This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "OWASP Indonesia Day Conference 2017 Agenda Talks"

From OWASP
Jump to: navigation, search
Line 56: Line 56:
 
| style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | CTO PT. Asanka
 
| style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | CTO PT. Asanka
 
| style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Dyan Galih
 
| style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Dyan Galih
| style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="justify" colspan="0" |<br>  
+
| style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="justify" colspan="0" |Finding a unsecure end point API's using reverse engineering android technique <br>  
 
|-
 
|-
 
| style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 15:00 - 15:15<br>(15 mins)  
 
| style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 15:00 - 15:15<br>(15 mins)  
Line 66: Line 66:
 
| style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Technical Session
 
| style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Technical Session
 
| style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Dedy Hariyadi
 
| style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Dedy Hariyadi
| style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="justify" colspan="0" | Mobile Forensics
+
| style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="justify" colspan="0" | Mobile Forensic using XRY
 
|-
 
|-
 
| style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 16:00 - 16:45<br>(45 mins)  
 
| style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 16:00 - 16:45<br>(45 mins)  

Revision as of 09:49, 15 August 2017

Conference agenda

Time Title Speaker Description
8:30 - 9:00
(30 mins)
Registration
9:00 - 9:15
(15 mins)
Opening Speech by Chapter leader Ade Yoseman Putra Introduction to the OWASP Indonesia Day, Schedule for the Day
9:15 - 10:00
(45 mins)
Skinnox Pte. Ltd Singapore Jay R. Thakor Either Secure Baseband In Mobile Communication Or Open Source Intell.


10:00 - 10:45
(45 mins)
CYBERQUOTE PTE LTD Girindro Pringgo Digdo Threat Modeling Using STRIDE
11:00 - 11:45
(45 mins)
Software Security Assurance & DevSecOps Professional - Vantage Point Security Pte. Ltd Singapore Suman Sourav Building OWASP Pipeline Using Open Source Tools
11:50 - 12:30
(40 mins)
PROJECT LEADER FOR THE OWASP MOBILE SECURITY Sven Schleier Fixing Mobile AppSec: The OWASP Mobile

Project

12:30 - 13:30
(60 mins)
Lunch
13:30 - 14:15
(45 mins)
SECURITY RESEARCHER - CYBERMANTRA Jordan Andrean , OSCP , CyberSec Hr Modern Cyber Lab For Penetration Testing
14:15 - 15:00
(45 mins)
CTO PT. Asanka Dyan Galih Finding a unsecure end point API's using reverse engineering android technique
15:00 - 15:15
(15 mins)
Coffee break
15:15 - 16:00
(45 mins)
Technical Session Dedy Hariyadi Mobile Forensic using XRY
16:00 - 16:45
(45 mins)
Q & A
16:45 - 17:00
(15 mins)
Closing ceremony