This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "OWASP AppSec DC 2012/Schedule/4-5-2012"

From OWASP
Jump to: navigation, search
Line 16: Line 16:
 
|  align=center width=200 valign=middle height=60 bgcolor=#ffdf80 align=center | [https://www.owasp.org/index.php/OWASP_AppSec_DC_2012/Friends_dont_let_friends_store_passwords_in_source_code Friends don't let friends store passwords in source code]<br><br>
 
|  align=center width=200 valign=middle height=60 bgcolor=#ffdf80 align=center | [https://www.owasp.org/index.php/OWASP_AppSec_DC_2012/Friends_dont_let_friends_store_passwords_in_source_code Friends don't let friends store passwords in source code]<br><br>
 
Neil Matatall
 
Neil Matatall
|  align=center width=200 valign=middle height=60 bgcolor=#a0c0e0 align=center rowspan=2 | [https://www.owasp.org/index.php/OWASP_AppSec_DC_2012/Mobile_application_security_with_Facebook__Twitter Mobile application security with Facebook / Twitter]<br><br>
+
|  align=center width=200 valign=middle height=60 bgcolor=#a0c0e0 align=center rowspan=2 | [https://www.owasp.org/index.php/OWASP_AppSec_DC_2012/Smart_Bombs_Mobile_Vulnerability_and_Exploitation Smart Bombs: Mobile Vulnerability and Exploitation]<br><br>
Kartik Trivedi and Lenin Aboagye
+
Kevin Johnson, John Sawyer and Tom Eston
 
|  align=center width=200 valign=middle height=60 bgcolor=#b3ff99 align=center rowspan=2 | [https://www.owasp.org/index.php/OWASP_AppSec_DC_2012/Overcoming_the_Quality_vs_Quantity_Problem_in_SoftwareSecurity_Testing Overcoming the Quality vs. Quantity Problem in Software Security Testing]<br><br>
 
|  align=center width=200 valign=middle height=60 bgcolor=#b3ff99 align=center rowspan=2 | [https://www.owasp.org/index.php/OWASP_AppSec_DC_2012/Overcoming_the_Quality_vs_Quantity_Problem_in_SoftwareSecurity_Testing Overcoming the Quality vs. Quantity Problem in Software Security Testing]<br><br>
 
Rafal Los
 
Rafal Los
Line 84: Line 84:
 
|  align=center width=200 valign=middle height=60 bgcolor=#ffdf80 align=center | [https://www.owasp.org/index.php/OWASP_AppSec_DC_2012/Cloudbased_dWAF_A_Real_World_Deployment_Case_Study Cloud-based dWAF: A Real World Deployment Case Study]<br><br>
 
|  align=center width=200 valign=middle height=60 bgcolor=#ffdf80 align=center | [https://www.owasp.org/index.php/OWASP_AppSec_DC_2012/Cloudbased_dWAF_A_Real_World_Deployment_Case_Study Cloud-based dWAF: A Real World Deployment Case Study]<br><br>
 
Alexander Meisel
 
Alexander Meisel
|  align=center width=200 valign=middle height=60 bgcolor=#a0c0e0 align=center | [https://www.owasp.org/index.php/OWASP_AppSec_DC_2012/Smart_Bombs_Mobile_Vulnerability_and_Exploitation Smart Bombs: Mobile Vulnerability and Exploitation]<br><br>
+
|  align=center width=200 valign=middle height=60 bgcolor=#a0c0e0 align=center | [https://www.owasp.org/index.php/OWASP_AppSec_DC_2012/Threat_Profiling_the_Mobile_Application_Ecosystem Threat Profiling the Mobile Application Ecosystem]<br><br>
Kevin Johnson, John Sawyer and Tom Eston
+
Rafal Los
 
|  align=center width=200 valign=middle height=60 bgcolor=#b3ff99 align=center | [https://www.owasp.org/index.php/OWASP_AppSec_DC_2012/What_can_an_Acquirer_do_to_prevent_developers_from_makedangerous_software_errors What can an Acquirer do to prevent developers from make dangerous software errors?]<br><br>
 
|  align=center width=200 valign=middle height=60 bgcolor=#b3ff99 align=center | [https://www.owasp.org/index.php/OWASP_AppSec_DC_2012/What_can_an_Acquirer_do_to_prevent_developers_from_makedangerous_software_errors What can an Acquirer do to prevent developers from make dangerous software errors?]<br><br>
 
Michele Moss and Don Davidson
 
Michele Moss and Don Davidson

Revision as of 01:00, 9 March 2012

Plenary Day 2 - 4/5/2012
Critical Infrastructure Defend! On the Go SDLC
7:30 AM - 9:00 AM Registration
9:00 AM - 9:50 AM Pentesting Smart Grid Web Apps

Justin Searle

Friends don't let friends store passwords in source code

Neil Matatall

Smart Bombs: Mobile Vulnerability and Exploitation

Kevin Johnson, John Sawyer and Tom Eston

Overcoming the Quality vs. Quantity Problem in Software Security Testing

Rafal Los

Web Application Defense with Bayesian Attack Analysis

Ryan Barnett

9:50 AM - 10:00 AM Coffee Breakß
10:00 AM - 10:50 AM Vulnerabilities in Industrial Control Systems

ICS-CERT

Access Control

Jim Manico

Software Security Goes Mobile

Jacob West

Baking In Security, Sweet, Secure, Cupcakes

Ken Johnson and Matt Ahrens

10:50 AM - 11:00 AM Coffee Break
11:00 AM - 11:50 AM Denial of Surface.

Eireann Leverett

SharePoint Security 101

Rob Rachwald, Amichai Shulman and Noa Bar-Yosef

Behind Enemy Lines - Practical& Triage Approaches to Mobile Security Abroad - 2012 Edition

Justin Morehouse

Understanding IAST - More Context, Better Analysis

Jeff Williams

11:50 AM - 1:00 PM Lunch
1:00 PM - 1:50 PM Project Basecamp: News from Camp 4

Reid Wightman

Enterprise Security API (ESAPI) for C Plus Plus

Dan Amodio

Whack-a-Mobile II: Mobile App Pen Testing with the MobiSec Live Environment

Kevin Johnson and Tony Delagrange

Baking Security In - How to Get Every IT Architect to Become a Security Ambassador

Michele Guel

1:50 PM - 2:00 PM Coffee Break
2:00 PM - 2:50 PM Real world backdoors on industrial devices

Ruben Santamarta

Dynamic DAST/WAF Integration

Ryan Barnett

An In-Depth Introduction to the Android Permissions Model, and How to Secure Multi-Component Applications

Jeff Six

Teaching an Old Dog New Tricks: Securing Development with PMD

Joe Hemler

2:50 PM - 3:00 PM Coffee Break
3:00 PM - 3:50 PM AMI Security

John Sawyer and Don Weber

Cloud-based dWAF: A Real World Deployment Case Study

Alexander Meisel

Threat Profiling the Mobile Application Ecosystem

Rafal Los

What can an Acquirer do to prevent developers from make dangerous software errors?

Michele Moss and Don Davidson

3:50 PM - 4:00 PM Coffee Break
4:00 PM - 4:50 PM Securing Critical Infrastructure

Francis Cianfrocca and Bob Lam

Using PHPIDS to Understand Attacks Trends

Salvador Grec

Mobile Application Security - Who, how and why

Mike Park and Charles Henderson

Private information Protection in Cloud Computing _ Laws, Compliance and Cloud Security Misconceptions

Mikhail Utin and Daniil Utin

5:00 PM Closing Remarks