This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Template:OWASP IL 2011 Agenda"

From OWASP
Jump to: navigation, search
 
(40 intermediate revisions by 3 users not shown)
Line 1: Line 1:
{| class="wikitable"  
+
{| style="border-collapse: collapse; border-width: 1px; border-style: solid; border-color: #000" cellpadding=2
 +
|- style="border-style: solid; border-width: 1px;font-size:10pt"
 +
|style="border-style: solid; border-width: 1px;color:#1F497D;white-space:nowrap" width="90" height="40" align="center" valign="center" | 08:30-09:00
 +
| align=center valign="center" colspan=2 style="border-style: solid; border-width: 1px;font-size:12pt" | '''Registration, Gathering and Socializing'''
 
|- style="font-size:10pt"
 
|- style="font-size:10pt"
|style="color:#1F497D" width="90" height="30" align="center" valign="center" | 08:30-09:15
+
|style="border-style: solid; border-width: 1px;color:#1F497D" align="center" valign="center" | 09:00-09:30
| align=center valign="center" colspan=2 style="font-size:12pt" | '''Registration, Gathering and Socializing'''
+
| align=center valign="center" colspan="2" style="border-style: solid; border-width: 1px;font-size:11pt" | '''Opening Words''' ''([[Media:OWASPIL2011-OferMaor-OpeningWords.ppt|Presentation]])''<br>
 +
''Ofer Maor - Chairman, OWASP Israel; Global Membership Committee, OWASP''
 +
|- style="border-style: solid; border-width: 1px;font-size:10pt"
 +
|style="border-style: solid; border-width: 1px;color:#1F497D" height="25" align="center" valign="center" | 09:30-10:10
 +
| align=center valign="center" colspan="2" style="border-style: solid; border-width: 1px;font-size:11pt"| '''Keynote'''
 +
'''[[OWASP_Israel_2011_Presentations#Composite_Applications_Over_Hybrid_Clouds_.E2.80.93_Enterprise_Security_Challenges_of_the_IT_Supply_Chain|Composite Applications Over Hybrid Clouds – Enterprise Security Challenges of the IT Supply Chain]]'''
 +
<br>''Dr. Ethan Hadar, Senior Vice President Corporate Technical Strategy, CA''
 +
|- style="border-style: solid; border-width: 1px;font-size:12pt"
 +
|style="border-style: solid; border-width: 1px;color:#1F497D" height="30" align="right" valign="center" | &nbsp;
 +
|   style="border-style: solid; border-width: 1px;" valign="center" align="center" width=500 | <u>'''Track #1'''</u>
 +
|  style="border-style: solid; border-width: 1px;" valign="center" align="center" width=500 | <u>'''Track #2'''</u>
  
