Sched.com Conference Mobile Apps
AppSec USA 2016
has ended
Create Your Own Event
AppSec USA 2016
Schedule
Simple
Expanded
Grid
By Venue
Speakers
Attendees
Search
or browse by date + venue
Activity
Break
Career Fair
DevOps Connect
Keynote
Lightning Talks
Members Lounge
Registration
Social Event
Tracks
All
Builder/Breaker
DevOps
Mobile/IoT
Training
WASPY Awards
WIA
Popular
menu
Menu
Schedule
Speakers
Attendees
Search
Popular Events
#1
Pre-Conference Reception
#2
Keynote - Software Supply Chain Lifecycle Management: Reducing Attack Vectors and Enabling Rugged DevOps
#3
Keynote - The Less Hacked Path
#4
Next Gen Web Pen Testing: Handling Modern Applications in a Penetration Test
#5
Conference Dinner at the SPY Museum
#6
Threat Modeling with Architectural Risk Patterns
#7
Practical Static Analysis for Continuous Application Security
#8
HTTPS & TLS in 2016: Security practices from the front lines
#9
Morning Coffee Break
#10
Everything is Terrible: Three Perspectives on Building, Configuring, and Securing Software
#11
Afternoon Coffee Break
#12
Lunch Break
#13
Lightning Talk - Demystifying CSP
#14
SPArring with the Security of Single Page Applications
#15
Cleaning Your Applications' Dirty Laundry with Scumblr
#16
Lightning Talk - Application Security in a DevOps World: Three Methods for Shifting Left
#17
How to Find the Next Great Deserialization CVE
#18
Lightning Talk - Taking Back Privacy to Gain Control
#19
Using language-theoretics and runtime visibility to align AppSec with DevOps
#20
Securing the Electronic Frontier
#21
Continuous Integration: Live Static Analysis using Visual Studio & the Roslyn API
#22
The Ways Hackers Are Taking To Win The Mobile Malware Battle
#23
Lightning Talk - Building your Own Security ChatBot
#24
Career Fair
#25
Lightning Talk - LANGSEC 101: Taking the Theory Mainstream
#26
When encryption is not enough: Attacking Wearable - Mobile Application communication over BLE
#27
Lightning Talk - Demystifying Windows Application
#28
Keynote - Cryptography in the age of Heartbleed
#29
Keynote - What does winning look like?
#30
Practical tips for web application security in the age of agile and DevOps
#31
Automating API Penetration Testing using fuzzapi
#32
AppSec++ Take the best of Agile, DevOps and CI/CD into your AppSec Program
#33
Lunch Break
#34
Scaling Security Assessment at the Speed of DevOps
#35
Morning Coffee Break
#36
Afternoon Coffee Break & Passport Program Raffle
#37
Why using SMS in the authentication chain is risky and what better options are available
#38
Serverless Security: Doing Security in 100 milliseconds
#39
Continuous Security: DevOps and Ongoing Authorization
#40
Putting an “I” in Code Review – Turning Code Reviewing Interactive
#41
Misconfigured CORS and why web application security is not getting easier.
#42
Where bits & bytes meet flesh & blood: Devops, Cybersafety, and the Internet of Things
#43
Moving to the Left: DevOps practices and the changing role of SecOps
#44
DevSecOps: A Peek Inside the Pipeline
#45
Exploiting CORS Misconfigurations for Bitcoins and Bounties
#46
Breaking and Fixing your ‘Docker’ ized environments
#47
DevOps to DevSecOps: a 2-dimensional view of security for DevOps
#48
Mapping the Risk in Your Value Stream
#49
Making Invisible Things Visible: Revealing Secrets from 25,000 Applications
#50
Glad You Could Join Us: Bringing Security into the DevOps Fold
Popular by Type
All Types
Activity
Break
Career Fair
DevOps Connect
Keynote
Lightning Talks
Members Lounge
Registration
Social Event
Tracks
Training
WASPY Awards
WIA
Popular by Day
All days
Tuesday, Oct 11
Wednesday, Oct 12
Thursday, Oct 13
Friday, Oct 14
Recently Active Attendees
Santiago Kantorowicz
Jonathan Pasky
Dale Gardner
The Techrix
GS
Gerry Seidman
GT
Gaurav Thapa
JW
Jim Weiler
Izar Tarandach
More →