This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "OWASP New Zealand Day 2019"
From OWASP
John dileo (talk | contribs) (Added Mike Clarke's slides, and YouTube links for Track 2 video (added opt-out notices for non-published videos)) |
John dileo (talk | contribs) (Updated slide and video links for Radich presentation) |
||
(13 intermediate revisions by the same user not shown) | |||
Line 7: | Line 7: | ||
=Introduction= | =Introduction= | ||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
==Introduction== | ==Introduction== | ||
Line 309: | Line 298: | ||
Morning and afternoon tea breaks will be provided; lunch will be on your own. | Morning and afternoon tea breaks will be provided; lunch will be on your own. | ||
− | = | + | =Conference - 22 Feb= |
Line 345: | Line 334: | ||
<td style="background-color: #EEE; text-align: center"> | <td style="background-color: #EEE; text-align: center"> | ||
<b>Exploiting Vulnerabilities from the OWASP Top 10: SQLi, XSS, XXE, File Injection</b><br /> | <b>Exploiting Vulnerabilities from the OWASP Top 10: SQLi, XSS, XXE, File Injection</b><br /> | ||
− | <i>David Waters and Kieran Molloy - Pushpay</i> | + | <i>David Waters and Kieran Molloy - Pushpay</i><br /> |
+ | [[Media:20190222--Waters Molloy-Exploiting Vulnerabilities.pdf|Slides (PDF, 789 kB)]] | | ||
+ | [https://youtu.be/8TE_peh5Aas Video (YouTube)] | ||
</td> | </td> | ||
<td valign="top" align="right">09:20</td> | <td valign="top" align="right">09:20</td> | ||
Line 352: | Line 343: | ||
<i>Kirk Jackson - RedShield</i><br /> | <i>Kirk Jackson - RedShield</i><br /> | ||
[[Media:2019-02-22 - Virtual Patching Does it work - Print.pdf|Slides (PDF, 2.1 MB)]] | | [[Media:2019-02-22 - Virtual Patching Does it work - Print.pdf|Slides (PDF, 2.1 MB)]] | | ||
− | [https:// | + | [https://youtu.be/6LqKLILNrko Video (YouTube)] |
</td> | </td> | ||
</tr> | </tr> | ||
Line 360: | Line 351: | ||
<b>Threat Modelling When You've Never Done It Before</b><br /> | <b>Threat Modelling When You've Never Done It Before</b><br /> | ||
<i>Kade Morton - Quantum Security</i><br /> | <i>Kade Morton - Quantum Security</i><br /> | ||
− | + | [[Media:20190222--Morton-Threat Modelling-Complete.pdf|Slides (PDF, 5.7 MB)]] | | |
− | [[Media:20190222--Morton-Threat Modelling- | + | [https://youtu.be/YeeIf63Thwc Video (YouTube)] |
− | |||
− | |||
− | [ | ||
</td> | </td> | ||
<td valign="top" align="right">10:10</td> | <td valign="top" align="right">10:10</td> | ||
Line 370: | Line 358: | ||
<b>Cloud Catastrophes and How to Avoid Them</b><br /> | <b>Cloud Catastrophes and How to Avoid Them</b><br /> | ||
<i>Michael Haworth - Insomnia Security</i><br /> | <i>Michael Haworth - Insomnia Security</i><br /> | ||
− | [https:// | + | [[Media:20190222--Haworth-Cloud_Catastrophes.pdf|Slides (PDF, 666 kB)]] | |
+ | [https://youtu.be/UqMUNFvnp_E Video (YouTube)] | ||
</td> | </td> | ||
Line 378: | Line 367: | ||
<td style="background-color: #EEE; text-align: center"> | <td style="background-color: #EEE; text-align: center"> | ||
<b>That Vulnerability Looks Quite Risky</b><br /> | <b>That Vulnerability Looks Quite Risky</b><br /> | ||
− | <i>Peter Jakowetz - Quantum Security</i> | + | <i>Peter Jakowetz - Quantum Security</i><br /> |
+ | [[Media:20190222--Jakowetz-Vulnerability Looks Quite Risky.pdf|Slides (PDF, 1.0 MB)]] | | ||
