This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "OWASP Indonesia Day Conference 2017 Agenda Talks"
From OWASP
| Line 18: | Line 18: | ||
|- | |- | ||
| style="width:10%" valign="middle" height="30" bgcolor="#CCEEEF" align="center" colspan="0" | 9:15 - 09:30 <br>(15 mins) | | style="width:10%" valign="middle" height="30" bgcolor="#CCEEEF" align="center" colspan="0" | 9:15 - 09:30 <br>(15 mins) | ||
| − | | style="width:25%" valign="middle" height="30" bgcolor="#CCEEEE" align="center" colspan="0" | Appointment of STMIK Akakom as OWASP ACADEMIC SUPPORTER | + | | style="width:25%" valign="middle" height="30" bgcolor="#CCEEEE" align="center" colspan="0" | Appointment of STMIK Akakom as OWASP ACADEMIC SUPPORTER |
| − | |||
| − | |||
| style="width:40%" valign="middle" height="30" bgcolor="#CCEEEE" align="center" colspan="0" | Sri Redjeki, S.Si,M.Kom | | style="width:40%" valign="middle" height="30" bgcolor="#CCEEEE" align="center" colspan="0" | Sri Redjeki, S.Si,M.Kom | ||
| style="width:25%" valign="middle" height="30" bgcolor="#CCEEEE" align="justify" colspan="0" | | | style="width:25%" valign="middle" height="30" bgcolor="#CCEEEE" align="justify" colspan="0" | | ||
| Line 26: | Line 24: | ||
|- | |- | ||
| + | | style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 9:30 - 10:00 | ||
| + | (30 mins) | ||
| + | | style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Technical Support Manager of Rumahweb.com | ||
| + | | style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Mr Yeni Setiawan | ||
| + | | style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="justify" colspan="0" | Cloud with a chance of security breach | ||
| + | |- | ||
| + | |||
| style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 10:00 - 10:45<br>(45 mins) | | style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 10:00 - 10:45<br>(45 mins) | ||
| − | | style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | | + | | style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Software Security Assurance & DevSecOps Professional - Vantage Point Security Pte. Ltd Singapore |
| − | | style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | | + | | style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Suman Sourav (<strong>Keynote Speaker</strong>) |
| − | | style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="justify" colspan="0" | | + | | style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="justify" colspan="0" |Building OWASP Pipeline Using Open Source Tools |
|- | |- | ||
| − | | style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | | + | | style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 10:45 - 11:15 |
| − | | style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | | + | (30 mins) |
| − | | style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | | + | | style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | CYBERQUOTE PTE LTD |
| − | | style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="justify" colspan="0" | | + | | style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" |Girindro Pringgo Digdo |
| + | | style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="justify" colspan="0" | Threat Modeling Using STRIDE | ||
|- | |- | ||
| − | | style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 11: | + | | style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 11:15 - 12:00 |
| + | (45 mins) | ||
| style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | PROJECT LEADER FOR THE OWASP MOBILE SECURITY | | style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | PROJECT LEADER FOR THE OWASP MOBILE SECURITY | ||
| style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Sven Schleier | | style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Sven Schleier | ||
| Line 44: | Line 51: | ||
Project<br> | Project<br> | ||
|- | |- | ||
| − | | style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 12:30 - 13: | + | | style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 12:15 - 12:45 |
| + | (30 mins) | ||
| + | | style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" |Q & A | ||
| + | | style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | | ||
| + | | style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="justify" colspan="0" | | ||
| + | |- | ||
| + | | style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 12:45 - 13:45 | ||
| + | (60 mins) | ||
| style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" |Lunch | | style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" |Lunch | ||
| style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | | | style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | | ||
| style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="justify" colspan="0" | | | style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="justify" colspan="0" | | ||
|- | |- | ||
| − | | style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 13: | + | | style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 13:45 - 14:30 |
