<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/index.php?action=history&amp;feed=atom&amp;title=OWASP_AppSec_DC_2012%2FSchedule%2F4-2-2012</id>
		<title>OWASP AppSec DC 2012/Schedule/4-2-2012 - Revision history</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/index.php?action=history&amp;feed=atom&amp;title=OWASP_AppSec_DC_2012%2FSchedule%2F4-2-2012"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_AppSec_DC_2012/Schedule/4-2-2012&amp;action=history"/>
		<updated>2026-04-14T09:49:36Z</updated>
		<subtitle>Revision history for this page on the wiki</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_AppSec_DC_2012/Schedule/4-2-2012&amp;diff=125253&amp;oldid=prev</id>
		<title>Mark.bristow: Created page with &quot;{|  border=1  |  align=center colspan=5 bgcolor=#4058A0 color=white | 4/2/2012 |-  |  width=72 valign=middle bgcolor=#7b8abd | &amp;nbsp !  width=200 valign=middle height=60 bgcol...&quot;</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_AppSec_DC_2012/Schedule/4-2-2012&amp;diff=125253&amp;oldid=prev"/>
				<updated>2012-03-01T00:34:02Z</updated>
		
		<summary type="html">&lt;p&gt;Created page with &amp;quot;{|  border=1  |  align=center colspan=5 bgcolor=#4058A0 color=white | 4/2/2012 |-  |  width=72 valign=middle bgcolor=#7b8abd | &amp;amp;nbsp !  width=200 valign=middle height=60 bgcol...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;{|  border=1 &lt;br /&gt;
|  align=center colspan=5 bgcolor=#4058A0 color=white | 4/2/2012&lt;br /&gt;
|- &lt;br /&gt;
|  width=72 valign=middle bgcolor=#7b8abd | &amp;amp;nbsp&lt;br /&gt;
!  width=200 valign=middle height=60 bgcolor=#c0a0a0 align=center | Offense &amp;amp; Tools&lt;br /&gt;
!  width=200 valign=middle height=60 bgcolor=#ffdf80 align=center | Case Studies&lt;br /&gt;
!  width=200 valign=middle height=60 bgcolor=#a0c0e0 align=center | IoMT&lt;br /&gt;
!  width=200 valign=middle height=60 bgcolor=#b3ff99 align=center | Interrogate&amp;amp;#33;&lt;br /&gt;
|- &lt;br /&gt;
|  width=72 valign=middle bgcolor=#7b8abd | 7:30 AM - 8:50 AM&lt;br /&gt;
|  align=center colspan=4 valign=middle height=30 bgcolor=#e0e0e0 align=center | Registration&lt;br /&gt;
|- &lt;br /&gt;
|  width=72 valign=middle bgcolor=#7b8abd | 8:50 AM - 9:00 AM&lt;br /&gt;
|  align=center colspan=4 valign=middle height=30 bgcolor=#e0e0e0 align=center | Welcome and Opening Remarks&lt;br /&gt;
|- &lt;br /&gt;
|  width=72 valign=middle bgcolor=#7b8abd | 9:00 AM - 10:00 AM&lt;br /&gt;
|  align=center colspan=4 valign=middle height=60 bgcolor=#e0e0e0 align=center |[https://www.owasp.org/index.php/OWASP_AppSec_DC_2012/Dan_Geer Keynote: Dan Geer]&lt;br /&gt;
|- &lt;br /&gt;
|  width=72 valign=middle bgcolor=#7b8abd | 10:00 AM - 10:45 AM&lt;br /&gt;
|  align=center colspan=4 valign=middle height=30 bgcolor=#e0e0e0 align=center |[https://www.owasp.org/index.php/OWASP_AppSec_DC_2012/OWASP_Board OWASP Board]&lt;br /&gt;
|- &lt;br /&gt;
|  width=72 valign=middle bgcolor=#7b8abd | 10:45 AM - 11:00 AM&lt;br /&gt;
|  align=center colspan=4 valign=middle height=30 bgcolor=#e0e0e0 align=center | Coffee Break&lt;br /&gt;
|- &lt;br /&gt;
|  width=72 valign=middle bgcolor=#7b8abd | 11:00 AM - 11:50 AM&lt;br /&gt;
|  align=center width=200 valign=middle height=60 bgcolor=#c0a0a0 align=center |[https://www.owasp.org/index.php/OWASP_AppSec_DC_2012/DOMJacking__Attack_Exploit_and_Defense DOMJacking - Attack, Exploit and Defense]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Shreeraj Shah&lt;br /&gt;
|  align=center width=200 valign=middle height=60 bgcolor=#ffdf80 align=center |[https://www.owasp.org/index.php/OWASP_AppSec_DC_2012/The_Unfortunate_Reality_of_Insecure_Libraries The Unfortunate Reality of Insecure Libraries]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Jeff Williams and Arshan Dabirsiaghi&lt;br /&gt;
