This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "AppSecUSA 2012.com"
From OWASP
Line 7: | Line 7: | ||
==== Building Predictable Systems using Behavioral Security Modeling: |Functional Security Requirements ==== | ==== Building Predictable Systems using Behavioral Security Modeling: |Functional Security Requirements ==== | ||
− | * | + | *'''John Benninghoff''' | Developer |
==== Top Ten Web Defenses ==== | ==== Top Ten Web Defenses ==== | ||
− | * | + | *'''Jim Manico''' | Mobile |
==== Mobile Applications & Proxy Shenanigans ==== | ==== Mobile Applications & Proxy Shenanigans ==== | ||
− | * | + | *'''Dan Amodio''' | Mobile |
==== Reverse Engineering “Secure” HTTP APIs With An SSL Proxy ==== | ==== Reverse Engineering “Secure” HTTP APIs With An SSL Proxy ==== | ||
− | * | + | *'''Alejandro Caceres''' | Reverse Engineering |
==== Gauntlt: Rugged by Example ==== | ==== Gauntlt: Rugged by Example ==== | ||
− | * | + | *'''Jeremiah Shirk''' | Rugged devops |
=== 11:00 am - 11:45 am === | === 11:00 am - 11:45 am === | ||
Line 26: | Line 26: | ||
==== Building a Web Attacker Dashboard with ModSecurity and BeEF ==== | ==== Building a Web Attacker Dashboard with ModSecurity and BeEF ==== | ||
− | * | + | *'''Ryan Barnett''' | Attack |
==== Secure Code Reviews Magic or Art? A Simplified Approach to Secure Code Reviews ==== | ==== Secure Code Reviews Magic or Art? A Simplified Approach to Secure Code Reviews ==== | ||
− | * | + | *'''Sherif Koussa''' | Developer |
==== Cracking the Code of Mobile Application ==== | ==== Cracking the Code of Mobile Application ==== | ||
− | * | + | *'''Sreenarayan Ashokkumar''' | Mobile |
==== Hacking .NET Application: Reverse Engineering 101 ==== | ==== Hacking .NET Application: Reverse Engineering 101 ==== | ||
− | * | + | *'''Jon Mccoy''' | Reverse Engineering |
==== Doing the unstuck: How Rugged cultures drive Biz & AppSec Value ==== | ==== Doing the unstuck: How Rugged cultures drive Biz & AppSec Value ==== | ||
− | * | + | *'''Josh Corman''' | Rugged devops |
<br> | <br> |
Revision as of 06:20, 12 November 2012
- AppSecUSA Presentations and Talks
- 1 Thursday 25th Oct
- 1.1 10:00 am - 10:45 am
- 1.2 11:00 am - 11:45 am
- 1.2.1 Building a Web Attacker Dashboard with ModSecurity and BeEF
- 1.2.2 Secure Code Reviews Magic or Art? A Simplified Approach to Secure Code Reviews
- 1.2.3 Cracking the Code of Mobile Application
- 1.2.4 Hacking .NET Application: Reverse Engineering 101
- 1.2.5 Doing the unstuck: How Rugged cultures drive Biz & AppSec Value
Thursday 25th Oct
10:00 am - 10:45 am
Building Predictable Systems using Behavioral Security Modeling: |Functional Security Requirements
- John Benninghoff | Developer
Top Ten Web Defenses
- Jim Manico | Mobile
Mobile Applications & Proxy Shenanigans
- Dan Amodio | Mobile
Reverse Engineering “Secure” HTTP APIs With An SSL Proxy
- Alejandro Caceres | Reverse Engineering
Gauntlt: Rugged by Example
- Jeremiah Shirk | Rugged devops
11:00 am - 11:45 am
Building a Web Attacker Dashboard with ModSecurity and BeEF
- Ryan Barnett | Attack
Secure Code Reviews Magic or Art? A Simplified Approach to Secure Code Reviews
- Sherif Koussa | Developer
Cracking the Code of Mobile Application
- Sreenarayan Ashokkumar | Mobile
Hacking .NET Application: Reverse Engineering 101
- Jon Mccoy | Reverse Engineering
Doing the unstuck: How Rugged cultures drive Biz & AppSec Value
- Josh Corman | Rugged devops