This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Front Range OWASP Conference 2013/Archive"
Jess Garrett (talk | contribs) |
Jess Garrett (talk | contribs) |
||
Line 1: | Line 1: | ||
====2013 presentations==== | ====2013 presentations==== | ||
− | Technical | + | Technical <br> |
[[Media:Chrastil.pptx|DevFu: The inner ninja in every application developer]]<br> | [[Media:Chrastil.pptx|DevFu: The inner ninja in every application developer]]<br> | ||
[[Media:Wolff.pptx|Adventures in Large Scale HTTP Header Abuse]]<br> | [[Media:Wolff.pptx|Adventures in Large Scale HTTP Header Abuse]]<br> | ||
Line 10: | Line 10: | ||
[[Media:Chan.pptx|Real World Cloud Application Security]]<br> | [[Media:Chan.pptx|Real World Cloud Application Security]]<br> | ||
− | Deep-Dive | + | Deep-Dive <br> |
[[Media:Disney-Leugers.odp|SIP Based Cloud Instances]]<br> | [[Media:Disney-Leugers.odp|SIP Based Cloud Instances]]<br> | ||
[[Media:Smith.pdf|How Malware Attacks Web Applications]]<br> | [[Media:Smith.pdf|How Malware Attacks Web Applications]]<br> | ||
Line 19: | Line 19: | ||
[[Media:Brady.pdf|Data Mining a Mountain of Zero-Day Vulnerabilities]]<br> | [[Media:Brady.pdf|Data Mining a Mountain of Zero-Day Vulnerabilities]]<br> | ||
− | Management | + | Management <br> |
<!-- | <!-- | ||
[[Media:Rose.pptx|Digital Bounty Hunters - Decoding Bug Bounty Programs]]<br> | [[Media:Rose.pptx|Digital Bounty Hunters - Decoding Bug Bounty Programs]]<br> | ||
Line 30: | Line 30: | ||
[[Media:McCoy.pdf|Defending Desktop (.NET/C#) Applications: Mitigating in the Dark (A Case Study Remix)]]<br> | [[Media:McCoy.pdf|Defending Desktop (.NET/C#) Applications: Mitigating in the Dark (A Case Study Remix)]]<br> | ||
− | Legal | + | Legal <br> |
[[Media:Shumway.pptx|Electronic Discovery for System Administrators]]<br> | [[Media:Shumway.pptx|Electronic Discovery for System Administrators]]<br> | ||
[[Media:Willson.pdf|Legal Issues of Forensics in the Cloud]]<br> | [[Media:Willson.pdf|Legal Issues of Forensics in the Cloud]]<br> |
Revision as of 17:27, 9 April 2013
2013 presentations
Technical
DevFu: The inner ninja in every application developer
Adventures in Large Scale HTTP Header Abuse
DevOps and Security: It's Happening. Right Now.
Real World Cloud Application Security
Deep-Dive
SIP Based Cloud Instances
How Malware Attacks Web Applications
A Demo of and Preventing XSS in .NET Applications
Data Mining a Mountain of Zero-Day Vulnerabilities
Management
Using SaaS and the Cloud to Secure the SDLC
Measuring Security Best Practices With Open SAMM
Defending Desktop (.NET/C#) Applications: Mitigating in the Dark (A Case Study Remix)
Legal
Electronic Discovery for System Administrators
Legal Issues of Forensics in the Cloud
CISPA: Why Privacy Advocates Hate This Legislation
Crafting a Plan for When Security Fails
Information Control: The Critical Need for a Defensible Position - Securing the Information Ecosystem
Previous conferences
2012 presentations are available here.