Difference between revisions of "Front Range OWASP Conference 2013/Archive"

From OWASP
Jump to: navigation, search
Line 16: Line 16:
  
 
'''Management''' <br>
 
'''Management''' <br>
<!--
+
[[Media:Rose.pdf|Digital Bounty Hunters - Decoding Bug Bounty Programs]]<br>
[[Media:Rose.pptx|Digital Bounty Hunters - Decoding Bug Bounty Programs]]<br>
+
-->
+
 
[[Media:Rojas.pdf|Linking Security to Business Value in the Customer Service Industry]]<br>
 
[[Media:Rojas.pdf|Linking Security to Business Value in the Customer Service Industry]]<br>
 
[[Media:Earle.pptx|Using SaaS and the Cloud to Secure the SDLC]]<br>
 
[[Media:Earle.pptx|Using SaaS and the Cloud to Secure the SDLC]]<br>

Revision as of 10:24, 16 April 2013

2013 presentations

Technical
DevFu: The inner ninja in every application developer
Adventures in Large Scale HTTP Header Abuse
Angry Cars: Hacking the "Car as Platform"
DevOps and Security: It's Happening. Right Now.
Real World Cloud Application Security

Deep-Dive
SIP Based Cloud Instances
How Malware Attacks Web Applications
Top Ten Web Application Defenses
A Demo of and Preventing XSS in .NET Applications
Data Mining a Mountain of Zero-Day Vulnerabilities

Management
Digital Bounty Hunters - Decoding Bug Bounty Programs
Linking Security to Business Value in the Customer Service Industry
Using SaaS and the Cloud to Secure the SDLC
Measuring Security Best Practices With Open SAMM
Defending Desktop (.NET/C#) Applications: Mitigating in the Dark (A Case Study Remix)

Legal
Electronic Discovery for System Administrators
Legal Issues of Forensics in the Cloud
CISPA: Why Privacy Advocates Hate This Legislation
Crafting a Plan for When Security Fails
Information Control: The Critical Need for a Defensible Position - Securing the Information Ecosystem

Previous conferences

2012 presentations are available here.