SESSION + Live Q&A
Making the Most out of a Bad Day as a Developer
You know how it goes. There is always someone that finds out how to break all the hard work you and your team have put in developing a kick-ass application. Nobody likes to receive security bug reports but they are a reality we have to deal with. Penetration testers, bug bounty programs, independent researchers, and security incidents all provide us with invaluable information to develop better code. The question then becomes what we do with what we learned and how we prevent similar vulnerabilities to appear again. This presentation is a tale of war stories from my experience as a penetration tester and the numerous years of work with development teams building secure development practices. I hope to help you in understanding the value of security bugs for you, your organisations and your clients.
Speaker
Wim Remes
CEO/Principal Consultant @NRJSecurity & Board Member (ISC)²
CEO/Principal Consultant over at NRJ Security. He's also a board member for (ISC)² and co-organizes BruCON.
Read moreFrom the same track
How to Backdoor Invulnerable Code
It is easy to think that securing a product relies on writing code without vulnerabilities and it's true that this is a very important aspect, but a secure product relies on more than just the code written. To an attacker every aspect involved in the development process, from the human element to...
Josh Schwartz
Director of Offensive Security @Salesforce
Building Secure Player Experiences At Riot Games
In this talk, David will give you an overview of the Riot Games Application Security program. The talk will focus on the tech and social aspects of the program and why David feels both are important when it comes to writing secure code. Specifically David will talk about how we define Application...
David Rook
Head of Application Security @RiotGames
This Will Cut You: Go's Sharper Edges
An expression of function within a software ecosystem is inextricably bound to the lexicon used to express it. I explore how distinct, exploitable misuse patterns arise in software languages, and through example in Go – in particular a quietly prevalent and worryingly effective denial of...
Thomas Shadwell
Security Engineer @Twitch
Out of the Browser Into the Fire
Authors: Shubs Shah, Matt Bryant, and Joe DeMesy The evolution of the web has blurred the line between traditional web applications and native clients. In an effort to allow web developers to build powerful desktop applications quickly, web technologies have been put into standalone...
Joe DeMesy
Security Associate @BishopFox