+ | [https://youtu.be/NOed0M0Ec-c Video (YouTube)] | ||
</td> | </td> | ||
<td rowspan="2" valign="top" align="right">10:45</td> | <td rowspan="2" valign="top" align="right">10:45</td> | ||
Line 384: | Line 375: | ||
<b>JWAT: Attacking JSON Web Tokens</b><br /> | <b>JWAT: Attacking JSON Web Tokens</b><br /> | ||
<i>Louis Nyffenegger - Pentester Lab</i><br /> | <i>Louis Nyffenegger - Pentester Lab</i><br /> | ||
− | [https:// | + | [[Media:20190222--Nyffenegger-JWAT.pdf|Slides (PDF, 3.5 MB)]] | |
+ | [https://youtu.be/aYz8yPymyvk Video (YouTube)] | ||
</td> | </td> | ||
</tr> | </tr> | ||
Line 392: | Line 384: | ||
<b>Mob Learning Using the OWASP Top 10 and 30 Days of Security Testing</b><br /> | <b>Mob Learning Using the OWASP Top 10 and 30 Days of Security Testing</b><br /> | ||
<i>Mike Clarke - Erudite Software</i><br /> | <i>Mike Clarke - Erudite Software</i><br /> | ||
− | [[Media:20190222--Clarke-Mob_Learning.pdf|Slides (1.2 MB)]] | + | [[Media:20190222--Clarke-Mob_Learning.pdf|Slides (PDF, 1.2 MB)]] | |
+ | [https://youtu.be/5YIdlFdKV00 Video (YouTube)] | ||
</td> | </td> | ||
</tr> | </tr> | ||
Line 399: | Line 392: | ||
<td style="background-color: #EEE; text-align: center"> | <td style="background-color: #EEE; text-align: center"> | ||
<b>How Can OWASP SAMM Help You Build More Secure Software?</b><br /> | <b>How Can OWASP SAMM Help You Build More Secure Software?</b><br /> | ||
− | <i>Mohamed Hassan - Aura Information Security</i> | + | <i>Mohamed Hassan - Aura Information Security</i><br /> |
+ | <i>Slides not yet available</i> | [https://youtu.be/AEBnmyzDSEo Video (YouTube)] | ||
</td> | </td> | ||
<td valign="top" align="right">11:40</td> | <td valign="top" align="right">11:40</td> | ||
Line 405: | Line 399: | ||
<b>CTF: The Gateway Drug</b><br /> | <b>CTF: The Gateway Drug</b><br /> | ||
<i>Toni James - Orion Health</i><br /> | <i>Toni James - Orion Health</i><br /> | ||
− | [https:// | + | <i>Slides not yet available</i> | [https://youtu.be/B1CPimcoE7c Video (YouTube)] |
</td> | </td> | ||
</tr> | </tr> | ||
Line 419: | Line 413: | ||
<b>NoHolidayChurchGenius: Password Security with 2020 Vision</b><br /> | <b>NoHolidayChurchGenius: Password Security with 2020 Vision</b><br /> | ||
<i>Antonio Radich - Quantum Security</i><br /> | <i>Antonio Radich - Quantum Security</i><br /> | ||
− | + | [[Media:20190222--Radich-NoHolidayChurchGenius.pdf|Slides (PDF, 1.4 MB)]] | | |
+ | [https://www.youtube.com/watch?v=5AaOU5bC2fU Video (YouTube)] | ||
</td> | </td> | ||
<td rowspan="2" valign="top" align="right">13:30</td> | <td rowspan="2" valign="top" align="right">13:30</td> | ||
Line 425: | Line 420: | ||
<b>Security Regression Testing on OWASP ZAP Node API</b><br /> | <b>Security Regression Testing on OWASP ZAP Node API</b><br /> | ||
<i>Kim Carter - BinaryMist</i><br /> | <i>Kim Carter - BinaryMist</i><br /> | ||
− | <i>Video not published, at presenter's request</i> | + | <i>Slides not yet available</i> | <i>Video not published, at presenter's request</i> |
</td> | </td> | ||
</tr> | </tr> | ||
Line 432: | Line 427: | ||
<td style="background-color: #B9C2DC; text-align: center"> | <td style="background-color: #B9C2DC; text-align: center"> | ||
<b>Sharing Is Caring: A Beginner's Guide to Security in the Cloud</b><br /> | <b>Sharing Is Caring: A Beginner's Guide to Security in the Cloud</b><br /> | ||
