A Series of Unfortunate Events – How Your Application Gets Hacked
Many of us know about the various security checklists and how we should write more secure code. In this session we will move beyond top 10 lists and dive into the world of how attackers compromise systems and how they use those compromises to exploit both individuals and companies.
You will see demonstrations of how malicious actors break into applications and learn about the real world exploits that allow attackers to steal data, take over systems and even compromise entire organizations.
As we work our way through the system we will review concrete steps that you can take to mitigate similar attacks on your own systems.