This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Front Range OWASP Conference 2013/Schedule"
From OWASP
Mark Major (talk | contribs) (Updated speaker/presentation links to redirect to the speaker/presentation tabs) |
Mark Major (talk | contribs) (Updated session links to valid pages) |
||
Line 30: | Line 30: | ||
|- | |- | ||
| style="background:#024C68; color:white" align="center" | 08:15-08:30 | | style="background:#024C68; color:white" align="center" | 08:15-08:30 | ||
− | | colspan="4" style="background:#E0E0E0" align="center" | '''State of OWASP'''<br> ''[[ | + | | colspan="4" style="background:#E0E0E0" align="center" | '''State of OWASP'''<br> ''[[Front_Range_OWASP_Conference_2013/Speakers/Manico|Jim Manico]]'' |
|- | |- | ||
| style="background:#024C68; color:white" align="center" | 08:30-09:30 | | style="background:#024C68; color:white" align="center" | 08:30-09:30 | ||
− | | colspan="4" style="background:#E0E0E0" align="center" | '''Keynote Address'''<br> ''Neal Ziring, Technical Director of Information Protection, NSA'' | + | | colspan="4" style="background:#E0E0E0" align="center" | '''Keynote Address'''<br> ''[[Front_Range_OWASP_Conference_2013/Speakers/Ziring|Neal Ziring]], Technical Director of Information Protection, NSA'' |
|- | |- | ||
| style="background:#024C68; color:white" align="center" | 09:30-10:00 | | style="background:#024C68; color:white" align="center" | 09:30-10:00 | ||
Line 40: | Line 40: | ||
|- | |- | ||
| style="background:#024C68; color:white" align="center" | 10:00-10:45 | | style="background:#024C68; color:white" align="center" | 10:00-10:45 | ||
− | | style="background:#E8D0A9" align="center" | + | | style="background:#E8D0A9" align="center" | [[Front_Range_OWASP_Conference_2013/Sessions/Sess1_Tech1|'''DevFu: The inner ninja in every application developer''' <br> ''Danny Chrastil'']] |
− | | style="background:#DFC184" align="center" | + | | style="background:#DFC184" align="center" | [[Front_Range_OWASP_Conference_2013/Sessions/Sess1_Tech2|'''SIP Based Cloud Instances''' <br> ''Gregory Disney-Leugers]]'' |
− | | style="background:#F2F2F2" align="center" | + | | style="background:#F2F2F2" align="center" | [[Front_Range_OWASP_Conference_2013/Sessions/Sess1_Mgmt1|'''Measuring Best Security Practices With OpenSAMM''' <br> ''Alan Jex]]'' |
− | | style="background:#B7AFA3" align="center" | + | | style="background:#B7AFA3" align="center" | [[Front_Range_OWASP_Conference_2013/Sessions/Sess1_Mgmt2|'''Electronic Discovery for System Administrators''' <br> ''Russell Shumway]]'' |
| style="background:#C1DAD6" align="center" rowspan="9" | '''CTF''' | | style="background:#C1DAD6" align="center" rowspan="9" | '''CTF''' | ||
|- | |- | ||
| style="background:#024C68; color:white" align="center" | 10:55-11:40 | | style="background:#024C68; color:white" align="center" | 10:55-11:40 | ||
− | | style="background:#E8D0A9" align="center" | + | | style="background:#E8D0A9" align="center" | [[Front_Range_OWASP_Conference_2013/Sessions/Sess2_Tech1|'''Adventures in Large Scale HTTP Header Abuse''' <br> ''Zachary Wolff]]'' |
− | | style="background:#DFC184" align="center" | + | | style="background:#DFC184" align="center" | [[Front_Range_OWASP_Conference_2013/Sessions/Sess2_Tech2|'''How Malware Attacks Web Applications''' <br> ''Casey Smith]]'' |
− | | style="background:#F2F2F2" align="center" | + | | style="background:#F2F2F2" align="center" | [[Front_Range_OWASP_Conference_2013/Sessions/Sess2_Mgmt1|'''Software Assurance Improvements Through Innovation and Collaboration (Confirmation Pending)''' <br> ''Kevin Greene]]'' |
− | | style="background:#B7AFA3" align="center" | + | | style="background:#B7AFA3" align="center" | [[Front_Range_OWASP_Conference_2013/Sessions/Sess2_Mgmt2|'''CISPA: Why Privacy Advocates This Legislation''' <br> ''Maureen Donohue Feinroth]]'' |
|- | |- | ||
| style="background:#024C68; color:white" align="center" | 11:40-12:40 | | style="background:#024C68; color:white" align="center" | 11:40-12:40 | ||
Line 56: | Line 56: | ||
|- | |- | ||
| style="background:#024C68; color:white" align="center" | 12:40-13:25 | | style="background:#024C68; color:white" align="center" | 12:40-13:25 | ||
− | | style="background:#E8D0A9" align="center" | + | | style="background:#E8D0A9" align="center" | [[Front_Range_OWASP_Conference_2013/Sessions/Sess3_Tech1|'''Angry Cars: Hacking the "Car as Platform"''' <br> ''Aaron Weaver]]'' |
