Sched.com Conference Mobile Apps
LASCON 2013
has ended
Create Your Own Event
LASCON 2013
Schedule
Simple
Expanded
Grid
By Venue
Speakers
Volunteers
Attendees
Search
or browse by date + venue
Architecture Track
Attack Track
Culture & Management Track
Developer Track
Expo
Happy Hour
Keynote
Mobile Track
Rugged DevOps Track
Training
Popular
menu
Menu
Schedule
Speakers
Volunteers
Attendees
Search
Popular Events
#1
Secure Developer Training: OWASP Top 10++ (2 Day Training)
#2
Secure Developer Training: OWASP Top 10++ (2 Day Training)
#3
The Origins of Insecurity - Keynote with Nick Galbreath
#4
Speed Debates!
#5
Stupid webappsec Tricks
#6
Hacker org skills - Keeping it together
#7
We are the Cavalry: Why it has to be us & why now
#8
Convincing Your Management, Your Peers, and Yourself That Risk Management Doesn't Suck
#9
No More Monkey Business: Quality Assurance in Penetration Testing
#10
Stalking a City for Fun and Frivolity
#11
Happy Hour w Live Music
#12
Malware Automation
#13
Practical PKI
#14
From Gates to Guardrails: Alternate Approaches to Product Security
#15
5 Proven Success Strategies for your Software Security Program
#16
The Real Cost of Security
#17
Rugged Driven Development with Gauntlt
#18
Happy Hour Bar Opens
#19
Expo Hall Opens
#20
Cloud Keep: Protect your Secrets at Scale
#21
Lunch Option 2
#22
Railsgoat - Rails attack and defense
#23
How overlay networks can make public clouds your global WAN network
#24
Vulnerability and Threat Management: How Can We close the Gaps?
#25
Lunch Option 1
#26
Ride the Mechanical Bull
#27
Blindspots - Keynote with Robert Hansen
#28
Heading Off Trouble: Securing Your Web Application with HTTP Headers and X-Headers
#29
Million Browser Botnet
#30
Closing Remarks and Door Prizes
#31
OWASP Top Ten Proactive Controls
#32
How Malware Uses and Abuses Your Software: Learn How To Prevent Hackers from Attacking and Masquerading as your Software
#33
User Auth for Winners, how to get it right the first time!
#34
Enforcing Authorization with Cryptography
#35
Riding the Magical Code Injection Rainbow
#36
Why CloudHSM can Revolutionzie AWS
#37
View this abstract in your browser
#38
Big Data, Little Security? – Practical Steps for securing Big Data
#39
Mobile AppSec: Development and Alphabet Soup
#40
Revenge of the Geeks: Hacking Fantasy Sports Sites
#41
Hacking .NET(C#) Applications: The Black Arts(v3)
#42
Lunch Option 1
#43
iOSApps.reverse #=> iPwn Apps
#44
DDOS/DOS Attack Classification per Attack Target and Attack Vector
#45
Expo Hall Opens
#46
Minding The Gap: Secure PhoneGap Apps
#47
Ice Cream "sudo make me a" Sandwich
#48
Drawing the map: Outlining Android permissions mechanism
#49
Do You Have a Scanner or a Scanning Program?
#50
Software and Supply Chain Assurance (SSCA)
Popular by Type
All Types
Architecture Track
Attack Track
Culture & Management Track
Developer Track
Expo
Happy Hour
Keynote
Mobile Track
Rugged DevOps Track
Training
Popular by Day
All days
Tuesday, Oct 22
Wednesday, Oct 23
Thursday, Oct 24
Friday, Oct 25
Recently Active Attendees
Oleg Gryb
Tiana Chandler
Josh Sokol
KL
Karen Lu
mauvehed/nate
D
Daniel
Robert Hurlbut
BC
balu, chitra
More →