Loading…
Garden Terrace [clear filter]
Tuesday, May 14
 

8:30am PDT

Everything You Need To Know About Web, API and Mobile Secure Coding [Day 1 of 2]
Everything You Need To Know About Web, API and Mobile Secure Coding

Instructor: Jim Manico

Bio: 
Jim Manico is the founder of Manicode Security where he trains software developers on secure coding and security engineering. He is an a investor/advisor for Signal Sciences and BitDiscovery. Jim is also a frequent speaker on secure software practices, is a member of the JavaOne Rock Stars and Java Champion community and is the author of "Iron-Clad Java: Building Secure Web Applications" from McGraw-Hill and Oracle Press. Jim also volunteers for the OWASP foundation where he helps build application security standards and other documentation.

Description:
The major cause of web service, mobile and web application insecurity is insecure software development practices. This highly intensive and interactive 2-day course provides essential application security training for web application, mobile and web service developers and architects.

The class is a combination of lecture, security testing demonstration and code review. Students will learn the most common threats against applications. More importantly, students will learn how to code secure web and mobile solutions via defense-based code samples.

As part of this course, we will explore the use of third-party security libraries and frameworks to speed and standardize secure development. We will highlight production quality and scalable controls from various languages and frameworks. This course will include secure coding information for Java, Swift, Objective C, PHP, Python, Javascript and .NET programmers, but any software developer building web applications and web services will benefit.

Student Requirements:
Familiarity with the technical details of building web applications, mobile and web services from a software engineering point of view.

Laptop Requirements:
Any laptop that can run an updated web browser and "Burp Community Edition".

Day 1 of the course will focus on web application basics.

- Introduction to Application Security
- HTTP Security Basics
- CORS and HTML5 Considerations
- XSS Defense
- Content Security Policy
- Intro to Angular.JS Security
- Intro to React.JS Security
- SQL and other Injection
- Cross Site Request Forgery
- File Upload and File IO Security
- Deserialization Security
- Input Validation Basics
- OWASP Top Ten 2017
- OWASP ASVS

Day 2 of the course will focus on API secure coding, Identity and Mobile Security

- Web service, Microservice and REST Security
- Authentication and Session Management
- Access Control Design
- OAuth 2 Security
- OpenID Connect Security
- iOS Secure Coding
- Android Secure Coding
- 3rd Party Library Security Management
- Application Layer Intrusion Detection

Speakers
avatar for Jim Manico

Jim Manico

Founder, Manicode Security
Jim Manico is the Founder of Manicode Security, a company dedicated to providing expert training in secure coding and security engineering to software developers. His work at Manicode Security reflects his deep commitment to elevating software security standards in the industry. In... Read More →


Tuesday May 14, 2019 8:30am - 4:30pm PDT
Garden Terrace
 
Wednesday, May 15
 

8:30am PDT

Everything You Need To Know About Web, API and Mobile Secure Coding [Day 2 of 2]
Everything You Need To Know About Web, API and Mobile Secure Coding

Instructor: Jim Manico

Bio: 
Jim Manico is the founder of Manicode Security where he trains software developers on secure coding and security engineering. He is an a investor/advisor for Signal Sciences and BitDiscovery. Jim is also a frequent speaker on secure software practices, is a member of the JavaOne Rock Stars and Java Champion community and is the author of "Iron-Clad Java: Building Secure Web Applications" from McGraw-Hill and Oracle Press. Jim also volunteers for the OWASP foundation where he helps build application security standards and other documentation.

Description:
The major cause of web service, mobile and web application insecurity is insecure software development practices. This highly intensive and interactive 2-day course provides essential application security training for web application, mobile and web service developers and architects.

The class is a combination of lecture, security testing demonstration and code review. Students will learn the most common threats against applications. More importantly, students will learn how to code secure web and mobile solutions via defense-based code samples.

