This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Front Range OWASP Conference 2013/Schedule"
From OWASP
Jess Garrett (talk | contribs) |
Jess Garrett (talk | contribs) |
||
(16 intermediate revisions by 3 users not shown) | |||
Line 1: | Line 1: | ||
+ | <!-- | ||
====SnowFROC 2013 schedule==== | ====SnowFROC 2013 schedule==== | ||
− | This schedule is subject to | + | This schedule is subject to frequent changes as the conference draws nearer. |
Line 11: | Line 12: | ||
(See the [[Front_Range_OWASP_Conference_2013#CFP|CFP]] section for additional dates and details.) | (See the [[Front_Range_OWASP_Conference_2013#CFP|CFP]] section for additional dates and details.) | ||
− | + | --> | |
− | == | + | ==SnowFROC 2013 Schedule== |
<br> | <br> | ||
Line 24: | Line 25: | ||
|- | |- | ||
| style="background:#024C68; color:white" align="center" | 07:00-08:30 | | style="background:#024C68; color:white" align="center" | 07:00-08:30 | ||
− | | colspan="4" style="background:#AEBEC3; color:#024C68" align="center" | '''Registration and Morning Snacks''' <br> ''Sponsored by [http://www.hpenterprisesecurity | + | | colspan="4" style="background:#AEBEC3; color:#024C68" align="center" | '''Registration and Morning Snacks''' <br> ''Sponsored by [http://www.hpenterprisesecurity.com '''HP''']'' |
|- | |- | ||
| style="background:#024C68; color:white" align="center" | 08:00-08:15 | | style="background:#024C68; color:white" align="center" | 08:00-08:15 | ||
Line 33: | Line 34: | ||
|- | |- | ||
| style="background:#024C68; color:white" align="center" | 08:30-09:30 | | style="background:#024C68; color:white" align="center" | 08:30-09:30 | ||
− | | colspan="4" style="background:#E0E0E0" align="center" | '''Keynote Address'''<br> ''[[Front_Range_OWASP_Conference_2013/Speakers/Ziring|Neal Ziring]], Technical Director for the National Security Agency’s Information Assurance Directorate (IAD)'' | + | | colspan="4" style="background:#E0E0E0" align="center" | '''Keynote Address: Data Protection for the 21st Century'''<br> ''[[Front_Range_OWASP_Conference_2013/Speakers/Ziring|Neal Ziring]], Technical Director for the National Security Agency’s Information Assurance Directorate (IAD)''<br>[https://vimeo.com/68058106 Video] |
|- | |- | ||
| style="background:#024C68; color:white" align="center" | 09:30-10:00 | | style="background:#024C68; color:white" align="center" | 09:30-10:00 | ||
− | | colspan="4" style="background:#AEBEC3; color:#024C68" align="center" | '''Coffee Break and Sponsor Expo''' <br> | + | | colspan="4" style="background:#AEBEC3; color:#024C68" align="center" | '''Coffee Break and Sponsor Expo''' <br> ''Sponsored by [https://aerstone.com '''Aerstone''']'' |
| style="background:#C1DAD6" align="center" | '''CTF Kick-off'''<br>''[[User:Chris_Rossi|Chris Rossi]], [[User:Mark_Major|Mark Major]]'' | | style="background:#C1DAD6" align="center" | '''CTF Kick-off'''<br>''[[User:Chris_Rossi|Chris Rossi]], [[User:Mark_Major|Mark Major]]'' | ||
|- | |- | ||
| style="background:#024C68; color:white" align="center" | 10:00-10:45 | | style="background:#024C68; color:white" align="center" | 10:00-10:45 | ||
