AppSecIndonesia2020 2020 Nov. 21, 2020 to Nov. 22, 2020, Virtual, Virtual

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Keynote Vivek Ramachandran N/A
Scale Your Security by Embracing Secure Defaults & Eliminating Bug Classes Isaac Evans We’re in the middle of a significant shift in how security teams operate and prioritize ...
Betrayal of Reputation: Trusting the Untrustable Hardware and Software with Reputation Seunghun Han Reputation is based on trust, and people normally believe the products produced by global companies ...
Learn how to find and exploit race conditions in web apps with OWASP TimeGap Theory Abhi M Balakrishnan OWASP TimeGap Theory is the latest work Abhi M Balakrishnan. You probably must have heard ...
OWASP Women in AppSec (WIA) - Application Of NIST Cyber Security Framework in Public Schools Deveeshree As we all know that Cybercriminals are targeting middle schools and high schools and given ...
Mobile Security in a Remote World Allie mellen Attacks are no longer limited to traditional endpoints like laptops and workstations; mobile devices have ...
The caveats of the unseen: Crouching exposure, Hidden Misconfiguration Ashwin Vamshi The complexity and number of enterprise cloud applications has resulted in a constant stream of ...
Top security mistakes with API's Shahnawaz Backer The talk is the resultant analysis of major security breaches and disclosures related to APIs, ...
Hunting Malware Using Yara Lakshya Dubey As we are in the age of the computer, the complexity of computer threats has ...
Applications Security with SAST y Automated Threat Modeling Gustavo Review the basic tools and taks of the profesional in product security- Automated Threat modeling- ...
Threat Defense: Defending the ATT&CK with TTP’s Avkash Kathiriya For defenders in the current threat landscape, threat intelligence is mostly focused on Observables and ...
Use the OWASP Threat Modeling Playbook to Improve your Product Security Sebastien Deleersnyder We consider threat modeling a foundational activity to improve your software assurance or product security. ...
The Fault in Our Shells: A Weekly Overview Running Cowrie Ewaldo Simon Hiras I ran ssh honeypot on cloud environment for a week. I then dissected the result ...
teler - Protect Your WebApp Dwi Siswanto "teler" is an open source tool I created to detect various types of threats that ...
Web Security in Indonesia National Policy Framework Rifki Indrakusuma N/A