OWASPBASC 2019 Oct. 19, 2019 to Oct. 19, 2019, Burlington, USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
The Internet Sucks. Should We Replace It? Andy Ellis 50 years into the Internet, it’s become very clear that there are virtually no security ...
OWASP Serverless Top 10 Tal Melamed In moving to serverless, we shift some security responsibilities to the infrastructure provider by eliminating ...
An Intelligent Approach to Upgrading OSS Libraries Madison Cool Maintaining secure versions of third-party libraries is a repetitive and tedious task at best. At ...
Critical Thinking in Cybersecurity Kristin Dahl Security's most important skill is overlooked – critical thinking. Keeping up with the latest technical ...
Security Culture Hacking: Disrupting the Security Status Quo Chris Romeo This session is an exploration into the world of security culture hacking. In the wake ...
Defending against the Acceleration of Client-Side Website Attacks Aanand Krishnan The acceleration of attacks leading to the theft of private customer information, financial transaction data ...
Open Source Security on a Shoestring Paulina Valdivieso Securing assets is a difficult job without the appropriate support, be it from your superiors ...
SAST Triage Tricks of the Trade - How to Triage Before the Universe Dies Out Kristofer Patil Ever gotten a pile of SAST findings and wondered - what now? How do you ...
Put that Cease and Desist Down: How to Train Your Org to Work with Hackers Luke Tucker Before that hacker slides into your brand’s DMs, how do you prepare your organization to ...
Automate or Die - DevSecOps in the Age of Software Supply Chain Attacks Artie Jurgenson As nimble organizations deliver new innovations, adversaries are also upping their game; something we’ve seen ...
Finding Bugs Using Your Own Code: Machine Learning-based Inconsistent Code Detection Mansour Farkhani Machine learning has shown success in detecting known types of software vulnerabilities in recent years, ...
The User Experience of Information Security Chris Lamarche Targeted and increasingly sophisticated attacks are growing in popularity. With spear-phishing, ransomware, and a slew ...
Identifying Malicious Android Applications in the Presence of Adversaries: A Cat-and-Mouse Game Omid Mirzaei Android is by far the leading operating system in smartphones. As of March 2019, 51% ...
Sandcastles in a Storm: Application Vulnerabilities and How They Weaken Our Organizations Kevin Johnson In this presentation Kevin will walk through some of the issues we face as we ...