This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Front Range OWASP Conference 2013/Archive"

From OWASP
Jump to: navigation, search
Line 1: Line 1:
 
====2013 presentations====
 
====2013 presentations====
  
[[Media:Brady.pdf|Data Mining a Mountain of Zero-Day Vulnerabilities]]<br>
+
Technical
 
[[Media:Chrastil.pptx|DevFu: The inner ninja in every application developer]]<br>
 
[[Media:Chrastil.pptx|DevFu: The inner ninja in every application developer]]<br>
[[Media:Earle.pptx|Using SaaS and the Cloud to Secure the SDLC]]<br>
+
[[Media:Wolff.pptx|Adventures in Large Scale HTTP Header Abuse]]<br>
[[Media:Lelewski.pdf|Crafting a Plan for When Security Fails]]<br>
+
<!--
[[Media:Shumway.pptx|Electronic Discovery for System Administrators]]<br>
+
[[Media:Weaver.pptx|Angry Cars: Hacking the "Car as Platform"]]<br>
[[Media:Smith.pdf|How Malware Attacks Web Applications]]<br>
+
-->
[[Media:Willson.pdf|Legal Issues of Forensics in the Cloud]]<br>
 
 
[[Media:Bravo.pptx|DevOps and Security: It's Happening. Right Now.]]<br>
 
[[Media:Bravo.pptx|DevOps and Security: It's Happening. Right Now.]]<br>
 
[[Media:Chan.pptx|Real World Cloud Application Security]]<br>
 
[[Media:Chan.pptx|Real World Cloud Application Security]]<br>
[[Media:Conklin.pptx|A Demo of and Preventing XSS in .NET Applications]]<br>
+
 
 +
Deep-Dive
 
[[Media:Disney-Leugers.odp|SIP Based Cloud Instances]]<br>
 
[[Media:Disney-Leugers.odp|SIP Based Cloud Instances]]<br>
[[Media:Feinroth.pptx|CISPA: Why Privacy Advocates Hate This Legislation]]<br>
+
[[Media:Smith.pdf|How Malware Attacks Web Applications]]<br>
[[Media:Glanville.pptx|Information Control: The Critical Need for a Defensible Position - Securing the Information Ecosystem]]<br>
 
[[Media:Jex.ppt|Measuring Security Best Practices With Open SAMM]]<br>
 
[[Media:McCoy.pdf|Defending Desktop (.NET/C#) Applications: Mitigating in the Dark (A Case Study Remix)]]<br>
 
[[Media:Wolff.pptx|Adventures in Large Scale HTTP Header Abuse]]<br>
 
 
<!--
 
<!--
 
[[Media:Manico.ppt|Top Ten Web Application Defenses]]<br>
 
[[Media:Manico.ppt|Top Ten Web Application Defenses]]<br>
 
-->
 
-->
 +
[[Media:Conklin.pptx|A Demo of and Preventing XSS in .NET Applications]]<br>
 +
[[Media:Brady.pdf|Data Mining a Mountain of Zero-Day Vulnerabilities]]<br>
 +
 +
Management
 
<!--
 
<!--
 
[[Media:Rose.pptx|Digital Bounty Hunters - Decoding Bug Bounty Programs]]<br>
 
[[Media:Rose.pptx|Digital Bounty Hunters - Decoding Bug Bounty Programs]]<br>
-->
 
<!--
 
[[Media:Weaver.pptx|Angry Cars: Hacking the "Car as Platform"]]<br>
 
 
-->
 
-->
 
<!--
 
<!--
 
[[Media:Rojas.something|Linking Security to Business Value in the Customer Service Industry]]<br>
 
[[Media:Rojas.something|Linking Security to Business Value in the Customer Service Industry]]<br>
 
-->
 
-->
 +
[[Media:Earle.pptx|Using SaaS and the Cloud to Secure the SDLC]]<br>
 +
[[Media:Jex.ppt|Measuring Security Best Practices With Open SAMM]]<br>
 +
[[Media:McCoy.pdf|Defending Desktop (.NET/C#) Applications: Mitigating in the Dark (A Case Study Remix)]]<br>
 +
 +
Legal
 +
[[Media:Shumway.pptx|Electronic Discovery for System Administrators]]<br>
 +
[[Media:Willson.pdf|Legal Issues of Forensics in the Cloud]]<br>
 +
[[Media:Feinroth.pptx|CISPA: Why Privacy Advocates Hate This Legislation]]<br>
 +
[[Media:Lelewski.pdf|Crafting a Plan for When Security Fails]]<br>
 +
[[Media:Glanville.pptx|Information Control: The Critical Need for a Defensible Position - Securing the Information Ecosystem]]<br>
  
 
====Previous conferences====
 
====Previous conferences====
  
 
'''2012 presentations''' are [[Front_Range_OWASP_Conference_2012#2012_Presentations| available here]].
 
'''2012 presentations''' are [[Front_Range_OWASP_Conference_2012#2012_Presentations| available here]].

Revision as of 17:26, 9 April 2013

2013 presentations

Technical DevFu: The inner ninja in every application developer
Adventures in Large Scale HTTP Header Abuse
DevOps and Security: It's Happening. Right Now.
Real World Cloud Application Security

Deep-Dive SIP Based Cloud Instances
How Malware Attacks Web Applications
A Demo of and Preventing XSS in .NET Applications
Data Mining a Mountain of Zero-Day Vulnerabilities

Management Using SaaS and the Cloud to Secure the SDLC
Measuring Security Best Practices With Open SAMM
Defending Desktop (.NET/C#) Applications: Mitigating in the Dark (A Case Study Remix)

Legal Electronic Discovery for System Administrators
Legal Issues of Forensics in the Cloud
CISPA: Why Privacy Advocates Hate This Legislation
Crafting a Plan for When Security Fails
Information Control: The Critical Need for a Defensible Position - Securing the Information Ecosystem

Previous conferences

2012 presentations are available here.