|  align=center width=200 valign=middle height=60 bgcolor=#a0c0e0 align=center |[https://www.owasp.org/index.php/OWASP_AppSec_DC_2012/Python_Basics_for_Web_App_Pentesters__Part_2 Python Basics for Web App Pentesters - Part 2]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Justin Searle&lt;br /&gt;
|  align=center rowspan=3 width=200 valign=middle height=60 bgcolor=#b3ff99 align=center |[https://www.owasp.org/index.php/OWASP_AppSec_DC_2012/Integrating_Application_Security_into_your_Lifecycle_andProcurement Integrating Application Security into your Lifecycle and Procurement]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
John Steven&lt;br /&gt;
|- &lt;br /&gt;
|  width=72 valign=middle bgcolor=#7b8abd | 11:50 AM - 12:00 PM&lt;br /&gt;
|  valign=middle height=30 bgcolor=#e0e0e0 align=center colspan=3 | Coffee Break&lt;br /&gt;
|- &lt;br /&gt;
|  width=72 valign=middle bgcolor=#7b8abd | 12:00 PM - 12:50 PM&lt;br /&gt;
|  align=center width=200 valign=middle height=60 bgcolor=#c0a0a0 align=center |[https://www.owasp.org/index.php/OWASP_AppSec_DC_2012/Attacking_CAPTCHAs_for_Fun_and_Profit Attacking CAPTCHAs for Fun and Profit]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Gursev Singh Kalra&lt;br /&gt;
|  align=center width=200 valign=middle height=60 bgcolor=#ffdf80 align=center |[https://www.owasp.org/index.php/OWASP_AppSec_DC_2012/Case_Study_How_New_Software_Assurance_Policy_Reduces_Riskand_Costs Case Study: How New Software Assurance Policy Reduces Risk and Costs]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Rob Roy and John Keane&lt;br /&gt;
|  align=center width=200 valign=middle height=60 bgcolor=#a0c0e0 align=center |[https://www.owasp.org/index.php/OWASP_AppSec_DC_2012/Security_is_Dead_Long_Live_Rugged_DevOps_IT_at_LudicrousSpeed Security is Dead. Long Live Rugged DevOps: IT at Ludicrous Speed]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Joshua Corman&lt;br /&gt;
|- &lt;br /&gt;
|  width=72 valign=middle bgcolor=#7b8abd | 12:50 PM - 2:00 PM&lt;br /&gt;
|  valign=middle height=30 bgcolor=#e0e0e0 align=center colspan=4 | Lunch&lt;br /&gt;
|- &lt;br /&gt;
|  width=72 valign=middle bgcolor=#7b8abd | 2:00 PM - 2:50 PM&lt;br /&gt;
|  align=center width=200 valign=middle height=60 bgcolor=#c0a0a0 align=center |[https://www.owasp.org/index.php/OWASP_AppSec_DC_2012/Hacking_NETC_Applications_The_Black_Arts Hacking .NET(C#) Applications: The Black Arts]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Jon McCoy&lt;br /&gt;
|  align=center width=200 valign=middle height=60 bgcolor=#ffdf80 align=center |[https://www.owasp.org/index.php/OWASP_AppSec_DC_2012/Security_at_scale_Web_application_security_in_a_continuousdeployment_environment Security at scale: Web application security in a continuous deployment environment]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Zane Lackey&lt;br /&gt;
|  align=center width=200 valign=middle height=60 bgcolor=#a0c0e0 align=center |[https://www.owasp.org/index.php/OWASP_AppSec_DC_2012/The_Easy_Button_for_Your_Web_Application_Security_Career The &amp;quot;Easy&amp;quot; Button for Your Web Application Security Career]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Salvador Grec&lt;br /&gt;
|  align=center rowspan=3 width=200 valign=middle height=60 bgcolor=#b3ff99 align=center |[https://www.owasp.org/index.php/OWASP_AppSec_DC_2012/Risk_Analysis_and_Measurement_with_CWRAF Risk Analysis and Measurement with CWRAF]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Joe Jarzombek, Bob Martin, Walter Houser and Tom Brennan&lt;br /&gt;
|- &lt;br /&gt;
|  width=72 valign=middle bgcolor=#7b8abd | 2:50 PM - 3:00 PM&lt;br /&gt;
|  valign=middle height=30 bgcolor=#e0e0e0 align=center colspan=3 | Coffee Break&lt;br /&gt;
|- &lt;br /&gt;
|  width=72 valign=middle bgcolor=#7b8abd | 3:00 PM - 3:50 PM&lt;br /&gt;
