This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Template:AppSec Israel 2014 Schedule"

From OWASP
Jump to: navigation, search
(original)
 
(Swapped Lacoon speakers)
 
(8 intermediate revisions by the same user not shown)
Line 1: Line 1:
TBD.   
+
{| class="wikitable" style="border-width: 1px; border-style: solid; border-color: #1F497D; background-color:white; font-size:11pt; height:25px;" cellpadding=5 align="center"
 
+
| style="color:#1F497D; width:105px; font-size:10pt;" | 9:00 - 9:30
In order to ensure fascinating lectures as every year, we are opening a Call for Presentations and anyone is invited to submit a proposal for a presentation.  
+
| colspan="2" style="font-size:12pt;  height:40px;" | '''Registration, Gathering & Networking'''
 
+
|-
Call for Presentations is now open! [[AppSec_Israel_2014_CFP|Submit your proposal here]].    
+
| style="color:#1F497D; width:105px; font-size:10pt;" | 9:30 - 10:15
 
+
| colspan="2" | '''Opening Words''' ''(In Room #1 - Ivcher)''
SUBMISSION DEADLINE: August 3rd, 2014
+
''Avi Douglen - Chairman, OWASP Israel'' <br> ''Dr. Anat Bremler-Barr, Efi Arazi School of Computer Science, IDC'' <br> ''OWASP Israel Projects''
 
+
|-
AppSec Israel always has excellent talks, but even if you've never done this before - you should not be discouraged from submitting! It is important to the conference committee to have a variety of speakers, and even if this is your first time presenting we will ensure that you have the support needed to give a great talk.
+
| style="color:#1F497D; width:105px; font-size:10pt;" | 10:15 - 11:00
 +
| colspan="2" | '''[[AppSec_Israel_2014_Presentations#Opening_Keynote:_Steering_a_Battleship_to_a_Secure_Path_.E2.80.93_Bringing_the_product_security_message_to_HP_Software|Keynote]]'''
 +
'''Steering a Battleship to a Secure Path – Bringing the product security message to HP Software''' <br>    
 +
''Tomer Gershoni, Chief Products Security Officer, HP Software''
 +
|-
 +
| style="color:#1F497D; width:105px; font-size:10pt;" | 11:00 - 11:15
 +
| colspan="2" style="font-size:12pt; height:40px;" | '''Coffee Break'''
 +
|-
 +
| &nbsp;
 +
| style="width:600px; font-size:12pt; height:40px;"| <u>'''Room #1 (Ivcher)'''</u>
 +
| style="width:600px; font-size:12pt; height:40px;"| <u>'''Room #2 (Chase)'''</u>
 +
|-
 +
| style="color:#1F497D; width:105px; font-size:10pt;" | 11:15 - 12:00
 +
| style="vertical-align:top;" | '''[[AppSec_Israel_2014_Presentations#My Preciousss.E2.80.A6 Holding on to Your Sensitive Data|My Preciousss… Holding on to Your Sensitive Data]]'''
 +
''Ofer Maor, CTO, Quotium''
 +
| style="vertical-align:top;" | '''[[AppSec_Israel_2014_Presentations#Practical Attacks against MDM Solutions|Practical Attacks against MDM Solutions]]'''
 +
''Shai Yanovski, Security Product Manager, Lacoon Mobile Security ''
 +
|-
 +
| style="color:#1F497D; width:105px; font-size:10pt;" | 12:00 - 12:45
 +
| style="vertical-align:top;" | '''[[AppSec_Israel_2014_Presentations#Warning Ahead: Security Storms are Brewing in Your JavaScript|Warning Ahead: Security Storms are Brewing in Your JavaScript]]'''
 +
''Maty Siman, CTO and Founder, Checkmarx ''
 +
| style="vertical-align:top;" | '''[[AppSec_Israel_2014_Presentations#Dynamic Analysis of Android Apps: Attacking Apps From The Inside|Dynamic Analysis of Android Apps: Attacking Apps From The Inside]]''' <br>'''ניתוח דינמי של אפלקציות אנדרויד''' 
 +
''Erez Metula, Application Security Expert. Author of the book "Managed Code Rootkits". Founder, AppSec Labs''
 +
|-
 +
| style="color:#1F497D; width:105px; font-size:10pt;" | 12:45 - 13:30
 +
| colspan="2" style="font-size:12pt; height:40px;" | '''Lunch Break'''
 +
|-
 +
| style="color:#1F497D; width:105px; font-size:10pt;" | 13:30 - 14:15
 +
| style="vertical-align:top;" | '''[[AppSec_Israel_2014_Presentations#A Journey To Protect Points-of-Sale|A Journey To Protect Points-of-Sale]]'''
 +
''Nir Valtman, Enterprise Security Architect, NCR''
 +
| style="vertical-align:top;" | '''[[AppSec_Israel_2014_Presentations#Mobile Security Attacks: A Glimpse From the Trenches|Mobile Security Attacks: A Glimpse From the Trenches]]''' <br> '''תקיפות מובייל: מבט מן השוחות'''
 +
''Yair Amit, CTO & Co-Founder, Skycure '' <br>
 +
''Adi Sharabani, CEO & Co-Founder, Skycure''
 +
|-
 +
| style="color:#1F497D; width:105px; font-size:10pt;" | 14:15 - 15:00
 +
| style="vertical-align:top;" | '''[[AppSec_Israel_2014_Presentations#Passwords, Rehashed All Over Again|Passwords, Rehashed All Over Again]]''' <br> '''עווד פעם אתה עם הסיסמאות שלך??'''    
 +
''Avi Douglen, Security Research Lead, SourceClear''
 +
| style="vertical-align:top;" | '''[[AppSec_Israel_2014_Presentations#Manipulating the Manipulator: Destroying browser-based memory corruption exploits|Manipulating the Manipulator: Destroying browser-based memory corruption exploits]]'''
 +
''Tomer Teller, Security Innovations Research Manager, Check Point''
 +
|-
 +
| style="color:#1F497D; width:105px; font-size:10pt;" | 15:00 - 15:15
 +
| colspan="2" style="font-size:12pt; height:40px;" | '''Coffee Break'''
 +
|-
 +
| style="color:#1F497D; width:105px; font-size:10pt;" | 15:15 - 16:00
 +
| style="vertical-align:top;" | '''[[AppSec_Israel_2014_Presentations#Getting New Actionable Insights by Analyzing WAF Triggers|Getting New Actionable Insights by Analyzing WAF Triggers]]'''
 +
''Or Katz, Principal Security Researcher, Akamai Technologies ''
 +
| style="vertical-align:top;" | '''[[AppSec_Israel_2014_Presentations#The (In)Security of AngularJS and MongoDB|The (In)Security of AngularJS and MongoDB]]'''
 +
''Israel Chorzevski, Tech Leader, AppSec Labs ''
 +
|-
 +
| style="color:#1F497D; width:105px; font-size:10pt;" | 16:00 - 16:45
 +
| style="vertical-align:top;" | '''[[AppSec_Israel_2014_Presentations#The Bank Job - Mobile Edition. Remote Exploitation of the Cordova Framework for Android|The Bank Job - Mobile Edition. Remote Exploitation of the Cordova Framework for Android]]'''
 +
''David Kaplan, Security Researcher, IBM Security Systems '' <br>
 +
''Roee Hay, Application Security Research Team Leader, IBM Security Systems''
 +
| style="vertical-align:top;" | '''[[AppSec_Israel_2014_Presentations#Static Analysis Improved Fuzzing|Static Analysis Improved Fuzzing]]'''
 +
''Moti Cohen, IDC''
 +
|-
 +
| style="color:#1F497D; width:105px; font-size:10pt;" | 16:45 - 16:55
 +
| colspan="2" style="font-size:12pt; height:40px;" | ''' Break'''
 +
|-
 +
| style="color:#1F497D; width:105px; font-size:10pt;" | 16:55 - 17:40
 +
| colspan="2" | '''[[AppSec_Israel_2014_Presentations#InfoSec Natural Selection - Measuring the VALUE of Security Products|InfoSec Natural Selection - Measuring the VALUE of Security Products]]'''
 +
''Shay Chen, Researcher, Consultant and Analyst ''
 +
|-
 +
| style="color:#1F497D; width:105px; font-size:10pt;" | 17:40 - 17:45 
 +
| colspan="2" | '''End Notes'''
 +
''Avi Douglen - Chairman, OWASP Israel''
 +
|-
 +
|}

