This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Mrb Scratchpad"

From OWASP
Jump to: navigation, search
(Back to Conference Page)
 
(24 intermediate revisions by 2 users not shown)
Line 1: Line 1:
__NOTOC__
+
== Global AppSec Events ==
 +
{| class="wikitable"
 +
|-
 +
! Global AppSec Events
 +
! Date
 +
! Location
 +
! GCC Rep
 +
! OWASP Introduction/Keynote
 +
|-
 +
| [http://www.owasp.org/index.php/AppSecEU2011 Global AppSec Europe ]
 +
| June 6, 2011 - June 10, 2011
 +
| Dublin, Ireland
 +
| Ralph Durkee
 +
| Entire Board
 +
|-
 +
| [http://www.appsecusa.org/ Global AppSec North America]
 +
| Sept. 20, 2011 - Sept. 23, 2011
 +
| Minneapolis, MN, USA
 +
| Neil Matatall
 +
| Entire Board
 +
|-
 +
| [http://www.owasp.org/index.php/AppSec_Brasil_2010 Global AppSec Latin America]
 +
| Oct. 11, 2011 - Oct. 14, 2011
 +
| Porto Alegre, Brazil
 +
| TBD
 +
| Brennan
 +
|-
 +
| [http://www.owasp.org/index.php/China_AppSec_2011 Global AppSec Asia 2011]
 +
| Nov. 3, 2011 - Nov. 5, 2011
 +
| Wuhan, Hubei, China
 +
| TBD
 +
| TBD
 +
|}
  
===[[OWASP AppSec DC 2009|Back to Conference Page]]===
+
== Regional and Local Events ==
Please note, speaking times are not final, check back regularly for updates.
+
{| class="wikitable"
====Training 11/10====  
+
|-
{| cellspacing="0" border="2"
+
! Event
|- valign="middle"
+
! Type
| height="60" align="center" colspan="6" style="background: rgb(64, 88, 160) none repeat scroll 0% 0%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous; color: white;" | <font size="5">'''Day 1 - Nov 10th 2009'''</font>
+
! Date
|- valign="bottom"
+
! Location
| width="67" valign="middle" height="40" bgcolor="#7b8abd" | &nbsp;
+
! GCC Rep
| width="150" valign="middle" height="40" bgcolor="#c0a0a0" align="center" | '''Room 154A'''
+
! OWASP Introduction/Keynote
| width="150" valign="middle" height="40" bgcolor="#ffdf80" align="center" | '''Room 149B'''
+
|-
| width="150" valign="middle" height="40" bgcolor="#a0c0e0" align="center" | '''Room 149A'''
+
| [http://www.owasp.org/index.php/Category:OWASP_AppSec_Conference OWASP Israel 2011 ]
| width="150" valign="middle" height="40" bgcolor="#b3ff99" align="center" | '''Room 154B'''
+
| Regional Event
| width="150" valign="middle" height="40" bgcolor="#BCA57A" align="center" | '''Room 155'''
+
| Sept. 13, 2011 - Sept. 14, 2011
|- valign="bottom"
+
| Israel
| width="67" valign="middle" bgcolor="#7b8abd" | 09:00-12:00
+
| TBD
| width="150" valign="middle" height="120" bgcolor="#c0a0a0" align="center" | Day 1:<br>Assessing and Exploiting Web Applications with the open source Samurai Web Testing Framework<br> Justin Searle
+
| TBD
| width="150" valign="middle" height="120" bgcolor="#ffdf80" align="center" | Day 1:<br>Java EE Secure Code Review<br>Sahba Kazerooni<br>[http://www.securitycompass.com Security Compass]
+
|-
| width="150" valign="middle" height="120" bgcolor="#a0c0e0" align="center" | Threat Modeling Express<br>Krishna Raja<br>[http://www.securitycompass.com Security Compass]
+
| [http://www.lascon.org/ LASCON]
| width="150" valign="middle" height="120" bgcolor="#b3ff99" align="center" | Foundations of Web Services and XML Security<br>Dave Wichers<br>[http://www.aspectsecurity.com Aspect Security]
+
| Regional Event
| width="150" valign="middle" height="120" bgcolor="#BCA57A" align="center" | Live CD<br>Matt Tesauro
+
| Oct. 28, 2011 - Oct. 28, 2011
|- valign="bottom"
+
| Austin, TX, USA
| width="67" valign="middle" height="40" bgcolor="#7b8abd" | 12:00-13:00
+
| TBD
| valign="middle" height="40" bgcolor="#909090" align="center" colspan="5" | Lunch
+
| TBD
|- valign="bottom"
 
