- 2013 AppSec Guide and CISO Survey - Marco Morana, Tobias Gondrom
- Accidental Abyss: Data Leakage on The Internet - Kelly FitzGerald
- All the network is a stage, and the APKs merely players - Daniel Peck
- An Introduction to the Newest Addition to the OWASP Top 10 - Ryan Berg, Jeff Williams
- Application Security: Everything we know is wrong - Eoin Keary
- AppSec at DevOps Speed and Portfolio Scale - Jeff Williams
- (Audio only) PANEL: Aim-Ready-Fire moderated by Wendy Nather
- (Audio only) Panel: Don't Tell Me Software Security - moderated by Mark Miller
- (Audio only) PANEL: Women in Information Security - moderated by Joan Goodchild
- (Audio only) Wassup MOM? Owning the Message Oriented Middleware - Gursev Singh Kalra
- BASHing iOS Applications - Jason Haddix, Dawn Isabel
- Big Data Intelligence - Ory Segal, Tsvika Klein
- Can AppSec Training Really Make a Smarter Developer? - John Dickson
- Case Study: 10 Steps to Agile Development without Compromising Enterprise Security - Yair Rovek
- Contain Yourself: Building Secure Containers for Mobile Devices - Ron Gutierrez
- Forensic Investigations of Web Exploitations - Ondrej Krehel
- Hacking Web Server Apps for iOS - Bruno Oliveira
- Hack.me: a new way to learn web application security - Armando Romeo
- HTML5: Risky Business or Hidden Security Tool Chest? - Johannes Ullrich
- HTTP Time Bandit - Vaagn Toukharian, Tigran Gevorgyan
- Insecure Expectations - Matt Konda
- iOS Application Defense - iMAS - Gregg Ganley
- Leveraging OWASP in Open Source Projects - Aaron Weaver, David Ohsie, Bill Thompson
- Making the Future Secure with Java - Milton Smith
- Mantra OS: Because The World is Cruel - Gregory Disney-Leugers
- Mobile app analysis with Santoku Linux - Andrew Hoog
- NIST - Missions and impacts to US industry, economy and citizens - James St. Pierre, Matthew Scholl
- OWASP Broken Web Applications (OWASP BWA): Beyond 1.0 - Chuck Willis
- OWASP Hackademic - Konstantinos Papapanagiotou
- OWASP Periodic Table of Elements - James Landis
- OWASP Zed Attack Proxy - Simon Bennetts
- PiOSoned POS - A Case Study in iOS based Mobile Point-of-Sale gone wrong - Mike Park
- Pushing CSP to PROD - Brian Holyfield, Erik Larsson
- Revenge of the Geeks: Hacking Fantasy Sports Sites - Dan Kuykendall
- Tagging Your Code with a Useful Assurance Label - Robert Martin
- The 2013 OWASP Top 10 - Dave Wichers
- The Cavalry Is US: Protecting the public good - Josh Corman, Nicholas Percoco
- The Perilous Future of Browser Security - Robert Hansen
- Thinking Differently About Security - Mary Ann Davidson
- Top Ten Proactive Controls - Jim Manico
- Verify your software for security bugs - Simon Roses Femerling
- What You Didn't Know About XML External Entities Attacks - Timothy Morgan
- Why is SCADA Security an Uphill Battle? - Amol Sarwate