This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Template:AppSec Israel 2014 Schedule"
Avi Douglen (talk | contribs) (original) |
Avi Douglen (talk | contribs) (Swapped Lacoon speakers) |
||
| (8 intermediate revisions by the same user not shown) | |||
| Line 1: | Line 1: | ||
| − | + | {| class="wikitable" style="border-width: 1px; border-style: solid; border-color: #1F497D; background-color:white; font-size:11pt; height:25px;" cellpadding=5 align="center" | |
| − | + | | style="color:#1F497D; width:105px; font-size:10pt;" | 9:00 - 9:30 | |
| − | + | | colspan="2" style="font-size:12pt; height:40px;" | '''Registration, Gathering & Networking''' | |
| − | + | |- | |
| − | + | | style="color:#1F497D; width:105px; font-size:10pt;" | 9:30 - 10:15 | |
| − | + | | colspan="2" | '''Opening Words''' ''(In Room #1 - Ivcher)'' | |
| − | + | ''Avi Douglen - Chairman, OWASP Israel'' <br> ''Dr. Anat Bremler-Barr, Efi Arazi School of Computer Science, IDC'' <br> ''OWASP Israel Projects'' | |
| − | + | |- | |
| − | AppSec | + | | style="color:#1F497D; width:105px; font-size:10pt;" | 10:15 - 11:00 |
| + | | colspan="2" | '''[[AppSec_Israel_2014_Presentations#Opening_Keynote:_Steering_a_Battleship_to_a_Secure_Path_.E2.80.93_Bringing_the_product_security_message_to_HP_Software|Keynote]]''' | ||
| + | '''Steering a Battleship to a Secure Path – Bringing the product security message to HP Software''' <br> | ||
| + | ''Tomer Gershoni, Chief Products Security Officer, HP Software'' | ||
| + | |- | ||
| + | | style="color:#1F497D; width:105px; font-size:10pt;" | 11:00 - 11:15 | ||
| + | | colspan="2" style="font-size:12pt; height:40px;" | '''Coffee Break''' | ||
| + | |- | ||
| + | | | ||
| + | | style="width:600px; font-size:12pt; height:40px;"| <u>'''Room #1 (Ivcher)'''</u> | ||
| + | | style="width:600px; font-size:12pt; height:40px;"| <u>'''Room #2 (Chase)'''</u> | ||
| + | |- | ||
| + | | style="color:#1F497D; width:105px; font-size:10pt;" | 11:15 - 12:00 | ||
| + | | style="vertical-align:top;" | '''[[AppSec_Israel_2014_Presentations#My Preciousss.E2.80.A6 Holding on to Your Sensitive Data|My Preciousss… Holding on to Your Sensitive Data]]''' | ||
| + | ''Ofer Maor, CTO, Quotium'' | ||
| + | | style="vertical-align:top;" | '''[[AppSec_Israel_2014_Presentations#Practical Attacks against MDM Solutions|Practical Attacks against MDM Solutions]]''' | ||
| + | ''Shai Yanovski, Security Product Manager, Lacoon Mobile Security '' | ||
| + | |- | ||
| + | | style="color:#1F497D; width:105px; font-size:10pt;" | 12:00 - 12:45 | ||
| + | | style="vertical-align:top;" | '''[[AppSec_Israel_2014_Presentations#Warning Ahead: Security Storms are Brewing in Your JavaScript|Warning Ahead: Security Storms are Brewing in Your JavaScript]]''' | ||
| + | ''Maty Siman, CTO and Founder, Checkmarx '' | ||
| + | | style="vertical-align:top;" | '''[[AppSec_Israel_2014_Presentations#Dynamic Analysis of Android Apps: Attacking Apps From The Inside|Dynamic Analysis of Android Apps: Attacking Apps From The Inside]]''' <br>'''ניתוח דינמי של אפלקציות אנדרויד''' | ||
| + | ''Erez Metula, Application Security Expert. Author of the book "Managed Code Rootkits". Founder, AppSec Labs'' | ||
| + | |- | ||
| + | | style="color:#1F497D; width:105px; font-size:10pt;" | 12:45 - 13:30 | ||
| + | | colspan="2" style="font-size:12pt; height:40px;" | '''Lunch Break''' | ||
| + | |- | ||
| + | | style="color:#1F497D; width:105px; font-size:10pt;" | 13:30 - 14:15 | ||
| + | | style="vertical-align:top;" | '''[[AppSec_Israel_2014_Presentations#A Journey To Protect Points-of-Sale|A Journey To Protect Points-of-Sale]]''' | ||
| + | ''Nir Valtman, Enterprise Security Architect, NCR'' | ||
| + | | style="vertical-align:top;" | '''[[AppSec_Israel_2014_Presentations#Mobile Security Attacks: A Glimpse From the Trenches|Mobile Security Attacks: A Glimpse From the Trenches]]''' <br> '''תקיפות מובייל: מבט מן השוחות''' | ||
| + | ''Yair Amit, CTO & Co-Founder, Skycure '' <br> | ||
| + | ''Adi Sharabani, CEO & Co-Founder, Skycure'' | ||
| + | |- | ||
| + | | style="color:#1F497D; width:105px; font-size:10pt;" | 14:15 - 15:00 | ||
| + | | style="vertical-align:top;" | '''[[AppSec_Israel_2014_Presentations#Passwords, Rehashed All Over Again|Passwords, Rehashed All Over Again]]''' <br> '''עווד פעם אתה עם הסיסמאות שלך??''' | ||
| + | ''Avi Douglen, Security Research Lead, SourceClear'' | ||
| + | | style="vertical-align:top;" | '''[[AppSec_Israel_2014_Presentations#Manipulating the Manipulator: Destroying browser-based memory corruption exploits|Manipulating the Manipulator: Destroying browser-based memory corruption exploits]]''' | ||
