• Most recent
  • Conferences
  • For organizers
  • The rig
  • Buy me a Mate
  • Search
  • Fundraiser
  • Bluesky
  • Lisbon
  • Dublin
  • Amsterdam
Edition logo

OWASP Global AppSec Lisbon

2024-06-27 - 2024-06-28
  • Thumbnail for the video - click to play

    ►

    Will Machine Learning Replace The WAF?
    - John Graham-Cumming
  • Thumbnail for the video - click to play

    ►

    AI Package Hallucination: Spreading Malicious Packages Using Generative AI
    - Bar Lanyado
  • Thumbnail for the video - click to play

    ►

    OWASP ModSecurity
    - Ervin Hegedüs
  • Thumbnail for the video - click to play

    ►

    Paved Roads To Express RBAC In Threat Models
    - Eden Yardeni
  • Thumbnail for the video - click to play

    ►

    A Race To The Bottom: Database Transactions Undermining Your AppSec
    - Viktor Chuchurski
  • Thumbnail for the video - click to play

    ►

    Tracking And Hacking Your Career
    - Leif Dreizler & Misha Yalavarthy
  • Thumbnail for the video - click to play

    ►

    OWASP IoT Security Testing Guide (ISTG)
    - Luca Pascal Rotsch
  • Thumbnail for the video - click to play

    ►

    Back To The Future: Old Tricks Invading A New Attack Surface
    - Uriya Elkayam
  • Thumbnail for the video - click to play

    ►

    OWASP Mobile Application Security (MAS)
    - Sven Schleier & Carlos Holguera
  • Thumbnail for the video - click to play

    ►

    From Zero To Hero: Rollout Your Hardcoded Secrets Detection And Prevention With Minimal Effort And Maximum Impact!
    - Yassine Ilmi & Arbër Salihi
  • Thumbnail for the video - click to play

    ►

    Modern Appsec vs. GenAI Application: Is Your Appsec Ready?
    - Balachandra Shanabhag
  • Thumbnail for the video - click to play

    ►

    Security Champions And Experiments: Building Blocks For Cultural Change
    - Mads Andersen
  • Thumbnail for the video - click to play

    ►

    Gridlock: The Dual-Edged Sword Of EV And Solar APIs In Grid Security
    - Vangelis Stykas
  • Thumbnail for the video - click to play

    ►

    OWASP DefectDojo
    - Matt Tesauro
  • Thumbnail for the video - click to play

    ►

    OWASP Privacy Toolkit: Bringing Privacy Awareness In The Digital Age
    - Stefano Di Paola & Martino Lessio
  • Thumbnail for the video - click to play

    ►

    Start Covering Your Bases And Stop Chasing APT Headlines
    - Avishay Zawoznik
  • Thumbnail for the video - click to play

    ►

    Cryptographic Governance: Software Supply Chain Security With CBOM
    - Nicklas Körtge
  • Thumbnail for the video - click to play

    ►

    OWASP Open Common Requirement Enumeration (OpenCRE)
    - Spyros Gasteratos & Paola Garcia Cardenas
  • Thumbnail for the video - click to play

    ►

    Hacker Traction Through GitHub Actions: Is Your (Open Source) Project Safe?
    - Stephen Giguere
  • Thumbnail for the video - click to play

    ►

    OWASP Low-Code/No-Code Top 10 (LCNC)
    - Michael Bargury
  • Thumbnail for the video - click to play

    ►

    API Security By Design
    - Jose Haro Peralta
  • Thumbnail for the video - click to play

    ►

    Transitive Vulnerabilities Exploit In Real-life
    - Liad Cohen & Eyal Paz
  • Thumbnail for the video - click to play

    ►

    Maturing SDLC At A Fortune 500 Company Based On OWASP SAMM: Successes And Pitfalls
    - Jasyn Voshell
  • Thumbnail for the video - click to play

    ►

    Leaders Meeting
    - OWASP Leaders
  • Thumbnail for the video - click to play

    ►

    In The Same Site We Trust: Navigating The Landscape Of Client- Side Request Hijacking On The Web
    - Soheil Khodayari
  • Thumbnail for the video - click to play

    ►

    Automating Security Test Cases Based On ASVS
    - Aram Hovsepyan
  • Thumbnail for the video - click to play

    ►

    DOM Jungle - Can We Trust The UI?
    - Gal Weizman
  • Thumbnail for the video - click to play

    ►

    What Makes Them Happy? Leveraging Psychological Needs For Building A Security Culture Amongst Developers
    - Juliane Reimann
  • Thumbnail for the video - click to play

    ►

    Trust Cards For AI
    - Isabel Praça
  • Thumbnail for the video - click to play

