Download pdf
What if the bad guys actually have a different top 10 than we’re all working on? Ever imagine running an application security honey pot for a year to see what you might get? This isn’t your mom’s version of an Application Security talk, its time to discuss getting real, getting into the details and getting ahead of adversaries.