This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "OWASP Global AppSec Asia 2011"

From OWASP
Jump to: navigation, search
m
 
(32 intermediate revisions by 5 users not shown)
Line 3: Line 3:
 
<br>  
 
<br>  
  
==== Welcome  ====
+
= Welcome  =
  
 
=== OWASP Global AppSec Asia Pacific 2011 - Beijing China  ===
 
=== OWASP Global AppSec Asia Pacific 2011 - Beijing China  ===
Line 9: Line 9:
 
[http://www.owasp.org/index.php/China-Mainland OWASP China-Mainland Chapter] will host '''OWASP Global AppSec Asia 2011''' in Beijing, China from Nov. 8 to Nov. 11, 2011. The summit will gather OWASP leaders, security experts, executives, technical thought leaders, developers, scientists and researchers from Asia and around the world for in-depth discussions of cutting-edge application security issues. The summit will draw participation from major Chinese and global organizations across various verticals including government, information technology, services and consulting, telecommunications, finance, e-commerce, Internet, universities and research institutes. About 800 people are expected to attend the summit, which will be covered by major news media. Panel discussions, vendor exhibit, and dinners will be held at the summit, providing sufficient networking opportunities.  
 
[http://www.owasp.org/index.php/China-Mainland OWASP China-Mainland Chapter] will host '''OWASP Global AppSec Asia 2011''' in Beijing, China from Nov. 8 to Nov. 11, 2011. The summit will gather OWASP leaders, security experts, executives, technical thought leaders, developers, scientists and researchers from Asia and around the world for in-depth discussions of cutting-edge application security issues. The summit will draw participation from major Chinese and global organizations across various verticals including government, information technology, services and consulting, telecommunications, finance, e-commerce, Internet, universities and research institutes. About 800 people are expected to attend the summit, which will be covered by major news media. Panel discussions, vendor exhibit, and dinners will be held at the summit, providing sufficient networking opportunities.  
  
==== 中文(Chinese)  ====
+
= [http://www.owasp.org.cn/OWASP_Conference/AppSec_2011/Asia_2011-PPT Presentations Download]=
 +
 
 +
 
 +
= 中文(Chinese)  =
  
 
=== 中文网站  ===
 
=== 中文网站  ===
Line 17: Line 20:
 
[http://www.owasp.org.cn/OWASP_Conference OWASP 2011亚太峰会]  
 
[http://www.owasp.org.cn/OWASP_Conference OWASP 2011亚太峰会]  
  
==== Registration  ====
+
= Registration  =
  
 
请使用[http://www.regonline.com/appsecasia2011 RegOnline 链接]来注册(中文).  
 
请使用[http://www.regonline.com/appsecasia2011 RegOnline 链接]来注册(中文).  
Line 36: Line 39:
 
For student discount, attendees must present proof of enrollment when picking up your badge.  
 
For student discount, attendees must present proof of enrollment when picking up your badge.  
  
==== Keynotes  ====
+
= Keynotes  =
  
 
=== Manoranjan Paul  ===
 
=== Manoranjan Paul  ===
  
<fck:hr>
 
 
{| class="FCK__ShowTableBorders" style="background-color: transparent;"
 
{| class="FCK__ShowTableBorders" style="background-color: transparent;"
 
|-
 
|-
Line 53: Line 55:
  
 
=== Cassio Goldschmidt  ===
 
=== Cassio Goldschmidt  ===
<fck:hr>
+
 
 
{| class="FCK__ShowTableBorders" style="background-color: transparent;"
 
{| class="FCK__ShowTableBorders" style="background-color: transparent;"
 
|-
 
|-
Line 74: Line 76:
  
 
=== Frank Fan  ===
 
=== Frank Fan  ===
<fck:hr>
+
 
 
{| class="FCK__ShowTableBorders" style="background-color: transparent;"
 
{| class="FCK__ShowTableBorders" style="background-color: transparent;"
 
|-
 
|-
Line 88: Line 90:
 
<br>  
 
<br>  
  
==== Guest Speakers  ====
+
= Guest Speakers  =
 +
In Surname's Alphabetical Order
  
 
=== Sebastien Deleersnyder  ===
 
=== Sebastien Deleersnyder  ===
<fck:hr>
 
 
{| class="FCK__ShowTableBorders" style="background-color: transparent;"
 
{| class="FCK__ShowTableBorders" style="background-color: transparent;"
 
|-
 
|-
Line 102: Line 104:
  
 
Seba is the Belgian OWASP Chapter Leader, member of the influential OWASP Foundation Board and performed several public presentations on Web Application and Web Services Security. He also co-organizes the yearly security &amp; hacker BruCON conference and trainings in Brussels.  
 
Seba is the Belgian OWASP Chapter Leader, member of the influential OWASP Foundation Board and performed several public presentations on Web Application and Web Services Security. He also co-organizes the yearly security &amp; hacker BruCON conference and trainings in Brussels.  
 +
|}
  
|}
+
<br>
  
=== Alexander Wang  ===
+
=== Tobias Gondrom ===
<fck:hr>
 
 
{| class="FCK__ShowTableBorders" style="background-color: transparent;"
 
