Eleftherios Chrysochoidis, Chubb, Lead API Software Engineer
GitHub Actions offer robust and free CI/CD capabilities to streamline your development process. In this presentation, we'll dive into the core components of GitHub Actions and explore how they can be set to work for you by demonstrating various simple and advanced use cases!
GitHub Actions is an ideal tool for any project hosted on GitHub. It provides CI/CD features out of the box and is accessible to everyone without the need for extra infrastructure or setup. The declarative way of creating Actions makes their usage really easy, and its remarkable free layer provides sufficient limits even for big projects.
Especially for Open Source projects, where usually there is more than a single contributor, the need for CI/CD is huge. What will happen if you own an open source project and someone creates a Pull Request with really nice features but adds Security risks in the project (e.g. due to deprecated dependencies) or if they break some of the existing functionality? Would you be able to check all of them on your own? Maybe yes, but it would take much more time compared to having them all checked automatically by utilizing GitHub Actions.
Join me to explore how to make GitHub Actions run faster by utilizing caching mechanisms, build Reports for Testing, Coverage and Security issues and integrate them with any open Pull Request in the community, to have an automated evaluation of the suggested PR and get notifications for them.
Experienced Lead Software Engineer with Passion for Community EngagementWith over six years of experience in software engineering, building and maintaining robust applications, Eleftherios (or simply Lefteris) gained a deep expertise in Java and Spring Boot technologies.His passion... Read More →
Dev Innovation World, GitHub, Sr Developer Advocate
We'll learn how to block secrets from ever entering your codebase, use AI to automatically generate multi file security fixes, and incorporate all your favorite third-party security tools into your native GitHub workflow!
Dhanashri Chavan is a Senior Developer Advocate at GitHub, where she collaborates with the developer community to promote awareness and adoption of GitHub products and features while representing customer needs within the organization.With over 20 years of professional experience... Read More →
Tanya Janca, aka SheHacksPurple, is the best-selling author of 'Alice and Bob Learn Secure Coding', 'Alice and Bob Learn Application Security’ and ‘Cards Against AppSec'. Over her 28-year IT career she has won countless awards (including OWASP Lifetime Distinguished Member and... Read More →
Siri Varma Vegiraju, Microsoft, Senior Software Engineer
Maintaining robust network security in the cloud environment is more crucial than ever. This talk explores the design and implementation of a proactive network telemetry platform that strengthens infrastructure security. The platform collects and analyzes telemetry data from virtual machines to identify and scrutinize traffic patterns deviating from industry-standard baselines. By generating actionable insights and promptly notifying relevant teams of potential issues, it enables swift problem resolution. This proactive approach significantly reduces the attack surface, minimizes exposure to network attacks, and enhances overall cloud security.
Siri Varma Vegiraju is a seasoned professional in healthcare, cloud computing, and security. Currently, he focuses on securing Azure Cloud workloads, leveraging his extensive experience in distributed systems and real-time streaming solutions. Prior to his current role, Siri contributed... Read More →
This talk will dive into the fundamentals and best practices for API Security. By understanding the 3 Pillars of API Security, encompassing governance, testing and monitoring, attendees will gain a comprehensive understanding of the essential elements required to safeguard APIs. The session will conclude with practical insights, offering best practices and valuable do's and don'ts for implementing and maintaining secure APIs.
Why are APIs under attack? -83% of internet traffic are APIs -APIs are under-secured
How do APIs get attacked? Attackers look for APIs that are over-permissioned, return to much information, access unauthorized functions, and expose logic flaws. Attackers are able to bypass a web or mobile app and hit the API directly.
OWASP top 10!! #1-#4 are the biggest issues
More compliance regulations are including testing APIs. -PCI -HIPPA -GDPR -FedRAMP
Dan is a 20+ year cybersecurity veteran, having held exec positions at companies including Qualys, ArcSight, Anomali and APIsec. He founded APIsec University in 2022 to offer free, non-vendor training on API security. The site has grown to over 50,000 students in its first 6 months... Read More →
In this talk, we will cover 30 tips for writing more secure JavaScript, emphasizing what to do, what NOT to do, and utilizing open-source tooling to enhance security. JavaScript is not only the most popular web programming language, but it also faces security threats like XSS and code injection, meaning we need to ensure our JavaScript is tough, rugged, and secure. We’ll touch only upon items that are specific to JavaScript, as opposed to agnostic topics that apply to all languages, such as encryption or authentication. By the end, you’ll gain insights into selecting the best framework, adopting secure coding practices, and leveraging tools for web application security, catering to both seasoned developers and beginners seeking practical guidance.
