Difference between revisions of "Los Angeles Presentation Archive"

From OWASP
Jump to: navigation, search
(2011)
(2 intermediate revisions by one other user not shown)
Line 1: Line 1:
 
This page contains slides from OWASP Los Angeles Chapter Meetings:
 
This page contains slides from OWASP Los Angeles Chapter Meetings:
  
==2011==
+
==2012==
  
* December
+
* January - Robert Zigweid:  Security in the Cloud
* November
+
 
* October
+
<p></p>
* September
+
==2011==
* August
+
* July
+
* June
+
* May
+
* April
+
* March
+
* February
+
* January
+
  
 +
* June - Brian Chess:  [[Media:Gray,_the_new_black.pptx‎|Gray, the new Black: Gray-Box Web Vulnerability Testing pptx]]
 +
* May - Justin Collins:  [[Media:Justin_Collins-OWASPLA-Brakeman.pdf| Automated Detection of Security Flaws in Ruby on Rails Code]]
 +
* April - Bryan Sullivan: NoSQL Security
 +
* March -  Liam O Murchu: STUXNET
 +
* February - Scott Sutherland: Database Security in the Real World
 +
* January - Samy Kamkar: [http://samy.pl/evercookie/ Evercookie: the Persistent Cookie]
  
 
==2010==
 
==2010==
  
* December
+
* December - Brian Robison and Sven Schrecker: Deep Dive into Web Application Scanning
* November
+
* November - Al Huizenga and Kyle Adams: Baking It In: Abuse-Resistant Web Applications
* October
+
* October - Todd Calvert: Identity Management: federation and authorization
* September
+
* October - Manoranjan (Mano) Paul: Sharks and Security
* August
+
* September - Mike O. Villegas: Secure Coding Practices and Procedures, and Threat Modeling
* July
+
* September - Edward Bonver: Threat Modeling at Symantec
* June
+
* August - Dr. Jelena Mirkovic: DETER Project: Scientific, Safe and Simple&nbsp;CyberSecurity Research
* May
+
* July - Samy Kamkar:  How I Met Your Girlfriend: Entirely New Classes of Web Attacks
* April
+
* June -  Brendan Bellina: Shibboleth implementation at USC
* March
+
* May - Neil Matatall: OWASP Top 10 and Enterprise Security API (ESAPI)
* February
+
* April - Mike Bailey and Mike Murray:  The intersection of social and technical attacks in Web 2.0 applications
* January
+
* March - Michael Schrenk: BOOK PREVIEW: Webbots, Spiders, and Screen Scrapers SECOND EDITION
 +
* February - Alex Stamos: Cloud Computing Security: Raining on the Trendy New Parade
 +
* January - David M. N. Bryan: Do VLANs allow for good application security?
  
  

Revision as of 14:47, 11 February 2012

This page contains slides from OWASP Los Angeles Chapter Meetings:

2012

  • January - Robert Zigweid: Security in the Cloud

2011

2010

  • December - Brian Robison and Sven Schrecker: Deep Dive into Web Application Scanning
  • November - Al Huizenga and Kyle Adams: Baking It In: Abuse-Resistant Web Applications
  • October - Todd Calvert: Identity Management: federation and authorization
  • October - Manoranjan (Mano) Paul: Sharks and Security
  • September - Mike O. Villegas: Secure Coding Practices and Procedures, and Threat Modeling
  • September - Edward Bonver: Threat Modeling at Symantec
  • August - Dr. Jelena Mirkovic: DETER Project: Scientific, Safe and Simple CyberSecurity Research
  • July - Samy Kamkar: How I Met Your Girlfriend: Entirely New Classes of Web Attacks
  • June - Brendan Bellina: Shibboleth implementation at USC
  • May - Neil Matatall: OWASP Top 10 and Enterprise Security API (ESAPI)
  • April - Mike Bailey and Mike Murray: The intersection of social and technical attacks in Web 2.0 applications
  • March - Michael Schrenk: BOOK PREVIEW: Webbots, Spiders, and Screen Scrapers SECOND EDITION
  • February - Alex Stamos: Cloud Computing Security: Raining on the Trendy New Parade
  • January - David M. N. Bryan: Do VLANs allow for good application security?


2009

2008

  • December - Samy Kamkar: The MySpace Worm ppt
  • November - Stephan Chenette: A new web attack vector: Script Fragmentation
  • October - Jonathan Gershater: Entitlements Management: Security and policies for SOA using XML appliances
  • September - Ryan C. Barnett: The Web Hacking Incident Database (WHID) 2007 Report
  • August - Jeff Williams: Don't Write Your Own Security Code