This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Template:OWASP IL 2012 Agenda"

From OWASP
Jump to: navigation, search
 
(8 intermediate revisions by the same user not shown)
Line 6: Line 6:
 
|style="border-style: solid; border-width: 1px;color:#1F497D" align="center" valign="center" | 09:15-09:45  
 
|style="border-style: solid; border-width: 1px;color:#1F497D" align="center" valign="center" | 09:15-09:45  
 
| align=center valign="center" colspan="2" style="border-style: solid; border-width: 1px;font-size:11pt" | '''Opening Words''' <br>
 
| align=center valign="center" colspan="2" style="border-style: solid; border-width: 1px;font-size:11pt" | '''Opening Words''' <br>
''Ofer Maor - Chairman, OWASP Israel; Global Membership Committee, OWASP''
+
''Ofer Maor - Chairman, OWASP Israel; Global Membership Committee, OWASP''<br>
 +
''Dr. Anat Bremler-Barr, Efi Arazi School of Computer Science, IDC''
 
|- style="border-style: solid; border-width: 1px;font-size:10pt"
 
|- style="border-style: solid; border-width: 1px;font-size:10pt"
 
|style="border-style: solid; border-width: 1px;color:#1F497D" height="25" align="center" valign="center" | 09:45-10:10
 
|style="border-style: solid; border-width: 1px;color:#1F497D" height="25" align="center" valign="center" | 09:45-10:10
Line 20: Line 21:
 
|  align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" | '''The Diviner – Digital Clairvoyance: Getting an Insight<br>Into Server Code & Memory Using Blackbox Techniques'''  <br>
 
|  align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" | '''The Diviner – Digital Clairvoyance: Getting an Insight<br>Into Server Code & Memory Using Blackbox Techniques'''  <br>
 
''Shay Chen, CTO, Hacktics ASC, Ernst & Young''<br>
 
''Shay Chen, CTO, Hacktics ASC, Ernst & Young''<br>
''Eran Tamir, Team Leader, Hacktics ASC, Ernst & Young''
+
''Eran Tamari, Team Leader, Hacktics ASC, Ernst & Young''
|  align="center" valign="top" style="font-size:11pt"  | '''Case Study - Providing Secure SDLC in an Agile Environment Using ESAPI '''  
+
|  align="center" valign="top" style="font-size:11pt"  | '''Case Study:<br>Providing Secure SDLC in an Agile Environment Using ESAPI '''  
 
''Yair Rovek, Security Specialist, Liveperson''
 
''Yair Rovek, Security Specialist, Liveperson''
 
|- style="border-style: solid; border-width: 1px;font-size:10pt"
 
|- style="border-style: solid; border-width: 1px;font-size:10pt"
Line 43: Line 44:
 
|- style="border-style: solid; border-width: 1px;font-size:10pt"
 
|- style="border-style: solid; border-width: 1px;font-size:10pt"
 
|style="border-style: solid; border-width: 1px;color:#1F497D" height="25" align="center" valign="center" | 13:30-14:15
 
|style="border-style: solid; border-width: 1px;color:#1F497D" height="25" align="center" valign="center" | 13:30-14:15
|  align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5  | '''[[OWASP_Israel_2011_Presentations#CMS_and_Other_Giants_.E2.80.93_The_Nightmare_of_AppSec_Testing|CMS And Other Giants - The Nightmare of AppSec Testing]]''' ''([[Media:OWASPIL2011-IreneAbezgauz-CMSnOtherGiants.pptx|Presentation]])''
+
|  align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5  | '''Advanced Pen-Testing of iPhone Applications'''  
''Irene Abezgauz, Product Manager, Seeker Security''
+
''Chilik Tamir, Chief Scientist, AppSec Labs ''
|  align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5  | '''[[OWASP_Israel_2011_Presentations#Agile_.2B_SDL_.E2.80.93_Concepts_and_Misconceptions|Agile + SDL – Concepts and Misconceptions]]''' ''([[Media:OWASPIL2011-Douglen-Bregman-AgileSDL.ppt|Presentation]])''
+
|  align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5  | '''Positive Logic XSS Detection & Prevention<br>using Generalized JavaScript Assembly '''  
''Avi Douglen, Security Architect, Aware Security''<br>
+
''Tsvi Cherny, Interdisciplinary Center''
''Nir Bregman, Senior Project Manager, HP Software''
 
