OWASP Top 10 proactive defenses (Plenary Session) 09:00 - 10:30
Secure Development Lifecycles (SDLC): Introduction and Process Models 11:00 - 12:30
Practical Android Security 13:40 - 15:10
The Web's Security Model 15:40 - 17:10
Low level exploits and countermeasures 11:00 - 12:30
Secure Development Lifecycles (SDLC): Maturity Models 13:40 - 15:10
Secure Development Lifecycles (SDLC): Experience Workshop 15:40 - 17:10
Paradigms of Privacy Engineering 09:00 - 10:30
New Security Controls in Java 8 and 9 11:00 - 12:30
Entity Authentication 13:40 - 15:10
A day in the life of a malware analyst 15:40 - 17:10
Scaling Threat Modeling 09:00 - 10:30
Cryptographic Algorithms 11:00 - 12:30
Modern Web Application Defenses against Dangerous Network Attacks (Part 1) 13:40 - 15:10
Modern Web Application Defenses against Dangerous Network Attacks (Part 2) 15:40 - 17:10
Building Secure Angular Applications 09:00 - 10:30
Network Security Protocols 11:00 - 12:30
Public Key Infrastructures Fundamentals 13:40 - 15:10
Addressing Privacy in Cloud Service Development 15:40 - 17:10
Threat Modeling (Part 1) 09:00 - 10:30
Threat Modeling (Part 2) 11:00 - 12:30
Web Security hands-on (1) 13:40 - 15:10
Web Security hands-on (2) 15:40 - 17:10
Data Mining for Security (1) 09:00 - 10:30
Data Mining for Security (2) 11:00 - 12:30
Introduction to OAuth 2.0 Security 13:40 - 15:10
Blockchain: distributed trust (Plenary Session) 15:40 - 17:10
Access Control 09:00 - 10:30
Cryptography in a post-Snowden era 11:00 - 12:30
Cryptography Best Practices 13:40 - 15:10
The Rise and Fall of Client-Side Web Security Technologies 09:00 - 10:30
Towards a Secure IoT Landscape 11:00 - 12:30
AuthN/Z for REST Services 13:40 - 15:10
Between Testing and Formal Verification 15:40 - 16:30
Closing Session
New Technologies for System Software Security 09:00 - 10:30
GDPR: From regulation to coding (Part 1) 11:00 - 12:30
GDPR: From regulation to coding (Part 2) 13:40 - 15:10
Denial-of-service attacks: solutions and pitfalls 15:40 - 16:30