What’s The Worst That Can Happen?

Many of us know about the various security checklists and how we should write more secure code. In this session we will move beyond top 10 lists and dive into the world of how attackers compromise systems and how they use those compromises to exploit both companies and individuals. We will take a walk through applications from an attackers perspective and demonstrate real world exploits to steal data, take over systems and even compromise entire organizations.