| + | ''Tomer Teller, Security Innovations Research Manager, Check Point'' | ||
| + | |- | ||
| + | | style="color:#1F497D; width:105px; font-size:10pt;" | 15:00 - 15:15 | ||
| + | | colspan="2" style="font-size:12pt; height:40px;" | '''Coffee Break''' | ||
| + | |- | ||
| + | | style="color:#1F497D; width:105px; font-size:10pt;" | 15:15 - 16:00 | ||
| + | | style="vertical-align:top;" | '''[[AppSec_Israel_2014_Presentations#Getting New Actionable Insights by Analyzing WAF Triggers|Getting New Actionable Insights by Analyzing WAF Triggers]]''' | ||
| + | ''Or Katz, Principal Security Researcher, Akamai Technologies '' | ||
| + | | style="vertical-align:top;" | '''[[AppSec_Israel_2014_Presentations#The (In)Security of AngularJS and MongoDB|The (In)Security of AngularJS and MongoDB]]''' | ||
| + | ''Israel Chorzevski, Tech Leader, AppSec Labs '' | ||
| + | |- | ||
| + | | style="color:#1F497D; width:105px; font-size:10pt;" | 16:00 - 16:45 | ||
| + | | style="vertical-align:top;" | '''[[AppSec_Israel_2014_Presentations#The Bank Job - Mobile Edition. Remote Exploitation of the Cordova Framework for Android|The Bank Job - Mobile Edition. Remote Exploitation of the Cordova Framework for Android]]''' | ||
| + | ''David Kaplan, Security Researcher, IBM Security Systems '' <br> | ||
| + | ''Roee Hay, Application Security Research Team Leader, IBM Security Systems'' | ||
| + | | style="vertical-align:top;" | '''[[AppSec_Israel_2014_Presentations#Static Analysis Improved Fuzzing|Static Analysis Improved Fuzzing]]''' | ||
| + | ''Moti Cohen, IDC'' | ||
| + | |- | ||
| + | | style="color:#1F497D; width:105px; font-size:10pt;" | 16:45 - 16:55 | ||
| + | | colspan="2" style="font-size:12pt; height:40px;" | ''' Break''' | ||
| + | |- | ||
| + | | style="color:#1F497D; width:105px; font-size:10pt;" | 16:55 - 17:40 | ||
| + | | colspan="2" | '''[[AppSec_Israel_2014_Presentations#InfoSec Natural Selection - Measuring the VALUE of Security Products|InfoSec Natural Selection - Measuring the VALUE of Security Products]]''' | ||
| + | ''Shay Chen, Researcher, Consultant and Analyst '' | ||
| + | |- | ||
| + | | style="color:#1F497D; width:105px; font-size:10pt;" | 17:40 - 17:45 | ||
| + | | colspan="2" | '''End Notes''' | ||
| + | ''Avi Douglen - Chairman, OWASP Israel'' | ||
| + | |- | ||
| + | |} | ||
Latest revision as of 21:54, 31 August 2014
| 9:00 - 9:30 | Registration, Gathering & Networking | |
| 9:30 - 10:15 | Opening Words (In Room #1 - Ivcher)
Avi Douglen - Chairman, OWASP Israel | |
| 10:15 - 11:00 | Keynote
Steering a Battleship to a Secure Path – Bringing the product security message to HP Software | |
| 11:00 - 11:15 | Coffee Break | |
| Room #1 (Ivcher) | Room #2 (Chase) | |
| 11:15 - 12:00 | My Preciousss… Holding on to Your Sensitive Data
Ofer Maor, CTO, Quotium |
Practical Attacks against MDM Solutions
Shai Yanovski, Security Product Manager, Lacoon Mobile Security |
| 12:00 - 12:45 | Warning Ahead: Security Storms are Brewing in Your JavaScript
Maty Siman, CTO and Founder, Checkmarx |
Dynamic Analysis of Android Apps: Attacking Apps From The Inside ניתוח דינמי של אפלקציות אנדרויד Erez Metula, Application Security Expert. Author of the book "Managed Code Rootkits". Founder, AppSec Labs |
| 12:45 - 13:30 | Lunch Break | |
| 13:30 - 14:15 | A Journey To Protect Points-of-Sale
Nir Valtman, Enterprise Security Architect, NCR |
Mobile Security Attacks: A Glimpse From the Trenches תקיפות מובייל: מבט מן השוחות Yair Amit, CTO & Co-Founder, Skycure |
| 14:15 - 15:00 | Passwords, Rehashed All Over Again עווד פעם אתה עם הסיסמאות שלך?? Avi Douglen, Security Research Lead, SourceClear |
Manipulating the Manipulator: Destroying browser-based memory corruption exploits
Tomer Teller, Security Innovations Research Manager, Check Point |
| 15:00 - 15:15 | Coffee Break | |
| 15:15 - 16:00 | Getting New Actionable Insights by Analyzing WAF Triggers
Or Katz, Principal Security Researcher, Akamai Technologies |
The (In)Security of AngularJS and MongoDB
Israel Chorzevski, Tech Leader, AppSec Labs |
| 16:00 - 16:45 | The Bank Job - Mobile Edition. Remote Exploitation of the Cordova Framework for Android
David Kaplan, Security Researcher, IBM Security Systems |
Static Analysis Improved Fuzzing
Moti Cohen, IDC |
| 16:45 - 16:55 | Break | |
| 16:55 - 17:40 | InfoSec Natural Selection - Measuring the VALUE of Security Products
Shay Chen, Researcher, Consultant and Analyst | |
| 17:40 - 17:45 | End Notes
Avi Douglen - Chairman, OWASP Israel | |