This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Template:OWASP IL 2013 Agenda"
Avi Douglen (talk | contribs) (Added schedule) |
Avi Douglen (talk | contribs) m |
||
| (9 intermediate revisions by the same user not shown) | |||
| Line 1: | Line 1: | ||
| − | {| class="wikitable" style="border-width: 1px; border-style: solid; border-color: #1F497D; font-size:11pt; height:25px;" cellpadding=5 align="center" | + | {| class="wikitable" style="border-width: 1px; border-style: solid; border-color: #1F497D; background-color:white; font-size:11pt; height:25px;" cellpadding=5 align="center" |
| − | | style="color:#1F497D; width:105px; | + | | style="color:#1F497D; width:105px; font-size:10pt;" | 8:30 - 9:00 |
| − | | colspan=2 style="font-size:12pt" | Registration, Gathering & Networking | + | | colspan="2" style="font-size:12pt; height:40px;" | '''Registration, Gathering & Networking''' |
|- | |- | ||
| − | | style="color:#1F497D; width:105px; | + | | style="color:#1F497D; width:105px; font-size:10pt;" | 9:00 - 9:30 |
| − | | colspan=2 | '''Opening Words''' | + | | colspan="2" | '''Opening Words''' |
''Ofer Maor - Chairman, OWASP Israel; Global Membership Committee, OWASP'' <br> ''Dr. Anat Bremler-Barr, Efi Arazi School of Computer Science, IDC'' | ''Ofer Maor - Chairman, OWASP Israel; Global Membership Committee, OWASP'' <br> ''Dr. Anat Bremler-Barr, Efi Arazi School of Computer Science, IDC'' | ||
|- | |- | ||
| − | | style="color:#1F497D; width:105px; | + | | style="color:#1F497D; width:105px; font-size:10pt;" | 9:30 - 10:10 |
| − | | colspan=2 | + | | colspan="2" | '''[[OWASP_Israel_2013_Presentations#Keynote|Keynote]]''' |
| + | '''Why Are Investors Excited About Cyber Security Startups, Again?''' <br> | ||
| + | ''Ron Moritz, Consigliere on Venture Strategies, Issues and Trends'' | ||
|- | |- | ||
| − | | style="color:#1F497D; width:105px; | + | | style="color:#1F497D; width:105px; font-size:10pt;" | 10:15 - 11:00 |
| − | | colspan=2 | '''Evolution of online banking attack techniques''' | + | | colspan="2" | '''[[OWASP_Israel_2013_Presentations#Evolution of online banking attack techniques|Evolution of online banking attack techniques]]''' |
| − | ''Amit Klein, CTO, | + | ''Amit Klein, CTO, Trusteer'' |
|- | |- | ||
| − | | style="color:#1F497D; width:105px; | + | | style="color:#1F497D; width:105px; font-size:10pt;" | 11:00 - 11:15 |
| − | | colspan=2 style="font-size:12pt" | Coffee Break | + | | colspan="2" style="font-size:12pt; height:40px;" | '''Coffee Break''' |
|- | |- | ||
| | | | ||
| − | | style="width:600px;" | <u>'''Track #1'''</u> | + | | style="width:600px; font-size:12pt; height:40px;"| <u>'''Track #1'''</u> |
| − | | style="width:600px;" | <u>'''Track #2'''</u> | + | | style="width:600px; font-size:12pt; height:40px;"| <u>'''Track #2'''</u> |
|- | |- | ||
| − | | style="color:#1F497D; width:105px; | + | | style="color:#1F497D; width:105px; font-size:10pt;" | 11:15 - 12:00 |
| − | | style="vertical-align:top;" | '''Get Ready for the Next Big Wave of Attacks: <br>Hacking of Leading CMS Systems''' | + | | style="vertical-align:top;" | '''[[OWASP_Israel_2013_Presentations#Get Ready for the Next Big Wave of Attacks: Hacking of Leading CMS Systems|Get Ready for the Next Big Wave of Attacks: <br>Hacking of Leading CMS Systems]]''' |
''Maty Siman, CTO, Checkmarx'' | ''Maty Siman, CTO, Checkmarx'' | ||
| − | | style="vertical-align:top;" | '''STDD - The protection you REALLY need''' | + | | style="vertical-align:top;" | '''[[OWASP_Israel_2013_Presentations#STDD - The protection you REALLY need|STDD - The protection you REALLY need]]''' |
''Nir Valtman, R&D CSO, Retalix'' <br> | ''Nir Valtman, R&D CSO, Retalix'' <br> | ||
| − | '' | + | ''Alex Linder, Solution Architect, Retalix'' |
|- | |- | ||
| − | | style="color:#1F497D; width:105px; | + | | style="color:#1F497D; width:105px; font-size:10pt;" | 12:00 - 12:30 |
| − | | style="vertical-align:top;" | '''Utilizing Popular Websites for Malicious Purposes Using RDI''' | + | | style="vertical-align:top;" | '''[[OWASP_Israel_2013_Presentations#Utilizing Popular Websites for Malicious Purposes Using RDI|Utilizing Popular Websites for Malicious Purposes Using RDI]]''' |