| width="67" valign="middle" bgcolor="#7b8abd" | 13:00-17:00
 
| width="150" valign="middle" height="120" bgcolor="#c0a0a0" align="center" | Assessing and Exploiting Web Applications with the open source Samurai Web Testing Framework<br> Justin Searle
 
| width="150" valign="middle" height="120" bgcolor="#ffdf80" align="center" | Java EE Secure Code Review<br>Sahba Kazerooni<br>[http://www.securitycompass.com Security Compass]
 
| width="150" valign="middle" height="120" bgcolor="#a0c0e0" align="center" | Threat Modeling Express<br>Krishna Raja<br>[http://www.securitycompass.com Security Compass]
 
| width="150" valign="middle" height="120" bgcolor="#b3ff99" align="center" | Foundations of Web Services and XML Security<br>Dave Wichers<br>[http://www.aspectsecurity.com Aspect Security]
 
| width="150" valign="middle" height="120" bgcolor="#BCA57A" align="center" | Live CD<br>Matt Tesauro <!-- Day 2 -->
 
 
|}
 
|}
====Training 11/11====  
+
== Partner and Promotional Events ==
{| cellspacing="0" border="2"
+
Want to get your event listed here? Be sure to work with the [[Global Conferences Committee]]
|- valign="middle"
+
 
| height="60" align="center" colspan="6" style="background: rgb(64, 88, 160) none repeat scroll 0% 0%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous; color: white;" | <font size="5">'''Day 2 - Nov 11th 2009'''</font>
+
{| class="wikitable"
|- valign="bottom"
+
|-
| width="67" valign="middle" height="40" bgcolor="#7b8abd" | &nbsp;
+
! Event
| width="150" valign="middle" height="40" bgcolor="#c0a0a0" align="center" | '''Room 154A'''
+
! Date
| width="150" valign="middle" height="40" bgcolor="#ffdf80" align="center" | '''Room 149B'''
+
! Location
| width="150" valign="middle" height="40" bgcolor="#a0c0e0" align="center" | '''Room 149A'''
+
! OWASP Participation
| width="150" valign="middle" height="40" bgcolor="#b3ff99" align="center" | '''Room 154B'''
+
|-
|- valign="bottom"
+
| [http://www.securitybsides.com/w/page/33728032/BSidesAustin2011 BSides Austin 2011]
| width="67" valign="middle" bgcolor="#7b8abd" | 09:00-12:00
+
| March 11, 2011 - March 11, 2011
| width="150" valign="middle" height="120" bgcolor="#c0a0a0" align="center" | Day 2:<br>Assessing and Exploiting Web Applications with the open source Samurai Web Testing Framework<br> Justin Searle
+
| Austin, TX, USA
| width="150" valign="middle" height="120" bgcolor="#ffdf80" align="center" | Day 2:<br>Java EE Secure Code Review<br>Sahba Kazerooni<br>[http://www.securitycompass.com Security Compass]
+
|  
| width="150" valign="middle" height="120" bgcolor="#a0c0e0" align="center" | WebAppSec.php: Developing Secure Web Applications<br>Robert Zakon
+
|-
| width="150" valign="middle" height="120" bgcolor="#b3ff99" align="center" | Leader and Manager Training - Leading the Development of Secure Applications<br>John Pavone<br>[http://www.aspectsecurity.com Aspect Security]
+
| [http://uberconf.com/conference/denver/2011/07/home UberConf]
|- valign="bottom"
+
| July 12, 2011 - July 15, 2011
| width="67" valign="middle" height="40" bgcolor="#7b8abd" | 12:00-13:00
+
| Denver, CO, USA
| valign="middle" height="40" bgcolor="#909090" align="center" colspan="4" | Lunch
+
|  
|- valign="bottom"
+
|-
| width="67" valign="middle" bgcolor="#7b8abd" | 13:00-17:00
+
| [http://2011.brucon.org/ BrucCON]
| width="150" valign="middle" height="120" bgcolor="#c0a0a0" align="center" | Assessing and Exploiting Web Applications with the open source Samurai Web Testing Framework<br> Justin Searle
+
| Sept. 19, 2011 - Sept. 22, 2011
| width="150" valign="middle" height="120" bgcolor="#ffdf80" align="center" | Java EE Secure Code Review<br>Sahba Kazerooni<br>[http://www.securitycompass.com Security Compass]
+
| Brussels
| width="150" valign="middle" height="120" bgcolor="#a0c0e0" align="center" | WebAppSec.php: Developing Secure Web Applications<br>Robert Zakon
+
|  
| width="150" valign="middle" height="120" bgcolor="#b3ff99" align="center" | Leader and Manager Training - Leading the Development of Secure Applications<br>John Pavone<br>[http://www.aspectsecurity.com Aspect Security]<!-- Day 2 -->
 
