Menu
Log in
Sign up
Schedule
Speakers
Sponsors
Volunteers
Attendees
Search
Calendar Export
Print Schedule
This event has ended. Visit the
official site
or
create your own event on Sched
.
LASCON 2015
Schedule
Simple
Expanded
Grid
By Venue
Speakers
Sponsors
Volunteers
Attendees
Search
or browse by date + venue
2-Day Training Class
AppSec Track
Attacks and Tooling Track
Auth and Crypto Track
Conference
Core Conversation Track
Defender Track
Mobile and IoT Track
Rugged DevOps Track
Popular
Popular Events
#1
Keynote: Jack Daniel
#2
Keynote: Kelly Lum
#3
Keynote: Pete Cheslock
#4
Closing Remark, Contest Results
#5
Lunch
#6
Lunch
#7
Docker Docker Docker Security Docker
#8
Registration Opens
#9
Happy Hour!
#10
The Illusion of Control: Secrets Within Your Software Supply Chain
#11
It Takes a Village: Effective Collaboration in Security
#12
Hack the Cloud Hack the Company: the Cloud Impact on Enterprise Security
#13
Security Automation in the Agile SDLC - Real World Cases
#14
Automate Security Tests for APIs with Syntribos, an Open Source Security Scanner
#15
Agile Security: The fails that nobody told you about
#16
Static Analysis Security Testing for Dummies… and You
#17
Security for Non-Unicorns
#18
What Do You Mean My Security Tools Don’t Work on APIs?!!
#19
Your Last Manual Assessment
#20
Doing AppSec at Scale: DevOps + Agile + CI/CD == AppSec Pipelines
#21
Getting Security up to Speed (with CI/CD)
#22
Problems you'll face when building a software security program
#23
Why Some Multi-Factor Authentication Technology is Irresponsible
#24
Rugged Software Engineering
#25
Connected Vehicle Security
#26
Designing Flexibility in Software to Increase Security
#27
Managing Certificates and TLS Endpoints
#28
Testing Modern Applications with Hackazon
#29
Mobile Connect – A better and secure user experience for online authentication.
#30
The Node.js Highway: Attacks Are At Full Throttle
#31
Registration Opens
#32
The Culture of Security
#33
The ThreadFix Ecosystem: Vendors, Volunteers, and Versions
#34
How Google Turned Me Into My Mother: The Proxy Paradox In Security
#35
Fast Adversaries - Fast Countermeasures
#36
Speed Debates
#37
New Farming Methods for the Epistemological Wasteland of Application Security
#38
Authz is the new Authn: Trust Elevation with UMA and OpenID Connect
#39
Bits & Bytes Meet Flesh & Blood: Rugged DevOps for IoT
#40
Big Data, What's the Big Deal?
#41
Httpillage: Calling all nodes
#42
The 13 best golang security tips you'll evar hear!
#43
Creating and automating your own AppSec Pipeline (Day 1)
#44
Creating and automating your own AppSec Pipeline (Day 2)
#45
PHP WAF: Intercept and Monitor Application Attacks
#46
Mobile Landscape: The Security of Wearables
#47
PHP Security Redefined
#48
Hack Wars - A New Hope
#49
Technology, Privacy and the Law: New Challenges for Non-Profits
#50
Defensive Programing for JavaScript and HTML5 (Day 1)
Popular by Type
All Types
2-Day Training Class
AppSec Track
Attacks and Tooling Track
Auth and Crypto Track
Conference
Core Conversation Track
Defender Track
Mobile and IoT Track
Rugged DevOps Track
Popular by Day
All days
Tuesday, Oct 20
Wednesday, Oct 21
Thursday, Oct 22
Friday, Oct 23
Recently Active Attendees
Tiana Chandler
Keith Casey
Mike Schwartz
Robert Hurlbut
David Moreira
Kelly Santalucia
KS
Kyle Smith
John Kent
More →