background-color: #EEE; text-align: center"> | ||
<b>Security Regression Testing on OWASP ZAP Node API</b><br /> | <b>Security Regression Testing on OWASP ZAP Node API</b><br /> | ||
− | <i>Kim Carter - BinaryMist</i> | + | <i>Kim Carter - BinaryMist</i><br /> |
+ | <i>Slides not yet available</i> | <i>Video not published, at presenter's request</i> | ||
</td> | </td> | ||
</tr> | </tr> | ||
Line 416: | Line 427: | ||
<td style="background-color: #B9C2DC; text-align: center"> | <td style="background-color: #B9C2DC; text-align: center"> | ||
<b>Sharing Is Caring: A Beginner's Guide to Security in the Cloud</b><br /> | <b>Sharing Is Caring: A Beginner's Guide to Security in the Cloud</b><br /> | ||
− | <i>Petra Smith - Aura Information Security</i> | + | <i>Petra Smith - Aura Information Security</i><br /> |
+ | [[Media:20190222--Smith-Sharing Is Caring.pdf|Slides (PDF, 2.1 MB)]] | | ||
+ | [https://youtu.be/DKRlnea2o00 Video (YouTube)] | ||
</td> | </td> | ||
</tr> | </tr> | ||
Line 423: | Line 436: | ||
<td style="background-color: #EEE; text-align: center"> | <td style="background-color: #EEE; text-align: center"> | ||
<b>Eating the Elephant: Application Security When You Aren't a Startup</b><br /> | <b>Eating the Elephant: Application Security When You Aren't a Startup</b><br /> | ||
− | <i>Stephen Morgan - Westpac New Zealand</i> | + | <i>Stephen Morgan - Westpac New Zealand</i><br /> |
+ | [[Media:20190222--Morgan-Eating the Elephant.pdf|Slides (PDF, 2.1 MB)]] | | ||
+ | [https://youtu.be/rfK5bSvmdmw Video (YouTube)] | ||
</td> | </td> | ||
<td valign="top" align="right">14:25</td> | <td valign="top" align="right">14:25</td> | ||
<td style="background-color: #B9C2DC; text-align: center"> | <td style="background-color: #B9C2DC; text-align: center"> | ||
<b>CI Can Make $$$ from Thin Air</b><br /> | <b>CI Can Make $$$ from Thin Air</b><br /> | ||
− | <i>Sajeeb Lohani - Privasec</i> | + | <i>Sajeeb Lohani - Privasec</i><br /> |
+ | <i>Slides and Video not published, at presenter's request</i> | ||
</td> | </td> | ||
</tr> | </tr> | ||
Line 435: | Line 451: | ||
<td style="background-color: #B9C2DC; text-align: center"> | <td style="background-color: #B9C2DC; text-align: center"> | ||
<b>What's In a Name? Law of Agency and Domain Name Registrations</b><br /> | <b>What's In a Name? Law of Agency and Domain Name Registrations</b><br /> | ||
− | <i>Judy Ting-Edwards - Ports of Auckland</i> | + | <i>Judy Ting-Edwards - Ports of Auckland</i><br /> |
+ | [[Media:20190222--Ting-Edwards-Whats_in_a_Name.pdf|Slides (PDF, 4.6 MB)]] | | ||
+ | <i>Video not published, at presenter's request</i> | ||
</td> | </td> | ||
<td valign="top" align="right">15:00</td> | <td valign="top" align="right">15:00</td> | ||
<td style="background-color: #EEE; text-align: center"> | <td style="background-color: #EEE; text-align: center"> | ||
<b>Introduction to Building Secure Electron Applications</b><br /> | <b>Introduction to Building Secure Electron Applications</b><br /> | ||
− | <i>Nawaz Gayoom - Provoke Solutions</i> | + | <i>Nawaz Gayoom - Provoke Solutions</i><br /> |