{| class="FCK__ShowTableBorders" style="background-color: transparent;"
 
|-
 
|-
! width="200" align="center" |  
+
! width="200" align="center" | <br>
 
! width="1000" align="center" | <br>
 
! width="1000" align="center" | <br>
 
|-
 
|-
| align="center" | https://www.owasp.org/images/f/fa/Wenjun.png
+
| align="center" | https://www.owasp.org/images/c/cf/Tobias.gondrom.jpg
| Wenjun Wang is a tech lead and security architect in HP PPM R&amp;D with 10 years experience in software development and 4 years’ in security architecture. He used to work in the PPM integration team, took the tech lead for PPM-EDS project, now he acts as the tech lead and scrum master for PPM-Mobility project. He had been working in HP for 4 years. Before joining HP, he worked in Wuerth Phoenix as a Java developer for an ERP system.  
+
| Tobias Gondrom is Managing Director of an IT Security & Risk Management Advisory based in the United Kingdom and Germany. He has twelve years of experience in software development, application security, cryptography, electronic signatures and global standardisation organisations working for independent software vendors and large global corporations in the financial, technology and government sector, in America, EMEA and APAC. As the Global Head of the Security Team at Open Text (2005-2007) and from 2000-2004 as the lead of the Security Task Force at IXOS Software AG, he was responsible for security, risk and incident management and introduced and implemented a secure SDLC used globally by development departments in the US, Canada, UK and Germany.
As a team leader of the localization of AntiSamy Java in OWASP China, Wenjun organized the training of Antisamy Java and won welcome from students for his understandable style of speech and humor. He holds a master degree in EE and a bachelor degree in Accounting of Shanghai Jiaotong University.  
 
  
 +
Since 2003 he is the chair of working groups of the IETF (www.ietf.org) in the security area, member of the IETF security directorate, and since 2010 chair of the formed web security WG at the IETF, and a former chapter lead of the German OWASP chapter from 2007 to 2008 and board member of OWASP London. Tobias is the author of the international standards RFC 4998, RFC 6283 and co-author and contributor to a number of internet standards and papers on security and electronic signatures, as well as the co-author of the book „Secure Electronic Archiving“, and frequent presenter at conferences and publication of articles (e.g. AppSec, ISSE, Moderner Staat, IETF, VOI-booklet “Electronic Signature“, iX).
 
|}
 
|}
  
 
<br>  
 
<br>  
  
=== Marco M. Morana ===
+
=== Jianmeng Li ===
<fck:hr>
+
{| class="FCK__ShowTableBorders" style="background-color: transparent;"
Marco Morana is leader of the OWASP (Open Web Application Security Project) Cincinnati chapter, Ohio, USA and co-author of OWASP projects such as the secure coding guide and the testing guide. In his current position, Marco works as Sr. Technology Information Security Officer and Security Architect for Citigroup Global Consumer North America where his primary responsibility is security analysis and design review of financial based web applications including on-line banking. Prior to Citigroup, Marco worked for more than 15 years at different companies as software security consultant, security instructor, security application architect and security software engineer. Marco owns a Masters Degree in Computer Systems Engineering from Northwestern Polytechnic University and an Engineering Doctorate Degree (Dr. Ing.) in Mechanical Engineering from University of Padua.  
+
|-
 +
! width="200" align="center" | <br>
 +
! width="1000" align="center" | <br>
 +
|-
 +
| align="center" | https://www.owasp.org/images/c/c9/Jianmli.jpg
 +
| Jianmeng Li(Jimmy)is a core member of security team in CISCO CSG. When graduated at 2011, Jimmy worked on the development of client and website for a foreign company. In 2004, he was dispatched to Japan for a year. Jimmy joined Huawei technologies Co., LTD when he came back and worked to develop mobile communication platform. Then Jimmy joined CISCO at 2006 and worked on the development of backend server of online products and application security field. He has rich developing experience on multi-language and multi-platform and is responsible for the training of C/C++ convention and skills. Currently Jimmy is focusing on Fuzz test and secure development.  
 +
|}
  
 
<br>  
 
<br>  
  
 
=== Larry Man  ===
 
=== Larry Man  ===
<fck:hr>
 
 
{| class="FCK__ShowTableBorders" style="background-color: transparent;"
 
{| class="FCK__ShowTableBorders" style="background-color: transparent;"
 
|-
 
|-
Line 135: Line 142:
 
| align="center" | https://www.owasp.org/images/c/c0/Larryman.jpg  
 
| align="center" | https://www.owasp.org/images/c/c0/Larryman.jpg  
 
| Larry Man is a dynamic-leader in information security, with over 15 years experience in the field. He is Principle Consultant – SZBOWEB Company Limited which provides independent IT Security consulting to arrange of clients in China and Hong Kong. He is an expert in Data Security. He previously led a team in Ottawa Canada to create an embedded software system specialized in digital rights management. He is also the founder of Ironclad System, a software vendor in producing ERM systems. Larry used to work as a computer auditor of HSBC in HK. Larry was graduated from University of Manitoba with two degrees, one in Computer Science and one in Accounting &amp; Finance. He also had a Master Degree in Engineering from CUHK. Larry is based in Hong Kong and has previously lived in Canada, US and China.
 
