This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "OWASP Indonesia Day 2017"

From OWASP
Jump to: navigation, search
 
(24 intermediate revisions by the same user not shown)
Line 7: Line 7:
 
! width="500" align="center" | <br>
 
! width="500" align="center" | <br>
 
|-
 
|-
| align="center" | [[Image:Owasp_id_day_re2.jpg|800px]]  
+
| align="center" | [[Image:bro.jpg|800px]]  
 
| align="center" |  
 
| align="center" |  
  
Line 173: Line 173:
  
 
OWASP Indonesia Day 2017 will be held in Yogyakarta  on the 9 th of september, 2017 and is a security conference entirely dedicated to application security.
 
OWASP Indonesia Day 2017 will be held in Yogyakarta  on the 9 th of september, 2017 and is a security conference entirely dedicated to application security.
The conference is once again being hosted by the Jogja Digital Valley with their support and assistance.
+
 
 
OWASP Indonesia Day 2017 is a free event, but requires sponsor support to help be an instructive and quality event for the Yogyakarta community.
 
OWASP Indonesia Day 2017 is a free event, but requires sponsor support to help be an instructive and quality event for the Yogyakarta community.
 
OWASP is strictly not for profit. The sponsorship money will be used to help make OWASP Indonesia Day 2017  a free, compelling, and valuable experience for all attendees.
 
OWASP is strictly not for profit. The sponsorship money will be used to help make OWASP Indonesia Day 2017  a free, compelling, and valuable experience for all attendees.
Line 245: Line 245:
 
==Conference Committee==
 
==Conference Committee==
  
* Ade Yoseman  - OWASP Indonesia Leader (Jakarta)
+
* Ade Yoseman  - Conference Chair
* Ikhwan Dirga Pratama -  OWASP Indonesia Board member (Jakarta)
+
* Ali Kaharu
 
 
  
 
==Volunteer==
 
==Volunteer==
Line 289: Line 288:
 
Contact us at [mailto:ade.putra@owasp.org ade.putra@owasp.org]
 
Contact us at [mailto:ade.putra@owasp.org ade.putra@owasp.org]
 
</font>
 
</font>
 +
=Training=
 +
Date: Sunday 10 September 2017<br>
 +
{{:OWASP Indonesia Day 2017 Workshop}}
 +
 
=Speaker=
 
=Speaker=
[[File:Jays.jpg]] <br>'''Jay Rajesh Thakor'''
 
  
I am Jay Rajesh Thakor, the founder/Director of Skinox India and Skinox Singapore.
 
I am Cyber Security professional and Forensic Investigator.
 
I have my own research in Cryptography Stegnography
 
Went through ethical hacking,networking and Forensic Investigation Courses.                   
 
Now running Skinox in singapore.
 
Devoloping own crypto currency and Secure Mobile system.                     
 
As well as hardware wallets...for crypto currency.               
 
And soob we ll release our own mobile phone manufecturing units <br>
 
  
 +
[[File:Suman.jpg|200px]]<br>'''Suman Sourav'''(Keynote Speaker)<br>
 +
<br> Application Security in DevOps Era ([[Media:OWASP_Indonesia_Day2017_Suman.pdf|PDF]])<br><br>
 +
 +
SOFTWARE SECURITY ASSURANCE & DEVSECOPS PROFESSIONAL - VANTAGE POINT SECURITY PTE. LTD SINGAPORE<br>
 +
 +
Suman has more than a decade experience in designing secure-SDLC programs and is passionate about integrating security into the development lifecycle. He is skilled beyond existing static analysis tools and code review techniques and shaping the way the industry secures code in a Continuous Deployment world. He has worked with various financial and non-financial institutions to implement software security life-cycle and has strong experience of creating an organizational framework to break silos security culture in the organization and builds an unified approach to deal with the root cause of software security problems. <br>
  
[[File:Girin.jpg|200px]]] <br>'''Girindro Pringgo Digdo'''<br>
 
  
 +
[[File:Sven.jpg|200px]]<br>'''Sven Schleier'''<br>
 +
Fixing Mobile AppSec: The OWASP Mobile ([[Media:OWASP_Day_Indonesia_2017_-_Fixing_Mobile_AppSec.pdf|PDF]])<br><br>
 +
Project
 +
{{:User:Sven_Schleier}}
 +
<br>
 +
[[File:Girin.jpg|200px]] <br>'''Girindro Pringgo Digdo'''<br>
 +
<br>Threat Modeling Using STRIDE([[Media:Threat_Modeling_Using_STRIDE_v1.1.pdf|PDF]])<br><br>
 
CYBERQUOTE PTE LTD<br>
 
CYBERQUOTE PTE LTD<br>
  
 
Girindro Pringgo Digdo Is a person interested in security information. He did some research
 
Girindro Pringgo Digdo Is a person interested in security information. He did some research
And help Institution / good company Private and government In conducting the assessment,
+
And help Institution / private company and government In conducting the assessment,
 
Write, and give Recommendations on findings-Information security findings.<br><br>
 
Write, and give Recommendations on findings-Information security findings.<br><br>
  
 
Current activity as Security Consultant at a Company in Singapore.  
 
