Chris Eng [Speaker-Timeline] [Speaker-Links]

Tell us about missing data
Title Conference Tags
Time to grow up: Counterproductive security behaviors that must end SASkaspersky-2017 - st martin,saint marten
Security Vulnerabilities, the Current State of Consumer Protection Law, & how IOT Might Change It BSidesLasVegas-2016 - las vegas,usa
Software Security by the Numbers Shmoocon-2016 - washington,usa
Scaling Security in Agile Scrum AppSecCalifornia-2015 - California,USA
Scaling Security in Agile Scrum SecTor-2014 - toronto,canada
From the Trenches: Real-World Agile SDLC AppSec USA-2013 - New York, USA
PANEL: Wait Wait... Don't Tell Me Software Security AppSec USA-2013 - New York, USA
Is a Secure Agile SDLC Programme a Possibility? RSAeu-2013 - Europaplein, Amsterdam
From the Trenches: Real-World Agile SDLC NordicSecCon-2013 - Reykjavik, Iceland
From the Trenches: Real-World Agile SDLC OWASPAppSecEU-2013 - Hamburg, Germany
Data Mining a Mountain of Zero Days PacSec-2012 - Tokyo, Japan
Things Your Smartphone Does When Nobodys Looking OWASP AppSec Research-2012 - Athens, Greece Security
Data Mining a Mountain of Zero Day Vulnerabilities OWASP AppSec Research-2012 - Athens, Greece Security
Deconstructing Coldfusion CanSecWest-2011 - Vancouver, Canada Security
Deconstructing Coldfusion OWASP Appsec-2010 - Washington DC, USA Security Web
Deconstructing Coldfusion LASCON-2010 - Austin, USA Security Web Application Security
Deconstructing Coldfusion Blackhat USA-2010 - Las Vegas, USA Security Web Development
Deconstructing Coldfusion OWASP Appsec-2010 - Stocholm, Sweden Security Others Deep Knowledge Exploitation Risk
Application Security Scoreboard In The Sky OWASP Appsec-2010 - Stocholm, Sweden Security Application Security Cloud
Static Detection Of Application Backdoors Blackhat USA-2007 - Las Vegas, USA Security
Static Detection of Application Backdoors BlackHatDC-2007 - Washington,USA
Breaking Crypto Without Keys: Analyzing Data in Web Applications BlackhatUSA-2006 - Las Vegas,USA