42:42 Scaling Security through Context Based Security Asses Andrew Lien, Sanjeev Reddy & Teja Myneedu All Hacking Cons
46:12 Security Design Anti Patterns Creating Awareness to Limit Security Debt Joern Freydank All Hacking Cons
18:21 Normalizing AppSec Issues for Contextual Risk Based Prioritization at Enterprise Scale Moshe Zioni All Hacking Cons
47:36 OWASP cautions against insufficient logging & monitoring What does sufficient l Rob Dickinson All Hacking Cons
45:38 All your Ether are belong to us a k a Hacking Ethereum based DApps Luis Quispe Gonzales All Hacking Cons
47:23 Automating Architectural Risk Analysis with the Open Threat Model format Fraser Scott All Hacking Cons
50:22 SBOM SmackDown Conquer dragons in the shadows with OWASP CycloneDX Steve Springett All Hacking Cons
20:02 Analyzing Google’s SLSA Framework for Securing Software Supply Chains Ronen Slavin All Hacking Cons
50:15 Bots have gone phishing, but all they get is the boot Pedro Fortuna & Jasvir Nagra All Hacking Cons
28:01 Data Driven AppSec Champions Programs Benchmarking Your Program with Numbers John Dickson All Hacking Cons
49:43 Automated Serverless Security Testing Delivering secure apps continuously Tal Melamed All Hacking Cons
37:38 OWASP ZAP & DeepFactor Continuous AppSec Observability Made For Each Other Kiran Kamity All Hacking Cons
52:59 Practical Threat Modeling for real world and Cloud Situations in our hybrid and W Uma Rajagopal All Hacking Cons
48:14 Why checking your infrastructure as code for misconfigurations is not enough How Aakash Shah All Hacking Cons
20:17 How to Use Your Vulnerabilities to Train Your Developers on Security Jared Ablon All Hacking Cons
46:53 Data at Rest Encryption Going Beyond the Basics to Address Modern Attacks Chuck Willis & Wias Issa All Hacking Cons
48:34 Cluster Wrangling How to make Kubernetes clusters secure and usable Rory McCune All Hacking Cons
50:22 SBOM SmackDown Conquer dragons in the shadows with OWASP CycloneDX Steve Springett All Hacking Cons