2023-05-20 | A Stratagem on Strategy Rolling Testing into Product Testing | 56:42 | 0 | |
|
2023-05-20 | On the Internet, nobody knows you're a dog Revisiting the meme after 25 years | 50:19 | 0 | |
|
2023-05-20 | Reversing Client Side JavaScript Using the Chrome Dev Tools Protocol | 43:40 | 0 | |
|
2023-05-20 | Insiders Guide to Mobile AppSec with OWASP MASVS | 50:31 | 0 | Guide |
|
2023-05-20 | Privacy Impact Assessments how much privacy is enough | 46:18 | 0 | |
|
2023-05-20 | Introduction to inner loop security Shifting left, but better | 50:22 | 0 | |
|
2023-05-20 | Security Observability 101 Thinking Inside the Box | 56:52 | 0 | |
|
2023-05-20 | A Hacker's Guide to Blockchain, Smart Contracts, and NFTs | 59:17 | 11 | Guide |
|
2023-05-20 | Security while scaling Agile lessons learned | 52:32 | 0 | |
|
2023-05-20 | Shifting Engineering Right What security engineers can learn from DevSecOps | 45:22 | 0 | |
|
2023-05-20 | API Security Is it the new application attack surface and how to secure at enterprise scale | 30:20 | 0 | Guide |
|
2023-05-20 | BRICK'D Making End User AppSec Training Awesome with building bricks | 36:21 | 0 | |
|
2023-05-20 | SSL Hell | 34:28 | 0 | |
|
2023-05-20 | The Final Frontier, Automating DYNAMIC Security Testing | 37:28 | 0 | |
|
2023-05-20 | Climbing AppSec Mountains and how to summit | 51:18 | 0 | Guide |
|
2023-05-20 | The Software Security Testing Lifecycle The framework testers need | 47:34 | 0 | |
|
2023-05-20 | Cloud security and Compliance | 53:46 | 0 | |
|
2023-05-20 | Cloud Security Scaled The Chaos Continues | 44:39 | 0 | |
|
2023-05-20 | TMI, the kinds of data your applications are leaking | 44:13 | 0 | |
|
2023-05-20 | Comparing WAF and RASP, Why | 50:26 | 0 | |
|
2023-05-20 | Using the Threat Modeling Manifesto to Build an Enterprise Threat Modeling Program | 57:13 | 0 | |
|
2023-05-20 | Detection Engineering Methodologies | 50:39 | 0 | Vlog |
|
2023-05-20 | WAF Your frontier defense | 49:38 | 1 | |
|
2023-05-20 | Writing Policies That Aren’t Miserable for Everyone Involved | 33:05 | 0 | |
|
2023-05-20 | Invited Speaker Charisse Castagnoli | 56:56 | 0 | |
|
2023-05-20 | Developing and Managing an OWASP Project Projects 101 | 37:19 | 0 | |
|
2023-05-20 | Doing This One Crazy Thing Will Change Your AppSec Program Forever | 1:02:44 | 0 | |
|
2023-05-20 | JWTs Patterns & Anti patterns | 32:54 | 0 | |
|
2023-05-20 | Keynote Dan Cornell | 39:55 | 0 | |
|
2023-05-20 | Get funding for your Security Initiatives by thinking like a MBA not a CISSP | 40:05 | 0 | |
|
2023-05-20 | How security can keep pace with continuously evolving cloud native applications | 48:27 | 0 | |
|
2023-05-20 | Manual JavaScript Analysis is a Bug | 44:42 | 0 | Tutorial |
|
2023-05-20 | Infosec metrics that your bosses will love | 35:25 | 0 | |
|
2023-05-20 | Defense in Depth Engineering John Poulin | 55:25 | 0 | |
|
2023-05-20 | Design Level Supply Chain Attacks In The Real World Moshe Zioni | 52:00 | 0 | |
|
2023-05-20 | DSOMM from Theory to Enforcement Chris Koehnecke | 39:40 | 0 | |
