title | layout | tab | order | tags |
---|---|---|---|---|
Downloads |
true |
4 |
canada |
The past presentations are available for download from here. If you have any comments on the presentations please send them to us. Please note some presenters choose not to share their material.
-
The Current State of Insecure Deserialization Vulnerabilities by Guy Lederfein, December 14, 2022
-
DevSecOps Transformation on a Shoestring Budget by Itay Gurvich, May 11, 2022
-
OpenShift Container Platform – Security Features by Arvin Monie, October 6, 2021
-
Testing OWASP Juice Shop with OWASP ZAP by Yuk Fai Chan, and Hackable OWASP Educational Resources by Opheliar Chan, April 29, 2021. [video]
-
Unicode vulnerabilities that could byͥte you by Philippe Arteau, February 17, 2021. [video]
-
Threat Modelling: An objectives-based primer by Opheliar Chan, Feb 5, 2021. [video]
-
Introduction to OWASP Zap by Jack Enders, January 20, 2021
-
OWASP Toronto x ISC2 Cyber Toronto 2020 - Presentation Slides by the OWASP Team, December 3, 2020
-
Frida 101 - Testing Mobile Apps by Brian Lawrence, October 28, 2020
-
High-level tactics for reverse engineering software by Adam Greenhill, October 28, 2020
-
Privacy in the Times of COVID-19 Pandemic by Amalia Barthel and Craig Barretto, June 24, 2020 [Video]
-
Software Security Initiative – The Basics by Eli Erlikhman, May 20, 2020 [Video]
-
Detect complex code patterns using semantic grep by Drew Dennison, May 6, 2020 [Video]
-
Lift and Adrift: Understanding Threats in an AWS Environment by Jason Plummer, April 22, 2020 [Video]
-
Creating a Security Centric Development Organization by Varrun Ramani, March 24, 2020 [Video] [Examples]
-
OWASP IoT Top 10 - Exploring Vulnerability Root Causes [Video] by Nicholas Johnston, December 2019
-
Half a Decade in Review: On Accidental Hacking and the "Hard" Conversations by Alana Staszczyszyn, October 2019
-
Security Monitoring with Azure App Gateway, Log Analytics and Azure Sentinel by Roy Kim, August 2019
-
Export to RCE by Adam Greenhill, July 2019
-
De-identification by Erik Service, April 2019, Additional resources: 1,2,3,4
-
In Root we trust (no this is not a DNS talk) by Pavan Chander and Lisa Bui, February 2019
-
Back to the Future of Application Security: Developing Secure Smart Contracts by Jamie Baxter, January 2019
-
Web Application Penetration Testing by Frank Coburn and Haris Mahboob, December 2018
-
How to stop worrying about Application Container Security (v2) by Brian Andrzejewski, June 2018
-
CISO's 90 Day Plan by Nelson Chen, April 2018
-
Hi, I am X. How do I get into AppSec / Security? by OWASP Toronto, January 2018
-
Swiss cheese security, or the real challenges faced by internet facing companies by Enrico Branca, October 2017
-
Cloud Security & Best Practice in AWS by Ankit Giri, August 2017
-
The Node.js Highway: Attacks Are At Full Throttle by Susan St. Clair, May 2017
-
OWASP Overview & Intro to OWASP Projects by Yuk Fai Chan, March 2017
-
Basic Web Application Testing Methodology by Nish Bhalla Security Compass
-
Basic Web Services Security by Rohit Sethi Security Compass
-
Authentication Security by Hui Zhu
-
Identity Management Basics by Derek Browne
-
Business Logic Flaws by Trey Ford
-
A Laugh RIAt – Rich Internet Application Security by Rafal M. Los
-
Will you be PCI DSS Compliant by September 2010? by Michael D'Sa
-
Mobile Security for the Forgetful by Max Veytsman, Security Compass, May 2011
-
Application Security ISO by Tak Chijiwa, Security Compass, May 2012
-
NFC Threat Landscape by Geoff Vaughan, Security Compass, March 2013
-
Security Code Review by Sherif Koussa, OWASP Ottawa Chapter Leader, May 2013
-
OWASP: Beyond the Top 10 by Andre Rochefort, TELUS, July 2013
-
Heartbleed by Ben Sapiro, April 2014
-
DDoS Attacks and Mitigation in Cloud Environments by Mark Shtern, July 2014
-
What's Hiding in Your Software Components? Hidden Risks of Component-Based Software Development – Seeing the Forest Through the Trees by Ryan Berg, Sonatype, September 2014