This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Front Range OWASP Conference 2013/Archive"

From OWASP
Jump to: navigation, search
 
(13 intermediate revisions by the same user not shown)
Line 1: Line 1:
 
====2013 presentations====
 
====2013 presentations====
  
[[Media:Brady.pdf|Data Mining a Mountain of Zero-Day Vulnerabilities]]<br>
+
[https://vimeo.com/68058106 Keynote Address: Data Protection for the 21st Century]<br>
[[Media:Chrastil.pptx|DevFu: The inner ninja in every application developer]]<br>
+
[https://vimeo.com/68058105 Panel Discussion]<br>
[[Media:Earle.pptx|Using SaaS and the Cloud to Secure the SDLC]]<br>
+
<br>
[[Media:Lelewski.pdf|Crafting a Plan for When Security Fails]]<br>
+
'''Technical Track''' <br>
[[Media:Shumway.pptx|Electronic Discovery for System Administrators]]<br>
+
DevFu: The inner ninja in every application developer
[[Media:Smith.pdf|How Malware Attacks Web Applications]]<br>
+
*[[Media:Chrastil.pptx | Slides]]
[[Media:Willson.pdf|Legal Issues of Forensics in the Cloud]]<br>
+
*[https://vimeo.com/68082818 Video]
[[Media:Bravo.pptx|DevOps and Security: It's Happening. Right Now.]]<br>
+
Adventures in Large Scale HTTP Header Abuse<br>
[[Media:Chan.pptx|Real World Cloud Application Security]]<br>
+
*[[Media:Wolff.pptx | Slides]]
[[Media:Conklin.pptx|A Demo of and Preventing XSS in .NET Applications]]<br>
+
*[https://vimeo.com/68071431 Video]
[[Media:Disney-Leugers.odp|SIP Based Cloud Instances]]<br>
+
Angry Cars: Hacking the "Car as Platform"<br>
[[Media:Feinroth.pptx|CISPA: Why Privacy Advocates Hate This Legislation]]<br>
+
*[[Media:Weaver.pdf | Slides]]
[[Media:Glanville.pptx|Information Control: The Critical Need for a Defensible Position - Securing the Information Ecosystem]]<br>
+
*[https://vimeo.com/68071432 Video]
[[Media:Jex.ppt|Measuring Security Best Practices With Open SAMM]]<br>
+
DevOps and Security: It's Happening. Right Now.<br>
[[Media:McCoy.pdf|Defending Desktop (.NET/C#) Applications: Mitigating in the Dark (A Case Study Remix)]]<br>
+
*[[Media:Bravo.pptx | Slides]]
[[Media:Wolff.pptx|Adventures in Large Scale HTTP Header Abuse]]<br>
+
*[https://vimeo.com/68335259 Video]
 
+
Real World Cloud Application Security<br>
<!--
+
*[[Media:Chan.pptx | Slides]]
[[Media:Manico.ppt|Top Ten Web Application Defenses]]<br>
+
*[https://vimeo.com/68082826 Video]
-->
+
<br>
<!--
+
'''Deep-Dive Track''' <br>
[[Media:Rose.pptx|Digital Bounty Hunters - Decoding Bug Bounty Programs]]<br>
+
SIP Based Cloud Instances<br>
-->
+
*[[Media:Disney-Leugers.odp | Slides]]
<!--
+
*[https://vimeo.com/68091563 Video]
[[Media:Weaver.pptx|Angry Cars: Hacking the "Car as Platform"]]<br>
+
How Malware Attacks Web Applications<br>
-->
+
*[[Media:Smith.pdf | Slides]]
<!--
+
*[https://vimeo.com/68107330 Video]
[[Media:Rojas.something|Linking Security to Business Value in the Customer Service Industry]]<br>
+
Top Ten Web Application Defenses<br>
-->
+
*[[Media:Manico.pdf | Slides]]
 
