This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Template:OWASP IL 2011 Agenda"
(35 intermediate revisions by 3 users not shown) | |||
Line 1: | Line 1: | ||
− | {| | + | {| style="border-collapse: collapse; border-width: 1px; border-style: solid; border-color: #000" cellpadding=2 |
+ | |- style="border-style: solid; border-width: 1px;font-size:10pt" | ||
+ | |style="border-style: solid; border-width: 1px;color:#1F497D;white-space:nowrap" width="90" height="40" align="center" valign="center" | 08:30-09:00 | ||
+ | | align=center valign="center" colspan=2 style="border-style: solid; border-width: 1px;font-size:12pt" | '''Registration, Gathering and Socializing''' | ||
|- style="font-size:10pt" | |- style="font-size:10pt" | ||
− | |style="color:#1F497D" width=" | + | |style="border-style: solid; border-width: 1px;color:#1F497D" align="center" valign="center" | 09:00-09:30 |
− | | align=center valign="center" colspan=2 style="font-size:12pt" | ''' | + | | align=center valign="center" colspan="2" style="border-style: solid; border-width: 1px;font-size:11pt" | '''Opening Words''' ''([[Media:OWASPIL2011-OferMaor-OpeningWords.ppt|Presentation]])''<br> |
+ | ''Ofer Maor - Chairman, OWASP Israel; Global Membership Committee, OWASP'' | ||
+ | |- style="border-style: solid; border-width: 1px;font-size:10pt" | ||
+ | |style="border-style: solid; border-width: 1px;color:#1F497D" height="25" align="center" valign="center" | 09:30-10:10 | ||
+ | | align=center valign="center" colspan="2" style="border-style: solid; border-width: 1px;font-size:11pt"| '''Keynote''' | ||
+ | '''[[OWASP_Israel_2011_Presentations#Composite_Applications_Over_Hybrid_Clouds_.E2.80.93_Enterprise_Security_Challenges_of_the_IT_Supply_Chain|Composite Applications Over Hybrid Clouds – Enterprise Security Challenges of the IT Supply Chain]]''' | ||
+ | <br>''Dr. Ethan Hadar, Senior Vice President Corporate Technical Strategy, CA'' | ||
+ | |- style="border-style: solid; border-width: 1px;font-size:12pt" | ||
+ | |style="border-style: solid; border-width: 1px;color:#1F497D" height="30" align="right" valign="center" | | ||
+ | | style="border-style: solid; border-width: 1px;" valign="center" align="center" width=500 | <u>'''Track #1'''</u> | ||
+ | | style="border-style: solid; border-width: 1px;" valign="center" align="center" width=500 | <u>'''Track #2'''</u> | ||
+ | |- style="border-style: solid; border-width: 1px;font-size:10pt" | ||
+ | |style="border-style: solid; border-width: 1px;color:#1F497D" height="25" align="center" valign="center" | 10:15-11:00 | ||
+ | | align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" | '''[[OWASP_Israel_2011_Presentations#Finding_Security_in_Misery_of_Others|Finding Security in Misery of Others]]''' ''([[Media:OWASPIL2011-AmichaiShulman-FindingSecurityInMiseryOfOthers.pptx|Presentation]])''<br> | ||
+ | ''Amichai Shulman, CTO, Imperva'' | ||
+ | | align="center" valign="top" style="font-size:11pt" | '''[[OWASP_Israel_2011_Presentations#Temporal_Session_Race_Conditions|Temporal Session Race Conditions]]''' ''([[Media:OWASPIL2011-ShayChen-TSRC.pptx|Presentation]])'' | ||
+ | ''Shay Chen, CTO, Hacktics Advanced Security Center, Ernst & Young'' | ||
+ | |- style="border-style: solid; border-width: 1px;font-size:10pt" | ||
+ | |style="border-style: solid; border-width: 1px;color:#1F497D" height="40" align="center" valign="center" | 11:00-11:15 | ||
+ | | valign="center" align="center" style="border-style: solid; border-width: 1px;font-size:12pt" colspan="2" | '''Coffee Break''' | ||
+ | |- style="border-style: solid; border-width: 1px;font-size:10pt" | ||
+ | |style="border-style: solid; border-width: 1px;color:#1F497D" height="25" align="center" valign="center" | 11:15-12:00 | ||
+ | | align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5 | '''[[OWASP_Israel_2011_Presentations#Building_an_Effective_SDLC_Program_-_Case_Study|Building an Effective SDLC Program - Case Study]]''' ''([[Media:OWASPIL2011-Bejerano-Maor-BuildingSDLC.pptx|Presentation]])'' | ||
