Solving Real World Access Control Problems with the Apache Shiro
13
Content Security Policy
14
Anatomy of a SQL Injection Attack
15
Query Parameterization (PHP PDO)
16
Query Parameterization (PERL DBI)
17
Anatomy of a XSS Attack
18
Contextual Output Encoding (XSS Defense)
19
Other Encoding Libraries
20
Solving Real World Problems with the OWASP HTML Sanitizer Project
21
Encryption in Transit (HTTPS/TLS)
22
Fixing the TLS and the Certificate Authority System
23
Solving Real World Crypto Storage Problems With Google KeyCzar
24
App Layer Intrusion Detection
25
OWASP AppSensor (Java)
Description:
Explore the OWASP Top Ten Proactive Controls in this 50-minute conference talk by Jim Manico, VP of Security Architecture at WhiteHat Security. Discover essential software control categories that architects and developers should incorporate into every project, including Authentication, Access Control, Validation, Encoding, Query Parameterization, and Data Protection. Learn how to build secure applications proactively, covering topics such as secure requirements, architecture, and design. Gain insights into password defenses, multi-factor authentication, access control anti-patterns, content security policy, SQL injection prevention, XSS defense, encryption in transit, and application layer intrusion detection. Understand the importance of leveraging tools like the OWASP Java Encoder Project, Apache Shiro, and Google KeyCzar to solve real-world security challenges.
Top Ten Proactive Controls for Secure Software Development