This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "OWASP Indonesia Day Conference 2017 Agenda Talks"

From OWASP
Jump to: navigation, search
Line 18: Line 18:
 
|-
 
|-
 
| style="width:10%" valign="middle" height="30" bgcolor="#CCEEEF" align="center" colspan="0" | 9:15 - 09:30 <br>(15 mins)
 
| style="width:10%" valign="middle" height="30" bgcolor="#CCEEEF" align="center" colspan="0" | 9:15 - 09:30 <br>(15 mins)
| style="width:25%" valign="middle" height="30" bgcolor="#CCEEEE" align="center" colspan="0" | Appointment of STMIK Akakom as OWASP ACADEMIC SUPPORTER
+
| style="width:25%" valign="middle" height="30" bgcolor="#CCEEEE" align="center" colspan="0" | Appointment of STMIK Akakom as OWASP ACADEMIC SUPPORTER  
 
 
 
 
 
| style="width:40%" valign="middle" height="30" bgcolor="#CCEEEE" align="center" colspan="0" | Sri Redjeki, S.Si,M.Kom
 
| style="width:40%" valign="middle" height="30" bgcolor="#CCEEEE" align="center" colspan="0" | Sri Redjeki, S.Si,M.Kom
 
| style="width:25%" valign="middle" height="30" bgcolor="#CCEEEE" align="justify" colspan="0" |  
 
| style="width:25%" valign="middle" height="30" bgcolor="#CCEEEE" align="justify" colspan="0" |  
Line 26: Line 24:
 
   
 
   
 
|-
 
|-
 +
| style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 9:30 - 10:00
 +
(30 mins)
 +
| style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Technical Support Manager of Rumahweb.com
 +
| style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Mr Yeni Setiawan
 +
| style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="justify" colspan="0" |  Cloud with a chance of security breach
 +
|-
 +
 
| style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 10:00 - 10:45<br>(45 mins)  
 
| style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 10:00 - 10:45<br>(45 mins)  
| style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | CYBERQUOTE PTE LTD
+
| style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Software Security Assurance & DevSecOps Professional - Vantage Point Security Pte. Ltd Singapore
| style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Girindro Pringgo Digdo
+
| style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Suman Sourav (<strong>Keynote Speaker</strong>)
| style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="justify" colspan="0" | Threat Modeling Using STRIDE
+
| style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="justify" colspan="0" |Building OWASP Pipeline Using Open Source Tools
  
 
|-
 
|-
  
| style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 11:00 - 11:45<br>(45 mins)
+
| style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 10:45 - 11:15
| style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Software Security Assurance & DevSecOps Professional - Vantage Point Security  Pte. Ltd Singapore
+
(30 mins)
| style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" |Suman Sourav
+
| style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | CYBERQUOTE PTE LTD
| style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="justify" colspan="0" | Building OWASP Pipeline Using Open Source Tools
+
| style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" |Girindro Pringgo Digdo
 +
| style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="justify" colspan="0" | Threat Modeling Using STRIDE
 
|-
 
|-
| style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 11:50 - 12:30<br>(40 mins)
+
| style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 11:15 - 12:00
 +
(45 mins)
 
| style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | PROJECT LEADER FOR THE OWASP MOBILE SECURITY  
 
| style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | PROJECT LEADER FOR THE OWASP MOBILE SECURITY  
 
| style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Sven Schleier
 
| style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Sven Schleier
Line 44: Line 51:
 
Project<br>  
 
Project<br>  
 
|-
 
|-
| style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 12:30 - 13:30 <br>(60 mins)
+
| style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 12:15 - 12:45
 +
(30 mins)
 +
| style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" |Q & A
 +
| style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" |
 +
| style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="justify" colspan="0" |
 +
|-
 +
| style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 12:45 - 13:45
 +
(60 mins)
 
| style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" |Lunch
 
| style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" |Lunch
 
| style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" |  
 
| style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" |  
 
| style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="justify" colspan="0" |  
 
| style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="justify" colspan="0" |  
 