− | | style="background:#E8D0A9" align="center" | [[Front_Range_OWASP_Conference_2013/Sessions/Sess1_Tech1|'''DevFu: The inner ninja in every application developer''' <br> ''Danny Chrastil'']] | + | | style="background:#E8D0A9" align="center" | [[Front_Range_OWASP_Conference_2013/Sessions/Sess1_Tech1|'''DevFu: The inner ninja in every application developer''' <br> ''Danny Chrastil'']]<br>[[Media: Chrastil.pptx| Slides ]]<br>[https://vimeo.com/68082818 Video] |
− | | style="background:#DFC184" align="center" | [[Front_Range_OWASP_Conference_2013/Sessions/Sess1_Tech2|'''SIP Based Cloud Instances''' <br> ''Gregory Disney-Leugers]]'' | + | | style="background:#DFC184" align="center" | [[Front_Range_OWASP_Conference_2013/Sessions/Sess1_Tech2|'''SIP Based Cloud Instances''' <br> ''Gregory Disney-Leugers]]''<br>[[Media: Disney-Leugers.odp| Slides ]]<br>[https://vimeo.com/68091563 Video] |
− | | style="background:#F2F2F2" align="center" | [[Front_Range_OWASP_Conference_2013/Sessions/Sess1_Mgmt1|'''Digital Bounty Hunters - Decoding Bug Bounty Programs''' <br> ''Jon Rose]]'' | + | | style="background:#F2F2F2" align="center" | [[Front_Range_OWASP_Conference_2013/Sessions/Sess1_Mgmt1|'''Digital Bounty Hunters - Decoding Bug Bounty Programs''' <br> ''Jon Rose]]''<br>[[Media: Rose.pdf | Slides]]<br>[https://vimeo.com/68107340 Video] |
− | | style="background:#B7AFA3" align="center" | [[Front_Range_OWASP_Conference_2013/Sessions/Sess1_Mgmt2|'''Electronic Discovery for System Administrators''' <br> ''Russell Shumway]]'' | + | | style="background:#B7AFA3" align="center" | [[Front_Range_OWASP_Conference_2013/Sessions/Sess1_Mgmt2|'''Electronic Discovery for System Administrators''' <br> ''Russell Shumway]]''<br>[[Media: Shumway.pptx| Slides ]]<br>[https://vimeo.com/68142345 Video] |
| style="background:#C1DAD6" align="center" rowspan="9" | [[Front_Range_OWASP_Conference_2013/CTF|'''CTF''']] <br> ''Sponsored by [https://aerstone.com '''Aerstone''']'' | | style="background:#C1DAD6" align="center" rowspan="9" | [[Front_Range_OWASP_Conference_2013/CTF|'''CTF''']] <br> ''Sponsored by [https://aerstone.com '''Aerstone''']'' | ||
|- | |- | ||
| style="background:#024C68; color:white" align="center" | 10:55-11:40 | | style="background:#024C68; color:white" align="center" | 10:55-11:40 | ||
− | | style="background:#E8D0A9" align="center" | [[Front_Range_OWASP_Conference_2013/Sessions/Sess2_Tech1|'''Adventures in Large Scale HTTP Header Abuse''' <br> ''Zachary Wolff]]'' | + | | style="background:#E8D0A9" align="center" | [[Front_Range_OWASP_Conference_2013/Sessions/Sess2_Tech1|'''Adventures in Large Scale HTTP Header Abuse''' <br> ''Zachary Wolff]]''<br>[[Media: Wolff.pptx| Slides ]]<br>[https://vimeo.com/68071431 Video] |
− | | style="background:#DFC184" align="center" | [[Front_Range_OWASP_Conference_2013/Sessions/Sess2_Tech2|'''How Malware Attacks Web Applications''' <br> ''Casey Smith]]'' | + | | style="background:#DFC184" align="center" | [[Front_Range_OWASP_Conference_2013/Sessions/Sess2_Tech2|'''How Malware Attacks Web Applications''' <br> ''Casey Smith]]''<br>[[Media: Smith.pdf| Slides ]]<br>[https://vimeo.com/68107330 Video] |
− | | style="background:#F2F2F2" align="center" | [[Front_Range_OWASP_Conference_2013/Sessions/Sess2_Mgmt1|'''Linking Security to Business Value in the Customer Service Industry''' <br> ''Dan Rojas]]'' | + | | style="background:#F2F2F2" align="center" | [[Front_Range_OWASP_Conference_2013/Sessions/Sess2_Mgmt1|'''Linking Security to Business Value in the Customer Service Industry''' <br> ''Dan Rojas]]''<br>[[Media: Rojas.pdf | Slides]]<br>[https://vimeo.com/68111318 Video] |