|}
 
====Talks 11/12====
 
{| cellspacing="0" border="2"
 
|- valign="middle"
 
| height="60" align="center" colspan="5" style="background: rgb(64, 88, 160) none repeat scroll 0% 0%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous; color: white;" | <font size="5">'''Day 1 - Nov 12th 2009'''</font>
 
|- valign="bottom"
 
| width="67" valign="middle" height="40" bgcolor="#7b8abd" | &nbsp;
 
| width="200" valign="middle" height="40" bgcolor="#c0a0a0" align="center" | '''OWASP (146C)'''
 
| width="200" valign="middle" height="40" bgcolor="#ffdf80" align="center" | '''Tools (146B)'''
 
| width="200" valign="middle" height="40" bgcolor="#a0c0e0" align="center" | '''SDLC (146A)'''
 
| width="200" valign="middle" height="40" bgcolor="#b3ff99" align="center" | '''Web 2.0 (152A)'''
 
|- valign="bottom"
 
| width="67" valign="middle" bgcolor="#7b8abd" | 07:30-08:50
 
| valign="middle" bgcolor="#909090" align="center" colspan="4" | Registration
 
|- valign="bottom"
 
| width="67" valign="middle" bgcolor="#7b8abd" | 08:50-09:00
 
| valign="middle" height="30" bgcolor="#e0e0e0" align="center" colspan="4" | Welcome and Opening Remarks
 
|- valign="bottom"
 
| width="67" valign="middle" bgcolor="#7b8abd" | 09:00-10:00
 
| valign="middle" height="60" bgcolor="#e0e0e0" align="center" colspan="4" | Keynote: [[AppSecDC Keynote Jarzomnek|Joe Jarzombek]]
 
|- valign="bottom"
 
| width="67" valign="middle" bgcolor="#7b8abd" | 10:00-10:30
 
| valign="middle" height="60" bgcolor="#e0e0e0" align="center" colspan="4" | All about OWASP (The OWASP Board)
 
|- valign="bottom"
 
| width="67" valign="middle" bgcolor="#7b8abd" | 10:30-10:45
 
| valign="middle" height="30" bgcolor="#909090" align="center" colspan="4" | Coffee Break sponsored by [[Image:AppSecDC2009-Sponsor-denim.gif|link=http://www.denimgroup.com/]]
 
|- valign="bottom"
 
| width="67" valign="middle" bgcolor="#7b8abd" | 10:45-11:30
 
| width="200" valign="middle" height="120" bgcolor="#c0a0a0" align="center" | [[OWASP ESAPI AppSecDC|OWASP ESAPI]]<br>Jeff Williams
 
| width="200" valign="middle" height="120" bgcolor="#ffdf80" align="center" | [[Clubbing WebApps with a Botnet]]<br>Gunter Ollmann
 
| width="200" valign="middle" height="120" bgcolor="#a0c0e0" align="center" | [[Enterprise Application Security - GE's approach to solving root cause and establishing a Center of Excellence|Enterprise Application Security - GE's approach to solving root cause]]<br>Darren Challey
 
| width="200" valign="middle" height="120" bgcolor="#b3ff99" align="center" | [[Understanding the Implications of Cloud Computing on Application Security]]<br>Dennis Hurst
 
|- valign="bottom"
 
| width="67" valign="middle" height="40" bgcolor="#7b8abd" | 11:30-12:30
 
| valign="middle" height="40" bgcolor="#e0e0e0" align="center" colspan="4" | Hosted Lunch
 
|- valign="bottom"
 
| width="67" valign="middle" height="120" bgcolor="#7b8abd" rowspan="2"| 12:30-1:20
 
| width="200" valign="middle" height="120" bgcolor="#c0a0a0" align="center" | [[Software Assurance Maturity Model (SAMM)]]<br>Pravir Chandra
 