    ►

    AI Is Just Software, What Could Possibly Go Wrong?
    - Rob Van Der Veer
  • Thumbnail for the video - click to play

    ►

    Malice In Chains: Supply Chain Attacks Using Machine Learning Models
    - Tom Bonner & Marta Janus
  • Thumbnail for the video - click to play

    ►

    OWASP Coraza Web Application Firewalls Revisited
    - José Carlos Chávez
  • Thumbnail for the video - click to play

    ►

    Traceability In Cyber Security: Lessons Learned From The Medical Sector
    - Dr Konstantinos Papapanagiotou
  • Thumbnail for the video - click to play

    ►

    What Can Traditional Web App Security Learn From Browser Wallet Extensions?
    - Gal Weizman
  • Thumbnail for the video - click to play

    ►

    Winning Buy-In: Mastering The Art Of Communicating Security To Management
    - Ida Hameete
  • Thumbnail for the video - click to play

    ►

    OWASP Dependency Track Fortifying The Supply Chain
    - Aravind Parappil & Vinod Anandan
  • Thumbnail for the video - click to play

    ►

    From Theory To Practice: Navigating The Challenges Of Vulnerability Research
    - Raphael Silva
  • Thumbnail for the video - click to play

    ►

    OWASP Cornucopia
    - Johan Sydseter
  • Thumbnail for the video - click to play

    ►

    I Can’t Cope! How OWASP Is Helping To Manage Vulnerability Overload
    - Anthony Harrison
  • Thumbnail for the video - click to play

    ►

    Cloud-Squatting: The Never-ending Misery Of Deleted And Forgotten Cloud Assets
    - Abdullah Al-Sultani
  • Thumbnail for the video - click to play

    ►

    5 AppSec Stories, And What We Can Learn From Them
    - Paul Molin
  • Thumbnail for the video - click to play

    ►

    Exploiting Client-Side Path Traversal: CSRF Is Dead, Long Live CSRF
    - Maxence Schmitt
  • Thumbnail for the video - click to play

    ►

    OWASP Software Assurance Maturity Model (SAMM) Interactive Introduction And Update
    - Seba Deleersnyder & Bart De Win
  • Thumbnail for the video - click to play

    ►

    Assessing 3rd Party Libraries More Easily With Security Scorecards
    - Niels Tanis
  • Thumbnail for the video - click to play

    ►

    XZ Backdoor: Navigating The Complexities Of Supply Chain Attacks Detected By Accident
    - Yoad Fekete
  • Thumbnail for the video - click to play

    ►

    Harnessing Nature's Wisdom: Growing A Security Champion Program Into A Security Powerhouse
    - Bonnie Viteri
  • Thumbnail for the video - click to play

    ►

    OWASP Dep-scan
    - Prabhu Subramanian
  • Thumbnail for the video - click to play

    ►

    How (Not) To Implement Secure Digital Identity: Case Study Of Poland's Digital ID System
    - Szymon Chadam
  • Thumbnail for the video - click to play

    ►

    OWASP Developer Guide
    - Shruti Kulkarni
  • Thumbnail for the video - click to play

    ►

    Designing Security And Privacy: A Developer's Guide To Threat Modeling With OWASP SAMM
    - Seba Deleersnyder
  • Thumbnail for the video - click to play

    ►

    Dawn Of The Dead: The Tale Of The Resurrected Domains
    - Pedro Fortuna
  • Thumbnail for the video - click to play

    ►

    Building An Effective Application Penetration Testing Team
    - Ryan Armstrong
  • Thumbnail for the video - click to play

    ►

    OWASP SamuraiWTF
    - Kevin Johnson
  • Thumbnail for the video - click to play

    ►

    OWASP Top-25 Parameters
    - Lütfü Mert Ceylan
  • Thumbnail for the video - click to play

    ►

    Token It Up A Notch: Elevating Payment Security
    - Yadi Abdalhalim & Jovon Itwaru
  • Thumbnail for the video - click to play

    ►

    Securing The Gateway And Mitigating Risks In LLM API Integration
    - Ayush Agarwal & Avneesh Hota
  • Thumbnail for the video - click to play

    ►

    'The Rise And Fall' Of ModSecurity And The OWASP Core Rule Set
    - Davide Ariu
  • Thumbnail for the video - click to play

    ►

    Build Strong Defenses By Participating In Standards!
    - Daniel Ehrenberg
  • Thumbnail for the video - click to play

    ►

    OWASP API Security Project
    - Paulo Silva & Erez Yalon
  • Thumbnail for the video - click to play

    ►

    Deterministic GenAI Outputs With Provenance
    - Dinis Cruz
  • Thumbnail for the video - click to play

    ►

    Closing Ceremony And Raffle
    - OWASP Board