− | <i>Petra Smith - Aura Information Security</i> | + | <i>Petra Smith - Aura Information Security</i><br /> |
+ | [[Media:20190222--Smith-Sharing Is Caring.pdf|Slides (PDF, 2.1 MB)]] | | ||
+ | [https://youtu.be/DKRlnea2o00 Video (YouTube)] | ||
</td> | </td> | ||
</tr> | </tr> | ||
Line 439: | Line 436: | ||
<td style="background-color: #EEE; text-align: center"> | <td style="background-color: #EEE; text-align: center"> | ||
<b>Eating the Elephant: Application Security When You Aren't a Startup</b><br /> | <b>Eating the Elephant: Application Security When You Aren't a Startup</b><br /> | ||
− | <i>Stephen Morgan - Westpac New Zealand</i> | + | <i>Stephen Morgan - Westpac New Zealand</i><br /> |
+ | [[Media:20190222--Morgan-Eating the Elephant.pdf|Slides (PDF, 2.1 MB)]] | | ||
+ | [https://youtu.be/rfK5bSvmdmw Video (YouTube)] | ||
</td> | </td> | ||
<td valign="top" align="right">14:25</td> | <td valign="top" align="right">14:25</td> | ||
Line 445: | Line 444: | ||
<b>CI Can Make $$$ from Thin Air</b><br /> | <b>CI Can Make $$$ from Thin Air</b><br /> | ||
<i>Sajeeb Lohani - Privasec</i><br /> | <i>Sajeeb Lohani - Privasec</i><br /> | ||
− | <i>Video not published, at presenter's request</i> | + | <i>Slides and Video not published, at presenter's request</i> |
</td> | </td> | ||
</tr> | </tr> | ||
Line 461: | Line 460: | ||
<i>Nawaz Gayoom - Provoke Solutions</i><br /> | <i>Nawaz Gayoom - Provoke Solutions</i><br /> | ||
[[Media:20190222--Gayoom-Secure_Electron_Apps.pdf|Slides (PDF, 587 kB)]] | | [[Media:20190222--Gayoom-Secure_Electron_Apps.pdf|Slides (PDF, 587 kB)]] | | ||
− | [https:// | + | [https://youtu.be/6GNTbvNs0tc Video (YouTube)] |
</td> | </td> | ||
</tr> | </tr> | ||
Line 475: | Line 474: | ||
<b>How Do I Content Security Policy?</b><br /> | <b>How Do I Content Security Policy?</b><br /> | ||
<i>Kirk Jackson - RedShield</i><br /> | <i>Kirk Jackson - RedShield</i><br /> | ||
− | [[Media:2019-02-22 - How do I Content Security Policy - Print.pdf|Slides (PDF, 1.6 MB)]] | + | [[Media:2019-02-22 - How do I Content Security Policy - Print.pdf|Slides (PDF, 1.6 MB)]] | |
+ | [https://youtu.be/tlCOd-zjdQM Video (YouTube)] | ||
</td> | </td> | ||
<td valign="top" align="right">16:00</td> | <td valign="top" align="right">16:00</td> | ||
Line 481: | Line 481: | ||
<b>Hardening Your Docker Infrastructure</b><br /> | <b>Hardening Your Docker Infrastructure</b><br /> | ||
<i>Kim Carter - BinaryMist</i><br /> | <i>Kim Carter - BinaryMist</i><br /> | ||
− | <i>Video not published, at presenter's request</i> | + | <i>Slides not yet available</i> | <i>Video not published, at presenter's request</i> |
</td> | </td> | ||
</tr> | </tr> | ||
Line 489: | Line 489: | ||
<b>OWASP Software Assurance Maturity Model (SAMM) 2.0</b><br /> | <b>OWASP Software Assurance Maturity Model (SAMM) 2.0</b><br /> | ||
<i>John DiLeo - Orion Health</i><br /> | <i>John DiLeo - Orion Health</i><br /> | ||
− | [[Media:20190222--DiLeo-OWASP_SAMM_2.pdf|Slides (PDF, 7.1 MB)]] | + | [[Media:20190222--DiLeo-OWASP_SAMM_2.pdf|Slides (PDF, 7.1 MB)]] | |
+ | [https://youtu.be/o-zoers_ckA Video (YouTube)] | ||
</td> | </td> | ||
<td valign="top" align="right">16:50</td> | <td valign="top" align="right">16:50</td> | ||
Line 495: | Line 496: | ||