 
|- style="border-style: solid; border-width: 1px;font-size:10pt"
 
|- style="border-style: solid; border-width: 1px;font-size:10pt"
|style="border-style: solid; border-width: 1px;color:#1F497D" height="25" align="center" valign="center" | 14:30-15:15
+
|style="border-style: solid; border-width: 1px;color:#1F497D" height="25" align="center" valign="center" | 14:15-15:00
|  align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5  | '''[[OWASP_Israel_2011_Presentations#When_Crypto_Goes_Wrong|When Crypto Goes Wrong]]''' ''([[Media:OWASPIL2011-ErezMetula-WhenCryptoGoesWrong.pdf|Presentation]])''
+
|  align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5  | '''Attacking Android Mobile Applications'''  
 
''Erez Metula, Founder, AppSec Labs''  
 
''Erez Metula, Founder, AppSec Labs''  
|  align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5  | '''[[OWASP_Israel_2011_Presentations#Advanced_Techniques_.26_Tools_for_Testing_Binary_Protocols|Advanced Techniques & Tools for Testing Binary Protocols]]''' ''([[Media:OWSPIL2011_Tamir_Tampering101.pdf|Presentation]])''
+
|  align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5  | '''Application Counter Attack'''  
''Chilik Tamir, Information Security Architect, AppSec Labs''
+
''Ziv Gadot, SOC Team Leader, Radware''
 
|- style="border-style: solid; border-width: 1px;font-size:10pt"
 
|- style="border-style: solid; border-width: 1px;font-size:10pt"
|style="border-style: solid; border-width: 1px;color:#1F497D" height="40" align="center" valign="center" | 15:15-15:30
+
|style="border-style: solid; border-width: 1px;color:#1F497D" height="40" align="center" valign="center" | 15:00-15:15
 
|  valign="center" align="center" style="border-style: solid; border-width: 1px;font-size:12pt" colspan="2" | '''Coffee Break'''
 
|  valign="center" align="center" style="border-style: solid; border-width: 1px;font-size:12pt" colspan="2" | '''Coffee Break'''
 
|- style="border-style: solid; border-width: 1px;font-size:10pt"
 
|- style="border-style: solid; border-width: 1px;font-size:10pt"
|style="border-style: solid; border-width: 1px;color:#1F497D" height="25" align="center" valign="center" | 15:30-16:15
+
|style="border-style: solid; border-width: 1px;color:#1F497D" height="25" align="center" valign="center" | 15:15-15:45
|  align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5  | '''[[OWASP_Israel_2011_Presentations#Security_Testing_of_RESTful_Services|Security Testing of RESTful Services]]''' ''([[Media:Security testing for REST applications.pdf|Presentation]])''
+
|  align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5  | '''The Dark World of Mobile Payments'''  
''Ofer Shezaf, Head of AppSec Research, HP''<br>
+
''Nir Valtman, CSO, Retalix''
''Eyal Fingold, Senior Security Developer, HP''
+
|  align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5  | '''Identifying Maladvertisements'''  
|  align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5  | '''[[OWASP_Israel_2011_Presentations#Hey.2C_What.E2.80.99s_your_App_doing_on_my_.28Smart.29Phone.3F|Hey, What’s your App doing on my (Smart)Phone?]]''' ''([[Media:OWASPIL2011_Zalalichin_Mobile_Security.pdf|Presentation]])''
+
''Maty Siman, CTO, Checkmarx''<br>''Meny Duek, Director of R&D, Mediamind''
''Shay Zalalichin, CTO, Comsec Consulting''
 
 
|- style="font-size:10pt"
 
|- style="font-size:10pt"
|style="border-style: solid; border-width: 1px;color:#1F497D" align="center" valign="center" | 16:15-17:00
+
|style="border-style: solid; border-width: 1px;color:#1F497D" height="25" align="center" valign="center" | 15:45-16:15
| align=center valign="center" colspan="2" style="border-style: solid; border-width: 1px;font-size:11pt" | '''[[OWASP_Israel_2011_Presentations#The_Bank_Job_II|The Bank Job II]]''' ''([http://prezi.com/wipzu1bkfwnd/the-bank-job-ii-owasp-2011-final/ Presentation])''
+
| align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5  | '''Stylish XSS: Fonts Name Injection'''  
''Adi Sharabani, Cross-Rational Security Strategy and Architecture, IBM''
+
''Adi Cohen, Security Researcher, IBM''
 +
|  align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5  | '''My Authentication Album:<br>Adaptive Image-Based Login Mechanism '''  
 +
''Ronen Margulis, Bar Ilan University''
 
