|
|
| (33 intermediate revisions by 2 users not shown) |
| Line 1: |
Line 1: |
| − | <font size="2" face="Verdana">
| + | == Global AppSec Events == |
| − | <table border="2" cellspacing="0">
| + | {| class="wikitable" |
| − | <tr valign="middle">
| + | |- |
| − | <td height="60" colspan="5" align="center" bgcolor="#333399"><font size="5"><b>Day 1 - Nov 12th 2009</b>
| + | ! Global AppSec Events |
| − | <tr valign="bottom">
| + | ! Date |
| − | <td height="40" bgcolor="#666699" width="67" valign="middle">
| + | ! Location |
| − | <td height="40" align="center" bgcolor="#ff0000" valign="middle" width="200"><b>OWASP</b>
| + | ! GCC Rep |
| − | <td height="40" align="center" bgcolor="#808000" valign="middle" width="200"><b>Tools</b>
| + | ! OWASP Introduction/Keynote |
| − | <td height="40" align="center" bgcolor="#ccffcc" valign="middle" width="200"><b>SDLC</b>
| + | |- |
| − | <td height="40" align="center" bgcolor="#ff6600" valign="middle" width="200"><b>Web 2.0</b>
| + | | [http://www.owasp.org/index.php/AppSecEU2011 Global AppSec Europe ] |
| − | <tr valign="bottom">
| + | | June 6, 2011 - June 10, 2011 |
| − | <td bgcolor="#666699" width="67" valign="middle">07:30-09:00
| + | | Dublin, Ireland |
| − | <td colspan="4" align="center" bgcolor="#909090" valign="middle">Registration
| + | | Ralph Durkee |
| − | <tr valign="bottom">
| + | | Entire Board |
| − | <td bgcolor="#666699" width="67" valign="middle">08:45-09:00
| + | |- |
| − | <td height="30" colspan="4" align="center" bgcolor="#e0e0e0" valign="middle">Welcome and Opening Remarks
| + | | [http://www.appsecusa.org/ Global AppSec North America] |
| − | <tr valign="bottom">
| + | | Sept. 20, 2011 - Sept. 23, 2011 |
| − | <td bgcolor="#666699" width="67" valign="middle">09:00-10:00
| + | | Minneapolis, MN, USA |
| − | <td height="60" colspan="4" align="center" bgcolor="#e0e0e0" valign="middle">Keynote: Joe Jarzombek
| + | | Neil Matatall |
| − | <tr valign="bottom">
| + | | Entire Board |
| − | <td bgcolor="#666699" width="67" valign="middle">10:30-10:30
| + | |- |
| − | <td height="30" colspan="4" align="center" bgcolor="#909090" valign="middle">Coffee Break & Room Change
| + | | [http://www.owasp.org/index.php/AppSec_Brasil_2010 Global AppSec Latin America] |
| − | <tr valign="bottom">
| + | | Oct. 11, 2011 - Oct. 14, 2011 |
| − | <td bgcolor="#666699" width="67" valign="middle">10:30-11:30
| + | | Porto Alegre, Brazil |
| − | <td height="120" align="center" bgcolor="#ff0000" width="200" valign="middle" width="200">[[OWASP ESAPI AppSecDC|OWASP ESAPI]]<br>Jeff Williams
| + | | TBD |
| − | <td height="120" align="center" bgcolor="#808000" width="200" valign="middle" width="200">[[Manipulating Web Application Interfaces, a new approach to input validation]]<br>Felipe Moreno-Strauch
| + | | Brennan |
| − | <td height="120" align="center" bgcolor="#ccffcc" width="200" valign="middle" width="200">[[Development Issues Within AJAX Applications: How to Divert Threats]]<br>Lars Ewe
| + | |- |
| − | <td height="120" align="center" bgcolor="#ff6600" width="200" valign="middle" width="200">[[Understanding the Implications of Cloud Computing on Application Security]]<br>Dennis Hurst
| + | | [http://www.owasp.org/index.php/China_AppSec_2011 Global AppSec Asia 2011] |
| − | <tr valign="bottom">
| + | | Nov. 3, 2011 - Nov. 5, 2011 |
