Sched.com Conference Mobile Apps
OWASP AppSec Europe 2015
has ended
Create Your Own Event
OWASP AppSec Europe 2015
Schedule
Simple
Expanded
Grid
By Venue
Speakers
Attendees
Search
or browse by date + venue
1-day training
2-days training
Activity
CISO talk
Dev talk
Hack talk
HackPra
Hands-On
Keynote
Misc
Ops talk
OWASP
Project Summit
Popular
menu
Menu
Schedule
Speakers
Attendees
Search
Popular Events
#1
Registration
#2
50 Shades of AppSec
#3
Opening ceremony
#4
Closing ceremony
#5
Continuous Acceleration: Why Continuous Everything Requires A Supply Chain Approach
#6
The Top 10 Web Hacks of 2014
#7
Server-Side Browsing Considered Harmful
#8
Bringing Security Testing To Development: How To Enable Developers To Act As Security Experts
#9
HTTPS Is Better than Ever Before. Now It's Your Turn.
#10
Red Team, Blue Team Or White Cell? Trends In IT And How They Force Securtiy To Behave As An Immune System
#11
OWASP ZAP: More Advanced Features
#12
The API Assessment Primer
#13
Lessons From DevOps: Taking DevOps Practices Into Your AppSec Life
#14
XSS Horror Show
#15
The Node.js Highway: Attacks Are At Full Throttle
#16
Rise Of The Machines - How Automated Processes Overtook the Web
#17
OWASP Top 10 Privacy Risks
#18
Client-Side Protection Against DOM-Based XSS Done Right
#19
"Web Service Workers - Breaking The Web Because It Would Be A Shame To See Such A Cool Feature Go Unused"
#20
From Zero To Hero - Or How OWASP Saved My Holiday
#21
Room switch
#22
Room switch
#23
Room switch
#24
If 6,000 Mobile Malware Applications Could Talk! Ow, They Do, And A Lot!
#25
Room switch
#26
"Copy & Pest - A Case Study On The ClipBoard, Blind Trust And Invisible Cross-Application XSS
#27
Security Policy Management: Easy as PIE
#28
Security is Part Of The DNA Of A Defense Organization
#29
Opening ceremony
#30
Securing The Internet Of Things
#31
The Software Not The Human Is The Weakest Link
#32
Security DevOps - Staying Secure In Agile Projects
#33
Security And Insecurity Of HTTP Headers
#34
Agile Security Testing - Lessons Learned
#35
Closing ceremony
#36
E-Banking Transaction Authorization - Common Vulnerabilities, Security Verification And Best Practices For Implementation
#37
So, You Want To Use A WebView?
#38
Registration
#39
BeEF: A Penetration Testing Tool That Focuses On The Web Browser
#40
Room switch
#41
Using A JavaScript CDN That Can Not XSS You - With Subresource Integrity
#42
Can Saas Ever Be Secure?
#43
Room switch
#44
Mobile Application Assessments By The Numbers: A Whole-istic View
#45
Room switch
#46
PDF - Mess With The Web
#47
Security And "Modern" Software Deployment
#48
Room switch
#49
WebRTC, Or How Secure Is P2P Browser Communication?
#50
Finding Bad Needles On A Worldwide Scale
Popular by Type
All Types
1-day training
2-days training
Activity
CISO talk
Dev talk
Hack talk
HackPra
Hands-On
Keynote
Misc
Ops talk
OWASP
Project Summit
Popular by Day
All days
Tuesday, May 19
Wednesday, May 20
Thursday, May 21
Friday, May 22
Recently Active Attendees
OWASP Foundation
C
CliffordKF
H
HKRodney
G
GYChong
Y
YVPatrick
N
NVChad
H
HarryBP
Rory Mccune
More →