Cybersecurity | Cloud | DevelopmentSecure application design with high data privacy requirements James Bohem November 4, 2023 video appsecowasp
Cybersecurity | Cloud | DevelopmentOWASP ASVS Project – Josh Grossman October 22, 2023 video appsecowasp
Cybersecurity | Cloud | DevelopmentAPPSEC Cali 2018 – Women In Security Panel October 1, 2023 video appsecCaroline WongChristina KubeckaColeen CoolidgeKayva PearlmanMagen Wuowasp
Cybersecurity | Cloud | DevelopmentServerless Infections – Malware Just Found a New Home – Amit Ashbel August 22, 2023 video appsecowasp
Cybersecurity | Cloud | DevelopmentIntroducing the OWASP Nettacker Project – Sam Stepanyan August 13, 2023 video appsecappsec californiaappseccaliappseccaliforniaowasp
Cybersecurity | Cloud | DevelopmentExhibitor: Using IAC to Accelerate Threat Modeling – Arnaud Monhon Bah July 28, 2023 video appsecowasp
Cybersecurity | Cloud | DevelopmentHow To Approach InfoSec Like a Fed(eral Auditor) – AppSecUSA 2017 June 15, 2023 video appsecowasp
Cybersecurity | Cloud | DevelopmentCluster Wrangling: How to make Kubernetes clusters secure and usable – Rory McCune June 15, 2023 video appsecowasp
Cybersecurity | Cloud | DevelopmentEmpowering the Employee: Incident Response with a Security Bot – Jeremy Krach – AppSecUSA 2018 May 11, 2023 video appsecowasp
Cybersecurity | Cloud | DevelopmentAppSec EU 2017 The Path Of Secure Software by Katy Anton May 10, 2023 video appsecowasp