''Daniel Chechik, Security Researcher, Trustwave SpiderLabs'' <br> | ''Daniel Chechik, Security Researcher, Trustwave SpiderLabs'' <br> | ||
''Anat Davidi, Security Researcher, Trustwave SpiderLabs'' | ''Anat Davidi, Security Researcher, Trustwave SpiderLabs'' | ||
| − | | style="vertical-align:top;" | '''Spam, Death Threats, and Other Abuses of Online Communities''' | + | | style="vertical-align:top;" | '''[[OWASP_Israel_2013_Presentations#Spam, Death Threats, and Other Abuses of Online Communities|Spam, Death Threats, and Other Abuses of Online Communities]]''' |
''Avi Douglen, Security Architect, Independent'' | ''Avi Douglen, Security Architect, Independent'' | ||
|- | |- | ||
| − | | style="color:#1F497D; width:105px; | + | | style="color:#1F497D; width:105px; font-size:10pt;" | 12:30 - 13:30 |
| − | | colspan=2 style="font-size:12pt" | Lunch Break | + | | colspan="2" style="font-size:12pt; height:40px;" | '''Lunch Break''' |
|- | |- | ||
| − | | style="color:#1F497D; width:105px; | + | | style="color:#1F497D; width:105px; font-size:10pt;" | 13:30 - 14:15 |
| − | | style="vertical-align:top;" | '''Invisibility Purge -<br>Manipulating Properties Of Invisible & Dormant Asp.Net Controls ''' | + | | style="vertical-align:top;" | '''[[OWASP_Israel_2013_Presentations#Invisibility Purge - Manipulating Properties Of Invisible & Dormant Asp.Net Controls|Invisibility Purge -<br>Manipulating Properties Of Invisible & Dormant Asp.Net Controls]]''' |
''Shay Chen, CTO, Ernst & Young (Hacktics) '' | ''Shay Chen, CTO, Ernst & Young (Hacktics) '' | ||
| − | | style="vertical-align:top;" | '''Delivering Security in Continuous Delivery Environment ''' | + | | style="vertical-align:top;" | '''[[OWASP_Israel_2013_Presentations#Delivering Security in Continuous Delivery Environment|Delivering Security in Continuous Delivery Environment]]''' |
'' Yaniv Simsolo, Senior Consultant, Comsec Consulting '' | '' Yaniv Simsolo, Senior Consultant, Comsec Consulting '' | ||
|- | |- | ||
| − | | style="color:#1F497D; width:105px; | + | | style="color:#1F497D; width:105px; font-size:10pt;" | 14:15 - 15:00 |
| − | | style="vertical-align:top;" | '''The ReFrameworker Android runtime manipulator –<br> Pentesting Android apps like a king ''' | + | | style="vertical-align:top;" | '''[[OWASP_Israel_2013_Presentations#The ReFrameworker Android runtime manipulator – Pentesting Android apps like a king|The ReFrameworker Android runtime manipulator –<br> Pentesting Android apps like a king]]''' |
| − | ''Erez Metula, AppSec Labs '' | + | ''Erez Metula, Application Security Expert, AppSec Labs (Founder)'' |
| − | | style="vertical-align:top;" | '''Designing a national defense strategy <br>for DDoS applications and volume attacks ''' | + | | style="vertical-align:top;" | '''[[OWASP_Israel_2013_Presentations#Designing a national defense strategy for DDoS applications and volume attacks|Designing a national defense strategy <br>for DDoS applications and volume attacks]]''' |
''Mirit Kagarlitsky, Head of System Analysis, Israeli National Cyber Bureau '' | ''Mirit Kagarlitsky, Head of System Analysis, Israeli National Cyber Bureau '' | ||
|- | |- | ||
| − | | style="color:#1F497D; width:105px; | + | | style="color:#1F497D; width:105px; font-size:10pt;" | 15:00 - 15:15 |
| − | | colspan=2 style="font-size:12pt" | Coffee Break | + | | colspan="2" style="font-size:12pt; height:40px;" | '''Coffee Break''' |
|- | |- | ||
| − | | style="color:#1F497D; width:105px; | + | | style="color:#1F497D; width:105px; font-size:10pt;" | 15:15 - 16:00 |
| − | | style="vertical-align:top;" | '''A Game of Pwns: <br>Pwning iPhone application security assessment using the iNalyzer framework ''' | + | | style="vertical-align:top;" | '''[[OWASP_Israel_2013_Presentations#A Game of Pwns: Pwning iPhone application security assessment using the iNalyzer framework|A Game of Pwns: <br>Pwning iPhone application security assessment using the iNalyzer framework]]''' |
''Chilik Tamir, Chief Scientist, AppSec Labs '' | ''Chilik Tamir, Chief Scientist, AppSec Labs '' | ||
| − | | style="vertical-align:top;" | '''Enhancing Web Application Defense Using Big Data ''' | + | | style="vertical-align:top;" | '''[[OWASP_Israel_2013_Presentations#Enhancing Web Application Defense Using Big Data|Enhancing Web Application Defense Using Big Data]]''' |