|
2023-05-20 | Elite Security Champions Build Strong Security Culture Chris Romeo | 49:07 | 0 | |
|
2023-05-20 | FAIR STRIDE Building business relevant AppSec threat models Arthur Loris | 48:35 | 0 | |
|
2023-05-20 | Fuzzers, analyzers, and other Gophers insecticides Alex hex0punk Useche | 56:27 | 0 | |
|
2023-05-20 | Hacking and Defending APIs Red and Blue make Purple Matt Tesauro | 53:00 | 3 | |
|
2023-05-20 | Hacking JavaScript Desktop apps with XSS and RCE Abraham Aranguren | 45:46 | 2 | |
|
2023-05-20 | How To Hack An API In 15 Minutes Igor Matlin | 47:54 | 0 | Guide |
|
2023-05-20 | How to scan at scale with OWASP ZAP Tiago Mendo | 52:53 | 0 | Guide |
|
2023-05-20 | Invited Amiran Alavidze Securing Managed Kubernetes Clusters | 51:56 | 0 | |
|
2023-05-20 | Invited Chris Roberts Charles Valentine | 53:41 | 1 | |
|
2023-05-20 | Build more secure apps by harnessing the power of OWASP SKF & ASVS on Kubernetes Farshad Abasi | 45:01 | 2 | |
|
2023-05-20 | Can you keep a secret An Overview of the OWASP Secrets Management Cheat Sheet Jet Anderson | 31:23 | 3 | |
|
2023-05-20 | Close Encounters of the Vulnerable Kind A DevSecOps Odyssey Pranshu Bajpai | 52:06 | 1 | |
|
2023-05-17 | How overlay networks can make public clouds your global WAN network Ryan Koop | 41:02 | 2 | |
|
2023-05-17 | Software and Supply Chain Assurance SSCA Joe Jarzombek | 51:13 | 0 | |
|
2023-05-17 | Why CloudHSM can Revolutionzie AWS Todd Cignetti, Oleg Gryb | 42:21 | 0 | |
|
2023-05-17 | Stalking a City for Fun and Frivolity Brendan O'Connor | 48:59 | 3 | |
|
2023-05-17 | Ice Cream 'sudo make me a' Sandwich Max Sobell | 41:22 | 3 | |
|
2023-05-17 | Speed Debates Matt Tesauro, Nick Galbreath, Robert Hansen, Jim Manico, HD Moore, Wendy Nather | 49:23 | 0 | |
|
2023-05-17 | 5 Proven Success Strategies for your Software Security Program Bankim Tejani | 49:59 | 1 | |
|
2023-05-17 | Stupid webappsec Tricks Zane Lackey | 46:44 | 1 | |
|
2023-05-17 | Malware Automation Christopher Elisan | 46:20 | 4 | |
|
2023-05-17 | The Origins of Insecurity Keynote with Nick Galbreath | 44:06 | 0 | |
|
2023-05-17 | Big Data, Little Security Practical Steps for securing Big Data Manoj Tripathi | 48:32 | 1 | |
|
2023-05-17 | Million Browser Botnet Matt Johansen | 43:05 | 0 | |
|
2023-05-17 | The Real Cost of Security Wendy Nather | 39:24 | 1 | |
|
2023-05-17 | Blindspots Keynote with Robert Hansen | 39:26 | 0 | |
|
2023-05-17 | Minding The Gap Secure PhoneGap Apps Jack Mannino, Jason Haddix | 42:03 | 0 | |
|
2023-05-17 | User Auth for Winners, how to get it right the first time Karthik Gaekwad | 36:58 | 1 | Guide |
|
2023-05-17 | Cloud Keep Protect your Secrets at Scale Jarret Raim, Matt Tesauro | 41:44 | 0 | |
|
2023-05-17 | View this abstract in your browser PHIL PURVIANCE | 29:15 | 0 | |
|
2023-05-17 | Mobile AppSec Development and Alphabet Soup David Lindner | 42:28 | 1 | |
|
2023-05-17 | We are the Cavalry Why it has to be us & why now Adam Brand | 34:09 | 4 | |
|