<b>Reverse Engineering Mobile Apps: Why, What, and the Hows</b><br /> | <b>Reverse Engineering Mobile Apps: Why, What, and the Hows</b><br /> | ||
<i>Karan Sharma</i><br /> | <i>Karan Sharma</i><br /> | ||
− | [https:// | + | Slides (PDF): |
+ | [[Media:20190222--Sharma-Mobile App Reverse Engineering-Part1.pdf|Part 1 (4.8 MB)]], | ||
+ | [[Media:20190222--Sharma-Mobile App Reverse Engineering-Part2.pdf|Part 2 (7.1 MB)]], | ||
+ | [[Media:20190222--Sharma-Mobile App Reverse Engineering-Part3.pdf|Part 3 (6.2 MB)]] | | ||
+ | [https://youtu.be/N6ffxIcz0L4 Video (YouTube)] | ||
</td> | </td> | ||
</tr> | </tr> | ||
Line 502: | Line 507: | ||
<td style="background-color: #EEE; text-align: center"> | <td style="background-color: #EEE; text-align: center"> | ||
<b>Why 'Positive Security' Is the Next Software Security Game Changer, and How to Do It</b><br /> | <b>Why 'Positive Security' Is the Next Software Security Game Changer, and How to Do It</b><br /> | ||
− | <i>Jaap Karan Singh - Secure Code Warrior</i> | + | <i>Jaap Karan Singh - Secure Code Warrior</i><br /> |
+ | [[Media:20190222--Singh-Positive Security.pdf|Slides (PDF, 7.1 MB)]] | | ||
+ | [https://youtu.be/kHYdM690hFM Video (YouTube)] | ||
</td> | </td> | ||
<td valign="top" align="right">17:25</td> | <td valign="top" align="right">17:25</td> | ||
Line 509: | Line 516: | ||
<i>Mehul Patel - Zimbra</i><br /> | <i>Mehul Patel - Zimbra</i><br /> | ||
[https://slides.com/rowdymehul/owaspnz2019 Slides (Slides.com)] | | [https://slides.com/rowdymehul/owaspnz2019 Slides (Slides.com)] | | ||
− | [https:// | + | [https://youtu.be/TSGLddT_eG4 Video (YouTube)] |
</td> | </td> | ||
</tr> | </tr> | ||
Line 532: | Line 539: | ||
---- | ---- | ||
=== David Waters and Kieran Molloy - Pushpay === | === David Waters and Kieran Molloy - Pushpay === | ||
+ | |||
+ | ==== Slide Deck (<i>not yet available</i>) ==== | ||
+ | |||
+ | ==== [https://youtu.be/8TE_peh5Aas Presentation Video (YouTube)] ==== | ||
====Abstract==== | ====Abstract==== | ||
Line 541: | Line 552: | ||
David is a Senior Software Engineer/Tech Lead and one of the leaders of the Secure Coding Guild at Pushpay, David previously worked for 3 years in the security industry including 1 year in the Security Team at Google in London and draws on 20 years experience as a systems and web developer, primarily working in .NET, Java and JavaScript. | David is a Senior Software Engineer/Tech Lead and one of the leaders of the Secure Coding Guild at Pushpay, David previously worked for 3 years in the security industry including 1 year in the Security Team at Google in London and draws on 20 years experience as a systems and web developer, primarily working in .NET, Java and JavaScript. | ||
− | Kieran is a developer with an interest in security. | + | Kieran is a developer with an interest in security. |
=== Threat Modelling When You've Never Done It Before === | === Threat Modelling When You've Never Done It Before === | ||
---- | ---- | ||
=== Kade Morton - Quantum Security === | === Kade Morton - Quantum Security === | ||
+ | |||
+ | ==== [[Media:20190222--Morton-Threat Modelling-Complete.pdf|Slide Deck (PDF, 6.7 MB)]] ==== | ||
+ | |||
+ | ==== [https://youtu.be/YeeIf63Thwc Presentation Video (YouTube)] ==== | ||
====Abstract==== | ====Abstract==== | ||
Line 558: | Line 573: | ||
---- | ---- | ||
