OWASPAppSecEu 2015 May 19, 2015 to May 22, 2015, Amsterdam,Netherlands

Event Page

Tell us about missing data
Title Speakers Summary Topic Types
Abusing JSONP with Rosetta Flash, Michele Spagnuolo N/A
Agile Security Testing – Lessons learned, David Vaartjes , Cengiz Han Sahin N/A
Application Security of the Belgium electronic voting system, Rob Veer N/A
Bringing Security Testing to Development: How to Enable Developers to Act as Security Experts, Achim D. Brucker , Stephen Hookings , Dimitar Yanev N/A
Can Saas ever be Secure?, Helen Mclaughlin N/A
Client-side protection against DOM-based XSS done right, Martin Johns , Ben Stock , Sebastian Lekies N/A
E-banking transaction authorization – common vulnerabilities, security verification and best practices for implementation, Wojtek Dworakowski N/A
Finding Bad Needles on a Worldwide Scale, Dmitry Savintsev N/A
Hard knock lessons on bug bounties, Jonathan Cran N/A
HTTPS is better than ever before. Now it’s your turn, Jim Manico N/A
If 6.000 mobile malware applications could talk. Ow, they do, and a lot!, Matias Madou , Daan Raman N/A
Levelling up an application security program, David Rook N/A
Making Security Agile as Development: Adding DevOps and TDD to your security program, Matt Tesauro N/A
Maliciously monetizing AppSec “Feature” – It’s all about the $money, Or Katz , Ezra Caltum N/A
Mobile Application Assessments By The Numbers: A Whole-istic View, Dan Cornell N/A
Naxsi, a web application firewall for NGINX, Koechlin Thibault N/A
OWASP CISO Survey Report 2015 – tactical insights for managers, Tobias Gondrom N/A
OWASP Top 10 Privacy Risks, Florian Stahl , Stefan Burgmair N/A
OWASP ZAP: More Advanced Features, Simon Bennetts N/A
PDF – Mess with the Web, Alex Inführ N/A
Security and “Modern” Software Deployment, Rory Mccune N/A IncludeThinkstScapes
Security and Insecurity of HTTP Headers, Dirk Wetter N/A
Security DevOps – staying secure in agile projects, Christian Schneider N/A
Security Touchpoints When Acquiring Software, Carsten Huth , Nadim Barsoum , Dawid Sroka N/A
So, you want to use a WebView?, Andrew Lee-thorp N/A
The API Assessment Primer, Jason Haddix N/A
The Joy Of Intelligent Proactive Security, Scott Behrens , Andy Hoernecke N/A
The Node.js Highway: Attacks are at Full Throttle, Maty Siman , Helen Bravo N/A
The Top 10 Web Hacks of 2014, Matt Johansen , Johnathan Kuskos N/A
Using a JavaScript CDN that can not XSS you – with Subresource Integrity, Frederik Braun N/A
WebRTC, or how secure is p2p browser communication?, Martin Johns , Lieven Desmet N/A
Collective detection of potentially harmful requests directed at websites, Marek Zachara N/A
Personal Cloudlets: Implementing a User-Centric Datastore with PrivacyAware Access Control for Cloud-based Data Platforms, Kenny Doyle , Paul Malone , Donal Mccarthy , Johannes Hange , Eric Robson , Dylan Conway , Stepan Ivanov , Lukasz Radziwonowicz , Robert Kleinfeld , Theodoros Michalareas , Timotheos Kastrinogiannis , Nikos Stasinos , Fenareti Lampathaki N/A
Issues and Limitations of Third-party Security Seals, Tom Van Goethem N/A
50 Shades of AppSec Troy Hunt The AppSec industry is enormously diverse and it only continues to diverge as we put ...
OWASP ZAP: More Advanced Features Simon Bennetts The Zed Attack Proxy (ZAP) is an OWASP Flagship project and the largest open source ...
Red team, blue team or white cell? – Trends in IT and how they force security to behave as an immune system Frank Breedijk The past few decades have been decades of change for IT. IT is no longer ...
Continuous Acceleration: Why Continuous Everything Requires a Supply Chain Approach Joshua Corman With continuous development, we write less code and consume more re-usable open source code. Innovation ...
From Zero to Hero – or how OWASP saved my holiday Tobias Gondrom Ok. You finally got your first big breach. Everybody knew it was only a question ...
HTTPS is better than ever before. Now it’s your turn Jim Manico HTTPS/SSL/TLS has been under fire for years. BEAST, CRIME, POODLE, problems with the inherent weaknesses ...
Securing the Internet of Things Steve Lord Sometimes a bandwagon seems more like the fail train. The Internet of Things, a fantabulous, ...
Lessons from DevOps: Taking DevOps practices into your AppSec Life Matt Tesauro Bruce Lee once said “Don’t get set into one form, adapt it and build your ...
Security is part of the DNA of a Defense organisation Hans Folmer , Colonel Rnlda Security is not new. Already the Romans tried to defend themselves against intrusions by enemies. ...