| − | <td height="120" bgcolor="#666699" width="67" valign="middle">11:30-12:30
| + | | Wuhan, Hubei, China |
| − | <td height="120" align="center" bgcolor="#ff0000" width="200" valign="middle" width="200">[[Software Assurance Maturity Model (SAMM)]]<br>Pravir Chandra
| + | | TBD |
| − | <td height="120" align="center" bgcolor="#808000" width="200" valign="middle" width="200">[[The Case of Promiscuous Parameters and Other Ongoing Capers in Web Security]]<br>Jacob West
| + | | TBD |
| − | <td height="120" align="center" bgcolor="#ccffcc" width="200" valign="middle" width="200">[[Enterprise Application Security - GE's approach to solving root cause and establishing a Center of Excellence]]<br>Darren Challey
| + | |} |
| − | <td height="120" align="center" bgcolor="#ff6600" width="200" valign="middle" width="200">[[Transparent Proxy Abuse]]<br>Robert Auger
| + | |
| − | <tr valign="bottom">
| + | == Regional and Local Events == |
| − | <td height="120" bgcolor="#666699" width="67" valign="middle">12:30-13:30
| + | {| class="wikitable" |
| − | <td height="120" align="center" bgcolor="#ff0000" width="200" valign="middle" width="200">[[DISA's Application Security and Development STIG: How OWASP Can Help You]]<br>Jason Li
| + | |- |
| − | <td height="120" align="center" bgcolor="#808000" width="200" valign="middle" width="200">[[OWASP ModSecurity Core Rule Set Project]]<br>Ryan C. Barnett
| + | ! Event |
| − | <td height="120" align="center" bgcolor="#ccffcc" width="200" valign="middle" width="200">[[The essential role of infosec in secure software development]]<br>Kenneth R. van Wyk
| + | ! Type |
| − | <td height="120" align="center" bgcolor="#ff6600" width="200" valign="middle" width="200">[[Fracturing Flex For Fun- An Alliterative Attackers Approach]]<br>Jon Rose/Kevin Stadmeyer
| + | ! Date |
| − | <tr valign="bottom">
| + | ! Location |
| − | <td height="60" bgcolor="#666699" width="67" valign="middle">13:30-14:30
| + | ! GCC Rep |
| − | <td height="60" colspan="4" align="center" bgcolor="#909090" valign="middle">Lunch
| + | ! OWASP Introduction/Keynote |
| − | <tr valign="bottom">
| + | |- |
| − | <td height="120" bgcolor="#666699" width="67" valign="middle">14:30-15:30
| + | | [http://www.owasp.org/index.php/Category:OWASP_AppSec_Conference OWASP Israel 2011 ] |
| − | <td height="60" align="center" bgcolor="#ff0000" width="200" valign="middle" width="200">[[ Defend Yourself: Integrating Real Time Defenses into Online Applications]]<br>Michael Coates
| + | | Regional Event |
| − | <td height="60" align="center" bgcolor="#808000" width="200" valign="middle" width="200">[[Finding the Hotspots: Web-security testing with the Watcher tool]]<br>Chris Weber
| + | | Sept. 13, 2011 - Sept. 14, 2011 |
| − | <td height="120" rowspan="3" align="center" bgcolor="#ccffcc" width="200" valign="middle" width="200">[[SDLC Pannel AppSecDC | SDLC Panel]]
| + | | Israel |
| − | <td height="120" align="center" bgcolor="#ff6600" width="200" valign="middle" width="200">[[Social Zombies: Your Friends Want to Eat Your Brains]]<br>Tom Eston/Kevin Johnson
| + | | TBD |
| − | <tr valign="bottom">
| + | | TBD |
| − | <td height="120" rowspan="2" bgcolor="#666699" width="67" valign="middle">15:30-16:30
| + | |- |
| − | <td height="120" rowspan="2" align="center" bgcolor="#ff0000" width="200" valign="middle" width="200">[[The ESAPI Web Application Firewall]]<br>Arshan Dabirsiaghi
