AIM | HDC has ended

AIM Heartland Developer Conference is the region’s best developer & designer conference covering the latest trends, techniques, technologies, and best practices in software design and development.

As a conference attendee you have access to all sessions (on Thursday and Friday) so you can plan your own custom itinerary. There is a separate fee of $50 for workshop sessions held on Wednesday, September 7.  

Schedule is subject to change.

To learn more about AIM HDC, visit heartlanddc.com

Sign up or log in to bookmark your favorites and sync them to your phone or calendar.

Security [clear filter]
Thursday, September 8

3:15pm CDT

Secure your ASP.NET WebApi and MVC applications
Everyday we read or hear about some new security exploit. A hacker was able to gain access to a system and downloaded millions of credit cards. Or, a hacker was able to inject code into a website and download viruses onto users computers. 100% security is not possible, but how can we make it very difficult for someone to get in?

Learn how to use the functionality provided by web browsers such as IE, Chrome, and Firefox and the .NET framework to increase the security of your site in almost no time at all. In addition, this session will also cover how to extend out security tools provided in the ASP.NET core library to write your own custom rules to secure your data.

avatar for Bob Walker

Bob Walker

Lead Application Developer, Farm Credit Services of America
I've been a full stack developer from the start, way back in the days of .NET 1.0 when ASP.NET WebForms roamed the earth. Over the years my interests have grown from just ASP.NET, C# and SQL to JavaScript, AngularJS, TDD, Automated Testing, Automated Database deployment, Secure Development... Read More →

Thursday September 8, 2016 3:15pm - 4:00pm CDT
Windsor VIII-X
Friday, September 9

11:15am CDT

Oops We Forgot: From the Eyes of an Attacker
The world is filled with frameworks packed with layer after layer of protection. Things like XSS and SQL Injection are becoming easier to mitigate by simply using a pre-built library. OAuth, SAML, and OpenID are drop in authentication / authorization frameworks. TLS libraries are baked into every major language now. Yet the role of a penetration tester is still a valuable one that frequently bears fruit. Why?

From the eyes of a programmer-turned-application penetration tester, these are the top 10 things I see development teams forgetting to do in production despite the presence of such powerful libraries. We'll go over each basic item, explain the risk involved, how to mitigate, and discuss the likely reasons we forget about them.

avatar for Ethan Wilder

Ethan Wilder

Manager Application Security, Allstate

Friday September 9, 2016 11:15am - 12:00pm CDT
Windsor III-IV