Slides and Videos

Day 1

  • Aaron Weaver – Pipeline Automation: [Slides] [Video]
  • Achim Brucker – Using Third Party Components: [Slides] [Video]
  • Adam Muntner – Open Source Approaches to Security: [Slides] [Video]
  • Ajin Abraham – Automated Mobile Assessment: [Slides] [Video]
  • Alvaro Muñoz, Christian Schneider – Surviving the Java serialization apocalypse: [Slides] [Video]
  • Andreas Falk – Building Native Cloud Apps: [Slides] [Video]
  • Arne Swinnen – Tales of a Bug Bounty Hunter: [Slides] [Video]
  • Christian Mainka – Breaking And Fixing: [Slides] [Video]
  • Dan Cornell – Source Assisted PenTesting: [Slides] [Video]
  • Daniel Kefer – Addressing Security Requirements: [Slides] [Video]
  • David Lindner, Jack Mannino – Dont Touch Me That Way: [Slides] [Video]
  • David Rook – Leveling an Application Security Program: [Slides] [Video]
  • Dinis Cruz – Using Jira To Manage Risks: [Slides] [Video]
  • Dirk Wetter – Calm down HTTPS is not a VPN: [Slides] [Video]
  • Felix Leder – Bug Hunting on the Dark Side: [Slides] [Video]
  • Giancarlo Pellegrino – Compression Bombs: [Slides] [Video]
  • Glen ten Cate – OWASP Security Knowledge Framework – Making the web secure by design: [Slides] [Video]
  • John Dickson – Making OpenSAMM More Effective: [Slides] [Video]
  • Julia Knecht – SAASy SPLC: [Slides] [Video]
  • L. Compagna, A. Sudhodanan, A. Armando, R. Carbone – Attack Patterns for Black-Box Det: [Slides] [Video]
  • Lotfi ben Othmane – Prediction Models: [Slides] [Video]
  • Michele Spagnuolo, Lukas Weichselbaum – Making CSP great again: [Slides] [Video]
  • Oliver Lavery – Framework Security – Have You Hugged A Developer Today: [Slides] [Video]
  • Scott Davis – Scanning with Swagger: [Slides] [Video]
  • Simone Onofri – Security Project Management: [Slides] [Video]
  • Timur Khrotko – Lets Skip The Pentest: [Slides] [Video]
  • Tobias Gondrom – Ciso Survey: [Slides] [Video]
  • Tom Van Goethem – The Timing Attacks They Are A Changin: [Slides] [Video]

Day 2

  • Abhay Bhargav – SecDevOps: [Slides] [Video]
  • Amit Ashbel – Game of Hacks: [Slides] [Video]
  • Amol Sarwate – 2016 State of Vulnerability Exploits: [Slides] [Video]
  • Ben Stock – From Facepalm To Brain Bender: [Slides] [Video]
  • Chris Romeo – AppSec Awareness: [Slides] [Video]
  • Christian Wressengger – Flash-based Malware: [Slides] [Video]
  • Christopher Spaeth – From DTD to XXE: [Slides] [Video]
  • Grant McCracken – Running a Bug Bounty: [Slides] [Video]
  • Ikka Turunen – Chain of Trust: [Slides] [Video]
  • J. Rose, R. Sulatycki – Grow up AppSec-A case study of maturity models and metrics: [Slides] [Video]
  • Jacky Fox – Women in Cyber: [Slides] [Video]
  • Jakub Kaluzny – Big problems with big data – Hadoop interfaces security: [Slides] [Video]
  • Johannes Dahse – Static Code Analysis of Complex PHP Application Vulnerabilities: [Slides] [Video]
  • John Kozyrakis – Certificate Pinning: [Slides] [Video]
  • Jonathan Kuskos – The Top 10 Web Hacks of 2015: [Slides] [Video]
  • Juraj Somorovsky – Practical Attacks on Real World Crypto Implementations : [Slides] [Video]
  • Liesbeth Kimpen – Think Villain Proof: [Slides] [Video]
  • Marisa Fagan – The Cool Factor: [Slides] [Video]
  • Matthias Rohr – Practical Threat Modelling: [Slides] [Video]
  • Mike West – Keynote – Hardening the Web Platform: [Slides] [Video]
  • Rob Van Der Veer – GriponSSD: [Slides] [Video]
  • Sebastian Lekies – Securing AngularJS Applications: [Slides] [Video]
  • Wojtek Dworakowski – Internet Banking Safeguards Vulnerabilities: [Slides] [Video]
  • TonyUV – Attack Tree Vignette for CaaS: [Slides] [Video]
  • Vaibhav Gupta – Lightning training – Security Automation using ZAP: [Slides] [Video]
  • Yair Amit – The Ultimate Reason Why Hackers Are Winning The Mobile Malware Battle: [Slides] [Video]