Sched.com Conference Mobile Apps
AppSec USA 2017 has ended
Create Your Own Event
AppSec USA 2017
Schedule
Simple
Expanded
Grid
By Venue
Speakers
Attendees
Search
or browse by date + venue
1-day training
2-day training
Activity
Breaker
Builder
Defender
Developer Summit
DevOpsSec
Exhibit
IOT/Mobile/Cloud
KeyNote
Members Lounge
Networking
Project Summit
All
Projects
Registration
Store
WASPY Awards
Popular
menu
Menu
Log in
Sign up
Schedule
Speakers
Attendees
Search
Popular Events
#1
KeyNote - Discussion on Application Security: John Steven and Jim Manico will be discussing application security from a unique perspective.
#2
KeyNote - Runa A. Sandvik: Building a Culture of Security at The New York Times
#3
Conference Dinner
#4
Lunch
#5
KeyNote - Tony UcedaVelez: Fixing Broken Enterprise Threat Models w/ OWASP Measures: Commissioning AppSec Professionals for Real Change
#6
Top 10 Security Best Practices to secure your Microservices
#7
Welcome Note
#8
Lunch
#9
Moving Fast and Securing Things
#10
Friday the 13th: Attacking JSON
#11
Building a Secure DevOps Pipeline
#12
An Overview of API Underprotection
#13
Afternoon Coffee Break
#14
Cookie Security – Myths and Misconceptions
#15
Monitoring Application Attack Surface and Integrating Security into DevOps Pipelines
#16
Closing Note
#17
Morning Coffee Break
#18
Morning Coffee Break
#19
DevSecOps is real - What we learned by matching our appsec testing to our continuous release cycles
#20
Handling of Security Requirements in Software Development Lifecycle
#21
Practical Dynamic Application Security Testing within an Enterprise
#22
“Capture the Flag” for Developers: Upping your Training Game
#23
Pre-Conference Reception
#24
Leveraging the ASVS in the Secure SDLC
#25
Measuring End-to-End Security Engineering
#26
Application Security “Built from Scratch”
#27
Juggling the Elephants – Making AppSec a Continuous Program
#28
Test Driven Security in the DevOps pipeline
#29
Afternoon Coffee Break
#30
How to stop worring about application Container security
#31
HUNT: Data Driven Web Hacking & Manual Testing
#32
WASPY Award Ceremony
#33
NoSQL Is Not NoVulnerable
#34
Common Developer Crypto Mistakes (with illustrations in Java)
#35
WAFs FTW! A modern devops approach to security testing your WAF
#36
Where we’re going… we won’t need passwords…
#37
Leveraging Blockchain for Identity and Authentication in IoT is good for Security
#38
An Investigation into the Differences Between Web Application Scanning Tools when Scanning for XSS and SQLi
#39
Overcoming Mobile App Security Challenges with DevOps
#40
When Molehill Vulnerabilities Become Mountainous Exploits
#41
Beyond End-to-End Encryption: Threats Models For Secure Messaging
#42
Registration
#43
DASTProxy: Don’t let your automated security testing program stall on crawl. Instead focus on business context.
#44
Exhibit
#45
Popular Approaches to Preventing Code Injection Attacks are Dangerously Wrong
#46
Making Vulnerability Management Less Painful with OWASP DefectDojo
#47
Passive Fingerprinting of HTTP/2 Clients
#48
Exhibit
#49
How to detect CSRF vulnerability, reliably?
#50
Beyond Takeover – Attacker’s in. Now what?
Popular by Type
All Types
1-day training
2-day training
Activity
Breaker
Builder
Defender
Developer Summit
DevOpsSec
Exhibit
IOT/Mobile/Cloud
KeyNote
Members Lounge
Networking
Project Summit
Registration
Store
WASPY Awards
Popular by Day
All days
Tuesday, Sep 19
Wednesday, Sep 20
Thursday, Sep 21
Friday, Sep 22
Recently Active Attendees
R
rimmfus
G
godddrav
G
gosurani
D
DJRoderick
P
PedroNN
V
VFGonzalo
R
RNS_MO
R
RodneyMY
More →