+ | [[Media:20190222--Gayoom-Secure_Electron_Apps.pdf|Slides (PDF, 587 kB)]] | | ||
+ | [https://youtu.be/6GNTbvNs0tc Video (YouTube)] | ||
</td> | </td> | ||
</tr> | </tr> | ||
Line 454: | Line 474: | ||
<b>How Do I Content Security Policy?</b><br /> | <b>How Do I Content Security Policy?</b><br /> | ||
<i>Kirk Jackson - RedShield</i><br /> | <i>Kirk Jackson - RedShield</i><br /> | ||
− | [[Media:2019-02-22 - How do I Content Security Policy - Print.pdf|Slides (PDF, 1. | + | [[Media:2019-02-22 - How do I Content Security Policy - Print.pdf|Slides (PDF, 1.6 MB)]] | |
+ | [https://youtu.be/tlCOd-zjdQM Video (YouTube)] | ||
</td> | </td> | ||
<td valign="top" align="right">16:00</td> | <td valign="top" align="right">16:00</td> | ||
<td style="background-color: #EEE; text-align: center"> | <td style="background-color: #EEE; text-align: center"> | ||
<b>Hardening Your Docker Infrastructure</b><br /> | <b>Hardening Your Docker Infrastructure</b><br /> | ||
− | <i>Kim Carter - BinaryMist</i> | + | <i>Kim Carter - BinaryMist</i><br /> |
+ | <i>Slides not yet available</i> | <i>Video not published, at presenter's request</i> | ||
</td> | </td> | ||
</tr> | </tr> | ||
Line 466: | Line 488: | ||
<td style="background-color: #B9C2DC; text-align: center"> | <td style="background-color: #B9C2DC; text-align: center"> | ||
<b>OWASP Software Assurance Maturity Model (SAMM) 2.0</b><br /> | <b>OWASP Software Assurance Maturity Model (SAMM) 2.0</b><br /> | ||
− | <i>John DiLeo - Orion Health</i> | + | <i>John DiLeo - Orion Health</i><br /> |
+ | [[Media:20190222--DiLeo-OWASP_SAMM_2.pdf|Slides (PDF, 7.1 MB)]] | | ||
+ | [https://youtu.be/o-zoers_ckA Video (YouTube)] | ||
</td> | </td> | ||
<td valign="top" align="right">16:50</td> | <td valign="top" align="right">16:50</td> | ||
<td style="background-color: #B9C2DC; text-align: center"> | <td style="background-color: #B9C2DC; text-align: center"> | ||
<b>Reverse Engineering Mobile Apps: Why, What, and the Hows</b><br /> | <b>Reverse Engineering Mobile Apps: Why, What, and the Hows</b><br /> | ||
− | <i>Karan Sharma</i> | + | <i>Karan Sharma</i><br /> |
+ | Slides (PDF): | ||
+ | [[Media:20190222--Sharma-Mobile App Reverse Engineering-Part1.pdf|Part 1 (4.8 MB)]], | ||
+ | [[Media:20190222--Sharma-Mobile App Reverse Engineering-Part2.pdf|Part 2 (7.1 MB)]], | ||
+ | [[Media:20190222--Sharma-Mobile App Reverse Engineering-Part3.pdf|Part 3 (6.2 MB)]] | | ||
+ | [https://youtu.be/N6ffxIcz0L4 Video (YouTube)] | ||
</td> | </td> | ||
</tr> | </tr> | ||
Line 478: | Line 507: | ||
<td style="background-color: #EEE; text-align: center"> | <td style="background-color: #EEE; text-align: center"> | ||
<b>Why 'Positive Security' Is the Next Software Security Game Changer, and How to Do It</b><br /> | <b>Why 'Positive Security' Is the Next Software Security Game Changer, and How to Do It</b><br /> | ||
− | <i>Jaap Karan Singh - Secure Code Warrior</i> | + | <i>Jaap Karan Singh - Secure Code Warrior</i><br /> |
+ | [[Media:20190222--Singh-Positive Security.pdf|Slides (PDF, 7.1 MB)]] | | ||
+ | [https://youtu.be/kHYdM690hFM Video (YouTube)] | ||
</td> | </td> | ||
