This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "OWASP New Zealand Day 2016"

From OWASP
Jump to: navigation, search
Line 175: Line 175:
 
Please direct all enquiries to [email protected] | [email protected] | [email protected]
 
Please direct all enquiries to [email protected] | [email protected] | [email protected]
  
 
+
= Presentation Schedule=
 +
==Presentations==
 +
<center>
 +
27th Feburary 2015
 +
<table width="80%">
 +
<tr>
 +
<td width="7%" valign="top">08:30</td>
 +
<td colspan="2" style="background-color: #8595C2; text-align: center">Registration Opens</td>
 +
</tr>
 +
<tr>
 +
<td width="7%" valign="top">09:00</td>
 +
<td colspan="2" style="background-color: #B9C2DC; text-align: center">
 +
<b>Welcome to OWASP New Zealand Day 2016</b><br />
 +
<i>Lech Janczewski (Associate Professor), Adrian Hayes, Denis Andzakovic and Kim Carter (OWASP Leaders)</i>
 +
</td>
 +
</tr> 
 +
<tr>
 +
<td width="7%" valign="top">09:15</td>
 +
<td colspan="2" style="background-color: #EEE; text-align: center">
 +
<b>Credit card fraud: you don't want to be the common point of purchase</b><br />
 +
<i>Dan Wallis - Christchurch ISIG</i>
 +
</td>
 +
</tr>
 +
<tr>
 +
<td width="7%" valign="top">09:45</td>
 +
<td colspan="2" style="background-color: #B9C2DC; text-align: center">
 +
<b>Chronicles of SOP bypass</b><br />
 +
<i>Emmanuel Law - Aura Information Security</i>
 +
</td>
 +
</tr>
 +
<tr>
 +
<td width="7%" valign="top">10:15</td>
 +
<td colspan="2" style="background-color: #EEE; text-align: center">
 +
<b>Keep calm and CSP</b><br />
 +
<i>Valentinas Bakaitis - Aura Information Security</i>
 +
</td>
 +
</tr> 
 +
<tr>
 +
<td width="7%" valign="top">10:30</td>
 +
<td colspan="2" style="background-color: #D98B66; text-align: center">
 +
<b>Break for Morning Tea</b><br />
 +
</td>
 +
</tr> 
 +
<tr>
 +
<td width="7%" valign="top">11:00</td>
 +
<td colspan="2" style="background-color: #EEE; text-align: center">
 +
<b>TBA</b><br />
 +
<i>TBA</i>
 +
</td>
 +
</tr>
 +
<tr>
 +
<td width="7%" valign="top">11:30</td>
 +
<td colspan="2" style="background-color: #B9C2DC; text-align: center">
 +
<b>Making AppSec a (Respectable) Religion</b><br />
 +
<i>Chris Campbell - Jade Software</i>
 +
</td>
 +
</tr>
 +
<tr>
 +
<td width="7%" valign="top">12:00</td>
 +
<td colspan="2" style="background-color: #EEE; text-align: center">
 +
<b>Oauth 2.0: The Promise and Pitfalls</b><br />
 +
<i>Sergey Ozemikov - Lateral Security</i>
 +
</td>
 +
</tr> 
 +
<tr>
 +
<td width="7%" valign="top">12:30</td>
