This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Front Range OWASP Conference 2013/Archive"
Jess Garrett (talk | contribs) |
Jess Garrett (talk | contribs) m |
||
Line 5: | Line 5: | ||
'''Technical Track''' <br> | '''Technical Track''' <br> | ||
− | + | DevFu: The inner ninja in every application developer | |
− | [[Media: | + | *[[Media:Chrastil.pptx | Slides]] |
− | [[Media: | + | *[https://vimeo.com/68082818 Video] |
− | [[Media: | + | Adventures in Large Scale HTTP Header Abuse<br> |
− | [[Media: | + | *[[Media:Wolff.pptx | Slides]] |
− | + | *[https://vimeo.com/68071431 Video] | |
+ | Angry Cars: Hacking the "Car as Platform"<br> | ||
+ | *[[Media:Weaver.pdf | Slides]] | ||
+ | *[https://vimeo.com/68071432 Video] | ||
+ | DevOps and Security: It's Happening. Right Now.<br> | ||
+ | *[[Media:Bravo.pptx | Slides]] | ||
+ | Real World Cloud Application Security<br> | ||
+ | *[[Media:Chan.pptx | Slides]] | ||
+ | *[https://vimeo.com/68082826 Video] | ||
+ | <br> | ||
'''Deep-Dive Track''' <br> | '''Deep-Dive Track''' <br> | ||
− | [[Media:Disney-Leugers.odp| | + | SIP Based Cloud Instances<br> |
− | [ | + | *[[Media:Disney-Leugers.odp | Slides]] |
− | [[Media: | + | *[https://vimeo.com/68091563 Video] |
− | [[Media: | + | How Malware Attacks Web Applications<br> |
− | [[Media: | + | *[[Media:Smith.pdf | Slides]] |
− | + | *[https://vimeo.com/68107330 Video] | |
+ | Top Ten Web Application Defenses<br> | ||
+ | *[[Media:Manico.pdf | Slides]] | ||
+ | *[https://vimeo.com/68091564 Video] | ||
+ | A Demo of and Preventing XSS in .NET Applications<br> | ||
+ | *[[Media:Conklin.pptx | Slides]] | ||
+ | *[https://vimeo.com/68069847 Video] | ||
+ | Data Mining a Mountain of Zero-Day Vulnerabilities<br> | ||
+ | *[[Media:Brady.pdf | Slides]] | ||
+ | *[https://vimeo.com/68107333 Video] | ||
+ | <br> | ||
'''Management Track''' <br> | '''Management Track''' <br> | ||
− | + | Digital Bounty Hunters - Decoding Bug Bounty Programs<br> | |
− | [[Media: | + | *[[Media:Rose.pdf | Slides]] |
− | [[Media: | + | *[https://vimeo.com/68107340 Video] |
− | [[Media: | + | Linking Security to Business Value in the Customer Service Industry<br> |
− | [[Media: | + | *[[Media:Rojas.pdf | Slides]] |
− | + | *[https://vimeo.com/68111318 Video] | |
+ | Using SaaS and the Cloud to Secure the SDLC<br> | ||
+ | *[[Media:Earle.pptx | Slides]] | ||
+ | *[https://vimeo.com/68111315 Video] | ||
+ | Measuring Security Best Practices With Open SAMM<br> | ||
+ | *[[Media:Jex.ppt | Slides]] | ||
+ | *[https://vimeo.com/68082823 Video] | ||
+ | Defending Desktop (.NET/C#) Applications: Mitigating in the Dark (A Case Study Remix)<br> | ||
+ | *[[Media:McCoy.pdf | Slides]] | ||
+ | *[https://vimeo.com/68071440 Video] | ||
+ | <br> | ||
'''Legal Track''' <br> | '''Legal Track''' <br> | ||
− | + | Electronic Discovery for System Administrators<br> | |
− | [[Media: | + | *[[Media:Shumway.pptx | Slides]] |
− | [[Media: | + | Legal Issues of Forensics in the Cloud<br> |
− | [[Media: | + | *[[Media:Willson.pdf | Slides]] |
− | [[Media: | + | *[https://vimeo.com/68082821 Video] |
− | + | CISPA: Why Privacy Advocates Hate This Legislation<br> | |
+ | *[[Media:Feinroth.pptx | Slides]] | ||
+ | *[https://vimeo.com/68071433 Video] | ||
+ | Crafting a Plan for When Security Fails<br> | ||
+ | *[[Media:Lelewski.pdf | Slides]] | ||
+ | *[https://vimeo.com/68071439 Video] | ||
+ | Information Control: The Critical Need for a Defensible Position - Securing the Information Ecosystem<br> | ||
+ | *[[Media:Glanville.pptx | Slides]] | ||
+ | *[https://vimeo.com/68082819 Video] | ||
+ | <br> | ||
====Previous conferences==== | ====Previous conferences==== | ||
'''2012 presentations''' are [[Front_Range_OWASP_Conference_2012#2012_Presentations| available here]]. | '''2012 presentations''' are [[Front_Range_OWASP_Conference_2012#2012_Presentations| available here]]. |
Revision as of 16:54, 11 June 2013
2013 presentations
Keynote Address: Data Protection for the 21st Century
Panel Discussion
Technical Track
DevFu: The inner ninja in every application developer
Adventures in Large Scale HTTP Header Abuse
Angry Cars: Hacking the "Car as Platform"
DevOps and Security: It's Happening. Right Now.
Real World Cloud Application Security
Deep-Dive Track
SIP Based Cloud Instances
How Malware Attacks Web Applications
Top Ten Web Application Defenses
A Demo of and Preventing XSS in .NET Applications
Data Mining a Mountain of Zero-Day Vulnerabilities
Management Track
Digital Bounty Hunters - Decoding Bug Bounty Programs
Linking Security to Business Value in the Customer Service Industry
Using SaaS and the Cloud to Secure the SDLC
Measuring Security Best Practices With Open SAMM
Defending Desktop (.NET/C#) Applications: Mitigating in the Dark (A Case Study Remix)
Legal Track
Electronic Discovery for System Administrators
Legal Issues of Forensics in the Cloud
CISPA: Why Privacy Advocates Hate This Legislation
Crafting a Plan for When Security Fails
Information Control: The Critical Need for a Defensible Position - Securing the Information Ecosystem
Previous conferences
2012 presentations are available here.