=== Peter Jakowetz - Quantum Security === | === Peter Jakowetz - Quantum Security === | ||
+ | |||
+ | ==== Slide Deck (<i>not yet available</i>) ==== | ||
+ | |||
+ | ==== [https://youtu.be/NOed0M0Ec-c Presentation Video (YouTube)] ==== | ||
====Abstract==== | ====Abstract==== | ||
Line 570: | Line 589: | ||
---- | ---- | ||
=== Mike Clarke - Erudite Software === | === Mike Clarke - Erudite Software === | ||
+ | |||
+ | ==== [[Media:20190222--Clarke-Mob_Learning.pdf|Slide Deck (PDF, 1.2 MB)]] ==== | ||
+ | |||
+ | ==== [https://youtu.be/5YIdlFdKV00 Presentation Video (YouTube)] ==== | ||
====Abstract==== | ====Abstract==== | ||
Line 584: | Line 607: | ||
---- | ---- | ||
=== Mohamed Hassan - Aura Information Security === | === Mohamed Hassan - Aura Information Security === | ||
+ | |||
+ | ==== Slide Deck (<i>not yet available</i>) ==== | ||
+ | |||
+ | ==== [https://youtu.be/AEBnmyzDSEo Presentation Video (YouTube)] ==== | ||
====Abstract==== | ====Abstract==== | ||
Line 598: | Line 625: | ||
---- | ---- | ||
=== Kirk Jackson - RedShield === | === Kirk Jackson - RedShield === | ||
+ | |||
+ | ==== [[Media:2019-02-22 - Virtual Patching Does it work - Print.pdf|Slide Deck (PDF, 2.1 MB)]] ==== | ||
+ | |||
+ | ==== [https://youtu.be/6LqKLILNrko Presentation Video (YouTube)] ==== | ||
====Abstract==== | ====Abstract==== | ||
Line 614: | Line 645: | ||
---- | ---- | ||
=== Mike Haworth - Insomnia Security === | === Mike Haworth - Insomnia Security === | ||
+ | |||
+ | ==== Slide Deck (<i>not yet available</i>) ==== | ||
+ | |||
+ | ==== [https://youtu.be/UqMUNFvnp_E Presentation Video (YouTube)] ==== | ||
====Abstract==== | ====Abstract==== | ||
Line 626: | Line 661: | ||
---- | ---- | ||
=== Louis Nyffenegger - Pentester Lab === | === Louis Nyffenegger - Pentester Lab === | ||
+ | |||
+ | ==== [[Media:20190222--Nyffenegger-JWAT.pdf|Slide Deck (3.5 MB)]] ==== | ||
+ | |||
+ | ==== [https://youtu.be/aYz8yPymyvk Presentation Video (YouTube)] ==== | ||
====Abstract==== | ====Abstract==== | ||
Line 638: | Line 677: | ||
---- | ---- | ||
=== Toni James - Orion Health === | === Toni James - Orion Health === | ||
+ | |||
+ | ==== Slide Deck (<i>not yet available</i>) ==== | ||
+ | |||
+ | ==== [https://youtu.be/B1CPimcoE7c Presentation Video (YouTube)] ==== | ||
====Abstract==== | ====Abstract==== | ||
Line 652: | Line 695: | ||
---- | ---- | ||
=== Antonio Radich - Quantum Security === | === Antonio Radich - Quantum Security === | ||
+ | |||
+ | ==== [[Media:20190222--Radich-NoHolidayChurchGenius.pdf|Slide Deck (PDF, 1.4 MB)]] ==== | ||
+ | |||
+ | ==== [https://www.youtube.com/watch?v=5AaOU5bC2fU Presentation Video (YouTube)] ==== | ||
====Abstract==== | ====Abstract==== | ||
Line 664: | Line 711: | ||
---- | ---- | ||
=== Petra Smith - Aura Information Security === | === Petra Smith - Aura Information Security === | ||
+ | |||
+ | ==== Slide Deck (<i>not yet available</i>) ==== | ||
+ | |||
+ | ==== [https://youtu.be/DKRlnea2o00 Presentation Video (YouTube)] ==== | ||
====Abstract==== | ====Abstract==== | ||
Line 676: | Line 727: | ||
---- | ---- | ||
=== Stephen Morgan - Westpac New Zealand === | === Stephen Morgan - Westpac New Zealand === | ||
+ | |||
+ | ==== Slide Deck (<i>not yet available</i>) ==== | ||
+ | |||
+ | ==== [https://youtu.be/rfK5bSvmdmw Presentation Video (YouTube)] ==== | ||
====Abstract==== | ====Abstract==== | ||
