34:19 How Do JavaScript Frameworks Impact The Security Of Applications Ksenia Peguero All Hacking Cons
45:27 Fast Forwarding Mobile Security With The OWASP Mobile Security Testing Guide Jeroen Willemsen All Hacking Cons
41:02 The State Of Credential Stuffing And The Future Of Account Takeovers Jarrod Overson All Hacking Cons
45:37 Mobile Or Attacker Friendly A Security Evaluation Of Mobile First Websites Tom Van Goethem All Hacking Cons
41:02 Security Vulnerabilities Decomposition Another Way To Look At Vulnerabilities Katy Anton All Hacking Cons
40:53 The Insecurity Caused By Trusting Your Client Side Storage Ben Stock and Marius Steffens All Hacking Cons
46:44 Threat Modelling Stories From The Trenches David Johannson and Andrew Lee Thorp All Hacking Cons
46:31 Restricting The Scripts, You're To Blame, You Give CSP A Bad Name Sebastian Roth and Ben Stock All Hacking Cons
44:25 OWASP Based Threat Modelling Creating A Feedback Model In An Agile Environment Chaitanya Bhatt All Hacking Cons
39:51 Web Apps vs Blockchain DApps Smart Contracts Tools, Vulns And Standards Damian Rusinek All Hacking Cons
51:09 Exploiting Hardware Glitches And Side Channels In Perfect Software Herbert Bos All Hacking Cons
39:03 Being Powerful While Powerless Elevating Security By Leading Without Authority Nathan Yee All Hacking Cons
40:55 How Scripting In ZAP Can Bridge The Gap Between Dev Teams And Security Peter Hauschulz All Hacking Cons
33:51 How To Find And Prevent Entire Classes Of Security Vulnerabilities Sam Lanning All Hacking Cons
44:03 Unlikely Allies How HR Can Help Build A Security First Culture Alison Eastaway All Hacking Cons
38:49 ScriptProtect Mitigating Unsafe Third Party JavaScript Practices Marius Musch and Martin Johns All Hacking Cons