| + | | [http://www.lascon.org/ LASCON] |
| − | <td height="60" align="center" bgcolor="#808000" width="200" valign="middle" width="200">[[One Click Ownage]]<br>Ferruh Mavituna
| + | | Regional Event |
| − | <td height="120" rowspan="2" align="center" bgcolor="#ff6600" width="200" valign="middle" width="200">[[Cloudy with a chance of 0-day]]<br>Jon Rose/Tom Leavey
| + | | Oct. 28, 2011 - Oct. 28, 2011 |
| − | <tr valign="bottom">
| + | | Austin, TX, USA |
| − | <td height="60" align="center" bgcolor="#808000" width="200" valign="middle" width="200">[[Web Application Security Scanner Evaluation Criteria]]<br>Brian Shura
| + | | TBD |
| − | <tr valign="bottom">
| + | | TBD |
| − | <td height="120" rowspan="2" bgcolor="#666699" width="67" valign="middle">16:30-17:30
| + | |} |
| − | <td height="120" rowspan="2" align="center" bgcolor="#ff0000" width="200" valign="middle" width="200">[[OWASP Live CD: An open environment for Web Application Security]]<br>Matt Tesauro / Brad Causey
| + | == Partner and Promotional Events == |
| − | <td height="60" align="center" bgcolor="#808000" width="200" valign="middle" width="200">[[Learning by Breaking: A New Project Insecure Web Apps]]<br>Chuck Willis
| + | Want to get your event listed here? Be sure to work with the [[Global Conferences Committee]] |
| − | <td height="120" rowspan="2" align="center" bgcolor="#ccffcc" width="200" valign="middle" width="200">[[Vulnerability Management in an Application Security World]]<br>Dan Cornell
| + | |
| − | <td height="120" rowspan="2" align="center" bgcolor="#ff6600" width="200" valign="middle" width="200">[[Attacking WCF Web Services]]<br>Brian Holyfield
| + | {| class="wikitable" |
| − | <tr valign="bottom">
| + | |- |
| − | <td height="60" align="center" bgcolor="#808000" width="200" valign="middle" width="200">[[Synergy! - A world where the tools communicate]]<br>
| + | ! Event |
| − | Josh Abraham
| + | ! Date |
| − | <tr valign="bottom">
| + | ! Location |
| − | <td height="120" rowspan="2" bgcolor="#666699" width="67" valign="middle">17:30-18:30
| + | ! OWASP Participation |
| − | <td height="120" rowspan="2" align="center" bgcolor="#ff0000" width="200" valign="middle" width="200">[[The Entrepreneur's Guide to Career Management]]<br>Lee Kushner
| + | |- |
| − | <td height="60" align="center" bgcolor="#808000" width="200" valign="middle" width="200">[[Advanced SSL: The good, the bad, and the ugly]]<br>Michael Coats
| + | | [http://www.securitybsides.com/w/page/33728032/BSidesAustin2011 BSides Austin 2011] |
| − | <td height="120" rowspan="2" align="center" bgcolor="#ccffcc" width="200" valign="middle" width="200">[[Threat Modeling]]<br>John Steven
| + | | March 11, 2011 - March 11, 2011 |
| − | <td height="120" rowspan="2" align="center" bgcolor="#ff6600" width="200" valign="middle" width="200">[[When Web 2.0 Attacks - Understanding Security Implications of AJAX, Flash and "Highly Interactive" Technologies]]<br>Rafal Los
| + | | Austin, TX, USA |
| − | <tr valign="bottom">
| + | | |
| − | <td height="60" align="center" bgcolor="#808000" width="200" valign="middle" width="200">[[User input piercing for Cross Site Scripting Attacks]]<br>Matias Blanco
| + | |- |
| − | <tr valign="bottom">
| + | | [http://uberconf.com/conference/denver/2011/07/home UberConf] |
| − | <td height="60" bgcolor="#666699" width="67" valign="middle">19:00-????
