This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Template:OWASP IL 2011 Agenda"
(28 intermediate revisions by 3 users not shown) | |||
Line 1: | Line 1: | ||
− | {| style="border-collapse: collapse; border-width: 1px; border-style: solid; border-color: #000" cellpadding= | + | {| style="border-collapse: collapse; border-width: 1px; border-style: solid; border-color: #000" cellpadding=2 |
|- style="border-style: solid; border-width: 1px;font-size:10pt" | |- style="border-style: solid; border-width: 1px;font-size:10pt" | ||
− | |style="border-style: solid; border-width: 1px;color:#1F497D;white-space:nowrap" width="90" height="40" align="center" valign="center" | 08:30-09: | + | |style="border-style: solid; border-width: 1px;color:#1F497D;white-space:nowrap" width="90" height="40" align="center" valign="center" | 08:30-09:00 |
| align=center valign="center" colspan=2 style="border-style: solid; border-width: 1px;font-size:12pt" | '''Registration, Gathering and Socializing''' | | align=center valign="center" colspan=2 style="border-style: solid; border-width: 1px;font-size:12pt" | '''Registration, Gathering and Socializing''' | ||
|- style="font-size:10pt" | |- style="font-size:10pt" | ||
− | |style="border-style: solid; border-width: 1px;color:#1F497D" align="center" valign="center" | 09: | + | |style="border-style: solid; border-width: 1px;color:#1F497D" align="center" valign="center" | 09:00-09:30 |
− | | align=center valign="center" colspan="2" style="border-style: solid; border-width: 1px;font-size:11pt" | '''Opening Words''' | + | | align=center valign="center" colspan="2" style="border-style: solid; border-width: 1px;font-size:11pt" | '''Opening Words''' ''([[Media:OWASPIL2011-OferMaor-OpeningWords.ppt|Presentation]])''<br> |
− | ''Ofer Maor - Chairman, OWASP Israel; Global Membership Committee, OWASP'' | + | ''Ofer Maor - Chairman, OWASP Israel; Global Membership Committee, OWASP'' |
|- style="border-style: solid; border-width: 1px;font-size:10pt" | |- style="border-style: solid; border-width: 1px;font-size:10pt" | ||
|style="border-style: solid; border-width: 1px;color:#1F497D" height="25" align="center" valign="center" | 09:30-10:10 | |style="border-style: solid; border-width: 1px;color:#1F497D" height="25" align="center" valign="center" | 09:30-10:10 | ||
| align=center valign="center" colspan="2" style="border-style: solid; border-width: 1px;font-size:11pt"| '''Keynote''' | | align=center valign="center" colspan="2" style="border-style: solid; border-width: 1px;font-size:11pt"| '''Keynote''' | ||
− | '''[[OWASP_Israel_2011_Presentations#Composite_Applications_Over_Hybrid_Clouds_.E2.80.93_Enterprise_Security_Challenges_of_the_IT_Supply_Chain|Composite Applications Over Hybrid Clouds | + | '''[[OWASP_Israel_2011_Presentations#Composite_Applications_Over_Hybrid_Clouds_.E2.80.93_Enterprise_Security_Challenges_of_the_IT_Supply_Chain|Composite Applications Over Hybrid Clouds – Enterprise Security Challenges of the IT Supply Chain]]''' |
− | + | <br>''Dr. Ethan Hadar, Senior Vice President Corporate Technical Strategy, CA'' | |
− | ''Dr. Ethan Hadar | ||
|- style="border-style: solid; border-width: 1px;font-size:12pt" | |- style="border-style: solid; border-width: 1px;font-size:12pt" | ||
|style="border-style: solid; border-width: 1px;color:#1F497D" height="30" align="right" valign="center" | | |style="border-style: solid; border-width: 1px;color:#1F497D" height="30" align="right" valign="center" | | ||
Line 20: | Line 19: | ||
|- style="border-style: solid; border-width: 1px;font-size:10pt" | |- style="border-style: solid; border-width: 1px;font-size:10pt" | ||
|style="border-style: solid; border-width: 1px;color:#1F497D" height="25" align="center" valign="center" | 10:15-11:00 | |style="border-style: solid; border-width: 1px;color:#1F497D" height="25" align="center" valign="center" | 10:15-11:00 | ||
− | | align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" | '''[[OWASP_Israel_2011_Presentations#Finding_Security_in_Misery_of_Others|Finding Security in Misery of Others]]''' | + | | align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" | '''[[OWASP_Israel_2011_Presentations#Finding_Security_in_Misery_of_Others|Finding Security in Misery of Others]]''' ''([[Media:OWASPIL2011-AmichaiShulman-FindingSecurityInMiseryOfOthers.pptx|Presentation]])''<br> |
