27:08 Standard Classification Achieving Security by Shifting Left in Agile BHUSHAN B GUPTA All Hacking Cons
30:26 Temporal AppSec Timeline Wins, Failures, Promises, and Predictions Joseph Feiman All Hacking Cons
12:39 Standard Classification Back to Basics Looking for subtle bugs in beginne Cole Cornford All Hacking Cons
28:06 Standard Classification Birds & Buttons Cyber Risk Success Criteria for Board S Tan All Hacking Cons
23:59 Flagship Projects Application Security Verification Standard A van der Stock & J Manico All Hacking Cons
26:15 Standard Classification Introducing graph theory to Policy As Code Barak Schoster All Hacking Cons
22:43 Topics of Interest React Native Security Addressing typical mistakes Julia Potapenko All Hacking Cons
26:00 Topics of Interest AWS misconfiguration from an attacker’s eye view Kavisha Sheth All Hacking Cons
23:54 Topics of Interest Automated Finding Correlation where do SAST, DAST and R Klein • E Worcel All Hacking Cons
23:24 Topics of Interest Five philosophies to building better application logs Veronica Schmitt All Hacking Cons
23:22 Temporal Bot or human Detecting malicious bots with machine Benjamin Fabre • Antoine Vastel All Hacking Cons
20:57 Topics of Interest Security begins with secure development environments V Verma • S Coochin All Hacking Cons
28:59 Standard Classification Good Bot, Bad Bot Characterizing Automated Brows N Nikiforakis All Hacking Cons
25:55 Temporal Looking at 4 years of web honeypot attacks tactics, Malcolm Heath • Raymond Pompon All Hacking Cons
23:23 Standard Classification Security Chaos Engineering Turning the Tide in A Rinehart All Hacking Cons
31:24 Standard Classification API Security Top 10 A Beginner's Guide to Mitigation I Mauny All Hacking Cons
27:26 Temporal Blockchain based Security Framework for Cyber Physical Systems BSF CPS Dr A Vyas All Hacking Cons
27:10 Temporal Code Origin Policy Towards a Formal User Privacy Protection for the Web Phu H Phung All Hacking Cons
24:49 Temporal Over 20 Years of SQL Injection Attacks in the Wild Time to Refine and Or Katz All Hacking Cons
24:43 Topics of Interest An Attackers View on APAC's 2021 Three Major Breaches Ric Campo All Hacking Cons
28:06 Topics of Interest Attacking the microservice systems methods and practical tips A Barabanov All Hacking Cons
29:05 Topics of Interest Kubernetes Security Attacking and Defending K8s Clusters Magno Logan All Hacking Cons
30:18 Topics of Interest Automatic Vulnerability Remediation The Trusted and Secure Road R Elron All Hacking Cons
26:39 Topics of Interest How Security, Development & Testing can work together to stop S Chaplin All Hacking Cons
27:13 Topics of Interest Common Application Security Mistakes that Enable Automated Attacks Jason Kent All Hacking Cons
29:45 Topics of Interest Effective Usage Analysis The Shortest Path Between a Developer R Elron All Hacking Cons
25:51 Topics of Interest All your Ether belong to us Hacking Ethereum based DApps L Q Gonzales All Hacking Cons
24:54 Topics of Interest Security Metrics Protecting Our Digital Assets of the Future Caroline Wong All Hacking Cons
30:29 Topics of Interest Agile Threat Modeling with Open Source Tools Christian Schneider All Hacking Cons
23:39 Standard Classification OWASP Application Gateway What is it and how can you G Frei All Hacking Cons
27:07 Topics of Interest Developers Struggle with Application Security and How to Make S Gerlach All Hacking Cons
27:09 Standard Classification Connecting the Dots How Threat Intelligence Protect C Curelaru All Hacking Cons
28:51 Temporal Redefining Threat Modeling Security team goes on vacation Jeevan Singh All Hacking Cons
26:21 Topics of Interest These are the Vulns You are Looking For AppSec Champions & Jedi J Dickson All Hacking Cons
21:10 Flagship Projects OWASP Cloud Native Application Security Top 10 Flagship Project Ron Vider All Hacking Cons
20:55 Topics of Interest Common NGINX Misconfigurations That Leave Your Web Server Open S Pearlman All Hacking Cons
27:02 Standard Classification DevSecOps in 2031 How robots and humans will S Streichsbier All Hacking Cons
30:14 Temporal Achieving the Web Isolation Nirvana How far along are we Jasvir Nagra • Pedro Fortuna All Hacking Cons
18:49 Flagship Projects OWASP Mobile Security Testing Guide Carlos Holguera & Sven Schleier All Hacking Cons
23:31 Temporal Your company, as a Knowledge Graph the foundation of cybersecurity’s future O Cical All Hacking Cons
29:32 Topics of Interest Creating an IoT connected Mobile App Compliance Program OWASP MASVS B Reed All Hacking Cons
27:55 Temporal The future is simple introducing the CRE Rob van der Veer • Spyros Gasteratos All Hacking Cons
22:44 Temporal Security As Code The New Model Of Achieving Security At Scale Dr Chenxi Wang All Hacking Cons
39:26 Topics of Interest Software Security Engineering Learnings from the past to fix D Mohanty All Hacking Cons
29:53 Standard Classification Fight Club Grow your OWASP Chapter Sam Stepanyan • Tom Brennan All Hacking Cons
28:16 Standard Classification Threat Modeling the CI CD Pipeline to Improve Softwar D Cornell All Hacking Cons
27:55 Standard Classification Stop the looters method to detect digital skimming a N Alexiou All Hacking Cons
29:15 Standard Classification Everything You Always Wanted to Know About Finge N Nikiforakis All Hacking Cons
32:10 Topics of Interest Using binary search algorithms for blind sql injection Juan Pablo Quiñe Paz All Hacking Cons
26:05 Topics of Interest Your code might be secure, but what about your pipeline M Szydłowski All Hacking Cons
22:34 Topics of Interest vAPI Vulnerable Adversely Programmed Interface OWASP API Top 10 T Kulkarni All Hacking Cons