This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Front Range OWASP Conference 2013/Archive"

From OWASP
Jump to: navigation, search
 
(4 intermediate revisions by the same user not shown)
Line 1: Line 1:
 
====2013 presentations====
 
====2013 presentations====
  
'''Technical''' <br>
+
[https://vimeo.com/68058106 Keynote Address: Data Protection for the 21st Century]<br>
[[Media:Chrastil.pptx|DevFu: The inner ninja in every application developer]]<br>
+
[https://vimeo.com/68058105 Panel Discussion]<br>
[[Media:Wolff.pptx|Adventures in Large Scale HTTP Header Abuse]]<br>
+
<br>
[[Media:Weaver.pdf|Angry Cars: Hacking the "Car as Platform"]]<br>
+
'''Technical Track''' <br>
[[Media:Bravo.pptx|DevOps and Security: It's Happening. Right Now.]]<br>
+
DevFu: The inner ninja in every application developer
[[Media:Chan.pptx|Real World Cloud Application Security]]<br>
+
*[[Media:Chrastil.pptx | Slides]]
 
+
*[https://vimeo.com/68082818 Video]
'''Deep-Dive''' <br>
+
Adventures in Large Scale HTTP Header Abuse<br>
[[Media:Disney-Leugers.odp|SIP Based Cloud Instances]]<br>
+
*[[Media:Wolff.pptx | Slides]]
[[Media:Smith.pdf|How Malware Attacks Web Applications]]<br>
+
*[https://vimeo.com/68071431 Video]
[[Media:Manico.pdf|Top Ten Web Application Defenses]]<br>
+
Angry Cars: Hacking the "Car as Platform"<br>
[[Media:Conklin.pptx|A Demo of and Preventing XSS in .NET Applications]]<br>
+
*[[Media:Weaver.pdf | Slides]]
[[Media:Brady.pdf|Data Mining a Mountain of Zero-Day Vulnerabilities]]<br>
+
*[https://vimeo.com/68071432 Video]
 
+
DevOps and Security: It's Happening. Right Now.<br>
'''Management''' <br>
+
*[[Media:Bravo.pptx | Slides]]
[[Media:Rose.pdf|Digital Bounty Hunters - Decoding Bug Bounty Programs]]<br>
+
*[https://vimeo.com/68335259 Video]
[[Media:Rojas.pdf|Linking Security to Business Value in the Customer Service Industry]]<br>
+
Real World Cloud Application Security<br>
[[Media:Earle.pptx|Using SaaS and the Cloud to Secure the SDLC]]<br>
+
*[[Media:Chan.pptx | Slides]]
[[Media:Jex.ppt|Measuring Security Best Practices With Open SAMM]]<br>
+
*[https://vimeo.com/68082826 Video]
[[Media:McCoy.pdf|Defending Desktop (.NET/C#) Applications: Mitigating in the Dark (A Case Study Remix)]]<br>
+
<br>
 
+
'''Deep-Dive Track''' <br>
'''Legal''' <br>
+
SIP Based Cloud Instances<br>
[[Media:Shumway.pptx|Electronic Discovery for System Administrators]]<br>
+
*[[Media:Disney-Leugers.odp | Slides]]
[[Media:Willson.pdf|Legal Issues of Forensics in the Cloud]]<br>
+
*[https://vimeo.com/68091563 Video]
[[Media:Feinroth.pptx|CISPA: Why Privacy Advocates Hate This Legislation]]<br>
+
How Malware Attacks Web Applications<br>
[[Media:Lelewski.pdf|Crafting a Plan for When Security Fails]]<br>
+
*[[Media:Smith.pdf | Slides]]
[[Media:Glanville.pptx|Information Control: The Critical Need for a Defensible Position - Securing the Information Ecosystem]]<br>
+
*[https://vimeo.com/68107330 Video]
 