− | ''Amichai Shulman | + | ''Amichai Shulman, CTO, Imperva'' |
− | | align="center" valign="top" style="font-size:11pt" | '''[[OWASP_Israel_2011_Presentations#Temporal_Session_Race_Conditions|Temporal Race Conditions]]''' | + | | align="center" valign="top" style="font-size:11pt" | '''[[OWASP_Israel_2011_Presentations#Temporal_Session_Race_Conditions|Temporal Session Race Conditions]]''' ''([[Media:OWASPIL2011-ShayChen-TSRC.pptx|Presentation]])'' |
− | ''Shay Chen | + | ''Shay Chen, CTO, Hacktics Advanced Security Center, Ernst & Young'' |
|- style="border-style: solid; border-width: 1px;font-size:10pt" | |- style="border-style: solid; border-width: 1px;font-size:10pt" | ||
|style="border-style: solid; border-width: 1px;color:#1F497D" height="40" align="center" valign="center" | 11:00-11:15 | |style="border-style: solid; border-width: 1px;color:#1F497D" height="40" align="center" valign="center" | 11:00-11:15 | ||
Line 29: | Line 28: | ||
|- style="border-style: solid; border-width: 1px;font-size:10pt" | |- style="border-style: solid; border-width: 1px;font-size:10pt" | ||
|style="border-style: solid; border-width: 1px;color:#1F497D" height="25" align="center" valign="center" | 11:15-12:00 | |style="border-style: solid; border-width: 1px;color:#1F497D" height="25" align="center" valign="center" | 11:15-12:00 | ||
− | | align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5 | '''[[OWASP_Israel_2011_Presentations#Building_an_Effective_SDLC_Program_-_Case_Study|Building an Effective SDLC Program - Case Study]]''' | + | | align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5 | '''[[OWASP_Israel_2011_Presentations#Building_an_Effective_SDLC_Program_-_Case_Study|Building an Effective SDLC Program - Case Study]]''' ''([[Media:OWASPIL2011-Bejerano-Maor-BuildingSDLC.pptx|Presentation]])'' |
− | ''Guy Bejerano | + | ''Guy Bejerano, CSO, Liveperson''<br> |
− | + | ''Ofer Maor, CTO, Seeker Security'' | |
− | ''Ofer Maor | + | | align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5 | '''[[OWASP_Israel_2011_Presentations#Space-Time_Tradeoffs_in_Software-Based_Deep_Packet_Inspection|Space-Time Tradeoffs in Software-Based Deep Packet Inspection]]''' ''([[Media:OWASPIL2011-YotamHarchol-SpaceTimeTradeoffDPI.pptx|Presentation]])'' |
− | | align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5 | '''[[OWASP_Israel_2011_Presentations#Space-Time_Tradeoffs_in_Software-Based_Deep_Packet_Inspection|Space-Time Tradeoffs in Software-Based Deep Packet Inspection]]''' | ||
''Yotam Harchol, IDC'' | ''Yotam Harchol, IDC'' | ||
|- style="border-style: solid; border-width: 1px;font-size:10pt" | |- style="border-style: solid; border-width: 1px;font-size:10pt" | ||
|style="border-style: solid; border-width: 1px;color:#1F497D" height="25" align="center" valign="center" | 12:00-12:45 | |style="border-style: solid; border-width: 1px;color:#1F497D" height="25" align="center" valign="center" | 12:00-12:45 | ||
− | | align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5 | '''[[OWASP_Israel_2011_Presentations#All_Your_Mobile_Applications_Are_Belong_to_Us|All Your Mobile Applications Are Belong to Us]]''' | + | | align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5 | '''[[OWASP_Israel_2011_Presentations#All_Your_Mobile_Applications_Are_Belong_to_Us|All Your Mobile Applications Are Belong to Us]]''' ''([http://www.ikotler.org/AllYourMobileAppsAreBelongToUs_OWASP2011IL.pdf Presentation])'' |
− | ''Itzik Kotler | + | ''Itzik Kotler, CTO, Security Art'' |
− | | align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5 | '''[[OWASP_Israel_2011_Presentations#Glass_Box_Testing_-_Think_Inside_the_Box|Glass Box Testing - Thinking Inside the Box]]''' | + | | align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5 | '''[[OWASP_Israel_2011_Presentations#Glass_Box_Testing_-_Think_Inside_the_Box|Glass Box Testing - Thinking Inside the Box]]''' ''([[Media:OWASPIL2011-OmriWeisman-GlassBoxTesting.ppt|Presentation]])'' |