+ | ''Guy Bejerano, CSO, Liveperson''<br> | ||
+ | ''Ofer Maor, CTO, Seeker Security'' | ||
+ | | align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5 | '''[[OWASP_Israel_2011_Presentations#Space-Time_Tradeoffs_in_Software-Based_Deep_Packet_Inspection|Space-Time Tradeoffs in Software-Based Deep Packet Inspection]]''' ''([[Media:OWASPIL2011-YotamHarchol-SpaceTimeTradeoffDPI.pptx|Presentation]])'' | ||
+ | ''Yotam Harchol, IDC'' | ||
+ | |- style="border-style: solid; border-width: 1px;font-size:10pt" | ||
+ | |style="border-style: solid; border-width: 1px;color:#1F497D" height="25" align="center" valign="center" | 12:00-12:45 | ||
+ | | align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5 | '''[[OWASP_Israel_2011_Presentations#All_Your_Mobile_Applications_Are_Belong_to_Us|All Your Mobile Applications Are Belong to Us]]''' ''([http://www.ikotler.org/AllYourMobileAppsAreBelongToUs_OWASP2011IL.pdf Presentation])'' | ||
+ | ''Itzik Kotler, CTO, Security Art'' | ||
+ | | align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5 | '''[[OWASP_Israel_2011_Presentations#Glass_Box_Testing_-_Think_Inside_the_Box|Glass Box Testing - Thinking Inside the Box]]''' ''([[Media:OWASPIL2011-OmriWeisman-GlassBoxTesting.ppt|Presentation]])'' | ||
+ | ''Omri Weisman, Manager, Security Research Group, IBM'' | ||
+ | |- style="border-style: solid; border-width: 1px;font-size:10pt" | ||
+ | |style="border-style: solid; border-width: 1px;color:#1F497D" height="40" align="center" valign="center" | 12:45-13:45 | ||
+ | | valign="center" align="center" style="border-style: solid; border-width: 1px;font-size:12pt" colspan="2" | '''Lunch Break''' | ||
+ | |- style="border-style: solid; border-width: 1px;font-size:10pt" | ||
+ | |style="border-style: solid; border-width: 1px;color:#1F497D" height="25" align="center" valign="center" | 13:45-14:30 | ||
+ | | align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5 | '''[[OWASP_Israel_2011_Presentations#CMS_and_Other_Giants_.E2.80.93_The_Nightmare_of_AppSec_Testing|CMS And Other Giants - The Nightmare of AppSec Testing]]''' ''([[Media:OWASPIL2011-IreneAbezgauz-CMSnOtherGiants.pptx|Presentation]])'' | ||
+ | ''Irene Abezgauz, Product Manager, Seeker Security'' | ||
+ | | align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5 | '''[[OWASP_Israel_2011_Presentations#Agile_.2B_SDL_.E2.80.93_Concepts_and_Misconceptions|Agile + SDL – Concepts and Misconceptions]]''' ''([[Media:OWASPIL2011-Douglen-Bregman-AgileSDL.ppt|Presentation]])'' | ||
+ | ''Avi Douglen, Security Architect, Aware Security''<br> | ||
+ | ''Nir Bregman, Senior Project Manager, HP Software'' | ||
+ | |- style="border-style: solid; border-width: 1px;font-size:10pt" | ||
+ | |style="border-style: solid; border-width: 1px;color:#1F497D" height="25" align="center" valign="center" | 14:30-15:15 | ||
+ | | align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5 | '''[[OWASP_Israel_2011_Presentations#When_Crypto_Goes_Wrong|When Crypto Goes Wrong]]''' ''([[Media:OWASPIL2011-ErezMetula-WhenCryptoGoesWrong.pdf|Presentation]])'' | ||
+ | ''Erez Metula, Founder, AppSec Labs'' | ||
+ | | align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5 | '''[[OWASP_Israel_2011_Presentations#Advanced_Techniques_.26_Tools_for_Testing_Binary_Protocols|Advanced Techniques & Tools for Testing Binary Protocols]]''' ''([[Media:OWSPIL2011_Tamir_Tampering101.pdf|Presentation]])'' | ||
+ | ''Chilik Tamir, Information Security Architect, AppSec Labs'' | ||
+ | |- style="border-style: solid; border-width: 1px;font-size:10pt" | ||
+ | |style="border-style: solid; border-width: 1px;color:#1F497D" height="40" align="center" valign="center" | 15:15-15:30 | ||
+ | | valign="center" align="center" style="border-style: solid; border-width: 1px;font-size:12pt" colspan="2" | '''Coffee Break''' | ||
+ | |- style="border-style: solid; border-width: 1px;font-size:10pt" | ||
+ | |style="border-style: solid; border-width: 1px;color:#1F497D" height="25" align="center" valign="center" | 15:30-16:15 | ||
