This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "OWASP New Zealand Day 2012"
From OWASP
Adrian Hayes (talk | contribs) |
Nick Freeman (talk | contribs) |
||
(8 intermediate revisions by 2 users not shown) | |||
Line 21: | Line 21: | ||
==Registration== | ==Registration== | ||
− | + | <center>Registrations are now closed.</center> | |
− | |||
− | <center> | ||
Line 29: | Line 27: | ||
* CFP & CFT closes: 22nd July 2012 [ CLOSED ] | * CFP & CFT closes: 22nd July 2012 [ CLOSED ] | ||
− | * Conference Agenda due: 30th July 2012 | + | * Conference Agenda due: 30th July 2012 [ CLOSED ] |
− | * Conference Registration deadline: 20th August 2012 | + | * Conference Registration deadline: 20th August 2012 [ CLOSED ] |
− | * Training Registration deadline: | + | * Training Registration deadline: 27th August 2012 [ CLOSED ] |
* Training Day date: 30th August 2012 | * Training Day date: 30th August 2012 | ||
* Conference Day date: 31st August 2012 | * Conference Day date: 31st August 2012 | ||
Line 67: | Line 65: | ||
<td> </td> | <td> </td> | ||
<td> </td> | <td> </td> | ||
− | <td><center>[ | + | <td><center>[[File:F5aura-small.jpg|center|350px|link=http://www.aurainfosec.com/]]</center></td> |
</tr> | </tr> | ||
<tr> | <tr> | ||
Line 200: | Line 198: | ||
− | = | + | = Presentations - UPDATED = |
− | ==Conference Schedule== | + | ==Conference Schedule / Presentations== |
<center> | <center> | ||
31st August 2012 | 31st August 2012 | ||
<table width="80%"> | <table width="80%"> | ||
<tr> | <tr> | ||
− | <td width="7%">08:30</td> | + | <td width="7%" valign="top">08:30</td> |
<td colspan="2" style="background-color: #8595C2">Registration</td> | <td colspan="2" style="background-color: #8595C2">Registration</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td width="7%">09:00</td> | + | <td width="7%" valign="top">09:00</td> |
<td colspan="2" style="background-color: #EEE; text-align: center"> | <td colspan="2" style="background-color: #EEE; text-align: center"> | ||
<b>Welcome to OWASP New Zealand Day 2012</b><br /> | <b>Welcome to OWASP New Zealand Day 2012</b><br /> | ||
− | <i>Adrian Hayes and Nick Freeman (OWASP Leaders)</i> | + | <i>Adrian Hayes and Nick Freeman (OWASP Leaders)<br />Lech Janczewski - The University of Auckland Business School</i> |
</td> | </td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td width="7%">09:10</td> | + | <td width="7%" valign="top">09:10</td> |
<td colspan="2" style="background-color: #B9C2DC; text-align: center"> | <td colspan="2" style="background-color: #B9C2DC; text-align: center"> | ||
− | <b>How do I get into Security? I'm a webdev! (An introduction to in2securITy)</b><br /> | + | <b>[https://www.owasp.org/images/0/01/OWASPNZ2012_AdamB.pdf How do I get into Security? I'm a webdev! (An introduction to in2securITy) (pdf)]</b><br /> |
<i>Adam Bell - in2securITy</i> | <i>Adam Bell - in2securITy</i> | ||
</td> | </td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td width="7%">09:25</td> | + | <td width="7%" valign="top">09:25</td> |
<td colspan="2" style="background-color: #EEE; text-align: center"> | <td colspan="2" style="background-color: #EEE; text-align: center"> | ||
− | <b>Blindsided by Security - The Reality of Web Security for the Visually Impaired</b><br /> | + | <b>[https://www.owasp.org/images/1/1c/OWASPNZ2012_BrittaO_LauraB.pdf Blindsided by Security - The Reality of Web Security for the Visually Impaired (pdf)]</b><br /> |
<i>Laura Bell - Lateral Security and Britta Offergeld - Royal New Zealand Foundation of the Blind</i> | <i>Laura Bell - Lateral Security and Britta Offergeld - Royal New Zealand Foundation of the Blind</i> | ||
</td> | </td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td width="7%">10:00</td> | + | <td width="7%" valign="top">10:00</td> |
