This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "AppSecUSA 2012.com"

From OWASP
Jump to: navigation, search
Line 1: Line 1:
 
*AppSecUSA Presentations and Talks
 
*AppSecUSA Presentations and Talks
+
 
 +
== Thursday 25th Oct ==
 +
=== 10:00 am - 10:45 am ===
 +
 
 +
----
 +
 
 
==== Building Predictable Systems using Behavioral Security Modeling: |Functional Security Requirements ====
 
==== Building Predictable Systems using Behavioral Security Modeling: |Functional Security Requirements ====
*10:00 am - 10:45 am | Developer | '''John Benninghoff'''
+
*Developer | '''John Benninghoff'''
 +
 
 +
==== Top Ten Web Defenses ====
 +
*Mobile | '''Jim Manico'''
 
 
 
 
 
==== Mobile Applications & Proxy Shenanigans ====
 
==== Mobile Applications & Proxy Shenanigans ====
*10:00 am - 10:45 am | Mobile | '''Dan Amodio'''
+
*Mobile | '''Dan Amodio'''
  
 
==== Reverse Engineering “Secure” HTTP APIs With An SSL Proxy ====
 
==== Reverse Engineering “Secure” HTTP APIs With An SSL Proxy ====
*10:00 am - 10:45 am | Reverse Engineering | '''Alejandro Caceres'''
+
*Reverse Engineering | '''Alejandro Caceres'''
 
 
 
==== Gauntlt: Rugged by Example ====
 
==== Gauntlt: Rugged by Example ====
*10:00 am - 10:45 am | Rugged devops | '''Jeremiah Shirk'''
+
*Rugged devops | '''Jeremiah Shirk'''
 +
 
 +
=== 11:00 am - 11:45 am ===
 +
 
 +
----
 +
 
 +
==== Building a Web Attacker Dashboard with ModSecurity and BeEF ====
 +
*Attack | '''Ryan Barnett'''
 +
 +
==== Secure Code Reviews Magic or Art? A Simplified Approach to Secure Code Reviews ====
 +
*Developer | '''Sherif Koussa'''
 +
 
 +
==== Cracking the Code of Mobile Application ====
 +
*Mobile | '''Sreenarayan Ashokkumar'''
 +
 +
==== Hacking .NET Application: Reverse Engineering 101 ====
 +
*Reverse Engineering | '''Jon Mccoy'''
 +
 
 +
==== Doing the unstuck: How Rugged cultures drive Biz & AppSec Value ====
 +
*Rugged devops | '''Josh Corman'''
  
 
   
 
   
 
<br>
 
<br>

Revision as of 06:15, 12 November 2012

  • AppSecUSA Presentations and Talks

Thursday 25th Oct

10:00 am - 10:45 am


Building Predictable Systems using Behavioral Security Modeling: |Functional Security Requirements

  • Developer | John Benninghoff

Top Ten Web Defenses

  • Mobile | Jim Manico

Mobile Applications & Proxy Shenanigans

  • Mobile | Dan Amodio

Reverse Engineering “Secure” HTTP APIs With An SSL Proxy

  • Reverse Engineering | Alejandro Caceres

Gauntlt: Rugged by Example

  • Rugged devops | Jeremiah Shirk

11:00 am - 11:45 am


Building a Web Attacker Dashboard with ModSecurity and BeEF

  • Attack | Ryan Barnett

Secure Code Reviews Magic or Art? A Simplified Approach to Secure Code Reviews

  • Developer | Sherif Koussa

Cracking the Code of Mobile Application

  • Mobile | Sreenarayan Ashokkumar

Hacking .NET Application: Reverse Engineering 101

  • Reverse Engineering | Jon Mccoy

Doing the unstuck: How Rugged cultures drive Biz & AppSec Value

  • Rugged devops | Josh Corman