 +
<td colspan="2" style="background-color: #D98B66; text-align: center">
 +
<b>Break for Lunch</b><br />
 +
</td>
 +
</tr> 
 +
<tr>
 +
<td width="7%" valign="top">13:30</td>
 +
<td style="background-color: #B9C2DC; text-align: center">
 +
<b>Attacking Real-World Crypto Flaws</b><br />
 +
<i>Chris Smith - Insomnia Security</i>
 +
</td>
 +
<td style="background-color: #B9C2DC; text-align: center">
 +
<b>TBA</b><br />
 +
<i>TBA</i>
 +
</td>
 +
</tr>
 +
<tr>
 +
<td width="7%" valign="top">14:00</td>
 +
<td style="background-color: #EEE; ; text-align: center">
 +
<b>Practical Attacks on WebRTC Applications</b><br />
 +
<i>Felix Shi - Xero</i>
 +
</td>
 +
<td style="background-color: #EEE; ; text-align: center">
 +
<b>TBA</b><br />
 +
<i>TBA</i>
 +
</td>
 +
</tr>
 +
<tr>
 +
<td width="7%" valign="top">14:30</td>
 +
<td style="background-color: #B9C2DC; text-align: center">
 +
<b>TBA</b><br />
 +
<i>TBA</i>
 +
</td> 
 +
<td style="background-color: #B9C2DC; text-align: center">
 +
<b>Host Hardening - Achieve or Avoid?</b><br />
 +
<i>Nilesh Kapoor</i>
 +
</td>
 +
</tr>
 +
<tr>
 +
<td width="7%" valign="top">15:00</td>
 +
<td style="background-color: #EEE; ; text-align: center">
 +
<b>TBA</b><br />
 +
<i>TBA</i>
 +
</td>
 +
<td style="background-color: #EEE; ; text-align: center">
 +
<b>I judge all of your services and applications</b><br />
 +
<i>Shahn Harris - Beca</i>
 +
</td>
 +
</tr> 
 +
<tr>
 +
<td width="7%" valign="top">15:30</td>
 +
<td colspan="2" style="background-color: #D98B66; text-align: center">
 +
<b>Break for Afternoon Tea</b><br />
 +
</td>
 +
</tr>
 +
<tr>
 +
<td width="7%" valign="top">16:00</td>
 +
<td colspan="2" style="background-color: #EEE; text-align: center">
 +
<b>TBA</b><br />
 +
<i>TBA</i>
 +
</td>
 +
</tr>
 +
<tr>
 +
<td width="7%" valign="top">16:30</td>
 +
<td colspan="2" style="background-color: #B9C2DC; text-align: center">
 +
<b>After 30 Years, I’m Coming Out</b><br />
 +
<i>Kevin Alcock - Katipo Information Security Ltd</i>
 +
</td>
 +
</tr>
 +
<tr>
 +
<td width="7%" valign="top">17:00</td>
 +
<td colspan="2" style="background-color: #EEE; text-align: center">
 +
<b>Information Security is a Marketing Responsibility</b><br />
 +
<i>Carlos Cordero - Convergnce</i>
 +
</td>
 +
</tr>
 +
<tr>
 +
<td width="7%" valign="top">17:15</td>
 +
<td colspan="2" style="background-color: #B9C2DC; text-align: center">
 +
<b>Wrap Up</b><br />
 +
<i>Time for the pub, for those interested</i>
 +
</td>
 +
</tr>
 +
</table>
 +
</center>
  
