This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit

File list

Jump to: navigation, search

This special page shows all uploaded files.

File list
Date Name Thumbnail Size Description Versions
08:49, 26 December 2014 InternDown4What edit.pdf (file) 1.11 MB Presentation given by Tony Turner at OWASP Tampa Day 2014. Most of us have a hard time finding qualified security professionals. Most junior aspiring infosec folks have a hard time proving they are qualified enough for us to hire. This is a huge gap th... 1
10:34, 24 December 2014 OTD 2014 - Shadow-IT-Shady-FINAL.pdf (file) 1.65 MB Presentation given by Joey Peloquin (Standing in for Scott VanWart) at OWASP Tampa Day 2014. Learn how to eliminate the catch-22 between being agile and being secure and compliant by providing complete visibility, enforcing sophisticated policies, and... 1
10:30, 24 December 2014 OTD 2014 - OWASPTop10forMVC.pdf (file) 801 KB Presentation given by James Davis at OWASP Tampa Day 2014. Showing how MVC, .NET and IIS can solve the low hanging fruit of the OWASP Top 10. 1
10:29, 24 December 2014 OTD 2014 - owasp-mobile.pdf (file) 1.75 MB Presentation given by Daniel Bender at OWASP Tampa Day 2014. The mobile application eco-system presents numerous challenges to organizations that seek to apply access control or authorization models to applications. These challenges include the volume... 1
10:27, 24 December 2014 OTD 2014 - OMF GPS.pdf (file) 14.83 MB Presentation given by Joey Peloquin at OWASP Tampa Day 2014. This talk will educate attendees on some of the tools that can be used for this type of review, the storage location on the device for the most interesting data, and examples of data leakage... 1
17:24, 30 September 2014 Do we really know the OWASP Top 10.pdf (file) 9.68 MB Jon Singer's presentation from OWASP Tampa on September 30, 2014 on 'Do we really know the OWASP Top 10.' 1
08:32, 16 March 2014 TheEnemyWithin.pdf (file) 173 KB The Enemy Within - Ramece Cave, Solutionary Web Server Intel Correlation (might change the name). The presentation will discuss how and why web servers play a role in intelligence gathering and threat correlation. It will go over previous hacking campa... 1
08:32, 16 March 2014 Herding Cats - OWASP, Tampa 3-12-2014.pdf (file) 7.6 MB Herding Cats - Carl Brothers, F5 Networks Ensuring that we can provide security and availability for on premise apps and cloud based apps, that are increasingly being accessed from uncontrolled devices feels like a never ending struggle to keep the cat... 1
11:31, 22 August 2013 Securing your Applications & Data With Web Application Firewalls.pdf (file) 3.8 MB Presentation from OWASP Tampa Day 2013. 1
11:26, 22 August 2013 Vulnerability Management That Works.pdf (file) 1.15 MB Presentation from OWASP Tampa Day 2013. 1
11:24, 22 August 2013 Let’s Get Right To The Endpoint.pdf (file) 4.09 MB Presentation from OWASP Tampa Day 2013. 1
11:24, 22 August 2013 Design considerations and Guiding Principles for Implementing Cloud Security.pdf (file) 70 KB Presentation from OWASP Tampa Day 2013. 1
11:24, 22 August 2013 Bring Your Own Service.pdf (file) 4.65 MB Presentation from OWASP Tampa Day 2013. 1
11:44, 26 November 2012 Taming the B.E.A.S.T..pdf (file) 105 KB   1
08:19, 12 June 2012 Zenprise Technical Presentation - Keith Katz.pdf (file) 5.8 MB Presentation given by Keith Katz at OWASP Tampa Day 2012. 1
08:19, 12 June 2012 OWASP Changing the Game - Jason Kent.pdf (file) 3.81 MB Presentation given by Jason Kent at OWASP Tampa Day 2012. 1
08:19, 12 June 2012 Federated Identities in the Real World - Nathan Sargent.pdf (file) 6.63 MB Presentation given by Nathan Sargent at OWASP Tampa Day 2012. 1