Latest revision as of 21:54, 31 August 2014

9:00 - 9:30 Registration, Gathering & Networking
9:30 - 10:15 Opening Words (In Room #1 - Ivcher)

Avi Douglen - Chairman, OWASP Israel
Dr. Anat Bremler-Barr, Efi Arazi School of Computer Science, IDC
OWASP Israel Projects

10:15 - 11:00 Keynote

Steering a Battleship to a Secure Path – Bringing the product security message to HP Software
Tomer Gershoni, Chief Products Security Officer, HP Software

11:00 - 11:15 Coffee Break
  Room #1 (Ivcher) Room #2 (Chase)
11:15 - 12:00 My Preciousss… Holding on to Your Sensitive Data

Ofer Maor, CTO, Quotium

Practical Attacks against MDM Solutions

Shai Yanovski, Security Product Manager, Lacoon Mobile Security

12:00 - 12:45 Warning Ahead: Security Storms are Brewing in Your JavaScript

Maty Siman, CTO and Founder, Checkmarx

Dynamic Analysis of Android Apps: Attacking Apps From The Inside
ניתוח דינמי של אפלקציות אנדרויד

Erez Metula, Application Security Expert. Author of the book "Managed Code Rootkits". Founder, AppSec Labs

12:45 - 13:30 Lunch Break
13:30 - 14:15 A Journey To Protect Points-of-Sale

Nir Valtman, Enterprise Security Architect, NCR

Mobile Security Attacks: A Glimpse From the Trenches
תקיפות מובייל: מבט מן השוחות

Yair Amit, CTO & Co-Founder, Skycure
Adi Sharabani, CEO & Co-Founder, Skycure

14:15 - 15:00 Passwords, Rehashed All Over Again
עווד פעם אתה עם הסיסמאות שלך??

Avi Douglen, Security Research Lead, SourceClear

Manipulating the Manipulator: Destroying browser-based memory corruption exploits

Tomer Teller, Security Innovations Research Manager, Check Point

15:00 - 15:15 Coffee Break
15:15 - 16:00 Getting New Actionable Insights by Analyzing WAF Triggers

Or Katz, Principal Security Researcher, Akamai Technologies

The (In)Security of AngularJS and MongoDB

Israel Chorzevski, Tech Leader, AppSec Labs

16:00 - 16:45 The Bank Job - Mobile Edition. Remote Exploitation of the Cordova Framework for Android

David Kaplan, Security Researcher, IBM Security Systems
Roee Hay, Application Security Research Team Leader, IBM Security Systems

Static Analysis Improved Fuzzing

Moti Cohen, IDC

16:45 - 16:55 Break
16:55 - 17:40 InfoSec Natural Selection - Measuring the VALUE of Security Products

Shay Chen, Researcher, Consultant and Analyst

17:40 - 17:45 End Notes

Avi Douglen - Chairman, OWASP Israel