45:51Finding Broken Logic and Auth with AI-Powered Multimodal DetectionOWASP Los Angeles33 views·2 weeks ago
1:03:46One Thousand and One AI Prevented CVEs Vibe Coding a Whole New Supply Chain DefenseOWASP Los Angeles24 views·3 weeks ago
1:34:40Defending the New Perimeter Identity Threat Detection, Investigation, and ResponseOWASP Los Angeles34 views·2 months ago
1:01:06When Agents Execute RCE Paths in LLM-Powered Coding ToolsOWASP Los Angeles75 views·2 months ago
0:46Panel - AI Safety Matters (at Los Angeles Cybersecurity Summit)OWASP Los Angeles8 views·5 months ago
56:34From Input-handling Flaws to Crashables Security ZLessons From LLM-based Coding ToolsOWASP Los Angeles23 views·7 months ago
1:11:55Conquering Castle Envy – The Flawed Mindset That’s Holding Application Security BackOWASP Los Angeles124 views·8 months ago
1:01:53The Carrot vs. The Stick Making a Positive Impact on the Security + Developer RelationshipOWASP Los Angeles23 views·8 months ago
1:01:12AI and OWASP – a guide to Artificial Intelligence for security professionalsOWASP Los Angeles587 views·1 year ago
27:23Integrating Security Best Practices with Shift-Left and Shift-Right in Agile SDLCOWASP Los Angeles22 views·1 year ago
45:12The Real Advantages of OWASP Tools - an Information Security Leader's PerspectiveOWASP Los Angeles44 views·4 years ago
45:14The Role of Attack Surface Monitoring Techniques in the OWASP Top 10OWASP Los Angeles54 views·4 years ago
1:12:31Peeling the Onion Making Sense of the Layers of API SecurityOWASP Los Angeles171 views·4 years ago
1:22:28Using OWASP Nettacker For Recon and Vulnerability ScanningOWASP Los Angeles164 views·4 years ago