This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Front Range OWASP Conference 2013/Schedule"
From OWASP
Jess Garrett (talk | contribs) |
Jess Garrett (talk | contribs) |
||
Line 40: | Line 40: | ||
|- | |- | ||
| style="background:#024C68; color:white" align="center" | 10:00-10:45 | | style="background:#024C68; color:white" align="center" | 10:00-10:45 | ||
− | | style="background:#E8D0A9" align="center" | '''[[Link to Preso Page | DevFu: The inner ninja in every application developer]]''' <br> ''[http://authorurl.com Danny Chrastil]''<br> | + | | style="background:#E8D0A9" align="center" | '''[[Link to Preso Page | DevFu: The inner ninja in every application developer]]''' <br> ''[http://authorurl.com Danny Chrastil]''<br> |
− | | style="background:#DFC184" align="center" | '''[[Link to Preso Page | SIP Based Cloud Instances]]''' <br> ''[http://authorurl.com Gregory Disney-Leugers]''<br> | + | | style="background:#DFC184" align="center" | '''[[Link to Preso Page | SIP Based Cloud Instances]]''' <br> ''[http://authorurl.com Gregory Disney-Leugers]''<br> |
− | | style="background:#F2F2F2" align="center" | '''[[Link to Preso Page | Measuring Best Security Practices With Open SAMM]]''' <br> ''[http://authorurl.com Alan Jex]''<br> | + | | style="background:#F2F2F2" align="center" | '''[[Link to Preso Page | Measuring Best Security Practices With Open SAMM]]''' <br> ''[http://authorurl.com Alan Jex]''<br> |
− | | style="background:#B7AFA3" align="center" | '''[[Link to Preso Page | Electronic Discovery for System Administrators]]''' <br> ''[http://authorurl.com Russell Shumway]''<br> | + | | style="background:#B7AFA3" align="center" | '''[[Link to Preso Page | Electronic Discovery for System Administrators]]''' <br> ''[http://authorurl.com Russell Shumway]''<br> |
| style="background:#C1DAD6" align="center" rowspan="9" | '''CTF''' | | style="background:#C1DAD6" align="center" rowspan="9" | '''CTF''' | ||
|- | |- | ||
| style="background:#024C68; color:white" align="center" | 10:55-11:40 | | style="background:#024C68; color:white" align="center" | 10:55-11:40 | ||
− | | style="background:#E8D0A9" align="center" | '''[[Link to Preso Page | Adventures in Large Scale HTTP Header Abuse]]''' <br> ''[http://authorurl.com Zachary Wolff]''<br> | + | | style="background:#E8D0A9" align="center" | '''[[Link to Preso Page | Adventures in Large Scale HTTP Header Abuse]]''' <br> ''[http://authorurl.com Zachary Wolff]''<br> |
− | | style="background:#DFC184" align="center" | '''[[Link to Preso Page | How Malware Attacks Web Applications]]''' <br> ''[http://authorurl.com Casey Smith]''<br> | + | | style="background:#DFC184" align="center" | '''[[Link to Preso Page | How Malware Attacks Web Applications]]''' <br> ''[http://authorurl.com Casey Smith]''<br> |
− | | style="background:#F2F2F2" align="center" | '''[[Link to Preso Page | Software Assurance Improvements Through Innovation and Collaboration (Confirmation Pending)]]''' <br> ''[http://authorurl.com Kevin Greene]''<br> | + | | style="background:#F2F2F2" align="center" | '''[[Link to Preso Page | Software Assurance Improvements Through Innovation and Collaboration (Confirmation Pending)]]''' <br> ''[http://authorurl.com Kevin Greene]''<br> |
− | | style="background:#B7AFA3" align="center" | '''[[Link to Preso Page | CISPA: Why Privacy Advocates This Legislation]]''' <br> ''[http://authorurl.com Maureen Donohue Feinroth]''<br> | + | | style="background:#B7AFA3" align="center" | '''[[Link to Preso Page | CISPA: Why Privacy Advocates This Legislation]]''' <br> ''[http://authorurl.com Maureen Donohue Feinroth]''<br> |
|- | |- | ||
| style="background:#024C68; color:white" align="center" | 11:40-12:40 | | style="background:#024C68; color:white" align="center" | 11:40-12:40 | ||
Line 56: | Line 56: | ||
|- | |- | ||
| style="background:#024C68; color:white" align="center" | 12:40-13:25 | | style="background:#024C68; color:white" align="center" | 12:40-13:25 | ||
− | | style="background:#E8D0A9" align="center" | '''[[Link to Preso Page | Angry Cars: Hacking the "Car as Platform" (Confirmation Pending)]]''' <br> ''[http://authorurl.com Aaron Weaver]''<br> | + | | style="background:#E8D0A9" align="center" | '''[[Link to Preso Page | Angry Cars: Hacking the "Car as Platform" (Confirmation Pending)]]''' <br> ''[http://authorurl.com Aaron Weaver]''<br> |
− | | style="background:#DFC184" align="center" | '''[[Link to Preso Page | Top Ten Web Application Defenses]]''' <br> ''[http://authorurl.com Jim Manico]''<br> | + | | style="background:#DFC184" align="center" | '''[[Link to Preso Page | Top Ten Web Application Defenses]]''' <br> ''[http://authorurl.com Jim Manico]''<br> |
