This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "OWASP New Zealand Day 2016"
Kim Carter (talk | contribs) |
Kim Carter (talk | contribs) |
||
Line 175: | Line 175: | ||
− | + | = Presentation Schedule= | |
+ | ==Presentations== | ||
+ | <center> | ||
+ | 27th Feburary 2015 | ||
+ | <table width="80%"> | ||
+ | <tr> | ||
+ | <td width="7%" valign="top">08:30</td> | ||
+ | <td colspan="2" style="background-color: #8595C2; text-align: center">Registration Opens</td> | ||
+ | </tr> | ||
+ | <tr> | ||
+ | <td width="7%" valign="top">09:00</td> | ||
+ | <td colspan="2" style="background-color: #B9C2DC; text-align: center"> | ||
+ | <b>Welcome to OWASP New Zealand Day 2016</b><br /> | ||
+ | <i>Lech Janczewski (Associate Professor), Adrian Hayes, Denis Andzakovic and Kim Carter (OWASP Leaders)</i> | ||
+ | </td> | ||
+ | </tr> | ||
+ | <tr> | ||
+ | <td width="7%" valign="top">09:15</td> | ||
+ | <td colspan="2" style="background-color: #EEE; text-align: center"> | ||
+ | <b>Credit card fraud: you don't want to be the common point of purchase</b><br /> | ||
+ | <i>Dan Wallis - Christchurch ISIG</i> | ||
+ | </td> | ||
+ | </tr> | ||
+ | <tr> | ||
+ | <td width="7%" valign="top">09:45</td> | ||
+ | <td colspan="2" style="background-color: #B9C2DC; text-align: center"> | ||
+ | <b>Chronicles of SOP bypass</b><br /> | ||
+ | <i>Emmanuel Law - Aura Information Security</i> | ||
+ | </td> | ||
+ | </tr> | ||
+ | <tr> | ||
+ | <td width="7%" valign="top">10:15</td> | ||
+ | <td colspan="2" style="background-color: #EEE; text-align: center"> | ||
+ | <b>Keep calm and CSP</b><br /> | ||
+ | <i>Valentinas Bakaitis - Aura Information Security</i> | ||
+ | </td> | ||
+ | </tr> | ||
+ | <tr> | ||
+ | <td width="7%" valign="top">10:30</td> | ||
+ | <td colspan="2" style="background-color: #D98B66; text-align: center"> | ||
+ | <b>Break for Morning Tea</b><br /> | ||
+ | </td> | ||
+ | </tr> | ||
+ | <tr> | ||
+ | <td width="7%" valign="top">11:00</td> | ||
+ | <td colspan="2" style="background-color: #EEE; text-align: center"> | ||
+ | <b>TBA</b><br /> | ||
+ | <i>TBA</i> | ||
+ | </td> | ||
+ | </tr> | ||
+ | <tr> | ||
+ | <td width="7%" valign="top">11:30</td> | ||
+ | <td colspan="2" style="background-color: #B9C2DC; text-align: center"> | ||
+ | <b>Making AppSec a (Respectable) Religion</b><br /> | ||
+ | <i>Chris Campbell - Jade Software</i> | ||
+ | </td> | ||
+ | </tr> | ||
+ | <tr> | ||
+ | <td width="7%" valign="top">12:00</td> | ||
+ | <td colspan="2" style="background-color: #EEE; text-align: center"> | ||
+ | <b>Oauth 2.0: The Promise and Pitfalls</b><br /> | ||
+ | <i>Sergey Ozemikov - Lateral Security</i> | ||
+ | </td> | ||
+ | </tr> | ||
+ | <tr> | ||
+ | <td width="7%" valign="top">12:30</td> | ||
+ | <td colspan="2" style="background-color: #D98B66; text-align: center"> | ||
+ | <b>Break for Lunch</b><br /> | ||
+ | </td> | ||
+ | </tr> | ||
+ | <tr> | ||
+ | <td width="7%" valign="top">13:30</td> | ||
+ | <td style="background-color: #B9C2DC; text-align: center"> | ||
+ | <b>Attacking Real-World Crypto Flaws</b><br /> | ||
