- Alvaro Muoz - Automatic Detection of Inadequate Authorization Checks in Web Applications
- Andrew Lee-Thorp - Intent on Being a Good Android Citizen?
- AppSec EU 2014 Chapter Leaders Workshop
- AppSec Europe 2014 - Conference Closing Ceremony
- Dan Cornell - Hybrid Analysis Mapping Making Security and Development Tools Play Nice Together
- Geraint Williams - PCIDSS and Secure Applications
- Gergely Revay - Security Implications of Cross-Origin Resource Sharing
- Hemil Shah - Smart Storage Scanning for Mobile Apps - Attacks and Exploit
- Jacob West - Keynote - Fighting Next-Generation Adversaries with Shared Threat Intelligence
- Jakub Kauny Slawomir Jasek - Shameful Secrets of Proprietary Network Protocols
- James Kettle - Active Scan Augmenting manual testing with attack proxy plugins
- Jerry Hoff - Getting a Handle on Mobile Security
- John Dickson - Can Application Security Training Make Developers Build Less Vulnerable Code
- Krzysztof Kotowicz - Biting into the Forbidden Fruit. Lessons from Trusting JavaScript Crypto.
- Lorenzo Cavallaro - Keynote - Copper Droid On the Reconstruction of Android Malware Behaviors
- Marion Mccune - Metro down the Tube. Security Testing Windows Store Apps
- Mark Denihan Sean Duggan - OWASP Security Shepherd - Mobile Web Security Awareness and Education
- Mark Goodwin - Making CSP Work For You
- Mark Graham - Cloud-based Detection Techniques for Botnets and Other Malware
- Mark Miller - Wait Wait Dont pwn Me
- Matt Tesauro - Barbican Protect your Secrets at Scale
- Matt Tesauro - DevOps, CI, APIs, Oh My!: Security Gone Agile
- Maty Siman - Warning Ahead Security Stormsare Brewing in Your JavaScript
- OrKatz - Getting New Actionable Insights by Analyzing Web Application Firewall Triggers
- OWASP AppSec Europe 2014 - Builder and Breaker Track
- OWASP AppSec Europe 2014 - DevOps Track
- OWASP AppSec Europe 2014 - Frameworks and Theories Track
- OWASP AppSec Europe 2014 - Malware & Defence Track
- OWASP AppSec Europe 2014 - Mobile Track
- OWASP AppSec Europe 2014 - Security Management & Training Track
- Paolo Di Prodi Tim Burrell - Monitoring Web Sites for Malware Injection with Web Detector
- Seba Deleersnyder Bart De Win - OpenSAMM Best Practices Lessons from the Trenches
- Sebastian Lekies Martin Johns - Relax everybody HTML5 is much securer than you think
- Simon Bennetts - OWASP ZAP Advanced Features
- Stephen de Vries - Continuous Security Testing in a Devops World
- Steven Murdoch - Keynote - Anonymous Communications and Tor History and Future Challenges
- Tin Zaw Scott Matsumoto - Threat Modeling A Brief History and the Unified Approach at Intuit
- Tobias Gondrom - OWASP-CISO Survey Report 2013 Tactical Insights for Managers
- Wendy Seltzer - Keynote - Reflections on Scoping Trust
- Winston Bond - OWASP Mobile Top Ten 2014 - The New Lack of Binary Protection Category