Loading…
Attending this event?
THE MUST ATTEND EVENT FOR CYBERSECURITY PROFESSIONALS
Breakout: Project Track clear filter
Thursday, September 26
 

10:30am PDT

OWASP Mobile Application Security (MAS)
Thursday September 26, 2024 10:30am - 11:00am PDT
In this talk, Carlos Holguera and Sven Schleier, the OWASP Mobile Application Security (MAS) Project Leaders, will take a hands-on look at some of the latest OWASP MAS developments, in particular the new MASWE (Mobile Application Security Weakness Enumeration). This talk will introduce the concepts of "weaknesses", "atomic tests" and "demos" that are the basis of the upcoming MASTG v2. Attendees will gain practical knowledge through detailed examples that show the journey from definition to implementation using both static and dynamic analysis techniques available in MASTG. In addition, discover the newly developed MAS test apps designed to streamline research and improve the development of robust MAS tests. Don't miss this opportunity to improve your mobile app security skills and make your apps hack-proof. Whether you're looking to bolster your defenses or learn how to uncover vulnerabilities, this session will provide you with the cutting-edge resources you need to stay ahead in mobile security!
Speakers
avatar for Sven Schleier

Sven Schleier

Principal Security Consultant, Crayon
Sven is living in Austria and a Principal Security Consultant at Crayon, specialised in Cloud Security. He has extensive experience in offensive security engagements like Penetration Testing and Application Security by supporting and guiding software development projects for Mobile... Read More →
avatar for Carlos Holguera

Carlos Holguera

Principal Mobile Security Research Engineer, NowSecure
Carlos is a Principal Mobile Security Research Engineer at NowSecure and leads the OWASP Mobile Application Security (MAS) project at OWASP. He has many years of hands-on experience in security testing for mobile apps and embedded systems such as automotive ECUs and IoT devices. He... Read More →
Thursday September 26, 2024 10:30am - 11:00am PDT
Room: Bayview A (Bay Level)
  Breakout: Project Track

11:00am PDT

OWASP DevSecOps Maturity Model (DSOMM)
Thursday September 26, 2024 11:00am - 11:30am PDT
Achieving an Application Security Program with DSOMM

In this talk, Timo Pagel outlines a practical approach to building and optimizing application security (AppSec) programs for organizations of all sizes. While briefly touching on foundational elements, Timo's presentation focuses on developing and implementing a custom organizational maturity model based on DSOMM that resonates with development and operations teams.

Moving beyond traditional frameworks, Timo will teach attendees get most out of DSOMM by designing tailored models that account for diverse operating environments. The talk provides strategies for avoiding common pitfalls, implementing effective metrics, and creating a scalable AppSec approach adaptable to an organization's evolving needs. Through actionable advice and real-world examples, Timo will offer participants insights applicable to both new and existing AppSec programs.
Speakers
avatar for Timo Pagel

Timo Pagel

Timo Pagel has been in the IT industry for over twenty five years. After a career as a system administrator and web developer, he advises customers as a DevSecOps architect and trainer. His focus is on integrating security into the development lifecycle. For example with security... Read More →
Thursday September 26, 2024 11:00am - 11:30am PDT
Room: Bayview A (Bay Level)

11:30am PDT

OWASP Top 10 Risks for Open Source Software
Thursday September 26, 2024 11:30am - 12:00pm PDT
Speakers
avatar for George Apostolopoulos

George Apostolopoulos

Endor Labs
George Apostolopoulos is a computer science professional with over two decades of experience, specializing in the intersections of cybersecurity and machine learning. Currently, he is a member of the technical staff at Endor Labs, focusing on analytics and applications of AI to software... Read More →
Thursday September 26, 2024 11:30am - 12:00pm PDT
Room: Bayview A (Bay Level)

1:45pm PDT

OWASP Coraza
Thursday September 26, 2024 1:45pm - 2:15pm PDT
This talk will provide a comprehensive introduction to Coraza, its use cases, how to implement it, and operationalise it generally.

In recent years, we have been involved in several significant discussions, including:
- Why not Core Ruleset WAF?
- Evaluating the effectiveness of signature-based rules in protecting against zero-day vulnerabilities.
- Considering the applicability of Machine Learning in the realm of security.
- How can ModSecurity and Coraza live together?

