This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "OWASP Indonesia Day Conference 2017 Agenda Talks"
From OWASP
| Line 56: | Line 56: | ||
| style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | CTO PT. Asanka | | style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | CTO PT. Asanka | ||
| style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Dyan Galih | | style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Dyan Galih | ||
| − | | style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="justify" colspan="0" |<br> | + | | style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="justify" colspan="0" |Finding a unsecure end point API's using reverse engineering android technique <br> |
|- | |- | ||
| style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 15:00 - 15:15<br>(15 mins) | | style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 15:00 - 15:15<br>(15 mins) | ||
| Line 66: | Line 66: | ||
| style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Technical Session | | style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Technical Session | ||
| style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Dedy Hariyadi | | style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Dedy Hariyadi | ||
| − | | style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="justify" colspan="0" | Mobile | + | | style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="justify" colspan="0" | Mobile Forensic using XRY |
|- | |- | ||
| style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 16:00 - 16:45<br>(45 mins) | | style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 16:00 - 16:45<br>(45 mins) | ||
Revision as of 09:49, 15 August 2017
Conference agenda | |||||
| Time | Title | Speaker | Description | ||
| 8:30 - 9:00 (30 mins) |
Registration | ||||
| 9:00 - 9:15 (15 mins) |
Opening Speech by Chapter leader | Ade Yoseman Putra | Introduction to the OWASP Indonesia Day, Schedule for the Day | ||
| 9:15 - 10:00 (45 mins) |
Skinnox Pte. Ltd Singapore | Jay R. Thakor | Either Secure Baseband In Mobile Communication Or Open Source Intell.
| ||
| 10:00 - 10:45 (45 mins) |
CYBERQUOTE PTE LTD | Girindro Pringgo Digdo | Threat Modeling Using STRIDE | ||
| 11:00 - 11:45 (45 mins) |
Software Security Assurance & DevSecOps Professional - Vantage Point Security Pte. Ltd Singapore | Suman Sourav | Building OWASP Pipeline Using Open Source Tools | ||
| 11:50 - 12:30 (40 mins) |
PROJECT LEADER FOR THE OWASP MOBILE SECURITY | Sven Schleier | Fixing Mobile AppSec: The OWASP Mobile
Project | ||
| 12:30 - 13:30 (60 mins) |
Lunch | ||||
| 13:30 - 14:15 (45 mins) |
SECURITY RESEARCHER - CYBERMANTRA | Jordan Andrean , OSCP , CyberSec Hr | Modern Cyber Lab For Penetration Testing | ||
| 14:15 - 15:00 (45 mins) |
CTO PT. Asanka | Dyan Galih | Finding a unsecure end point API's using reverse engineering android technique | ||
| 15:00 - 15:15 (15 mins) |
Coffee break | ||||
| 15:15 - 16:00 (45 mins) |
Technical Session | Dedy Hariyadi | Mobile Forensic using XRY | ||
| 16:00 - 16:45 (45 mins) |
Q & A | ||||
| 16:45 - 17:00 (15 mins) |
Closing ceremony | ||||