Dan Cornell [Speaker-Timeline] [Speaker-Links]

Tell us about missing data
Title Conference Tags
As Bs And Four Cs Of Testing Cloud Native Applications Snowfroc-2020 - Denver, US
The As, Bs, and Four Cs of Testing Cloud-Native Applications GlobalAppSec-DC-2019 - Washington, USA
Enumerating the Enterprise Attack Surface ISSA-2019 - Prior Lake, United States
Enumerating Enterprise Attack Service OWASPSnowfroc-2019 - Denver, US
Threat Modeling for IoT Systems LASCON2018-2018 - Austin, USA
Monitoring Application Attack Surface to Integrate Security into DevOps Pipelines AppSecCali-2017 - california,usa
Invited Speaker: Dan Cornell lascon-2016 - austin,usa
Monitoring Attack Surface Analysis to Secure DevOps Pipelines CyberSecuritySymposium-2016 - carolina,usa
Blending the Automated and the Manual: Making Application Vulnerability Management Pay Dividends AppSecUSA-2015 - California,USA
Mobile Application Assessments By The Numbers: A Whole-istic View, OWASPAppSecEu-2015 - Amsterdam,Netherlands
Building an Appsec Program with Sun Tzu, the Dalai Lama and Honey Badger RSAus-2015 - San Francisco,USA
Building Your Application Security Data Hub: The Imperative for Structured Vulnerability Information AppSecUSA-2014 - denver,usa
Leading a High Performing IT Organization CISORichmond-2014 - Richmond,USA
Hybrid Analysis Mapping: Making Security and Development Tools Play Nice Together SourceBoston-2014 - boston,usa
Mobile Application Assessments by the Numbers: A Whole-istic View RSACon-2014 - San Francisco, USA
2 Day Pre-Conference Training: Running A Software Security Program On Open Source Tools AppSec USA-2013 - New York, USA
ThreadFix: The Open Source Software Vulnerability Management Platform OWASPAppSecEU-2013 - Hamburg, Germany
Do You Have a Scanner or a Scanning Program? OWASPAppSecEU-2013 - Hamburg, Germany
Training - Developing Secure Mobile Applications BSidesAustin-2013 - Austin, USA Security
Implementation Patterns For Software Security Programs BSidesAustin-2013 - Austin, USA Security
The Magic of Symbiotic Security: Creating an Ecosystem of Security Systems AppSecUSA-2012 - Austin,USA
The Magic of Symbiotic Security - Creating an EcoSystem of Security Systems BSidesLasVegas-2012 - Las Vegas,USA
THREADFIX BlackHat USA-2012 - Las Vegas, USA Security
What Permissions Does Your Database User REALLY Need? OWASP AppSec Research-2012 - Athens, Greece SQL Defence Databases
Benchmarking Web Application Scanners for YOUR Organization OWASP AppSec Research-2012 - Athens, Greece Security
Vulnerability Management In An Application Security World OWASP FROC-2009 - Denver, USA Security