| + | | July 12, 2011 - July 15, 2011 |
| − | <td height="60" colspan="4" align="center" bgcolor="#c0c0c0" valign="middle">Reception
| + | | Denver, CO, USA |
| − | <tr valign="middle">
| + | | |
| − | <td height="60" colspan="5">
| + | |- |
| − | <tr valign="middle">
| + | | [http://2011.brucon.org/ BrucCON] |
| − | <td height="60" colspan="5" align="center" bgcolor="#333399"><font size="5"><b>Day 2 - Nov 13th 2009</b>
| + | | Sept. 19, 2011 - Sept. 22, 2011 |
| − | <tr valign="bottom">
| + | | Brussels |
| − | <td height="40" bgcolor="#666699" width="67" valign="middle">
| + | | |
| − | <td height="40" align="center" bgcolor="#ff0000" valign="middle" width="200"><b>Attack & Defend</b>
| + | |} |
| − | <td height="40" align="center" bgcolor="#808000" valign="middle" width="200"><b>Process</b>
| |
| − | <td height="40" align="center" bgcolor="#ccffcc" valign="middle" width="200"><b>Metrics</b>
| |
| − | <td height="40" align="center" bgcolor="#ff6600" valign="middle" width="200"><b>Compliance</b>
| |
| − | <tr valign="bottom">
| |
| − | <td bgcolor="#666699" width="67" valign="middle">07:30-09:00
| |
| − | <td colspan="4" align="center" bgcolor="#909090" valign="middle">Registration
| |
| − | <tr valign="bottom">
| |
| − | <td bgcolor="#666699" width="67" valign="middle">09:00-10:00
| |
| − | <td height="60" colspan="4" align="center" bgcolor="#e0e0e0" valign="middle">Keynote: TBA
| |
| − | <tr valign="bottom">
| |
| − | <td bgcolor="#666699" width="67" valign="middle">10:30-10:30
| |
| − | <td height="30" colspan="4" align="center" bgcolor="#909090" valign="middle">Coffee Break & Room Change
| |
| − | <tr valign="bottom">
| |
| − | <td bgcolor="#666699" width="67" valign="middle">10:30-11:30
| |
| − | <td height="120" align="center" bgcolor="#ff0000" width="200" valign="middle" width="200">[[Securing the Core JEE Patterns]]<br>Rohit Sethi/Krishna Raja
| |
| − | <td height="120" align="center" bgcolor="#808000" width="200" valign="middle" width="200">[[The Big Picture: Web Risks and Assessments Beyond Scanning]]<br>Matt Fisher
| |
| − | <td height="120" align="center" bgcolor="#ccffcc" width="200" valign="middle" width="200">[[The Web Hacking Incidents Database]]<br>Ryan C. Barnett
| |
| − | <td height="120" align="center" bgcolor="#ff6600" width="200" valign="middle" width="200">[[Business Logic Automatons: Friend or Foe?]]<br>Ofer Shezaf
| |
| − | <tr valign="bottom">
| |
| − | <td height="120" bgcolor="#666699" width="67" valign="middle">11:30-12:30
| |
| − | <td height="120" align="center" bgcolor="#ff0000" width="200" valign="middle" width="200">[[Unicode Transformations: Finding Elusive Vulnerabilities]]<br>Chris Weber
| |
| − | <td height="120" align="center" bgcolor="#808000" width="200" valign="middle" width="200">[[Scalable Application Assessments in the Enterprise]]<br>Tom Parker/Lars Ewe
| |
| − | <td height="120" align="center" bgcolor="#ccffcc" width="200" valign="middle" width="200">[[Application security metrics from the organization on down to the vulnerabilities]]<br>Chris Wysopal
| |
| − | <td height="120" align="center" bgcolor="#ff6600" width="200" valign="middle" width="200">[[SCAP: Automating our way out of the Vulnerability Wheel of Pain ]]<br>Ed Bellis
| |
| − | <tr valign="bottom">
| |
| − | <td height="120" bgcolor="#666699" width="67" valign="middle">12:30-13:30
| |
| − | <td height="120" align="center" bgcolor="#ff0000" width="200" valign="middle" width="200">[[Fox in the Henhouse: Java Rootkits]]<br>Jeff Williams
| |
| − | <td height="120" align="center" bgcolor="#808000" width="200" valign="middle" width="200">[[Secure Software Updates: Update Like Conficker]]<br>Jeremy Allen
| |
| − | <td height="120" align="center" bgcolor="#ccffcc" width="200" valign="middle" width="200">[[OWASP Top 10 2009]]<br>Dave Wichers
| |
