This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "OWASP Indonesia Day Conference 2017 Agenda Talks"
From OWASP
| (24 intermediate revisions by the same user not shown) | |||
| Line 8: | Line 8: | ||
|- | |- | ||
| style="width:10%" valign="middle" height="30" bgcolor="#CCEEEE" align="center" colspan="0" | 8:30 - 9:00<br>(30 mins) | | style="width:10%" valign="middle" height="30" bgcolor="#CCEEEE" align="center" colspan="0" | 8:30 - 9:00<br>(30 mins) | ||
| − | | style="width:25%" valign="middle" height="30" bgcolor="#CCEEEE" align="center" colspan="0" | Registration | + | | style="width:25%" valign="middle" height="30" bgcolor="#CCEEEE" align="center" colspan="0" | Registration |
| style="width:25%" valign="middle" height="30" bgcolor="#CCEEEE" align="center" colspan="0" | | | style="width:25%" valign="middle" height="30" bgcolor="#CCEEEE" align="center" colspan="0" | | ||
| style="width:40%" valign="middle" height="30" bgcolor="#CCEEEE" align="justify" colspan="0" | | | style="width:40%" valign="middle" height="30" bgcolor="#CCEEEE" align="justify" colspan="0" | | ||
|- | |- | ||
| style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 9:00 - 9:15<br>(15 mins) | | style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 9:00 - 9:15<br>(15 mins) | ||
| − | | style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Opening Speech by | + | | style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Opening Speech by Conference Chair |
| style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Ade Yoseman Putra | | style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Ade Yoseman Putra | ||
| style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Introduction to the OWASP Indonesia Day, Schedule for the Day | | style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Introduction to the OWASP Indonesia Day, Schedule for the Day | ||
|- | |- | ||
| − | | style="width:10%" valign="middle" height="30" bgcolor="# | + | | style="width:10%" valign="middle" height="30" bgcolor="#CCEEEF" align="center" colspan="0" | 9:15 - 09:30 <br>(15 mins) |
| − | | style="width:25%" valign="middle" height="30" bgcolor="# | + | | style="width:25%" valign="middle" height="30" bgcolor="#CCEEEE" align="center" colspan="0" | Appointment of STMIK Akakom as OWASP ACADEMIC SUPPORTER |
| − | + | | style="width:40%" valign="middle" height="30" bgcolor="#CCEEEE" align="center" colspan="0" | Sri Redjeki, S.Si,M.Kom | |
| − | | style="width: | + | | style="width:25%" valign="middle" height="30" bgcolor="#CCEEEE" align="justify" colspan="0" | |
| − | | style="width: | + | |
|- | |- | ||
| + | | style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 9:30 - 10:00 | ||
| + | (30 mins) | ||
| + | | style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Technical Support Manager of Rumahweb.com | ||
| + | | style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Mr Yeni Setiawan | ||
| + | | style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="justify" colspan="0" | Cloud with a chance of security breach | ||
| + | |- | ||
| + | |||
| style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 10:00 - 10:45<br>(45 mins) | | style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 10:00 - 10:45<br>(45 mins) | ||
| − | | style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | | + | | style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Software Security Assurance & DevSecOps Professional - Vantage Point Security Pte. Ltd Singapore |
| − | | style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | | + | | style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Suman Sourav (<strong>Keynote Speaker</strong>) |
| − | | style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="justify" colspan="0" | | + | | style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="justify" colspan="0" |Application Security in DevOps Era |
|- | |- | ||
| − | | style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 11: | + | | style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 10:45 - 11:15 |
| − | | style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | | + | (30 mins) |
| − | | style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | | + | | style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | CYBERQUOTE PTE LTD |
| − | | style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="justify" colspan="0" | | + | | style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" |Girindro Pringgo Digdo |
| + | | style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="justify" colspan="0" | Threat Modeling Using STRIDE | ||
| + | |- | ||
| + | | style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 11:15 - 12:00 | ||
| + | (45 mins) | ||
| + | | style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | PROJECT LEADER FOR THE OWASP MOBILE SECURITY | ||
| + | | style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Sven Schleier | ||
| + | | style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="justify" colspan="0" |Fixing Mobile AppSec: The OWASP Mobile | ||
| + | Project<br> | ||
|- | |- | ||
| − | | style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | | + | | style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 12:15 - 12:45 |
| + | (30 mins) | ||
| + | | style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" |Q & A | ||
| style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | | | style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | | ||
| − | + | | style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="justify" colspan="0" | | |
| − | | style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="justify" colspan="0" | | ||
|- | |- | ||
| − | | style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 12: | + | | style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 12:45 - 13:45 |
| − | | style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" |Lunch | + | (60 mins) |
| + | | style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" |Lunch | ||
| style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | | | style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | | ||
| style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="justify" colspan="0" | | | style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="justify" colspan="0" | | ||
|- | |- | ||
