AppSecUSA 2012.com


 * AppSecUSA Presentations and Talks

Building Predictable Systems using Behavioral Security Modeling: |Functional Security Requirements

 * John Benninghoff | Developer

Top Ten Web Defenses

 * Jim Manico | Mobile

Mobile Applications & Proxy Shenanigans

 * Dan Amodio | Mobile

Reverse Engineering “Secure” HTTP APIs With An SSL Proxy

 * Alejandro Caceres | Reverse Engineering

Gauntlt: Rugged by Example

 * Jeremiah Shirk | Rugged devops

Building a Web Attacker Dashboard with ModSecurity and BeEF

 * Ryan Barnett | Attack

Secure Code Reviews Magic or Art? A Simplified Approach to Secure Code Reviews

 * Sherif Koussa | Developer

Cracking the Code of Mobile Application

 * Sreenarayan Ashokkumar | Mobile

Hacking .NET Application: Reverse Engineering 101

 * Jon Mccoy | Reverse Engineering

Doing the unstuck: How Rugged cultures drive Biz & AppSec Value

 * Josh Corman | Rugged devops

Hacking with WebSockets

 * Vaagn Toukharian | Attack

Bug Bounty Programs

 * Michael Coates, Chris Evans, Jeremiah Grossman, Adam Mein, Alex Rice | Developer

How we tear into that little green man

 * Mathew Rowley | Mobile

AppSec Training, Securing the SDLC, WebGoat.NET and the Meaning of Life

 * Jerry Hoff | Developer

Put your robots to work: security automation at Twitter

 * Justin Collins, Neil Matatall, Alex Smolen | Rugged devops