Sign up or log in to bookmark your favorites and sync them to your phone or calendar.
25 Years in AppSec: Looking Back, Looking Forward 9:00am - 10:00am
Demystifying the Digital Pandemic 10:00am - 11:00am
We’re not in HTTP anymore: Investigating WebSocket Server Securi... 10:00am - 11:00am
Who’s in control: Human or Machine? 10:00am - 11:00am
Ensuring Git & CI/CD Pipeline Se... 10:00am - 10:30am
Ending Injection Vulnerabilities 10:00am - 11:00am
How to Use Your Vulnerabilities... 10:30am - 11:00am
All your Ether are belong to us (a.k.a Hacking Ethereum-based DA... 11:00am - 12:00pm
Practical Threat Modeling for real-world and Cloud Situations in... 11:00am - 12:00pm
Metabadger: Automating IMDS Protection at Scale in AWS 11:00am - 12:00pm
GitHub 11:00am - 11:30am
How to build a security mindset 11:00am - 12:00pm
Changed Responsibilities in Mode... 11:30am - 12:00pm
Lunch/Expo Hall 12:00pm - 1:00pm
Azure Vulnerability Testbed (AzGOAT) 1:00pm - 2:00pm
Automated Serverless Security Testing: Delivering secure apps co... 1:00pm - 2:00pm
Check Point 1:00pm - 1:30pm
How to Thwart Malicious Automation and Kick Bot Butt for $0 1:00pm - 2:00pm
Container Security: It’s All About the Supply Chain 1:00pm - 2:00pm
Indusface 1:30pm - 2:00pm
Keynote 2:00pm - 3:00pm
The How and Why of the OWASP Top Ten 2021 3:00pm - 4:00pm
Bots have gone phishing, but all they get is the boot 3:00pm - 4:00pm
Security Observability 101: Thinking Inside the Box! 3:00pm - 4:00pm
Are you safe from OWASP #11 3:00pm - 3:30pm
Harmonizing the OWASP API and Application Top 10 Lists 3:00pm - 4:00pm
Why security fails, and how we c... 3:30pm - 4:00pm
Purple Teaming with OWASP PurpleTeam 4:00pm - 5:00pm
Insiders Guide to Mobile AppSec with Latest OWASP MASVS 4:00pm - 5:00pm
SBOM SmackDown: Conquer dragons in the shadows with OWASP Cyclon... 4:00pm - 5:00pm
Building Security Champions 4:00pm - 5:00pm
OWASP Leaders Meeting 5:15pm - 6:15pm
Keynote 9:00am - 10:00am
Data at Rest Encryption - Going Beyond the Basics to Address Mod... 10:00am - 11:00am
OWASP cautions against “insufficient logging & monitoring.” What... 10:00am - 11:00am
Magecart - The Rising Threat to e-commerce Websites 10:00am - 11:00am
Why SecDevOps is the new way in Cybersecurity? 10:00am - 11:00am
How hackers can breach your C.I / C.D systems 11:00am - 12:00pm
Automating Architectural Risk Analysis with the Open Threat Mode... 11:00am - 12:00pm
Why checking your infrastructure-as-code for misconfigurations i... 11:00am - 12:00pm
600 apps in 60 days: our journey to uncover vulnerable dependenc... 11:00am - 12:00pm
Scaling Security through Context Based Security Assessments 1:00pm - 2:00pm
Exploiting web messaging implementations 1:00pm - 2:00pm
Roadblocks for CSP and Where to Find Them 1:00pm - 2:00pm
OWASP ESAPI – A Retrospective: The Good, the Bad, & the Ugly 1:00pm - 2:00pm
We Deserve Rights 2:00pm - 3:00pm
OWASP Open Application Security Curriculum 3:00pm - 4:00pm
Cluster Wrangling: How to make Kubernetes clusters secure and us... 3:00pm - 4:00pm
Outside the box: pwning IoT devices through their applications 3:00pm - 4:00pm
Data-Driven AppSec Champions Programs – Benchmarking Your Progra... 3:00pm - 4:00pm
OWASP ZAP & DeepFactor Continuous AppSec Observability: Made For... 4:00pm - 5:00pm
Application Threat Modeling Implementation Tips and Tricks 4:00pm - 5:00pm
Web Application Honeypot Threat Intelligence 4:00pm - 5:00pm
Security Design Anti-Patterns – Creating Awareness to Limit Secu... 4:00pm - 5:00pm