As part of this course, we will explore the use of third-party security libraries and frameworks to speed and standardize secure development. We will highlight production quality and scalable controls from various languages and frameworks. This course will include secure coding information for Java, Swift, Objective C, PHP, Python, Javascript and .NET programmers, but any software developer building web applications and web services will benefit.

Student Requirements:
Familiarity with the technical details of building web applications, mobile and web services from a software engineering point of view.

Laptop Requirements:
Any laptop that can run an updated web browser and "Burp Community Edition".

Day 1 of the course will focus on web application basics.

- Introduction to Application Security
- HTTP Security Basics
- CORS and HTML5 Considerations
- XSS Defense
- Content Security Policy
- Intro to Angular.JS Security
- Intro to React.JS Security
- SQL and other Injection
- Cross Site Request Forgery
- File Upload and File IO Security
- Deserialization Security
- Input Validation Basics
- OWASP Top Ten 2017
- OWASP ASVS

Day 2 of the course will focus on API secure coding, Identity and Mobile Security

- Web service, Microservice and REST Security
- Authentication and Session Management
- Access Control Design
- OAuth 2 Security
- OpenID Connect Security
- iOS Secure Coding
- Android Secure Coding
- 3rd Party Library Security Management
- Application Layer Intrusion Detection

Speakers
avatar for Jim Manico

Jim Manico

Founder, Manicode Security
Jim Manico is the Founder of Manicode Security, a company dedicated to providing expert training in secure coding and security engineering to software developers. His work at Manicode Security reflects his deep commitment to elevating software security standards in the industry. In... Read More →


Wednesday May 15, 2019 8:30am - 4:30pm PDT
Garden Terrace
 
Thursday, May 16
 

10:10am PDT

Law Enforcement Panel
The law enforcement panel consists of investigators and prosecutors whose day-to-day work involves apprehending cyber criminals who conduct various crimes including unlawful network intrusion, business email compromise, dark net sales of contraband, insider fraud, organized identity theft and the use of malware for criminal purposes.  The panelists will discuss case studies, best practices to prevent incidents, recommendations on working with Federal and State law enforcement, the emerging use of block chain and crypto currencies in crime and prosecuting overseas cyber criminals. The presentation is open to all conference attendees from the private and public sector.

Speakers
SB

Samuel (Brian) Whitman

Special Agent, FBI
avatar for Ryan White

Ryan White

Assistant United States Attorney, Chief, Cyber & Intellectual Property Crimes Section, US Attorney, Central District of California
Ryan White is an Assistant United States Attorney in the Central District of California, where he is Chief of the Cyber & Intellectual Property Crimes Section. White, and his team of eight federal prosecutors, investigate and prosecute cases involving national security, computer and... Read More →
avatar for Tracy Wilkison

Tracy Wilkison

First Assistant United States Attorney, California, Central District
Tracy Wilkison is the First Assistant United States Attorney for the Central District of California; she is the top career prosecutor in the district and supervises all four litigating divisions of the office. She previously served as the Executive Assistant United States attorney... Read More →
avatar for Bradley N. Maryman

Bradley N. Maryman

Founder, Maryman & Associates
Mr. Maryman is an experienced computer forensics and cyber investigations consultant. Prior to founding Maryman & Associates in 2001, he served as a Supervisory Special Agent with the Federal Bureau of Investigation (FBI) for over 29 years. During that time, Mr. Maryman conducted... Read More →


Thursday May 16, 2019 10:10am - 11:00am PDT
Garden Terrace

11:30am PDT

Law Enforcement Panel: LA County DA, Sheriff, and FBI
The law enforcement panel consists of investigators and prosecutors whose day-to-day work involves apprehending cyber criminals who conduct various crimes including unlawful network intrusion, business email compromise, dark net sales of contraband, insider fraud, organized identity theft and the use of malware for criminal purposes.

The panelists will discuss case studies, best practices to prevent incidents, recommendations on working with Federal and State law enforcement, the emerging use of block chain and crypto currencies in crime and prosecuting overseas cyber criminals. The presentation is open to all conference attendees from the private and public sector.

