This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Template:OWASP IL 2011 Agenda"
From OWASP
Line 1: | Line 1: | ||
{| style="border-collapse: collapse; border-width: 1px; border-style: solid; border-color: #000" cellpadding=5 | {| style="border-collapse: collapse; border-width: 1px; border-style: solid; border-color: #000" cellpadding=5 | ||
|- style="border-style: solid; border-width: 1px;font-size:10pt" | |- style="border-style: solid; border-width: 1px;font-size:10pt" | ||
− | |style="border-style: solid; border-width: 1px;color:#1F497D" width="90" height="40" align="center" valign="center" | 08:30-09:15 | + | |style="border-style: solid; border-width: 1px;color:#1F497D;white-space:nowrap" width="90" height="40" align="center" valign="center" | 08:30-09:15 |
| align=center valign="center" colspan=2 style="border-style: solid; border-width: 1px;font-size:12pt" | '''Registration, Gathering and Socializing''' | | align=center valign="center" colspan=2 style="border-style: solid; border-width: 1px;font-size:12pt" | '''Registration, Gathering and Socializing''' | ||
|- style="font-size:10pt" | |- style="font-size:10pt" |
Revision as of 21:07, 16 August 2011
08:30-09:15 | Registration, Gathering and Socializing | |
09:15-09:30 | Opening Words
Ofer Maor - Chairman, OWASP Israel; Global Membership Committee, OWASP | |
09:30-10:10 | Keynote
Composite Applications Over Hybrid Clouds –Enterprise Security Challenges of the IT Supply Chain Dr. Ethan Hadar - Senior Vice President Corporate Technical Strategy, CA | |
Track #1 | Track #2 | |
10:15-11:00 | Finding Security in Misery of Others
Amichai Shulman - CTO, Imperva |
Temporal Race Conditions
Shay Chen - CTO, Hacktics Advanced Security Center, Ernst & Young |
11:00-11:15 | Coffee Break | |
11:15-12:00 | Building an Effective SDLC Program - Case Study
Guy Bejerano - CSO, Liveperson Ofer Maor - CTO, Seeker Security |
Space-Time Tradeoffs in Software-Based Deep Packet Inspection
Yotam Harchol, IDC |
12:00-12:45 | All Your Mobile Applications Are Belong to Us
Itzik Kotler - CTO, Security Art |
Glass Box Testing - Thinking Inside the Box
Omri Weisman - Manager, Security Research Group, IBM
|