This presentation will examine each of these areas in depth. It will also cover the latest benchmarks and metrics and investigate future improvements, such as the possibility of a new rule language, support for multi-threading regex, and dynamic rule execution based on payload type.
Speakers
avatar for Juan Pablo Tosso

Juan Pablo Tosso

Security Research Engineer, Traceable AI
I reside in Galicia and have two amazing children. I work as a solutions architect at Traceable, focusing on security. I also contribute to open-source projects. In my free time, I enjoy playing golf, going to the gym, cycling, and playing Magic: The Gathering. I have 12 years of... Read More →
Thursday September 26, 2024 1:45pm - 2:15pm PDT
Room: Bayview A (Bay Level)

2:15pm PDT

OWASP Nightingale Docker for Pentesters
Thursday September 26, 2024 2:15pm - 2:45pm PDT
In today's technological era, docker is the most powerful technology in each and every domain, whether it is Development, cyber security, DevOps, Automation, or Infrastructure. Considering the demand of the industry, I would like to introduce my idea to create a NIGHTINGALE: docker image for pentesters. This docker image is ready to use environment will the required tools that are needed at the time of pentesting on any of the scopes, whether it can be web application penetration testing, network penetration testing, mobile, API, OSINT, or Forensics. Also, it is a complete platform-independent so you can run Nightingale on every operating system as your wish, and it supports the Debian operating system.




Speakers
avatar for Raja Nagori

Raja Nagori

Information Security Consultant, TAC Security
Raja Nagori is working as Senior Information Security Engineer: IT Security Analyst II at FIS Global and Cyber Crime Intervention Officer from ISAC (Information and Security Analysis Center) with NSD (National Security Database). He is expertise in Application Security, Penetration... Read More →
Thursday September 26, 2024 2:15pm - 2:45pm PDT
Room: Bayview A (Bay Level)

2:45pm PDT

OWASP Software Assurance Maturity Model (SAMM)
Thursday September 26, 2024 2:45pm - 3:15pm PDT
OWASP Software Assurance Maturity Model (SAMM) Interactive Introduction and Update
Join project core members Aram and Sebastien for an engaging and interactive introduction and update on the OWASP Software Assurance Maturity Model (SAMM).

We will begin with a concise overview of SAMM's purpose and application in jumpstarting and accelerating your software assurance roadmap. This session will provide valuable insights and practical knowledge on leveraging SAMM effectively.

Tools and Assessment Guidance: Discover the range of SAMM tools available to support your software assurance efforts. We will explain the latest assessment guidance, providing you with the knowledge to utilize these tools to their fullest potential.

Mapping to Other Frameworks: Learn how SAMM can be mapped to other frameworks, such as the NIST Secure Software Development Framework (SSDF). This will enable you to leverage SAMM for demonstrating compliance and enhancing your software security posture.

Benchmark yourself against peers: The OWASP SAMM Benchmark enables organizations to anonymously compare their software security practices against industry peers, providing insights to identify improvement areas, prioritize security efforts, and track progress over time.
Speakers
avatar for Aram Hovsepyan

Aram Hovsepyan

Founder and CEO, Codific
Aram is the founder and CEO of Codific - a Flemish cybersecurity product firm. With over 15 years of experience, he jas a proven track record in building complex software systems by explicitly focusing on software security. Codific’s flagship product, Videolab, is a secure multimedia... Read More →
avatar for Sebastien Deleersnyder

Sebastien Deleersnyder

CTO and Co-Founder / COO, Toreon / Data Protection Institute
Sebastien Deleersnyder (Seba) is the CTO, co-founder of Toreon and COO of Data Protection Institute. With a strong background in development and extensive experience in cybersecurity, Seba has trained numerous developers on how to create more secure software. He is also the founder... Read More →
Thursday September 26, 2024 2:45pm - 3:15pm PDT
Room: Bayview A (Bay Level)
 
Friday, September 27
 

10:30am PDT

OWASP IoT Security Testing Guide (ISTG)
Friday September 27, 2024 10:30am - 11:00am PDT
Internet of Things (IoT) has revolutionized the way we interact with our environments, connecting billions of devices to enhance efficiency, convenience, and automation in various sectors such as healthcare, transportation, and smart homes. However, the proliferation of interconnected devices also introduces significant security challenges. IoT devices, often designed with limited computing resources, may lack robust security features, making them vulnerable to cyber-attacks. As IoT continues to expand, discovering and addressing its security vulnerabilities becomes paramount to safeguarding personal privacy and ensuring the resilience of interconnected infrastructures. This project showcase will introduce and demonstrate current capabilities of the OWASP IoT Security Testing Guide (ISTG) project released earlier this year. The ISTG comprises a comprehensive methodology for penetration tests in the IoT field, offering flexibility to adapt innovations, and developments in the IoT market while still ensuring comparability of test results. While the guide is mainly intended to be used by penetration testers, its resources may aid manufacturers and operators of IoT devices to proactively improve the security of their devices.
Speakers
avatar for Aaron Guzman

