Loading…
Global AppSec 2020: Virtual
Attending this event?

Sign up or log in to bookmark your favorites and sync them to your phone or calendar.

Venue: TBA [clear filter]
Monday, October 19
 

9:00am

 
Tuesday, October 20
 

9:00am

 
Wednesday, October 21
 

9:00am

 
Thursday, October 22
 

9:00am

Chinese Surveillance and CloudPets TBAAbraham Aranguren Cloud-Native Apps: Multi-Tenant SaaS Attack Surfaces Exposed! TBARichard Tychansky Containers: Attack and Defense TBARohit Pitke • Emmanuel Law Going Deep with Adversarial ML Attacks TBAAbraham Kang Graph Smashing: A Structured GraphQL Security Testing Methodology TBAJack Sullivan How the latest MASVS & MSTG Specs Make the Best Mobile Pen Testing Cocktails TBABrian Reed Learn to exploit TOCTOU race-condition vulnerabilities with OWASP TimeGap Theory TBAAbhi Balakrishnan OWASP IoTGoat: Project Overview and Roadmap TBAAbhinav Mohanty OWNING THE CLOUD THROUGH SSRF TBABen Sadeghipou Practical Mobile App Attacks By Example TBAAbraham Aranguren Practical Modern Web & Desktop App Attacks By Example TBAAbraham Aranguren Pwning WhatsApp - The Dark Side Of Web-based Messaging Apps TBAGal Weizman Understanding the Threats and Attacks on Data Science Applications and Models TBAAbraham Kang Yes, you too can break crypto: Exploiting common crypto mistakes TBAAlexei Kojenov Enabling Message Level Protection at Uber TBADebosmit (Debo) Ray • Jovon Itwaru Eradicating Vulnerability Classes by Shelving SAST and Embracing Secure Defaults and Invariants TBAClint Gibler • Isaac Evans OAuth 2.0 and OpenID Connect for Single Page Applications TBAPhilippe De Ryck OAuth 2.0 Threat Models via P.A.S.T.A TBATony UcedaVelez Open Source, Cross Platform Threat Modelling with OWASP Threat Dragon TBAMike Goodwin Secure React Native Apps Against API Abuse TBASkip Hovsmith Tales from the Trenches: Open Source Security at Scale TBALaksh Raghavan Why Developers Struggle with AppSec TBAScott Gerlach Don’t Worry, Be API: Addressing AppSec’s Newest Challenge TBAErez Yalon Election Security: The post-pandemic acceleration of secure web-based voting TBABryson Bort • Anita D'Amico Expose Yourself Without Insecurity: Cloud Patterns for Breaches TBARob Ragan How to select between SAST, DAST, IAST, RASP, and AST TBAAbraham Kang Insider Threat Detection & Automation by Behaviour Analytics TBAHima Vejella Magecart 2020: The New Face of XSS TBAAmeet Naik Measure and Improve Software Supply Chain Assurance with OWASP SCVS TBASteve Springett Modeling and Building Event-Driven Automation for your SIEM TBAAaron Brown Overwhelmed by Vulnerability Triage? Hear a Blend of Finest Best Practices TBAJorge Bastos • Eduardo Silva Purple Team Strategies for Application Security TBAJoe Schottman Real Time Vulnerability Alerting by Using Principles from the United States Tsunami Warning Center TBAAmol Sarwate Real world static analysis for real humans TBANick Gonella • Adrian Bravo Social Media Botnet Detection with Linkage Analysis and Machine Learning TBARundong Liu Weakest in the herd: EoL softwares and a journey to secure it TBAAnuprita S Patankar • Aastha Sahni Application logging in the era of GDPR TBAKaren Lu AppSec is dead. Long live DevSecOps! TBAMatias Madou Detecting session hijacking using rotating refresh tokens in web applications TBARishabh Poddar Does “diversity” really have an impact on software and security teams? TBAAnita D'Amico Falling Water Vulnerability disclosure for Medical Devices TBAVeronica Schmitt Mobile DevSecOps: 5 Tips from Building Mobile Apps Used by Millions TBABrian Reed OSINT to Compromise TBAFrank Vianzon Secure application design with high data privacy requirements TBAJames Bohem Start me up, safe! – AppSec for startup and small companies TBAIsmael Goncalves Systems Thinking: How not to fail at AppSec! TBALaksh Raghavan WAFs! WAFs! We don't need no Stinkin' WAFs! - Extending WAFs at the Application Layer TBABernardo Sanchez A Dancefloor that is Literally Just Banana Peels – AppSec Awareness Program Pitfalls TBAEugene Rojavski A Warrior's Journey: Building a Global AppSec Program TBABrian Levine Breaches Are Everywhere; What's a Good Security Leaders to Do? TBARichard Greenberg Creating a Security Policy Framework - That works TBAIsaac Painter Data Classification with Serverless Functions TBAYitao Wang Full Life-cycle Security: Internal / Corp Code --> Open Source Project TBAEric Goldman OD approach to the champions dilemma TBATimur Khrotko • Péter Nyilasy OWASP SAMM 2: Your Dynamic Software Security Journey TBAJohn Ellingsworth OWASP Top 10 Maturity Categories for Security Champions TBALucian Corlan Privacy Threat Modeling: Analysis of Cloud Services Against Privacy Regulations TBAFarbod H Foomany Time for a Change: Why It's More Important Than Ever to Revisit the CFAA TBACasey Ellis Using the OWASP Top 10 As The Foundation for Security and Privacy Programs Across Your Organization TBAMarina Kelly