<td valign="top" align="right">17:25</td> | <td valign="top" align="right">17:25</td> | ||
<td style="background-color: #EEE; text-align: center"> | <td style="background-color: #EEE; text-align: center"> | ||
<b>Serverless Authentication with JWT</b><br /> | <b>Serverless Authentication with JWT</b><br /> | ||
− | <i>Mehul Patel - Zimbra</i> | + | <i>Mehul Patel - Zimbra</i><br /> |
+ | [https://slides.com/rowdymehul/owaspnz2019 Slides (Slides.com)] | | ||
+ | [https://youtu.be/TSGLddT_eG4 Video (YouTube)] | ||
</td> | </td> | ||
</tr> | </tr> | ||
Line 490: | Line 523: | ||
<td colspan="3" style="background-color: #B9C2DC; text-align: center"> | <td colspan="3" style="background-color: #B9C2DC; text-align: center"> | ||
<b>Wrap Up</b><br /> | <b>Wrap Up</b><br /> | ||
− | <i>Time to go out and socialise, for those interested</i> | + | <i>Time to go out and socialise, for those interested</i><br /> |
+ | [[Media:20190222--DiLeo-Closing_Session.pdf|Slides (PDF, 6.0 MB)]] | ||
</td> | </td> | ||
</tr> | </tr> | ||
Line 505: | Line 539: | ||
---- | ---- | ||
=== David Waters and Kieran Molloy - Pushpay === | === David Waters and Kieran Molloy - Pushpay === | ||
+ | |||
+ | ==== Slide Deck (<i>not yet available</i>) ==== | ||
+ | |||
+ | ==== [https://youtu.be/8TE_peh5Aas Presentation Video (YouTube)] ==== | ||
====Abstract==== | ====Abstract==== | ||
Line 514: | Line 552: | ||
David is a Senior Software Engineer/Tech Lead and one of the leaders of the Secure Coding Guild at Pushpay, David previously worked for 3 years in the security industry including 1 year in the Security Team at Google in London and draws on 20 years experience as a systems and web developer, primarily working in .NET, Java and JavaScript. | David is a Senior Software Engineer/Tech Lead and one of the leaders of the Secure Coding Guild at Pushpay, David previously worked for 3 years in the security industry including 1 year in the Security Team at Google in London and draws on 20 years experience as a systems and web developer, primarily working in .NET, Java and JavaScript. | ||
− | Kieran is a developer with an interest in security. | + | Kieran is a developer with an interest in security. |
=== Threat Modelling When You've Never Done It Before === | === Threat Modelling When You've Never Done It Before === | ||
---- | ---- | ||
=== Kade Morton - Quantum Security === | === Kade Morton - Quantum Security === | ||
+ | |||
+ | ==== [[Media:20190222--Morton-Threat Modelling-Complete.pdf|Slide Deck (PDF, 6.7 MB)]] ==== | ||
+ | |||
+ | ==== [https://youtu.be/YeeIf63Thwc Presentation Video (YouTube)] ==== | ||
====Abstract==== | ====Abstract==== | ||
Line 531: | Line 573: | ||
---- | ---- | ||
=== Peter Jakowetz - Quantum Security === | === Peter Jakowetz - Quantum Security === | ||
+ | |||
+ | ==== Slide Deck (<i>not yet available</i>) ==== | ||
+ | |||
+ | ==== [https://youtu.be/NOed0M0Ec-c Presentation Video (YouTube)] ==== | ||
====Abstract==== | ====Abstract==== | ||
Line 543: | Line 589: | ||
---- | ---- | ||
=== Mike Clarke - Erudite Software === | === Mike Clarke - Erudite Software === | ||
+ | |||