Aaron Guzman

Head of Trust Assurance, Cisco Meraki
Aaron Guzman is a seasoned leader passionate about securing the connected device world. He serves as the Head of Trust Assurance with Cisco Meraki, protecting millions of cloud-managed networks and end-users. His dedication extends to the community through leadership in open-source... Read More →
Friday September 27, 2024 10:30am - 11:00am PDT
Room: Bayview A (Bay Level)

11:00am PDT

OWASP dep-scan
Friday September 27, 2024 11:00am - 11:30am PDT
OWASP dep-scan v6: The S in SCA is not an SBOM

The principle behind Software Composition Analysis (SCA) has remained the same for over a decade. It involves a single Software Bill-of-Materials (SBOM) document and a vulnerability database to identify potential vulnerabilities and advisories that might affect the given application or service. Such a technique of scanning an application with limited context creates both false positives and false negatives, a problem that is well-understood. Solving these inherent weaknesses requires some bold ideas. For OWASP dep-scan v6, we are revisiting every single word in the SCA acronym, to rethink SCA as we know it. In this mini session, we discuss the thinking behind the v6 release and offer insights into our technology and development efforts.
Speakers
avatar for Prabhu Subramanian

Prabhu Subramanian

Prabhu Subramanian is the creator of the AppThreat platform, which includes open-source tools such as atom, blint, cdxgen, and dep-scan. Many of these projects are now incubated under the OWASP Foundation, where he co-leads them along with Caroline and Tim.
Friday September 27, 2024 11:00am - 11:30am PDT
Room: Bayview A (Bay Level)

11:30am PDT

OWASP Nettacker
Friday September 27, 2024 11:30am - 12:00pm PDT
OWASP Nettacker project (a portmanteau of "Network Attacker") is a relatively new yet an awesome and powerful "swiss-army-knife" automated penetration testing framework fully written in Python. Nettacker recently gained a lot of interest from the European and Asian penetration testing communities and was even included in the specialist Linux distribution for penetration testers and security researchers. Nettacker is able to run various scans using a variety of methods and generate scan reports for applications and networks, including services, bugs, vulnerabilities, misconfigurations, default credentials and many other cool features - for example an ability to chain different scan methods. This talk will feature a live demo and several practical usage examples of how organisations can benefit from this OWASP project for automated security testing

Speakers
avatar for Sam Stepanyan

Sam Stepanyan

OWASP Global Board Member, OWASP London Chapter Leader. Independent Application Security Consultant and Security Archite, OWASP
Sam Stepanyan is an OWASP Global Board member and an OWASP London Chapter Leader, and an Independent Application Security Consultant and Security Architect with over 20 years of experience in the IT industry with a background in software engineering and web application development... Read More →
Friday September 27, 2024 11:30am - 12:00pm PDT
Room: Bayview A (Bay Level)

1:15pm PDT

OWASP Serverless Top 10
Friday September 27, 2024 1:15pm - 1:45pm PDT
Why OWASP Serverless Top Ten is Crucial for the Industry 

Unique Security Challenges
- Serverless computing introduces distinct security risks, such as misconfigured permissions, insecure third-party integrations, and event injection vulnerabilities.

Rapid Adoption Without Security Awareness
- OWASP Serverless Top Ten helps close the knowledge gap, providing clear guidelines on common threats. Guidance for Developers and Security Teams
- The Top Ten is a comprehensive, practical resource for developers and security teams to understand better and mitigate serverless applications' most critical security vulnerabilities.

Industry-Standard Reference 
- Provides a unified, industry-recognized reference, ensuring organizations and developers follow best practices in securing serverless architectures.

Adaptability to Cloud-Native Ecosystems 
- OWASP Serverless Top Ten addresses security in these increasingly complex environments.

