This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Template:OWASP IL 2011 Agenda"
From OWASP
Line 1: | Line 1: | ||
− | {| | + | {| style="border-collapse: collapse; border-width: 1px; border-style: solid; border-color: #000" cellpadding=5 |
+ | |- style="border-style: solid; border-width: 1px;font-size:10pt" | ||
+ | |style="border-style: solid; border-width: 1px;color:#1F497D" width="90" height="40" align="center" valign="center" | 08:30-09:15 | ||
+ | | align=center valign="center" colspan=2 style="border-style: solid; border-width: 1px;font-size:12pt" | '''Registration, Gathering and Socializing''' | ||
|- style="font-size:10pt" | |- style="font-size:10pt" | ||
− | |style=" | + | |style="border-style: solid; border-width: 1px;color:#1F497D" height="25" align="center" valign="center" | 09:15-09:30 |
− | + | | align=center valign="center" colspan="2" style="border-style: solid; border-width: 1px;font-size:11pt" | '''Opening Words''' | |
− | |||
− | |||
− | |||
− | | align=center valign="center" colspan="2" style="font-size:11pt" | '''Opening Words''' | ||
''Ofer Maor - Chairman, OWASP Israel; Global Membership Committee, OWASP'' | ''Ofer Maor - Chairman, OWASP Israel; Global Membership Committee, OWASP'' | ||
− | |- style="font-size:10pt" | + | |- style="border-style: solid; border-width: 1px;font-size:10pt" |
− | |style="color:#1F497D" height="25" align="center" valign="center" | 09:30-10:10 | + | |style="border-style: solid; border-width: 1px;color:#1F497D" height="25" align="center" valign="center" | 09:30-10:10 |
− | | align=center valign="center" colspan="2" style="font-size:11pt"| '''Keynote''' | + | | align=center valign="center" colspan="2" style="border-style: solid; border-width: 1px;font-size:11pt"| '''Keynote''' |
'''[[OWASP_Israel_2011_Presentations#Composite_Applications_Over_Hybrid_Clouds_.E2.80.93_Enterprise_Security_Challenges_of_the_IT_Supply_Chain|Composite Applications Over Hybrid Clouds –Enterprise Security Challenges of the IT Supply Chain]]''' | '''[[OWASP_Israel_2011_Presentations#Composite_Applications_Over_Hybrid_Clouds_.E2.80.93_Enterprise_Security_Challenges_of_the_IT_Supply_Chain|Composite Applications Over Hybrid Clouds –Enterprise Security Challenges of the IT Supply Chain]]''' | ||
''Dr. Ethan Hadar - Senior Vice President Corporate Technical Strategy, CA'' | ''Dr. Ethan Hadar - Senior Vice President Corporate Technical Strategy, CA'' | ||
− | |- style="font-size:12pt" | + | |- style="border-style: solid; border-width: 1px;font-size:12pt" |
− | |style="color:#1F497D" height="30" align="right" valign="center" | | + | |style="border-style: solid; border-width: 1px;color:#1F497D" height="30" align="right" valign="center" | |
− | | valign="center" align="center" | <u>'''Track #1'''</u> | + | | style="border-style: solid; border-width: 1px;" valign="center" align="center" | <u>'''Track #1'''</u> |
− | | valign="center" align="center" | <u>'''Track #2'''</u> | + | | style="border-style: solid; border-width: 1px;" valign="center" align="center" | <u>'''Track #2'''</u> |
− | |- style="font-size:10pt" | + | |- style="border-style: solid; border-width: 1px;font-size:10pt" |
− | |style="color:#1F497D" height="25" align="center" valign="center" | 10:15-11:00 | + | |style="border-style: solid; border-width: 1px;color:#1F497D" height="25" align="center" valign="center" | 10:15-11:00 |
− | | align="center" valign="top" style="font-size:11pt" | '''[[OWASP_Israel_2011_Presentations#Finding_Security_in_Misery_of_Others|Finding Security in Misery of Others]]''' | + | | align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" | '''[[OWASP_Israel_2011_Presentations#Finding_Security_in_Misery_of_Others|Finding Security in Misery of Others]]''' |
''Amichai Shulman - CTO, Imperva'' | ''Amichai Shulman - CTO, Imperva'' | ||
