Difference between revisions of "AppSecAsiaPac2012 Slides"

From OWASP
Jump to: navigation, search
m
 
(12 intermediate revisions by 2 users not shown)
Line 1: Line 1:
 +
Keynote: [[Media:OWASP_AsiaPac_04.14.pdf|Web Application Security: Connecting the Dots - Jeremiah Grossman]]
 +
 
Keynote: [[Media:Ss_goes_mobile_(60m).pptx|Software Security Goes Mobile - Jacob West]]
 
Keynote: [[Media:Ss_goes_mobile_(60m).pptx|Software Security Goes Mobile - Jacob West]]
  
Line 5: Line 7:
 
[[Media:AppsecAPAC2012-HTTP-fingerprinting-TNG.pdf|HTTP Fingerprinting - Eldar 'Wireghoul' Marcussen]]
 
[[Media:AppsecAPAC2012-HTTP-fingerprinting-TNG.pdf|HTTP Fingerprinting - Eldar 'Wireghoul' Marcussen]]
  
[https://s3.amazonaws.com/owaspasterisk/beef-appsecapac2012-v0.pdf Shake Hands with BeEF Christian “@xntrik” Frichot]
+
[https://s3.amazonaws.com/owaspasterisk/beef-appsecapac2012-v0.pdf Shake Hands with BeEF - Christian “@xntrik” Frichot]
  
 
[[Media:Secure_Coding_Practices_Quick_Ref.pdf|OWASP Project:Secure Coding Quick Reference Guide - Justin Clarke]]
 
[[Media:Secure_Coding_Practices_Quick_Ref.pdf|OWASP Project:Secure Coding Quick Reference Guide - Justin Clarke]]
Line 28: Line 30:
  
 
[[Media:ASDC12-Overcoming_the_Quality_vs_Quantity_Problem_in_SoftwareSecurity_Testing.pdf|Overcoming the Quality vs. Quantity Problem in Software Security Testing - Raf Los]]
 
[[Media:ASDC12-Overcoming_the_Quality_vs_Quantity_Problem_in_SoftwareSecurity_Testing.pdf|Overcoming the Quality vs. Quantity Problem in Software Security Testing - Raf Los]]
 +
 +
[[Media:ASDC12-Mobile_Application_Security_Who_how_and_why.pdf|Mobile Security on iOS and Android - Mike Park]]
 +
 +
[http://www.ruxcon.org.au/assets/Presentations/2011/LNLJ-Harder_Better_Faster_Stronger_V1.0.pdf Harder Better Faster Stronger (SQLi) Luke Jahnke and Louis Nyffenegger]
 +
 +
[[Media:Effective_Security_Education.odp|Effective Security Education and Related OWASP Projects - Sandeep Nain]]
 +
 +
[http://www.strongauth.com/images/pdf/rc3-may2012.pdf Rethinking Web Application Architecture for Cloud - Arshad Noor]
 +
 +
[[Media:OWASP_APPSEC_SYDNEY2012-Errazudin.pdf|Rise of the Planet Anonymous - Errazudin Ishak]]
 +
 +
[[Media:OWASP_SYD_GGaskell_1.pdf|The Risks that Pen Tests Don't Find - Gary Gaskell]]
 +
 +
[[Media:Pentesting_Mobile_Applications.pdf|Pentesting Mobile Applications - Tony Liu & Rainman Wu]]
 +
 +
[[Media:SlayingDragons-ccbysa30nz.pdf|How MITM Proxy has been slaying SSL Dragons - Jim Cheetham]]
 +
 +
[[Media:OWASP_defending-MITMA_APAC2012.pdf|Securing the SSL/TLS channel against man-in-the-middle attacks - Tobias Gondrom]]
  
 
[[Category:OWASP_Presentations]]
 
[[Category:OWASP_Presentations]]

Latest revision as of 08:27, 29 May 2012

Keynote: Web Application Security: Connecting the Dots - Jeremiah Grossman

Keynote: Software Security Goes Mobile - Jacob West

Keynote: OWASP Where we are ... Where we are going - Justin Clarke and Justin Searle

HTTP Fingerprinting - Eldar 'Wireghoul' Marcussen

Shake Hands with BeEF - Christian “@xntrik” Frichot

OWASP Project:Secure Coding Quick Reference Guide - Justin Clarke

OWASP Project: Zed Attack Proxy - Simon Bennets

Web Crypto for the Developer Who Has Better Things to Do - Adrian Hayes

Application Security Logging - the Next Frontier - Peter Frieberg

Effective Software Development in a PCI DSS Environment - Bruce Ashton

Advanced Mobile Application Code Review Techniques - Prashant Verma and Dinesh Shetty

Password Less Authentication - Srikar Sagi

Static Code Analysis and Governance - Jonathan Carter

Pentesting Smart Grid Apps - Justin Searle

Anatomy of a Logic Flaw - Charles Henderson & Daniel Crowley

Overcoming the Quality vs. Quantity Problem in Software Security Testing - Raf Los

Mobile Security on iOS and Android - Mike Park

Harder Better Faster Stronger (SQLi) Luke Jahnke and Louis Nyffenegger

Effective Security Education and Related OWASP Projects - Sandeep Nain

Rethinking Web Application Architecture for Cloud - Arshad Noor

Rise of the Planet Anonymous - Errazudin Ishak

The Risks that Pen Tests Don't Find - Gary Gaskell

Pentesting Mobile Applications - Tony Liu & Rainman Wu

How MITM Proxy has been slaying SSL Dragons - Jim Cheetham

Securing the SSL/TLS channel against man-in-the-middle attacks - Tobias Gondrom