Join Pravir Chandra in his talk Everything you know about Injection Attack is wrong in which he will take a look at several mundane vulnerabilities that we all know about and ask a few deeper questions on the matter.By the end, he’ll challenge the audience to think past the surface of code vulnerabilities and hopefully learn a little about how the right abstraction model can save tons of security headaches. His keynote is on Friday, July 13th, 2012 at the Auditorium track
If Greece wins Germany in tonight’s football match for Euro 2012 quarter-finals, all conference registrations that will be completed by Monday, 23:59 (Greek time – GMT+3) will benefit of a 30% discount.
Use code EUROGREECE during registration to take advantage of this discount, should Greece qualify to the semi-finals!
There are four true sources of intelligence: Open source (not the code), HUMINT, COMINT, and cyber collections. If you’re curious to learn of some of the historical successes and failures of intelligence gathering, and how processing intelligence can make or break cyber security challenges, come visit Fred Donovan’s talk on Anticipating Surprise: Fundamentals of Intelligence Gathering on Friday, July 13th, 2012 , 11:30-12:10 , at the Auditorium .
Join Paco Hope in his session on day 1, track A2, 16:15-16:55, titled Playing chess while wearing oven mitts: securing the lifecycle when it’s not your own.
Mr. Paco Hope will outline how you can identify the risks posed by third party software and he will also outline the tools for addressing those risk as well as give insight in connecting the tools with situations where they are most effective.
Are you drowning in a mess of unrelated classifications, terminology and abbreviations? If you are a security verifier and want to know more about ranking your findings, or receive test reports and want to better understand the results, or are just new to ranking weaknesses /vulnerabilities and want an overview, come along to this presentation given by Colin Watson in track A1 on conference day one from 15:20-16:00, titled Tricolour Alphanumerical Spaghetti.
You can win a free ticket for the conference if you are the first to sent us the flag located in this url http://195.251.124.135Â good luck
(ISC)2 members can benefit of a special discount equal to the one that OWASP members get (40 euros). Actually, if you are both an (ISC)2 and OWASP member you can benefit of both discounts!
To take advantage of this offer, use discount code ISC2GREECE and also enter your (ISC)2 membership number in the corresponding field during registration.
ISACA members can benefit of a special discount equal to the one that OWASP members get (40 euros). Actually, if you are both an ISACA and OWASP member you can benefit of both discounts!
To take advantage of this offer, use discount code ISACAGREECE and also enter your ISACA membership number in the corresponding field during registration.
We are proud to announce that Diomidis Spinellis’ work on countering injection attacks has been awarded the Highly Commended Award Winner at the Literati Network Awards for Excellence 2012 for his article article entitled “Countering code injection attacks: a unified approach† Diomidis will be presenting “Fatal Injection (and what you can do about it)” during OWASP AppSec Research 2012