Future-Proofing Security for Next-Generation Applications
- As serverless computing continues to evolve with AI, IoT, and edge computing, the Serverless Top Ten ensures that the industry remains proactive about emerging threats, not reactive.
Speakers
avatar for David Melamed

David Melamed

CTO and Co-Founder, Jit
David Melamed is the CTO and Co-Founder of Jit, the open ASPM for Cloud-Native applications. With over 15 years of experience in cyberSecurity and cloud computing, he deeply understands the challenges in this fast-growing domain. Leveraging a PhD in Bioinformatics from Paris XI University... Read More →
avatar for Aruneesh Salhotra

Aruneesh Salhotra

Aruneesh Salhotra is a seasoned technologist and servant leader, renowned for his extensive expertise across cybersecurity, DevSecOps, AI, Business Continuity, Audit, Sales. His impactful presence as an industry thought leader is underscored by his contributions as a speaker and panelist... Read More →
Friday September 27, 2024 1:15pm - 1:45pm PDT
Room: Bayview A (Bay Level)

1:45pm PDT

OWASP DefectDojo
Friday September 27, 2024 1:45pm - 2:15pm PDT
DefectDojo was created by DevSecOps people for DevSecOps people. 

You’re tasked with ‘doing DevSecOps’ for your company, and now you’ve got more apps and issues than you know how to deal with.

How do you make sense of the different tools outputs for all your different apps?

DefectDojo is an open source platform that can be your single pane of glass by aggregating, distilling, and automating your AppSec and DevSecOps tools. 


In this talk, you’ll learn about DefectDojo and how to make the most of the many features it offers, including its REST-based API. DefectDojo can be your single pane of glass for discovered security vulnerabilities, report generation, aggregation of over 150+ different security tools, inventory of applications, and tracking testing efforts/metrics on your AppSec program. DefectDojo was the heart of an AppSec automation effort that saw an increase in assessments from 44 to 414 in two years. Don't you want 9.4 times more output from your AppSec program? 


It's time to ditch spreadsheets and get DefectDojo.
Speakers
avatar for Matt Tesauro

Matt Tesauro

Founder and CTO, DefectDojo
Matt Tesauro is a DevSecOps and AppSec guru who specializes in creating security programs, leveraging automation to maximize team velocity and training emerging and senior security professionals. When not writing automation code in Go, Matt is pushing for DevSecOps everywhere via... Read More →
Friday September 27, 2024 1:45pm - 2:15pm PDT
Room: Bayview A

2:15pm PDT

OWASP Application Security Verification Standard (ASVS)
Friday September 27, 2024 2:15pm - 2:45pm PDT
Speakers
avatar for Shanni Prutchi

Shanni Prutchi

Professional Advisory Services Consultant, CrowdStrike
Shanni Prutchi is an information security consultant specializing in incident response preparedness and application security. She currently delivers incident response tabletop exercises and cybersecurity maturity assessment at CrowdStrike, and previously focused on threat modeling... Read More →
avatar for Ryan Armstrong

Ryan Armstrong

Manager of Application Security Services, Digital Boundary Group (DBG)
Ryan Armstrong is the Manager of Application Security Services at Digital Boundary Group (DBG). Ryan began with DBG as an application penetration tester and security consultant following completion of his PhD in Biomedical Engineering at Western University in 2016. With a passion... Read More →
Friday September 27, 2024 2:15pm - 2:45pm PDT
Room: Bayview A (Bay Level)

2:45pm PDT

OWASP Machine Learning Security Top 10
Friday September 27, 2024 2:45pm - 3:15pm PDT
Friday September 27, 2024 2:45pm - 3:15pm PDT
Room: Bayview A (Bay Level)

3:15pm PDT

OWASP JuiceShop
Friday September 27, 2024 3:15pm - 3:45pm PDT
Once upon a time, developers and security experts relied on mostly server-side rendered vulnerable applications to train their web hacking skills. In 2014 the Juice Shop entered the stage as one of the first Rich Internet Application representatives. What started as a personal pet project with two dozen hacking challenges became an OWASP Flagship project shortly after and grew in size, scope, and use case coverage significantly over the years. Join us on a 10th anniversary tour through the origins, history and evolution of OWASP Juice Shop from 2014 to 2024, including new juicy hacking delicacies and some crazy shenanigans happening in and around the project.
Speakers
avatar for Bjoern Kimminich

Bjoern Kimminich

Product Group Lead Application Ecosystem, Kuehne + Nagel
Bjoern Kimminich works as Product Group Lead Application Ecosystem at Kuehne + Nagel, responsible – among other things – for the Application Security program in the corporate IT. He is an OWASP Lifetime Member, the project leader of the OWASP Juice Shop, and a co-chapter leader... Read More →
Friday September 27, 2024 3:15pm - 3:45pm PDT
Room: Bayview A (Bay Level)