This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "OWASP Indonesia Day 2017"

From OWASP
Jump to: navigation, search
Line 356: Line 356:
 
<br>
 
<br>
  
Topic: Statefull tracking with ids/ips <br><br>
 
[[File:Zak.jpg|200px]]<br>''' Zakaria Achmad'''<br>
 
Training experience <br>
 
Amanah Ikhtiar Malaysia Network Forensic TCPIP 4 days<br>
 
Wireshark Analaysis Kolej Komuniti Sabak Bernam 3 days<br>
 
Linux Basic-Inter Mdec program graduate  15 days<br>
 
Jabatan Perkhidmatan Awam(JPA) linux basic  Admin-Server 4 days<br>
 
Network Forensic with wireshark TCPIP University Perguruan Sultan Idris(UPSI) 1 days<br>
 
Network Forensic Tunnelling/Reverse Shell University Petronas Malaysia(UTP) 2 days Tronoh Perak<br>
 
Network DDOS attack analysis  University Petronas Malaysia(UTP) 1 days Tronoh Perak<br>
 
Web Honeypot Training for Mindef Military 2 days <br>
 
<br>
 
  
  

Revision as of 13:10, 23 September 2017




Bro.jpg



We are proud to announce the first OWASP Indonesia Day conference, to be held at STMIK AKAKOM Yogyakarta on Saturday September 09th, 2017. Workshop on September 10 th, 2017. OWASP Indonesia Day is a one-day conference dedicated to application security, with an emphasis on secure architecture and development techniques to help developers build more secure applications.


Call for Speakers is Closed

Who is it for?

  • Web Developers: There will be a choice of two streams in the morning. First stream covering introductory talks to application security, second stream covering deeper technical topics. Afternoon sessions will cover various defensive topics, with a DevSecOps cluster of talks in stream two after afternoon tea break.
  • Security Professionals and Enthusiasts: Technical sessions later in the day will showcase new and interesting attack and defence topics.


Who Should Attend OWASP Indonesia Day conference 2017:

  • Application Developers
  • Application Testers and Quality Assurance
  • Application Project Management and Staff
  • Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff
  • Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance
  • Security Managers and Staff
  • Executives, Managers, and Staff Responsible for IT Security Governance
  • IT Professionals Interested in Improving IT Security


             
     

Platinum Sponsors

     
   
Vantage.png
     
Rumahweb.png
 
     

Gold Sponsor

     
      []      
     

Silver Sponsor

     
      &nbsp    
     

Support

     
   
 
Cybermantra new.jpg
 
Logo-atmik-akakom-768x768.png
 
      &nbsp    
     


Media Partner

     
   
     
Fodkom.jpg
Left
Logo-ecn-medium.png