| Larry Man is a dynamic-leader in information security, with over 15 years experience in the field. He is Principle Consultant – SZBOWEB Company Limited which provides independent IT Security consulting to arrange of clients in China and Hong Kong. He is an expert in Data Security. He previously led a team in Ottawa Canada to create an embedded software system specialized in digital rights management. He is also the founder of Ironclad System, a software vendor in producing ERM systems. Larry used to work as a computer auditor of HSBC in HK. Larry was graduated from University of Manitoba with two degrees, one in Computer Science and one in Accounting &amp; Finance. He also had a Master Degree in Engineering from CUHK. Larry is based in Hong Kong and has previously lived in Canada, US and China.
 +
|}
 +
 +
<br>
 +
 +
=== Marco M. Morana  ===
 +
{| class="FCK__ShowTableBorders" style="background-color: transparent;"
 +
|-
 +
! width="200" align="center" | <br>
 +
! width="1000" align="center" | <br>
 +
|-
 +
| align="center" | https://www.owasp.org/images/0/07/Marco-morana.JPG
 +
| Marco Morana is leader of the OWASP (Open Web Application Security Project) Cincinnati chapter, Ohio, USA and co-author of OWASP projects such as the secure coding guide and the testing guide. In his current position, Marco works as Sr. Technology Information Security Officer and Security Architect for Citigroup Global Consumer North America where his primary responsibility is security analysis and design review of financial based web applications including on-line banking. Prior to Citigroup, Marco worked for more than 15 years at different companies as software security consultant, security instructor, security application architect and security software engineer. Marco owns a Masters Degree in Computer Systems Engineering from Northwestern Polytechnic University and an Engineering Doctorate Degree (Dr. Ing.) in Mechanical Engineering from University of Padua.
 +
|}
 +
 +
<br>
 +
 +
=== Alexander Wang  ===
 +
{| class="FCK__ShowTableBorders" style="background-color: transparent;"
 +
|-
 +
! width="200" align="center" |
 +
! width="1000" align="center" | <br>
 +
|-
 +
| align="center" | https://www.owasp.org/images/f/fa/Wenjun.png
 +
| Wenjun Wang is a tech lead and security architect in HP PPM R&amp;D with 10 years experience in software development and 4 years’ in security architecture. He used to work in the PPM integration team, took the tech lead for PPM-EDS project, now he acts as the tech lead and scrum master for PPM-Mobility project. He had been working in HP for 4 years. Before joining HP, he worked in Wuerth Phoenix as a Java developer for an ERP system.
 +
As a team leader of the localization of AntiSamy Java in OWASP China, Wenjun organized the training of Antisamy Java and won welcome from students for his understandable style of speech and humor. He holds a master degree in EE and a bachelor degree in Accounting of Shanghai Jiaotong University.
 
|}
 
|}
  
Line 140: Line 172:
  
 
=== Daniel Ching Wa Ng  ===
 
=== Daniel Ching Wa Ng  ===
<fck:hr>
 
 
{| class="FCK__ShowTableBorders" style="background-color: transparent;"
 
{| class="FCK__ShowTableBorders" style="background-color: transparent;"
 
|-
 
|-
Line 153: Line 184:
  
 
=== Jonathan Werrett  ===
 
=== Jonathan Werrett  ===
<fck:hr>
+
{| class="FCK__ShowTableBorders" style="background-color: transparent;"
Jonathan Werrett is a Hong Kong based Senior Security Consultant with Trustwave's SpiderLabs. SpiderLabs is Trustwave's advanced security team focused on penetration testing,incident response, and application security. Over the past 10 years, Jonathan has worked in roles securing web infrastructure for a number of online start-ups, as well as providing web application testing and secure development consulting services to various international organizations.  
+
|-
 +
! width="200" align="center" | <br>
 +
! width="1000" align="center" | <br>
 +
|-
 +
| align="center" | https://www.owasp.org/images/c/c4/Jw-headshot-200px.jpg
 +
| Jonathan Werrett is a Hong Kong based Senior Security Consultant with Trustwave's SpiderLabs. SpiderLabs is Trustwave's advanced security team focused on penetration testing,incident response, and application security. Over the past 10 years, Jonathan has worked in roles securing web infrastructure for a number of online start-ups, as well as providing web application testing and secure development consulting services to various international organizations.  
 +
|}
  
 
<br>  
 
<br>  
  
=== Noa Bar Yosef ===
+
=== Yuming Xia ===
<fck:hr>
+
{| class="FCK__ShowTableBorders" style="background-color: transparent;"
Noa is a senior security strategist at Imperva. In this role Noa researches and analyzes the trends in the threat landscape. She is a frequent contributor to different security magazines, comments on security-breaking news, and is regularly invited to speak at industry events. Currently, Noa writes a bi-weekly column on hacker trends and techniques for SecurityWeek. Previously, she held the position of a senior security researcher for Imperva’s Application Defense Center. Noa holds a MSc degree (specializing in information security) from Tel-Aviv University.  
+
|-
 +
! width="200" align="center" | <br>
 +
! width="1000" align="center" | <br>
 +
|-
 +
| align="center" | https://www.owasp.org/images/e/ef/Yumingxia.png
 +
| Yuming Xia(Bruce), employee of Cisco System Inc., focusing on application security, including penetration testing and security solution development.Before joining Cisco, Bruce was a network analyzer for China Telecom. And as a main author for book “Software Quality Management” (Tsinghua University Press, 2007), he has lots of experience in quality assurance and security processes. After one year of technical study in San Jose (CA, USA) , he is fully skilled on security issue detection and solution development, and now acting as security owner for several large projects.  
 +
|}
  
<br>  
+
<br>
  
=== Jianmeng Li ===
+
=== Noa Bar Yosef ===
<fck:hr>
+
{| class="FCK__ShowTableBorders" style="background-color: transparent;"
Jianmeng Li(Jimmy)is a core member of security team in CISCO CSG. When graduated at 2011, Jimmy worked on the development of client and website for a foreign company. In 2004, he was dispatched to Japan for a year. Jimmy joined Huawei technologies Co., LTD when he came back and worked to develop mobile communication platform. Then Jimmy joined CISCO at 2006 and worked on the development of backend server of online products and application security field. He has rich developing experience on multi-language and multi-platform and is responsible for the training of C/C++ convention and skills. Currently Jimmy is focusing on Fuzz test and secure development.  
+
|-
 +
! width="200" align="center" | <br>
 +
! width="1000" align="center" | <br>
 +
|-
 +
| align="center" | https://www.owasp.org/images/8/81/NoaBarYosef.jpg
 +
| Noa is a senior security strategist at Imperva. In this role Noa researches and analyzes the trends in the threat landscape. She is a frequent contributor to different security magazines, comments on security-breaking news, and is regularly invited to speak at industry events. Currently, Noa writes a bi-weekly column on hacker trends and techniques for SecurityWeek. Previously, she held the position of a senior security researcher for Imperva’s Application Defense Center. Noa holds a MSc degree (specializing in information security) from Tel-Aviv University.  
 +
|}
  
 
<br>  
 
<br>  
  
=== Yuming Xia  ===
+
= CFP and CFT  =
<fck:hr>
 
Yuming Xia(Bruce), employee of Cisco System Inc., focusing on application security, including penetration testing and security solution development.Before joining Cisco, Bruce was a network analyzer for China Telecom. And as a main author for book “Software Quality Management” (Tsinghua University Press, 2007), he has lots of experience in quality assurance and security processes. After one year of technical study in San Jose (CA, USA) , he is fully skilled on security issue detection and solution development, and now acting as security owner for several large projects.
 
