This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Summit 2011 Working Sessions/Session068"
From OWASP
(25 intermediate revisions by 15 users not shown) | |||
Line 2: | Line 2: | ||
|- | |- | ||
+ | | summit_session_attendee_name1 = Colin Watson | ||
+ | | summit_session_attendee_email1 = [email protected] | ||
+ | | summit_session_attendee_username1 = | ||
+ | | summit_session_attendee_company1= | ||
+ | | summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed1=1. AppSensor equivalent for application-aware configuration monitoring (file integrity, file additions, database integrity, config settings, patching, etc)? 2. Application surface/entry point definition language? | ||
+ | |||
+ | | summit_session_attendee_name1 = Eoin Keary | ||
+ | | summit_session_attendee_email1 = [email protected] | ||
+ | | summit_session_attendee_username1 = EoinKeary | ||
+ | | summit_session_attendee_company1=Ernst & Young | ||
+ | | summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed1= | ||
+ | |||
+ | | summit_session_attendee_name2 = Dinis Cruz | ||
+ | | summit_session_attendee_email2 = [email protected] | ||
+ | | summit_session_attendee_username2 = | ||
+ | | summit_session_attendee_company2= | ||
+ | | summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed2= | ||
+ | |||
+ | | summit_session_attendee_name3 = Chris Schmidt | ||
+ | | summit_session_attendee_email3 = [email protected] | ||
+ | | summit_session_attendee_username3 = | ||
+ | | summit_session_attendee_company3= Aspect Security | ||
+ | | summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed3= | ||
+ | |||
+ | | summit_session_attendee_name4 = Justin Clarke | ||
+ | | summit_session_attendee_email4 = [email protected] | ||
+ | | summit_session_attendee_username4 = | ||
+ | | summit_session_attendee_company4=Gotham Digital Science | ||
+ | | summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed4= | ||
+ | |||
+ | | summit_session_attendee_name5 = Matthias Rohr | ||
+ | | summit_session_attendee_email5 = [email protected] | ||
+ | | summit_session_attendee_username5 = | ||
+ | | summit_session_attendee_company5= SEC Consult | ||
+ | | summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed5= | ||
+ | |||
+ | | summit_session_attendee_name6 = Matteo Meucci | ||
+ | | summit_session_attendee_email6 = [email protected] | ||
+ | | summit_session_attendee_username6 = | ||
+ | | summit_session_attendee_company6= | ||
+ | | summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed6= | ||
+ | |||
+ | | summit_session_attendee_name7 = Mateo Martinez | ||
+ | | summit_session_attendee_email7 = [email protected] | ||
+ | | summit_session_attendee_username7 = | ||
+ | | summit_session_attendee_company7= | ||
+ | | summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed7= | ||
+ | |||
+ | | summit_session_attendee_name8 = Ofer Maor | ||
+ | | summit_session_attendee_email8 = [email protected] | ||
+ | | summit_session_attendee_username8 = | ||
+ | | summit_session_attendee_company8= | ||
+ | | summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed8= | ||
+ | |||
+ | | summit_session_attendee_name9 = Wojciech Dworakowski | ||
+ | | summit_session_attendee_email9 = [email protected] | ||
+ | | summit_session_attendee_username9 = Wojciech Dworakowski | ||
+ | | summit_session_attendee_company9= SecuRing | ||
+ | | summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed9= | ||
+ | |||
+ | | summit_session_attendee_name10 = Tobias Gondrom | ||
+ | | summit_session_attendee_email10 = [email protected] | ||
+ | | summit_session_attendee_username10 = Tgondrom | ||
+ | | summit_session_attendee_company10= IETF | ||
+ | | summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed10= | ||
+ | |||
+ | | summit_session_attendee_name11 = | ||
+ | | summit_session_attendee_email11 = | ||
+ | | summit_session_attendee_username11 = | ||
+ | | summit_session_attendee_company11= | ||
+ | | summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed11= | ||
+ | |||
+ | | summit_session_attendee_name12 = | ||
+ | | summit_session_attendee_email12 = | ||
+ | | summit_session_attendee_username12 = | ||
+ | | summit_session_attendee_company12= | ||
+ | | summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed12= | ||
+ | |||
+ | | summit_session_attendee_name13 = | ||
+ | | summit_session_attendee_email13 = | ||
+ | | summit_session_attendee_username13 = | ||
+ | | summit_session_attendee_company13= | ||
+ | | summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed13= | ||
+ | |||
+ | | summit_session_attendee_name14 = | ||
+ | | summit_session_attendee_email14 = | ||
+ | | summit_session_attendee_username14 = | ||
+ | | summit_session_attendee_company14= | ||
+ | | summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed14= | ||
+ | |||
+ | | summit_session_attendee_name15 = | ||
+ | | summit_session_attendee_email15 = | ||
+ | | summit_session_attendee_username15 = | ||
+ | | summit_session_attendee_company15= | ||
+ | | summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed15= | ||
+ | |||
+ | | summit_session_attendee_name16 = | ||
+ | | summit_session_attendee_email16 = | ||
+ | | summit_session_attendee_username16 = | ||
+ | | summit_session_attendee_company16= | ||
+ | | summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed16= | ||
+ | |||
+ | | summit_session_attendee_name17 = | ||
+ | | summit_session_attendee_email17 = | ||
+ | | summit_session_attendee_username17 = | ||
+ | | summit_session_attendee_company17= | ||
+ | | summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed17= | ||
+ | |||
+ | | summit_session_attendee_name18 = | ||
+ | | summit_session_attendee_email18 = | ||
+ | | summit_session_attendee_username18 = | ||
+ | | summit_session_attendee_company18= | ||
+ | | summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed18= | ||
+ | |||
+ | | summit_session_attendee_name19 = | ||
+ | | summit_session_attendee_email19 = | ||
+ | | summit_session_attendee_username19 = | ||
+ | | summit_session_attendee_company19= | ||
+ | | summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed19= | ||
+ | |||
+ | | summit_session_attendee_name20 = | ||
+ | | summit_session_attendee_email20 = | ||
+ | | summit_session_attendee_username20 = | ||
+ | | summit_session_attendee_company20= | ||
+ | | summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed20= | ||
+ | |||
+ | |- | ||
+ | | summit_track_logo = [[Image:T._individual_projects.jpg]] | ||
+ | | summit_ws_logo = [[Image:WS._individual_projects.jpg]] | ||
| summit_session_name = Enterprise Web Defense Roundtable | | summit_session_name = Enterprise Web Defense Roundtable | ||
| summit_session_url = http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session068 | | summit_session_url = http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session068 | ||
− | + | | mailing_list = | |
|- | |- | ||
Line 34: | Line 163: | ||
| summit_session_objective_name3 = Automated defenses - what techniques are currently in use? | | summit_session_objective_name3 = Automated defenses - what techniques are currently in use? | ||
− | | summit_session_objective_name4 = Benefits/considerations for using bounty programs | + | | summit_session_objective_name4 = Benefits/considerations for using security bounty programs and public hacking initiatives. |
| summit_session_objective_name5 = What can OWASP build or develop to assist with enterprise wide application security? | | summit_session_objective_name5 = What can OWASP build or develop to assist with enterprise wide application security? | ||
Line 56: | Line 185: | ||
|- | |- | ||
− | |summit_session_deliverable_name1 = | + | |summit_session_deliverable_name1 = A white paper detailing specific recommendations for Enterprise Web Security. |
− | |||