|-
 
|-
| style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 13:30 - 14:15<br>(45 mins)  
+
| style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 13:45 - 14:30
 +
(45 mins)  
 
| style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" |SECURITY RESEARCHER - CYBERMANTRA
 
| style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" |SECURITY RESEARCHER - CYBERMANTRA
 
| style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Jordan Andrean , OSCP , CyberSec Hr
 
| style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Jordan Andrean , OSCP , CyberSec Hr
 
| style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="justify" colspan="0" |Modern Cyber Lab For Penetration Testing
 
| style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="justify" colspan="0" |Modern Cyber Lab For Penetration Testing
 
|-
 
|-
| style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 14:15 - 15:00<br>(45 mins)  
+
| style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 14:30 - 15:00
 +
(30 mins)
 
| style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | CTO PT. Asanka
 
| style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | CTO PT. Asanka
 
| style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Dyan Galih
 
| style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Dyan Galih
 
| style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="justify" colspan="0" |Finding a unsecure end point API's using reverse engineering android technique <br>  
 
| style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="justify" colspan="0" |Finding a unsecure end point API's using reverse engineering android technique <br>  
 
|-
 
|-
| style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 15:00 - 15:15<br>(15 mins)  
+
| style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 15:00 - 15:30
 +
(30 mins)
 
| style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Coffee break
 
| style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Coffee break
 
| style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" |
 
| style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" |
 
| style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="justify" colspan="0" |
 
| style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="justify" colspan="0" |
 
|-
 
|-
| style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 15:15 - 16:00<br>(45 mins)  
+
| style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 15:30 - 16:00
 +
(30 mins)
 
| style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Technical Session
 
| style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Technical Session
 
| style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Dedy Hariyadi
 
| style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Dedy Hariyadi
 
| style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="justify" colspan="0" | Mobile Forensic using XRY
 
| style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="justify" colspan="0" | Mobile Forensic using XRY
 
|-
 
|-
| style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 16:00 - 16:45<br>(45 mins)  
+
| style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 16:00 - 16:45
 +
(45 mins)
 
| style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" |  Q & A
 
| style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" |  Q & A
 
| style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" |  
 
| style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" |  

Revision as of 04:33, 28 August 2017

Conference agenda

Time Title Speaker Description
8:30 - 9:00
(30 mins)
Registration
9:00 - 9:15
(15 mins)
Opening Speech by Conference Chair Ade Yoseman Putra Introduction to the OWASP Indonesia Day, Schedule for the Day
9:15 - 09:30
(15 mins)
Appointment of STMIK Akakom as OWASP ACADEMIC SUPPORTER Sri Redjeki, S.Si,M.Kom


9:30 - 10:00

(30 mins)

Technical Support Manager of Rumahweb.com Mr Yeni Setiawan Cloud with a chance of security breach
10:00 - 10:45
(45 mins)
Software Security Assurance & DevSecOps Professional - Vantage Point Security Pte. Ltd Singapore Suman Sourav (Keynote Speaker) Building OWASP Pipeline Using Open Source Tools
10:45 - 11:15

(30 mins)

CYBERQUOTE PTE LTD Girindro Pringgo Digdo Threat Modeling Using STRIDE
11:15 - 12:00

(45 mins)

PROJECT LEADER FOR THE OWASP MOBILE SECURITY Sven Schleier Fixing Mobile AppSec: The OWASP Mobile

Project

12:15 - 12:45

(30 mins)

Q & A
12:45 - 13:45

(60 mins)

Lunch
13:45 - 14:30

(45 mins)

SECURITY RESEARCHER - CYBERMANTRA Jordan Andrean , OSCP , CyberSec Hr Modern Cyber Lab For Penetration Testing
14:30 - 15:00

(30 mins)

CTO PT. Asanka Dyan Galih Finding a unsecure end point API's using reverse engineering android technique
15:00 - 15:30

(30 mins)

Coffee break
15:30 - 16:00

(30 mins)

Technical Session Dedy Hariyadi Mobile Forensic using XRY
16:00 - 16:45

(45 mins)

Q & A
16:45 - 17:00
(15 mins)
Closing ceremony