OWASP FROC 2010 June 2, 2010 to June 2, 2010, Denver, USA

Event Page

Tell us about missing data
Title Speakers Summary Topic Types
Welcome To Froc 2010 Conference David Campbell Security Others
Keynote: Watching Software Run: Beyond Defect Elimination Brian Chess No matter how good programmers get at making secure software, it will never be perfect—we ... Keynote
Owasp: State Of The Union Tom Brennan Others Security
Cloud Security Alliance: State Of The Union Randy Barr Security
2010: A Web Hacking Odyssey – The Top Hacks Of The Year Jeremiah Grossman Every year, powerful new Web hacking techniques are revealed, many of which are highly sophisticated ... Security Others
Building A Secure, Compliant Cloud For The Enterprise Matt Ferrari Infrastructure-as-a-Service (IaaS) cloud computing has very quickly grown from an exotic concept to a known ... Security Cloud Development
Anatomy Of A Logic Flaw Charles Henderson , David Byrne Traditional vulnerabilities like SQL Injection, buffer overflows, etc, have well established techniques for discovery and ... Others Security
Advanced Mitm Techniques For Security Testers Rajendra Umadas , Aaron Rhodes , Mike Zusman HTTP proxies such as WebScarab, Paros, and Burp make it easy to inspect and intercept ... Security Network Penetration
You Are The Weakest Link Chris Nickerson Had enough SQLi,CSRF,XSS, and other code talk today? There is an EASIER and FASTER way. ... Social Engineering
Effectively Marketing Security As A Win For Both The Business And The Customer Jeff Smith , Ben Whaley Despite heavily publicized security breaches and expansive industry regulations, security issues in modern web applications ... Security Business
Vulnerabilities In Secure Code - Now And Beyond Alex Wheeler , Ryan Smith Exploitation Security
Real Life Csi: Data Mining And Intelligence Gathering For The Masses Chris Roberts Security Monitoring Data Exfiltration
The Permanent Campaign: Driving A Secure Software Initiative In The Enterprise John Dickson The majority of information that exists about software security either focuses on technical means to ... Security Application Security
Beware Of Serialized Gui Objects Bearing Data David Byrne , Rohini Sulatycki A recently discovered view state vulnerability in Apache MyFaces and Sun Mojara allows an attacker ... Security Others
What'S Old Is New Again: An Overview Of Mobile Application Security Zach Lanier The ever-increasing prevalence of mobile devices brings with it a slew of security problems. Applications ... Others Security
Fundamental Practices And Tools To Implement A Security Development Lifecycle Cassio Goldschmidt Implementing an effective security development lifecycle program is both a costly and arduous endeavor. During ... Security Development
Solving Real-World Problems With An Enterprise Security Api (Esapi) Chris Schmidt A great deal of work has gone into aggregating statistics and information about security vulnerabilities ... Security Others
Cloudy With A Chance Of Hack Lars Ewe Cloud computing is a cost effective and efficient way for enterprises to automate their processes. ... Security Cloud
Application Security Program Management With Vulnerability Manager Bryan Beverly Using free Java-based software, application security managers can now have increased visibility into and control ... Security Application Security Exploitation
Panel Discussion: Topic: Security Successes Are Like Six Legged Calves: Unnatural, But They Happen. Chris Nickerson , Jeremiah Grossman , John Dickson , Randy Barr , Andy Lewis Panel