| align="center" valign="top" style="font-size:11pt" | '''[[OWASP_Israel_2011_Presentations#Temporal_Session_Race_Conditions|Temporal Race Conditions]]''' | | align="center" valign="top" style="font-size:11pt" | '''[[OWASP_Israel_2011_Presentations#Temporal_Session_Race_Conditions|Temporal Race Conditions]]''' | ||
''Shay Chen - CTO, Hacktics Advanced Security Center, Ernst & Young'' | ''Shay Chen - CTO, Hacktics Advanced Security Center, Ernst & Young'' | ||
− | |- style="font-size:10pt" | + | |- style="border-style: solid; border-width: 1px;font-size:10pt" |
− | |style="color:#1F497D" height=" | + | |style="border-style: solid; border-width: 1px;color:#1F497D" height="40" align="center" valign="center" | 11:00-11:15 |
− | | valign="center" align="center" style="font-size:12pt" colspan="2" | | + | | valign="center" align="center" style="border-style: solid; border-width: 1px;font-size:12pt" colspan="2" | '''Coffee Break''' |
− | |- style="font-size:10pt" | + | |- style="border-style: solid; border-width: 1px;font-size:10pt" |
− | |style="color:#1F497D" height="25" align="center" valign="center" | | + | |style="border-style: solid; border-width: 1px;color:#1F497D" height="25" align="center" valign="center" | 11:15-12:00 |
− | | align="center" valign="top" style="font-size:11pt" | '''[[OWASP_Israel_2011_Presentations#Building_an_Effective_SDLC_Program_-_Case_Study|Building an Effective SDLC Program - Case Study]]''' | + | | align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5 | '''[[OWASP_Israel_2011_Presentations#Building_an_Effective_SDLC_Program_-_Case_Study|Building an Effective SDLC Program - Case Study]]''' |
''Guy Bejerano - CSO, Liveperson'' | ''Guy Bejerano - CSO, Liveperson'' | ||
''Ofer Maor - CTO, Seeker Security'' | ''Ofer Maor - CTO, Seeker Security'' | ||
− | | align="center" valign="top" style="font-size:11pt | + | | align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5 | '''[[OWASP_Israel_2011_Presentations#Space-Time_Tradeoffs_in_Software-Based_Deep_Packet_Inspection|Space-Time Tradeoffs in Software-Based Deep Packet Inspection]]''' |
''Yotam Harchol, IDC'' | ''Yotam Harchol, IDC'' | ||
+ | |- style="border-style: solid; border-width: 1px;font-size:10pt" | ||
+ | |style="border-style: solid; border-width: 1px;color:#1F497D" height="25" align="center" valign="center" | 12:00-12:45 | ||
+ | | align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5 | '''[OWASP_Israel_2011_Presentations#All_Your_Mobile_Applications_Are_Belong_to_Us|All Your Mobile Applications Are Belong to Us]]''' | ||
+ | ''Itzik Kotler - CTO, Security Art'' | ||
+ | | align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5 | '''[[OWASP_Israel_2011_Presentations#Glass_Box_Testing_-_Think_Inside_the_Box|Glass Box Testing - Thinking Inside the Box]]''' | ||
+ | ''Omri Weisman - Manager, Security Research Group, IBM'' | ||
|} | |} |
Revision as of 21:06, 16 August 2011
08:30-09:15 | Registration, Gathering and Socializing | |
09:15-09:30 | Opening Words
Ofer Maor - Chairman, OWASP Israel; Global Membership Committee, OWASP | |
09:30-10:10 | Keynote
Composite Applications Over Hybrid Clouds –Enterprise Security Challenges of the IT Supply Chain Dr. Ethan Hadar - Senior Vice President Corporate Technical Strategy, CA | |
Track #1 | Track #2 | |
10:15-11:00 | Finding Security in Misery of Others
Amichai Shulman - CTO, Imperva |
Temporal Race Conditions
Shay Chen - CTO, Hacktics Advanced Security Center, Ernst & Young |
11:00-11:15 | Coffee Break | |
11:15-12:00 | Building an Effective SDLC Program - Case Study
Guy Bejerano - CSO, Liveperson Ofer Maor - CTO, Seeker Security |
Space-Time Tradeoffs in Software-Based Deep Packet Inspection
Yotam Harchol, IDC |
12:00-12:45 | [OWASP_Israel_2011_Presentations#All_Your_Mobile_Applications_Are_Belong_to_Us|All Your Mobile Applications Are Belong to Us]]
Itzik Kotler - CTO, Security Art |
Glass Box Testing - Thinking Inside the Box
Omri Weisman - Manager, Security Research Group, IBM
|