Conference Slides
- Vehicle Security Trends - Implications for the Auto Supplier by Aaron Guzman (File Type: Adobe PDF)
- Uninvited Guests: Understanding Malicious Web Bots with OWASP Handbook by Tin Zaw (File Type: Microsoft PowerPoint)
- Injecting Security Controls in Software Applications by Katy Anton (File Type: Adobe PDF)
- Security for Modern Webapps: New Web Platform Security Features to Protect your Application by Lukas Weichselbaum (File Type: Adobe PDF)
- Bringing Rapid Prototyping To The Threat Model Process by Geoffrey Hill (File Type: Microsoft PowerPoint)
- Security Culture: Here be Hackers by Taras Ivashchenko (File Type: Adobe PDF)
- Testing and Hacking APIs by Inon Shkedy (File Type: Microsoft PowerPoint)
- Insights from the Trenches: Must-have Secure Coding Lessons in Mobile by Yair Amit and Igal Kreichman (File Type: Adobe PDF)
- Rhyming with Hacks - The Ballad of Supply Chain Attacks by Pedro Fortuna (File Type: Adobe PDF)
- Trusted Types: End-to-end Injection Safety at Scale by Krzysztof Kotowicz and Mike Samuel (File Type: Adobe PDF)
- WebHook Hookups: Abusing API Developers by Maxim Zavodchik and Tomer Zait (File Type: Adobe PDF)
- Dissecting Mobile Application Privacy and Analytics by Kevin Cody (File Type: Adobe PDF)
- Who Left Open the Cookie Jar? by Tom Van Goethem (File Type: Microsoft PowerPoint)
- Keynote: Lessons from the Early Web Application Security Days by Amit Klein (File Type: Microsoft PowerPoint)
- Building & Hacking Modern iOS Apps by Wojciech Regula (File Type: Adobe PDF)
- Can We Automate Security? by Sasha Rosenbaum (File Type: Microsoft PowerPoint)
- How Threat Modeling Made Me Better at Online Dating by Isaiah Sarju (File Type: Microsoft PowerPoint)
- Securing Node.js and JavaScript by Vladimir de Turckheim (File Type: Apple iWork)
- DevSecOps with OWASP DevSlop by Tanya Janca and Nancy Gariche (File Type: Microsoft PowerPoint)
- Software Security War: Your Reports are Dead! by Matteo Meucci (File Type: Adobe PDF)
- Struts 2 Must Die: The Life and Inevitable Death of Java’s Spaghettiest™ Framework by Eugene Rojavski (File Type: Microsoft PowerPoint)
- Three Levels of Complexity: Threat Modeling of Containerized Application by Elena Kravchenko (File Type: Microsoft PowerPoint)
- Automated Cyber Security Platform at Scale by Ovidiu Cical (File Type: Adobe PDF)
- Defending Cloud Infrastructures with Cloud Security Suite by Jayesh Chauhan (File Type: Microsoft PowerPoint)
- Breaking out of the Container without Zero Day - Can That Happen to Me? by Asher Genchowski and Chen Cohen (File Type: Adobe PDF)
- Black Clouds Silver Linings In Nodejs Security by Liran Tal (File Type: Adobe PDF)
- Once Upon A Time In The West - A Story on DNS Attacks by Ruth Esmeralda Barbacil and Valentina Palacin (File Type: Microsoft PowerPoint)
- Alexa and Cortana in Windowsland: Hacking an Innovative Partnership and Other Adventures by Amichai Shulman and Yuval Ron (File Type: Microsoft PowerPoint)
- OWASP Serverless Top 10 by Tal Melamed (File Type: Microsoft PowerPoint)
- What do you Mean - Threat Model EVERY Story? by Izar Tarandach (File Type: Microsoft PowerPoint)
- Crypto Failures - And Not Just in Bitcoin by Guy Barnhart-Magen (File Type: Adobe PDF)
- Are We Making our Engineers Blue? by Tash Norris (File Type: Microsoft PowerPoint)