| − | | style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 13: | + | | style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 13:45 - 14:15 |
| − | | style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | | + | (30 mins) |
| − | | style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | | + | | style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" |SECURITY RESEARCHER - CYBERMANTRA |
| − | | style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="justify" colspan="0" | | + | | style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Damara Putra Pratama , OSCP |
| + | | style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="justify" colspan="0" |Modern Lab Framework for Education Cyber Security | ||
|- | |- | ||
| − | | style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 14:15 - | + | | style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 14:15 - 14:45 |
| − | | style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | | + | (30 mins) |
| − | | style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | | + | | style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | SECURITY RESEARCHER - CYBERMANTRA |
| − | | style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="justify" colspan="0" |<br> | + | | style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Bagus Prasetyo Budiono, OSCP |
| + | | style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="justify" colspan="0" |IOT Hacking <br> | ||
|- | |- | ||
| − | | style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | | + | | style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 14:45 - 15:15 |
| + | (30 mins) | ||
| style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Coffee break | | style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Coffee break | ||
| style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | | | style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | | ||
| style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="justify" colspan="0" | | | style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="justify" colspan="0" | | ||
|- | |- | ||
| − | | style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 15:15 - 16: | + | | style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 15:15 - 15:45 |
| − | | style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | | + | (30 mins) |
| − | | style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | | + | | style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Technical Session |
| − | | style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="justify" colspan="0" | | + | | style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Dedy Hariyadi |
| + | | style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="justify" colspan="0" | Mobile Forensic using XRY | ||
| + | |- | ||
| + | | style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 15:45 - 16:15 | ||
| + | (30 mins) | ||
| + | | style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Head Of Technology Kulina & CTO PT Asanka | ||
| + | | style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Dyan Galih | ||
| + | | style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="justify" colspan="0" |Finding a unsecure end point API's using reverse engineering android technique | ||
|- | |- | ||
| − | | style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 16: | + | | style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 16:15 - 16:45 |
| − | | style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | | + | (30 mins) |
| + | | style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Q & A | ||
| style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | | | style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | | ||
| style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="justify" colspan="0" | | | style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="justify" colspan="0" | | ||
| Line 73: | Line 101: | ||
| style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 16:45 - 17:00<br>(15 mins) | | style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 16:45 - 17:00<br>(15 mins) | ||
| style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Closing ceremony | | style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Closing ceremony | ||
| − | + | | style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Mc | |
| + | | style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="justify" colspan="0" |Schedule for the Workshop 10 th | ||
|- | |- | ||
|} | |} | ||
Latest revision as of 13:53, 5 September 2017
Conference agenda | |||||
| Time | Title | Speaker | Description | ||
| 8:30 - 9:00 (30 mins) |
Registration | ||||
| 9:00 - 9:15 (15 mins) |
Opening Speech by Conference Chair | Ade Yoseman Putra | Introduction to the OWASP Indonesia Day, Schedule for the Day | ||
| 9:15 - 09:30 (15 mins) |
Appointment of STMIK Akakom as OWASP ACADEMIC SUPPORTER | Sri Redjeki, S.Si,M.Kom |
| ||
| 9:30 - 10:00
(30 mins) |
Technical Support Manager of Rumahweb.com | Mr Yeni Setiawan | Cloud with a chance of security breach | ||
| 10:00 - 10:45 (45 mins) |
Software Security Assurance & DevSecOps Professional - Vantage Point Security Pte. Ltd Singapore | Suman Sourav (Keynote Speaker) | Application Security in DevOps Era | ||
| 10:45 - 11:15
(30 mins) |
CYBERQUOTE PTE LTD | Girindro Pringgo Digdo | Threat Modeling Using STRIDE | ||
| 11:15 - 12:00
(45 mins) |
PROJECT LEADER FOR THE OWASP MOBILE SECURITY | Sven Schleier | Fixing Mobile AppSec: The OWASP Mobile
Project | ||
| 12:15 - 12:45
(30 mins) |
Q & A | ||||
| 12:45 - 13:45
(60 mins) |
Lunch | ||||
| 13:45 - 14:15
(30 mins) |
SECURITY RESEARCHER - CYBERMANTRA | Damara Putra Pratama , OSCP | Modern Lab Framework for Education Cyber Security | ||
| 14:15 - 14:45
(30 mins) |
SECURITY RESEARCHER - CYBERMANTRA | Bagus Prasetyo Budiono, OSCP | IOT Hacking | ||
| 14:45 - 15:15
(30 mins) |
Coffee break | ||||
| 15:15 - 15:45
(30 mins) |
Technical Session | Dedy Hariyadi | Mobile Forensic using XRY | ||
| 15:45 - 16:15
(30 mins) |
Head Of Technology Kulina & CTO PT Asanka | Dyan Galih | Finding a unsecure end point API's using reverse engineering android technique | ||
| 16:15 - 16:45
(30 mins) |
Q & A | ||||
| 16:45 - 17:00 (15 mins) |
Closing ceremony | Mc | Schedule for the Workshop 10 th | ||