Moderators
avatar for Marc Beaart

Marc Beaart

Assistant Head Deputy, Los Angeles District Attorney's Office - Cybercrime
Marc Beaart, a prosecutor with twenty-two years in the Los Angeles County District Attorney’s Office, is currently assigned to the Cyber Crime Division as the assistant head deputy. Before his current assignment, he served in several assignments including Compton, Central Trials... Read More →

Speakers
avatar for Senior Investigator McNary

Senior Investigator McNary

Cyber Crime Investigations Unit, LA County District Attorney
Senior Investigator McNary is a 30-year veteran of law enforcement in Los Angeles County. His first 11 years were with the Los Angeles County Sheriff’s Department. He has been an investigator with the District Attorney’s Office since 1999. Senior Investigator McNary is currently... Read More →
avatar for Sergeant Hish

Sergeant Hish

Sergeant, Los Angeles County Sheriff
Sergeant Hish is a 19-year veteran of the Los Angeles County Sheriff's Department. Before his career with the Sheriff's Department he served six years with the United States Army. During his tenure with the Army, Sergeant Hish was deployed to the Middle East in support of Operation... Read More →
avatar for John C. Weller

John C. Weller

Prosecuter, LA County DA Cyber Crime Division
John C. Weller earned his B.A from U.C. Berkeley and his Juris Doctor from Loyola Law School in Los Angeles. Weller has been a prosecutor with the Los Angeles County District Attorney’s Office for over ten years. He is currently assigned to the Cyber Crime Division. This is a specialized... Read More →


Thursday May 16, 2019 11:30am - 12:50pm PDT
Garden Terrace

1:35pm PDT

Vendor Lunchtime Spotlight Talk
Thursday May 16, 2019 1:35pm - 2:00pm PDT
Garden Terrace

2:10pm PDT

Attacks on Critical Infrastructure Networks as a Component of Economic Warfare
This talk will explore how, in the event of conflict escalation between the US and a nation state adversary, attacks on OT networks can be used as a powerful weapon of economic warfare. OT networks run the world's infrastructure - from oil refineries and nuclear power plants to industrial processes across chemical plants, pharmaceuticals. Compared to traditional IT networks, those OT networks are largely invisible to security teams and lag significantly when it comes to the security controls deployed. Given the relative lack of telemetry from those OT networks, we simply don't know how many critical networks have been breached. There are only a handful of publicly disclosed OT attacks, but we should not take this absence of evidence for evidence of the absence of the adversaries in those networks. Russian government threat actors have been targeting multiple critical infrastructure sectors including the energy, nuclear, commercial facilities, water, aviation, and critical manufacturing sectors for few years and it's likely that what we’re witnessing are the early stages recon / infiltration where the adversaries are getting into position.  

Speakers
avatar for Galina Antova

Galina Antova

Co-founder and Business Development Officer, Claroty
Galina Antova is the Co-founder and Chief Business Development Officer at Claroty, a leading operational technology (OT) cybersecurity provider. Since its founding in 2015, the company has become the de-facto cybersecurity provider to industrial control networks with the support of... Read More →


Thursday May 16, 2019 2:10pm - 3:00pm PDT
Garden Terrace

3:10pm PDT

Blockchain of Evidence, Let the Evidence Speak for Itself
The US Criminal Justice system has lost the Public Trust over the last few decades as lost evidence and misreporting by the press have led to the conclusion that the "system" is corrupt. This presentation will present a novel use of hybrid permissioned Blockchain technology to enable an immutable chain of evidence from collection at the scene to presentation in court, visible and verifiable to anyone with an interest throughout the process. Use of a system like this should remove most court backlog currently dedicated to evidence validity challenges, and put the ability to trust back into the system. Enabling new technology enriches all of our lives when used to give our public systems the chance to excel at what they do. Imagine, Defense and Prosecution trusting the evidence together throughout the case!! And public transparency from collection to court!