 +
|- style="border-style: solid; border-width: 1px;font-size:10pt"
 +
|style="border-style: solid; border-width: 1px;color:#1F497D" height="25" align="center" valign="center" | 10:15-11:00
 +
|  align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" | '''[[OWASP_Israel_2011_Presentations#Finding_Security_in_Misery_of_Others|Finding Security in Misery of Others]]'''  ''([[Media:OWASPIL2011-AmichaiShulman-FindingSecurityInMiseryOfOthers.pptx|Presentation]])''<br>
 +
''Amichai Shulman, CTO, Imperva''
 +
|  align="center" valign="top" style="font-size:11pt"  | '''[[OWASP_Israel_2011_Presentations#Temporal_Session_Race_Conditions|Temporal Session Race Conditions]]''' ''([[Media:OWASPIL2011-ShayChen-TSRC.pptx‎|Presentation]])''
 +
''Shay Chen, CTO, Hacktics Advanced Security Center, Ernst & Young''
 +
|- style="border-style: solid; border-width: 1px;font-size:10pt"
 +
|style="border-style: solid; border-width: 1px;color:#1F497D" height="40" align="center" valign="center" | 11:00-11:15
 +
|  valign="center" align="center" style="border-style: solid; border-width: 1px;font-size:12pt" colspan="2" | '''Coffee Break'''
 +
|- style="border-style: solid; border-width: 1px;font-size:10pt"
 +
|style="border-style: solid; border-width: 1px;color:#1F497D" height="25" align="center" valign="center" | 11:15-12:00
 +
|  align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5  | '''[[OWASP_Israel_2011_Presentations#Building_an_Effective_SDLC_Program_-_Case_Study|Building an Effective SDLC Program - Case Study]]''' ''([[Media:OWASPIL2011-Bejerano-Maor-BuildingSDLC.pptx|Presentation]])''
 +
''Guy Bejerano, CSO, Liveperson''<br>
 +
''Ofer Maor, CTO, Seeker Security''
 +
|  align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5  | '''[[OWASP_Israel_2011_Presentations#Space-Time_Tradeoffs_in_Software-Based_Deep_Packet_Inspection|Space-Time Tradeoffs in Software-Based Deep Packet Inspection]]''' ''([[Media:OWASPIL2011-YotamHarchol-SpaceTimeTradeoffDPI.pptx|Presentation]])''
 +
''Yotam Harchol, IDC''
 +
|- style="border-style: solid; border-width: 1px;font-size:10pt"
 +
|style="border-style: solid; border-width: 1px;color:#1F497D" height="25" align="center" valign="center" | 12:00-12:45
 +
|  align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5  | '''[[OWASP_Israel_2011_Presentations#All_Your_Mobile_Applications_Are_Belong_to_Us|All Your Mobile Applications Are Belong to Us]]''' ''([http://www.ikotler.org/AllYourMobileAppsAreBelongToUs_OWASP2011IL.pdf Presentation])''
 +
''Itzik Kotler, CTO, Security Art''
 +
|  align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5  | '''[[OWASP_Israel_2011_Presentations#Glass_Box_Testing_-_Think_Inside_the_Box|Glass Box Testing - Thinking Inside the Box]]''' ''([[Media:OWASPIL2011-OmriWeisman-GlassBoxTesting.ppt|Presentation]])''
 +
''Omri Weisman, Manager, Security Research Group, IBM''
 +
|- style="border-style: solid; border-width: 1px;font-size:10pt"
 +
|style="border-style: solid; border-width: 1px;color:#1F497D" height="40" align="center" valign="center" | 12:45-13:45
 +
|  valign="center" align="center" style="border-style: solid; border-width: 1px;font-size:12pt" colspan="2" | '''Lunch Break'''
 +
|- style="border-style: solid; border-width: 1px;font-size:10pt"
 +
|style="border-style: solid; border-width: 1px;color:#1F497D" height="25" align="center" valign="center" | 13:45-14:30
 +
|  align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5  | '''[[OWASP_Israel_2011_Presentations#CMS_and_Other_Giants_.E2.80.93_The_Nightmare_of_AppSec_Testing|CMS And Other Giants - The Nightmare of AppSec Testing]]''' ''([[Media:OWASPIL2011-IreneAbezgauz-CMSnOtherGiants.pptx|Presentation]])''
 +
''Irene Abezgauz, Product Manager, Seeker Security''
 +
|  align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5  | '''[[OWASP_Israel_2011_Presentations#Agile_.2B_SDL_.E2.80.93_Concepts_and_Misconceptions|Agile + SDL – Concepts and Misconceptions]]''' ''([[Media:OWASPIL2011-Douglen-Bregman-AgileSDL.ppt|Presentation]])''
 +
''Avi Douglen, Security Architect, Aware Security''<br>
 +
''Nir Bregman, Senior Project Manager, HP Software''
 +
|- style="border-style: solid; border-width: 1px;font-size:10pt"
 +
|style="border-style: solid; border-width: 1px;color:#1F497D" height="25" align="center" valign="center" | 14:30-15:15
 +
|  align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5  | '''[[OWASP_Israel_2011_Presentations#When_Crypto_Goes_Wrong|When Crypto Goes Wrong]]''' ''([[Media:OWASPIL2011-ErezMetula-WhenCryptoGoesWrong.pdf|Presentation]])''
 +
''Erez Metula, Founder, AppSec Labs''
 +
|  align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5  | '''[[OWASP_Israel_2011_Presentations#Advanced_Techniques_.26_Tools_for_Testing_Binary_Protocols|Advanced Techniques & Tools for Testing Binary Protocols]]''' ''([[Media:OWSPIL2011_Tamir_Tampering101.pdf|Presentation]])''
 +
''Chilik Tamir, Information Security Architect, AppSec Labs''
 +
|- style="border-style: solid; border-width: 1px;font-size:10pt"
 +
|style="border-style: solid; border-width: 1px;color:#1F497D" height="40" align="center" valign="center" | 15:15-15:30
 +
|  valign="center" align="center" style="border-style: solid; border-width: 1px;font-size:12pt" colspan="2" | '''Coffee Break'''
 +
|- style="border-style: solid; border-width: 1px;font-size:10pt"
 +
|style="border-style: solid; border-width: 1px;color:#1F497D" height="25" align="center" valign="center" | 15:30-16:15
 +
|  align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5  | '''[[OWASP_Israel_2011_Presentations#Security_Testing_of_RESTful_Services|Security Testing of RESTful Services]]''' ''([[Media:Security testing for REST applications.pdf|Presentation]])''
 +
''Ofer Shezaf, Head of AppSec Research, HP''<br>
 +
''Eyal Fingold, Senior Security Developer, HP''
 +
|  align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5  | '''[[OWASP_Israel_2011_Presentations#Hey.2C_What.E2.80.99s_your_App_doing_on_my_.28Smart.29Phone.3F|Hey, What’s your App doing on my (Smart)Phone?]]''' ''([[Media:OWASPIL2011_Zalalichin_Mobile_Security.pdf|Presentation]])''
 +
''Shay Zalalichin, CTO, Comsec Consulting''
 
