47:38 Election Security The post pandemic acceleration of secure web based voting Anita D'Amico Panel All Hacking Cons
50:45 Weakest in the herd EoL software and a journey to secure it Anuprita Patankar & Aastha Sahni All Hacking Cons
32:07 Using the OWASP Top 10 As The Foundation for Security and Privacy Programs Across Your Organization All Hacking Cons
45:16 Eradicating Vulnerability Classes by Shelving SAST and Embracing Secure Defaults and Invariants Is All Hacking Cons
31:21 A Dancefloor that is Literally Just Banana Peels AppSec Awareness Program Pitfalls Eugene Rojavs All Hacking Cons
45:46 Time for a Change Why It's More Important Than Ever to Revisit the CFAA Casey Ellis All Hacking Cons
32:44 OWASP Top 10 Maturity Categories for Security Champions Lucian Corlan & Gareth Dixon All Hacking Cons
28:53 Social Media Botnet Detection with Linkage Analysis and Machine Learning Rundong Liu All Hacking Cons
32:37 Understanding the Threats and Attacks on Data Science Applications and Models Abraham Kang All Hacking Cons
20:24 Does diversity really have an impact on software and security teams Anita D'Amico All Hacking Cons
1:06:37 Keynote Presentation Blinded by the weakest link A New Perspective on Human Risk Masha Sedova All Hacking Cons
14:21 Detecting session hijacking using rotating refresh tokens in web applications Rishabh Poddar All Hacking Cons
23:27 Insider Threat Detection & Automation by Behaviour Analytics Hima Bindu Vejella All Hacking Cons
33:10 Overwhelmed by Vulnerability Triage Hear a Blend of Finest Best Practices Eduardo Silva & Jorge All Hacking Cons
32:00 Learn to Exploit TOCTOU Race Condition Vulnerabilities with OWASP TimeGap Theory Abhi Balakrishnan All Hacking Cons
46:02 Keynote Presentation Survive Your Nightmare Security Incident and Thrive Again Coleen Coolidg All Hacking Cons
37:45 WAFs WAFs We don't need no Stinkin' WAFs Extending WAFs at the Application Layer Bernardo San All Hacking Cons
43:54 How the latest MASVS & MSTG Specs Make the Best Mobile Pen Testing Cocktails Brian Reed & Tony Ram All Hacking Cons
44:06 Real Time Vulnerability Alerting by Using Principles from the United States Tsunami Warning Center All Hacking Cons
19:15 Measure and Improve Software Supply Chain Assurance with OWASP SCVS Steve Springett & JC Herz All Hacking Cons
53:55 Yes, you too can break crypto Exploiting common crypto mistakes Alexei Kojenov All Hacking Cons