![Global AppSec Amsterdam 2019](/conf/global-appsec-ams-2019/global-appsec-ams-2019_hub446a3e96f3d0b121fba84dd94e9fb6f_795076_800x0_resize_box_2.png)
August 2019
Security
![[In]secure Deserialization, And How [Not] To Do It - Alexei Kojenov](https://i3.ytimg.com/vi/Y0QxwRyqlh8/hqdefault.jpg)
![[In]secure Deserialization, And How [Not] To Do It - Alexei Kojenov](https://i3.ytimg.com/vi/Y0QxwRyqlh8/hqdefault.jpg)
[In]secure Deserialization, And How [Not] To Do It - Alexei Kojenov
Alexei Kojenov
August 2019
Security
![An Infosec Timeline: Noteworthy Events From 1970 To 2050 - Mario Heiderich](https://i3.ytimg.com/vi/u3x_0955_TU/hqdefault.jpg)
![An Infosec Timeline: Noteworthy Events From 1970 To 2050 - Mario Heiderich](https://i3.ytimg.com/vi/u3x_0955_TU/hqdefault.jpg)
An Infosec Timeline: Noteworthy Events From 1970 To 2050 - Mario Heiderich
Mario Heiderich
August 2019
Security
![Breaches Are Everywhere. What’s A Good Security Leader To Do?! - Richard Greenberg](https://i3.ytimg.com/vi/j9GsTg_uhs8/hqdefault.jpg)
![Breaches Are Everywhere. What’s A Good Security Leader To Do?! - Richard Greenberg](https://i3.ytimg.com/vi/j9GsTg_uhs8/hqdefault.jpg)
Breaches Are Everywhere. What’s A Good Security Leader To Do?! - Richard Greenberg
Richard Greenberg
August 2019
Security
![Choosing The Right Static Code Analyzers Based On Hard Data - Chris Horn](https://i3.ytimg.com/vi/eif27O1aZRc/hqdefault.jpg)
![Choosing The Right Static Code Analyzers Based On Hard Data - Chris Horn](https://i3.ytimg.com/vi/eif27O1aZRc/hqdefault.jpg)
Choosing The Right Static Code Analyzers Based On Hard Data - Chris Horn
Chris Horn
August 2019
Security
![Do Certain Types Of Developers Or Teams Write More Secure Code? - Anita Damico](https://i3.ytimg.com/vi/7H-8vH2e_XY/hqdefault.jpg)
![Do Certain Types Of Developers Or Teams Write More Secure Code? - Anita Damico](https://i3.ytimg.com/vi/7H-8vH2e_XY/hqdefault.jpg)
Do Certain Types Of Developers Or Teams Write More Secure Code? - Anita Damico
Anita Damico
August 2019
Security
![Exploiting Hardware Glitches And Side Channels In Perfect Software - Herbert Bos](https://i3.ytimg.com/vi/8HTi9cas5hA/hqdefault.jpg)
![Exploiting Hardware Glitches And Side Channels In Perfect Software - Herbert Bos](https://i3.ytimg.com/vi/8HTi9cas5hA/hqdefault.jpg)
Exploiting Hardware Glitches And Side Channels In Perfect Software - Herbert Bos
Herbert Bos
August 2019
Security
![Fast Forwarding Mobile Security With The OWASP Mobile Security Testing Guide - Jeroen Willemsen](https://i3.ytimg.com/vi/0Em-9h2BCKg/hqdefault.jpg)
![Fast Forwarding Mobile Security With The OWASP Mobile Security Testing Guide - Jeroen Willemsen](https://i3.ytimg.com/vi/0Em-9h2BCKg/hqdefault.jpg)
Fast Forwarding Mobile Security With The OWASP Mobile Security Testing Guide - Jeroen Willemsen
Jeroen Willemsen
August 2019
Security
![How Do JavaScript Frameworks Impact The Security Of Applications? - Ksenia Peguero](https://i3.ytimg.com/vi/FCxorFM3yZk/hqdefault.jpg)
![How Do JavaScript Frameworks Impact The Security Of Applications? - Ksenia Peguero](https://i3.ytimg.com/vi/FCxorFM3yZk/hqdefault.jpg)
How Do JavaScript Frameworks Impact The Security Of Applications? - Ksenia Peguero
Ksenia Peguero
August 2019
Security
![How I Could Have Stolen Your Photos From Google - Gergo Turcsanyi](https://i3.ytimg.com/vi/MeFT3teyyHE/hqdefault.jpg)
![How I Could Have Stolen Your Photos From Google - Gergo Turcsanyi](https://i3.ytimg.com/vi/MeFT3teyyHE/hqdefault.jpg)
How I Could Have Stolen Your Photos From Google - Gergo Turcsanyi
Gergo Turcsanyi
August 2019
