This event has ended. Visit the
official site
or
create your own event on Sched
.
LASCON 2015
Schedule
Simple
Expanded
Grid
By Venue
Speakers
Sponsors
Volunteers
Attendees
Search
or browse by date + venue
2-Day Training Class
AppSec Track
Attacks and Tooling Track
Auth and Crypto Track
Conference
Core Conversation Track
Defender Track
Mobile and IoT Track
Rugged DevOps Track
Popular
Sign up
or
log in
to bookmark your favorites and sync them to your phone or calendar.
menu
Menu
Log in
Sign up
Schedule
Speakers
Sponsors
Volunteers
Attendees
Search
tune
Filter sessions
Simple
Expanded
Grid
By Venue
Tuesday
, October 20
9:00am CDT
Creating and automating your own AppSec Pipeline (Day 1)
Under Armour Room
Defensive Programing for JavaScript and HTML5 (Day 1)
Gemalto Room
Wednesday
, October 21
9:00am CDT
OWASP TOP 10: Intro to Application Security for Developers
Contrast Security Ballroom
Creating and automating your own AppSec Pipeline (Day 2)
Under Armour Room
Defensive Programming for JavaScript and HTML5 (Day 2)
Gemalto Room
Thursday
, October 22
7:30am CDT
Registration Opens
Contrast Security Ballroom
9:00am CDT
Keynote: Pete Cheslock
Contrast Security Ballroom
10:00am CDT
Fast Adversaries - Fast Countermeasures
Under Armour Room
Why Some Multi-Factor Authentication Technology is Irresponsible
Gemalto Room
Rugged Software Engineering
Contrast Security Ballroom
Doing AppSec at Scale: DevOps + Agile + CI/CD == AppSec Pipelines
Cypress Room
11:00am CDT
PHP WAF: Intercept and Monitor Application Attacks
Under Armour Room
Authz is the new Authn: Trust Elevation with UMA and OpenID Connect
Gemalto Room
Docker Docker Docker Security Docker
Cypress Room
11:30am CDT
Lunch
Contrast Security Ballroom
12:00pm CDT
Testing Modern Applications with Hackazon
Under Armour Room
Managing Certificates and TLS Endpoints
Gemalto Room
Designing Flexibility in Software to Increase Security
Cypress Room
1:00pm CDT
PHP Security Redefined
Under Armour Room
Mobile Connect – A better and secure user experience for online authentication.
Gemalto Room
The Illusion of Control: Secrets Within Your Software Supply Chain
Cypress Room
2:00pm CDT
Keynote: Jack Daniel
Contrast Security Ballroom
3:00pm CDT
The 13 best golang security tips you'll evar hear!
Under Armour Room
Security for Non-Unicorns
Contrast Security Ballroom
Getting Security up to Speed (with CI/CD)
Cypress Room
4:00pm CDT
The Node.js Highway: Attacks Are At Full Throttle
Under Armour Room
Speed Debates
Contrast Security Ballroom
Agile Security: The fails that nobody told you about
Cypress Room
5:00pm CDT
Happy Hour!
Contrast Security Ballroom
Ride the Bull!
Gemalto Room
Friday
, October 23
8:30am CDT
Registration Opens
Contrast Security Ballroom
9:00am CDT
Keynote: Kelly Lum
Contrast Security Ballroom
10:00am CDT
What Do You Mean My Security Tools Don’t Work on APIs?!!
Cypress Room
Bits & Bytes Meet Flesh & Blood: Rugged DevOps for IoT
Contrast Security Ballroom
Problems you'll face when building a software security program
Gemalto Room
Mobile Landscape: The Security of Wearables
Under Armour Room
11:00am CDT
Automate Security Tests for APIs with Syntribos, an Open Source Security Scanner
Cypress Room
It Takes a Village: Effective Collaboration in Security
Gemalto Room
MQTT and CoAP: A Story about IoT Protocol Security
Under Armour Room
11:30am CDT
Lunch
Contrast Security Ballroom
12:00pm CDT
Static Analysis Security Testing for Dummies… and You
Cypress Room
Big Data, What's the Big Deal?
Gemalto Room
Connected Vehicle Security
Under Armour Room
1:00pm CDT
The ThreadFix Ecosystem: Vendors, Volunteers, and Versions
Under Armour Room
Your Last Manual Assessment
Cypress Room
The Culture of Security
Gemalto Room
2:00pm CDT
New Farming Methods for the Epistemological Wasteland of Application Security
Under Armour Room
Hack Wars - A New Hope
Cypress Room
Technology, Privacy and the Law: New Challenges for Non-Profits
Contrast Security Ballroom
Hack the Cloud Hack the Company: the Cloud Impact on Enterprise Security
Gemalto Room
3:00pm CDT
Httpillage: Calling all nodes
Cypress Room
How Google Turned Me Into My Mother: The Proxy Paradox In Security
Contrast Security Ballroom
Security Automation in the Agile SDLC - Real World Cases
Gemalto Room
4:00pm CDT
Closing Remark, Contest Results
Contrast Security Ballroom
Timezone
LASCON 2015
America/Chicago
Filter By Date
LASCON 2015
Oct 20
-
23, 2015
Tuesday
, October 20
Wednesday
, October 21
Thursday
, October 22
Friday
, October 23
Filter By Venue
Austin, TX, United States
Sort schedule by Venue
Contrast Security Ballroom
Cypress Room
Gemalto Room
Under Armour Room
Filter By Type
2-Day Training Class
AppSec Track
Attacks and Tooling Track
Auth and Crypto Track
Conference
Core Conversation Track
Defender Track
Mobile and IoT Track
Rugged DevOps Track
Recently Active Attendees
Oleg Gryb
Jeff Williams
David Moreira
Brett Roderick
Tiana Chandler
Kelly Santalucia
Josh Sokol
Vinay Prabhushankar
More →
Filter sessions
Apply filters to sessions.
close
Dates
Tuesday
, October 20
Wednesday
, October 21
Thursday
, October 22
Friday
, October 23
Venue
Contrast Security Ballroom
Cypress Room
Gemalto Room
Under Armour Room
Session Type
2-Day Training Class
AppSec Track
Attacks and Tooling Track
Auth and Crypto Track
Conference
Core Conversation Track
Defender Track
Mobile and IoT Track
Rugged DevOps Track
Other Filters