− | ''Omri Weisman | + | ''Omri Weisman, Manager, Security Research Group, IBM'' |
|- style="border-style: solid; border-width: 1px;font-size:10pt" | |- style="border-style: solid; border-width: 1px;font-size:10pt" | ||
|style="border-style: solid; border-width: 1px;color:#1F497D" height="40" align="center" valign="center" | 12:45-13:45 | |style="border-style: solid; border-width: 1px;color:#1F497D" height="40" align="center" valign="center" | 12:45-13:45 | ||
Line 46: | Line 44: | ||
|- style="border-style: solid; border-width: 1px;font-size:10pt" | |- style="border-style: solid; border-width: 1px;font-size:10pt" | ||
|style="border-style: solid; border-width: 1px;color:#1F497D" height="25" align="center" valign="center" | 13:45-14:30 | |style="border-style: solid; border-width: 1px;color:#1F497D" height="25" align="center" valign="center" | 13:45-14:30 | ||
− | | align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5 | '''[[OWASP_Israel_2011_Presentations# | + | | align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5 | '''[[OWASP_Israel_2011_Presentations#CMS_and_Other_Giants_.E2.80.93_The_Nightmare_of_AppSec_Testing|CMS And Other Giants - The Nightmare of AppSec Testing]]''' ''([[Media:OWASPIL2011-IreneAbezgauz-CMSnOtherGiants.pptx|Presentation]])'' |
− | '' | + | ''Irene Abezgauz, Product Manager, Seeker Security'' |
− | | align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5 | '''[[OWASP_Israel_2011_Presentations# | + | | align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5 | '''[[OWASP_Israel_2011_Presentations#Agile_.2B_SDL_.E2.80.93_Concepts_and_Misconceptions|Agile + SDL – Concepts and Misconceptions]]''' ''([[Media:OWASPIL2011-Douglen-Bregman-AgileSDL.ppt|Presentation]])'' |
− | '' | + | ''Avi Douglen, Security Architect, Aware Security''<br> |
+ | ''Nir Bregman, Senior Project Manager, HP Software'' | ||
|- style="border-style: solid; border-width: 1px;font-size:10pt" | |- style="border-style: solid; border-width: 1px;font-size:10pt" | ||
|style="border-style: solid; border-width: 1px;color:#1F497D" height="25" align="center" valign="center" | 14:30-15:15 | |style="border-style: solid; border-width: 1px;color:#1F497D" height="25" align="center" valign="center" | 14:30-15:15 | ||
− | | align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5 | '''[[OWASP_Israel_2011_Presentations# | + | | align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5 | '''[[OWASP_Israel_2011_Presentations#When_Crypto_Goes_Wrong|When Crypto Goes Wrong]]''' ''([[Media:OWASPIL2011-ErezMetula-WhenCryptoGoesWrong.pdf|Presentation]])'' |
− | '' | + | ''Erez Metula, Founder, AppSec Labs'' |
− | | align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5 | '''[[OWASP_Israel_2011_Presentations# | + | | align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5 | '''[[OWASP_Israel_2011_Presentations#Advanced_Techniques_.26_Tools_for_Testing_Binary_Protocols|Advanced Techniques & Tools for Testing Binary Protocols]]''' ''([[Media:OWSPIL2011_Tamir_Tampering101.pdf|Presentation]])'' |
− | '' | + | ''Chilik Tamir, Information Security Architect, AppSec Labs'' |
|- style="border-style: solid; border-width: 1px;font-size:10pt" | |- style="border-style: solid; border-width: 1px;font-size:10pt" | ||
|style="border-style: solid; border-width: 1px;color:#1F497D" height="40" align="center" valign="center" | 15:15-15:30 | |style="border-style: solid; border-width: 1px;color:#1F497D" height="40" align="center" valign="center" | 15:15-15:30 | ||
Line 61: | Line 60: | ||
|- style="border-style: solid; border-width: 1px;font-size:10pt" | |- style="border-style: solid; border-width: 1px;font-size:10pt" | ||
|style="border-style: solid; border-width: 1px;color:#1F497D" height="25" align="center" valign="center" | 15:30-16:15 | |style="border-style: solid; border-width: 1px;color:#1F497D" height="25" align="center" valign="center" | 15:30-16:15 | ||
− | | align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5 | '''[[OWASP_Israel_2011_Presentations# | + | | align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5 | '''[[OWASP_Israel_2011_Presentations#Security_Testing_of_RESTful_Services|Security Testing of RESTful Services]]''' ''([[Media:Security testing for REST applications.pdf|Presentation]])'' |