 
 
<br><br><br>
 
 
 
==== CFP and CFT  ====
 
  
 
=== OWASP APPSEC ASIA 2011  ===
 
=== OWASP APPSEC ASIA 2011  ===
Line 229: Line 272:
 
<br>  
 
<br>  
  
==== Agenda  ====
+
= Agenda  =
 
<center>
 
<center>
 
== '''November 8th'''  ==
 
== '''November 8th'''  ==
  
{| width="80%" class="t FCK__ShowTableBorders"
+
{| class="t FCK__ShowTableBorders" width="80%"
 
|-
 
|-
| width="14%" height="17" align="right" | 08:00 – 09:00  
+
| height="17" width="14%" align="right" | 08:00 – 09:00  
| align="CENTER" bgcolor="#8595c2" | '''Registration'''
+
| bgcolor="#8595c2" align="center" | '''Registration'''
 
|-
 
|-
| width="14%" height="49" align="right" | 09:00 – 09:15  
+
| height="49" width="14%" align="right" | 09:00 – 09:15  
| align="CENTER" bgcolor="#b9c2dc" | '''Rip, OWASP China'''<br> Opening Ceremony, Development of OWASP China
+
| bgcolor="#b9c2dc" align="center" | '''Rip, OWASP China (Language: Chinese)'''<br>Opening Ceremony: Development of OWASP China
 
|-
 
|-
| width="14%" height="49" align="right" | 09:15 – 09:30  
+
| height="49" width="14%" align="right" | 09:15 – 09:30  
| align="CENTER" bgcolor="#eeeeee" | '''Sebastien Deleersnyder, OWASP Global Committee'''<br> Opening Ceremony
+
| bgcolor="#eeeeee" align="center" | '''Sebastien Deleersnyder, OWASP Global Committee'''<br>Opening Ceremony&nbsp; '''(Language: English)'''
 
|-
 
|-
| width="14%" height="49" align="right" | 09:30 – 09:50  
+
| height="49" width="14%" align="right" | 09:30 – 09:50  
| align="CENTER" bgcolor="#b9c2dc" | '''Government Leader'''<br> TBD
+
| bgcolor="#b9c2dc" align="center" | '''Liping Ding &nbsp;(Language: Chinese) '''<br>The Analysis of Hidden Communication Channels within Cloud Computing Environment
 
|-
 
|-
| width="14%" height="49" align="right" | 09:50 – 10:10
+
| height="49" width="14%" align="right" | 09:50 – 10:30
| align="CENTER" bgcolor="#eeeeee" | '''Government Leader'''<br> TBD
+
| bgcolor="#eeeeee" align="center" | '''Manoranjan Paul &nbsp;(Language: English)'''<br>Silver Lining in Dark Clouds: A Look at Cloud Computing Security
 
|-
 
|-
| width="14%" height="49" align="right" | 10:10 10:50
+
| height="49" width="14%" align="right" | 10:30 11:00
| align="CENTER" bgcolor="#b9c2dc" | '''Manoranjan Paul'''<br> View of Cloud Computing Security
+
| bgcolor="#b9c2dc" align="center" | '''Frank Fan &nbsp;(Language: Chinese)'''<br>Current Web Security and its' Future
 
|-
 
|-
| width="14%" height="49" align="right" | 10:50 – 11:20
+
| height="49" width="14%" align="right" | 11:00 – 11:30
| align="CENTER" bgcolor="#eeeeee" | '''Frank Fan'''<br> Current Web Security and its' Future
+
| bgcolor="#eeeeee" align="center" | '''Jonathan Werrett&nbsp; (Language: English)'''<br>WAFs: Patch First, Ask Questions Later
 
|-
 
|-
| width="14%" height="49" align="right" | 11:20 – 12:00  
+
| height="49" width="14%" align="right" | 11:30 – 12:00  
| align="CENTER" bgcolor="#b9c2dc" | '''Cassio Goldschmidt'''<br> The Fundamental Approaches and Tools to Achieve Secured Development Life Cycle
+
| bgcolor="#b9c2dc" align="center" | '''Hanqing Wu&nbsp; &nbsp;(Language: Chinese)'''<br>Flaws of Popular Application Applied Encryption Algorithms and the Corresponding Utilization"
 
|-
 
|-
| width="14%" height="17" align="right" | 12:00 – 13:30  
+
| height="17" width="14%" align="right" | 12:00 – 14:30  
| align="CENTER" bgcolor="#d98b66" | '''Lunch'''
+
| bgcolor="#d98b66" align="center" | '''Lunch &amp; Networking'''
 
|-
 
|-
| width="14%" height="49" align="right" | 13:30 – 14:00
+
| height="49" width="14%" align="right" | 14:30 – 15:10
| align="CENTER" bgcolor="#b9c2dc" | '''Jonathan Werrett'''<br> WAFs: Patch First, Ask Questions Later
+
| bgcolor="#b9c2dc" align="center" | '''Cassio Goldschmidt'&nbsp;&nbsp;&nbsp; (Language: English)<br>'''The Fundamental Approaches and Tools to Achieve Secured Development Life Cycle
 
