Top Reading
Sorry, there is nothing for the moment.
Most Upvoted

APISecure 2022 (Day 2)

today April 7, 2022


Background
Program
Select arrow_drop_down
9:00 am remove 9:10 am
ALL TRACKS
keyboard_arrow_down
Background
9:10 am remove 9:50 am
keyboard_arrow_down
Background

Hacking and Defending APIs

9:50 am remove 10:20 am
keyboard_arrow_down
Background

Exploiting Multi-step Business Logic Vulnerabilities in APIs

10:40 am remove 11:05 am
keyboard_arrow_down
Background

API Security: A CISOs Perspective

11:30 am remove 11:55 am
keyboard_arrow_down
Background

Vaishali's Guide to Hacking APIs with Business Logic Flaws

1:10 pm remove 1:35 pm
keyboard_arrow_down
Background

Anatomy of an API Attack: Applying MITRE Framework to API Threat Modeling

2:00 pm remove 2:25 pm
keyboard_arrow_down
Background

Workshop: Training Future Women and Nonbinary in API Security

11:05 am remove 2:25 pm
keyboard_arrow_down
Background

Panel: Demystifying the API Security Landscape

3:15 pm remove 3:40 pm
keyboard_arrow_down
Background

Lessons Learned in Hacking 4 Million Patient Records Through FHIR APIs

3:40 pm remove 4:00 pm
keyboard_arrow_down
Background
9:00 am remove 9:10 am
ALL TRACKS
keyboard_arrow_down
Background
9:10 am remove 9:50 am
keyboard_arrow_down
Background

Hacking and Defending APIs

9:50 am remove 10:20 am
keyboard_arrow_down
Background

Exploiting Multi-step Business Logic Vulnerabilities in APIs

10:40 am remove 11:05 am
keyboard_arrow_down
Background

Securing FHIR APIs in Healthcare

11:05 am remove 11:30 am
keyboard_arrow_down
Background

Designing and Implementing a FHIR API Security Plan

11:30 am remove 11:55 am
keyboard_arrow_down
Background

Top Ten Security Tips for APIs

11:55 am remove 12:20 pm
keyboard_arrow_down
Background

Monitoring and Responding to API Breaches

1:10 pm remove 1:35 pm
keyboard_arrow_down
Background

Making Webhook APIs More Secure for Enterprise Use

1:35 pm remove 2:00 pm
keyboard_arrow_down
Background

Design Secure APIs at Scale

2:00 pm remove 2:25 pm
keyboard_arrow_down
Background

5 Keys to Surviving the API Apocalypse

2:25 pm remove 2:50 pm
keyboard_arrow_down
Background

Are Your APIs Rugged Enough?

2:50 pm remove 3:15 pm
keyboard_arrow_down
Background

Untangling Identity API Complexity

3:15 pm remove 3:40 pm
keyboard_arrow_down
Background

API Security & Fraud Detection - Are You Ready?

3:40 pm remove 4:00 pm
keyboard_arrow_down
Background
9:00 am remove 9:10 am
ALL TRACKS
keyboard_arrow_down
Background
9:10 am remove 9:50 am
keyboard_arrow_down
Background

Hacking and Defending APIs

9:50 am remove 10:20 am
keyboard_arrow_down
Background

Exploiting Multi-step Business Logic Vulnerabilities in APIs

10:40 am remove 11:05 am
keyboard_arrow_down
Background

Shift Left - The Right Way

11:05 am remove 11:30 am
keyboard_arrow_down
Background

Defending APIs From the Inside-Out

11:30 am remove 11:55 am
keyboard_arrow_down
Background

Crowdsourced Pentesting / API Defenses

11:55 am remove 12:20 pm
keyboard_arrow_down
Background

Do You Know What Information Your APIs are Leaking?

1:10 pm remove 1:35 pm
keyboard_arrow_down
Background

The Real World, API Security Edition: When Best Practices Stop Being Polite and Start Being Real

1:35 pm remove 2:00 pm
keyboard_arrow_down
Background

Securing Large API Ecosystems

2:00 pm remove 2:25 pm
keyboard_arrow_down
Background

A Day in the Life of an API: Fighting the Odds

2:25 pm remove 2:50 pm
keyboard_arrow_down
Background

Passwordless Multi-factor Authentication Security and Identity

2:50 pm remove 3:15 pm
keyboard_arrow_down
Background

Learn from the Past, Secure the Present, Plan For the Future: API Vulnerabilities

2:50 pm remove 3:15 pm
keyboard_arrow_down
Background

Quarterly Review of API Vulnerabilities

3:40 pm remove 4:00 pm
keyboard_arrow_down
Background
9:00 am remove 9:10 am
ALL TRACKS
keyboard_arrow_down
Background
9:10 am remove 9:50 am
keyboard_arrow_down
Background

Hacking and Defending APIs

9:50 am remove 10:20 am
keyboard_arrow_down
Background

Exploiting Multi-step Business Logic Vulnerabilities in APIs

10:40 am remove 11:30 am
keyboard_arrow_down
Background

Why AI-Based API Security is Just Not Enough

10:40 am remove 11:05 am
keyboard_arrow_down
Background

API Security: Trends in 2022

11:05 am remove 11:30 am
keyboard_arrow_down
Background

How Are You Securing the Number 1 Attack Vector?

11:30 am remove 12:20 pm
keyboard_arrow_down
Background

API Security with Traceable AI

11:20 am remove 11:55 am
keyboard_arrow_down
Background

What is Your API Attack Surface Area?

11:55 am remove 12:20 pm
keyboard_arrow_down
Background

Red Table: Talk With API Hackers

1:10 pm remove 2:00 pm
keyboard_arrow_down
Background

API Testing Fundamentals and Lab

2:00 pm remove 2:50 pm
keyboard_arrow_down
Background

Hands-on Testing and Protecting APIs

2:50 pm remove 3:15 pm
keyboard_arrow_down
Background

Managing Your Software Supply Chain

2:50 pm remove 3:15 pm
keyboard_arrow_down
Background

Quarterly Review of API Vulnerabilities

3:40 pm remove 4:00 pm
keyboard_arrow_down
Background

Details
Begin April 7, 2022 H 9:00 am
End April 7, 2022 H 5:00 pm
Link https://www.apisecure.co
Rate it

Subscribe now and receive our weekly updates.


Copyright 2022 Knight Events and APIDays.

Background