+
Top Ten Web Application Defenses<br>
 +
*[[Media:Manico.pdf | Slides]]
 +
*[https://vimeo.com/68091564 Video]
 +
A Demo of and Preventing XSS in .NET Applications<br>
 +
*[[Media:Conklin.pptx | Slides]]
 +
*[https://vimeo.com/68069847 Video]
 +
Data Mining a Mountain of Zero-Day Vulnerabilities<br>
 +
*[[Media:Brady.pdf | Slides]]
 +
*[https://vimeo.com/68107333 Video]
 +
<br>
 +
'''Management Track''' <br>
 +
Digital Bounty Hunters - Decoding Bug Bounty Programs<br>
 +
*[[Media:Rose.pdf | Slides]]
 +
*[https://vimeo.com/68107340 Video]
 +
Linking Security to Business Value in the Customer Service Industry<br>
 +
*[[Media:Rojas.pdf | Slides]]
 +
*[https://vimeo.com/68111318 Video]
 +
Using SaaS and the Cloud to Secure the SDLC<br>
 +
*[[Media:Earle.pptx | Slides]]
 +
*[https://vimeo.com/68111315 Video]
 +
Measuring Security Best Practices With Open SAMM<br>
 +
*[[Media:Jex.ppt | Slides]]
 +
*[https://vimeo.com/68082823 Video]
 +
Defending Desktop (.NET/C#) Applications: Mitigating in the Dark (A Case Study Remix)<br>
 +
*[[Media:McCoy.pdf | Slides]]
 +
*[https://vimeo.com/68071440 Video]
 +
<br>
 +
'''Legal Track''' <br>
 +
Electronic Discovery for System Administrators<br>
 +
*[[Media:Shumway.pptx | Slides]]
 +
*[https://vimeo.com/68142345 Video]
 +
Legal Issues of Forensics in the Cloud<br>
 +
*[[Media:Willson.pdf | Slides]]
 +
*[https://vimeo.com/68082821 Video]
 +
CISPA: Why Privacy Advocates Hate This Legislation<br>
 +
*[[Media:Feinroth.pptx | Slides]]
 +
*[https://vimeo.com/68071433 Video]
 +
Crafting a Plan for When Security Fails<br>
 +
*[[Media:Lelewski.pdf | Slides]]
 +
*[https://vimeo.com/68071439 Video]
 +
Information Control: The Critical Need for a Defensible Position - Securing the Information Ecosystem<br>
 +
*[[Media:Glanville.pptx | Slides]]
 +
*[https://vimeo.com/68082819 Video]
 +
<br>
 
====Previous conferences====
 
====Previous conferences====
  
 
'''2012 presentations''' are [[Front_Range_OWASP_Conference_2012#2012_Presentations| available here]].
 
'''2012 presentations''' are [[Front_Range_OWASP_Conference_2012#2012_Presentations| available here]].

Latest revision as of 16:18, 17 June 2013

2013 presentations

Keynote Address: Data Protection for the 21st Century
Panel Discussion

Technical Track
DevFu: The inner ninja in every application developer

Adventures in Large Scale HTTP Header Abuse

Angry Cars: Hacking the "Car as Platform"

DevOps and Security: It's Happening. Right Now.

Real World Cloud Application Security


Deep-Dive Track
SIP Based Cloud Instances

How Malware Attacks Web Applications

Top Ten Web Application Defenses

A Demo of and Preventing XSS in .NET Applications

Data Mining a Mountain of Zero-Day Vulnerabilities


Management Track
Digital Bounty Hunters - Decoding Bug Bounty Programs

Linking Security to Business Value in the Customer Service Industry

Using SaaS and the Cloud to Secure the SDLC

Measuring Security Best Practices With Open SAMM

Defending Desktop (.NET/C#) Applications: Mitigating in the Dark (A Case Study Remix)


Legal Track
Electronic Discovery for System Administrators

Legal Issues of Forensics in the Cloud

CISPA: Why Privacy Advocates Hate This Legislation

Crafting a Plan for When Security Fails

Information Control: The Critical Need for a Defensible Position - Securing the Information Ecosystem


Previous conferences

2012 presentations are available here.