| width="200" valign="middle" height="120" bgcolor="#ffdf80" align="center" | [[The Case of Promiscuous Parameters and Other Ongoing Capers in Web Security]]<br>Jacob West
 
| width="200" valign="middle" height="120" bgcolor="#a0c0e0" align="center" | [[Software Development The Next Security Frontier]]<br>Jim Molini
 
| width="200" valign="middle" height="120" bgcolor="#b3ff99" align="center" | [[Transparent Proxy Abuse]]<br>Robert Auger
 
|- valign="bottom"
 
| valign="middle" height="5" bgcolor="#e0e0e0" align="center" colspan="4" | Break (5 Min)
 
|- valign="bottom"
 
| width="67" valign="middle" height="120" bgcolor="#7b8abd" rowspan="2"| 1:20-2:10
 
| width="200" valign="middle" height="120" bgcolor="#c0a0a0" align="center" | [[DISA's Application Security and Development STIG: How OWASP Can Help You]]<br>Jason Li
 
| width="200" valign="middle" height="120" bgcolor="#ffdf80" align="center" | [[OWASP ModSecurity Core Rule Set Project]]<br>Ryan C. Barnett
 
| width="200" valign="middle" height="120" bgcolor="#a0c0e0" align="center" | [[The essential role of infosec in secure software development]]<br>Kenneth R. van Wyk
 
| width="200" valign="middle" height="120" bgcolor="#b3ff99" align="center" | [[Development Issues Within AJAX Applications: How to Divert Threats]]<br>Lars Ewe
 
|- valign="bottom"
 
| valign="middle" height="5" bgcolor="#e0e0e0" align="center" colspan="4" | Break (5 Min)
 
|- valign="bottom"
 
| width="67" valign="middle" height="120" bgcolor="#7b8abd" rowspan="2"| 2:10-3:00
 
| width="200" valign="middle" height="60" bgcolor="#c0a0a0" align="center" | [[Defend Yourself: Integrating Real Time Defenses into Online Applications]]<br>Michael Coates
 
| width="200" valign="middle" height="60" bgcolor="#ffdf80" align="center" | [[Finding the Hotspots: Web-security testing with the Watcher tool]]<br>Chris Weber
 
| width="200" valign="middle" height="120" bgcolor="#a0c0e0" align="center" rowspan="4" | [[SDLC Panel AppSecDC|SDLC Panel]]<br>&nbsp;<br>Pravir Chandra<br>Dan Cornell<br>Michael Craigue<br>Dennis Hurst<br>Joey Peloquin<br>David Rook<br>Keith Turpin
 
| width="200" valign="middle" height="120" bgcolor="#b3ff99" align="center" | [[Social Zombies: Your Friends Want to Eat Your Brains]]<br>Tom Eston/Kevin Johnson
 
|- valign="bottom"
 
| valign="middle" height="5" bgcolor="#e0e0e0" align="center" colspan="2" | Break (5 Min)
 
| valign="middle" height="5" bgcolor="#e0e0e0" align="center" | Break (5 Min)
 
|- valign="bottom"
 
| width="67" valign="middle" height="120" bgcolor="#7b8abd" rowspan="3" | 3:00-3:50
 
| width="200" valign="middle" height="120" bgcolor="#c0a0a0" align="center" rowspan="2" | [[The ESAPI Web Application Firewall (ESAPI WAF)|The ESAPI Web Application Firewall]]<br>Arshan Dabirsiaghi
 
| width="200" valign="middle" height="60" bgcolor="#ffdf80" align="center" | [[One Click Ownage]]<br>Ferruh Mavituna
 
| width="200" valign="middle" height="120" bgcolor="#b3ff99" align="center" rowspan="2" | [[Cloudy with a chance of 0-day]]<br>Jon Rose/Tom Leavey
 
|- valign="bottom"
 
| width="200" valign="middle" height="60" bgcolor="#ffdf80" align="center" | [[Web Application Security Scanner Evaluation Criteria]]<br>Brian Shura
 
|- valign="bottom"
 
| valign="middle" height="5" bgcolor="#e0e0e0" align="center" colspan="4" | Break (5 Min)
 
|- valign="bottom"
 
| width="67" valign="middle" height="120" bgcolor="#7b8abd" rowspan="3" | 3:50-4:40
 