| − | <td height="120" align="center" bgcolor="#ff6600" width="200" valign="middle" width="200">[[Secure SDLC: The Good, The Bad, and The Ugly]]<br>Joey Peloquin
| |
| − | <tr valign="bottom">
| |
| − | <td height="60" bgcolor="#666699" width="67" valign="middle">13:30-14:30
| |
| − | <td height="60" colspan="4" align="center" bgcolor="#909090" valign="middle">Lunch
| |
| − | <tr valign="bottom">
| |
| − | <td height="120" bgcolor="#666699" width="67" valign="middle">14:30-15:30
| |
| − | <td height="120" align="center" bgcolor="#ff0000" width="200" valign="middle" width="200">[[TBA]]<br>Robert Hansen
| |
| − | <td height="120" align="center" bgcolor="#808000" width="200" valign="middle" width="200">[[Improving application security after an incident]]<br>Cory Scott
| |
| − | <td height="120" align="center" bgcolor="#ccffcc" width="200" valign="middle" width="200">[[Hacking by Numbers]]<br>Tom Brennan
| |
| − | <td height="120" rowspan="2" align="center" bgcolor="#ff6600" width="200" valign="middle" width="200">[[Federal CIO Pannel]]
| |
| − | <tr valign="bottom">
| |
| − | <td height="120" bgcolor="#666699" width="67" valign="middle">15:30-16:30
| |
| − | <td height="120" align="center" bgcolor="#ff0000" width="200" valign="middle" width="200">[[Automated vs. Manual Security: You can't filter The Stupid]]<br>David Byrne/Charles Henderson
| |
| − | <td height="120" align="center" bgcolor="#808000" width="200" valign="middle" width="200">[[Custom Intrusion Detection Techniques for Monitoring Web Applications]]<br>Matthew Olney
| |
| − | <td height="120" align="center" bgcolor="#ccffcc" width="200" valign="middle" width="200">[[Building an in-house application security assessment team]]<br>Keith Turpin
| |
| − | <tr valign="bottom">
| |
| − | <td height="120" bgcolor="#666699" width="67" valign="middle">16:30-17:30
| |
| − | <td height="120" align="center" bgcolor="#ff0000" width="200" valign="middle" width="200">[[Advanced SQL Injection]]<br>Joe McCray
| |
| − | <td height="120" align="center" bgcolor="#808000" width="200" valign="middle" width="200">[[Is your organization secured against internal threats?]]<br>Lars Ewe
| |
| − | <td height="120" align="center" bgcolor="#ccffcc" width="200" valign="middle" width="200">[[The OWASP Security Spending Benchmarks Project]]<br>Dr. Boaz Gelbord
| |
| − | <td height="120" align="center" bgcolor="#ff6600" width="200" valign="middle" width="200">[[Promoting Application Security within Federal Government]]<br>Sarbari Gupta
| |
| − | <tr valign="bottom">
| |
| − | <td height="120" rowspan="2" bgcolor="#666699" width="67" valign="middle">17:30-18:30
| |
| − | <td height="60" align="center" bgcolor="#ff0000" width="200" valign="middle" width="200">[[Clubbing WebApps with a Botnet ]]<br>Gunter Ollmann
| |
| − | <td height="120" rowspan="2" align="center" bgcolor="#808000" width="200" valign="middle" width="200">[[Deploying Secure Web Applications with OWASP Resources]]<br>Kuai Hinojosa
| |
| − | <td height="120" rowspan="2" align="center" bgcolor="#ccffcc" width="200" valign="middle" width="200">[[SANS Dshield Webhoneypot Project]]<br>Jason Lamn
| |
| − | <td height="120" rowspan="2" align="center" bgcolor="#ff6600" width="200" valign="middle" width="200">[[Techniques in Attacking and Defending XML/Web Services]]<br>Mamoon Yunus/Jason Macy
| |
| − | <tr valign="bottom">
| |
| − | <td height="60" align="center" bgcolor="#ff0000" width="200" valign="middle" width="200">[[Injectable Exploits: Two New Tools for Pwning Web Apps and Browsers]]<br>Kevin Johnson, Justin Searle, Frank DiMaggio
| |
| − | <tr valign="bottom">
| |
| − | <td height="60" bgcolor="#666699" width="67" valign="middle">18:30-19:00
| |
| − | <td height="60" colspan="4" align="center" bgcolor="#c0c0c0" valign="middle">Closing Remarks
| |
| − | </font>
| |