2023-05-17 | No More Monkey Business Quality Assurance in Penetration Testing Aaron Estes | 45:39 | 0 | |
|
2023-05-17 | DDOS DOS Attack Classification per Attack Target and Attack Vector Pez Zivic | 32:57 | 1 | |
|
2023-05-17 | OWASP Top Ten Proactive Controls Jim Manico | 49:33 | 1 | |
|
2023-05-17 | Do you have a Scanner, or a Scanning Program Dan Cornell | 46:29 | 0 | |
|
2023-05-17 | Penetration Testing The Other Stuff David Hughes | 52:57 | 1 | |
|
2023-05-17 | Drawing the map Outlining Android permissions mechanism Andrew Reiter | 44:19 | 1 | |
|
2023-05-17 | Practical PKI Steven Bernstein | 39:37 | 0 | |
|
2023-05-17 | Enforcing Authorization with Cryptography Amit Sethi | 26:49 | 1 | |
|
2023-05-17 | Railsgoat Rails attack and defense Ken Johnson, Mike McCabe | 31:57 | 1 | |
|
2023-05-17 | Revenge of the Geeks Hacking Fantasy Sports Sites Dan Kuykendall | 38:26 | 1 | |
|
2023-05-17 | filevincing Your Management, Your Peers, and Yourself That Risk Management Doesn't Suck Josh Sokol | 45:02 | 0 | |
|
2023-05-17 | From Gates to Guardrails Alternate Approaches to Product Security Jason Chan | 45:30 | 0 | |
|
2023-05-17 | Riding the Magical Code Injection Rainbow Daniel Crowley | 43:23 | 0 | |
|
2023-05-17 | Rugged Driven Development with Gauntlt James Wickett | 42:45 | 0 | |
|
2023-05-17 | Hacking NETC Applications The Black Artsv3 Jon Mccoy | 54:19 | 2 | |
|
2023-05-17 | Securing Redis with Sedona Will Urbanski | 27:17 | 1 | |
|
2023-05-17 | Heading Off Trouble Securing Your Web Application with HTTP Headers and X Headers Kevin Babcock | 40:48 | 0 | |
|
2023-05-17 | How Malware Uses and Abuses Your Software Michael Gough, Ian Robertson | 48:26 | 2 | |
|
2023-05-17 | Breach Assessments Are you 0wned You can find out Jessey Bullock, Kevin Dunn | 44:30 | 1 | |
|
2023-05-17 | The State of Crypto in Python | 39:33 | 2 | |
|
2023-05-17 | What Good is this Tool A Guide to Choosing the Right Application Security Testing Tools | 39:44 | 0 | Guide |
|
2023-05-17 | Building a Security Engineering Organization for the Modern World Zane Lackey | 45:40 | 0 | |
|
2023-05-17 | Understanding and Implementing Rugged | 43:54 | 0 | |
|
2023-05-17 | Threat Modeling for Linux Containers LXC, Docker and the Cloud | 22:50 | 1 | |
|
2023-05-17 | Methodology for Creation and Practical Applications of Polyglots | 36:53 | 1 | Vlog |
|
2023-05-17 | Burning Down the Haystack to Find the Needle Walter Johnson, Josh Sokol | 40:41 | 0 | |
|
2023-05-17 | Warning Ahead Security Storms are Brewing in Your JavaScript | 24:02 | 0 | |
|
2023-05-17 | Multi Factor Authentication Weeding Out the Snake Oil YouTube | 43:52 | 1 | |
|
2023-05-17 | Derived Credentials A better user experience for secure applications in the mobile world | 41:25 | 0 | |
|
2023-05-17 | Welcome to the blue team How building a better hacker accidentally built a better defender | 27:11 | 1 | |
|
2023-05-17 | OpenStack API Security Testing Automation in Action | 51:35 | 0 | |
|
2023-05-17 | DevOps, CI, APIs, Oh My Security Gone Agile Matt Tesauro | 45:00 | 0 | |
|