Tony Trummer focuses on how to apply an adversarial perspective when building Android applications, how to identify attack surfaces and the thought process attackers use.
Rob Winch discusses how to properly secure your RESTful endpoints and explores some common pitfalls when applying security to RESTful APIs with the help of Spring Security.
Michael Coates explores how attackers target, analyze and compromise applications and discusses recent high profile compromises and deconstructs them to understand exactly what went wrong.
Bryan Payne provides a clear understanding of different types of attackers, their skill sets, and how compromises happen, with a specific focus on protecting cloud-based applications.
This talk covers the classic profiler features. What is a hotspot? What is the difference between sampling and instrumentation from the profiler perspective? What are the problems with those methods?
S. Ghosemajumder reviews the evolution of AI based security attacks that imitate the actions of real people, and looks at how they are changing the nature of developing online applications securely.
John Field and Shawn McKinney examine the security of a typical Java web application and describe 5 common application security architecture patterns taken from real world customer problems.
Will Tran talks about the authentication and authorization scenarios that one may encounter once he starts building out microservices.
Bill Sempf discusses security in the context of the SDLC, presenting the analysis results from reviewing several code sources, the problems found and the corresponding solutions.
Josh Bregman explores some of the security challenges created by both the development workflow and application runtime, why SecDevOps 1.0 is insufficient, and how SecDevOps 2.0 can help.
Eleanor McHugh shares insights on digital privacy, encouraging others to gather the minimum information possible about their users in order to serve their needs.
Paul Moreno shows how to federate AWS IAM permissions, roles, and users with a directory service such as LDAP or Active Directory with an Identity Provider.