Tanya Janca, aka SheHacksPurple, is the best-selling author of 'Alice and Bob Learn Secure Coding', 'Alice and Bob Learn Application Security’ and ‘Cards Against AppSec'. Over her 28-year IT career she has won countless awards (including OWASP Lifetime Distinguished Member and... Read More →
SVP/Distinguished Engineer − Generative AI Red Teaming, Guardrails & Explainability @ U.S.Bank Krishna is a Technologist with broader experience in AI, Data Science, Security and Networks. Working on building intelligence - may be even a JARVIS ! Love to write, teach and develop... Read More →
In today’s interconnected world, organizational silos pose a significant challenge to effective application security (AppSec). These silos—rooted in specialization, control structures, and cultural divides—impede communication and collaboration, weakening overall security efforts. This presentation will explore the causes and impacts of organizational silos on security programs and demonstrate how breaking these barriers can strengthen coordination and foster a unified security culture. Attendees will gain insights into why silos form, their detrimental effects on security initiatives, and actionable strategies to overcome them. Few Key Takeaways: Understanding Silos: How specialization and cultural divides create barriers. Impact on Security: The risks silos introduce to AppSec programs. Practical Strategies: Approaches such as cross-functional training, creating shared security visions, and initiating collaborative initiatives to dismantle silos. Building a Unified Culture: Empowering every team member, not just the security team, to contribute to application security.
Aruneesh Salhotra is a seasoned technologist and servant leader, renowned for his extensive expertise across cybersecurity, DevSecOps, AI, Business Continuity, Audit, Sales. His impactful presence as an industry thought leader is underscored by his contributions as a speaker and panelist... Read More →
Andra is a Principal Application Security Specialist at Sage, with over seven years of experience in the field of application security. She is responsible for implementing DevSecOps practices, conducting security assessments, and developing secure coding guidelines for software engineering... Read More →
Wendy Segura is a Security Engineer at Sage who specializes in building secure, scalable technology solutions. With over a decade of experience in cybersecurity, process optimization, and security client advisor she focuses on developing robust security frameworks, conducting comprehensive... Read More →
CEO, CISO, and “Hacker in Charge”, Arcanum Information Security
Jason Haddix AKA jhaddix is the CEO, CISO, and “Hacker in Charge” at Arcanum Information Security. Arcanum is a world class assessment and training company. Jason also holds the title of Field CISO for Flare.io a world class threat intelligence platform. Jason has had a distinguished... Read More →
Kevin Johnson is the Chief Executive Officer of Secure Ideas. Kevin has a long history in the IT field including system administration, network architecture and application development. He has been involved in building incident response and forensic teams, architecting security solutions... Read More →
Staff Engineer with FanDuel, OWASP Atlanta Chapter co-leader and rich history in Secure by Design, DevSecOps and security architecture within telco and entertainment
Tamir Ishay Sharbat, Zenity, Software Engineer OWASP Certified Microsoft Copilot Studio is the technology that powers Microsoft's copilots, and the platform behind custom copilots built in the enterprise. The promise is that everyone can build a secure copilot, under the assumption that every bot will be secure by-default. Does it hold under scrutiny?
In this talk, we will show how Copilot Studio bots can easily be used to exfiltrate sensitive enterprise data circumventing existing controls like DLP. We will show how a combination of insecure defaults, over permissive plugins and wishful design thinking makes data leakage probable, not just possible. We will analyze how Copilot Studio puts enterprise data and operations in the hands of GenAI, and expose how this exacerbates the prompt injection attack surface, leading to a material impact on integrity and confidentiality.
Next, we will drop CopilotHunter, a recon and exploitation tool that scans for publicly accessible Copilots and uses fuzzing and GenAI to abuse them to extract sensitive enterprise data. We will share our findings targeting thousands of accessible bots, revealing sensitive data and corporate credentials.
Finally, we will offer a path forward by sharing concrete configurations and mistakes to avoid on Microsoft's platform, and generalized insights on how to build secure and reliable Copilots. Security at the speed of dev, making secure choices in design, and making security invisible and easy for developers for any size org