− | | style="background:#B7AFA3" align="center" | [[Front_Range_OWASP_Conference_2013/Sessions/Sess2_Mgmt2|'''Legal Issues of Forensics in the Cloud''' <br> ''David Willson]]'' | + | | style="background:#B7AFA3" align="center" | [[Front_Range_OWASP_Conference_2013/Sessions/Sess2_Mgmt2|'''Legal Issues of Forensics in the Cloud''' <br> ''David Willson]]''<br>[[Media: Willson.pdf| Slides ]]<br>[https://vimeo.com/68082821 Video] |
|- | |- | ||
| style="background:#024C68; color:white" align="center" | 11:40-12:40 | | style="background:#024C68; color:white" align="center" | 11:40-12:40 | ||
− | | colspan="4" style="background:#AEBEC3; color:#024C68" align="center" | '''Lunch and Sponsor Expo''' <br> | + | | colspan="4" style="background:#AEBEC3; color:#024C68" align="center" | '''Lunch and Sponsor Expo''' <br> ''Sponsored by [https://aerstone.com '''Aerstone''']'' |
|- | |- | ||
| style="background:#024C68; color:white" align="center" | 12:40-13:25 | | style="background:#024C68; color:white" align="center" | 12:40-13:25 | ||
− | | style="background:#E8D0A9" align="center" | [[Front_Range_OWASP_Conference_2013/Sessions/Sess3_Tech1|'''Angry Cars: Hacking the "Car as Platform"''' <br> ''Aaron Weaver]]'' | + | | style="background:#E8D0A9" align="center" | [[Front_Range_OWASP_Conference_2013/Sessions/Sess3_Tech1|'''Angry Cars: Hacking the "Car as Platform"''' <br> ''Aaron Weaver]]''<br>[[Media: Weaver.pdf | Slides]]<br>[https://vimeo.com/68071432 Video] |
− | | style="background:#DFC184" align="center" | [[Front_Range_OWASP_Conference_2013/Sessions/Sess3_Tech2|'''Top Ten Web Application Defenses''' <br> ''Jim Manico]]'' | + | | style="background:#DFC184" align="center" | [[Front_Range_OWASP_Conference_2013/Sessions/Sess3_Tech2|'''Top Ten Web Application Defenses''' <br> ''Jim Manico]]''<br>[[Media: Manico.pdf | Slides]]<br>[https://vimeo.com/68091564 Video] |
− | | style="background:#F2F2F2" align="center" | [[Front_Range_OWASP_Conference_2013/Sessions/Sess3_Mgmt1|'''Using SaaS and the Cloud to Secure the SDLC''' <br> ''Andrew Earle]]'' | + | | style="background:#F2F2F2" align="center" | [[Front_Range_OWASP_Conference_2013/Sessions/Sess3_Mgmt1|'''Using SaaS and the Cloud to Secure the SDLC''' <br> ''Andrew Earle]]''<br>[[Media: Earle.pptx| Slides ]]<br>[https://vimeo.com/68111315 Video] |
− | | style="background:#B7AFA3" align="center" | [[Front_Range_OWASP_Conference_2013/Sessions/Sess3_Mgmt2|'''CISPA: Why Privacy Advocates This Legislation''' <br> ''Maureen Donohue Feinroth]]'' | + | | style="background:#B7AFA3" align="center" | [[Front_Range_OWASP_Conference_2013/Sessions/Sess3_Mgmt2|'''CISPA: Why Privacy Advocates Hate This Legislation''' <br> ''Maureen Donohue Feinroth]]''<br>[[Media: Feinroth.pptx| Slides ]]<br>[https://vimeo.com/68071433 Video] |
|- | |- | ||
| style="background:#024C68; color:white" align="center" | 13:35-14:20 | | style="background:#024C68; color:white" align="center" | 13:35-14:20 | ||
− | | style="background:#E8D0A9" align="center" | [[Front_Range_OWASP_Conference_2013/Sessions/ | + | | style="background:#E8D0A9" align="center" | [[Front_Range_OWASP_Conference_2013/Sessions/Sess4_Tech1|'''DevOps and Security: It's Happening. Right Now.''' <br> ''Helen Bravo]]''<br>[[Media: Bravo.pptx| Slides ]]<br>[https://vimeo.com/68335259 Video] |
