Loading…
Attending this event?
THE MUST ATTEND EVENT FOR CYBERSECURITY PROFESSIONALS
Breakout: Project Track clear filter
arrow_back View All Dates
Friday, September 27
 

10:30am PDT

OWASP IoT Security Testing Guide (ISTG)
Friday September 27, 2024 10:30am - 11:00am PDT
Internet of Things (IoT) has revolutionized the way we interact with our environments, connecting billions of devices to enhance efficiency, convenience, and automation in various sectors such as healthcare, transportation, and smart homes. However, the proliferation of interconnected devices also introduces significant security challenges. IoT devices, often designed with limited computing resources, may lack robust security features, making them vulnerable to cyber-attacks. As IoT continues to expand, discovering and addressing its security vulnerabilities becomes paramount to safeguarding personal privacy and ensuring the resilience of interconnected infrastructures. This project showcase will introduce and demonstrate current capabilities of the OWASP IoT Security Testing Guide (ISTG) project released earlier this year. The ISTG comprises a comprehensive methodology for penetration tests in the IoT field, offering flexibility to adapt innovations, and developments in the IoT market while still ensuring comparability of test results. While the guide is mainly intended to be used by penetration testers, its resources may aid manufacturers and operators of IoT devices to proactively improve the security of their devices.
Speakers
avatar for Aaron Guzman

Aaron Guzman

Head of Trust Assurance, Cisco Meraki
Aaron Guzman is a seasoned leader passionate about securing the connected device world. He serves as the Head of Trust Assurance with Cisco Meraki, protecting millions of cloud-managed networks and end-users. His dedication extends to the community through leadership in open-source... Read More →
Friday September 27, 2024 10:30am - 11:00am PDT
Room: Bayview A (Bay Level)

11:00am PDT

OWASP dep-scan
Friday September 27, 2024 11:00am - 11:30am PDT
OWASP dep-scan v6: The S in SCA is not an SBOM

The principle behind Software Composition Analysis (SCA) has remained the same for over a decade. It involves a single Software Bill-of-Materials (SBOM) document and a vulnerability database to identify potential vulnerabilities and advisories that might affect the given application or service. Such a technique of scanning an application with limited context creates both false positives and false negatives, a problem that is well-understood. Solving these inherent weaknesses requires some bold ideas. For OWASP dep-scan v6, we are revisiting every single word in the SCA acronym, to rethink SCA as we know it. In this mini session, we discuss the thinking behind the v6 release and offer insights into our technology and development efforts.
Speakers
avatar for Prabhu Subramanian

Prabhu Subramanian

Prabhu Subramanian is the creator of the AppThreat platform, which includes open-source tools such as atom, blint, cdxgen, and dep-scan. Many of these projects are now incubated under the OWASP Foundation, where he co-leads them along with Caroline and Tim.
Friday September 27, 2024 11:00am - 11:30am PDT
Room: Bayview A (Bay Level)

11:30am PDT

OWASP Nettacker
Friday September 27, 2024 11:30am - 12:00pm PDT
OWASP Nettacker project (a portmanteau of "Network Attacker") is a relatively new yet an awesome and powerful "swiss-army-knife" automated penetration testing framework fully written in Python. Nettacker recently gained a lot of interest from the European and Asian penetration testing communities and was even included in the specialist Linux distribution for penetration testers and security researchers. Nettacker is able to run various scans using a variety of methods and generate scan reports for applications and networks, including services, bugs, vulnerabilities, misconfigurations, default credentials and many other cool features - for example an ability to chain different scan methods. This talk will feature a live demo and several practical usage examples of how organisations can benefit from this OWASP project for automated security testing

Speakers
avatar for Sam Stepanyan

Sam Stepanyan

OWASP Global Board Member, OWASP London Chapter Leader. Independent Application Security Consultant and Security Archite, OWASP
Sam Stepanyan is an OWASP Global Board member and an OWASP London Chapter Leader, and an Independent Application Security Consultant and Security Architect with over 20 years of experience in the IT industry with a background in software engineering and web application development... Read More →
Friday September 27, 2024 11:30am - 12:00pm PDT
Room: Bayview A (Bay Level)

1:15pm PDT

OWASP Serverless Top 10
Friday September 27, 2024 1:15pm - 1:45pm PDT
Why OWASP Serverless Top Ten is Crucial for the Industry 

Unique Security Challenges
- Serverless computing introduces distinct security risks, such as misconfigured permissions, insecure third-party integrations, and event injection vulnerabilities.

Rapid Adoption Without Security Awareness
- OWASP Serverless Top Ten helps close the knowledge gap, providing clear guidelines on common threats. Guidance for Developers and Security Teams
- The Top Ten is a comprehensive, practical resource for developers and security teams to understand better and mitigate serverless applications' most critical security vulnerabilities.

Industry-Standard Reference 
- Provides a unified, industry-recognized reference, ensuring organizations and developers follow best practices in securing serverless architectures.

