Difference between revisions of "Los Angeles/2010 Meetings"

Jump to: navigation, search
Line 57: Line 57:
Topic: Secure Coding Practices and Procedures, and Threat Modeling<br>
Topic: Secure Coding Practices and Procedures, and Threat Modeling<br>
Speaker: Edward Bonver, CISSP, CSSLP<br>
Topic: Threat Modeling at Symantec<br>
Sponsor: White Hat Security

Revision as of 16:32, 31 May 2011

January 20, 2010

Speaker: David M. N. Bryan
Topic: Do VLANs allow for good application security?

February 24, 2010

Speaker: Alex Stamos
Topic: Cloud Computing Security: Raining on the Trendy New Parade

March 17, 2010

Speaker: Michael Schrenk
Topic: BOOK PREVIEW: Webbots, Spiders, and Screen Scrapers SECOND EDITION

April 21, 2010

Speaker: Mike Bailey and Mike Murray
Topic: The intersection of social and technical attacks in Web 2.0 applications

May 26, 2010

Speaker: Neil Matatall
Topic: OWASP Top 10 and Enterprise Security API (ESAPI)

June 9, 2010

Speaker: Brendan Bellina
Topic: Shibboleth implementation at USC

July 21, 2010

Speaker: Samy Kamkar
Topic: How I Met Your Girlfriend: Entirely New Classes of Web Attacks

August 18, 2010

Speaker: Dr. Jelena Mirkovic
Topic: DETER Project: Scientific, Safe and Simple CyberSecurity Research

September 22, 2010

Speaker: Mike O. Villegas, CISA, CISSP, GSEC
Topic: Secure Coding Practices and Procedures, and Threat Modeling

Speaker: Edward Bonver, CISSP, CSSLP
Topic: Threat Modeling at Symantec

Sponsor: White Hat Security

October 20, 2010

Speaker: Todd Calvert
Topic: Identity Management: federation and authorization

Speaker: Manoranjan (Mano) Paul (CSSLP, CISSP, AMBCI, MCSD, MCAD, CompTIA Network+, ECSA)
Topic: Sharks and Security

Sponsors: Arcot Systems Inc, WebFort

November 24, 2010

Speakers: Al Huizenga and Kyle Adams
Topic: Baking It In: Abuse-Resistant Web Applications
Sponsor: Mykonos Software

December 24, 2010

Speakers: Brian Robison and Sven Schrecker
Topic: Deep Dive into Web Application Scanning
Sponsor: McAfee