Title |
Conference |
Tags |
As Bs And Four Cs Of Testing Cloud Native Applications |
Snowfroc-2020 - Denver, US |
|
The As, Bs, and Four Cs of Testing Cloud-Native Applications |
GlobalAppSec-DC-2019 - Washington, USA |
|
Enumerating the Enterprise Attack Surface |
ISSA-2019 - Prior Lake, United States |
|
Enumerating Enterprise Attack Service |
OWASPSnowfroc-2019 - Denver, US |
|
Threat Modeling for IoT Systems |
LASCON2018-2018 - Austin, USA |
|
Monitoring Application Attack Surface to Integrate Security into DevOps Pipelines |
AppSecCali-2017 - california,usa |
|
Invited Speaker: Dan Cornell |
lascon-2016 - austin,usa |
|
Monitoring Attack Surface Analysis to Secure DevOps Pipelines |
CyberSecuritySymposium-2016 - carolina,usa |
|
Blending the Automated and the Manual: Making Application Vulnerability Management Pay Dividends |
AppSecUSA-2015 - California,USA |
|
Mobile Application Assessments By The Numbers: A Whole-istic View, |
OWASPAppSecEu-2015 - Amsterdam,Netherlands |
|
Building an Appsec Program with Sun Tzu, the Dalai Lama and Honey Badger |
RSAus-2015 - San Francisco,USA |
|
STATE OF APPLICATION SECURITY PANEL |
HouSecCon-2014 - houston,usa |
|
Building Your Application Security Data Hub: The Imperative for Structured Vulnerability Information |
AppSecUSA-2014 - denver,usa |
|
Leading a High Performing IT Organization |
CISORichmond-2014 - Richmond,USA |
|
Hybrid Analysis Mapping: Making Security and Development Tools Play Nice Together |
SourceBoston-2014 - boston,usa |
|
Mobile Application Assessments by the Numbers: A Whole-istic View |
RSACon-2014 - San Francisco, USA |
|
2 Day Pre-Conference Training: Running A Software Security Program On Open Source Tools |
AppSec USA-2013 - New York, USA |
|
ThreadFix: The Open Source Software Vulnerability Management Platform |
OWASPAppSecEU-2013 - Hamburg, Germany |
|
Do You Have a Scanner or a Scanning Program? |
OWASPAppSecEU-2013 - Hamburg, Germany |
|
Training - Developing Secure Mobile Applications |
BSidesAustin-2013 - Austin, USA |
Security
|
Implementation Patterns For Software Security Programs |
BSidesAustin-2013 - Austin, USA |
Security
|
The Magic of Symbiotic Security: Creating an Ecosystem of Security Systems |
AppSecUSA-2012 - Austin,USA |
|
The Magic of Symbiotic Security - Creating an EcoSystem of Security Systems |
BSidesLasVegas-2012 - Las Vegas,USA |
|
THREADFIX |
BlackHat USA-2012 - Las Vegas, USA |
Security
|
What Permissions Does Your Database User REALLY Need? |
OWASP AppSec Research-2012 - Athens, Greece |
SQL
Defence
Databases
|
Benchmarking Web Application Scanners for YOUR Organization |
OWASP AppSec Research-2012 - Athens, Greece |
Security
|
Vulnerability Management In An Application Security World
|
OWASP FROC-2009 - Denver, USA |
Security
|