This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Front Range OWASP Conference 2013/Archive"
Mark Major (talk | contribs) (Created page with "====2013 presentations==== Presentation materials will be made available upon the conclusion of SnowFROC2013. ====Previous conferences==== '''2012 presentations''' are [[F...") |
Jess Garrett (talk | contribs) |
||
Line 3: | Line 3: | ||
Presentation materials will be made available upon the conclusion of SnowFROC2013. | Presentation materials will be made available upon the conclusion of SnowFROC2013. | ||
+ | [[Media:Brady.pdf|Data Mining a Mountain of Zero-Day Vulnerabilities]]<br> | ||
+ | [[Media:Chrastil.pptx|DevFu: The inner ninja in every application developer]]<br> | ||
+ | [[Media:Earle.pptx|Using SaaS and the Cloud to Secure the SDLC]]<br> | ||
+ | [[Media:Lelewski.pdf|Crafting a Plan for When Security Fails]]<br> | ||
+ | [[Media:Shumway.pptx|Electronic Discovery for System Administrators]]<br> | ||
+ | [[Media:Smith.pdf|How Malware Attacks Web Applications]]<br> | ||
+ | [[Media:Willson.pdf|Legal Issues of Forensics in the Cloud]]<br> | ||
+ | [[Media:Bravo.pptx|DevOps and Security: It's Happening. Right Now.]]<br> | ||
+ | [[Media:Chan.pptx|Real World Cloud Application Security]]<br> | ||
+ | [[Media:Conklin.pptx|A Demo of and Preventing XSS in .NET Applications]]<br> | ||
+ | [[Media:Disney-Leugers.odp|SIP Based Cloud Instances]]<br> | ||
+ | [[Media:Feinroth.pptx|CISPA: Why Privacy Advocates Hate This Legislation]]<br> | ||
+ | [[Media:Glanville.pptx|Information Control: The Critical Need for a Defensible Position - Securing the Information Ecosystem]]<br> | ||
+ | [[Media:Jex.ppt|Measuring Security Best Practices With Open SAMM]]<br> | ||
+ | [[Media:McCoy.pdf|Defending Desktop (.NET/C#) Applications: Mitigating in the Dark (A Case Study Remix)]]<br> | ||
+ | [[Media:Wolff.pptx|Adventures in Large Scale HTTP Header Abuse]]<br> | ||
====Previous conferences==== | ====Previous conferences==== | ||
'''2012 presentations''' are [[Front_Range_OWASP_Conference_2012#2012_Presentations| available here]]. | '''2012 presentations''' are [[Front_Range_OWASP_Conference_2012#2012_Presentations| available here]]. |
Revision as of 16:51, 9 April 2013
2013 presentations
Presentation materials will be made available upon the conclusion of SnowFROC2013.
Data Mining a Mountain of Zero-Day Vulnerabilities
DevFu: The inner ninja in every application developer
Using SaaS and the Cloud to Secure the SDLC
Crafting a Plan for When Security Fails
Electronic Discovery for System Administrators
How Malware Attacks Web Applications
Legal Issues of Forensics in the Cloud
DevOps and Security: It's Happening. Right Now.
Real World Cloud Application Security
A Demo of and Preventing XSS in .NET Applications
SIP Based Cloud Instances
CISPA: Why Privacy Advocates Hate This Legislation
Information Control: The Critical Need for a Defensible Position - Securing the Information Ecosystem
Measuring Security Best Practices With Open SAMM
Defending Desktop (.NET/C#) Applications: Mitigating in the Dark (A Case Study Remix)
Adventures in Large Scale HTTP Header Abuse
Previous conferences
2012 presentations are available here.