|-
 
|-
| width="14%" height="49" align="right" | 14:00 14:30
+
| height="49" width="14%" align="right" | 15:10 15:40
| align="CENTER" bgcolor="#eeeeee" | '''Daniel Ng'''<br> To Enhance Cloud Application Security by Genetic Network Coding
+
| bgcolor="#eeeeee" align="center" | '''Yuming Xia&nbsp; &nbsp;(Language: Chinese)'''<br>Web2.0 Secure Coding Practice
 
|-
 
|-
| width="14%" height="49" align="right" | 14:30 15:00
+
| height="49" width="14%" align="right" | 15:40 16:10
| align="CENTER" bgcolor="#b9c2dc" | '''Larry Man'''<br> Data Control: Improve Database Security through Vulnerability Management
+
| bgcolor="#b9c2dc" align="center" | '''Marco M. Morana &amp; Wei Zhang&nbsp; &nbsp;(Language: Chinese)'''<br>The Financial Industry Web Application Single Sign-On (SSO) Framework Design and Case Studies
 
|-
 
|-
| width="14%" height="49" align="right" | 15:00 15:30
+
| height="49" width="14%" align="right" | 16:10 16:40
| align="CENTER" bgcolor="#eeeeee" | '''Sponsor'''<br> TBD
+
| bgcolor="#eeeeee" align="center" | '''Noa Bar Yosef&nbsp;&nbsp; &nbsp;(Language: English)'''<br>Hacking 2011:Lesson for 2012
 
|-
 
|-
| width="14%" height="49" align="right" | 15:30 16:00
+
| height="49" width="14%" align="right" | 16:40 17:10
| align="CENTER" bgcolor="#b9c2dc" | '''Langyu Hu'''<br> RFID Security
+
| bgcolor="#b9c2dc" align="center" | '''Sebastien Deleersnyder&nbsp;&nbsp; &nbsp;(Language: English)'''<br>OWASP WTE: testing your way
 
|-
 
|-
| width="14%" height="49" align="right" | 16:00 – 18:00  
+
| height="49" width="14%" align="right" | 17:10 – 18:00  
| align="CENTER" bgcolor="#eeeeee" | Exhibition of Internet Security Products
+
| bgcolor="#eeeeee" align="center" | Exhibition of Internet Security Products
 
|}
 
|}
</center>
+
 
<br>
 
<center>
 
 
== '''November 9th'''  ==
 
== '''November 9th'''  ==
  
{| width="80%" class="t FCK__ShowTableBorders"
+
{| class="t FCK__ShowTableBorders" width="80%"
 +
|-
 +
| height="17" width="14%" align="right" | 08:00 – 09:00
 +
| bgcolor="#8595c2" align="center" | '''Registration'''
 +
|-
 +
| height="49" width="14%" align="right" | 09:00 – 09:30
 +
| bgcolor="#b9c2dc" align="center" | '''Wenju Wang&nbsp; (Language: Chinese)'''<br>The XSS Detection and Defense Techniques and Case Studies
 
|-
 
|-
| width="14%" height="17" align="right" | 08:00 09:00  
+
| height="49" width="14%" align="right" | 09:30 10:00  
| align="CENTER" bgcolor="#8595c2" | '''Registration'''
+
| bgcolor="#eeeeee" align="center" | '''Larry Man&nbsp; (Language: Chinese)'''<br>Data Control: Improve Database Security through Vulnerability Management
 
|-
 
|-
| width="14%" height="49" align="right" | 09:00 – 09:30  
+
| height="49" width="14%" align="right" | 10:00 – 10:30  
| align="CENTER" bgcolor="#b9c2dc" | '''Wenju Wang, Yuming Xia'''<br> The XSS Detection and Defense Techniques and Case Studies
+
| bgcolor="#b9c2dc" align="center" | '''Daniel Ng&nbsp; (Language: Chinese)'''<br>Beefing up Cloud Application through Genetic Network Coding
 
|-
 
|-
| width="14%" height="49" align="right" | 09:30 – 10:00  
+
| height="49" width="14%" align="right" | 10:30 – 11:00  
| align="CENTER" bgcolor="#eeeeee" | '''Marco M. Morana'''<br> The Financial Industry Web Application Single Sign-On (SSO) Framework Design and Case Studies
+
| bgcolor="#eeeeee" align="center" | '''Dr. Meng-Chow Kang&nbsp; (Language: Chinese)'''<br>Overview of ISO/IEC 27034 - the Application Security Standards
 
|-
 
|-
| width="14%" height="49" align="right" | 10:00 – 10:30  
+
| height="49" width="14%" align="right" | 11:00 – 11:30  
| align="CENTER" bgcolor="#b9c2dc" | '''Jianmeng Li'''<br> Secure C Function: The Lightweight Solution for Buffer Overflow
+
| bgcolor="#b9c2dc" align="center" | '''Jianmeng Li (Language: Chinese)'''<br>Secure C Function: The Lightweight Solution for Buffer Overflow
 
|-
 
|-
| width="14%" height="49" align="right" | 10:30 – 11:00  
+
| height="49" width="14%" align="right" | 11:30 – 12:00  
| align="CENTER" bgcolor="#eeeeee" | '''Noa Bar Yosef'''<br> Hacking 2011: Lessons for 2012
+
| bgcolor="#eeeeee" align="center" | '''Langyu Hu (Language: Chinese)'''<br>RFID Security
 
|-
 
|-
| width="14%" height="49" align="right" | 11:00 – 11:30  
+
| height="17" width="14%" align="right" | 12:00 – 14:30  
| align="CENTER" bgcolor="#b9c2dc" | '''Sponsor'''<br> TBD
+
| bgcolor="#d98b66" align="center" | '''Lunch &amp; Networking'''
 
