Come check out the best AppSec Conference in Austin, Texas! Discounted tickets on sale now.
此处无法显示此内容
在领英 APP 中访问此内容等
The Lonestar Application Security Conference (LASCON) is an OWASP-associated annual conference held in Austin, TX. It is a gathering of 400+ web app developers, security engineers, mobile developers and information security professionals. LASCON is held in Texas where more Fortune 500 companies call home than any other state and it is held in Austin which is a hub for startups in the state of Texas. At LASCON, leaders at these companies along with security architects and developers gather to share cutting-edge ideas, initiatives, and technology advancements.
Lonestar Application Security Conference (LASCON)的外部链接
US,TX,Austin
LASCON 2024 - Training Opportunity! https://lnkd.in/g5DZTAdA Highlight #1 Building Your Own AI Cybersecurity Strategy: A Comprehensive & Practical Guide for Business Executives and Security Leaders (1-Day Event) Trainer: Mano Paul Abstract: This one-day engaging training course is tailored for executives and security management leaders responsible for developing and implementing AI cybersecurity strategies within their organizations. This includes Business and Security Management Leaders and Executives (E.g., CEO, CTO, CIOs, CISOs, CDO, CAIO, Directors, Managers, and Senior Architects). The course provides a strategic overview of AI cybersecurity, addresses the unique risks associated with AI technologies, and offers practical guidance on building a robust AI security framework. Attendees will learn to align AI cybersecurity initiatives with business objectives and regulatory requirements, with a focus on mitigating risks associated with AI threats and attacks. A final facilitated exercise will introduce the attendees to an AI SECURE Strategy framework, which they will use to build their own AI security strategy that they can take back to their companies to implement.
Pre-conference training has been announced and there are still a few discounted conference passes left. Register for LASCON 2024 today and Survive the Digital Apocalypse! ?? https://lnkd.in/gUWSnPT ?
LASCON 2024 - Secure Your Spot! Get ready to fortify your defenses at LASCON 2024. Join us for a thrilling conference that will equip you with the latest tools and knowledge to protect against any threat. Don't miss out on our Discounted Conference Passes?available now! Stay tuned – our speaker lineup will be announced very soon. Secure your pass today and prepare to survive and thrive in the world of cybersecurity! https://lnkd.in/gUWSnPT
Another great conference in the Austin area!
We are less than a week away from our event - and we hope you are just excited as us! Thank you to @USAA for being a platinum sponsor this year, and helping make things happen such as our closing event happen! If you're not familiar, after all talks of the day, we host an after party with snacks and drinks, and award the CTF winners there. Make sure to join us! Buy your ticket today at buff.ly/3tQYliX
Announcing --?OWASP Austin Chapter Meeting February 2024 **When:** Tuesday, February 27, 2024 @ 11:45 AM - 1:00 PM **Presentation: API Security flaws that are commonly exploited.** As more and more development focusses on APIs to make things faster and easier, security needs to be pushed more toward the front. Mistakes that have been corrected in web application security have now returned as APIs aren’t offered the same protections as they are usually out of the normal flow via security tooling such as WAFs. This means identifying and fixing flaws prior to production is important. This discussion will be around lessons learned from testing and breach data with an eye for prevention. This attendees will learn: Application and API stacks are full of dangerous over-powered methods. These lurking menaces are built into libraries, frameworks, appservers, and runtime platforms. They do crazy things (from a security perspective) like start native processes, parse XML documents, evaluate expressions, and deserialize objects. And they are totally unprotected. Developers can use them without restriction, and attackers can target these binary Bambis without being detected or stopped. Unfortunately, the security of the entire digital ecosystem is entirely reliant on getting developers to take the right steps to use these methods safely… but it’s way too hard. **Speaker: Jason Kent**? [email protected] For over the last 25 years, Jason has been ethically peering into Client Behavior, Wireless Networks, Web Applications, APIs and Cloud Systems, helping organizations secure their assets and intellectual property from unauthorized access. As a consultant he's taken hundreds of organizations through difficult compliance mine fields, ensuring their safety. As a researcher he has found flaws in consumer IOT systems and assisted in hardening them against external attacks. At Cequence Security Jason does research, community outreach and supports efforts in identifying Automated Attacks against Web, Mobile, and API-based Applications to keep Cequence's customers safe. RSVP: https://lnkd.in/g2jav7XN -- Eventbrite(in-person) https://lnkd.in/gZSQ9xwK Meetup (online) #owasp #api #apisecurity