− | | style="background:#DFC184" align="center" | [[Front_Range_OWASP_Conference_2013/Sessions/Sess4_Tech2|'''A Demo of and Preventing XSS in .NET Applications''' <br> ''Larry Conklin]]'' | + | | style="background:#DFC184" align="center" | [[Front_Range_OWASP_Conference_2013/Sessions/Sess4_Tech2|'''A Demo of and Preventing XSS in .NET Applications''' <br> ''Larry Conklin]]''<br>[[Media: Conklin.pptx| Slides ]]<br>[https://vimeo.com/68069847 Video] |
− | | style="background:#F2F2F2" align="center" | [[Front_Range_OWASP_Conference_2013/Sessions/Sess4_Mgmt1|'''Measuring Best | + | | style="background:#F2F2F2" align="center" | [[Front_Range_OWASP_Conference_2013/Sessions/Sess4_Mgmt1|'''Measuring Security Best Practices With OpenSAMM''' <br> ''Alan Jex]]''<br>[[Media: Jex.ppt| Slides ]]<br>[https://vimeo.com/68082823 Video] |
− | | style="background:#B7AFA3" align="center" | [[Front_Range_OWASP_Conference_2013/Sessions/Sess4_Mgmt2|'''Crafting a Plan for When Security Fails''' <br> ''Robert Lelewski]]'' | + | | style="background:#B7AFA3" align="center" | [[Front_Range_OWASP_Conference_2013/Sessions/Sess4_Mgmt2|'''Crafting a Plan for When Security Fails''' <br> ''Robert Lelewski]]''<br>[[Media: Lelewski.pdf| Slides ]]<br>[https://vimeo.com/68071439 Video] |
|- | |- | ||
| style="background:#024C68; color:white" align="center" | 14:30-15:15 | | style="background:#024C68; color:white" align="center" | 14:30-15:15 | ||
− | | style="background:#E8D0A9" align="center" | [[Front_Range_OWASP_Conference_2013/Sessions/ | + | | style="background:#E8D0A9" align="center" | [[Front_Range_OWASP_Conference_2013/Sessions/Sess5_Tech1|'''Real World Cloud Application Security''' <br> ''Jason Chan]]''<br>[[Media: Chan.pptx| Slides ]]<br>[https://vimeo.com/68082826 Video] |
− | | style="background:#DFC184" align="center" | [[Front_Range_OWASP_Conference_2013/Sessions/Sess5_Tech2|'''Data Mining a Mountain of Zero Day Vulnerabilities''' <br> ''Joe Brady]]'' | + | | style="background:#DFC184" align="center" | [[Front_Range_OWASP_Conference_2013/Sessions/Sess5_Tech2|'''Data Mining a Mountain of Zero Day Vulnerabilities''' <br> ''Joe Brady]]''<br>[[Media: Brady.pdf| Slides ]]<br>[https://vimeo.com/68107333 Video] |
− | | style="background:#F2F2F2" align="center" | [[Front_Range_OWASP_Conference_2013/Sessions/Sess5_Mgmt1|'''Defending Desktop (.NET/C#) Applications: Mitigating in the Dark (A Case Study Remix)''' <br> ''Jon McCoy]]'' | + | | style="background:#F2F2F2" align="center" | [[Front_Range_OWASP_Conference_2013/Sessions/Sess5_Mgmt1|'''Defending Desktop (.NET/C#) Applications: Mitigating in the Dark (A Case Study Remix)''' <br> ''Jon McCoy]]''<br>[[Media:McCoy.pdf| Slides ]]<br>[https://vimeo.com/68071440 Video] |
− | | style="background:#B7AFA3" align="center" | [[Front_Range_OWASP_Conference_2013/Sessions/Sess5_Mgmt2|'''Information Control: The Critical Need for a Defensible Position - Securing the Information Ecosystem''' <br> ''Tom Glanville]]'' | + | | style="background:#B7AFA3" align="center" | [[Front_Range_OWASP_Conference_2013/Sessions/Sess5_Mgmt2|'''Information Control: The Critical Need for a Defensible Position - Securing the Information Ecosystem''' <br> ''Tom Glanville]]''<br>[[Media: Glanville.pptx| Slides ]]<br>[https://vimeo.com/68082819 Video] |