− | |summit_session_deliverable_name2 = | + | |summit_session_deliverable_name2 = A plan for building an ecosystem specifically targeting enterprise web security. What does it take to scientifically advance the state of the art? |
− | |||
|summit_session_deliverable_name3 = | |summit_session_deliverable_name3 = | ||
− | |||
|summit_session_deliverable_name4 = | |summit_session_deliverable_name4 = | ||
− | |||
|summit_session_deliverable_name5 = | |summit_session_deliverable_name5 = | ||
− | | | + | |
+ | |summit_session_deliverable_name6 = | ||
+ | |||
+ | |summit_session_deliverable_name7 = | ||
+ | |||
+ | |summit_session_deliverable_name8 = | ||
|- | |- | ||
Line 75: | Line 205: | ||
| summit_session_leader_name1 = Michael Coates | | summit_session_leader_name1 = Michael Coates | ||
| summit_session_leader_email1 = [email protected] | | summit_session_leader_email1 = [email protected] | ||
− | |||
| summit_session_leader_name2 = Chris Lyon | | summit_session_leader_name2 = Chris Lyon | ||
| summit_session_leader_email2 = [email protected] | | summit_session_leader_email2 = [email protected] | ||
− | |||
| summit_session_leader_name3 = | | summit_session_leader_name3 = | ||
| summit_session_leader_email3 = | | summit_session_leader_email3 = | ||
− | | | + | | summit_session_leader_username3 = |
|- | |- | ||
Line 89: | Line 217: | ||
| operational_leader_name1 = | | operational_leader_name1 = | ||
| operational_leader_email1 = | | operational_leader_email1 = | ||
− | | | + | | operational_leader_username1 = |
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
|- | |- |
Latest revision as of 23:18, 6 February 2011
Global Summit 2011 Home Page
Global Summit 2011 Tracks
Enterprise Web Defense Roundtable | ||||||
---|---|---|---|---|---|---|
Please see/use the 'discussion' page for more details about this Working Session | ||||||
Working Sessions Operational Rules - Please see here the general frame of rules. |
WORKING SESSION IDENTIFICATION | ||||||
---|---|---|---|---|---|---|
Short Work Session Description | How are enterprises defending web applications. Discussion of best practices, effective methods, and new ideas to enhance web application defense. | |||||
Related Projects (if any) |
| |||||
Email Contacts & Roles | Chair Michael Coates @ Chris Lyon @ |
Operational Manager |
Mailing list Subscription Page |
WORKING SESSION SPECIFICS | ||||||
---|---|---|---|---|---|---|
Objectives |
| |||||
Venue/Date&Time/Model | Venue/Room OWASP Global Summit Portugal 2011 |
Date & Time
|
Discussion Model participants and attendees |
|
---|
WORKING SESSION OPERATIONAL RESOURCES | ||||||
---|---|---|---|---|---|---|
Projector, whiteboards, markers, Internet connectivity, power |
|
---|
WORKING SESSION ADDITIONAL DETAILS | ||||||
---|---|---|---|---|---|---|
WORKING SESSION OUTCOMES / DELIVERABLES | ||
---|---|---|
Proposed by Working Group | Approved by OWASP Board | |
A white paper detailing specific recommendations for Enterprise Web Security. |
After the Board Meeting - fill in here. | |
After the Board Meeting - fill in here. | ||
After the Board Meeting - fill in here. | ||
After the Board Meeting - fill in here. | ||
After the Board Meeting - fill in here. | ||
After the Board Meeting - fill in here. | ||
After the Board Meeting - fill in here. | ||
After the Board Meeting - fill in here. |
Working Session Participants
(Add you name by clicking "edit" on the tab on the upper left side of this page)
WORKING SESSION PARTICIPANTS | ||||||
---|---|---|---|---|---|---|
Name | Company | Notes & reason for participating, issues to be discussed/addressed | ||||
Eoin Keary @ |
Ernst & Young |
| ||||
Dinis Cruz @ |
| |||||
Chris Schmidt @ |
Aspect Security |
| ||||
Justin Clarke @ |
Gotham Digital Science |
| ||||
Matthias Rohr @ |
SEC Consult |
| ||||
Matteo Meucci @ |
| |||||
Mateo Martinez @ |
| |||||
Ofer Maor @ |
| |||||
Wojciech Dworakowski @ |
SecuRing |
| ||||
Tobias Gondrom @ |
IETF |
| ||||
|
| |||||
|
| |||||
|
| |||||
|
| |||||
|
| |||||
|
| |||||
|
| |||||
|
| |||||
|
| |||||
|
|