|- style="font-size:10pt"
 
|- style="font-size:10pt"
|style="color:#1F497D" height="25" align="center" valign="center" | 09:15-09:30
+
|style="border-style: solid; border-width: 1px;color:#1F497D" align="center" valign="center" | 16:15-17:00
| align=center valign="center" colspan="2" style="font-size:11pt" | '''Opening Notes''' &nbsp;
+
| align=center valign="center" colspan="2" style="border-style: solid; border-width: 1px;font-size:11pt" | '''[[OWASP_Israel_2011_Presentations#The_Bank_Job_II|The Bank Job II]]''' ''([http://prezi.com/wipzu1bkfwnd/the-bank-job-ii-owasp-2011-final/ Presentation])''
''Ofer Maor - Chairman, OWASP Israel; Global Membership Committee, OWASP'' &nbsp;&nbsp;
+
''Adi Sharabani, Cross-Rational Security Strategy and Architecture, IBM''
|- style="font-size:11pt"
+
|- style="font-size:10pt"
|style="color:#1F497D" height="25" align="right" valign="center" | 09:30-10:10
+
|style="border-style: solid; border-width: 1px;color:#1F497D" align="center" valign="center" | 17:00-17:05
|  valign="center" colspan="2" | '''Keynote: Composite Applications Over Hybrid Clouds –Enterprise Security Challenges of the IT Supply Chain'''
+
| align=center valign="center" colspan="2" style="border-style: solid; border-width: 1px;font-size:11pt" | '''End Notes''' &nbsp;
''Dr. Ethan Hadar - Senior Vice President Corporate Technical Strategy, CA''
+
''Ofer Maor - Chairman, OWASP Israel; Global Membership Committee, OWASP''
|- style="font-size:11pt"
 
|style="color:#1F497D" height="25" align="right" valign="center" | 15:10-15:50
 
|  valign="center" colspan="2" | &nbsp;CSA Israel & The Challenges of Cloud Security &nbsp;&nbsp; ''Guy Alfassi'' &nbsp;&nbsp; ([[Media:OWASPIL2010-CSAIsraelCloudSec-GuyAlfassi.pdf‎|Download Presentation]])
 
 
 
|- style="font-size:11pt"
 
|style="color:#1F497D" height="25" align="right" valign="center" | 15:50-16:30
 
|  valign="center" colspan="2" | &nbsp;Beyond Negative Security: Signatures Are Not Always Enough &nbsp;&nbsp; ''Or Katz, Trustwave'' &nbsp;&nbsp; ([[Media:OWASPIL2010-BeyondNegativeSec-OrKatz.ppt|Download Presentation]])
 
 
|- style="font-size:11pt"
 
|style="color:#1F497D" height="50" align="right" valign="center" | 16:30-17:00
 
|  valign="center"  style="font-size:12pt" colspan="2" | &nbsp; '''Break'''
 
 
 
|- style="font-size:12pt"
 
|style="color:#1F497D" height="30" align="right" valign="center" | &nbsp;
 
width="291" valign="center" align="center" | '''Room #1'''
 
|  width="296" valign="center" align="center" | '''Room #2'''
 
 
 
|- style="font-size:11pt"
 
|style="color:#1F497D" height="25" align="center" valign="center" | 17:00-17:40
 
|  valign="center" | &nbsp;Practical Mod Security: Beyond the Core Rule Set &nbsp;&nbsp;  ''Josh Amishav-Zlatin, Pure Hacking'' &nbsp;&nbsp; ([[Media:OWASPIL2010-PracticalModSe-JoshAmishavZlatin.pdf|Download Presentation]])
 
|  valign="center" | &nbsp;PCI:DSS and the New PA:DSS Standards: Myths, Trends and Pragmatic Methods for Building Secure Software that Complies &nbsp;&nbsp; ''Shay Zalalichin, Comsec'' &nbsp;&nbsp; ([[Media:OWASPIL2010-PCIAppSec-ShayZalalichin.pdf‎|Download Presentation]])
 
