Practical Web Application Security. Educause April 2011. Atlanta, GA.
Download PPT
Smartphone Insecurity.
ISACA. Harrisburg, PA.
Download PPT
Web Application Security.
Educause. April 2010. Atlanta, GA.
Evangelizing IT Security to Your Communities.
October, 2007. Fargo, ND.
Download PPT
Total Wireless Network Security. May, 2007 & June, 2006. Brisbane, Sydney & Melbourne, AU, Auckland, NZ.
Shmoocon 2007. Windows Mobile Software: Raw and Exposed. Washington DC. March 2007.
RSA 2007. Wireless Security: Built to Last – Panel. Feb. 6, 2007. San Francisco, CA.
Web Application Security. Jan 2007. Lancaster, PA.
Total Wireless Network Security. June, 2006. Sydney & Melbourne, AU. Auckland, NZ.
Wi-Fi Planet 2005. Pocket PC Insecurity. Baltimore, MD. June 15, 2005.
Help-Net Security. Windows Mobile Pocket PC Security Audio Session. November, 2004. http://www.net-security.org/article.php?id=745.
Blackhat USA 2004/Defcon 12. Abusing Windows Mobile. Las Vegas, NV. July/August 2004.
WiFi-Planet. Protecting Wireless PDAs. San Jose, CA. December 4, 2003.
CSI 30. Embedded Systems Security: Dissecting Mobile Code. Washington, D.C. November 4, 2003.
Securing WEP: From overview to algorithm. Webcast at www.searchmobilecomputing.com. August 5, 2003.
Reverse-engineering Mobile Binaries. Defcon 11. Las Vegas, NV. August 4, 2003.
Hacking .NET Server. Defcon 10. Las Vegas, NV. August 3, 2003.
Wireless Hacking: Cracking WEP and Beyond. DallasCon 2002. Dallas, TX. May 4, 2002.
Web-based applications represent a growing threat for IT organizations. Not only are software vendors turning to the browser as the interface of choice, but many software solutions are only glorified web applications. The consumer market is also being flooded with web-enabled devices that are designed to sync with Internet-based services. As the browser becomes the new desktop and the Internet the new LAN, how can security and IT professionals analyze, recognize, understand, and address the many security issues that come with this dynamic technology? In this seminar, we will explore the full landscape of the "web application" and examine associated security risks. Through demonstrations and hands-on mini-workshops (bring your own laptop), you will both see and experience how web applications can be assessed and exploited. Finally, we'll look at mitigating solutions, strategies, and activities that you can implement to reduce the degree of risk associated with our web-enabled world.
Review of Mobile Technology including, Mobile Security Challenges, Privacy Issues, Vulnerable Applications, Unlocking/Jail-breaking Threats, Gaming the Mobile Application, Mobile Malware Forensics Challenges