<td colspan="2" style="background-color: #B9C2DC; text-align: center"> | <td colspan="2" style="background-color: #B9C2DC; text-align: center"> | ||
− | <b>Internet Junk</b><br /> | + | <b>[https://www.owasp.org/images/6/67/OWASPNZ2012_QuintinR.pdf Internet Junk (pdf)]</b><br /> |
<i>Quintin Russ - SiteHost</i> | <i>Quintin Russ - SiteHost</i> | ||
</td> | </td> | ||
Line 240: | Line 238: | ||
<tr> | <tr> | ||
− | <td width="7%">10:30</td> | + | <td width="7%" valign="top">10:30</td> |
<td colspan="2" style="background-color: #D98B66; text-align: center"> | <td colspan="2" style="background-color: #D98B66; text-align: center"> | ||
<b>Break for Morning Tea</b><br /> | <b>Break for Morning Tea</b><br /> | ||
Line 247: | Line 245: | ||
<tr> | <tr> | ||
− | <td width="7%">11:00</td> | + | <td width="7%" valign="top">11:00</td> |
<td colspan="2" style="background-color: #EEE; text-align: center"> | <td colspan="2" style="background-color: #EEE; text-align: center"> | ||
− | <b>Defeating Cross-Site Scripting with Content Security Policy</b><br /> | + | <b>[http://www.slideshare.net/fmarier/owaspnzday2012 Defeating Cross-Site Scripting with Content Security Policy (external link)]</b><br /> |
<i>Francois Marier - Mozilla</i> | <i>Francois Marier - Mozilla</i> | ||
</td> | </td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td width="7%">11:20</td> | + | <td width="7%" valign="top">11:20</td> |
<td colspan="2" style="background-color: #B9C2DC; text-align: center"> | <td colspan="2" style="background-color: #B9C2DC; text-align: center"> | ||
− | <b>The Dos and Don'ts of Web Application Frameworks</b><br /> | + | <b>[https://www.owasp.org/images/7/7f/OWASPNZ2012_DenisA.pdf The Dos and Don'ts of Web Application Frameworks (pdf)]</b><br /> |
<i>Denis Andzakovic - Security-Assessment.com</i> | <i>Denis Andzakovic - Security-Assessment.com</i> | ||
</td> | </td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td width="7%">11:50</td> | + | <td width="7%" valign="top">11:50</td> |
<td colspan="2" style="background-color: #EEE; text-align: center"> | <td colspan="2" style="background-color: #EEE; text-align: center"> | ||
− | <b>Web Application Firewalls - Going where no WAFs have gone before...</b><br /> | + | <b>[https://www.owasp.org/images/8/81/OWASPNZ2012_AndyP_SamP.pdf Web Application Firewalls - Going where no WAFs have gone before... (pdf)]</b><br /> |
<i>Sam Pickles - F5, and Andy Prow - Aura</i> | <i>Sam Pickles - F5, and Andy Prow - Aura</i> | ||
</td> | </td> | ||
Line 269: | Line 267: | ||
<tr> | <tr> | ||
− | <td width="7%">12:30</td> | + | <td width="7%" valign="top">12:30</td> |
<td colspan="2" style="background-color: #D98B66; text-align: center"> | <td colspan="2" style="background-color: #D98B66; text-align: center"> | ||
<b>Break for Lunch</b><br /> | <b>Break for Lunch</b><br /> | ||
Line 276: | Line 274: | ||
<tr> | <tr> | ||
− | <td width="7%">13:45</td> | + | <td width="7%" valign="top">13:45</td> |
<td style="background-color: #B9C2DC; text-align: center"> | <td style="background-color: #B9C2DC; text-align: center"> | ||
− | <b>Mobile NFC 101</b><br /> | + | <b>[https://www.owasp.org/images/e/ed/OWASPNZ2012_NickVD.pdf Mobile NFC 101 (pdf)]</b><br /> |
<i>Nick von Dadelszen - Lateral Security</i> | <i>Nick von Dadelszen - Lateral Security</i> | ||
</td> | </td> | ||
<td style="background-color: #B9C2DC; text-align: center"> | <td style="background-color: #B9C2DC; text-align: center"> | ||
− | <b>Comply or Die Trying</b><br /> | + | <b>[https://www.owasp.org/images/e/e3/OWASPNZ2012_AndrewK.pdf Comply or Die Trying (pdf)]</b><br /> |
<i>Andrew Kelly</i> | <i>Andrew Kelly</i> | ||
</td> | </td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td width="7%">14:45</td> | + | <td width="7%" valign="top">14:45</td> |
