Projects Summit 2013/Working Sessions/0017
Global Summit 2013 Home Page
Global Summit 2013 Tracks
| Please see/use the 'discussion' page for more details about this Working Session | ||||||
|---|---|---|---|---|---|---|
| Working Sessions Operational Rules - Please see here the general frame of rules. |
| WORKING SESSION IDENTIFICATION | ||||||
|---|---|---|---|---|---|---|
| Short Work Session Description | In this hackathon we will focus on building the code for AppSensor 2.0, which will involve moving to a services (both REST and SOAP) model for event detection and response. | |||||
| Related Projects (if any) |
| |||||
| Email Contacts & Roles | Chair John Melton |
Operational Manager Samantha Groves @ |
Mailing list Google Groups: owasp-project-summit-2013 | |||
| WORKING SESSION SPECIFICS | ||||||
|---|---|---|---|---|---|---|
| Objectives |
| |||||
| Venue/Date&Time/Model | Venue/Room AppSec USA 2013: Times Square, New York City |
Date & Time Monday, November 18, 1:00PM - 5:00PM
|
Discussion Model participants and attendees | |||
| |
|---|
| WORKING SESSION OPERATIONAL RESOURCES | ||||||
|---|---|---|---|---|---|---|
| Projector, whiteboards, markers, Internet connectivity, power | ||||||
| |
|---|
| WORKING SESSION ADDITIONAL DETAILS | ||||||
|---|---|---|---|---|---|---|
Chair: John MeltonJohn Melton is the development lead for the OWASP AppSensor project. He is a senior application security researcher at White Hat Security. He does design, development and security analysis of secure J2EE web-based applications. Operational Manager: Samantha GrovesSamantha Groves is the Project Manager at OWASP. Samantha has led many projects in her career, some of which include website development, brand development, sustainability and socio-behavioural research projects, competitor analysis, event organisation and management, volunteer engagement projects, staff recruitment and training, and marketing department organisation and strategy implementation projects for a variety of commercial and not-for-profit organisations. | ||||||
| WORKING SESSION OUTCOMES / DELIVERABLES | ||
|---|---|---|
| Proposed by Working Group | 'Delivered by Working Group | |
| After the Meeting - fill in here. | ||
|
Provide guidance on how to respond once a malicious attacker has been identified. |
After the Meeting - fill in here. | |
| After the Meeting - fill in here. | ||
| After the Meeting - fill in here. | ||
| After the Meeting - fill in here. | ||
| After the Meeting - fill in here. | ||
| After the Meeting - fill in here. | ||
| After the Meeting - fill in here. | ||
Working Session Participants
(Add you name by clicking "edit" on the tab on the upper left side of this page)
| WORKING SESSION PARTICIPANTS | ||||||
|---|---|---|---|---|---|---|
| Name | Company | Notes & reason for participating, issues to be discussed/addressed | ||||
| |
{{{summit_session_attendee_company21}}} |
{{{summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed21}}} | ||||
| |
|
| ||||
| |
| |||||
| |
| |||||
| |
| |||||
| |
| |||||
| |
| |||||
| |
| |||||
| |
| |||||
| |
| |||||
| |
| |||||
| |
| |||||
| |
| |||||
| |
| |||||
| |
| |||||
| |
| |||||
| |
| |||||
| |
| |||||
| |
| |||||
| |
| |||||
| |
| |||||
