Here are the videos and slide decks of almost all presentations.
Video | Slides | Presentation title | |
---|---|---|---|
Wednesday, June 25 | |||
360p 720p | deck | Keynote – Fighting Next-Generation Adversaries with Shared Threat Intelligence | |
- | OWASP Board Presentation | ||
360p 720p | deck | Cloud-based Detection Techniques for Botnets and Other Malware | |
- | deck | eXtend Security on Xcode | |
360p 720p | deck | Biting into the Forbidden Fruit. Lessons from Trusting JavaScript Crypto. | |
360p 720p | deck | Monitoring Web Sites for Malware Injection with WebDetector | |
360p 720p | deck | Intent on Being a Good Android Citizen? | |
360p 720p | deck | OWASP Security Shepherd – Mobile/Web Security Awareness and Education | |
- | - | Defending TCP Against DoS Attacks | |
360p 720p | deck | OWASP Mobile Top Ten 2014 – The New “Lack of Binary Protection” Category # | |
360p 720p | - | OWASP Hackademic: Towards an Educational Ecosystem for Application Security | |
360p 720p | deck | OWASP ZAP: Advanced Features | |
360p 720p | deck | Smart Storage Scanning for Mobile Apps – Attacks and Exploit | |
360p 720p | - | Relax everybody, HTML5 is much securer than you think | |
360p 720p | - | Getting New Actionable Insights by Analyzing Web Application Firewall Triggers | |
360p 720p | - | Getting a Handle on Mobile Security | |
360p 720p | deck | OWASP – CISO Survey Report 2013 – Tactical Insights for Managers | |
360p 720p | deck | Use of Netflow/IPFix Botnet Detection Tools to Determine Placement for Autonomous VM’s | |
360p 720p | - | Wait, Wait! Don’t pwn Me! | |
360p 720p | deck | PCI DSS and Secure Applications | |
360p 720p | Keynote – CopperDroid: On the Reconstruction of Android Malware Behaviors | ||
Thursday, June 26 | |||
360p 720p | - | Keynote – Anonymous Communications and Tor: History and Future Challenges | |
360p 720p | deck | DevOps, CI, APIs, Oh My!: Security Gone Agile | |
360p 720p | deck | Hybrid Analysis Mapping: Making Security and Development Tools Play Nice Together | |
360p 720p | deck | OpenSAMM Best Practices: Lessons from the Trenches | |
360p 720p | deck | Warning Ahead: Security Storms are Brewing in Your JavaScript | |
360p 720p | deck | Continuous Security Testing in a Devops World | |
360p 720p | deck | Making CSP Work For You | |
360p 720p | - | 25 Million Flows Later – Large-scale Detection of DOM-based XSS | |
360p 720p | deck | ActiveScan++: Augmenting manual testing with attack proxy plugins | |
360p 720p | deck | Threat Modeling – A Brief History and the Unified Approach at Intuit | |
360p 720p | deck | Metro down the Tube. Security Testing Windows Store Apps | |
360p 720p | deck | Barbican: Protect your Secrets at Scale | |
360p 720p | deck | A non-trivial task of Introducing Architecture Risk Analysis into the Software Development Process | |
360p 720p | deck | Can Application Security Training Make Developers Build Less Vulnerable Code? | |
360p 720p | - | Freedom Issues for Websites | |
360p 720p | deck | Automatic Detection of Inadequate Authorization Checks in Web Applications | |
360p 720p | deck | Shameful Secrets of Proprietary Network Protocols | |
360p 720p | deck | Security Implications of Cross-Origin Resource Sharing | |
360p 720p | deck | Keynote – Reflections on Scoping Trust | |
360p 720p |
- | Conference Closing Ceremony |