08:18, 12 June 2012 Define and Optimize Your Approach to Application Security - Bruce Jenkins.pdf (file) 1.82 MB Presentation given by Bruce Jenkins at OWASP Tampa Day 2012. 1
08:18, 12 June 2012 Anonymous - Lessons Learned - Bill Church.pdf (file) 5.61 MB Presentation given by Bill Church at OWASP Tampa Day 2012. 1
07:25, 24 April 2012 DBN-OWASP Presentation.pdf (file) 1.82 MB OWASP Tampa Presentation by Stuart Hancock of DBNetworks from 3/28/12 on Protecting Against SQLi in Real-Time. 1
11:26, 28 December 2011 HowNotToBuildAndroidApps2.pdf (file) 2.87 MB Presentation entitled 'How Not to Build Android Apps,' given by Jack Mannino at the 2011-Q4 OWASP Tampa meeting. 1
21:18, 14 September 2011 PCI Compliance 9 2011.pdf (file) 7.6 MB Presentation given by Kate Mullin at 2011-Q3 OWASP Tampa Meeting. 1
21:17, 14 September 2011 Hiding in Plain Sight.pdf (file) 641 KB Presentation given by Ramece Cave at 2011-Q3 OWASP Tampa Meeting. 1
07:43, 21 June 2011 OTD2011-TH.pdf (file) 7.02 MB Trevor Hawthorn - PCI for Developers: Lessons from the Real World Any organization that stores, processes, or transmits credit card data must comply with the Payment Card Industry's (PCI) Data Security Standards (DSS). PCI can be daunting even for compli 1
07:40, 21 June 2011 OTD2011-RR.pdf (file) 1.55 MB Rinaldi Rampen -Top Website Vulnerabilities: Trends, Business Effects and How to Fight Them Website attacks continue to prevail despite the best efforts of enterprises to fight them. Websites are an ongoing business concern and security must be assured a 1
07:38, 21 June 2011 OTD2011-BJ.pdf (file) 1.23 MB Bruce Jenkins - How to Defend the Universe from Evil-doers: A Guide for Software Developers and Security Teams Software security is often a bolt-on afterthought for dealing with potentially serious yet non-functional product issues. However, software dev 1
07:36, 21 June 2011 OTD2011-SK.pdf (file) 807 KB Analysis of Deadly Combination of XSS and CSRF - Flashback to April 11th, 2009 as a major attack targeted Twitter and led to a huge embarrassment for this famous social media network. This presentation will delve into the details of the attack, what happe 1
09:50, 22 March 2011 TampaOWASP March2011.pdf (file) 2.31 MB Jeff LoSapio - Real Lessons of Deploying Static Analysis in Development Groups Is it really worth investing in static analysis tools for your developers? Can you effectively deploy the tools and attain valuable results? What are the pitfalls? How do you 1
09:36, 22 March 2011 Vulnerability Scanning in an IPv6 World.pdf (file) 4.29 MB Richard Newman & Brett McKinney - Vulnerability Management in an IPv6 World With the last of the IPv4 addresses allocated to the regional registrars, IPv4 is quickly seeing an end to its reign. For a time we’ll see dual addressed networks as IPv6 is im 1
09:32, 22 March 2011 Intel pen owasp Q1 2011.pdf (file) 1.53 MB Chris Patten - Intelligence Gathering for Penetration Testers: Opening Doors with Metadata This talk will provide insight into the often-overlooked requirement of performing effective intelligence gathering as a means to achieve a successful penetration 1
07:37, 8 March 2011 StratumSecurityTampaOWASP.png (file) 10 KB   3
06:58, 8 October 2009 HackingTheSmartGrid-OWASP Tampa.pdf (file) 918 KB Tony Flick's presentation from the 2009-Q3 Tampa OWASP Chapter meeting. 1
08:34, 3 June 2009 Software Assurance Maturity Model.pdf (file) 3.4 MB Open SAMM overview presentation given by Zate Berg at the 2009-Q2 Tampa Chapter Meeting. 1
14:34, 19 March 2009 BlackHat-DC-09-Flick-XAB Slides.pdf (file) 720 KB Presentation slides from the 2009-Q1 Tampa Chapter meeting. 1
09:36, 20 November 2008 GoogleCodeSearch.pdf (file) 2.33 MB   1