Speakers
avatar for Jeff Neithercutt

Jeff Neithercutt

Blockchain of Evidence
Jeff Neithercutt is a Senior Cybersecurity Consultant for a company specializing in public sector consulting. Jeff has a Master’s Degree in Cyber Security and Information Assurance, is a published author (Tactical Hacking for the Law Enforcement Professional), and tinkers with both... Read More →


Thursday May 16, 2019 3:10pm - 4:00pm PDT
Garden Terrace

4:30pm PDT

Want to make $3000 a month working from home?
We've all seen the ads for work-from-home schemes often accompanied by a picture of a cheque for thousands of dollars and a testimonial from a happy employee who only worked a few hours a week to earn the money. These legitimate looking ads are often fronts for money laundering services. Symantec working with the FBI recently gained insight into such an operation. This talk examines the scheme, from recruitment, to conversations with the ‘employees’, and ultimately, to the criminals behind the scheme. Vast technical and social skills are needed to operate such a scheme successfully while evading law enforcement. This talk shows how cooperation between security researchers and information sharing with law enforcement can bring down such an operation.

Speakers
avatar for Liam O'Murchu

Liam O'Murchu

Symantec
Liam O’Murchu is a director with the Security Technology and Response group with Symantec. Over the past 15 years O’Murchu has investigated and responded to the most sophisticated cyber attacks to ever emerge, from professional cyber-criminals targeting financial institutions... Read More →


Thursday May 16, 2019 4:30pm - 5:20pm PDT
Garden Terrace
 
Friday, May 17
 

9:20am PDT

Vulnerability Landscape 2019 – What Keeps Tripping Us Up
With the increasing spend in security budgets and the apparent increasing frequency of data breaches, managing vulnerabilities in an organisation can seem like a never-ending game of blind whack-a-mole. How organisations approach vulnerability management in the past simply does not cut it with today's technology stack and development methodologies. We will discuss some of the common themes that seem to persist and look at some actions we could take to dramatically improve our overall security.

Speakers
avatar for Rahim Jina

Rahim Jina

Chief Operating Officer & Co-Founder, edgescan™
Rahim is the COO and co-founder of edgescan™, a Security Consultancy firm and Fullstack Vulnerability Management SaaS based in Dublin, Ireland. Rahim is responsible for operational excellence and has extensive experience delivering penetration testing services to a wide range of... Read More →


Friday May 17, 2019 9:20am - 10:10am PDT
Garden Terrace

10:40am PDT

Transforming Cybersecurity in the Age of Chaos and Automation
It isn’t a surprise to many of us just how much data is being generated as our lives and our world embrace digital technologies. This data explosion is creating one of the greatest shifts in history and it is creating more chaos and threats than we could have imagined. But it is also unlocking a massive opportunity. Join Haiyan Song, SVP and GM of Security Markets at Splunk, as she takes you through the future of IT security operations and how automation will enable teams to operate better, stronger and faster.

Speakers
avatar for Haiyan Song

Haiyan Song

SVP and GM of Security Market, Splunk
Haiyan Song has been with Splunk since 2014 and currently serves as our Senior Vice Presidentand General Manager of Security Markets.From 2012 to 2014, Ms. Song served as Vice President and General Manager of HP ArcSight, asecurity and compliance management company previously acquired... Read More →


Friday May 17, 2019 10:40am - 11:30am PDT
Garden Terrace

11:40am PDT

Continuous Security for DevOps Velocity
The security industry initially reacted to the “DevOps” movement with dismay: developers deploying code themselves? Hundreds of deploys per day? How could security teams possibly keep up with that rate of change? As the DevOps approach has become a mainstream development method, security teams have begun to embrace DevOps and discover the security benefits enabled by the DevOps methodology. Adapting to a DevOps world requires not just the security team to change how they operate, but a realignment of how security permeates the entire organization.
In this talk I will share my experiences integrating security with fast-moving development teams, the successes and failures I have seen, as well as guidance on turning DevOps into DevSecOps.

