This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Los Angeles/2009 Meetings/May 20"

From OWASP
Jump to: navigation, search
(Created page with "== Topic: Top Ten Web Hacking Techniques of 2008: "What's possible, not probable" == == Speaker: Jeremiah Grossman == Jeremiah Grossman is the founder and CTO of WhiteHat Secur...")
 
 
Line 1: Line 1:
 
== Topic: Top Ten Web Hacking Techniques of 2008: "What's possible, not probable" ==
 
== Topic: Top Ten Web Hacking Techniques of 2008: "What's possible, not probable" ==
 +
 +
*[http://video.google.com/videoplay?docid=2875886330538461390 Top Ten Web Hacking Techniques of 2008: "What's possible, not probable"]
 +
  
  

Latest revision as of 02:23, 2 June 2011

Topic: Top Ten Web Hacking Techniques of 2008: "What's possible, not probable"


Speaker: Jeremiah Grossman

Jeremiah Grossman is the founder and CTO of WhiteHat Security. He is considered a world-renowned expert in Web security, is a co- founder of the Web Application Security Consortium, and was named to InfoWorld's Top 25 CTOs for 2007. Grossman is a frequent speaker at industry events including the Black Hat Briefings, RSA, CSI, HiTB, OWASP, ISSA, and a number of large universities. He has authored dozens of articles and white papers; is credited with the discovery of many cutting-edge attack and defensive techniques and is a co-author of XSS Attacks. Grossman is often quoted in the the business and technical press. Prior to WhiteHat, Grossman was an information security officer at Yahoo!


Abstract: Top Ten Web Hacking Techniques of 2008: "What's possible, not probable"

The polls are closed, votes are in, and we have the winners making up the Top Ten Web Hacking Techniques of 2008! The competition was fierce with the newest and most innovative web hacking techniques to the test. This session will review the top ten hacks from 2008 - what they indicate about the security of the web, what they mean for businesses, and what might be used against us soon down the road.