• Most recent
  • Conferences
  • For organizers
  • The rig
  • Buy me a Mate
  • Search
  • Fundraiser
  • Twitter
  • Dublin
  • Amsterdam
Edition logo

OWASP Global AppSec Amsterdam

2019-09-26 - 2019-09-27
  • Thumbnail for the video - click to play

    ►

    Opening Remarks
    - Global AppSec Crew
  • Thumbnail for the video - click to play

    ►

    The House Is Built On Sand: Exploiting Hardware Glitches And Side Channels In Perfect Software
    - Herbert Bos
  • Thumbnail for the video - click to play

    ►

    Attacking AWS: The Full Cyber Kill Chain
    - Pawel Rzepa
  • Thumbnail for the video - click to play

    ►

    Controlled Mayhem With Cloud Native Security Pipelines
    - Ben Pick
  • Thumbnail for the video - click to play

    ►

    Practical OWASP CRS In High Security Settings
    - Christian Folini
  • Thumbnail for the video - click to play

    ►

    OWASP Based Threat Modelling: Creating A Feedback Model In An Agile Environment
    - Chaitanya Bhatt
  • Thumbnail for the video - click to play

    ►

    Security Vulnerabilities Decomposition: Another Way To Look At Vulnerabilities
    - Katy Anton
  • Thumbnail for the video - click to play

    ►

    The Zest Of ZAP: How Scripting In Our Favorite Tool Can Bridge The Gap Between Dev Teams And Security
    - Peter Hauschulz
  • Thumbnail for the video - click to play

    ►

    Knative Security Pipelines
    - Spyros Gasteratos
  • Thumbnail for the video - click to play

    ►

    WebAuthn: Strong Authentication vs Privacy vs Convenience
    - Suby Raman
  • Thumbnail for the video - click to play

    ►

    Choosing The Right Static Code Analyzers Based On Hard Data
    - Chris Horn
  • Thumbnail for the video - click to play

    ►

    OWASP SAMM2: Your Dynamic Software Security Journey
    - Sebastien Deleersnyder
  • Thumbnail for the video - click to play

    ►

    Web Apps vs Blockchain DApps (Smart Contracts): Tools, Vulns And Standards
    - Damian Rusinek
  • Thumbnail for the video - click to play

    ►

    Being Powerful While Powerless: Elevating Security By Leading Without Authority
    - Nathan Yee
  • Thumbnail for the video - click to play

    ►

    Secure Agile Development According To SAMM
    - Rob Van Der Veer
  • Thumbnail for the video - click to play

    ►

    Threat Modelling Stories From The Trenches
    - David Johannson and Andrew Lee-Thorp
  • Thumbnail for the video - click to play

    ►

    The Now And The Future Of Malicious WebAssembly
    - Marius Musch
  • Thumbnail for the video - click to play

    ►

    Mobile-Friendly Or Attacker-Friendly? A Large- Scale Security Evaluation Of Mobile-First Websites
    - Tom Van Goethem
  • Thumbnail for the video - click to play

    ►

    Modern And Secure IAM For Modern Applications
    - Vinod Anandan
  • Thumbnail for the video - click to play

    ►

    OWASP Docker Top 10
    - Dirk Wetter
  • Thumbnail for the video - click to play

    ►

    Securing The Future
    - Mikko Hypponen
  • Thumbnail for the video - click to play

    ►

    The Woman Who Squashed Terrorists: When An Embassy Gets Hacked
    - Chris Kubecka
  • Thumbnail for the video - click to play

    ►

    Restricting The Scripts, You're To Blame, You Give CSP A Bad Name
    - Sebastian Roth and Ben Stock
  • Thumbnail for the video - click to play

    ►

    SUSTO: Systematic Universal Security Testing Orchestration
    - Luis Saiz
  • Thumbnail for the video - click to play

    ►

    Unlikely Allies: How HR Can Help Build A Security-First Culture
    - Alison Eastaway
  • Thumbnail for the video - click to play

    ►

    Don't Trust The Locals: Evaluating And Mitigating The Insecurity Caused By Trusting Your Client-Side Storage
    - Ben Stock and Marius Steffens
  • Thumbnail for the video - click to play

    ►

    How Do JavaScript Frameworks Impact The Security Of Applications?
    - Ksenia Peguero
  • Thumbnail for the video - click to play

    ►

    Do Certain Types Of Developers Or Teams Write More Secure Code?
    - Anita Damico
  • Thumbnail for the video - click to play

    ►

    HTTP Desync Attacks: Smashing Into The Cell Next Door
    - James Kettle
  • Thumbnail for the video - click to play

    ►

    [In]secure Deserialization, And How [Not] To Do It
    - Alexei Kojenov
  • Thumbnail for the video - click to play

    ►

    The Security We Need: Designing Usable IoT Security
    - Damilare D. Fagbemi
  • Thumbnail for the video - click to play

    ►

    The State Of Credential Stuffing And The Future Of Account Takeovers
    - Jarrod Overson
  • Thumbnail for the video - click to play

    ►

    No More Whack-A-Mole: How To Find And Prevent Entire Classes Of Security Vulnerabilities
    - Sam Lanning
  • Thumbnail for the video - click to play

    ►

    ScriptProtect: Mitigating Unsafe Third-Party JavaScript Practices
    - Marius Musch and Martin Johns
  • Video will not be published
    Making The Web Secure, By Design ++
    - Glenn Ten Cate and Riccardo Ten Cate
  • Thumbnail for the video - click to play

    ►

    Breaches Are Everywhere. What’s A Good Security Leader To Do?!
    - Richard Greenberg
  • Thumbnail for the video - click to play

    ►

    Five Key Trends In Application Security
    - Ameya Talwalkar
  • Thumbnail for the video - click to play

    ►

    How To Learn (And Teach) Hacking
    - Ruben Gonzalez
  • Thumbnail for the video - click to play

    ►

    Fast Forwarding Mobile Security With The OWASP Mobile Security Testing Guide
    - Jeroen Willemsen
  • Thumbnail for the video - click to play

    ►

    How I Could Have Stolen Your Photos From Google
    - Gergo Turcsanyi
  • Thumbnail for the video - click to play

    ►

    An Infosec Timeline: Noteworthy Events From 1970 To 2050
    - Mario Heiderich
  • Thumbnail for the video - click to play

    ►

    Closing Remarks
    - Global AppSec Crew