Security
![How Scripting In ZAP Can Bridge The Gap Between Dev Teams And Security - Peter Hauschulz](https://i3.ytimg.com/vi/yDbkWD8UEvk/hqdefault.jpg)
![How Scripting In ZAP Can Bridge The Gap Between Dev Teams And Security - Peter Hauschulz](https://i3.ytimg.com/vi/yDbkWD8UEvk/hqdefault.jpg)
How Scripting In ZAP Can Bridge The Gap Between Dev Teams And Security - Peter Hauschulz
Peter Hauschulz
August 2019
Security
![How To Find And Prevent Entire Classes Of Security Vulnerabilities - Sam Lanning](https://i3.ytimg.com/vi/1wbt1xM9jUc/hqdefault.jpg)
![How To Find And Prevent Entire Classes Of Security Vulnerabilities - Sam Lanning](https://i3.ytimg.com/vi/1wbt1xM9jUc/hqdefault.jpg)
How To Find And Prevent Entire Classes Of Security Vulnerabilities - Sam Lanning
Sam Lanning
August 2019
Security
![HTTP Desync Attacks: Smashing Into The Cell Next Door - James Kettle](https://i3.ytimg.com/vi/upEMlJeU_Ik/hqdefault.jpg)
![HTTP Desync Attacks: Smashing Into The Cell Next Door - James Kettle](https://i3.ytimg.com/vi/upEMlJeU_Ik/hqdefault.jpg)
HTTP Desync Attacks: Smashing Into The Cell Next Door - James Kettle
James Kettle
August 2019
Security
![Mobile- Or Attacker-Friendly? A Security Evaluation Of Mobile-First Websites - Tom Van Goethem](https://i3.ytimg.com/vi/ntA4I-pKjQs/hqdefault.jpg)
![Mobile- Or Attacker-Friendly? A Security Evaluation Of Mobile-First Websites - Tom Van Goethem](https://i3.ytimg.com/vi/ntA4I-pKjQs/hqdefault.jpg)
Mobile- Or Attacker-Friendly? A Security Evaluation Of Mobile-First Websites - Tom Van Goethem
Tom Van Goethem
August 2019
Security
![OWASP Based Threat Modelling: Creating A Feedback Model In An Agile Environment - Chaitanya Bhatt](https://i3.ytimg.com/vi/pXr75ufG1uM/hqdefault.jpg)
![OWASP Based Threat Modelling: Creating A Feedback Model In An Agile Environment - Chaitanya Bhatt](https://i3.ytimg.com/vi/pXr75ufG1uM/hqdefault.jpg)
OWASP Based Threat Modelling: Creating A Feedback Model In An Agile Environment - Chaitanya Bhatt
Chaitanya Bhatt
August 2019
Security
![OWASP SAMM2: Your Dynamic Software Security Journey - Sebastien Deleersnyder](https://i3.ytimg.com/vi/gNp1QTrGzx8/hqdefault.jpg)
![OWASP SAMM2: Your Dynamic Software Security Journey - Sebastien Deleersnyder](https://i3.ytimg.com/vi/gNp1QTrGzx8/hqdefault.jpg)
OWASP SAMM2: Your Dynamic Software Security Journey - Sebastien Deleersnyder
Sebastien Deleersnyder
August 2019
Security
![Practical OWASP CRS In High Security Settings - Christian Folini](https://i3.ytimg.com/vi/ZbTmpJldwPY/hqdefault.jpg)
![Practical OWASP CRS In High Security Settings - Christian Folini](https://i3.ytimg.com/vi/ZbTmpJldwPY/hqdefault.jpg)
Practical OWASP CRS In High Security Settings - Christian Folini
Christian Folini
August 2019
Security
![Restricting The Scripts, You're To Blame, You Give CSP A Bad Name - Sebastian Roth and Ben Stock](https://i3.ytimg.com/vi/jeTGBSL4eQs/hqdefault.jpg)
![Restricting The Scripts, You're To Blame, You Give CSP A Bad Name - Sebastian Roth and Ben Stock](https://i3.ytimg.com/vi/jeTGBSL4eQs/hqdefault.jpg)
Restricting The Scripts, You're To Blame, You Give CSP A Bad Name - Sebastian Roth and Ben Stock
Sebastian Roth and Ben Stock
August 2019
Security
![ScriptProtect: Mitigating Unsafe Third-Party JavaScript Practices - Marius Musch and Martin Johns](https://i3.ytimg.com/vi/JdmLUlYSz2I/hqdefault.jpg)
![ScriptProtect: Mitigating Unsafe Third-Party JavaScript Practices - Marius Musch and Martin Johns](https://i3.ytimg.com/vi/JdmLUlYSz2I/hqdefault.jpg)
ScriptProtect: Mitigating Unsafe Third-Party JavaScript Practices - Marius Musch and Martin Johns