|-
 
|-
| width="14%" height="49" align="right" | 11:30 – 12:00  
+
| height="49" width="14%" align="right" | 14:30 – 15:00  
| align="CENTER" bgcolor="#eeeeee" | '''Sebastien Deleersnyder'''<br> OWASP Live CD
+
| bgcolor="#b9c2dc" align="center" | '''Yongjian Guo (Language: Chinese)'''<br>Information Security Forensics
 
|-
 
|-
| width="14%" height="17" align="right" | 12:00 – 13:30  
+
| height="49" width="14%" align="right" | 15:00 – 15:30  
| align="CENTER" bgcolor="#d98b66" | '''Lunch'''
+
| bgcolor="#eeeeee" align="center" | '''Chenming Zhong (Language: Chinese)'''<br>Overview of Website Security
 
|-
 
|-
| width="14%" height="49" align="right" | 13:30 – 14:00  
+
| height="49" width="14%" align="right" | 15:30 – 16:00  
| align="CENTER" bgcolor="#b9c2dc" | TBD<br>TBD
+
| bgcolor="#b9c2dc" align="center" | '''Tony (Language: Chinese)'''<br>2011 Application Security with 0-Day Vulnerability Analysis
 
|-
 
|-
| width="14%" height="49" align="right" | 14:00 – 14:30
+
| height="49" width="14%" align="right" | 16:00 – 16:15
| align="CENTER" bgcolor="#eeeeee" | '''Tony'''<br> 2011 Application Security with 0-Day Vulnerability Analysis
+
| bgcolor="#eeeeee" align="center" | Lucky Draw
 
|-
 
|-
| width="14%" height="49" align="right" | 14:30 15:00
+
| height="49" width="14%" align="right" | 16:15 16:45
| align="CENTER" bgcolor="#b9c2dc" | TBD<br>TBD
+
| bgcolor="#b9c2dc" align="center" | '''Yongbo Liu (Language: Chinese)'''<br>The Challenges of China's Post Information Security Era
 
|-
 
|-
| width="14%" height="49" align="right" | 15:00 – 15:30
+
| height="49" width="14%" align="right" | 16:45 17:15  
| align="CENTER" bgcolor="#eeeeee" | TBD<br>TBD
+
| bgcolor="#eeeeee" align="center" | '''Dr. Jianchun Jiang (Language: Chinese)<br>NSACE - The Network Security Capability Oriented Training and Certificates'''
 
|-
 
|-
| width="14%" height="49" align="right" | 15:30 – 17:45  
+
| height="49" width="14%" align="right" | 17:15 – 17:45  
| align="CENTER" bgcolor="#b9c2dc" | Exhibition of Internet Security Products
+
| bgcolor="#b9c2dc" align="center" | <br>Future Plan of OWASP China and Release of WAF Testing Benchmark
 
|-
 
|-
| width="14%" height="17" align="right" | 17:45 – 18:00  
+
| height="17" width="14%" align="right" | 17:45 – 18:00  
| align="CENTER" bgcolor="#eeeeee" | '''Closing'''
+
| bgcolor="#eeeeee" align="center" | '''Closing'''
 
|}
 
|}
</center>
 
<br>
 
  
<br>  
+
<br>
 +
 
 +
<br>
 +
 
 +
= Training  =
 +
<center></center>
  
==== Training  ====
 
<center>
 
 
== '''November 10th'''  ==
 
== '''November 10th'''  ==
  
Line 345: Line 393:
 
| width="14%" height="49" align="right" | 14:00 – 18:00  
 
| width="14%" height="49" align="right" | 14:00 – 18:00  
 
| align="CENTER" bgcolor="#b9c2dc" | '''Wei Zhang'''<br> Secured Framework Design for Online Banking System
 
| align="CENTER" bgcolor="#b9c2dc" | '''Wei Zhang'''<br> Secured Framework Design for Online Banking System
 +
|-
 +
| width="14%" height="49" align="right" | 14:00 – 18:00
 +
| align="CENTER" bgcolor="#8595c2" | '''Tony''' <br> Application Security Training
 
|}
 
|}
  
Line 360: Line 411:
 
|}
 
|}
 
</center>  
 
</center>  
==== Sponsors  ====
+
= Sponsors  =
  
 
=== Sponsor US!  ===
 
=== Sponsor US!  ===
  
 
We are still soliciting sponsors for the OWASP Global AppSec Asia 2011. An exhibit hall will be held for vendor booths and presentations.  
 
We are still soliciting sponsors for the OWASP Global AppSec Asia 2011. An exhibit hall will be held for vendor booths and presentations.  
<fck:hr>
+
 
 
More than 500 people attended the OWASP China conference last year. As a sponsor, you will gain exclusive access to companies in Asia through a limited number of expo floor slots.  
 
More than 500 people attended the OWASP China conference last year. As a sponsor, you will gain exclusive access to companies in Asia through a limited number of expo floor slots.  
  
