This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "2012 BASC Agenda"
From OWASP
Tom Conner (talk | contribs) |
Tom Conner (talk | contribs) |
||
Line 65: | Line 65: | ||
{{2012_BASC:Presentaton_Agenda_Template|Presentation|Metasploit Fundamental Elements - Course 1|Roy Wattanasin}} | {{2012_BASC:Presentaton_Agenda_Template|Presentation|Metasploit Fundamental Elements - Course 1|Roy Wattanasin}} | ||
| style="width:30%; background:#BCA57A" align="center" | | | style="width:30%; background:#BCA57A" align="center" | | ||
− | + | {{2012_BASC:Presentaton_Agenda_Template|Presentation|An Insider's Look: WAF and Identity and Access Management Integration|Barracuda Networks}} | |
|- | |- | ||
| style="width:10%; background:#7B8ABD" align="center" | 11:00-11:50 || style="width:30%; background:#CFA49B" align="center" | | | style="width:10%; background:#7B8ABD" align="center" | 11:00-11:50 || style="width:30%; background:#CFA49B" align="center" | | ||
Line 81: | Line 81: | ||
{{2012_BASC:Presentaton_Agenda_Template|Presentation|Fuzzing and You: How to Automate Whitebox Testing|Michael Anderson}} | {{2012_BASC:Presentaton_Agenda_Template|Presentation|Fuzzing and You: How to Automate Whitebox Testing|Michael Anderson}} | ||
| style="width:30%; background:#BCA57A" align="center" | | | style="width:30%; background:#BCA57A" align="center" | | ||
− | + | {{2012_BASC:Presentaton_Agenda_Template|Presentation|Securing Mobile Apps - Threat Modeling, Whitebox, Blackbox testing|Greg Wolford }} | |
|- | |- | ||
Line 93: | Line 93: | ||
| style="width:30%; background:#BCA57A" align="center" | | | style="width:30%; background:#BCA57A" align="center" | | ||
+ | {{2012_BASC:Presentaton_Agenda_Template|Presentation| |Jim Manico }} | ||
|- | |- | ||
Line 98: | Line 99: | ||
{{2012_BASC:Presentaton_Agenda_Template|Presentation|Secure Password Storage: Increasing Resistance to Brute Force Attacks|John Steven, Chandu Ketkar, Scott Matsumoto}} | {{2012_BASC:Presentaton_Agenda_Template|Presentation|Secure Password Storage: Increasing Resistance to Brute Force Attacks|John Steven, Chandu Ketkar, Scott Matsumoto}} | ||
| style="width:30%; background:#DFC799" align="center" | | | style="width:30%; background:#DFC799" align="center" | | ||
− | + | {{2012_BASC:Presentaton_Agenda_Template|Presentation|Offensive Mobile Forensics|Joey Peloquin }} | |
|- | |- | ||
Revision as of 02:15, 3 October 2012
2012 BASC: Home Agenda Presentations Speakers
Sponsorships Available
Platinum Sponsors (Listed Alphabetically)
|
Silver Sponsors (Listed Alphabetically)
|
|
|
|
We kindly thank our sponsors for their support. Please help us keep future BASCs free by viewing and visiting all of our sponsors.
Sponsorships are still available.
Agenda
Boston Application Security Conference, Saturday, October 13, 2012 | ||
---|---|---|
8:30-9:30 | ||
09:00-09:50 |
Keynote | |
Track 1 Horace Mann Room |
Track 2 Deborah Sampson / Paul Thomas Room | |
10:00-10:50 | ||
11:00-11:50 | ||
12:00-13:00 | ||
13:00-13:50 | ||
14:00-14:50 | ||
15:00-15:50 | ||
16:00-16:50 | ||
17:00-17:30 | ||
17:30-18:30 |
| |
18:30-19:00 |
|