This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Front Range OWASP Conference 2013/Archive"

From OWASP
Jump to: navigation, search
Line 1: Line 1:
 
====2013 presentations====
 
====2013 presentations====
  
'''Technical''' <br>
+
[https://vimeo.com/68058106 Keynote Address: Data Protection for the 21st Century]<br>
 +
[https://vimeo.com/68058105 Panel Discussion]<br>
 +
 
 +
'''Technical Track''' <br>
 
[[Media:Chrastil.pptx|DevFu: The inner ninja in every application developer]]<br>
 
[[Media:Chrastil.pptx|DevFu: The inner ninja in every application developer]]<br>
 
[[Media:Wolff.pptx|Adventures in Large Scale HTTP Header Abuse]]<br>
 
[[Media:Wolff.pptx|Adventures in Large Scale HTTP Header Abuse]]<br>
Line 8: Line 11:
 
[[Media:Chan.pptx|Real World Cloud Application Security]]<br>
 
[[Media:Chan.pptx|Real World Cloud Application Security]]<br>
  
'''Deep-Dive''' <br>
+
'''Deep-Dive Track''' <br>
 
[[Media:Disney-Leugers.odp|SIP Based Cloud Instances]]<br>
 
[[Media:Disney-Leugers.odp|SIP Based Cloud Instances]]<br>
 
[[Media:Smith.pdf|How Malware Attacks Web Applications]]<br>
 
[[Media:Smith.pdf|How Malware Attacks Web Applications]]<br>
Line 15: Line 18:
 
[[Media:Brady.pdf|Data Mining a Mountain of Zero-Day Vulnerabilities]]<br>
 
[[Media:Brady.pdf|Data Mining a Mountain of Zero-Day Vulnerabilities]]<br>
  
'''Management''' <br>
+
'''Management Track''' <br>
 
[[Media:Rose.pdf|Digital Bounty Hunters - Decoding Bug Bounty Programs]]<br>
 
[[Media:Rose.pdf|Digital Bounty Hunters - Decoding Bug Bounty Programs]]<br>
 
[[Media:Rojas.pdf|Linking Security to Business Value in the Customer Service Industry]]<br>
 
[[Media:Rojas.pdf|Linking Security to Business Value in the Customer Service Industry]]<br>
Line 22: Line 25:
 
[[Media:McCoy.pdf|Defending Desktop (.NET/C#) Applications: Mitigating in the Dark (A Case Study Remix)]]<br>
 
[[Media:McCoy.pdf|Defending Desktop (.NET/C#) Applications: Mitigating in the Dark (A Case Study Remix)]]<br>
  
'''Legal''' <br>
+
'''Legal Track''' <br>
 
[[Media:Shumway.pptx|Electronic Discovery for System Administrators]]<br>
 
[[Media:Shumway.pptx|Electronic Discovery for System Administrators]]<br>
 
[[Media:Willson.pdf|Legal Issues of Forensics in the Cloud]]<br>
 
[[Media:Willson.pdf|Legal Issues of Forensics in the Cloud]]<br>

Revision as of 18:16, 10 June 2013

2013 presentations

Keynote Address: Data Protection for the 21st Century
Panel Discussion

Technical Track
DevFu: The inner ninja in every application developer
Adventures in Large Scale HTTP Header Abuse
Angry Cars: Hacking the "Car as Platform"
DevOps and Security: It's Happening. Right Now.
Real World Cloud Application Security

Deep-Dive Track
SIP Based Cloud Instances
How Malware Attacks Web Applications
Top Ten Web Application Defenses
A Demo of and Preventing XSS in .NET Applications
Data Mining a Mountain of Zero-Day Vulnerabilities

Management Track
Digital Bounty Hunters - Decoding Bug Bounty Programs
Linking Security to Business Value in the Customer Service Industry
Using SaaS and the Cloud to Secure the SDLC
Measuring Security Best Practices With Open SAMM
Defending Desktop (.NET/C#) Applications: Mitigating in the Dark (A Case Study Remix)

Legal Track
Electronic Discovery for System Administrators
Legal Issues of Forensics in the Cloud
CISPA: Why Privacy Advocates Hate This Legislation
Crafting a Plan for When Security Fails
Information Control: The Critical Need for a Defensible Position - Securing the Information Ecosystem

Previous conferences

2012 presentations are available here.