| width="200" valign="middle" height="120" bgcolor="#c0a0a0" align="center" rowspan="2" | [[OWASP Live CD: An open environment for Web Application Security]]<br>Matt Tesauro / Brad Causey
 
| width="200" valign="middle" height="60" bgcolor="#ffdf80" align="center" | [[Learning by Breaking: A New Project Insecure Web Apps]]<br>Chuck Willis
 
| width="200" valign="middle" height="120" bgcolor="#a0c0e0" align="center" rowspan="2" | [[Vulnerability Management in an Application Security World]]<br>Dan Cornell
 
| width="200" valign="middle" height="120" bgcolor="#b3ff99" align="center" rowspan="2" | [[Attacking WCF Web Services]]<br>Brian Holyfield
 
|- valign="bottom"
 
| width="200" valign="middle" height="60" bgcolor="#ffdf80" align="center" | [[Synergy! A world where the tools communicate]]<br>
 
Josh Abraham
 
|- valign="bottom"
 
| valign="middle" height="5" bgcolor="#e0e0e0" align="center" colspan="4" | Break (5 Min)
 
|- valign="bottom"
 
| width="67" valign="middle" height="120" bgcolor="#7b8abd" rowspan="2" | 4:40-5:30
 
| width="200" valign="middle" height="120" bgcolor="#c0a0a0" align="center" rowspan="2" | [[The Entrepreneur's Guide to Career Management]]<br>Lee Kushner
 
| width="200" valign="middle" height="60" bgcolor="#ffdf80" align="center" | [[Advanced SSL: The good, the bad, and the ugly]]<br>Michael Coates
 
| width="200" valign="middle" height="120" bgcolor="#a0c0e0" align="center" rowspan="2" | [[Threat Modeling by John Steven|Threat Modeling]]<br>John Steven
 
| width="200" valign="middle" height="120" bgcolor="#b3ff99" align="center" rowspan="2" | [[When Web 2.0 Attacks - Understanding Security Implications of AJAX, Flash and |When Web 2.0 Attacks - Understanding Security Implications of AJAX, Flash and "Highly Interactive" Technologies]]<br>Rafal Los
 
|- valign="bottom"
 
| width="200" valign="middle" height="60" bgcolor="#ffdf80" align="center" | [[User input piercing for Cross Site Scripting Attacks]]<br>Matias Blanco
 
|- valign="bottom"
 
| width="67" valign="middle" height="60" bgcolor="#7b8abd" | 5:45-8:00
 
| valign="middle" height="60" bgcolor="#c0c0c0" align="center" colspan="4" | Cocktails and hors d'oeuvres in the EXPO Room (151)<br>Sponsored by [[Image:AppSecDC2009-Sponsor-cenzic.gif|link=http://www.cenzic.com/]]<!-- Day 2 -->
 
|}
 
====Talks 11/13====
 
{| cellspacing="0" border="2"
 
|- valign="middle"
 
| height="60" align="center" colspan="5" style="background: rgb(64, 88, 160) none repeat scroll 0% 0%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous; color: white;" | <font size="5">'''Day 2 - Nov 13th 2009'''</font>
 
|- valign="bottom"
 
| width="67" valign="middle" height="40" bgcolor="#7b8abd" | &nbsp;
 
| width="200" valign="middle" height="40" bgcolor="#c0a0a0" align="center" | '''Attack &amp; Defend (146C)'''
 
| width="200" valign="middle" height="40" bgcolor="#ffdf80" align="center" | '''Process (146B)'''
 
| width="200" valign="middle" height="40" bgcolor="#a0c0e0" align="center" | '''Metrics (146A)'''
 
| width="200" valign="middle" height="40" bgcolor="#b3ff99" align="center" | '''Compliance (152A)'''
 
|- valign="bottom"
 
| width="67" valign="middle" bgcolor="#7b8abd" | 8:00-9:00
 
| valign="middle" bgcolor="#909090" align="center" colspan="4" | Registration & Coffee sponsored by [[Image:AppSecDC2009-Sponsor-fyrm.gif|link=http://www.fyrmassociates.com/]]
 
|- valign="bottom"
 
| width="67" valign="middle" bgcolor="#7b8abd" rowspan="2"| 9:00-9:50
 
| width="200" valign="middle" height="120" bgcolor="#c0a0a0" align="center" | [[Securing the Core JEE Patterns]]<br>Rohit Sethi/Krishna Raja
 