 
 
|- style="font-size:11pt"
 
|style="color:#1F497D" height="25" align="center" valign="center" | 17:40-18:20
 
|  valign="center" | &nbsp;Accelerating Multi-Pattern Matching on Compressed HTTP Traffic &nbsp;&nbsp;  ''Yaron Koral, IDC'' &nbsp;&nbsp; ([[Media:OWASPIL2010-CompressedHTTPMatching-YaronKoral.pptx|Download Presentation]])
 
|  valign="center" | &nbsp;Real Life Application DoS Attacks &nbsp;&nbsp;  ''Ziv Gadot, Radware'' &nbsp;&nbsp; ([[Media:OWASPIL2010-RealLifeDoS-ZivGadot.ppt|Download Presentation]])
 
 
 
|- style="font-size:11pt"
 
|style="color:#1F497D" height="25" align="right" valign="center" | 18:20-19:00
 
|  valign="center" | &nbsp;Runtime Hardening &nbsp;&nbsp;  ''Erez Metula, AppSec'' &nbsp;&nbsp; ([[Media:OWASPIL2010-RuntimeHardening-ErezMetula.pdf|Download Presentation]])
 
|  valign="center" | &nbsp;Cloud Computing Security: Mapping Concepts to Practical Techniques &nbsp;&nbsp; ''Gilad Parann-Nissany, Porticor'' &nbsp;&nbsp; ([[Media:OWASPIL2010-PracticalCloudSec-GiladParannNissany.pptx‎|Download Presentation]])
 
 
 
|- style="font-size:11pt"
 
|style="color:#1F497D" height="25" align="right" valign="center" | 19:00-19:05
 
|  valign="center" colspan="2"| &nbsp;'''Closing Words''' &nbsp;&nbsp; ''Ofer Maor, Hacktics - OWASP Israel Chairman''
 
 
|}
 
|}

Latest revision as of 04:48, 26 September 2011

08:30-09:00 Registration, Gathering and Socializing
09:00-09:30 Opening Words (Presentation)

Ofer Maor - Chairman, OWASP Israel; Global Membership Committee, OWASP

09:30-10:10 Keynote

Composite Applications Over Hybrid Clouds – Enterprise Security Challenges of the IT Supply Chain
Dr. Ethan Hadar, Senior Vice President Corporate Technical Strategy, CA

  Track #1 Track #2
10:15-11:00 Finding Security in Misery of Others (Presentation)

Amichai Shulman, CTO, Imperva

Temporal Session Race Conditions (Presentation)

Shay Chen, CTO, Hacktics Advanced Security Center, Ernst & Young

11:00-11:15 Coffee Break
11:15-12:00 Building an Effective SDLC Program - Case Study (Presentation)

Guy Bejerano, CSO, Liveperson
Ofer Maor, CTO, Seeker Security

Space-Time Tradeoffs in Software-Based Deep Packet Inspection (Presentation)

Yotam Harchol, IDC

12:00-12:45 All Your Mobile Applications Are Belong to Us (Presentation)

Itzik Kotler, CTO, Security Art

Glass Box Testing - Thinking Inside the Box (Presentation)

Omri Weisman, Manager, Security Research Group, IBM

12:45-13:45 Lunch Break
13:45-14:30 CMS And Other Giants - The Nightmare of AppSec Testing (Presentation)

Irene Abezgauz, Product Manager, Seeker Security

Agile + SDL – Concepts and Misconceptions (Presentation)

Avi Douglen, Security Architect, Aware Security
Nir Bregman, Senior Project Manager, HP Software

14:30-15:15 When Crypto Goes Wrong (Presentation)

Erez Metula, Founder, AppSec Labs

Advanced Techniques & Tools for Testing Binary Protocols (Presentation)

Chilik Tamir, Information Security Architect, AppSec Labs

15:15-15:30 Coffee Break
15:30-16:15 Security Testing of RESTful Services (Presentation)

Ofer Shezaf, Head of AppSec Research, HP
Eyal Fingold, Senior Security Developer, HP

Hey, What’s your App doing on my (Smart)Phone? (Presentation)

Shay Zalalichin, CTO, Comsec Consulting

16:15-17:00 The Bank Job II (Presentation)

Adi Sharabani, Cross-Rational Security Strategy and Architecture, IBM

17:00-17:05 End Notes  

Ofer Maor - Chairman, OWASP Israel; Global Membership Committee, OWASP