This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Template:OWASP IL 2011 Agenda"

From OWASP
Jump to: navigation, search
Line 1: Line 1:
{| class="wikitable" <hiddentext>generated with [[:de:Wikipedia:Helferlein/VBA-Macro for EXCEL tableconversion]] V1.7<\hiddentext>
+
{| class="wikitable"  
 
|- style="font-size:10pt"
 
|- style="font-size:10pt"
|style="color:#1F497D" width="100" height="30" align="right" valign="center" | 08:00-09:15
+
|style="color:#1F497D" width="90" height="30" align="center" valign="center" | 08:30-09:15
| valign="center" colspan=2 style="font-size:12pt" | &nbsp; '''Registration, Gathering and Socializing'''
+
| valign="center" colspan=2 style="font-size:12pt" | '''Registration, Gathering and Socializing'''
 
 
|- style="font-size:11pt"
 
|style="color:#1F497D" height="25" align="right" valign="center" | 14:15-14:30
 
|  valign="center" colspan="2" | &nbsp;'''Opening Words''' &nbsp;&nbsp; ''Ofer Maor, Hacktics - OWASP Israel Chairman'' &nbsp;&nbsp; ([[Media:OWASPIL2010-OpeningWords-OferMaor.ppt‎|Download Presentation]])
 
  
 +
|- style="font-size:10pt"
 +
|style="color:#1F497D" height="25" align="center" valign="center" | 09:15-09:30
 +
|  valign="center" colspan="2" style="font-size:11pt" | '''Opening Notes''' &nbsp;
 +
''Ofer Maor - Chairman, OWASP Israel; Global Membership Committee, OWASP'' &nbsp;&nbsp;
 
|- style="font-size:11pt"
 
|- style="font-size:11pt"
|style="color:#1F497D" height="25" align="right" valign="center" | 14:30-15:10
+
|style="color:#1F497D" height="25" align="right" valign="center" | 09:30-10:10
|  valign="center" colspan="2" | &nbsp;Hacker Intelligence: 6 Months of Attack Vector Research &nbsp;&nbsp; ''Tal Be'ery, Imperva'' &nbsp;&nbsp; ([[Media:OWASPIL2010-HackerIntelligence-TalBeery.pptx|Download Presentation]])
+
|  valign="center" colspan="2" | '''Keynote: Composite Applications Over Hybrid Clouds –Enterprise Security Challenges of the IT Supply Chain'''
 
+
''Dr. Ethan Hadar - Senior Vice President Corporate Technical Strategy, CA''
 
|- style="font-size:11pt"
 
|- style="font-size:11pt"
 
|style="color:#1F497D" height="25" align="right" valign="center" | 15:10-15:50
 
|style="color:#1F497D" height="25" align="right" valign="center" | 15:10-15:50
Line 30: Line 30:
  
 
|- style="font-size:11pt"
 
|- style="font-size:11pt"
|style="color:#1F497D" height="25" align="right" valign="center" | 17:00-17:40
+
|style="color:#1F497D" height="25" align="center" valign="center" | 17:00-17:40
 
|  valign="center" | &nbsp;Practical Mod Security: Beyond the Core Rule Set &nbsp;&nbsp;  ''Josh Amishav-Zlatin, Pure Hacking'' &nbsp;&nbsp; ([[Media:OWASPIL2010-PracticalModSe-JoshAmishavZlatin.pdf|Download Presentation]])
 
|  valign="center" | &nbsp;Practical Mod Security: Beyond the Core Rule Set &nbsp;&nbsp;  ''Josh Amishav-Zlatin, Pure Hacking'' &nbsp;&nbsp; ([[Media:OWASPIL2010-PracticalModSe-JoshAmishavZlatin.pdf|Download Presentation]])
 
|  valign="center" | &nbsp;PCI:DSS and the New PA:DSS Standards: Myths, Trends and Pragmatic Methods for Building Secure Software that Complies &nbsp;&nbsp; ''Shay Zalalichin, Comsec'' &nbsp;&nbsp; ([[Media:OWASPIL2010-PCIAppSec-ShayZalalichin.pdf‎|Download Presentation]])
 
|  valign="center" | &nbsp;PCI:DSS and the New PA:DSS Standards: Myths, Trends and Pragmatic Methods for Building Secure Software that Complies &nbsp;&nbsp; ''Shay Zalalichin, Comsec'' &nbsp;&nbsp; ([[Media:OWASPIL2010-PCIAppSec-ShayZalalichin.pdf‎|Download Presentation]])
  
 
|- style="font-size:11pt"
 
|- style="font-size:11pt"
|style="color:#1F497D" height="25" align="right" valign="center" | 17:40-18:20
+
|style="color:#1F497D" height="25" align="center" valign="center" | 17:40-18:20
 
|  valign="center" | &nbsp;Accelerating Multi-Pattern Matching on Compressed HTTP Traffic &nbsp;&nbsp;  ''Yaron Koral, IDC'' &nbsp;&nbsp; ([[Media:OWASPIL2010-CompressedHTTPMatching-YaronKoral.pptx|Download Presentation]])
 
|  valign="center" | &nbsp;Accelerating Multi-Pattern Matching on Compressed HTTP Traffic &nbsp;&nbsp;  ''Yaron Koral, IDC'' &nbsp;&nbsp; ([[Media:OWASPIL2010-CompressedHTTPMatching-YaronKoral.pptx|Download Presentation]])
 
|  valign="center" | &nbsp;Real Life Application DoS Attacks &nbsp;&nbsp;  ''Ziv Gadot, Radware'' &nbsp;&nbsp; ([[Media:OWASPIL2010-RealLifeDoS-ZivGadot.ppt|Download Presentation]])
 
|  valign="center" | &nbsp;Real Life Application DoS Attacks &nbsp;&nbsp;  ''Ziv Gadot, Radware'' &nbsp;&nbsp; ([[Media:OWASPIL2010-RealLifeDoS-ZivGadot.ppt|Download Presentation]])

Revision as of 19:59, 16 August 2011

08:30-09:15 Registration, Gathering and Socializing
09:15-09:30 Opening Notes  

Ofer Maor - Chairman, OWASP Israel; Global Membership Committee, OWASP   

09:30-10:10 Keynote: Composite Applications Over Hybrid Clouds –Enterprise Security Challenges of the IT Supply Chain

Dr. Ethan Hadar - Senior Vice President Corporate Technical Strategy, CA

15:10-15:50  CSA Israel & The Challenges of Cloud Security    Guy Alfassi    (Download Presentation)
15:50-16:30  Beyond Negative Security: Signatures Are Not Always Enough    Or Katz, Trustwave    (Download Presentation)
16:30-17:00   Break
  Room #1 Room #2
17:00-17:40  Practical Mod Security: Beyond the Core Rule Set    Josh Amishav-Zlatin, Pure Hacking    (Download Presentation)  PCI:DSS and the New PA:DSS Standards: Myths, Trends and Pragmatic Methods for Building Secure Software that Complies    Shay Zalalichin, Comsec    (Download Presentation)
17:40-18:20  Accelerating Multi-Pattern Matching on Compressed HTTP Traffic    Yaron Koral, IDC    (Download Presentation)  Real Life Application DoS Attacks    Ziv Gadot, Radware    (Download Presentation)
18:20-19:00  Runtime Hardening    Erez Metula, AppSec    (Download Presentation)  Cloud Computing Security: Mapping Concepts to Practical Techniques    Gilad Parann-Nissany, Porticor    (Download Presentation)
19:00-19:05  Closing Words    Ofer Maor, Hacktics - OWASP Israel Chairman