Registration and Breakfast 8:00am - 9:00am
Secure Coding Bootcamp for the Web 9:00am - 5:00pm
Attack Techniques and Hands-On CTF 9:00am - 5:00pm
Web Pentesting Using OWASP Tools 9:00am - 5:00pm
OWASP Top 10 – Exploitation and Effective Safeguards 9:00am - 5:00pm
Riot Games Security Meetup 6:30pm - 10:00pm
Registration, Breakfast, and Vendor Expo 7:45am - 9:00am
Welcome Address an...
Opening Keynote - Marcus Ranum 9:15am - 10:00am
Break and Vendor Expo 10:00am - 10:30am
To bounty, or not to bounty? Security@ insights from... 10:30am - 11:20am
Taking AppSec to 11: AppSec Pipelines, DevOps and Ma... 10:30am - 11:20am
Connected Cars – What Could Possibly Go Wrong? 10:30am - 11:20am
Software Security Initiative Capabilities - Where Do... 10:30am - 11:20am
All You Need Is One - A ClickOnce Love Story 11:30am - 12:20pm
Design Approaches for Security Automation 11:30am - 12:20pm
AuthMatrix: Simplified Authorization Testing for Web Application... 11:30am - 12:30pm
Preventing Security Bugs through Software Design 11:30am - 12:20pm
Lunch and Vendor Expo 12:20pm - 2:00pm
https:// 2:00pm - 2:50pm
Integrating Mobile Devices into Your Penetration Test... 2:00pm - 2:50pm
Attack tree vignettes for Containers as a Service app... 2:00pm - 2:50pm
Radio Hacking: Cars, Hardware, and more! 2:00pm - 2:50pm
Adaptive Testing Methodology: Crowdsourced Testing Me... 3:00pm - 3:50pm
Software Security Metrics 3:00pm - 3:50pm
Visualizing Security via LANGSEC 3:00pm - 3:50pm
Hard to Port! - A Snapshot of the Vulnerability Lands... 3:00pm - 3:50pm
Break and Vendor Expo 3:50pm - 4:30pm
Unlocking Threat Modeling 4:30pm - 5:20pm
Dissecting Bitcoin Security 4:30pm - 5:20pm
Security Automation in the Agile SDLC - Real World Ca... 4:30pm - 5:20pm
Closing remarks
Reception 5:30pm - 9:00pm
Brazilian jiu-jitsu (BJJ) Smackdown 7:00pm - 11:00pm
Welcome Address
Opening Keynote: Jeremiah Grossman 9:10am - 10:00am
Ad Hoc Mutable Infrastructure for Security Management 10:30am - 11:20am
Advances in Secure Coding Frameworks 10:30am - 11:20am
Benchmarking AppSec Across Industries 10:30am - 11:20am
6 Myths of Threat Modeling 10:30am - 11:20am
Panel: Women in Security 11:30am - 12:20pm
Skillful, Scalefull Fullstack Security in a State of... 11:30am - 12:20pm
5 Steps to Drive Enterprise Software Security 11:30am - 12:20pm
Making Security Agile 11:30am - 12:20pm
PROJECTS: Whats Right, Whats Wrong, What Needs to Change 12:20pm - 1:45pm
IoT Cornerstones of Security 2:00pm - 2:50pm
Open Source Authentication Experiences Strong Growth 2:00pm - 2:50pm
Fixing the Unfixable: Solving Pervasive Vulnerabiliti... 2:00pm - 2:50pm
10 Years of Working with the Community 2:00pm - 2:50pm
Postcards from the Total Perspective Vortex 3:00pm - 3:50pm
Video Game Security 3:00pm - 3:50pm
All our APIs are belong to us 3:00pm - 3:50pm
Closing Keynote: Jacob West 4:30pm - 5:20pm
Closing remarks and Raffle Drawing 5:20pm - 6:00pm