Sched.com Conference Mobile Apps
AppSec Europe 2018
has ended
Create Your Own Event
AppSec Europe 2018
-
Saved To
My Schedule
***Content is subject to change.***
Schedule
Simple
Expanded
Grid
By Venue
Speakers
Sponsors
Attendees
Event Map
Search
or browse by date + venue
Activity
Break
CISO
Developer
DevOps
Hacker
Keynote Speaker
Member Lounge
Open Remarks
Pre-Conference Network Gathering
Training 1 day
Training 2 days
Training 3 days
Popular
menu
Menu
Schedule
Speakers
Sponsors
Attendees
Event Map
Search
Popular Events
#1
The Perimeter Has Been Shattered: Attacking and Defending Mobility and IoT on the Enterprise Network
#2
Winning - the future perspective in the next 20 years!
#3
Lunch
#4
Opening Remarks
#5
Morning Coffee Break
#6
Afternoon Coffee Break
#7
Attacking Modern Web Technologies
#8
Making Continuous Security a Reality with OWASP’s AppSec Pipeline
#9
How Leading Companies Are Scaling Their Security
#10
Imperial War Museum - Networking Event
#11
The Last XSS Defense Talk: Why XSS Defense has radically changed in the past 7 years
#12
Deconstructing Threat Modeling
#13
Continuous Kubernetes Security
#14
Secure Software Development Framework: Towards an SDL for all SDLCs
#15
Passive Fingerprinting of HTTP/2 Clients
#16
Remediate The Flag - Practical AppSec Training Platform
#17
Secure Messengers and Man in The Contacts: The Ultimate Spear Phishing Weaponi
#18
Testing iOS Apps without Jailbreak in 2018
#19
Current Research and Standards for Security Automation
#20
Development to Risk Management Dashboard: Managing Cyber Risks in an Agile Environment
#21
Adding Privacy by Design in Secure Application Development
#22
Docker 201 Security
#23
Injecting Security Controls into Software Applications
#24
Unicode: The hero or villain? Input Validation of free-form Unicode text in Web Applications
#25
XSS is dead. We just don't get it.
#26
Perimeter-less: Engineering the future of Defense
#27
Morning Coffee Break
#28
Open Remarks
#29
Lunch
#30
Afternoon Coffee Break - Vendor Passport prizes drawing
#31
WAF Bypass Techniques Using HTTP Standard and Web Servers’ Behavior
#32
Building an AppSec Program with a Budget of $0: Beyond the OWASP Top 10
#33
Jumpstarting Your DevSecOps Pipeline with IAST and RASP
#34
Outsmarting Smart Contracts - An Essential Walkthrough a Blockchain Security Minefields
#35
A View from Above: How Organizations Are Managing their AppSec Program
#36
Usable Security for Developers: A Nightmare
#37
Serverless Infections - Malware Just Found a New Home
#38
From Rogue One to Rebel Alliance: Building Developers into Security Champions
#39
Exploiting Unknown Browsers and Objects
#40
Building a Valid Threat Library for Cloud Based Applications
#41
Seconds out! When algorithms don’t play nice with our applications and lives.
#42
Gamifying Developer Education with CTFs
#43
FIESTA: an HTTPS side-channel party
#44
A Methodology for Assessing JavaScript Software Protections
#45
Security is Everybody's Job... Literally.
#46
Prepare(): Introducing Novel Exploitation Techniques in Wordpress
#47
Programming Language Agnostic Cross-Application CSRF Protection
#48
Embedding Defense in Server-Side Applications
#49
Securing Containers on the High Seas
#50
Threat Modeling for IoT Systems
Popular by Type
All Types
Activity
Break
CISO
Developer
DevOps
Hacker
Keynote Speaker
Member Lounge
Open Remarks
Pre-Conference Network Gathering
Training 1 day
Training 2 days
Training 3 days
Popular by Day
All days
Monday, Jul 2
Tuesday, Jul 3
Wednesday, Jul 4
Thursday, Jul 5
Friday, Jul 6
Recently Active Attendees
Elad Shuster
OWASP Foundation
Andrew Martin
Apostolos Giannakidis
Jeff Williams
CD
Colin Domoney
Fabio Cerullo
Sam Stepanyan
More →