2023-05-20 | Leveraging Social Engineering in physical security assessment Snow | 46:28 | 1 | |
|
2023-05-20 | From Zero to Zero Trust Lessons Learned Building a BeyondCorp SSH Proxy James Barclay | 42:52 | 2 | |
|
2023-05-20 | Malware Clustering Srivathsan Srinivasagopalan | 48:55 | 0 | |
|
2023-05-20 | How to Create and Cultivate Community within the Cybersecurity Industry Jessica Patterson | 35:34 | 0 | Guide |
|
2023-05-20 | No one left behind Security Defense through Gamification including CTFs Kashish Mittal | 33:53 | 1 | |
|
2023-05-20 | How to put Sec in Devops Igor Matlin | 36:13 | 0 | Guide |
|
2023-05-20 | OAuth vs SAML vs OpenID Connect Michael Schwartz | 33:18 | 2 | |
|
2023-05-20 | Invited Speaker Chris Roberts | 45:50 | 0 | |
|
2023-05-20 | Pen Testing for Humans Rajan Kapoor | 30:29 | 0 | |
|
2023-05-20 | IoT and the Security of That Mobile App Mark Loveless | 55:15 | 0 | |
|
2023-05-20 | Phishing It's Not Just for Pentesters Joe Gray | 53:38 | 0 | |
|
2023-05-20 | A Wake Up Call Information Security for Non Profits, Foundations, and Charities Kelley Misata | 43:02 | 1 | Guide |
|
2023-05-20 | Realizing Software Security Maturity The Growing Pains & Gains Kelby Ludwig, Mark Stanislav | 47:19 | 0 | |
|
2023-05-20 | Abusing Normality Data Exfiltration in Plain Site | 47:36 | 0 | |
|
2023-05-20 | Security Evaluation of Libraries | 38:58 | 0 | |
|
2023-05-20 | Security for DevOps Shannon Lietz | 48:51 | 0 | |
|
2023-05-20 | AppSec Pipelines and Event based Security Moving beyond a traditional security test Matt Tesaur | 40:22 | 0 | |
|
2023-05-20 | OWASP Top 10 @ LASCON 2017 5 5 | 52:36 | 1 | |
|
2023-05-20 | OWASP Top 10 @ LASCON 2017 3 5 | 1:18:24 | 0 | |
|
2023-05-20 | OWASP Top 10 @ LASCON 2017 4 5 | 1:04:37 | 0 | |
|
2023-05-20 | Building An AppSec Program From The Ground Up An H | 55:41 | 0 | |
|
2023-05-20 | Running at Light Speed Cloud Native Security Patte | 50:45 | 0 | |
|
2023-05-20 | Year0 AppSec at a Startup Leif Dreizler | 53:07 | 0 | |
|
2023-05-20 | Secure Configuration in the Cloud | 40:35 | 0 | |
|
2023-05-20 | Securing Legacy Applications | 46:24 | 0 | |
|
2023-05-20 | Building Products People Trust Designing Privacy, | 48:47 | 0 | |
|
2023-05-20 | How to Assess the Maturity of your Security Progra | 35:43 | 0 | Guide |
|
2023-05-20 | Securing the Future of TLS What's new in TLS 1 3 | 39:51 | 0 | |
|
2023-05-20 | Cryptography may or may not protect you how it i | 43:06 | 0 | |
|
2023-05-20 | How To Kick Butt in InfoSec Blogging Kate Brew | 45:03 | 0 | Guide |
|
2023-05-20 | Security Testing Is Automation Failing US Heather | 42:10 | 0 | |
|
2023-05-20 | Data Protection at Scale | 51:50 | 0 | |
|
2023-05-20 | It takes a village to get security right Building | 36:29 | 0 | |
|
2023-05-20 | SEOWNING The Internet Part 2 Robert Hansen | 47:54 | 0 | |
|
2023-05-20 | Denial of Trust The New Attacks Wendy Nather | 40:21 | 0 | |
|
2023-05-20 | Keynote Jayson Street | 42:07 | 0 | |
|
2023-05-20 | Speed with confidence Shannon Lietz | 44:40 | 0 | |
|
2023-05-20 | DevSecOps without DevOps is Just Security | 52:25 | 0 | |
|
2023-05-20 | Making Continuous Security a Reality with OWASP's | 32:27 | 0 | |
|
2023-05-20 | Microservices Security Landscape Prabath Siriwar | 44:17 | 0 | |
|
2023-05-20 | The DevSecOps Builders Guide to the CI CD PIPELINE | 47:04 | 0 | Guide |
|
2023-05-20 | Don't @ Me Hunting Twitter Bots at Scale | 49:25 | 0 | |
|
2023-05-20 | ML Based Detection Engine of Device Network Attack | 48:47 | 0 | |
|
2023-05-20 | The FaaS and the Curious | 49:11 | 0 | |
|
2023-05-20 | Eisenhower and the Internet | 30:52 | 0 | |
|
2023-05-20 | Empathy & Vulnerability in SecOps | 37:37 | 0 | |
|
2023-05-20 | The Mitre ATT&CK Framework is for all of us, and i | 54:21 | 0 | |
|
2023-05-20 | Orchestrating Security Tools with AWS Step Functio | 39:57 | 0 | |
|
2023-05-20 | Evolving Your Security Mindset to Embrace DevSecOp | 49:19 | 0 | |
|
