Sched.com Conference Mobile Apps
AppSec California 2016
has ended
Create Your Own Event
Menu
Schedule
Speakers
Attendees
Search
Log in
Sign up
AppSec California 2016
Schedule
Simple
Expanded
Grid
By Venue
Map
Speakers
Attendees
Search
or browse by date + venue
Break
Club Room
Garden Terrace Room
Marion Davies Guest House
Sand and Sea Room
Terrace Lounge
Popular
Popular Events
#1
Opening Keynote - Marcus Ranum
#2
Opening Keynote: Jeremiah Grossman
#3
Welcome Address and State of OWASP
#4
Closing remarks
#5
Reception
#6
Welcome Address
#7
Closing Keynote: Jacob West
#8
Break and Vendor Expo
#9
Lunch and Vendor Expo
#10
Preventing Security Bugs through Software Design
#11
https://
#12
Software Security Metrics
#13
Unlocking Threat Modeling
#14
Registration, Breakfast, and Vendor Expo
#15
Break and Vendor Expo
#16
All our APIs are belong to us
#17
Closing remarks and Raffle Drawing
#18
Registration, Breakfast, and Vendor Expo
#19
Break and Vendor Expo
#20
Software Security Initiative Capabilities - Where Do I Begin?
#21
Advances in Secure Coding Frameworks
#22
Fixing the Unfixable: Solving Pervasive Vulnerabilities with RASP
#23
Hard to Port! - A Snapshot of the Vulnerability Landscape in 2015
#24
Security Automation in the Agile SDLC - Real World Cases
#25
Lunch and Vendor Expo
#26
Break and Vendor Expo
#27
Open Source Authentication Experiences Strong Growth
#28
Riot Games Security Meetup
#29
Design Approaches for Security Automation
#30
6 Myths of Threat Modeling
#31
5 Steps to Drive Enterprise Software Security
#32
AuthMatrix: Simplified Authorization Testing for Web Applications
#33
Making Security Agile
#34
Integrating Mobile Devices into Your Penetration Testing Program
#35
Skillful, Scalefull Fullstack Security in a State of Constant Flux
#36
Registration and Breakfast
#37
Taking AppSec to 11: AppSec Pipelines, DevOps and Making Things Better
#38
Radio Hacking: Cars, Hardware, and more!
#39
Dissecting Bitcoin Security
#40
Connected Cars – What Could Possibly Go Wrong?
#41
Visualizing Security via LANGSEC
#42
Ad Hoc Mutable Infrastructure for Security Management
#43
IoT Cornerstones of Security
#44
To bounty, or not to bounty? Security@ insights from 500 organizations.
#45
Attack tree vignettes for Containers as a Service applications and risk centric threat models
#46
Benchmarking AppSec Across Industries
#47
Postcards from the Total Perspective Vortex
#48
Panel: Women in Security
#49
Attack Techniques and Hands-On CTF
#50
Adaptive Testing Methodology: Crowdsourced Testing Methodology Customized to the Target Stack
Popular by Type
All Types
Break
Club Room
Garden Terrace Room
Marion Davies Guest House
Sand and Sea Room
Terrace Lounge
Popular by Day
All days
Monday, Jan 25
Tuesday, Jan 26
Wednesday, Jan 27
Recently Active Attendees
Kelly Santalucia
TW
Tara Williams
Neil Matatall
Avi Douglen
Hwood Bin
Mike Rodriguez
bikromshah shah
Geller Bedoya
More →