| width="200" valign="middle" height="120" bgcolor="#ffdf80" align="center" | [[The Big Picture: Web Risks and Assessments Beyond Scanning]]<br>Matt Fisher
 
| width="200" valign="middle" height="120" bgcolor="#a0c0e0" align="center" | [[The Web Hacking Incidents Database]]<br>Ryan C. Barnett
 
| width="200" valign="middle" height="120" bgcolor="#b3ff99" align="center" | [[Business Logic Automatons: Friend or Foe?]]<br>Ofer Shezaf
 
|- valign="bottom"
 
| valign="middle" height="5" bgcolor="#e0e0e0" align="center" colspan="4" | Break (5 Min)
 
|- valign="bottom"
 
| width="67" valign="middle" height="120" bgcolor="#7b8abd" rowspan="2"| 9:50-10:40
 
| width="200" valign="middle" height="120" bgcolor="#c0a0a0" align="center" | [[Unicode Transformations: Finding Elusive Vulnerabilities]]<br>Chris Weber
 
| width="200" valign="middle" height="120" bgcolor="#ffdf80" align="center" | [[Scalable Application Assessments in the Enterprise]]<br>Tom Parker/Lars Ewe
 
| width="200" valign="middle" height="120" bgcolor="#a0c0e0" align="center" | [[Application security metrics from the organization on down to the vulnerabilities]]<br>Chris Wysopal
 
| width="200" valign="middle" height="120" bgcolor="#b3ff99" align="center" | [[SCAP: Automating our way out of the Vulnerability Wheel of Pain]]<br>Ed Bellis
 
|- valign="bottom"
 
| valign="middle" height="5" bgcolor="#e0e0e0" align="center" colspan="4" | Break (5 Min)
 
|- valign="bottom"
 
| width="67" valign="middle" height="120" bgcolor="#7b8abd" | 10:40-11:30
 
| width="200" valign="middle" height="120" bgcolor="#c0a0a0" align="center" | [[Malicious Developers and Enterprise Java Rootkits]]<br>Jeff Williams
 
| width="200" valign="middle" height="120" bgcolor="#ffdf80" align="center" | [[Secure Software Updates: Update Like Conficker]]<br>Jeremy Allen
 
| width="200" valign="middle" height="120" bgcolor="#a0c0e0" align="center" | [[OWASP Top 10 2010 AppSecDC|OWASP Top 10 - 2010]]<br>Dave Wichers
 
| width="200" valign="middle" height="120" bgcolor="#b3ff99" align="center" | [[Secure SDLC: The Good, The Bad, and The Ugly]]<br>Joey Peloquin
 
|- valign="bottom"
 
| width="67" valign="middle" height="40" bgcolor="#7b8abd" | 11:30-12:30
 
| valign="middle" height="40" bgcolor="#909090" align="center" colspan="4" | Hosted Lunch
 
|- valign="bottom"
 
| width="67" valign="middle" height="120" bgcolor="#7b8abd" rowspan="2"| 12:30-1:20
 
| width="200" valign="middle" height="120" bgcolor="#c0a0a0" align="center" | [[The 10 least-likely and most dangerous people on the Internet]]<br>Robert Hansen
 
| width="200" valign="middle" height="120" bgcolor="#ffdf80" align="center" | [[Improving application security after an incident]]<br>Cory Scott
 
| width="200" valign="middle" height="120" bgcolor="#a0c0e0" align="center" | [[Hacking by Numbers]]<br>Tom Brennan
 
| width="200" valign="middle" height="120" bgcolor="#b3ff99" align="center" rowspan="3" | [[AppSecDC09 Federal CISO Panel|Federal CISO Panel]]
 
|- valign="bottom"
 
| valign="middle" height="5" bgcolor="#e0e0e0" align="center" colspan="3" | Break (5 Min)
 
|- valign="bottom"
 
| width="67" valign="middle" height="120" bgcolor="#7b8abd" rowspan="2"| 1:20-2:10
 
| width="200" valign="middle" height="120" bgcolor="#c0a0a0" align="center" | [[Automated vs. Manual Security: You can't filter The Stupid]]<br>David Byrne/Charles Henderson
 
| width="200" valign="middle" height="120" bgcolor="#ffdf80" align="center" | [[Custom Intrusion Detection Techniques for Monitoring Web Applications]]<br>Matthew Olney
 
| width="200" valign="middle" height="120" bgcolor="#a0c0e0" align="center" | [[Building an in-house application security assessment team]]<br>Keith Turpin
 