+
*[https://vimeo.com/68091564 Video]
 +
A Demo of and Preventing XSS in .NET Applications<br>
 +
*[[Media:Conklin.pptx | Slides]]
 +
*[https://vimeo.com/68069847 Video]
 +
Data Mining a Mountain of Zero-Day Vulnerabilities<br>
 +
*[[Media:Brady.pdf | Slides]]
 +
*[https://vimeo.com/68107333 Video]
 +
<br>
 +
'''Management Track''' <br>
 +
Digital Bounty Hunters - Decoding Bug Bounty Programs<br>
 +
*[[Media:Rose.pdf | Slides]]
 +
*[https://vimeo.com/68107340 Video]
 +
Linking Security to Business Value in the Customer Service Industry<br>
 +
*[[Media:Rojas.pdf | Slides]]
 +
*[https://vimeo.com/68111318 Video]
 +
Using SaaS and the Cloud to Secure the SDLC<br>
 +
*[[Media:Earle.pptx | Slides]]
 +
*[https://vimeo.com/68111315 Video]
 +
Measuring Security Best Practices With Open SAMM<br>
 +
*[[Media:Jex.ppt | Slides]]
 +
*[https://vimeo.com/68082823 Video]
 +
Defending Desktop (.NET/C#) Applications: Mitigating in the Dark (A Case Study Remix)<br>
 +
*[[Media:McCoy.pdf | Slides]]
 +
*[https://vimeo.com/68071440 Video]
 +
<br>
 +
'''Legal Track''' <br>
 +
Electronic Discovery for System Administrators<br>
 +
*[[Media:Shumway.pptx | Slides]]
 +
*[https://vimeo.com/68142345 Video]
 +
Legal Issues of Forensics in the Cloud<br>
 +
*[[Media:Willson.pdf | Slides]]
 +
*[https://vimeo.com/68082821 Video]
 +
CISPA: Why Privacy Advocates Hate This Legislation<br>
 +
*[[Media:Feinroth.pptx | Slides]]
 +
*[https://vimeo.com/68071433 Video]
 +
Crafting a Plan for When Security Fails<br>
 +
*[[Media:Lelewski.pdf | Slides]]
 +
*[https://vimeo.com/68071439 Video]
 +
Information Control: The Critical Need for a Defensible Position - Securing the Information Ecosystem<br>
 +
*[[Media:Glanville.pptx | Slides]]
 +
*[https://vimeo.com/68082819 Video]
 +
<br>
 
====Previous conferences====
 
====Previous conferences====
  
 
'''2012 presentations''' are [[Front_Range_OWASP_Conference_2012#2012_Presentations| available here]].
 
'''2012 presentations''' are [[Front_Range_OWASP_Conference_2012#2012_Presentations| available here]].

Latest revision as of 16:18, 17 June 2013

2013 presentations

Keynote Address: Data Protection for the 21st Century
Panel Discussion

Technical Track
DevFu: The inner ninja in every application developer

Adventures in Large Scale HTTP Header Abuse

Angry Cars: Hacking the "Car as Platform"

DevOps and Security: It's Happening. Right Now.

Real World Cloud Application Security


Deep-Dive Track
SIP Based Cloud Instances

How Malware Attacks Web Applications

Top Ten Web Application Defenses

A Demo of and Preventing XSS in .NET Applications

Data Mining a Mountain of Zero-Day Vulnerabilities


Management Track
Digital Bounty Hunters - Decoding Bug Bounty Programs

Linking Security to Business Value in the Customer Service Industry

Using SaaS and the Cloud to Secure the SDLC

Measuring Security Best Practices With Open SAMM

Defending Desktop (.NET/C#) Applications: Mitigating in the Dark (A Case Study Remix)


Legal Track
Electronic Discovery for System Administrators

Legal Issues of Forensics in the Cloud

CISPA: Why Privacy Advocates Hate This Legislation

Crafting a Plan for When Security Fails

Information Control: The Critical Need for a Defensible Position - Securing the Information Ecosystem


Previous conferences

2012 presentations are available here.