Sign up or log in to bookmark your favorites and sync them to your phone or calendar.
Define and Execute Your Product Security Strategy With OWASP SAMM 2 09:00 - 12:00
Intro to Hacking Web Applications 13:00 - 16:00
Threat Modelling with the OWASP Mobile Top 10 09:00 - 11:00
Android Mobile Hacking Workshop 11:15 - 13:15
iOS Mobile Hacking Workshop 14:15 - 16:15
Hacking AWS Account Under the Radar 09:30 - 10:15
Using OWASP Nettacker For Recon and Vulnerabilit... 10:30 - 11:15
Building Products with Privacy and Trust as a Ba... 11:30 - 12:15
OWASP SAMM 2: Your Dynamic Software Security Jou... 12:30 - 13:15
CSP is broken, let’s fix it 13:30 - 14:15
Dev, Sec, Oops: How Agile Security increases Att... 14:30 - 15:15
GraphQL APIs from bug hunter's perspective 15:30 - 16:15
Tag soup – food for mXSS 16:30 - 17:15
Privacy & prejudice: on privacy threat modeling... 17:30 - 18:15
Security Facts and Fallacies about Browser Stora... 10:00 - 10:45
Use the OWASP Threat Modeling Playbook to Improv... 11:00 - 11:45
Architect of threat landscape: How to secure you... 12:00 - 12:45
Building better security for your API platform u... 13:00 - 13:45
Find bugs faster with fuzzing 14:00 - 14:45
Learn race conditions in web apps with OWASP Tim... 16:00 - 16:45
Securing Docker runtime with DockerENT 17:00 - 17:45
Keynote: Lior Manor the Cyber Me... 09:00 - 09:30