|  align=center width=200 valign=middle height=60 bgcolor=#c0a0a0 align=center |[https://www.owasp.org/index.php/OWASP_AppSec_DC_2012/OWASP_Broken_Web_Applications_OWASP_BWA_10_Release OWASP Broken Web Applications (OWASP BWA) 1.0 Release]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Chuck Willis&lt;br /&gt;
|  align=center width=200 valign=middle height=60 bgcolor=#ffdf80 align=center |[https://www.owasp.org/index.php/OWASP_AppSec_DC_2012/2012_Global_Security_Report 2012 Global Security Report]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Tom Brennan and Nick Percoco&lt;br /&gt;
|  align=center width=200 valign=middle height=60 bgcolor=#a0c0e0 align=center |[https://www.owasp.org/index.php/OWASP_AppSec_DC_2012/Anatomy_of_a_Logic_Flaw Anatomy of a Logic Flaw]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Charles Henderson and David Byrne&lt;br /&gt;
|- &lt;br /&gt;
|  width=72 valign=middle bgcolor=#7b8abd | 3:50 PM - 4:00 PM&lt;br /&gt;
|  valign=middle height=30 bgcolor=#e0e0e0 align=center colspan=4 | Coffee Break&lt;br /&gt;
|- &lt;br /&gt;
|  width=72 valign=middle bgcolor=#7b8abd | 4:00 PM - 4:50 PM&lt;br /&gt;
|  align=center width=200 valign=middle height=60 bgcolor=#c0a0a0 align=center |[https://www.owasp.org/index.php/OWASP_AppSec_DC_2012/New_and_Improved_Hacking_Oracle_from_Web New and Improved Hacking Oracle from Web]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Sumit Siddharth&lt;br /&gt;
|  align=center width=200 valign=middle height=60 bgcolor=#ffdf80 align=center |[https://www.owasp.org/index.php/OWASP_AppSec_DC_2012/State_of_Web_Security State of Web Security]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Robert Rowley&lt;br /&gt;
|  align=center width=200 valign=middle height=60 bgcolor=#a0c0e0 align=center |[https://www.owasp.org/index.php/OWASP_AppSec_DC_2012/Old_Webshells_New_Tricks__How_Persistent_Threats_haverevived_an_old_idea_and_how_you_can_detect_them Old Webshells, New Tricks -- How Persistent Threats have revived an old idea, and how you can detect them.]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Ryan Kazanciyan&lt;br /&gt;
|  align=center rowspan=3 width=200 valign=middle height=60 bgcolor=#b3ff99 align=center |[https://www.owasp.org/index.php/OWASP_AppSec_DC_2012/Fed_Panel Fed Panel]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
TBA&lt;br /&gt;
|- &lt;br /&gt;
|  width=72 valign=middle bgcolor=#7b8abd | 4:50 PM - 5:00 PM&lt;br /&gt;
|  valign=middle height=30 bgcolor=#e0e0e0 align=center colspan=3 | Coffee Break&lt;br /&gt;
|- &lt;br /&gt;
|  width=72 valign=middle bgcolor=#7b8abd | 5:00 PM - 5:50 PM&lt;br /&gt;
|  align=center width=200 valign=middle height=60 bgcolor=#c0a0a0 align=center |[https://www.owasp.org/index.php/OWASP_AppSec_DC_2012/Unraveling_some_of_the_Mysteries_around_DOMbased_XSS Unraveling some of the Mysteries around DOM-based XSS]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Dave Wichers&lt;br /&gt;
|  align=center width=200 valign=middle height=60 bgcolor=#ffdf80 align=center |[https://www.owasp.org/index.php/OWASP_AppSec_DC_2012/Security_Is_Like_An_Onion_Thats_Why_It_Makes_You_Cry Security Is Like An Onion, That's Why It Makes You Cry]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Michele Chubirka&lt;br /&gt;
|  align=center width=200 valign=middle height=60 bgcolor=#a0c0e0 align=center |[https://www.owasp.org/index.php/OWASP_AppSec_DC_2012/Survivable_Software_for_CyberPhysical_Systems Survivable Software for Cyber-Physical Systems]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Karen Mercedes Goertzel&lt;br /&gt;
|- &lt;br /&gt;
|  width=72 valign=middle bgcolor=#7b8abd | 6:00 PM&lt;br /&gt;
|  valign=middle height=30 bgcolor=#e0e0e0 align=center colspan=4 | Networking Oppertunity&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Mark.bristow</name></author>	</entry>

	</feed>