LASCON 2010 Oct. 28, 2010 to Oct. 28, 2010, Austin, USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Keynote Matt Tesauro Keynote
Why Ha.Ckers.Org Doesn’T Get Hacked James Flom Ha.ckers.org has suffered nearly every attack a website can. These attacks include robots, sophisticated web-based ... Security Analysis
Anatomy Of A Logic Flaw Garrett Held , Charles Henderson Traditional vulnerabilities like SQL Injection, buffer overflows, etc, have well established techniques for discovery and ... Exploitation Security
Deconstructing Coldfusion Chris Eng ColdFusion is a somewhat forgotten but still very prevalent web application development platform. This presentation ... Security Web Application Security
Https Can Byte Me Josh Sokol , Robert J. Hansen HTTPS was created to protect confidentiality and prove integrity of content passed over the web. ... Security Web Browser
How I Met Your Girlfriend Samy Kamkar How I Met Your Girlfriend: The discovery and execution of entirely new classes of attacks ... Mobile Security Web Firewall Privacy Risk
Conducting An Instiution-Wide, Multi-Department Application Security Assessment Jay Paz , Charlie Scott From early 2009 until mid-2010, the Information Security Office at the University of Texas at ... Application Security Analysis
Mitigating Business Risks With Application Security Joe Jarzombek With today’s global IT software supply chain, project management and software/systems engineering processes must explicitly ... Security Application Security Business
Everything Useful I Learned About Software Security, I Learned At Microsoft! Michael Howard In this talk, Michael will discuss some of the things he has learned over the ... Security Others Deep Knowledge Development
Security Religions And Risk Windows Erik Pace Birkholz There is a difference between what is possible and what is probable, something we often ... Security Risk
Technology And Business Risk Management: How Application Security Fits In Peter Perfetti This presentation demonstrates how important application security is to the overall stability and security of ... Security Application Security Risk Business
Owasp Top 10: What Is It All About? Dean Bushmiller Everyone knows exactly what the OWASP top ten security threats are, right? Well sort of... ... Security Others Deep Knowledge
Automating Web Testing Beyond Owasp Webscarab Using Python Brad Causey This presentation will illustrate ways to improve web security assessments by using advanced features in ... Development Others
Tell Me Your Ip And I Will Tell You Who You Are Noa Bar-yosef IP addresses have been traditionally considered an unreliable method for attack detection. The unreliability is ... Security Web Privacy
Enhancing Web Application Security Using Another Factor Asad Ali , Karen Lu As web applications have become a necessity of contemporary societies, there is an increasing need ... Web Application Security
Why The Cloud Is More Secure Than Your Existing Systems Ernest Mueller Security is frequently cited as the #1 hindrance to the adoption of cloud computing. Much ... Security Others Cloud