|- valign="bottom"
 
| valign="middle" height="5" bgcolor="#e0e0e0" align="center" colspan="4" | Break (5 Min)
 
|- valign="bottom"
 
| width="67" valign="middle" height="120" bgcolor="#7b8abd" rowspan="2"| 2:10-3:00
 
| width="200" valign="middle" height="120" bgcolor="#c0a0a0" align="center" | TBD
 
| width="200" valign="middle" height="120" bgcolor="#ffdf80" align="center" | TBD
 
| width="200" valign="middle" height="120" bgcolor="#a0c0e0" align="center" | [[The OWASP Security Spending Benchmarks Project]]<br>Dr. Boaz Gelbord
 
| width="200" valign="middle" height="120" bgcolor="#b3ff99" align="center" | [[Promoting Application Security within Federal Government]]<br>Sarbari Gupta
 
|- valign="bottom"
 
| valign="middle" height="5" bgcolor="#e0e0e0" align="center" colspan="4" | Break (5 Min)
 
|- valign="bottom"
 
| width="67" valign="middle" height="120" bgcolor="#7b8abd" rowspan="3" | 3:00-3:50
 
| width="200" valign="middle" height="60" bgcolor="#c0a0a0" align="center" | [[Manipulating Web Application Interfaces, a new approach to input validation]]<br>Felipe Moreno-Strauch
 
| width="200" valign="middle" height="120" bgcolor="#ffdf80" align="center" rowspan="2" | [[Deploying Secure Web Applications with OWASP Resources]]<br>Kuai Hinojosa
 
| width="200" valign="middle" height="120" bgcolor="#a0c0e0" align="center" rowspan="2" | [[SANS Dshield Webhoneypot Project]]<br>Jason Lam
 
| width="200" valign="middle" height="120" bgcolor="#b3ff99" align="center" rowspan="2" | [[Techniques in Attacking and Defending XML/Web Services]]<br>Mamoon Yunus/Jason Macy
 
|- valign="bottom"
 
| width="200" valign="middle" height="60" bgcolor="#c0a0a0" align="center" | [[Injectable Exploits: Two New Tools for Pwning Web Apps and Browsers]]<br>Kevin Johnson, Justin Searle, Frank DiMaggio
 
|- valign="bottom"
 
| valign="middle" height="5" bgcolor="#e0e0e0" align="center" colspan="4" | Break (5 Min)
 
|- valign="bottom"
 
| width="67" valign="middle" height="60" bgcolor="#7b8abd" | 3:50-4:00
 
| valign="middle" height="60" bgcolor="#c0c0c0" align="center" colspan="4" | Closing Remarks (146C) <br> Mark Bristow, Rex Booth, Doug Wilson
 
 
|}
 
|}
<headertabs />
 
 
===[[OWASP AppSec DC 2009|Back to Conference Page]]===
 
 
[[Category:OWASP_AppSec_Conference]] [[Category:OWASP_AppSec_DC_09]]
 

Latest revision as of 02:53, 3 March 2011

Global AppSec Events

Global AppSec Events Date Location GCC Rep OWASP Introduction/Keynote
Global AppSec Europe June 6, 2011 - June 10, 2011 Dublin, Ireland Ralph Durkee Entire Board
Global AppSec North America Sept. 20, 2011 - Sept. 23, 2011 Minneapolis, MN, USA Neil Matatall Entire Board
Global AppSec Latin America Oct. 11, 2011 - Oct. 14, 2011 Porto Alegre, Brazil TBD Brennan
Global AppSec Asia 2011 Nov. 3, 2011 - Nov. 5, 2011 Wuhan, Hubei, China TBD TBD

Regional and Local Events

Event Type Date Location GCC Rep OWASP Introduction/Keynote
OWASP Israel 2011 Regional Event Sept. 13, 2011 - Sept. 14, 2011 Israel TBD TBD
LASCON Regional Event Oct. 28, 2011 - Oct. 28, 2011 Austin, TX, USA TBD TBD

Partner and Promotional Events

Want to get your event listed here? Be sure to work with the Global Conferences Committee

Event Date Location OWASP Participation
BSides Austin 2011 March 11, 2011 - March 11, 2011 Austin, TX, USA
UberConf July 12, 2011 - July 15, 2011 Denver, CO, USA
BrucCON Sept. 19, 2011 - Sept. 22, 2011 Brussels