This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "2014 BASC Homepage"

From OWASP
Jump to: navigation, search
 
(6 intermediate revisions by the same user not shown)
Line 1: Line 1:
 
{{2014_BASC:Header_Template}}
 
{{2014_BASC:Header_Template}}
 +
__NOTOC__
  
 
== Welcome ==
 
== Welcome ==
Line 10: Line 11:
 
{{2014 BASC:Section Template | Keynote}}
 
{{2014 BASC:Section Template | Keynote}}
  
'''AppSec: how it fits into Digital Security'''
+
[[File:DrJared.jpg|left]] '''AppSec: How It Fits into Digital Security'''
  
Securing code is important. But history has shown us that  
+
Securing code is important. But history has shown us that we can never be certain that our code is 100% perfect. This becomes particularly true in rapidly evolving environments. As an industry we need to take a broader look. What security features are provided by the hardware, OS, language, compiler, and even application type? Join us bright and early as Dr. DeMott kicks off the 2014 Boston Application Security Conference with a Keynote you won’t forget.
we can never be certain that our code is 100% perfect. This  
 
becomes particularly true in rapidly evolving environments.  
 
As an industry we need to take a broader look. What security  
 
features are provided by the hardware, OS, language, compiler,  
 
and even application type? Join us bright and early as Dr.  
 
DeMott kicks off the 2014 Boston Application Security Conference  
 
with a Keynote you won’t forget.
 
  
[[File:DrJared.jpg|left]] Dr. Jared DeMott is a seasoned security researcher, and has spoken at conferences such as DerbyCon, BlackHat, Defcon, ToorCon, Shakacon, DakotaCon, CarolinaCon, ThotCon, GRRCon, and Bsides*. Past notable research relates to stopping a trendy hacker exploit technique (known as ROP), by placing as a finalist in Microsoft’s BlueHat prize contest, and by more recently showing how to bypass Microsoft’s EMET protection tool.
+
Dr. Jared DeMott is a seasoned security researcher, and has spoken at conferences such as DerbyCon, BlackHat, Defcon, ToorCon, Shakacon, DakotaCon, CarolinaCon, ThotCon, GRRCon, and Bsides*. Past notable research relates to stopping a trendy hacker exploit technique (known as ROP), by placing as a finalist in Microsoft’s BlueHat prize contest, and by more recently showing how to bypass Microsoft’s EMET protection tool.
  
 
Jared is active in the security community by teaching his  
 
Jared is active in the security community by teaching his  
Line 30: Line 24:
 
prestigious institutions such as the United States Military  
 
prestigious institutions such as the United States Military  
 
Academy, and previously worked for the National Security Agency.  
 
Academy, and previously worked for the National Security Agency.  
DeMott holds a PhD from Michigan State University.
+
DeMott holds a PhD from Michigan State University.<br clear=all>
  
 
{{2014 BASC:Section Template | The Details}}
 
{{2014 BASC:Section Template | The Details}}
Line 37: Line 31:
 
* Directions: [http://binged.it/OIklru Microsoft Cambridge Sales Office Directions]
 
* Directions: [http://binged.it/OIklru Microsoft Cambridge Sales Office Directions]
  
<!--
 
 
* [[2014_BASC_Agenda | Agenda]]
 
* [[2014_BASC_Agenda | Agenda]]
-->
 
 
* [[2014_BASC_Speakers | Speakers]]
 
* [[2014_BASC_Speakers | Speakers]]
 
* [[2014_BASC_Presentations | Presentations]]
 
* [[2014_BASC_Presentations | Presentations]]
 
* LinkedIn [https://www.linkedin.com/groups/Boston-Application-Security-Conference-BASC-4631647 Group]
 
* LinkedIn [https://www.linkedin.com/groups/Boston-Application-Security-Conference-BASC-4631647 Group]
 
* Twitter: Follow [http://twitter.com/#!/BASConf @BASConf] HashTag: #basc2014
 
* Twitter: Follow [http://twitter.com/#!/BASConf @BASConf] HashTag: #basc2014
* Sponsorships: [[2014_BASC_Sponsorship|Information on sponsoring BASC]]
+
<!-- * Sponsorships: [[2014_BASC_Sponsorship|Information on sponsoring BASC]] -->
  
 
{{2014 BASC:Section Template | Registration}}
 
{{2014 BASC:Section Template | Registration}}

Latest revision as of 01:52, 14 October 2014

Boston-Banner-468x60.gif 2014 BASC: Home Agenda Presentations Speakers

Platinum Sponsors

Akamai Cigital EMC Rapid7 Sonatype


Gold Sponsors

Accuvant bugcrowdContrast Security   NetSPI nVisium Veracode

Silver Sponsor

SWAMP - Software Assurance Marketplace


We kindly thank our sponsors for their support. All slots are full.
Please help us keep BASC free by viewing and visiting all of our sponsors.


Welcome

This is the homepage for the 2014 Boston Application Security Conference (BASC). This free conference will take place on Saturday, October 18th at the Microsoft Cambridge Sales Office, One Cambridge Center, Cambridge, MA 02142. Note the new location, down the street from previous years' conferences.

The BASC will be a free, one day, informal conference, aimed at increasing awareness and knowledge of application security in the greater Boston area. While many of the presentations will cover state-of-the-art application security concepts, the BASC is intended to appeal to a wide-array of attendees. Application security professionals, professional software developers, software quality engineers, computer science students, and security software vendors should be able to come to the BASC, learn, and hopefully enjoy themselves at the same time.

Keynote

DrJared.jpg
AppSec: How It Fits into Digital Security

Securing code is important. But history has shown us that we can never be certain that our code is 100% perfect. This becomes particularly true in rapidly evolving environments. As an industry we need to take a broader look. What security features are provided by the hardware, OS, language, compiler, and even application type? Join us bright and early as Dr. DeMott kicks off the 2014 Boston Application Security Conference with a Keynote you won’t forget.

Dr. Jared DeMott is a seasoned security researcher, and has spoken at conferences such as DerbyCon, BlackHat, Defcon, ToorCon, Shakacon, DakotaCon, CarolinaCon, ThotCon, GRRCon, and Bsides*. Past notable research relates to stopping a trendy hacker exploit technique (known as ROP), by placing as a finalist in Microsoft’s BlueHat prize contest, and by more recently showing how to bypass Microsoft’s EMET protection tool.

Jared is active in the security community by teaching his Application Security course, and has co-authored the book – Fuzzing for Software Security Testing and Quality Assurance. DeMott has been on three winning Defcon CTF teams, and has the black badges to prove it. He has been an invited lecturer at prestigious institutions such as the United States Military Academy, and previously worked for the National Security Agency. DeMott holds a PhD from Michigan State University.

The Details

Registration

Admission to the BASC is free but registrationis required for breakfast, lunch, and the evening social time. We will do everything possible to accommodate late registrants but the facility and food are limited. Online registration is now open and you are encouraged to register early.


You can find out more about this conference at basc2014.org
Conference Organizer: Jim Weiler