<td rowspan="2" style="background-color: #EEE; text-align: center"> | <td rowspan="2" style="background-color: #EEE; text-align: center"> | ||
− | <b>Going Down to the Wire</b><br /> | + | <b>[https://www.owasp.org/images/a/a9/OWASPNZ2012_KirkJ_MikeH.pdf Going Down to the Wire (pdf)]</b><br /> |
<i>Kirk Jackson - Xero and Mike Haworth - Aura</i> | <i>Kirk Jackson - Xero and Mike Haworth - Aura</i> | ||
</td> | </td> | ||
<td style="background-color: #EEE; text-align: center"> | <td style="background-color: #EEE; text-align: center"> | ||
− | <b>Increasing The Value of Penetration Testing</b><br /> | + | <b>[https://www.owasp.org/images/d/d3/OWASPNZ2012_BrettM.pdf Increasing The Value of Penetration Testing (pdf)]</b><br /> |
<i>Brett Moore- Insomnia Security</i> | <i>Brett Moore- Insomnia Security</i> | ||
</td> | </td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td width="7%">15:30</td> | + | <td width="7%" valign="top">15:30</td> |
<td style="background-color: #B9C2DC; text-align: center"> | <td style="background-color: #B9C2DC; text-align: center"> | ||
− | <b>An (Unofficial) OWASP Top 10 for Managers</b><br /> | + | <b>[https://www.owasp.org/images/8/85/OWASPNZ2012_DeanC_ShahnH.pdf An (Unofficial) OWASP Top 10 for Managers (pdf)]</b><br /> |
<i>Dean Carter and Shahn Harris - Lateral Security</i> | <i>Dean Carter and Shahn Harris - Lateral Security</i> | ||
</td> | </td> | ||
Line 307: | Line 305: | ||
<tr> | <tr> | ||
− | <td width="7%">16:00</td> | + | <td width="7%" valign="top">16:00</td> |
<td colspan="2" style="background-color: #D98B66; text-align: center"> | <td colspan="2" style="background-color: #D98B66; text-align: center"> | ||
<b>Break for Afternoon Tea</b><br /> | <b>Break for Afternoon Tea</b><br /> | ||
Line 314: | Line 312: | ||
<tr> | <tr> | ||
− | <td width="7%">16:30</td> | + | <td width="7%" valign="top">16:30</td> |
<td colspan="2" style="background-color: #EEE; text-align: center"> | <td colspan="2" style="background-color: #EEE; text-align: center"> | ||
<b>Discussion Panel and Wrap-up</b><br /> | <b>Discussion Panel and Wrap-up</b><br /> | ||
Line 333: | Line 331: | ||
A brief introduction to in2securITy, it's aims and goals. A particular focus on the availability of mentoring, peers and the secure development stream. | A brief introduction to in2securITy, it's aims and goals. A particular focus on the availability of mentoring, peers and the secure development stream. | ||
+ | |||
+ | <b>Speaker Bio</b> | ||
+ | |||
+ | Adam Bell is a security consultant with two years experience in the security industry backed by a further seven years experience in other IT industries. In this time he has worked for both local and national governments in network defence roles as well as working in more generalised system administration, programming, and (the dreaded) service centre. He currently works for Lateral Security and is the Network Defence writer for in2security. | ||
Line 487: | Line 489: | ||
- Analyse the technology involved and how this is used to develop NFC applications | - Analyse the technology involved and how this is used to develop NFC applications | ||
- Discuss the security considerations of NFC on mobile devices | - Discuss the security considerations of NFC on mobile devices | ||
+ | |||
+ | <b>Speaker Bio</b> | ||
+ | |||
+ | Nick von Dadelszen is the technical director at Lateral Security. Nick has been performing professional pen testing for over 12 years and has managed several successful penetration testing teams. He has worked with the majority of large corporates and Government agencies in New Zealand and is a regular presenter at OWASP and kiwicon conferences. | ||
Line 502: | Line 508: | ||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
= Call For Sponsorships = | = Call For Sponsorships = |
Latest revision as of 01:08, 13 September 2012
30th and 31st August 2012 - Auckland