+ | ==== [[Media:20190222--Clarke-Mob_Learning.pdf|Slide Deck (PDF, 1.2 MB)]] ==== | ||
+ | |||
+ | ==== [https://youtu.be/5YIdlFdKV00 Presentation Video (YouTube)] ==== | ||
====Abstract==== | ====Abstract==== | ||
Line 557: | Line 607: | ||
---- | ---- | ||
=== Mohamed Hassan - Aura Information Security === | === Mohamed Hassan - Aura Information Security === | ||
+ | |||
+ | ==== Slide Deck (<i>not yet available</i>) ==== | ||
+ | |||
+ | ==== [https://youtu.be/AEBnmyzDSEo Presentation Video (YouTube)] ==== | ||
====Abstract==== | ====Abstract==== | ||
Line 571: | Line 625: | ||
---- | ---- | ||
=== Kirk Jackson - RedShield === | === Kirk Jackson - RedShield === | ||
+ | |||
+ | ==== [[Media:2019-02-22 - Virtual Patching Does it work - Print.pdf|Slide Deck (PDF, 2.1 MB)]] ==== | ||
+ | |||
+ | ==== [https://youtu.be/6LqKLILNrko Presentation Video (YouTube)] ==== | ||
====Abstract==== | ====Abstract==== | ||
Line 587: | Line 645: | ||
---- | ---- | ||
=== Mike Haworth - Insomnia Security === | === Mike Haworth - Insomnia Security === | ||
+ | |||
+ | ==== Slide Deck (<i>not yet available</i>) ==== | ||
+ | |||
+ | ==== [https://youtu.be/UqMUNFvnp_E Presentation Video (YouTube)] ==== | ||
====Abstract==== | ====Abstract==== | ||
Line 599: | Line 661: | ||
---- | ---- | ||
=== Louis Nyffenegger - Pentester Lab === | === Louis Nyffenegger - Pentester Lab === | ||
+ | |||
+ | ==== [[Media:20190222--Nyffenegger-JWAT.pdf|Slide Deck (3.5 MB)]] ==== | ||
+ | |||
+ | ==== [https://youtu.be/aYz8yPymyvk Presentation Video (YouTube)] ==== | ||
====Abstract==== | ====Abstract==== | ||
Line 611: | Line 677: | ||
---- | ---- | ||
=== Toni James - Orion Health === | === Toni James - Orion Health === | ||
+ | |||
+ | ==== Slide Deck (<i>not yet available</i>) ==== | ||
+ | |||
+ | ==== [https://youtu.be/B1CPimcoE7c Presentation Video (YouTube)] ==== | ||
====Abstract==== | ====Abstract==== | ||
Line 625: | Line 695: | ||
---- | ---- | ||
=== Antonio Radich - Quantum Security === | === Antonio Radich - Quantum Security === | ||
+ | |||
+ | ==== [[Media:20190222--Radich-NoHolidayChurchGenius.pdf|Slide Deck (PDF, 1.4 MB)]] ==== | ||
+ | |||
+ | ==== [https://www.youtube.com/watch?v=5AaOU5bC2fU Presentation Video (YouTube)] ==== | ||
====Abstract==== | ====Abstract==== | ||
Line 637: | Line 711: | ||
---- | ---- | ||
=== Petra Smith - Aura Information Security === | === Petra Smith - Aura Information Security === | ||
+ | |||
+ | ==== Slide Deck (<i>not yet available</i>) ==== | ||
+ | |||
+ | ==== [https://youtu.be/DKRlnea2o00 Presentation Video (YouTube)] ==== | ||
====Abstract==== | ====Abstract==== | ||
Line 649: | Line 727: | ||
---- | ---- | ||
=== Stephen Morgan - Westpac New Zealand === | === Stephen Morgan - Westpac New Zealand === | ||
+ | |||
+ | ==== Slide Deck (<i>not yet available</i>) ==== | ||
+ | |||
+ | ==== [https://youtu.be/rfK5bSvmdmw Presentation Video (YouTube)] ==== | ||
====Abstract==== | ====Abstract==== | ||
Line 661: | Line 743: | ||
---- | ---- | ||
=== Judy Ting-Edwards - Ports of Auckland === | === Judy Ting-Edwards - Ports of Auckland === | ||
+ | |||
