This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "2012 BASC Agenda"

From OWASP
Jump to: navigation, search
Line 65: Line 65:
 
{{2012_BASC:Presentaton_Agenda_Template|Presentation|Metasploit Fundamental Elements - Course 1|Roy Wattanasin}}
 
{{2012_BASC:Presentaton_Agenda_Template|Presentation|Metasploit Fundamental Elements - Course 1|Roy Wattanasin}}
 
  | style="width:30%; background:#BCA57A" align="center" |  
 
  | style="width:30%; background:#BCA57A" align="center" |  
 
+
{{2012_BASC:Presentaton_Agenda_Template|Presentation|An Insider's Look: WAF and Identity and Access Management Integration|Barracuda Networks}}
 
|-
 
|-
 
| style="width:10%; background:#7B8ABD" align="center" | 11:00-11:50 || style="width:30%; background:#CFA49B" align="center" |  
 
| style="width:10%; background:#7B8ABD" align="center" | 11:00-11:50 || style="width:30%; background:#CFA49B" align="center" |  
Line 81: Line 81:
 
{{2012_BASC:Presentaton_Agenda_Template|Presentation|Fuzzing and You:  How to Automate Whitebox Testing|Michael Anderson}}
 
{{2012_BASC:Presentaton_Agenda_Template|Presentation|Fuzzing and You:  How to Automate Whitebox Testing|Michael Anderson}}
 
  | style="width:30%; background:#BCA57A" align="center" |  
 
  | style="width:30%; background:#BCA57A" align="center" |  
 
+
{{2012_BASC:Presentaton_Agenda_Template|Presentation|Securing Mobile Apps - Threat Modeling, Whitebox, Blackbox testing|Greg Wolford }}
  
 
|-
 
|-
Line 93: Line 93:
  
 
  | style="width:30%; background:#BCA57A" align="center" |  
 
  | style="width:30%; background:#BCA57A" align="center" |  
 +
{{2012_BASC:Presentaton_Agenda_Template|Presentation| |Jim Manico }}
  
 
|-
 
|-
Line 98: Line 99:
 
{{2012_BASC:Presentaton_Agenda_Template|Presentation|Secure Password Storage: Increasing Resistance to Brute Force Attacks|John Steven, Chandu Ketkar, Scott Matsumoto}}
 
{{2012_BASC:Presentaton_Agenda_Template|Presentation|Secure Password Storage: Increasing Resistance to Brute Force Attacks|John Steven, Chandu Ketkar, Scott Matsumoto}}
 
  | style="width:30%; background:#DFC799" align="center" |  
 
  | style="width:30%; background:#DFC799" align="center" |  
 
+
{{2012_BASC:Presentaton_Agenda_Template|Presentation|Offensive Mobile Forensics|Joey Peloquin }}
 
|-
 
|-
  

Revision as of 02:15, 3 October 2012

2012 BASC: Home Agenda Presentations Speakers

Sponsorships Available

Platinum Sponsors (Listed Alphabetically)
Silver Sponsors (Listed Alphabetically)

Akamai




Imperva




Rapid7

Cigital

Denim Group

GlobalSign

NetSPI

Praetorian

Security Management Partners

We kindly thank our sponsors for their support. Please help us keep future BASCs free by viewing and visiting all of our sponsors.
Sponsorships are still available.

Agenda

Boston Application Security Conference, Saturday, October 13, 2012

8:30-9:30

Breakfast and Registration
provided by our Platinum Sponsor
Akamai

09:00-09:50

Keynote
Josh Corman

Track 1
Horace Mann Room
Track 2
Deborah Sampson / Paul Thomas Room
10:00-10:50
11:00-11:50
12:00-13:00

Lunch
provided by our Platinum Sponsor
Imperva

13:00-13:50
14:00-14:50
15:00-15:50
16:00-16:50
17:00-17:30

Social Time
provided by our Platinum Sponsor
Rapid7

17:30-18:30


Expert Panel

18:30-19:00


Wrap Up

You can find out more about this conference at basc2012.org
Conference Organizer: Jim Weiler