|- | |- | ||
| style="background:#024C68; color:white" align="center" | 15:15-15:45 | | style="background:#024C68; color:white" align="center" | 15:15-15:45 | ||
− | | colspan="4" style="background:#AEBEC3; color:#024C68" align="center" | '''Coffee Break and Sponsor Expo''' <br> | + | | colspan="4" style="background:#AEBEC3; color:#024C68" align="center" | '''Coffee Break and Sponsor Expo''' <br> ''Sponsored by [https://aerstone.com '''Aerstone''']'' |
|- | |- | ||
| style="background:#024C68; color:white" align="center" | 15:45-16:45 | | style="background:#024C68; color:white" align="center" | 15:45-16:45 | ||
| colspan="4" style="background:#E0E0E0" align="center" | '''Moderated Panel Discussion''' '' | | colspan="4" style="background:#E0E0E0" align="center" | '''Moderated Panel Discussion''' '' | ||
− | + | [[Front_Range_OWASP_Conference_2013/Speakers/Weaver|Aaron Weaver]] | |
− | + | [[Front_Range_OWASP_Conference_2013/Speakers/Willson|David Willson]] | |
− | + | [[Front_Range_OWASP_Conference_2013/Speakers/Wilson|Dan Wilson]] | |
+ | [[Front_Range_OWASP_Conference_2013/Speakers/Ziring|Neal Ziring]] | ||
Moderator: [[Front_Range_OWASP_Conference_2013/Speakers/Manico|Jim Manico]]'' | Moderator: [[Front_Range_OWASP_Conference_2013/Speakers/Manico|Jim Manico]]'' | ||
+ | [https://vimeo.com/68058105 Video] | ||
|- | |- | ||
| style="background:#024C68; color:white" align="center" | 16:45-17:00 | | style="background:#024C68; color:white" align="center" | 16:45-17:00 | ||
Line 106: | Line 109: | ||
|- | |- | ||
| style="width:10%; background:#024C68; color:white" align="center" | 09:00-9:45 | | style="width:10%; background:#024C68; color:white" align="center" | 09:00-9:45 | ||
− | | style="width:20%; background:#E8D0A9" align="center" rowspan="5" | Secure Coding | + | | style="width:20%; background:#E8D0A9" align="center" rowspan="5" | [[Front_Range_OWASP_Conference_2013/Sessions/Training | '''Training: Secure Coding''' <br> ''Aaron Weaver'']] |
| style="width:20%; background:#DFC184" align="center" | {{:Front_Range_OWASP_Conference_2013/boaf1a}} ''([[Front_Range_OWASP_Conference_2013/boaf1a|edit]])'' | | style="width:20%; background:#DFC184" align="center" | {{:Front_Range_OWASP_Conference_2013/boaf1a}} ''([[Front_Range_OWASP_Conference_2013/boaf1a|edit]])'' | ||
| style="width:20%; background:#F2F2F2" align="center" | {{:Front_Range_OWASP_Conference_2013/boaf1b}} ''([[Front_Range_OWASP_Conference_2013/boaf1b|edit]])'' | | style="width:20%; background:#F2F2F2" align="center" | {{:Front_Range_OWASP_Conference_2013/boaf1b}} ''([[Front_Range_OWASP_Conference_2013/boaf1b|edit]])'' | ||
Line 116: | Line 119: | ||
|- | |- | ||
| style="width:10%; background:#024C68; color:white" align="center" | 10:45-11:15 | | style="width:10%; background:#024C68; color:white" align="center" | 10:45-11:15 | ||
− | | colspan="3" style="background:#AEBEC3; color:#024C68" align="center" | '''Coffee Break'''<br> | + | | colspan="3" style="background:#AEBEC3; color:#024C68" align="center" | '''Coffee Break''' <br> ''Sponsored by [https://aerstone.com '''Aerstone''']'' |
|- | |- | ||
| style="width:10%; background:#024C68; color:white" align="center" | 11:15-12:00 | | style="width:10%; background:#024C68; color:white" align="center" | 11:15-12:00 |
Latest revision as of 15:53, 17 June 2013
SnowFROC 2013 Schedule