|- style="font-size:10pt"
 
|- style="font-size:10pt"
|style="border-style: solid; border-width: 1px;color:#1F497D" align="center" valign="center" | 17:00-17:05
+
|style="border-style: solid; border-width: 1px;color:#1F497D" align="center" valign="center" | 16:15-16:45
 +
| align=center valign="center" colspan="2" style="border-style: solid; border-width: 1px;font-size:11pt" | '''Guest Lecture<br>&nbsp;<br>The New art of WAR & PEACE- a REAL FANTASY'''<br> A drill down to the "money time": Was Iran Stuxnet’s main target? how economy is a battle zone?<br>
 +
''Guy Phillip Goldstein (Author of "Babel Minute Zero")''
 +
|- style="font-size:10pt"
 +
|style="border-style: solid; border-width: 1px;color:#1F497D" align="center" valign="center" | 16:45-17:00
 
| align=center valign="center" colspan="2" style="border-style: solid; border-width: 1px;font-size:11pt" | '''End Notes''' &nbsp;
 
| align=center valign="center" colspan="2" style="border-style: solid; border-width: 1px;font-size:11pt" | '''End Notes''' &nbsp;
 
''Ofer Maor - Chairman, OWASP Israel; Global Membership Committee, OWASP''
 
''Ofer Maor - Chairman, OWASP Israel; Global Membership Committee, OWASP''
 
|}
 
|}

Latest revision as of 17:07, 1 September 2012

08:45-09:15 Registration, Gathering, Socializing & Networking
09:15-09:45 Opening Words

Ofer Maor - Chairman, OWASP Israel; Global Membership Committee, OWASP
Dr. Anat Bremler-Barr, Efi Arazi School of Computer Science, IDC

09:45-10:10 OWASP Top 10 Hebrew Edition

Or Katz, OWASP Israel Board

  Breakers (Track #1) Defenders (Track #2)
10:15-11:00 The Diviner – Digital Clairvoyance: Getting an Insight
Into Server Code & Memory Using Blackbox Techniques

Shay Chen, CTO, Hacktics ASC, Ernst & Young
Eran Tamari, Team Leader, Hacktics ASC, Ernst & Young

Case Study:
Providing Secure SDLC in an Agile Environment Using ESAPI

Yair Rovek, Security Specialist, Liveperson

11:00-11:15 Coffee Break
11:15-12:00 FYI: You've Got LFI

Tal Beery, Web Security Research Team Leader, Imperva

I>S+D! – Integrated Application Security Testing (IAST),
Beyond SAST/DAST

Ofer Maor, CTO, Quotium

12:00-12:30 Zip It! – Owning Archived File Uploads 

Alex Landa, Security Researcher, IBM

Secure Development Lifecycle – Lessons Learned  

Boaz Shunami, Founder, Komodo Consulting

12:30-13:30 Lunch Break
13:30-14:15 Advanced Pen-Testing of iPhone Applications

Chilik Tamir, Chief Scientist, AppSec Labs

Positive Logic XSS Detection & Prevention
using Generalized JavaScript Assembly 

Tsvi Cherny, Interdisciplinary Center

14:15-15:00 Attacking Android Mobile Applications

Erez Metula, Founder, AppSec Labs

Application Counter Attack

Ziv Gadot, SOC Team Leader, Radware

15:00-15:15 Coffee Break
15:15-15:45 The Dark World of Mobile Payments

Nir Valtman, CSO, Retalix

Identifying Maladvertisements

Maty Siman, CTO, Checkmarx
Meny Duek, Director of R&D, Mediamind

15:45-16:15 Stylish XSS: Fonts Name Injection

Adi Cohen, Security Researcher, IBM

My Authentication Album:
Adaptive Image-Based Login Mechanism 

Ronen Margulis, Bar Ilan University

16:15-16:45 Guest Lecture
 
The New art of WAR & PEACE- a REAL FANTASY

A drill down to the "money time": Was Iran Stuxnet’s main target? how economy is a battle zone?

Guy Phillip Goldstein (Author of "Babel Minute Zero")

16:45-17:00 End Notes  

Ofer Maor - Chairman, OWASP Israel; Global Membership Committee, OWASP