Speakers
avatar for Justin Collins

Justin Collins

Senior Software Engineer, Synopsys
Justin Collins is a senior software engineer at Synopsys. He has been a part of security teams as an application security engineer at SurveyMonkey, Twitter, and AT&T Interactive. He created the Brakeman static analysis security tool for Ruby on Rails which was recently acquired by... Read More →


Friday May 17, 2019 11:40am - 12:30pm PDT
Garden Terrace

1:40pm PDT

10 Lessons from the last 10 years of Incident Response; Protecting Your Network from Modern Threats
Research suggests that cyber crime will cost businesses over $2 trillion in 2019 and the average cost of a breach in 2020 will exceed $150 million per incident. Kroll Cyber Risk Associate Managing Director and National Cyber Incident Response Team Leader Pierson Clair will discuss modern threats including Emotet,Trickbot, and ransomware, attacker tools, tactics, and methodologies, along with how a back to basics approach can help better protect your network and more rapidly identify attackers on your network. 
 Goals (if relevant):
After attending this presentation, attendees will learn to:
  1. Understand modern threats and risks to network environments of all sizes.
  2. Understand how modern malware is able to penetrate and replicate through networks.
  3. Apply a back to basics approach to lock down and secure networks and endpoints.
  4. Learn from the oversights of other organizations to better protect their own infrastructure.


Speakers
avatar for Pierson Clair

Pierson Clair

Associate Managing Director, Cyber Risk, Kroll
Pierson Clair is an experienced certified digital forensic examiner, technical security consultant, and cyber security educator. Mr. Clair’s forensic experience includes extensive work with clients of all sizes and he is currently an Associate Managing Director and National Cyber... Read More →


Friday May 17, 2019 1:40pm - 2:30pm PDT
Garden Terrace

2:40pm PDT

Making Sense of the California Consumer Privacy Act
The California Consumer Privacy Act (CCPA) is the broadest and most comprehensive privacy and data security measure in the nation.  Its far-reaching obligations impact businesses across industries, dramatically shift the paradigm of what has traditionally been considered private or protected information, and threaten severe penalties for violations that will change the privacy and security landscape in California and nationwide.  This session will make sense of it all by covering:
·        The political landscape in which the CCPA and the cleanup legislation passed
·        The CCPA’s compliance requirements and who will be required to comply
·        The impact on cybersecurity and information governance programs
·        Direct and hidden litigation and enforcement risks
· The proposed recent amendments to the CCPA and the prospects for further legislation in other jurisdictions

Speakers
avatar for Brandon Reilly

Brandon Reilly

Counsel - Privacy and Data Security, Manatt, Phelps & Phillips, LLP
Brandon Reilly is a privacy and data security attorney and civil litigator inManatt’s Orange County office. Brandon counsels clients on a wide array ofconsumer protection and privacy matters, including data privacy and securitycompliance and procedure and data breach response.In... Read More →


Friday May 17, 2019 2:40pm - 3:30pm PDT
Garden Terrace

2:40pm PDT

Building for the Future: Inspiring the Next Generation of Cybersecurity Professionals
It is important for young professionals to know they can have successful and impactful careers in the tech sector. However, to get more young minds interested in choosing careers in technology, the narrative needs to change to show that women and minorities have a future in the industry. Join Marci McCarthy as she discusses the importance of nurturing and growing the next generation of professionals in technology through mentorship opportunities, STEAM programs and other education opportunities.

Speakers
avatar for Marci McCarthy

Marci McCarthy

CEO and President, T.E.N.
Marci McCarthy is the CEO and President of T.E.N., an information security executive networking and relationship-marketing firm. With more than 20 years of business management and entrepreneurial experience, McCarthy founded T.E.N.’s flagship program, the Information Security Executive... Read More →


Friday May 17, 2019 2:40pm - 3:30pm PDT
Garden Terrace
 
Filter sessions
Apply filters to sessions.