It’s common to hear people preach “plan in security from the start” and in an ideal world you can. Here in the real world, though, we have legacy code that’s gathered over time and comes with a host of problems - (in)security included. What do you do when you’ve been commissioned with securing an application that’s showing its age? Follow along with me as a I step you through a list of tips and tricks you can use to discover security issues in your application and effectively fix them and secure your application.

Topics will include some of the most common vulnerability types, key places to look for potential issues and arm you with the tools and knowledge you’ll need to refactor that legacy application into something secure.


Comments are closed.

Joshua Sampia at 17:45 on 4 Feb 2017

Packed with a ridiculous amount of information to follow up on. It's unfortunate the audience was smaller while everyone was napping after cupcakes. I think some specific code examples might help people too.

Liviu Ifrim at 17:57 on 4 Feb 2017

Very helpful, thank you.

Amazingly helpful talk. Chris' presentation was super thorough, and his presentation style is great. Unlike most other talks where I took a few notes here and there, I was typing out notes pretty much the whole time he was talking. This talk could easily be expanded to a 3-hour tutorial.

Thomas Misilo at 15:17 on 5 Feb 2017

Chris did an excellent job covering many topics related to security and went into sufficient detail in the time alloted. This could easily be a much longer talk.