Sched.com Conference Mobile Apps
AppSec Europe 2018
has ended
Create Your Own Event
Menu
Schedule
Speakers
Sponsors
Attendees
Event Map
Search
Log in
Sign up
AppSec Europe 2018
-
Saved To
My Schedule
***Content is subject to change.***
Schedule
Simple
Expanded
Grid
By Venue
Speakers
Sponsors
Attendees
Event Map
Search
or browse by date + venue
Activity
Break
CISO
Developer
DevOps
Hacker
Keynote Speaker
Member Lounge
Open Remarks
Pre-Conference Network Gathering
Training 1 day
Training 2 days
Training 3 days
Popular
Popular Events
#1
XSS is dead. We just don't get it.
#2
The Perimeter Has Been Shattered: Attacking and Defending Mobility and IoT on the Enterprise Network
#3
Winning - the future perspective in the next 20 years!
#4
Lunch
#5
Opening Remarks
#6
Perimeter-less: Engineering the future of Defense
#7
Morning Coffee Break
#8
Morning Coffee Break
#9
Open Remarks
#10
Lunch
#11
Afternoon Coffee Break - Vendor Passport prizes drawing
#12
Afternoon Coffee Break
#13
Attacking Modern Web Technologies
#14
Making Continuous Security a Reality with OWASP’s AppSec Pipeline
#15
How Leading Companies Are Scaling Their Security
#16
Imperial War Museum - Networking Event
#17
The Last XSS Defense Talk: Why XSS Defense has radically changed in the past 7 years
#18
Deconstructing Threat Modeling
#19
Continuous Kubernetes Security
#20
WAF Bypass Techniques Using HTTP Standard and Web Servers’ Behavior
#21
Building an AppSec Program with a Budget of $0: Beyond the OWASP Top 10
#22
Jumpstarting Your DevSecOps Pipeline with IAST and RASP
#23
Secure Software Development Framework: Towards an SDL for all SDLCs
#24
Outsmarting Smart Contracts - An Essential Walkthrough a Blockchain Security Minefields
#25
A View from Above: How Organizations Are Managing their AppSec Program
#26
Usable Security for Developers: A Nightmare
#27
Serverless Infections - Malware Just Found a New Home
#28
Passive Fingerprinting of HTTP/2 Clients
#29
From Rogue One to Rebel Alliance: Building Developers into Security Champions
#30
Exploiting Unknown Browsers and Objects
#31
Building a Valid Threat Library for Cloud Based Applications
#32
Seconds out! When algorithms don’t play nice with our applications and lives.
#33
Remediate The Flag - Practical AppSec Training Platform
#34
Gamifying Developer Education with CTFs
#35
FIESTA: an HTTPS side-channel party
#36
A Methodology for Assessing JavaScript Software Protections
#37
Security is Everybody's Job... Literally.
#38
Secure Messengers and Man in The Contacts: The Ultimate Spear Phishing Weaponi
#39
Testing iOS Apps without Jailbreak in 2018
#40
Current Research and Standards for Security Automation
#41
Development to Risk Management Dashboard: Managing Cyber Risks in an Agile Environment
#42
Prepare(): Introducing Novel Exploitation Techniques in Wordpress
#43
Programming Language Agnostic Cross-Application CSRF Protection
#44
Embedding Defense in Server-Side Applications
#45
Securing Containers on the High Seas
#46
Adding Privacy by Design in Secure Application Development
#47
Docker 201 Security
#48
Injecting Security Controls into Software Applications
#49
Threat Modeling for IoT Systems
#50
Unicode: The hero or villain? Input Validation of free-form Unicode text in Web Applications
Popular by Type
All Types
Activity
Break
CISO
Developer
DevOps
Hacker
Keynote Speaker
Member Lounge
Open Remarks
Pre-Conference Network Gathering
Training 1 day
Training 2 days
Training 3 days
Popular by Day
All days
Monday, Jul 2
Tuesday, Jul 3
Wednesday, Jul 4
Thursday, Jul 5
Friday, Jul 6
Recently Active Attendees
Madhu Akula
OWASP Foundation
Erez Yalon
Jon Gadsden
Sam Stepanyan
Chris Romeo
CD
Colin Domoney
Dimitri BAELI
More →