− | | style="background:#F2F2F2" align="center" | '''[[Link to Preso Page | Using SaaS and the Cloud to Secure the SDLC]]''' <br> ''[http://authorurl.com Andrew Earle]''<br> | + | | style="background:#F2F2F2" align="center" | '''[[Link to Preso Page | Using SaaS and the Cloud to Secure the SDLC]]''' <br> ''[http://authorurl.com Andrew Earle]''<br> |
− | | style="background:#B7AFA3" align="center" | '''[[Link to Preso Page | Digital Bounty Hunters - Decoding Bug Bounty Programs]]''' <br> ''[http://authorurl.com Jon Rose]''<br> | + | | style="background:#B7AFA3" align="center" | '''[[Link to Preso Page | Digital Bounty Hunters - Decoding Bug Bounty Programs]]''' <br> ''[http://authorurl.com Jon Rose]''<br> |
|- | |- | ||
| style="background:#024C68; color:white" align="center" | 13:35-14:20 | | style="background:#024C68; color:white" align="center" | 13:35-14:20 | ||
− | | style="background:#E8D0A9" align="center" | '''[[Link to Preso Page | Real World Cloud Application Security]]''' <br> ''[http://authorurl.com Jason Chan]''<br> | + | | style="background:#E8D0A9" align="center" | '''[[Link to Preso Page | Real World Cloud Application Security]]''' <br> ''[http://authorurl.com Jason Chan]''<br> |
− | | style="background:#DFC184" align="center" | '''[[Link to Preso Page | A Demo of and Preventing XSS in .NET Applications]]''' <br> ''[http://authorurl.com Larry Conklin]''<br> | + | | style="background:#DFC184" align="center" | '''[[Link to Preso Page | A Demo of and Preventing XSS in .NET Applications]]''' <br> ''[http://authorurl.com Larry Conklin]''<br> |
− | | style="background:#F2F2F2" align="center" | '''[[Link to Preso Page | Defending Desktop (.NET/C#) Applications: Mitigating in the Dark (A Case Study Remix) (Confirmation Pending)]]''' <br> ''[http://authorurl.com Jon McCoy]''<br> | + | | style="background:#F2F2F2" align="center" | '''[[Link to Preso Page | Defending Desktop (.NET/C#) Applications: Mitigating in the Dark (A Case Study Remix) (Confirmation Pending)]]''' <br> ''[http://authorurl.com Jon McCoy]''<br> |
− | | style="background:#B7AFA3" align="center" | '''[[Link to Preso Page | Crafting a Plan for When Security Fails]]''' <br> ''[http://authorurl.com Robert Lelewski]''<br> | + | | style="background:#B7AFA3" align="center" | '''[[Link to Preso Page | Crafting a Plan for When Security Fails]]''' <br> ''[http://authorurl.com Robert Lelewski]''<br> |
|- | |- | ||
| style="background:#024C68; color:white" align="center" | 14:30-15:15 | | style="background:#024C68; color:white" align="center" | 14:30-15:15 | ||
− | | style="background:#E8D0A9" align="center" | '''[[Link to Preso Page | DevOps and Security: It's Happening. Right Now. (Confirmation Pending)]]''' <br> ''[http://authorurl.com Helen Bravo]''<br> | + | | style="background:#E8D0A9" align="center" | '''[[Link to Preso Page | DevOps and Security: It's Happening. Right Now. (Confirmation Pending)]]''' <br> ''[http://authorurl.com Helen Bravo]''<br> |
− | | style="background:#DFC184" align="center" | '''[[Link to Preso Page | Data Mining a Mountain of Zero Day Vulnerabilities]]''' <br> ''[http://authorurl.com Joe Brady]''<br> | + | | style="background:#DFC184" align="center" | '''[[Link to Preso Page | Data Mining a Mountain of Zero Day Vulnerabilities]]''' <br> ''[http://authorurl.com Joe Brady]''<br> |
− | | style="background:#F2F2F2" align="center" | '''[[Link to Preso Page | Linking Security to Business Value in the Customer Service Industry]]''' <br> ''[http://authorurl.com Dan Rojas]''<br> | + | | style="background:#F2F2F2" align="center" | '''[[Link to Preso Page | Linking Security to Business Value in the Customer Service Industry]]''' <br> ''[http://authorurl.com Dan Rojas]''<br> |
− | | style="background:#B7AFA3" align="center" | '''[[Link to Preso Page | Information Control: The Critical Need for a Defensible Position - Securing the Information Ecosystem]]''' <br> ''[http://authorurl.com Tom Glanville]''<br> | + | | style="background:#B7AFA3" align="center" | '''[[Link to Preso Page | Information Control: The Critical Need for a Defensible Position - Securing the Information Ecosystem]]''' <br> ''[http://authorurl.com Tom Glanville]''<br> |
|- | |- | ||
| style="background:#024C68; color:white" align="center" | 15:15-15:45 | | style="background:#024C68; color:white" align="center" | 15:15-15:45 |
Revision as of 20:44, 7 March 2013
SnowFROC 2013 schedule
This schedule is subject to frequently changes as the conference draws nearer.
CFP Schedule
Abstract collection will begin January 14th and continue until all speaking slots are filled. Rolling evaluations will occur and selected papers will be announced each Monday beginning on February 11th.
Final presentations of accepted abstracts must be submitted for review by March 17th. Presentations will be delivered during the conference on March 28th.
(See the CFP section for additional dates and details.)
Day of Event Schedule