Presented by:

Ángel Gómez Romero

from Accenture

Advanced App Engineering Associate Manager at Accenture. 18+ years developing, designing, and architecting enterprise solutions in different languages (mainly in Java). DevOps practitioner, Cloud solutions lover and Application Security applied to SDLC (Software Delivery Lifecycle) evangelist.

No video of the event yet, sorry!

Join up in a tour of various scenarios identifying the basic concepts about Application Security, learning about some of the most recent vulnerabilities and data breaches, as well as examples of how easy it can be to hack you.

Application Security not only consists in the use of software, hardware, and procedural methods to protect applications from external threats, it is more than technology, is a path not a destination, it is about risk management and implementing effective countermeasures to identify potential threats and understand that each threat presents a degree of risk.

Once an afterthought in software design, security is becoming an increasingly important concern during development as applications become more frequently accessible over networks and are, as a result, vulnerable to a wide variety of threats. Security measures built into applications and a sound application security routine minimize the likelihood that unauthorized code will be able to manipulate applications to access, steal, modify, or delete sensitive data.



    Are we secure, or not? This is a common misconception and it depends on the threat

    Brief history of App Security. Some of the highlights and reactions dating back to the late ‘80s; how attackers have evolved from individuals to organized groups of cyber criminals; attackers improve their tactics and new vulnerability disclosures continue to trend upward; mobile applications vulnerabilities or automotive Cyber threats are exploited nowadays

    The life of a Cyberthreat. Ever wonder how cyberattacks and malware are created, and how they get into your system to steal your data?

    Cybersec awareness: Malware. What is the difference between virus, worm, trojan horse, ... malware programs?

    Hacker and Cracker differences. Why do those dedicated bother them so much when the terms are confused?


    How it works: Cybersecurity, Cloud and Mobile Security. Having the proper response plan in place in case of a security breach can stop it from becoming a major disaster; Data is shifting rapidly to the cloud and hackers are constantly looking to breach these valuable data sources; as mobile technology becomes more advanced, so do the security attacks of those who want to exploit mobile technology, creating a multitude of troubling scenarios

    Build a Secure application. Identify layers in which to apply security to design and build secure applications

    Security main elements. Security relies on Authentication, Authorization, Auditing elements; Security also relies on the Confidentiality, Integrity, Availability elements described below

    Core Security principles. Recommendations applied regardless of implementation technology or app scenario


    How Social Engineering hack you. Simple Social Engineering trick with a phone call and crying baby

    Should we fear hijacking? Hackers remotely (and easily) kill a Jeep on a highway


2019 May 25 - 17:30
45 min
Sala 3 - Freeciv
Opensouthcode 2019
Spanish; Castilian

Happening at the same time:

  1. Chatbots, Machine Learning y Microservicios. ALL IN
  2. Start Time:
    2019 May 25 17:30

    Sala 1 - Flightgear

  3. 20.000 registros de viaje submarino
  4. Start Time:
    2019 May 25 17:30

    Sala 2 - 0 A.D.