+ | ==== [[Media:20190222--Ting-Edwards-Whats_in_a_Name.pdf|Slide Deck (PDF, 4.6 MB)]] ==== | ||
+ | |||
+ | ==== <i>Presentation Video not available, at presenter's request</i> ==== | ||
====Abstract==== | ====Abstract==== | ||
Line 675: | Line 761: | ||
---- | ---- | ||
=== Kim Carter - BinaryMist === | === Kim Carter - BinaryMist === | ||
+ | |||
+ | ==== Slide Deck (<i>not yet available</i>) ==== | ||
+ | |||
+ | ==== <i>Presentation Video not available, at presenter's request</i> ==== | ||
====Abstract==== | ====Abstract==== | ||
Line 687: | Line 777: | ||
---- | ---- | ||
=== Sajeeb Lohani - Privasec === | === Sajeeb Lohani - Privasec === | ||
+ | |||
+ | ==== Slide Deck (<i>not yet available</i>) ==== | ||
+ | |||
+ | ==== <i>Presentation Video not available, at presenter's request</i> ==== | ||
====Abstract==== | ====Abstract==== | ||
Line 699: | Line 793: | ||
---- | ---- | ||
=== Nawaz Gayoom - Provoke Solutions === | === Nawaz Gayoom - Provoke Solutions === | ||
+ | |||
+ | ==== [[Media:20190222--Gayoom-Secure_Electron_Apps.pdf|Slide Deck (PDF, 587 kB)]] ==== | ||
+ | |||
+ | ==== [https://youtu.be/6GNTbvNs0tc Presentation Video (YouTube)] ==== | ||
====Abstract==== | ====Abstract==== | ||
Line 713: | Line 811: | ||
---- | ---- | ||
=== Kirk Jackson - RedShield === | === Kirk Jackson - RedShield === | ||
+ | |||
+ | ==== [[Media:2019-02-22 - How do I Content Security Policy - Print.pdf|Slide Deck (PDF, 1.6 MB)]] ==== | ||
+ | |||
+ | ==== [https://youtu.be/tlCOd-zjdQM Presentation Video (YouTube)] ==== | ||
====Abstract==== | ====Abstract==== | ||
Line 729: | Line 831: | ||
---- | ---- | ||
=== John DiLeo - Orion Health === | === John DiLeo - Orion Health === | ||
+ | |||
+ | ==== [[Media:20190222--DiLeo-OWASP_SAMM_2.pdf|Slide Deck (PDF, 7.1 MB)]] ==== | ||
+ | |||
+ | ==== [https://youtu.be/o-zoers_ckA Presentation Video (YouTube)] ==== | ||
====Abstract==== | ====Abstract==== | ||
Line 743: | Line 849: | ||
---- | ---- | ||
=== Jaap Karan Singh - Secure Code Warrior === | === Jaap Karan Singh - Secure Code Warrior === | ||
+ | |||
+ | ==== Slide Deck (<i>not yet available</i>) ==== | ||
+ | |||
+ | ==== [https://youtu.be/kHYdM690hFM Presentation Video (YouTube)] ==== | ||
====Abstract==== | ====Abstract==== | ||
Line 757: | Line 867: | ||
---- | ---- | ||
=== Kim Carter - BinaryMist === | === Kim Carter - BinaryMist === | ||
+ | |||
+ | ==== Slide Deck (<i>not yet available</i>) ==== | ||
+ | |||
+ | ==== <i>Presentation Video not available, at presenter's request</i> ==== | ||
====Abstract==== | ====Abstract==== | ||
Line 769: | Line 883: | ||
---- | ---- | ||
=== Karan Sharma === | === Karan Sharma === | ||
+ | |||
+ | ==== Slide Deck (<i>not yet available</i>) ==== | ||
+ | |||
+ | ==== [https://youtu.be/N6ffxIcz0L4 Presentation Video (YouTube)] ==== | ||
====Abstract==== | ====Abstract==== | ||
Line 781: | Line 899: | ||
---- | ---- | ||
=== Mehul Patel === | === Mehul Patel === | ||
+ | |||
+ | ==== [https://slides.com/rowdymehul/owaspnz2019 Slide Deck (Slides.com)] ==== | ||
+ | |||
+ | ==== [https://youtu.be/TSGLddT_eG4 Presentation Video (YouTube)] ==== | ||
====Abstract==== | ====Abstract==== |