Marius Musch and Martin Johns
August 2019
Security
![SUSTO: Systematic Universal Security Testing Orchestration - Luis Saiz](https://i3.ytimg.com/vi/SVjbzsCe3YQ/hqdefault.jpg)
![SUSTO: Systematic Universal Security Testing Orchestration - Luis Saiz](https://i3.ytimg.com/vi/SVjbzsCe3YQ/hqdefault.jpg)
SUSTO: Systematic Universal Security Testing Orchestration - Luis Saiz
Luis Saiz
August 2019
Security
![The Insecurity Caused By Trusting Your Client-Side Storage - Ben Stock and Marius Steffens](https://i3.ytimg.com/vi/6pEeJ37LfXo/hqdefault.jpg)
![The Insecurity Caused By Trusting Your Client-Side Storage - Ben Stock and Marius Steffens](https://i3.ytimg.com/vi/6pEeJ37LfXo/hqdefault.jpg)
The Insecurity Caused By Trusting Your Client-Side Storage - Ben Stock and Marius Steffens
Ben Stock and Marius Steffens
August 2019
Security
![The Security We Need: Designing Usable IoT Security - Damilare D. Fagbemi](https://i3.ytimg.com/vi/38uwvXN58Ko/hqdefault.jpg)
![The Security We Need: Designing Usable IoT Security - Damilare D. Fagbemi](https://i3.ytimg.com/vi/38uwvXN58Ko/hqdefault.jpg)
The Security We Need: Designing Usable IoT Security - Damilare D. Fagbemi
Damilare D. Fagbemi
August 2019
Security
![The State Of Credential Stuffing And The Future Of Account Takeovers - Jarrod Overson](https://i3.ytimg.com/vi/OtjK7xxHVm4/hqdefault.jpg)
![The State Of Credential Stuffing And The Future Of Account Takeovers - Jarrod Overson](https://i3.ytimg.com/vi/OtjK7xxHVm4/hqdefault.jpg)
The State Of Credential Stuffing And The Future Of Account Takeovers - Jarrod Overson
Jarrod Overson
August 2019
Security
![The Woman Who Squashed Terrorists: When An Embassy Gets Hacked - Chris Kubecka](https://i3.ytimg.com/vi/xHo0FqAIkrg/hqdefault.jpg)
![The Woman Who Squashed Terrorists: When An Embassy Gets Hacked - Chris Kubecka](https://i3.ytimg.com/vi/xHo0FqAIkrg/hqdefault.jpg)
The Woman Who Squashed Terrorists: When An Embassy Gets Hacked - Chris Kubecka
Chris Kubecka
August 2019
Security
![Threat Modelling Stories From The Trenches - David Johannson and Andrew Lee-Thorp](https://i3.ytimg.com/vi/Xgrq4fBBvCc/hqdefault.jpg)
![Threat Modelling Stories From The Trenches - David Johannson and Andrew Lee-Thorp](https://i3.ytimg.com/vi/Xgrq4fBBvCc/hqdefault.jpg)
Threat Modelling Stories From The Trenches - David Johannson and Andrew Lee-Thorp
David Johannson and Andrew Lee-Thorp
August 2019
Security
![Unlikely Allies: How HR Can Help Build A Security-First Culture - Alison Eastaway](https://i3.ytimg.com/vi/_CuYB7-v2t0/hqdefault.jpg)
![Unlikely Allies: How HR Can Help Build A Security-First Culture - Alison Eastaway](https://i3.ytimg.com/vi/_CuYB7-v2t0/hqdefault.jpg)
Unlikely Allies: How HR Can Help Build A Security-First Culture - Alison Eastaway
Alison Eastaway
August 2019
Security
![Web Apps vs Blockchain DApps (Smart Contracts): Tools, Vulns And Standards - Damian Rusinek](https://i3.ytimg.com/vi/ZRYLDpRBz6k/hqdefault.jpg)
![Web Apps vs Blockchain DApps (Smart Contracts): Tools, Vulns And Standards - Damian Rusinek](https://i3.ytimg.com/vi/ZRYLDpRBz6k/hqdefault.jpg)
Web Apps vs Blockchain DApps (Smart Contracts): Tools, Vulns And Standards - Damian Rusinek
Damian Rusinek
August 2019
Security
![WebAuthn: Strong Authentication vs Privacy vs Convenience - Suby Raman](https://i3.ytimg.com/vi/3FpWp_EoMSs/hqdefault.jpg)
![WebAuthn: Strong Authentication vs Privacy vs Convenience - Suby Raman](https://i3.ytimg.com/vi/3FpWp_EoMSs/hqdefault.jpg)
WebAuthn: Strong Authentication vs Privacy vs Convenience - Suby Raman
Suby Raman