Sched.com Conference Mobile Apps
OWASP Global AppSec US 2021 has ended
Create Your Own Event
Menu
Schedule
Speakers
Sponsors
Attendees
Search
Log in
Sign up
OWASP Global AppSec US 2021
-
Saved To
My Schedule
Schedule
Simple
Expanded
Grid
By Venue
Speakers
Sponsors
Attendees
Search
or browse by date + venue
Breaker
Builder
Defender
DevSecOps
Exhibitor Track
Keynote
Lunch/Expo Hall
OWASP Leaders Meeting
Audience
Advanced
All
Beginner
Intermediate
Area
Builder
Popular
Popular Events
#1
Container Security: It’s All About the Supply Chain
#2
Practical Threat Modeling for real-world and Cloud Situations in our hybrid and WFH World
#3
How to Use Your Vulnerabilities to Train Your Developers on Security
#4
25 Years in AppSec: Looking Back, Looking Forward
#5
Ensuring Git & CI/CD Pipeline Security & Integrity
#6
How hackers can breach your C.I / C.D systems
#7
Scaling Security through Context Based Security Assessments
#8
We’re not in HTTP anymore: Investigating WebSocket Server Security
#9
Why checking your infrastructure-as-code for misconfigurations is not enough – How to secure your cloud native applications
#10
The How and Why of the OWASP Top Ten 2021
#11
Application Threat Modeling Implementation Tips and Tricks
#12
Building Security Champions
#13
Security Design Anti-Patterns – Creating Awareness to Limit Security Debt
#14
OWASP cautions against “insufficient logging & monitoring.” What does sufficient look like?
#15
Why SecDevOps is the new way in Cybersecurity?
#16
Keynote
#17
Keynote
#18
Data at Rest Encryption - Going Beyond the Basics to Address Modern Attacks
#19
Automating Architectural Risk Analysis with the Open Threat Model format
#20
How to build a security mindset
#21
Data-Driven AppSec Champions Programs – Benchmarking Your Program with Numbers
#22
Harmonizing the OWASP API and Application Top 10 Lists
#23
Purple Teaming with OWASP PurpleTeam
#24
SBOM SmackDown: Conquer dragons in the shadows with OWASP CycloneDX
#25
Magecart - The Rising Threat to e-commerce Websites
#26
OWASP Open Application Security Curriculum
#27
Ending Injection Vulnerabilities
#28
Bots have gone phishing, but all they get is the boot
#29
Security Observability 101: Thinking Inside the Box!
#30
Cluster Wrangling: How to make Kubernetes clusters secure and usable
#31
Changed Responsibilities in Modern Development Practices
#32
Automated Serverless Security Testing: Delivering secure apps continuously
#33
Insiders Guide to Mobile AppSec with Latest OWASP MASVS
#34
OWASP Leaders Meeting
#35
600 apps in 60 days: our journey to uncover vulnerable dependencies at scale with OWASP Dependency-Check
#36
Exploiting web messaging implementations
#37
OWASP ZAP & DeepFactor Continuous AppSec Observability: Made For Each Other!
#38
How to Thwart Malicious Automation and Kick Bot Butt for $0
#39
Roadblocks for CSP and Where to Find Them
#40
Outside the box: pwning IoT devices through their applications
#41
Metabadger: Automating IMDS Protection at Scale in AWS
#42
Azure Vulnerability Testbed (AzGOAT)
#43
Why security fails, and how we can solve for it
#44
Lunch/Expo Hall
#45
OWASP ESAPI – A Retrospective: The Good, the Bad, & the Ugly
#46
We Deserve Rights
#47
Web Application Honeypot Threat Intelligence
#48
Who’s in control: Human or Machine?
#49
GitHub
#50
Lunch/Expo Hall
Popular by Type
All Types
Breaker
Builder
Defender
DevSecOps
Exhibitor Track
Keynote
Lunch/Expo Hall
OWASP Leaders Meeting
Popular by Day
All days
Thursday, Nov 11
Friday, Nov 12
Recently Active Attendees
Rory Mccune
Pedro Fortuna
Ashish Patel
K
kutikovaOt
HS
Harmeet Singh
Taraka Vishnumolakala
MG
Moritz Grimm
Raaghav Srinivasan
More →