+ | <i>Chris Smith - Insomnia Security</i> | ||
+ | </td> | ||
+ | <td style="background-color: #B9C2DC; text-align: center"> | ||
+ | <b>TBA</b><br /> | ||
+ | <i>TBA</i> | ||
+ | </td> | ||
+ | </tr> | ||
+ | <tr> | ||
+ | <td width="7%" valign="top">14:00</td> | ||
+ | <td style="background-color: #EEE; ; text-align: center"> | ||
+ | <b>Practical Attacks on WebRTC Applications</b><br /> | ||
+ | <i>Felix Shi - Xero</i> | ||
+ | </td> | ||
+ | <td style="background-color: #EEE; ; text-align: center"> | ||
+ | <b>TBA</b><br /> | ||
+ | <i>TBA</i> | ||
+ | </td> | ||
+ | </tr> | ||
+ | <tr> | ||
+ | <td width="7%" valign="top">14:30</td> | ||
+ | <td style="background-color: #B9C2DC; text-align: center"> | ||
+ | <b>TBA</b><br /> | ||
+ | <i>TBA</i> | ||
+ | </td> | ||
+ | <td style="background-color: #B9C2DC; text-align: center"> | ||
+ | <b>Host Hardening - Achieve or Avoid?</b><br /> | ||
+ | <i>Nilesh Kapoor</i> | ||
+ | </td> | ||
+ | </tr> | ||
+ | <tr> | ||
+ | <td width="7%" valign="top">15:00</td> | ||
+ | <td style="background-color: #EEE; ; text-align: center"> | ||
+ | <b>TBA</b><br /> | ||
+ | <i>TBA</i> | ||
+ | </td> | ||
+ | <td style="background-color: #EEE; ; text-align: center"> | ||
+ | <b>I judge all of your services and applications</b><br /> | ||
+ | <i>Shahn Harris - Beca</i> | ||
+ | </td> | ||
+ | </tr> | ||
+ | <tr> | ||
+ | <td width="7%" valign="top">15:30</td> | ||
+ | <td colspan="2" style="background-color: #D98B66; text-align: center"> | ||
+ | <b>Break for Afternoon Tea</b><br /> | ||
+ | </td> | ||
+ | </tr> | ||
+ | <tr> | ||
+ | <td width="7%" valign="top">16:00</td> | ||
+ | <td colspan="2" style="background-color: #EEE; text-align: center"> | ||
+ | <b>TBA</b><br /> | ||
+ | <i>TBA</i> | ||
+ | </td> | ||
+ | </tr> | ||
+ | <tr> | ||
+ | <td width="7%" valign="top">16:30</td> | ||
+ | <td colspan="2" style="background-color: #B9C2DC; text-align: center"> | ||
+ | <b>After 30 Years, I’m Coming Out</b><br /> | ||
+ | <i>Kevin Alcock - Katipo Information Security Ltd</i> | ||
+ | </td> | ||
+ | </tr> | ||
+ | <tr> | ||
+ | <td width="7%" valign="top">17:00</td> | ||
+ | <td colspan="2" style="background-color: #EEE; text-align: center"> | ||
+ | <b>Information Security is a Marketing Responsibility</b><br /> | ||
+ | <i>Carlos Cordero - Convergnce</i> | ||
+ | </td> | ||
+ | </tr> | ||
+ | <tr> | ||
+ | <td width="7%" valign="top">17:15</td> | ||
+ | <td colspan="2" style="background-color: #B9C2DC; text-align: center"> | ||
+ | <b>Wrap Up</b><br /> | ||
+ | <i>Time for the pub, for those interested</i> | ||
+ | </td> | ||
+ | </tr> | ||
+ | </table> | ||
+ | </center> | ||
<!--= Call For Presentations = | <!--= Call For Presentations = |
Revision as of 14:49, 8 January 2016
Introduction
We are proud to announce the seventh OWASP New Zealand Day conference, to be held at the University of Auckland on Thursday February 4th, 2016. OWASP New Zealand Day is a one-day conference dedicated to application security, with an emphasis on secure architecture and development techniques to help Kiwi developers build more secure applications.
