35:49 Or Katz, Ezra Caltum Maliciously Monetizing AppSec Feature Its All About The Money All Hacking Cons
49:49 L Desmet, M Johns WebRTC, Or How Secure Is P2P Browser Communication BAD AUDIO All Hacking Cons
46:55 Joshua Corman Continuous Acceleration Why Continuous Everything Requires A Suppl All Hacking Cons
39:40 Martin Johns, Sebastian Lekies, Ben Stock Client Side Protection Against DOM Base All Hacking Cons
45:05 Matt Tesauro Lessons From DevOps Taking DevOps Practices Into Your AppSec Life All Hacking Cons
40:53 Carsten Huth, Nadim Barsoum, Dawid Sroka Security Touchpoints When Acquiring Soft All Hacking Cons
44:51 Achim D Brucker Bringing Security Testing To Development How To Enable Develop All Hacking Cons
46:10 Aaron Weaver Building An AppSec Pipeline Keeping Your Program, And Your Life, Sane All Hacking Cons
41:40 Matias Madou, Daan Raman If 6,000 Mobile Malware Applications Could Talk Ow, The All Hacking Cons
31:52 Wojtek Dworakowski E Banking Transaction Authorization Common Vulnerabilities, All Hacking Cons
46:09 Tobias Gondrom, Jaya Baloo, Dr Melanie Rieback, Dhillon Andrew Kannabhiran Women All Hacking Cons
34:49 Frederik Braun Using A JavaScript CDN That Can Not XSS You With Subresource Int All Hacking Cons
45:16 Mario Heiderich Copy Pest A Case Study On The ClipBoard, Blind Trust And Invis All Hacking Cons
30:27 Eduardo Vela Nava Web Service Workers Breaking The Web Because It Would Be A Sh All Hacking Cons