This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Front Range OWASP Conference 2013/Archive"

From OWASP
Jump to: navigation, search
Line 17: Line 17:
 
[[Media:McCoy.pdf|Defending Desktop (.NET/C#) Applications: Mitigating in the Dark (A Case Study Remix)]]<br>
 
[[Media:McCoy.pdf|Defending Desktop (.NET/C#) Applications: Mitigating in the Dark (A Case Study Remix)]]<br>
 
[[Media:Wolff.pptx|Adventures in Large Scale HTTP Header Abuse]]<br>
 
[[Media:Wolff.pptx|Adventures in Large Scale HTTP Header Abuse]]<br>
 
 
<!--
 
<!--
 
[[Media:Manico.ppt|Top Ten Web Application Defenses]]<br>
 
[[Media:Manico.ppt|Top Ten Web Application Defenses]]<br>

Revision as of 17:02, 9 April 2013

2013 presentations

Data Mining a Mountain of Zero-Day Vulnerabilities
DevFu: The inner ninja in every application developer
Using SaaS and the Cloud to Secure the SDLC
Crafting a Plan for When Security Fails
Electronic Discovery for System Administrators
How Malware Attacks Web Applications
Legal Issues of Forensics in the Cloud
DevOps and Security: It's Happening. Right Now.
Real World Cloud Application Security
A Demo of and Preventing XSS in .NET Applications
SIP Based Cloud Instances
CISPA: Why Privacy Advocates Hate This Legislation
Information Control: The Critical Need for a Defensible Position - Securing the Information Ecosystem
Measuring Security Best Practices With Open SAMM
Defending Desktop (.NET/C#) Applications: Mitigating in the Dark (A Case Study Remix)
Adventures in Large Scale HTTP Header Abuse

Previous conferences

2012 presentations are available here.