| + | (45 mins) | ||
| style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" |SECURITY RESEARCHER - CYBERMANTRA | | style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" |SECURITY RESEARCHER - CYBERMANTRA | ||
| style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Jordan Andrean , OSCP , CyberSec Hr | | style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Jordan Andrean , OSCP , CyberSec Hr | ||
| style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="justify" colspan="0" |Modern Cyber Lab For Penetration Testing | | style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="justify" colspan="0" |Modern Cyber Lab For Penetration Testing | ||
|- | |- | ||
| − | | style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 14: | + | | style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 14:30 - 15:00 |
| + | (30 mins) | ||
| style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | CTO PT. Asanka | | style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | CTO PT. Asanka | ||
| style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Dyan Galih | | style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Dyan Galih | ||
| style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="justify" colspan="0" |Finding a unsecure end point API's using reverse engineering android technique <br> | | style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="justify" colspan="0" |Finding a unsecure end point API's using reverse engineering android technique <br> | ||
|- | |- | ||
| − | | style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 15:00 - 15: | + | | style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 15:00 - 15:30 |
| + | (30 mins) | ||
| style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Coffee break | | style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Coffee break | ||
| style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | | | style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | | ||
| style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="justify" colspan="0" | | | style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="justify" colspan="0" | | ||
|- | |- | ||
| − | | style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 15: | + | | style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 15:30 - 16:00 |
| + | (30 mins) | ||
| style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Technical Session | | style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Technical Session | ||
| style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Dedy Hariyadi | | style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Dedy Hariyadi | ||
| style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="justify" colspan="0" | Mobile Forensic using XRY | | style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="justify" colspan="0" | Mobile Forensic using XRY | ||
|- | |- | ||
| − | | style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 16:00 - 16:45 | + | | style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 16:00 - 16:45 |
| + | (45 mins) | ||
| style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Q & A | | style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Q & A | ||
| style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | | | style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | | ||
Revision as of 04:33, 28 August 2017
Conference agenda | |||||
| Time | Title | Speaker | Description | ||
| 8:30 - 9:00 (30 mins) |
Registration | ||||
| 9:00 - 9:15 (15 mins) |
Opening Speech by Conference Chair | Ade Yoseman Putra | Introduction to the OWASP Indonesia Day, Schedule for the Day | ||
| 9:15 - 09:30 (15 mins) |
Appointment of STMIK Akakom as OWASP ACADEMIC SUPPORTER | Sri Redjeki, S.Si,M.Kom |
| ||
| 9:30 - 10:00
(30 mins) |
Technical Support Manager of Rumahweb.com | Mr Yeni Setiawan | Cloud with a chance of security breach | ||
| 10:00 - 10:45 (45 mins) |
Software Security Assurance & DevSecOps Professional - Vantage Point Security Pte. Ltd Singapore | Suman Sourav (Keynote Speaker) | Building OWASP Pipeline Using Open Source Tools | ||
| 10:45 - 11:15
(30 mins) |
CYBERQUOTE PTE LTD | Girindro Pringgo Digdo | Threat Modeling Using STRIDE | ||
| 11:15 - 12:00
(45 mins) |
PROJECT LEADER FOR THE OWASP MOBILE SECURITY | Sven Schleier | Fixing Mobile AppSec: The OWASP Mobile
Project | ||
| 12:15 - 12:45
(30 mins) |
Q & A | ||||
| 12:45 - 13:45
(60 mins) |
Lunch | ||||
| 13:45 - 14:30
(45 mins) |
SECURITY RESEARCHER - CYBERMANTRA | Jordan Andrean , OSCP , CyberSec Hr | Modern Cyber Lab For Penetration Testing | ||
| 14:30 - 15:00
(30 mins) |
CTO PT. Asanka | Dyan Galih | Finding a unsecure end point API's using reverse engineering android technique | ||
| 15:00 - 15:30
(30 mins) |
Coffee break | ||||
| 15:30 - 16:00
(30 mins) |
Technical Session | Dedy Hariyadi | Mobile Forensic using XRY | ||
| 16:00 - 16:45
(45 mins) |
Q & A | ||||
| 16:45 - 17:00 (15 mins) |
Closing ceremony | ||||