Sched.com Conference Mobile Apps
AppSecUSA 2012
has ended
Create Your Own Event
AppSecUSA 2012
Schedule
Simple
Expanded
Grid
By Venue
Speakers
Attendees
Search
or browse by date + venue
Architecture
Attack
Case Studies
Cloud
Conference Event
Developer
Keynote
Mobile
Reverse Engineering
Rugged DevOps
Popular
menu
Menu
Schedule
Speakers
Attendees
Search
Popular Events
#1
KEYNOTE: Securing JavaScript by Douglas Crockford
#2
Lunch and Speed Debates
#3
LASCON Style Happy Hour
#4
Secure Code Reviews Magic or Art? A Simplified Approach to Secure Code Reviews
#5
Top Ten Web Defenses
#6
Special Sneak Preview of the REBOOT Film
#7
Rebooting (secure) software development with continuous deployment
#8
Put your robots to work: security automation at Twitter
#9
Analyzing and Fixing Password Protection Schemes
#10
AppSec Training, Securing the SDLC, WebGoat.NET and the Meaning of Life
#11
Reverse Engineering “Secure” HTTP APIs With An SSL Proxy
#12
DevOps Distilled: The DevOps Panel at AppSec USA
#13
Hacking with WebSockets
#14
Gauntlt: Rugged by Example
#15
Demystifying Security in the Cloud: AWS Scout
#16
Exploiting Internal Network Vulns via the Browser using BeEF Bind
#17
Building a Web Attacker Dashboard with ModSecurity and BeEF
#18
Cracking the Code of Mobile Application
#19
Hacking .NET Application: Reverse Engineering 101
#20
The Diviner - Digital Clairvoyance Breakthrough - Gaining Access to the Source Code & Server Side Memory Structure of ANY Application (OWASP ZAP extension)
#21
Mobile Applications & Proxy Shenanigans
#22
How we tear into that little green man
#23
WTF - WAF Testing Framework
#24
Bug Bounty Programs
#25
I>S+D! - Interactive Application Security Testing (IAST), Beyond SAST/DAST
#26
Cross Site Port Scanning
#27
KEYNOTE: Some Lessons from the Trenches by Michael Howard
#28
KEYNOTE: The State of OWASP
#29
Lunch and WASPY Awards
#30
Closing Remarks and Prizes
#31
Why Web Security Is Fundamentally Broken
#32
Real World Cloud Application Security
#33
XSS & CSRF with HTML5 - Attack, Exploit and Defense
#34
Effective approaches to web application security
#35
Blended Threats and JavaScript: A Plan for Permanent Network Compromise
#36
The 7 Qualities of Highly Secure Software
#37
The Magic of Symbiotic Security: Creating an Ecosystem of Security Systems
#38
The Same-Origin Saga
#39
Four Axes of Evil
#40
SQL Server Exploitation, Escalation, and Pilfering
#41
Get off your AMF and don’t REST on JSON
#42
Using Interactive Static Analysis for Early Detection of Software Vulnerabilities
#43
Counterintelligence Attack Theory
#44
Spin the bottle: Coupling technology and SE for one awesome hack
#45
Web Framework Vulnerabilities
#46
Security at Scale
#47
Iran's real life cyberwar
#48
NoSQL, no security?
#49
Payback on Web Attackers: Web Honeypots
#50
Securing the SSL channel against man-in-the-middle attacks: Future technologies - HTTP Strict Transport Security and Pinning of Certs
Popular by Type
All Types
Architecture
Attack
Case Studies
Cloud
Conference Event
Developer
Keynote
Mobile
Reverse Engineering
Rugged DevOps
Popular by Day
All days
Thursday, Oct 25
Friday, Oct 26
Recently Active Attendees
Jeremiah Shirk
Steve Springett
Fabio Cerullo
Brett Roderick
Josh Sokol
Maty Siman
Dan Cornell
John Kent
More →