− | | style="background:#DFC184" align="center" | + | | style="background:#DFC184" align="center" | [[Front_Range_OWASP_Conference_2013/Sessions/Sess3_Tech2|'''Top Ten Web Application Defenses''' <br> ''Jim Manico]]'' |
− | | style="background:#F2F2F2" align="center" | + | | style="background:#F2F2F2" align="center" | [[Front_Range_OWASP_Conference_2013/Sessions/Sess3_Mgmt1|'''Using SaaS and the Cloud to Secure the SDLC''' <br> ''Andrew Earle]]'' |
− | | style="background:#B7AFA3" align="center" | + | | style="background:#B7AFA3" align="center" | [[Front_Range_OWASP_Conference_2013/Sessions/Sess3_Mgmt2|'''Digital Bounty Hunters - Decoding Bug Bounty Programs''' <br> ''Jon Rose]]'' |
|- | |- | ||
| style="background:#024C68; color:white" align="center" | 13:35-14:20 | | style="background:#024C68; color:white" align="center" | 13:35-14:20 | ||
− | | style="background:#E8D0A9" align="center" | + | | style="background:#E8D0A9" align="center" | [[Front_Range_OWASP_Conference_2013/Sessions/Sess4_Tech1|'''Real World Cloud Application Security''' <br> ''Jason Chan]]'' |
− | | style="background:#DFC184" align="center" | + | | style="background:#DFC184" align="center" | [[Front_Range_OWASP_Conference_2013/Sessions/Sess4_Tech2|'''A Demo of and Preventing XSS in .NET Applications''' <br> ''Larry Conklin]]'' |
− | | style="background:#F2F2F2" align="center" | + | | style="background:#F2F2F2" align="center" | [[Front_Range_OWASP_Conference_2013/Sessions/Sess4_Mgmt1|'''Defending Desktop (.NET/C#) Applications: Mitigating in the Dark (A Case Study Remix)''' <br> ''Jon McCoy]]'' |
− | | style="background:#B7AFA3" align="center" | + | | style="background:#B7AFA3" align="center" | [[Front_Range_OWASP_Conference_2013/Sessions/Sess4_Mgmt2|'''Crafting a Plan for When Security Fails''' <br> ''Robert Lelewski]]'' |
|- | |- | ||
| style="background:#024C68; color:white" align="center" | 14:30-15:15 | | style="background:#024C68; color:white" align="center" | 14:30-15:15 | ||
− | | style="background:#E8D0A9" align="center" | + | | style="background:#E8D0A9" align="center" | [[Front_Range_OWASP_Conference_2013/Sessions/Sess5_Tech1|'''DevOps and Security: It's Happening. Right Now. (Confirmation Pending)''' <br> ''Helen Bravo]]'' |
− | | style="background:#DFC184" align="center" | + | | style="background:#DFC184" align="center" | [[Front_Range_OWASP_Conference_2013/Sessions/Sess5_Tech2|'''Data Mining a Mountain of Zero Day Vulnerabilities''' <br> ''Joe Brady]]'' |
− | | style="background:#F2F2F2" align="center" | + | | style="background:#F2F2F2" align="center" | [[Front_Range_OWASP_Conference_2013/Sessions/Sess5_Mgmt1|'''Linking Security to Business Value in the Customer Service Industry''' <br> ''Dan Rojas]]'' |
− | | style="background:#B7AFA3" align="center" | + | | style="background:#B7AFA3" align="center" | [[Front_Range_OWASP_Conference_2013/Sessions/Sess5_Mgmt2|'''Information Control: The Critical Need for a Defensible Position - Securing the Information Ecosystem''' <br> ''Tom Glanville]]'' |
|- | |- | ||
| style="background:#024C68; color:white" align="center" | 15:15-15:45 | | style="background:#024C68; color:white" align="center" | 15:15-15:45 | ||
Line 81: | Line 81: | ||
Panelist Name, Company & Title | Panelist Name, Company & Title | ||
Panelist Name, Company & Title | Panelist Name, Company & Title | ||
− | Moderator: [[ | + | Moderator: [[Front_Range_OWASP_Conference_2013/Speakers/Manico|Jim Manico]]'' |
|- | |- | ||
| style="background:#024C68; color:white" align="center" | 16:45-17:00 | | style="background:#024C68; color:white" align="center" | 16:45-17:00 |
Revision as of 03:34, 10 March 2013
SnowFROC 2013 schedule
This schedule is subject to frequently changes as the conference draws nearer.
CFP Schedule
Abstract collection will begin January 14th and continue until all speaking slots are filled. Rolling evaluations will occur and selected papers will be announced each Monday beginning on February 11th.
Final presentations of accepted abstracts must be submitted for review by March 17th. Presentations will be delivered during the conference on March 28th.
(See the CFP section for additional dates and details.)
Day of Event Schedule