This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "AppSecUSA 2012.com"
From OWASP
| Line 40: | Line 40: | ||
*'''Josh Corman''' | Rugged devops | *'''Josh Corman''' | Rugged devops | ||
| + | |||
| + | === 2:00 pm - 2:45 am === | ||
| + | |||
| + | ---- | ||
| + | |||
| + | ==== Hacking with WebSockets ==== | ||
| + | *'''Vaagn Toukharian''' | Attack | ||
| + | |||
| + | ==== Bug Bounty Programs ==== | ||
| + | *'''Michael Coates, Chris Evans, Jeremiah Grossman, Adam Mein, Alex Rice''' | Developer | ||
| + | |||
| + | ==== How we tear into that little green man ==== | ||
| + | *'''Mathew Rowley''' | Mobile | ||
| + | |||
| + | ==== AppSec Training, Securing the SDLC, WebGoat.NET and the Meaning of Life ==== | ||
| + | *'''Jerry Hoff''' | Developer | ||
| + | |||
| + | ==== Put your robots to work: security automation at Twitter ==== | ||
| + | *'''Justin Collins, Neil Matatall, Alex Smolen''' | Rugged devops | ||
<br> | <br> | ||
Revision as of 03:10, 18 November 2012
- AppSecUSA Presentations and Talks
- 1 Thursday 25th Oct
- 1.1 10:00 am - 10:45 am
- 1.2 11:00 am - 11:45 am
- 1.2.1 Building a Web Attacker Dashboard with ModSecurity and BeEF
- 1.2.2 Secure Code Reviews Magic or Art? A Simplified Approach to Secure Code Reviews
- 1.2.3 Cracking the Code of Mobile Application
- 1.2.4 Hacking .NET Application: Reverse Engineering 101
- 1.2.5 Doing the unstuck: How Rugged cultures drive Biz & AppSec Value
- 1.3 2:00 pm - 2:45 am
Thursday 25th Oct
10:00 am - 10:45 am
Building Predictable Systems using Behavioral Security Modeling: |Functional Security Requirements
- John Benninghoff | Developer
Top Ten Web Defenses
- Jim Manico | Mobile
Mobile Applications & Proxy Shenanigans
- Dan Amodio | Mobile
Reverse Engineering “Secure” HTTP APIs With An SSL Proxy
- Alejandro Caceres | Reverse Engineering
Gauntlt: Rugged by Example
- Jeremiah Shirk | Rugged devops
11:00 am - 11:45 am
Building a Web Attacker Dashboard with ModSecurity and BeEF
- Ryan Barnett | Attack
Secure Code Reviews Magic or Art? A Simplified Approach to Secure Code Reviews
- Sherif Koussa | Developer
Cracking the Code of Mobile Application
- Sreenarayan Ashokkumar | Mobile
Hacking .NET Application: Reverse Engineering 101
- Jon Mccoy | Reverse Engineering
Doing the unstuck: How Rugged cultures drive Biz & AppSec Value
- Josh Corman | Rugged devops
2:00 pm - 2:45 am
Hacking with WebSockets
- Vaagn Toukharian | Attack
Bug Bounty Programs
- Michael Coates, Chris Evans, Jeremiah Grossman, Adam Mein, Alex Rice | Developer
How we tear into that little green man
- Mathew Rowley | Mobile
AppSec Training, Securing the SDLC, WebGoat.NET and the Meaning of Life
- Jerry Hoff | Developer
Put your robots to work: security automation at Twitter
- Justin Collins, Neil Matatall, Alex Smolen | Rugged devops