Compliance

Title Speakers Conference Tags
Web Security From An Auditor'S Standpoint: What Works And What Doesn'T Luís Grangeia OWASP IBWAS-2010 - Portugal Security Web Compliance
Security Quality Assurance On Web-Based Application Through Security Requirements Tests Based On Owasp Test Document: Elaboration, Execution And Automation Felipe Ferraz OWASP IBWAS-2010 - Portugal Web Application Security Compliance
Developing Compliant Applications Martin Knobloch OWASP IBWAS-2010 - Portugal Compliance Development
Web Applications And Data Tokenization Kenny Smith OWASP BASC-2010 - Boston, USA Security Web Others Application Security Compliance
The Strengths Of Combining Code Review With Application Penetration Testing Dave Wichers OWASP Appsec-2010 - Washington DC, USA Security Web Application Security Compliance
Dealing With Web Application Security, Regulation Style Andrew Weidenhamer OWASP Appsec-2010 - Washington DC, USA Security Web Application Security Compliance
Ensuring Software Assurance Process Maturity Edmund Wotring OWASP Appsec-2010 - Washington DC, USA Security Compliance
The Secure Coding Practices Quick Reference Guide Keith Turpin OWASP Appsec-2010 - Washington DC, USA Security Compliance
Code Reviewing Strategies Andrew Wilson OWASP Appsec-2010 - Washington DC, USA Security Compliance
Measuring Security: 5 Kpis For Successful Web App Security Programs Rafal Los OWASP Appsec-2010 - Washington DC, USA Security Web Application Security Web Security Compliance
Pci Fireside Chat: Dss 2.0, Virtualization, Fun With Qsas Branden R. Williams , Jim Bibles , Matt Springfield Security B-Sides DFW-2010 - USA Security Panel Compliance
No More Of The Same Bad Security: Why The Osstmm 3 Is Threatening Modern Security Practices Pete Herzog hashdays-2010 - Lucerne, Switzerland Compliance
Integrating Itil, Cobit And Iso 27000 As Part Of E-Government Hector Acevedo BugCon-2010 - Mexico Application Security Compliance
Policies And Procedures On Information Security Jesus Zavala Ruiz BugCon-2010 - Mexico Security Compliance
Building An Effective Ssa Program In Measurable Iterations Pravir Chandra OWASP China-2010 - China Security Compliance Development
The Owasp Asvs Standard Matthias Rohr OWASP Appsec-2010 - Germany Compliance Security
Owasp Secure Coding Practices Quick Reference Guide Keith Turpin OWASP Appsec-2010 - USA Security Others Compliance
Practical Health Information Exchange Using A Personally Controlled Health Record Ben Adida , Isaac S. Kohane , Kenneth D. Mandl HealthSec-2010 - Washington DC, USA Compliance
Policy Management For E-Health Records Maritza Johnson , Steven M. Bellovin HealthSec-2010 - Washington DC, USA Compliance
The Ramblings Of An Ex-Qsa Deancarter Carter OWASP New Zealand-2010 - New Zealand Security Deep Knowledge Compliance
Beyond The Same-Origin Policy Mike Samuel , Jasvir Nagra OWASP Appsec-2010 - Stocholm, Sweden Compliance Security
Secure The Clones: Static Enforcement Of Policies For Secure Object Copying Thomas Jensen , David Pichardie OWASP Appsec-2010 - Stocholm, Sweden Compliance Security
Safe Wrappers And Sane Policies For Self Protecting Javascript David Sands , Phu H. Phung , Jonas Magazinius OWASP Appsec-2010 - Stocholm, Sweden Security Compliance Development
Compliance Crystal Ball – Future Trends In Risk-Based Security Framework Erin Jacobs Security B-Sides Denver-2010 - Denver, USA Security Compliance
Background Of Cyber Security Regulation Struggle - Examples Of Analogies Dan Ryan CCDCOE-2010 - Estonia Security Compliance
Attacking Voip And Understanding What Cyber-Crime Is Doing” Sandro Gauci AthCon-2010 - Athens, Greece Security Legal Law Enforcement Compliance
Seamless And Compliant Management Of Your Encryption Keys Tony Archaria ITWeb Security Summit-2010 - Johannesburg, South Africa Security Compliance
Pci: The R.O.U.S. For Service Providers Michelle Klinger Security B-Sides Boston-2010 - Boston, USA Compliance
Too Many Cooks Spoil The Broth: How Compliance Regulations Get Made - Panel Discussion David Mortman SOURCE Boston-2010 - Boston, USA Security Panel Compliance
Involuntary Case Studies In Data Breaches Rich Mogull SOURCE Boston-2010 - Boston, USA Security Compliance
Security Sucks Amit Yoran SOURCE Boston-2010 - Boston, USA Security Compliance
Software Development The Next Security Frontier Jim Molini OWASP Appsec-2009 - Washington DC, USA Compliance Development
Secure Sdlc: The Good, The Bad, And The Ugly Joey Peloquin OWASP Appsec-2009 - Washington DC, USA Security Compliance Development
Promoting Application Security Within Federal Government Sarbari Gupta OWASP Appsec-2009 - Washington DC, USA Security Risk Compliance
Having Fun With Atms & Hsms Dimitrios Petropoulos HITBSecConf Malaysia-2009 - Kuala Lampur, Malaysia Security Risk Compliance
Software Assurance With Samm Matt Bartoldus SOURCE Barcelona-2009 - Barcelona, Spain Security Compliance
Scare Them Into Compliance - How Fear And Fines Motivate Organizations To Make Changes Erin Jacobs SOURCE Barcelona-2009 - Barcelona, Spain Security Compliance
Cloud Compliance And Privacy Michael Dahn SOURCE Boston-2009 - Boston, USA Security Privacy Compliance Cloud
Employing Pci Compliance Programs As A Springboard For Enterprise Security And Business Enablement Ward Spangenburg SOURCE Boston-2009 - Boston, USA Security Business Compliance
Maximizing Roi On Vulnerability Management Carole Fennelly SOURCE Boston-2009 - Boston, USA Security Compliance
Splunk Robert Fox SOURCE Boston-2009 - Boston, USA Security Analysis Business Compliance
Verifying Compliance Of Trusted Programs Dave King , Trent Jaeger , Sandra Rueda 17th USENIX Security Symposium-2008 - San Jose, USA Security Compliance
How Compliance Can Get You Killed Mike Rothman SOURCE Boston-2008 - Boston, USA Security Compliance
All The Data That'S Fit To Visualize: Raffael Marty SOURCE Boston-2008 - Boston, USA Security Business Compliance
Don'T Tell Me What, Tell Me Who: Correlating User Identity And Application Data To Threats Sandy Bird SOURCE Boston-2008 - Boston, USA Security Access Compliance
When Lawyers Attack! - Dealing With The New Rules Of Electronic Discover John ( jur1st ) Benson ShmooCon-2008 - Washington DC, USA Security Community Legal Compliance
Insider Threat Visualization Raffael Marty HITBSecConf Malaysia-2007 - Kuala Lampur, Malaysia Security Analysis Compliance Automation
Simple Solutions To Complex Problems From The Lazy Hacker’S Handbook: What Your Security Vendor Doesn’T Want You To Know David Maynor Blackhat USA-2007 - Las Vegas, USA Security Compliance
Outbound Content Compliance (Build It!) Jim Noble ShmooCon-2006 - Washington DC, USA Security Compliance
Compliance Defects In Public Key Cryptography Don Davis 6th USENIX Security Symposium-1996 - San Jose, USA Security Cryptography Compliance