- event December 5 - 8
- room Clearwater, FL
The Rich Web Experience 2017
Christopher Judd will be speaking at the Rich Web Experience 2017 from December 5-8 in Clearwater, FL.
Building Serverless Applications in AWS Workshop – Wednesday 8:30am and 10:30am
Tired of trying to manage and maintain servers? Never have a large enough operations team? Don’t have a budget for running lots of server? Don’t want to pay for servers siting idle? Afraid you might become so popular that you won’t be able to scale fast enough? Don’t worry, it is possible to alleviate these issues by moving to a serverless architecture that utilizes microservices hosted in the cloud. This type of architecture can support all different types of clients including web, mobile and IoT.
During this hands-on workshop, you will build a serverless application utilizing AWS services such as Lambda, API Gateway, S3 and a datastore.
During this session you will build a simple web application utilizing AWS services and Angular.
Hacking & Hardening Java Web Applications Workshop – Wednesday 2:45pm and Wednesday 4:30pm
It seems like everyday there is a new headline about a security breach in a major company’s web application. These breaches cause companies to lose their credibility, cost them large sums of money, and those accountable undoubtedly lose their jobs. Security requires you to be proactive. Keep your employer out of the headlines by learning some key security best practices.
This hands-on workshop is designed to teach you how to identify and fix vulnerabilities in Java web applications. Using an existing web application, you will learn ways to scan and test for common vulnerabilities such as hijacking, injection, cross-site scripting, cross-site forgery and more. You will learn best practices around logging, error handling, intrusion detection, authentication and authorization. You will also learn how to improve security in your applications using existing libraries, frameworks and techniques to patch and prevent vulnerabilities.
Assert User Identity using Two-Factor Authentication with Time-based One-time Password – Thusday 1:30pm
A username and password is not enough for asserting a user’s identity. This session will show you how to add a time-based one-time password as a second factor.
Based on daily news stories of data breaches and unauthorized access like Mark Zuckerberg’s Twitter account being hacked, it is obvious that passwords are not enough to protect users or assert their identity. Providing two-factor authentication is a critical feature for validating a user is who they say they are. The first factor is something you know, like your standard password. The second factor is something you have, like a Time-based One-time Password (TOTP mobile application) or something you are, like retina or finger print. This session will show you how to make your applications more secure by easily adding a second factor to your existing authentication process by leveraging a TOTP algorithm and using a TOTP mobile application such as Google Authenticator or Authy application.