AppSecIndonesia2020 2020 Nov. 21, 2020 to Nov. 22, 2020, Virtual, Virtual
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
Keynote | Vivek Ramachandran | N/A | |
Scale Your Security by Embracing Secure Defaults & Eliminating Bug Classes | Isaac Evans | We’re in the middle of a significant shift in how security teams operate and prioritize ... | |
Betrayal of Reputation: Trusting the Untrustable Hardware and Software with Reputation | Seunghun Han | Reputation is based on trust, and people normally believe the products produced by global companies ... | |
Learn how to find and exploit race conditions in web apps with OWASP TimeGap Theory | Abhi M Balakrishnan | OWASP TimeGap Theory is the latest work Abhi M Balakrishnan. You probably must have heard ... | |
OWASP Women in AppSec (WIA) - Application Of NIST Cyber Security Framework in Public Schools | Deveeshree | As we all know that Cybercriminals are targeting middle schools and high schools and given ... | |
Mobile Security in a Remote World | Allie mellen | Attacks are no longer limited to traditional endpoints like laptops and workstations; mobile devices have ... | |
The caveats of the unseen: Crouching exposure, Hidden Misconfiguration | Ashwin Vamshi | The complexity and number of enterprise cloud applications has resulted in a constant stream of ... | |
Top security mistakes with API's | Shahnawaz Backer | The talk is the resultant analysis of major security breaches and disclosures related to APIs, ... | |
Hunting Malware Using Yara | Lakshya Dubey | As we are in the age of the computer, the complexity of computer threats has ... | |
Applications Security with SAST y Automated Threat Modeling | Gustavo | Review the basic tools and taks of the profesional in product security- Automated Threat modeling- ... | |
Threat Defense: Defending the ATT&CK with TTP’s | Avkash Kathiriya | For defenders in the current threat landscape, threat intelligence is mostly focused on Observables and ... | |
Use the OWASP Threat Modeling Playbook to Improve your Product Security | Sebastien Deleersnyder | We consider threat modeling a foundational activity to improve your software assurance or product security. ... | |
The Fault in Our Shells: A Weekly Overview Running Cowrie | Ewaldo Simon Hiras | I ran ssh honeypot on cloud environment for a week. I then dissected the result ... | |
teler - Protect Your WebApp | Dwi Siswanto | "teler" is an open source tool I created to detect various types of threats that ... | |
Web Security in Indonesia National Policy Framework | Rifki Indrakusuma | N/A |