Adaptability to Cloud-Native Ecosystems 
- OWASP Serverless Top Ten addresses security in these increasingly complex environments.

Future-Proofing Security for Next-Generation Applications
- As serverless computing continues to evolve with AI, IoT, and edge computing, the Serverless Top Ten ensures that the industry remains proactive about emerging threats, not reactive.
Speakers
avatar for David Melamed

David Melamed

CTO and Co-Founder, Jit
David Melamed is the CTO and Co-Founder of Jit, the open ASPM for Cloud-Native applications. With over 15 years of experience in cyberSecurity and cloud computing, he deeply understands the challenges in this fast-growing domain. Leveraging a PhD in Bioinformatics from Paris XI University... Read More →
avatar for Aruneesh Salhotra

Aruneesh Salhotra

Aruneesh Salhotra is a seasoned technologist and servant leader, renowned for his extensive expertise across cybersecurity, DevSecOps, AI, Business Continuity, Audit, Sales. His impactful presence as an industry thought leader is underscored by his contributions as a speaker and panelist... Read More →
Friday September 27, 2024 1:15pm - 1:45pm PDT
Room: Bayview A (Bay Level)

1:45pm PDT

OWASP DefectDojo
Friday September 27, 2024 1:45pm - 2:15pm PDT
DefectDojo was created by DevSecOps people for DevSecOps people. 

You’re tasked with ‘doing DevSecOps’ for your company, and now you’ve got more apps and issues than you know how to deal with.

How do you make sense of the different tools outputs for all your different apps?

DefectDojo is an open source platform that can be your single pane of glass by aggregating, distilling, and automating your AppSec and DevSecOps tools. 


In this talk, you’ll learn about DefectDojo and how to make the most of the many features it offers, including its REST-based API. DefectDojo can be your single pane of glass for discovered security vulnerabilities, report generation, aggregation of over 150+ different security tools, inventory of applications, and tracking testing efforts/metrics on your AppSec program. DefectDojo was the heart of an AppSec automation effort that saw an increase in assessments from 44 to 414 in two years. Don't you want 9.4 times more output from your AppSec program? 


It's time to ditch spreadsheets and get DefectDojo.
Speakers
avatar for Matt Tesauro

Matt Tesauro

Founder and CTO, DefectDojo
Matt Tesauro is a DevSecOps and AppSec guru who specializes in creating security programs, leveraging automation to maximize team velocity and training emerging and senior security professionals. When not writing automation code in Go, Matt is pushing for DevSecOps everywhere via... Read More →
Friday September 27, 2024 1:45pm - 2:15pm PDT
Room: Bayview A

2:15pm PDT

OWASP Application Security Verification Standard (ASVS)
Friday September 27, 2024 2:15pm - 2:45pm PDT
Speakers
avatar for Shanni Prutchi

Shanni Prutchi

Professional Advisory Services Consultant, CrowdStrike
Shanni Prutchi is an information security consultant specializing in incident response preparedness and application security. She currently delivers incident response tabletop exercises and cybersecurity maturity assessment at CrowdStrike, and previously focused on threat modeling... Read More →
avatar for Ryan Armstrong

Ryan Armstrong

Manager of Application Security Services, Digital Boundary Group (DBG)
Ryan Armstrong is the Manager of Application Security Services at Digital Boundary Group (DBG). Ryan began with DBG as an application penetration tester and security consultant following completion of his PhD in Biomedical Engineering at Western University in 2016. With a passion... Read More →
Friday September 27, 2024 2:15pm - 2:45pm PDT
Room: Bayview A (Bay Level)

2:45pm PDT

OWASP Machine Learning Security Top 10
Friday September 27, 2024 2:45pm - 3:15pm PDT
Friday September 27, 2024 2:45pm - 3:15pm PDT
Room: Bayview A (Bay Level)

3:15pm PDT

OWASP JuiceShop
Friday September 27, 2024 3:15pm - 3:45pm PDT
Once upon a time, developers and security experts relied on mostly server-side rendered vulnerable applications to train their web hacking skills. In 2014 the Juice Shop entered the stage as one of the first Rich Internet Application representatives. What started as a personal pet project with two dozen hacking challenges became an OWASP Flagship project shortly after and grew in size, scope, and use case coverage significantly over the years. Join us on a 10th anniversary tour through the origins, history and evolution of OWASP Juice Shop from 2014 to 2024, including new juicy hacking delicacies and some crazy shenanigans happening in and around the project.
Speakers
avatar for Bjoern Kimminich

Bjoern Kimminich

Product Group Lead Application Ecosystem, Kuehne + Nagel
Bjoern Kimminich works as Product Group Lead Application Ecosystem at Kuehne + Nagel, responsible – among other things – for the Application Security program in the corporate IT. He is an OWASP Lifetime Member, the project leader of the OWASP Juice Shop, and a co-chapter leader... Read More →
Friday September 27, 2024 3:15pm - 3:45pm PDT
Room: Bayview A (Bay Level)