Difference between revisions of "Front Range OWASP Conference 2013/Archive"

From OWASP
Jump to: navigation, search
Line 23: Line 23:
 
[[Media:Rose.pptx|Digital Bounty Hunters - Decoding Bug Bounty Programs]]<br>
 
[[Media:Rose.pptx|Digital Bounty Hunters - Decoding Bug Bounty Programs]]<br>
 
-->
 
-->
<!--
+
[[Media:Rojas.pdf|Linking Security to Business Value in the Customer Service Industry]]<br>
[[Media:Rojas.something|Linking Security to Business Value in the Customer Service Industry]]<br>
+
-->
+
 
[[Media:Earle.pptx|Using SaaS and the Cloud to Secure the SDLC]]<br>
 
[[Media:Earle.pptx|Using SaaS and the Cloud to Secure the SDLC]]<br>
 
[[Media:Jex.ppt|Measuring Security Best Practices With Open SAMM]]<br>
 
[[Media:Jex.ppt|Measuring Security Best Practices With Open SAMM]]<br>

Revision as of 10:08, 16 April 2013

2013 presentations

Technical
DevFu: The inner ninja in every application developer
Adventures in Large Scale HTTP Header Abuse
DevOps and Security: It's Happening. Right Now.
Real World Cloud Application Security

Deep-Dive
SIP Based Cloud Instances
How Malware Attacks Web Applications
A Demo of and Preventing XSS in .NET Applications
Data Mining a Mountain of Zero-Day Vulnerabilities

Management
Linking Security to Business Value in the Customer Service Industry
Using SaaS and the Cloud to Secure the SDLC
Measuring Security Best Practices With Open SAMM
Defending Desktop (.NET/C#) Applications: Mitigating in the Dark (A Case Study Remix)

Legal
Electronic Discovery for System Administrators
Legal Issues of Forensics in the Cloud
CISPA: Why Privacy Advocates Hate This Legislation
Crafting a Plan for When Security Fails
Information Control: The Critical Need for a Defensible Position - Securing the Information Ecosystem

Previous conferences

2012 presentations are available here.