Who is it for?
- Web Developers: The morning sessions will introduce you to application security. Afternoon sessions will dive deeper into technical topics, and build on the morning sessions.
- Management: After an introduction to web application security, one of the afternoon streams will focus on informational and defensive topics.
- Security Professionals and Enthusiasts: Technical sessions later in the day will showcase new and interesting attack and defence topics.
Conference structure
Date: Thurs 4 Feb 2016
Time: 9:00am - 5:00pm
Cost: Free
Food: Morning and Afternoon tea
The main conference is on Thursday 4th of February, and will have three streams:
Morning | Introductions to application security topics | |
Afternoon | Offensive Security | Informational / Defensive |
Training
Date: Wed 3 Feb 2016
Time: 9:00am - 5:00pm or part thereof
Cost: To be advised
Food: Lunch provided
As well as the main conference on Thursday, we are pleased to be able to provide training on Wednesday at a discounted price. We anticipate a selection of introductory and advanced training topics.
The seventh OWASP New Zealand Day will be happening thanks to the support provided by the University of Auckland, which will kindly offer a slightly different location from last year. Entry to the event will, as in the past, be free.
For any comments, feedback or observations, please don't hesitate to contact us.
Registration
Registration for the main conference day is now open: Conference Registration Here
There is no cost for the main conference day. Morning and afternoon tea will be provided. Unfortunately due to increased conference running costs, lunch will not be provided as it has been for the past OWASP NZ Days. We do ask that if at any point you realise you cannot make it please cancel your registration to make room for others as spaces are limited.
Important dates
- CFP & CFT submission deadline: 7th December 2015
- Conference Registration deadline: 21st January 2016
- Training Registration deadline: 21st January 2016
- Training Day date: 3rd February 2016
- Conference Day date: 4th February 2016
Conference Venue
The University of Auckland School of Commerce |
Conference Sponsors
![]() |
![]() |
Gold Sponsors:
![]() |
||||||
Silver Sponsors:
Support Sponsor:
Conference Committee
- Denis Andzakovic - OWASP New Zealand Leader (Auckland)
- Adrian Hayes - OWASP New Zealand Leader (Wellington)
- Kim Carter - OWASP New Zealand Leader (Christchurch)
- Lech Janczewski - Associate Professor - University of Auckland School of Business
Please direct all enquiries to [email protected] | [email protected] | [email protected]
Presentations
27th Feburary 2015
08:30 | Registration Opens | |
09:00 |
Welcome to OWASP New Zealand Day 2016 |
|
09:15 |
Credit card fraud: you don't want to be the common point of purchase |
|
09:45 |
Chronicles of SOP bypass |
|
10:15 |
Keep calm and CSP |
|
10:30 |
Break for Morning Tea |
|
11:00 |
TBA |
|
11:30 |
Making AppSec a (Respectable) Religion |
|
12:00 |
Oauth 2.0: The Promise and Pitfalls |
|
12:30 |
Break for Lunch |
|
13:30 |
Attacking Real-World Crypto Flaws |
TBA |
14:00 |
Practical Attacks on WebRTC Applications |
TBA |
14:30 |
TBA |
Host Hardening - Achieve or Avoid? |
15:00 |
TBA |
I judge all of your services and applications |
15:30 |
Break for Afternoon Tea |
|
16:00 |
TBA |
|
16:30 |
After 30 Years, I’m Coming Out |
|
17:00 |
Information Security is a Marketing Responsibility |
|
17:15 |
Wrap Up |