Loading…
LASCON X has ended
Framework [clear filter]
Thursday, October 24
 

10:00am CDT

A Stratagem on Strategy: Rolling Testing into Product Testing
Commercial software products rely on formal test strategies to describe who will perform testing, the process that will be followed, the depth of testing, and more. Test strategies are extended by test plans that detail specific tests that will be executed and how success will be measured. Test strategies and plans support objectively evaluating that software meets requirements and functions properly.

Conversely, security teams think about where security gates should be in the SDLC and deploy SAST, DAST, IAST, or a combination. Rarely is it considered what level of coverage these methods provide, and output from security testing is not mapped back to requirements. Compared to other teams involved in the SDLC, security seems to just be winging their test strategies and plans.

This talk will describe how product teams leverage test strategies and plans to make sure software delivered meets requirements, and how security can do the same.

Speakers
KF

Kevin Fealey

Senior Manager, Product Security, EY



Thursday October 24, 2019 10:00am - 11:00am CDT
Contrast Security Room 2525 W Anderson Ln #365, Austin, TX 78757, USA

3:00pm CDT

"On the Internet, nobody knows you're a dog": Revisiting the meme after 25 years
On the Internet, nobody knows you're a dog" is an adage and meme about identity verification on the Internet, or rather lack thereof. It began as a cartoon caption by Peter Steiner and was published by The New Yorker on July 5, 1993. Ironically, quarter of a century later we still seem to be battling the same issues, though on a different scale, and are now looking towards artificial intelligence and machine learning techniques. This talk will provide a high level overview of the historical trends, current challenges and future opportunities in the field of user identity, online authentication, and access management. The current landscape of AI and ML with specific focus on identity space will be discussed. It will cover scenarios that work, those that don’t and those that can perhaps serve as a cautionary tale for technologists and policy makers alike.

Speakers


Thursday October 24, 2019 3:00pm - 4:00pm CDT
Under Armour Room 2525 W Anderson Ln #365, Austin, TX 78757, USA

4:00pm CDT

Detect Insider Threats Using Blockchains
Tamper resistant property of blockchains can be used to identify the insider threats to centralized DBs.

Speakers
avatar for Nishit Majithia

Nishit Majithia

Security Engineer, Canonical
Nishit Majithia is currently working as a security engineer at Walmart Labs, India. During the internship time of his B.Tech degree, he contributed one payload in ISRO's IMS-1A satellite. After getting M.Tech degree in Cyber Security area from IIT Kanpur, Nishit developed his curiosity... Read More →
avatar for Rohit Sehgal

Rohit Sehgal

Cybersecurity Engineer, VISA
A small town boy and a Security Engineer by passion.OSCP Certified, Masters degree from IITK with specialization in System Security and more than 3.5 years of professional security experience, across Development of security services, Penetration Testing, DevSecOps, System Security, SSDLC... Read More →


Thursday October 24, 2019 4:00pm - 5:00pm CDT
Cypress Room 2525 W Anderson Ln #365, Austin, TX 78757, USA
 
Friday, October 25
 

11:00am CDT

Thwarting Intruders with Ever Morphing Infrastructure
Is it possible to break the cyber attack lifecycle by continuously reshuffling the infrastructure and services being attacked?
How would the intruder be able to reconnaissance a network when physical servers are reimaged and brought back online with new keys, passwords, and IP addresses every few hours? We use modern application development and devops techniques such as a service mesh and a bare metal cloud to build an ever-morphing cloud of physical servers. Is that enough to thwart the enemy?

Speakers
avatar for John Studarus

John Studarus

Cloud Engineer, Packet
John merges his interests in computing infrastructure, networking, and software security. His background includes leading product teams, writing prototype code and examining distributed systems at Fortune 500s and startups alike. He brings a rare combination of technical expertise... Read More →



Friday October 25, 2019 11:00am - 12:00pm CDT
Cypress Room 2525 W Anderson Ln #365, Austin, TX 78757, USA

12:00pm CDT

Micro-services Challenges - Istio to the Rescue
It is widely accepted that monolithic applications do not scale well in a cloud environment. Micro-services pattern offers a solution to monolithic application challenges, like scalability, agility, availability, etc. However, micro-services come with their own set of challenges and issues: duplication of common code is a major one and in case of different technologies, there is not only duplication of code, but re-implementation of common functionality in different technologies. Micro-services also add significant overhead for operations as they have to manage many applications.
There is a need to solve the micro-service overhead problem so developers can focus on implementing business requirements instead of re-implementing common functionalities. Also, it should remain easy for devops teams to manage and monitor all applications in a uniform way. Monitoring should also be easier, so we have an efficient way of diagnosing issues: where is the application failing, which micro-service is the issue, etc.

Speakers
avatar for Benoit Famechon

Benoit Famechon

R&D Manager, Thales
Benoit Famechon is a R&D manager in the Cloud Protection and Licensing unit of Thales (Austin). He is currently heading a team to develop Authentication, Access Management and Identity based solutions. He has worked in embedded development for Telecommmunication smartcards, Strong... Read More →
avatar for Najam Siddiqui

Najam Siddiqui

Solution Architect, Thales
Najam Siddiqui is a member of the technical community at Thales and works in Enterprise and Cybersecurity group based in Austin, TX. His research interests include identity and access management solutions, web application firewalls (WAF), strong authentication solutions, Web application... Read More →



Friday October 25, 2019 12:00pm - 1:00pm CDT
Under Armour Room 2525 W Anderson Ln #365, Austin, TX 78757, USA

12:00pm CDT

Reversing Client Side JavaScript Using the Chrome Dev Tools Protocol
This talk will show how the Chrome Dev Tools protocol works and how we can use it to reverse JavaScript and alter the behavior of an app to find bugs and vulnerabilities. This can be done by writing functions that modify the behavior of web applications and that can automate pentesting tasks. A Go based tool that allows anyone to write simple plugins for use with this protocol will also be demoed.

Speakers
avatar for Alex Useche

Alex Useche

Senior Application Security Consultant, nVisium
Alex is an Application Senior Security Consultant at nVisium with over 12 years of experience in the IT industry as a software developer, security engineer, and penetration tester. As a software developer, he has worked and architected mobile and web applications in a wide range of... Read More →


Friday October 25, 2019 12:00pm - 1:00pm CDT
Cypress Room 2525 W Anderson Ln #365, Austin, TX 78757, USA

2:00pm CDT

Securing Modern API and Microservices-based Applications by Design
This talk provides the audience with a high level understanding of modern API and microservices-based application architectures, awareness of key security concerns with these architectures, and knowledge on how to best secure microservices and their APIs. The speaker leverages existing concepts and his years of experience with building security architecture patterns and solutions in this domain for one of world's largest Global financial institutions to present actionable architectural take-aways.

Speakers
avatar for Farshad Abasi

Farshad Abasi

Chief Executive Officer, Eureka DevSecOps
Farshad Abasi is the Founder and CEO of Forward Security and Eureka DevSecOps, bringing over 27 years of industry experience to the forefront of cybersecurity innovation. His professional journey includes key technical roles at Intel and Motorola, evolving into senior security positions... Read More →



Friday October 25, 2019 2:00pm - 3:00pm CDT
Under Armour Room 2525 W Anderson Ln #365, Austin, TX 78757, USA
 
Filter sessions
Apply filters to sessions.