 
<!--= Call For Presentations =
 
<!--= Call For Presentations =

Revision as of 14:49, 8 January 2016

OWASP_NZ_Day_2016_logo.jpg

3rd and 4th Feburary 2016 - Auckland


Introduction

We are proud to announce the seventh OWASP New Zealand Day conference, to be held at the University of Auckland on Thursday February 4th, 2016. OWASP New Zealand Day is a one-day conference dedicated to application security, with an emphasis on secure architecture and development techniques to help Kiwi developers build more secure applications.


Who is it for?

  • Web Developers: The morning sessions will introduce you to application security. Afternoon sessions will dive deeper into technical topics, and build on the morning sessions.
  • Management: After an introduction to web application security, one of the afternoon streams will focus on informational and defensive topics.
  • Security Professionals and Enthusiasts: Technical sessions later in the day will showcase new and interesting attack and defence topics.

Conference structure

Date: Thurs 4 Feb 2016
Time: 9:00am - 5:00pm
Cost: Free
Food: Morning and Afternoon tea

The main conference is on Thursday 4th of February, and will have three streams:


Morning Introductions to application security topics
Afternoon Offensive Security Informational / Defensive

Training

Date: Wed 3 Feb 2016
Time: 9:00am - 5:00pm or part thereof
Cost: To be advised
Food: Lunch provided

As well as the main conference on Thursday, we are pleased to be able to provide training on Wednesday at a discounted price. We anticipate a selection of introductory and advanced training topics.


The seventh OWASP New Zealand Day will be happening thanks to the support provided by the University of Auckland, which will kindly offer a slightly different location from last year. Entry to the event will, as in the past, be free.


For any comments, feedback or observations, please don't hesitate to contact us.

Registration

Registration for the main conference day is now open: Conference Registration Here

There is no cost for the main conference day. Morning and afternoon tea will be provided. Unfortunately due to increased conference running costs, lunch will not be provided as it has been for the past OWASP NZ Days. We do ask that if at any point you realise you cannot make it please cancel your registration to make room for others as spaces are limited.


Important dates

  • CFP & CFT submission deadline: 7th December 2015
  • Conference Registration deadline: 21st January 2016
  • Training Registration deadline: 21st January 2016
  • Training Day date: 3rd February 2016
  • Conference Day date: 4th February 2016


Conference Venue

The University of Auckland School of Commerce
Address: 12 Grafton Road

Main conference room: Level 1
Room: 115 (Fisher & Paykel Auditorium)

Afternoon parallel stream: Level 0
Room: B5

Auckland
New Zealand
Map

073 AUBiz 10Apr08small.jpg MG 0037small.JPG

Conference Sponsors

University_of_Auckland_crest_small.png
Nz_information_security_forum.png
ICT and Department of Information Systems and Operations Management
 

Gold Sponsors:

INSOMNIA.PNG
   
RedShield.png
   
SA_Logo_w_DD.gif
Insomnia Security
   
Aura RedShield
   
www.security-assessment.com

Silver Sponsors:

Quantum.png
Wynyard CMYK land.png

Support Sponsor:

BinaryMistLimited.png
     

Conference Committee

  • Denis Andzakovic - OWASP New Zealand Leader (Auckland)
  • Adrian Hayes - OWASP New Zealand Leader (Wellington)
  • Kim Carter - OWASP New Zealand Leader (Christchurch)
  • Lech Janczewski - Associate Professor - University of Auckland School of Business

Please direct all enquiries to [email protected] | [email protected] | [email protected]

Presentations

27th Feburary 2015

08:30 Registration Opens
09:00

Welcome to OWASP New Zealand Day 2016
Lech Janczewski (Associate Professor), Adrian Hayes, Denis Andzakovic and Kim Carter (OWASP Leaders)

09:15

Credit card fraud: you don't want to be the common point of purchase
Dan Wallis - Christchurch ISIG

09:45

Chronicles of SOP bypass
Emmanuel Law - Aura Information Security

10:15

Keep calm and CSP
Valentinas Bakaitis - Aura Information Security

10:30

Break for Morning Tea

11:00

TBA
TBA

11:30

Making AppSec a (Respectable) Religion
Chris Campbell - Jade Software

12:00

Oauth 2.0: The Promise and Pitfalls
Sergey Ozemikov - Lateral Security

12:30

Break for Lunch

13:30

Attacking Real-World Crypto Flaws
Chris Smith - Insomnia Security

TBA
TBA

14:00

Practical Attacks on WebRTC Applications
Felix Shi - Xero

TBA
TBA

14:30

TBA
TBA

Host Hardening - Achieve or Avoid?
Nilesh Kapoor

15:00

TBA
TBA

I judge all of your services and applications
Shahn Harris - Beca

15:30

Break for Afternoon Tea

16:00

TBA
TBA

16:30

After 30 Years, I’m Coming Out
Kevin Alcock - Katipo Information Security Ltd

17:00

Information Security is a Marketing Responsibility
Carlos Cordero - Convergnce

17:15

Wrap Up
Time for the pub, for those interested