''Or Katz, Principal Security Researcher, Akamai Technologies '' | ''Or Katz, Principal Security Researcher, Akamai Technologies '' | ||
|- | |- | ||
| − | | style="color:#1F497D; width:105px; | + | | style="color:#1F497D; width:105px; font-size:10pt;" | 16:00 - 16:30 |
| − | | style="vertical-align:top;" | '''Automatic trust based segregation for content providers on mobile devices ''' | + | | style="vertical-align:top;" | '''[[OWASP_Israel_2013_Presentations#Automatic trust based segregation for content providers on mobile devices|Automatic trust based segregation for content providers on mobile devices]]''' |
''Oren Poleg, IDC '' | ''Oren Poleg, IDC '' | ||
| − | | style="vertical-align:top;" | '''From Obscurity to Pop Culture - Evolution of Application Security ''' | + | | style="vertical-align:top;" | '''[[OWASP_Israel_2013_Presentations#From Obscurity to Pop Culture - Evolution of Application Security|From Obscurity to Pop Culture - Evolution of Application Security]]''' |
| − | '' Irene Abezgauz, Product | + | '' Irene Abezgauz, VP Product Management, Quotium '' |
|- | |- | ||
| − | | style="color:#1F497D; width:105px; | + | | style="color:#1F497D; width:105px; font-size:10pt;" | 16:30 - 17:00 |
| − | | colspan=2 | '''Your mobile device in the service of the malicious hacker (Live Demo) ''' | + | | colspan="2" | '''[[OWASP_Israel_2013_Presentations#Your mobile device in the service of the malicious hacker (Live Demo)|Your mobile device in the service of the malicious hacker (Live Demo)]]''' |
'' Adi Sharabani, CEO, Skycure '' | '' Adi Sharabani, CEO, Skycure '' | ||
|- | |- | ||
| − | | style="color:#1F497D; width:105px; | + | | style="color:#1F497D; width:105px; font-size:10pt;" | 17:00 - 17:05 |
| − | | colspan=2 | '''End Notes''' | + | | colspan="2" | '''End Notes''' |
''Ofer Maor - Chairman, OWASP Israel; Global Membership Committee, OWASP '' | ''Ofer Maor - Chairman, OWASP Israel; Global Membership Committee, OWASP '' | ||
|- | |- | ||
|} | |} | ||
Latest revision as of 12:14, 30 September 2013
| 8:30 - 9:00 | Registration, Gathering & Networking | |
| 9:00 - 9:30 | Opening Words
Ofer Maor - Chairman, OWASP Israel; Global Membership Committee, OWASP | |
| 9:30 - 10:10 | Keynote
Why Are Investors Excited About Cyber Security Startups, Again? | |
| 10:15 - 11:00 | Evolution of online banking attack techniques
Amit Klein, CTO, Trusteer | |
| 11:00 - 11:15 | Coffee Break | |
| Track #1 | Track #2 | |
| 11:15 - 12:00 | Get Ready for the Next Big Wave of Attacks: Hacking of Leading CMS Systems Maty Siman, CTO, Checkmarx |
STDD - The protection you REALLY need
Nir Valtman, R&D CSO, Retalix |
| 12:00 - 12:30 | Utilizing Popular Websites for Malicious Purposes Using RDI
Daniel Chechik, Security Researcher, Trustwave SpiderLabs |
Spam, Death Threats, and Other Abuses of Online Communities
Avi Douglen, Security Architect, Independent |
| 12:30 - 13:30 | Lunch Break | |
| 13:30 - 14:15 | Invisibility Purge - Manipulating Properties Of Invisible & Dormant Asp.Net Controls Shay Chen, CTO, Ernst & Young (Hacktics) |
Delivering Security in Continuous Delivery Environment
Yaniv Simsolo, Senior Consultant, Comsec Consulting |
| 14:15 - 15:00 | The ReFrameworker Android runtime manipulator – Pentesting Android apps like a king Erez Metula, Application Security Expert, AppSec Labs (Founder) |
Designing a national defense strategy for DDoS applications and volume attacks Mirit Kagarlitsky, Head of System Analysis, Israeli National Cyber Bureau |
| 15:00 - 15:15 | Coffee Break | |
| 15:15 - 16:00 | A Game of Pwns: Pwning iPhone application security assessment using the iNalyzer framework Chilik Tamir, Chief Scientist, AppSec Labs |
Enhancing Web Application Defense Using Big Data
Or Katz, Principal Security Researcher, Akamai Technologies |
| 16:00 - 16:30 | Automatic trust based segregation for content providers on mobile devices
Oren Poleg, IDC |
From Obscurity to Pop Culture - Evolution of Application Security
Irene Abezgauz, VP Product Management, Quotium |
| 16:30 - 17:00 | Your mobile device in the service of the malicious hacker (Live Demo)
Adi Sharabani, CEO, Skycure | |
| 17:00 - 17:05 | End Notes
Ofer Maor - Chairman, OWASP Israel; Global Membership Committee, OWASP | |