Line 388: Line 439:
 
</iflanguage>  
 
</iflanguage>  
  
 +
'''Gold Sponsor:'''
 
{| class="FCK__ShowTableBorders" style="border: 1px solid rgb(204, 204, 204); width: 100%; background-color: rgb(255, 255, 255);"
 
{| class="FCK__ShowTableBorders" style="border: 1px solid rgb(204, 204, 204); width: 100%; background-color: rgb(255, 255, 255);"
 
|-
 
|-
 
| style="text-align: center; color: rgb(0, 0, 0);" |  
 
| style="text-align: center; color: rgb(0, 0, 0);" |  
{{MemberLinks|link=http://english.venustech.com.cn|logo=Venustech.gif}} {{MemberLinks|link=http://www.dumasoftware.com/about.asp?ArticleID=190|logo=Dumalogo.jpg}} {{MemberLinks|link=http://www.szboweb.com/?site_language=english|logo=SZB Blogo 40.jpg}} {{MemberLinks|link=http://www.dbappsecurity.com.cn|logo=Dbappsecurity.jpg}} {{MemberLinks|link=http://www.ankki.com/|logo=Ankki.gif}} <br> <br> {{MemberLinks|link=https://www.trustwave.com/|logo=Trustwave-Logo-with-Tagline.jpg}} {{MemberLinks|link=http://www.mainway.net/|logo=Mainway.jpg}} <br>
+
{{MemberLinks|link=http://www.huaweisymantec.com/cn/|logo=HS.jpg}} {{MemberLinks|link=http://www.yxlink.com/|logo=Yxlink.jpg}}  
<fck:hr>
 
 
<br>  
 
<br>  
</fck:hr>
 
 
|}
 
|}
  
 +
'''Training Sponsor:'''
 +
{| class="FCK__ShowTableBorders" style="border: 1px solid rgb(204, 204, 204); width: 100%; background-color: rgb(255, 255, 255);"
 +
|-
 +
| style="text-align: center; color: rgb(0, 0, 0);" |
 +
{{MemberLinks|link=http://www.nsfocus.com/en/|logo=NSFOCUS.jpg}}
 +
<br>
 +
|}
 +
 +
'''Supported Organizations:'''
 +
{| class="FCK__ShowTableBorders" style="border: 1px solid rgb(204, 204, 204); width: 100%; background-color: rgb(255, 255, 255);"
 +
|-
 +
| style="text-align: center; color: rgb(0, 0, 0);" |
 +
{{MemberLinks|link=https://www.isc2.org/|logo=Isc2_logo.jpg}} {{MemberLinks|link=http://www.nsace.org.cn/|logo=NSACE.jpg}}
 +
<br>
 +
|}
 +
 +
'''Exhibitors:'''
 +
{| class="FCK__ShowTableBorders" style="border: 1px solid rgb(204, 204, 204); width: 100%; background-color: rgb(255, 255, 255);"
 +
|-
 +
| style="text-align: center; color: rgb(0, 0, 0);" |
 +
{{MemberLinks|link=http://english.venustech.com.cn|logo=Venustech.gif}} {{MemberLinks|link=http://www.dumasoftware.com/about.asp?ArticleID=190|logo=Dumalogo.jpg}} {{MemberLinks|link=http://www.szboweb.com/?site_language=english|logo=SZB Blogo 40.jpg}}<br> <br>
 +
{{MemberLinks|link=http://www.dbappsecurity.com.cn|logo=Dbappsecurity.jpg}} {{MemberLinks|link=http://www.ankki.com/|logo=Ankki.gif}} {{MemberLinks|link=https://www.trustwave.com/|logo=Trustwave-Logo-with-Tagline.jpg}} <br> <br>
 +
{{MemberLinks|link=http://www.mainway.net/|logo=Mainway.jpg}} {{MemberLinks|link=http://www.anchiva.com/|logo=Anchiva.png}}<br> <br>{{MemberLinks|link=http://www.legendsec.com/|logo=SECWORLD.gif‎‎}} {{MemberLinks|link=http://www.knownsec.com/en//|logo=Knownsec.gif‎}}
 +
<br>
 +
|}
 +
 +
'''Cooperators:''' 
 +
{| class="FCK__ShowTableBorders" style="border: 1px solid rgb(204, 204, 204); width: 100%; background-color: rgb(255, 255, 255);"
 +
|-
 +
| style="text-align: center; color: rgb(0, 0, 0);" |
 +
{{MemberLinks|link=http://aiscanner.sinaapp.com/site/|logo=Aiscanner.png}} {{MemberLinks|link=http://www.broadview.com.cn/|logo=Broadview.jpg}}
 +
|}
 
<br> <br>  
 
<br> <br>  
  
<br>
 
  
==== Media Partners  ====
+
= Media Partners  =
  
 
'''International Media:'''  
 
'''International Media:'''  
Line 419: Line 500:
 
| style="text-align: center; color: rgb(0, 0, 0);" |  
 
| style="text-align: center; color: rgb(0, 0, 0);" |  
 
{{MemberLinks|link=https://www.isc2.org/|logo=Isc2 logo.jpg}} {{MemberLinks|link=http://fanaticmedia.com/infosecurity/|logo=InfoSecurity logo.jpg}} {{MemberLinks|link=http://www.fanaticmedia.com/|logo=Fanatic Media Logo.jpg}} {{MemberLinks|link=http://chmag.in/|logo=Chmag.in.png}} <br>  
 
{{MemberLinks|link=https://www.isc2.org/|logo=Isc2 logo.jpg}} {{MemberLinks|link=http://fanaticmedia.com/infosecurity/|logo=InfoSecurity logo.jpg}} {{MemberLinks|link=http://www.fanaticmedia.com/|logo=Fanatic Media Logo.jpg}} {{MemberLinks|link=http://chmag.in/|logo=Chmag.in.png}} <br>  
<fck:hr>
+
 