+ | | align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5 | '''[[OWASP_Israel_2011_Presentations#Security_Testing_of_RESTful_Services|Security Testing of RESTful Services]]''' ''([[Media:Security testing for REST applications.pdf|Presentation]])'' | ||
+ | ''Ofer Shezaf, Head of AppSec Research, HP''<br> | ||
+ | ''Eyal Fingold, Senior Security Developer, HP'' | ||
+ | | align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5 | '''[[OWASP_Israel_2011_Presentations#Hey.2C_What.E2.80.99s_your_App_doing_on_my_.28Smart.29Phone.3F|Hey, What’s your App doing on my (Smart)Phone?]]''' ''([[Media:OWASPIL2011_Zalalichin_Mobile_Security.pdf|Presentation]])'' | ||
+ | ''Shay Zalalichin, CTO, Comsec Consulting'' | ||
|- style="font-size:10pt" | |- style="font-size:10pt" | ||
− | |style="color:#1F497D | + | |style="border-style: solid; border-width: 1px;color:#1F497D" align="center" valign="center" | 16:15-17:00 |
− | | align=center valign="center" colspan="2" style=" | + | | align=center valign="center" colspan="2" style="border-style: solid; border-width: 1px;font-size:11pt" | '''[[OWASP_Israel_2011_Presentations#The_Bank_Job_II|The Bank Job II]]''' ''([http://prezi.com/wipzu1bkfwnd/the-bank-job-ii-owasp-2011-final/ Presentation])'' |
− | + | ''Adi Sharabani, Cross-Rational Security Strategy and Architecture, IBM'' | |
− | |||
− | |||
− | |||
− | '''[[OWASP_Israel_2011_Presentations# | ||
− | |||
− | '' | ||
− | |||
− | |||
− | |||
− | |||
− | |||
|- style="font-size:10pt" | |- style="font-size:10pt" | ||
− | |style=" | + | |style="border-style: solid; border-width: 1px;color:#1F497D" align="center" valign="center" | 17:00-17:05 |
− | + | | align=center valign="center" colspan="2" style="border-style: solid; border-width: 1px;font-size:11pt" | '''End Notes''' | |
− | + | ''Ofer Maor - Chairman, OWASP Israel; Global Membership Committee, OWASP'' | |
− | |||
− | |||
− | |||
− | |||
− | | | ||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | ''Ofer Maor - | ||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
|} | |} |
Latest revision as of 04:48, 26 September 2011
08:30-09:00 | Registration, Gathering and Socializing | |
09:00-09:30 | Opening Words (Presentation) Ofer Maor - Chairman, OWASP Israel; Global Membership Committee, OWASP | |
09:30-10:10 | Keynote
Composite Applications Over Hybrid Clouds – Enterprise Security Challenges of the IT Supply Chain
| |
Track #1 | Track #2 | |
10:15-11:00 | Finding Security in Misery of Others (Presentation) Amichai Shulman, CTO, Imperva |
Temporal Session Race Conditions (Presentation)
Shay Chen, CTO, Hacktics Advanced Security Center, Ernst & Young |
11:00-11:15 | Coffee Break | |
11:15-12:00 | Building an Effective SDLC Program - Case Study (Presentation)
Guy Bejerano, CSO, Liveperson |
Space-Time Tradeoffs in Software-Based Deep Packet Inspection (Presentation)
Yotam Harchol, IDC |
12:00-12:45 | All Your Mobile Applications Are Belong to Us (Presentation)
Itzik Kotler, CTO, Security Art |
Glass Box Testing - Thinking Inside the Box (Presentation)
Omri Weisman, Manager, Security Research Group, IBM |
12:45-13:45 | Lunch Break | |
13:45-14:30 | CMS And Other Giants - The Nightmare of AppSec Testing (Presentation)
Irene Abezgauz, Product Manager, Seeker Security |
Agile + SDL – Concepts and Misconceptions (Presentation)
Avi Douglen, Security Architect, Aware Security |
14:30-15:15 | When Crypto Goes Wrong (Presentation)
Erez Metula, Founder, AppSec Labs |
Advanced Techniques & Tools for Testing Binary Protocols (Presentation)
Chilik Tamir, Information Security Architect, AppSec Labs |
15:15-15:30 | Coffee Break | |
15:30-16:15 | Security Testing of RESTful Services (Presentation)
Ofer Shezaf, Head of AppSec Research, HP |
Hey, What’s your App doing on my (Smart)Phone? (Presentation)
Shay Zalalichin, CTO, Comsec Consulting |
16:15-17:00 | The Bank Job II (Presentation)
Adi Sharabani, Cross-Rational Security Strategy and Architecture, IBM | |
17:00-17:05 | End Notes
Ofer Maor - Chairman, OWASP Israel; Global Membership Committee, OWASP |