This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Los Angeles Presentation Archive"

From OWASP
Jump to: navigation, search
Line 19: Line 19:
 
* November - Robert Lee: Detect and Contain: [//www.owasp.org/images/a/af/OWASP_LA_Robert_Lee_Combating_Account_Takeover_2017_11.pdf Combating Account Takeover]
 
* November - Robert Lee: Detect and Contain: [//www.owasp.org/images/a/af/OWASP_LA_Robert_Lee_Combating_Account_Takeover_2017_11.pdf Combating Account Takeover]
 
* October - Mahesh Babu: [https://www.owasp.org/images/5/5b/OWASP_LA_Struts%2C_OSS_and_You_Mahesh_Babu_2017_10.pdf Struts, OSS & You]  
 
* October - Mahesh Babu: [https://www.owasp.org/images/5/5b/OWASP_LA_Struts%2C_OSS_and_You_Mahesh_Babu_2017_10.pdf Struts, OSS & You]  
* September - [https://www.owasp.org/images/0/0e/OWASP_LA_Securely_Deploying_TLS_1.3_Scott_Stender_2017_09.pdf Scott Stender: Securely Deploying TLS 1.3]
+
* September - Scott Stender: [https://www.owasp.org/images/0/0e/OWASP_LA_Securely_Deploying_TLS_1.3_Scott_Stender_2017_09.pdf Securely Deploying TLS 1.3]
 
* August - Mike Milner: Law & Order: Observing and Protecting Web Applications ('''''Coming Soon''''')
 
* August - Mike Milner: Law & Order: Observing and Protecting Web Applications ('''''Coming Soon''''')
 
* July - David Caissy: [https://www.owasp.org/images/6/6a/OWASP_LA_New_OWASP_Top_10_David_Caissy_2017_07.pdf The New and Improved OWASP Top 10]  
 
* July - David Caissy: [https://www.owasp.org/images/6/6a/OWASP_LA_New_OWASP_Top_10_David_Caissy_2017_07.pdf The New and Improved OWASP Top 10]  

Revision as of 05:26, 28 August 2018

This page contains slides from OWASP Los Angeles Chapter Meetings:

2018

  • December -
  • November -
  • October -
  • September -
  • August - Jim Manico: Why are we still talking about Cross Site Scripting in 2018? The Last XSS Defense Talk
  • July - Kevin Gosschalk: How Bots Decide What You Can Buy and How Much You'll Pay
  • June - Anant Kadiyala: Blockchain as Security Mechanism for Real World IoT
  • May - Pieter Danheiux: Improving Software Security in an Agile Environment
  • April - Jason Patterson: Cloud Security/Containers
  • March - Ira Winkler: Incorporating Security Practices into Business Processes
  • February - Justin Regele: Better Git Hacking; Extracting “deleted” secrets from Git databases with Grawler
  • January - Appsec California 2018

2017

2016

  • December -
  • November -
  • October -
  • September -
  • August -
  • July -
  • June -
  • May -
  • April -
  • March -
  • February -
  • January -

2015

2014

2013

2012

  • January - Robert Zigweid: Security in the Cloud

2011

2010

  • December - Brian Robison and Sven Schrecker: Deep Dive into Web Application Scanning
  • November - Al Huizenga and Kyle Adams: Baking It In: Abuse-Resistant Web Applications
  • October - Todd Calvert: Identity Management: federation and authorization
  • October - Manoranjan (Mano) Paul: Sharks and Security
  • September - Mike O. Villegas: Secure Coding Practices and Procedures, and Threat Modeling
  • September - Edward Bonver: Threat Modeling at Symantec
  • August - Dr. Jelena Mirkovic: DETER Project: Scientific, Safe and Simple CyberSecurity Research
  • July - Samy Kamkar: How I Met Your Girlfriend: Entirely New Classes of Web Attacks
  • June - Brendan Bellina: Shibboleth implementation at USC
  • May - Neil Matatall: OWASP Top 10 and Enterprise Security API (ESAPI)
  • April - Mike Bailey and Mike Murray: The intersection of social and technical attacks in Web 2.0 applications
  • March - Michael Schrenk: BOOK PREVIEW: Webbots, Spiders, and Screen Scrapers SECOND EDITION
  • February - Alex Stamos: Cloud Computing Security: Raining on the Trendy New Parade
  • January - David M. N. Bryan: Do VLANs allow for good application security?


2009

2008

  • December - Samy Kamkar: The MySpace Worm ppt
  • November - Stephan Chenette: A new web attack vector: Script Fragmentation
  • October - Jonathan Gershater: Entitlements Management: Security and policies for SOA using XML appliances
  • September - Ryan C. Barnett: The Web Hacking Incident Database (WHID) 2007 Report
  • August - Jeff Williams: Don't Write Your Own Security Code