OWASPBucharest 2018 Oct. 24, 2018 to Oct. 26, 2018, Bucharest, Romania

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
So you think you do security? Martin Von Knobloch Security is hot and we get all the fancy old and new titles: Chief Information ...
Browsers - For better or worse... Renato Rodrigues It is no news that security is under close scrutiny of the public eye. Everyone ...
Access control, REST and sessions Johan Peeters There is a lot of confusion surrounding REST, state, sessions, and the implications for access ...
Cookies versus tokens: a paradoxical choice Philippe de Ryck When you’re building Angular applications, you will need to figure out how to manage your ...
Short A.V Evasion and Fast Incident Response Lucian Ilca The field of Anti-Virus Evasion and Fast Incident Response, combined with Malware Analysis comprises the ...
Secure your cyber battlefield leveraging cyber threat intelligence Cristian Calita Cyber crime, Cyber environment, Cyber activities, Cyber security, etc - Cyber is the new black. ...
Automating Security Operations using Phantom Isabella Minca Our challenge consists in working with a SIEM which manages over 30 TB of logs ...
It's a World of SecDevOps @ OWASP Daniel Barbu SecDevOps comes with a built-in security mindset and ideally adopts the proven practices already in ...
Tales of Practical Android Penetration Testing (Mobile Pentest Toolkit) Alexander Subbotin A vast number of open source tools and commercial products has been developed to support ...
Breaking the Apple iOS Sandbox Razvan Deaconescu Apple iOS uses sandboxing to confine apps to certain calls they can make to services ...
Evading your protection and exfiltrate data Cosmin Alexandru Radu Evading your protection and exfiltrate dataThis presentation is meant to be an introduction into a ...
OWASP Top 10 with .NET Core Andrei Ignat We will show OWASP Top 10 and how to counter them in .NET Core
AWS VMS Gabriel Pilat This presentation looks at how Vulnerability Management is generally performed (Scanning, Asset management, Reporting, TI ...
Protecting company information for GDPR compliance. A software architect’s perspective. Ovidiu Ariton For years cybersecurity has been approached at the network level and at endpoint level. Best ...
DevSecOps Use Case: Automate Early… But Securely Serban Bejan In today’s increasingly digitalized world, the need for security in DevOps is met by a ...