− | '' | + | ''Ofer Shezaf, Head of AppSec Research, HP''<br> |
− | | align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5 | '''[[OWASP_Israel_2011_Presentations# | + | ''Eyal Fingold, Senior Security Developer, HP'' |
− | '' | + | | align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5 | '''[[OWASP_Israel_2011_Presentations#Hey.2C_What.E2.80.99s_your_App_doing_on_my_.28Smart.29Phone.3F|Hey, What’s your App doing on my (Smart)Phone?]]''' ''([[Media:OWASPIL2011_Zalalichin_Mobile_Security.pdf|Presentation]])'' |
+ | ''Shay Zalalichin, CTO, Comsec Consulting'' | ||
|- style="font-size:10pt" | |- style="font-size:10pt" | ||
|style="border-style: solid; border-width: 1px;color:#1F497D" align="center" valign="center" | 16:15-17:00 | |style="border-style: solid; border-width: 1px;color:#1F497D" align="center" valign="center" | 16:15-17:00 | ||
− | | align=center valign="center" colspan="2" style="border-style: solid; border-width: 1px;font-size:11pt" | ''' | + | | align=center valign="center" colspan="2" style="border-style: solid; border-width: 1px;font-size:11pt" | '''[[OWASP_Israel_2011_Presentations#The_Bank_Job_II|The Bank Job II]]''' ''([http://prezi.com/wipzu1bkfwnd/the-bank-job-ii-owasp-2011-final/ Presentation])'' |
− | '' | + | ''Adi Sharabani, Cross-Rational Security Strategy and Architecture, IBM'' |
|- style="font-size:10pt" | |- style="font-size:10pt" | ||
|style="border-style: solid; border-width: 1px;color:#1F497D" align="center" valign="center" | 17:00-17:05 | |style="border-style: solid; border-width: 1px;color:#1F497D" align="center" valign="center" | 17:00-17:05 | ||
| align=center valign="center" colspan="2" style="border-style: solid; border-width: 1px;font-size:11pt" | '''End Notes''' | | align=center valign="center" colspan="2" style="border-style: solid; border-width: 1px;font-size:11pt" | '''End Notes''' | ||
− | ''Ofer Maor - Chairman, OWASP Israel; Global Membership Committee, OWASP'' | + | ''Ofer Maor - Chairman, OWASP Israel; Global Membership Committee, OWASP'' |
− | |||
|} | |} |
Latest revision as of 04:48, 26 September 2011
08:30-09:00 | Registration, Gathering and Socializing | |
09:00-09:30 | Opening Words (Presentation) Ofer Maor - Chairman, OWASP Israel; Global Membership Committee, OWASP | |
09:30-10:10 | Keynote
Composite Applications Over Hybrid Clouds – Enterprise Security Challenges of the IT Supply Chain
| |
Track #1 | Track #2 | |
10:15-11:00 | Finding Security in Misery of Others (Presentation) Amichai Shulman, CTO, Imperva |
Temporal Session Race Conditions (Presentation)
Shay Chen, CTO, Hacktics Advanced Security Center, Ernst & Young |
11:00-11:15 | Coffee Break | |
11:15-12:00 | Building an Effective SDLC Program - Case Study (Presentation)
Guy Bejerano, CSO, Liveperson |
Space-Time Tradeoffs in Software-Based Deep Packet Inspection (Presentation)
Yotam Harchol, IDC |
12:00-12:45 | All Your Mobile Applications Are Belong to Us (Presentation)
Itzik Kotler, CTO, Security Art |
Glass Box Testing - Thinking Inside the Box (Presentation)
Omri Weisman, Manager, Security Research Group, IBM |
12:45-13:45 | Lunch Break | |
13:45-14:30 | CMS And Other Giants - The Nightmare of AppSec Testing (Presentation)
Irene Abezgauz, Product Manager, Seeker Security |
Agile + SDL – Concepts and Misconceptions (Presentation)
Avi Douglen, Security Architect, Aware Security |
14:30-15:15 | When Crypto Goes Wrong (Presentation)
Erez Metula, Founder, AppSec Labs |
Advanced Techniques & Tools for Testing Binary Protocols (Presentation)
Chilik Tamir, Information Security Architect, AppSec Labs |
15:15-15:30 | Coffee Break | |
15:30-16:15 | Security Testing of RESTful Services (Presentation)
Ofer Shezaf, Head of AppSec Research, HP |
Hey, What’s your App doing on my (Smart)Phone? (Presentation)
Shay Zalalichin, CTO, Comsec Consulting |
16:15-17:00 | The Bank Job II (Presentation)
Adi Sharabani, Cross-Rational Security Strategy and Architecture, IBM | |
17:00-17:05 | End Notes
Ofer Maor - Chairman, OWASP Israel; Global Membership Committee, OWASP |