 
<br>  
 
<br>  
</fck:hr>
+
 
 
|}
 
|}
  
Line 439: Line 520:
 
|-
 
|-
 
| style="text-align: center; color: rgb(0, 0, 0);" |  
 
| style="text-align: center; color: rgb(0, 0, 0);" |  
{{MemberLinks|link=http://www.51cto.com//|logo=51CTO.jpg}} {{MemberLinks|link=http://www.it168.com/|logo=IT168.JPG}} {{MemberLinks|link=http://www.hackerxfiles.net/forum.php/|logo=Hackfiles.png}} {{MemberLinks|link=http://www.chinabyte.com//|logo=Byte.jpg}} {{MemberLinks|link=http://www.ciotimes.com//|logo=CIOlogo.jpg}}{{MemberLinks|link=http://www.csdn.net//|logo=CSDN.jpg}}<br>  
+
{{MemberLinks|link=http://www.51cto.com//|logo=51CTO.jpg}} {{MemberLinks|link=http://www.it168.com/|logo=IT168.JPG}} {{MemberLinks|link=http://www.hackerxfiles.net/forum.php/|logo=Hackfiles.png}} {{MemberLinks|link=http://www.chinabyte.com//|logo=Byte.jpg}} <br> <br>{{MemberLinks|link=http://www.ciotimes.com//|logo=CIOlogo.jpg}}{{MemberLinks|link=http://www.csdn.net//|logo=CSDN.jpg}}{{MemberLinks|link=http://www.searchsecurity.com.cn/|logo=TT-China.gif}}{{MemberLinks|link=http://www.itxinwen.com/|logo=IT55464e1a65b095fb7f51.gif}} <br> <br>{{MemberLinks|link=http://www.techweb.com.cn/|logo=TechWeblogo.jpg}}{{MemberLinks|link=http://www.ittime.com.cn/|logo=IT65f64ee35468520a-60.gif}}{{MemberLinks|link=http://www.zdnet.com.cn/|logo=Zdnet.gif‎}}{{MemberLinks|link=http://www.ittime.com.cn/|logo=Xinxianquanyujishu.jpg}}<br>  
<fck:hr>
+
 
 
<br>  
 
<br>  
</fck:hr>
+
 
 
|}
 
|}
  
==== Team  ====
+
= Team  =
  
 
*[mailto:heleng@owasp.org Contact us]
 
*[mailto:heleng@owasp.org Contact us]
Line 460: Line 541:
 
*[mailto:zhendong.yu@owasp.org Zhendong Yu 于振东]
 
*[mailto:zhendong.yu@owasp.org Zhendong Yu 于振东]
  
==== Expense  ====
+
= Expense  =
  
 
=== Registration Fee  ===
 
=== Registration Fee  ===
Line 470: Line 551:
 
Please check the local hotel website for detail information.  
 
Please check the local hotel website for detail information.  
  
==== Logistics ====
+
= Logistics =
  
 
=== Venue  ===
 
=== Venue  ===
Line 490: Line 571:
 
Add:No.8 Beichen Dong Road, Chaoyang District, Beijing P. R. China 100101  
 
Add:No.8 Beichen Dong Road, Chaoyang District, Beijing P. R. China 100101  
  
Price for Standard Rooms: RMB 580/day (include Chinese-style breakfast)(Four star)  
+
Price for advanced Rooms: RMB 620/day (include Chinese-style breakfast)(Four star)  
 
 
2. [http://www.huiyuangongyu.com.cn/en/main.html Huiyuan Service Apartment]
 
  
Address: No. 8 North Star East Road, Chaoyang District, Beijing  
+
2. Aoyou Hotel
 
+
Address: No. 8 North Star East Road, Chaoyang District, Beijing
Price for Standard Rooms: RMB 390/day (Breakfast: RMB 30/person)--four star
+
( 10 minutes walk to conference center)
 
+
single room: RMB 240(including Breakfast)
Price for standard Rooms: RMB 290/day (Breakfast: RMB 30/person)--three star
+
Double room: RMB 320(including breakfast).
  
 
=== Travel  ===
 
=== Travel  ===
Line 507: Line 586:
 
*For detailed information on obtaining a business visa for this event, please refer to [http://www.china-embassy.org/eng/hzqz/zgqz/t84247.htm Chinese embassy]
 
*For detailed information on obtaining a business visa for this event, please refer to [http://www.china-embassy.org/eng/hzqz/zgqz/t84247.htm Chinese embassy]
  
==== Chapter Leader Workshop  ====
+
= Chapter Leader Workshop =
 +
 
 +
  '''[https://docs.google.com/a/owasp.org/document/d/1z_3ehI9T_lIeMmkeUo9QL9mbjh8ygSKquVlBaJY7ed4/edit Meeting Minutes from Chapters Workshop]'''
 +
 
 +
'''[https://plus.google.com/photos/100460852248386556939/albums/5676383343638946545 Photos of Chapters Workshop]'''
  
 
== '''What is the Chapter Leader Workshop?'''  ==
 
== '''What is the Chapter Leader Workshop?'''  ==
Line 553: Line 636:
  
 
<headertabs />  
 
<headertabs />  
[[Category:OWASP_AppSec_Conference]] [[Category:OWASP_AppSec_Asia_Summit_2011]] [[Category:China]]</fck:hr></fck:hr></fck:hr></fck:hr></fck:hr></fck:hr></fck:hr></fck:hr></fck:hr></fck:hr></fck:hr></fck:hr></fck:hr>
+
[[Category:OWASP_AppSec_Conference]] [[Category:OWASP_AppSec_Asia_Summit_2011]] [[Category:China]]

Latest revision as of 10:39, 1 February 2012

OWASP 2011 AppSec Asia.jpg


OWASP Global AppSec Asia Pacific 2011 - Beijing China

OWASP China-Mainland Chapter will host OWASP Global AppSec Asia 2011 in Beijing, China from Nov. 8 to Nov. 11, 2011. The summit will gather OWASP leaders, security experts, executives, technical thought leaders, developers, scientists and researchers from Asia and around the world for in-depth discussions of cutting-edge application security issues. The summit will draw participation from major Chinese and global organizations across various verticals including government, information technology, services and consulting, telecommunications, finance, e-commerce, Internet, universities and research institutes. About 800 people are expected to attend the summit, which will be covered by major news media. Panel discussions, vendor exhibit, and dinners will be held at the summit, providing sufficient networking opportunities.