Events
WallArm sponsors May 2026 NAC-ISSA lunch
TOPIC: Business Logic Abuse: Technology Agnostic Mapping of Attack Types OWASP's technology specific top 10 lists have provided a ton of value, but it's time for a different approach to business
02
Months
07
Days
04
Hours
36
Minutes

May 19 @ 11:30 am – 12:30 pm
TOPIC: Business Logic Abuse: Technology Agnostic Mapping of Attack Types
OWASP’s technology specific top 10 lists have provided a ton of value, but it’s time for a different approach to business logic abuse. The rise of APIs and complex business logic attacks requires a new taxonomy that isn’t tied to a specific technology.
Free