Difference between revisions of "Front Range OWASP Conference 2013/Archive"

From OWASP
Jump to: navigation, search
m
Line 5: Line 5:
  
 
'''Technical Track''' <br>
 
'''Technical Track''' <br>
[[Media:Chrastil.pptx|DevFu: The inner ninja in every application developer]]<br>
+
DevFu: The inner ninja in every application developer
[[Media:Wolff.pptx|Adventures in Large Scale HTTP Header Abuse]]<br>
+
*[[Media:Chrastil.pptx | Slides]]
[[Media:Weaver.pdf|Angry Cars: Hacking the "Car as Platform"]]<br>
+
*[https://vimeo.com/68082818 Video]
[[Media:Bravo.pptx|DevOps and Security: It's Happening. Right Now.]]<br>
+
Adventures in Large Scale HTTP Header Abuse<br>
[[Media:Chan.pptx|Real World Cloud Application Security]]<br>
+
*[[Media:Wolff.pptx | Slides]]
 
+
*[https://vimeo.com/68071431 Video]
 +
Angry Cars: Hacking the "Car as Platform"<br>
 +
*[[Media:Weaver.pdf | Slides]]
 +
*[https://vimeo.com/68071432 Video]
 +
DevOps and Security: It's Happening. Right Now.<br>
 +
*[[Media:Bravo.pptx | Slides]]
 +
Real World Cloud Application Security<br>
 +
*[[Media:Chan.pptx | Slides]]
 +
*[https://vimeo.com/68082826 Video]
 +
<br>
 
'''Deep-Dive Track''' <br>
 
'''Deep-Dive Track''' <br>
[[Media:Disney-Leugers.odp|SIP Based Cloud Instances]]<br>
+
SIP Based Cloud Instances<br>
[[Media:Smith.pdf|How Malware Attacks Web Applications]]<br>
+
*[[Media:Disney-Leugers.odp | Slides]]
[[Media:Manico.pdf|Top Ten Web Application Defenses]]<br>
+
*[https://vimeo.com/68091563 Video]
[[Media:Conklin.pptx|A Demo of and Preventing XSS in .NET Applications]]<br>
+
How Malware Attacks Web Applications<br>
[[Media:Brady.pdf|Data Mining a Mountain of Zero-Day Vulnerabilities]]<br>
+
*[[Media:Smith.pdf | Slides]]
 
+
*[https://vimeo.com/68107330 Video]
 +
Top Ten Web Application Defenses<br>
 +
*[[Media:Manico.pdf | Slides]]
 +
*[https://vimeo.com/68091564 Video]
 +
A Demo of and Preventing XSS in .NET Applications<br>
 +
*[[Media:Conklin.pptx | Slides]]
 +
*[https://vimeo.com/68069847 Video]
 +
Data Mining a Mountain of Zero-Day Vulnerabilities<br>
 +
*[[Media:Brady.pdf | Slides]]
 +
*[https://vimeo.com/68107333 Video]
 +
<br>
 
'''Management Track''' <br>
 
'''Management Track''' <br>
[[Media:Rose.pdf|Digital Bounty Hunters - Decoding Bug Bounty Programs]]<br>
+
Digital Bounty Hunters - Decoding Bug Bounty Programs<br>
[[Media:Rojas.pdf|Linking Security to Business Value in the Customer Service Industry]]<br>
+
*[[Media:Rose.pdf | Slides]]
[[Media:Earle.pptx|Using SaaS and the Cloud to Secure the SDLC]]<br>
+
*[https://vimeo.com/68107340 Video]
[[Media:Jex.ppt|Measuring Security Best Practices With Open SAMM]]<br>
+
Linking Security to Business Value in the Customer Service Industry<br>
[[Media:McCoy.pdf|Defending Desktop (.NET/C#) Applications: Mitigating in the Dark (A Case Study Remix)]]<br>
+
*[[Media:Rojas.pdf | Slides]]
 
+
*[https://vimeo.com/68111318 Video]
 +
Using SaaS and the Cloud to Secure the SDLC<br>
 +
*[[Media:Earle.pptx | Slides]]
 +
*[https://vimeo.com/68111315 Video]
 +
Measuring Security Best Practices With Open SAMM<br>
 +
*[[Media:Jex.ppt | Slides]]
 +
*[https://vimeo.com/68082823 Video]
 +
Defending Desktop (.NET/C#) Applications: Mitigating in the Dark (A Case Study Remix)<br>
 +
*[[Media:McCoy.pdf | Slides]]
 +
*[https://vimeo.com/68071440 Video]
 +
<br>
 
'''Legal Track''' <br>
 
'''Legal Track''' <br>
[[Media:Shumway.pptx|Electronic Discovery for System Administrators]]<br>
+
Electronic Discovery for System Administrators<br>
[[Media:Willson.pdf|Legal Issues of Forensics in the Cloud]]<br>
+
*[[Media:Shumway.pptx | Slides]]
[[Media:Feinroth.pptx|CISPA: Why Privacy Advocates Hate This Legislation]]<br>
+
Legal Issues of Forensics in the Cloud<br>
[[Media:Lelewski.pdf|Crafting a Plan for When Security Fails]]<br>
+
*[[Media:Willson.pdf | Slides]]
[[Media:Glanville.pptx|Information Control: The Critical Need for a Defensible Position - Securing the Information Ecosystem]]<br>
+
*[https://vimeo.com/68082821 Video]
 
+
CISPA: Why Privacy Advocates Hate This Legislation<br>
 +
*[[Media:Feinroth.pptx | Slides]]
 +
*[https://vimeo.com/68071433 Video]
 +
Crafting a Plan for When Security Fails<br>
 +
*[[Media:Lelewski.pdf | Slides]]
 +
*[https://vimeo.com/68071439 Video]
 +
Information Control: The Critical Need for a Defensible Position - Securing the Information Ecosystem<br>
 +
*[[Media:Glanville.pptx | Slides]]
 +
*[https://vimeo.com/68082819 Video]
 +
<br>
 
====Previous conferences====
 
====Previous conferences====
  
 
'''2012 presentations''' are [[Front_Range_OWASP_Conference_2012#2012_Presentations| available here]].
 
'''2012 presentations''' are [[Front_Range_OWASP_Conference_2012#2012_Presentations| available here]].

Revision as of 11:54, 11 June 2013

2013 presentations

Keynote Address: Data Protection for the 21st Century
Panel Discussion

Technical Track
DevFu: The inner ninja in every application developer

Adventures in Large Scale HTTP Header Abuse

Angry Cars: Hacking the "Car as Platform"

DevOps and Security: It's Happening. Right Now.

Real World Cloud Application Security


Deep-Dive Track
SIP Based Cloud Instances

How Malware Attacks Web Applications

Top Ten Web Application Defenses

A Demo of and Preventing XSS in .NET Applications

Data Mining a Mountain of Zero-Day Vulnerabilities


Management Track
Digital Bounty Hunters - Decoding Bug Bounty Programs

Linking Security to Business Value in the Customer Service Industry

Using SaaS and the Cloud to Secure the SDLC

Measuring Security Best Practices With Open SAMM

Defending Desktop (.NET/C#) Applications: Mitigating in the Dark (A Case Study Remix)


Legal Track
Electronic Discovery for System Administrators

Legal Issues of Forensics in the Cloud

CISPA: Why Privacy Advocates Hate This Legislation

Crafting a Plan for When Security Fails

Information Control: The Critical Need for a Defensible Position - Securing the Information Ecosystem


Previous conferences

2012 presentations are available here.