Line 688: | Line 743: | ||
---- | ---- | ||
=== Judy Ting-Edwards - Ports of Auckland === | === Judy Ting-Edwards - Ports of Auckland === | ||
+ | |||
+ | ==== [[Media:20190222--Ting-Edwards-Whats_in_a_Name.pdf|Slide Deck (PDF, 4.6 MB)]] ==== | ||
+ | |||
+ | ==== <i>Presentation Video not available, at presenter's request</i> ==== | ||
====Abstract==== | ====Abstract==== | ||
Line 702: | Line 761: | ||
---- | ---- | ||
=== Kim Carter - BinaryMist === | === Kim Carter - BinaryMist === | ||
+ | |||
+ | ==== Slide Deck (<i>not yet available</i>) ==== | ||
+ | |||
+ | ==== <i>Presentation Video not available, at presenter's request</i> ==== | ||
====Abstract==== | ====Abstract==== | ||
Line 714: | Line 777: | ||
---- | ---- | ||
=== Sajeeb Lohani - Privasec === | === Sajeeb Lohani - Privasec === | ||
+ | |||
+ | ==== Slide Deck (<i>not yet available</i>) ==== | ||
+ | |||
+ | ==== <i>Presentation Video not available, at presenter's request</i> ==== | ||
====Abstract==== | ====Abstract==== | ||
Line 726: | Line 793: | ||
---- | ---- | ||
=== Nawaz Gayoom - Provoke Solutions === | === Nawaz Gayoom - Provoke Solutions === | ||
+ | |||
+ | ==== [[Media:20190222--Gayoom-Secure_Electron_Apps.pdf|Slide Deck (PDF, 587 kB)]] ==== | ||
+ | |||
+ | ==== [https://youtu.be/6GNTbvNs0tc Presentation Video (YouTube)] ==== | ||
====Abstract==== | ====Abstract==== | ||
Line 740: | Line 811: | ||
---- | ---- | ||
=== Kirk Jackson - RedShield === | === Kirk Jackson - RedShield === | ||
+ | |||
+ | ==== [[Media:2019-02-22 - How do I Content Security Policy - Print.pdf|Slide Deck (PDF, 1.6 MB)]] ==== | ||
+ | |||
+ | ==== [https://youtu.be/tlCOd-zjdQM Presentation Video (YouTube)] ==== | ||
====Abstract==== | ====Abstract==== | ||
Line 756: | Line 831: | ||
---- | ---- | ||
=== John DiLeo - Orion Health === | === John DiLeo - Orion Health === | ||
+ | |||
+ | ==== [[Media:20190222--DiLeo-OWASP_SAMM_2.pdf|Slide Deck (PDF, 7.1 MB)]] ==== | ||
+ | |||
+ | ==== [https://youtu.be/o-zoers_ckA Presentation Video (YouTube)] ==== | ||
====Abstract==== | ====Abstract==== | ||
Line 770: | Line 849: | ||
---- | ---- | ||
=== Jaap Karan Singh - Secure Code Warrior === | === Jaap Karan Singh - Secure Code Warrior === | ||
+ | |||
+ | ==== Slide Deck (<i>not yet available</i>) ==== | ||
+ | |||
+ | ==== [https://youtu.be/kHYdM690hFM Presentation Video (YouTube)] ==== | ||
====Abstract==== | ====Abstract==== | ||
Line 784: | Line 867: | ||
---- | ---- | ||
=== Kim Carter - BinaryMist === | === Kim Carter - BinaryMist === | ||
+ | |||
+ | ==== Slide Deck (<i>not yet available</i>) ==== | ||
+ | |||
+ | ==== <i>Presentation Video not available, at presenter's request</i> ==== | ||
====Abstract==== | ====Abstract==== | ||
Line 796: | Line 883: | ||
---- | ---- | ||
=== Karan Sharma === | === Karan Sharma === | ||
+ | |||
+ | ==== Slide Deck (<i>not yet available</i>) ==== | ||
+ | |||
+ | ==== [https://youtu.be/N6ffxIcz0L4 Presentation Video (YouTube)] ==== | ||
====Abstract==== | ====Abstract==== | ||
Line 808: | Line 899: | ||
---- | ---- | ||
=== Mehul Patel === | === Mehul Patel === | ||
+ | |||
+ | ==== [https://slides.com/rowdymehul/owaspnz2019 Slide Deck (Slides.com)] ==== | ||
+ | |||
+ | ==== [https://youtu.be/TSGLddT_eG4 Presentation Video (YouTube)] ==== | ||
====Abstract==== | ====Abstract==== |