This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "AppSecLatam2012/Schedule Tuesday Nov 20, 2012"
From OWASP
Sarah Baso (talk | contribs) |
Sarah Baso (talk | contribs) m |
||
Line 47: | Line 47: | ||
Speaker: Nicolas Rodriguez | Speaker: Nicolas Rodriguez | ||
|- | |- | ||
− | | align="center" style="width: 20%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | ''12:50- | + | | align="center" style="width: 20%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | ''12:50-14:20 PM'' |
<br> | <br> | ||
| align="center" colspan="3" style="width: 80%; background: none repeat scroll 0% 0% rgb(194, 194, 194);" | '''Break - Lunch''' | | align="center" colspan="3" style="width: 80%; background: none repeat scroll 0% 0% rgb(194, 194, 194);" | '''Break - Lunch''' | ||
|- | |- | ||
− | | align="center" style="width: 20%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | '' | + | | align="center" style="width: 20%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | ''14:20-15:20 PM'' |
<br> | <br> | ||
| align="center" colspan="3" style="width: 80%; background: none repeat scroll 0% 0% rgb(188, 133, 122);" | '''KEYNOTE <br> Tainted variables to find Potentially Vulnerable Functions (PVF)''' | | align="center" colspan="3" style="width: 80%; background: none repeat scroll 0% 0% rgb(188, 133, 122);" | '''KEYNOTE <br> Tainted variables to find Potentially Vulnerable Functions (PVF)''' | ||
Speaker: Cristian Borghello | Speaker: Cristian Borghello | ||
|- | |- | ||
− | | align="center" style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | '' | + | | align="center" style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | ''15:20-15:40 PM'' |
| align="center" colspan="3" style="width: 80%; background: none repeat scroll 0% 0% rgb(246, 246, 246);" | Short Break - Coffee & Snacks | | align="center" colspan="3" style="width: 80%; background: none repeat scroll 0% 0% rgb(246, 246, 246);" | Short Break - Coffee & Snacks | ||
|- | |- | ||
− | | align="center" style="width: 20%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | ''15: | + | | align="center" style="width: 20%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | ''15:40-16:30 PM'' |
<br> | <br> | ||
| align="left" style="width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);" | '''Using PASTA as a core ingredient to web application threat modeling''' | | align="left" style="width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);" | '''Using PASTA as a core ingredient to web application threat modeling''' | ||
Line 66: | Line 66: | ||
Speaker: Sebastian Bortnik | Speaker: Sebastian Bortnik | ||
|- | |- | ||
− | | align="center" style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | ''16: | + | | align="center" style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | ''16:30-16:40 PM'' |
| align="center" colspan="3" style="width: 80%; background: none repeat scroll 0% 0% rgb(246, 246, 246);" | Short Break | | align="center" colspan="3" style="width: 80%; background: none repeat scroll 0% 0% rgb(246, 246, 246);" | Short Break | ||
|- | |- | ||
− | | align="center" style="width: 20%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | ''16: | + | | align="center" style="width: 20%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | ''16:40-17:30 PM'' |
<br> | <br> | ||
| align="left" style="width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);" | '''Password Security Policies - Lessons Learned from Recent Password Leaks''' | | align="left" style="width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);" | '''Password Security Policies - Lessons Learned from Recent Password Leaks''' |