2023-05-20 | Pentesting for Developers | 45:12 | 0 | |
|
2023-05-20 | The White Hat’s Advantage Open source OWASP tools | 38:32 | 0 | |
|
2023-05-20 | Poking Holes in the Cloud Auditing AWS Security | 54:33 | 0 | |
|
2023-05-20 | Threat Modeling for IoT Systems | 49:12 | 0 | |
|
2023-05-20 | fileducting Table Top Exercises to Get Your Team Ba | 55:27 | 0 | |
|
2023-05-20 | Practical DevSecOps the simple free pipeline any | 55:00 | 0 | |
|
2023-05-20 | Vulnerability Management You're doing it wrong | 52:14 | 2 | |
|
2023-05-20 | Adapting Your AppSec Brian Glas | 51:39 | 0 | |
|
2023-05-20 | Red Team Pen Testing Panel Discussion | 56:19 | 0 | Discussion |
|
2023-05-20 | Be Prepared Things you can do today for the brea | 48:32 | 0 | |
|
2023-05-20 | Bridging GDPR from your Application to your Cloud 2 | 50:39 | 0 | |
|
2023-05-20 | Rethinking Role Based Security Education Kat Swe | 33:02 | 0 | |
|
2023-05-20 | Bridging GDPR from your Application to your Cloud | 35:47 | 0 | |
|
2023-05-20 | Achieve AI powered API Privacy using Open Source | 57:22 | 1 | |
|
2023-05-20 | Running FaaS with Scissors | 40:44 | 0 | |
|
2023-05-20 | Thwarting Intruders with Ever Morphing Infrastructure | 31:29 | 0 | |
|
2023-05-20 | Application Logging in the Era of GDPR | 53:56 | 1 | Vlog |
|
2023-05-20 | Securing Modern API and Microservice Based Applications by Design | 45:19 | 2 | |
|
2023-05-20 | Securability Shannon Leitz | 45:17 | 0 | |
|
2023-05-20 | Assessing Maturity OpenSAMM and BSIMM | 44:06 | 1 | |
|
2023-05-20 | Security Code Analysis is for Everyone | 47:13 | 0 | |
|
2023-05-20 | Invited Speaker Josh Sokol | 47:53 | 0 | |
|
2023-05-20 | Baited Canaries Monitoring attackers with active beacons | 19:52 | 0 | |
|
2023-05-20 | Keynote John Bambenek | 57:52 | 0 | |
|
2023-05-20 | Security Instrumentation Is the Future of All Software | 54:36 | 0 | |
|
2023-05-20 | Being Powerful While Powerless Elevating Security by Leading Without Authority | 44:29 | 2 | |
|
2023-05-20 | Keynote Purple is the new black Modern Approaches to Application Security | 48:11 | 0 | |
|
2023-05-20 | Breaking Into Red Teaming | 47:45 | 0 | |
|
2023-05-20 | Security Management 101 Practical Techniques They Should've Taught You | 50:50 | 0 | |
|
2023-05-20 | Sexy Mobile App Attacks by Example | 51:24 | 0 | |
|
2023-05-20 | Choosing the Right Static Code Analyzers Based on Hard Data | 33:38 | 1 | |
|
2023-05-20 | Kubernetes Ingress Nginx Security from Beginner to Expert | 37:12 | 2 | |
|
2023-05-20 | Cloud Security At Scale Managing the Chaos | 45:11 | 0 | |
|
2023-05-20 | Soft Skills Panel | 52:53 | 0 | |
|
2023-05-20 | Learning the Power of the Not My Responsibility Mindset | 40:38 | 0 | |
|
2023-05-20 | Cloudy with a chance of Persistence | 29:39 | 0 | |
|
2023-05-20 | Living in AppSec Promised Fantasy Wonderland | 48:38 | 0 | |
|
2023-05-20 | The A's, B's, and Four C's ofTesting Cloud Native Applications | 48:23 | 0 | |
|
2023-05-20 | The Battle to Address Mobile in the Endpoint Security Space | 25:35 | 1 | |
|
2023-05-20 | Detect Insider Threats Using Blockchains | 30:37 | 0 | |
|
2023-05-20 | The End of the AppSec Team | 49:00 | 0 | |
|
2023-05-20 | Lost in Translation Communicating Outside of Security | 21:16 | 2 | |
|
2023-05-20 | Face Recognition & Privacy | 42:44 | 1 | |
|
2023-05-20 | Micro services Challenges Istio to the Rescue | 44:05 | 0 | |
|
2023-05-20 | Threat Modelling Stories from the Trenches | 50:54 | 0 | |
|
2023-05-20 | How to Build an Effective Malware Protection Architecture for File Uploads in Modern Web Apps | 30:27 | 0 | Guide |
|
2023-05-20 | NetFlow Where We're Going, We Don't Need NetFlow | 36:51 | 0 | |
|
2023-05-20 | How to Secure a nodejs Application End to End | 38:51 | 1 | Guide |
|
2023-05-20 | Nifty Network Discovery | 49:59 | 0 | |
|
2023-05-20 | A DevOps View of AppSec | 44:49 | 0 | |
|
2023-05-20 | Offensive Threat Models Against the Supply Chain | 47:53 | 1 | |
|