Current activity as Security Consultant at a Company in Singapore.  
 
In The weekend he took the time to teach the Student College in Information Security. In addition he is also active writing
 
In The weekend he took the time to teach the Student College in Information Security. In addition he is also active writing
As well as being a resource person at a seminar entitled security information.
+
As well as being a resource person at a seminar entitled security information.<br><br>
  
[[File:Suman.jpg|200px]]] <br>'''Suman Sourav'''<br>
+
[[File:Damara Putra Pratama.jpg|200px]] <br>''' Damara Putra Pratama , OSCP - CyberMantra '''<br>
SOFTWARE SECURITY ASSURANCE & DEVSECOPS PROFESSIONAL - VANTAGE POINT SECURITY PTE. LTD SINGAPORE<br>
 
  
Suman has more than a decade experience in designing secure-SDLC programs and is passionate about integrating security into the development lifecycle. He is skilled beyond existing static analysis tools and code review techniques and shaping the way the industry secures code in a Continuous Deployment world. He has worked with various financial and non-financial institutions to implement software security life-cycle and has strong experience of creating an organizational framework to break silos security culture in the organization and builds an unified approach to deal with the root cause of software security problems. <br>
+
IT Security Researcher in CyberMANTRA and currently help the ministry and Telecom Provider in Indonesia. I was certified as OSCP
 +
<br><br>
  
  
[[File:Sven.jpg|200px]]] <br>'''Sven Schleier'''<br>
+
[[File:Bagus_Prasetyo_Budiono.jpg|200px]]<br>'''Bagus Prasetyo Budiono, OSCP - CyberMantra'''<br>
 +
SECURITY RESEARCHER - CYBERMANTRA<br>
  
{{:User:Sven_Schleier}}
+
IT Security Researcher in CyberMANTRA and currently help the ministry and Telecom Provider in Indonesia. I was certified as OSCP
<br>
 
 
 
[[File:Jordan.jpg|200px]]] <br>'''Jordan Andrean , OSCP , CyberSec Hr'''<br>
 
 
 
is a Security Researcher from CyberMantra who actively helps Government, Bank and Telecommunications Industry. Currently has OSCP Certification from Kali Linux, Certification from Hack in The Box Training and Cyber Security Certification From Algebra University Croatia.
 
 
 
Abstract :
 
This platform for Hacking Learning activities through the browser using various existing operating system, User will get Kali Linux As Client (Attacker) and Multiple Operating System as victim (Target). This platform is suitable for capture the flag. This platform does not use remote desktop protocol or vnc.
 
 
 
Advantages:
 
1. No Need to Have PC / Laptop With High Specifications
 
2. Support All Devices
 
3. Easy and Simple Using only the browser
 
4. Data Center Bandwidth
 
 
<br><br>
 
<br><br>
  
 
+
[[File:Dyan_Galih.jpg|200px]]<br>'''Dyan Galih'''<br>
[[File:Dyan Galih.jpg|200px]]] <br>'''Dyan Galih'''<br>
+
Head Of Technology Kulina & CTO PT Asanka<br> [https://slides.com/dyangalih/owasp/live#/ PPT ] <br>
CTO PT. Asanka<br>
 
 
<br>
 
<br>
 +
[[File:Yenisetiawan.jpg|200px]]<br>'''Yeni Setiawan'''<br>
 +
<br>Cloud with a chance of security breach([[Media:OWASP_slide_Rumahwbe.pdf|PDF]])<br>
 +
RUMAHWEB INDONESIA<br>
 +
Web developer with years of experience in web technology, formerly system administrator and technical support representative. Interested in software automation, software-defined radio, and involved in localization of two major web browsers.<br>
  
[[File:Dedi.jpg|200px]]] <br>'''Dedy Hariyadi''<br>
+
[[File:Dedi.jpg|200px]]<br>''' Dedy Hariyadi''<br>
 
+
Researchers who are members of the Indonesia Digital Forensics Community aka FORKID. Obtained a master’s degree in Digital Forensics from the Universitas Islam Indonesia. Currently focusing more on the field of Mobile Forensics Research, one community shared work is a BBM forensic application called BBMPork.<br>
 +
[http://milisdad.github.io/Presentasi/owasp2017/index.html#/step-1 PPT]
 +
<br><br>
 
=Trainer=
 
=Trainer=
 
Mastering burp suite pro<br>
 
Mastering burp suite pro<br>
[[File:Rheno Sulistyo, A.Md., OSCP.jpg|200px]]] <br>'''Rheno Sulistyo, OSCP'''<br>
+
[[File:Rheno Sulistyo, A.Md., OSCP.jpg|200px]] <br>'''Rheno Sulistyo, OSCP'''<br>
 
<br>
 
<br>
 
SECURITY RESEARCHER - CYBERMANTRA<br><br>
 
SECURITY RESEARCHER - CYBERMANTRA<br><br>
  
 
Introduction Digital Forensics<br>
 
Introduction Digital Forensics<br>
[[File:Aat.jpg|200px]]] <br>'''Achmad Syafaat'''<br>
+
[[File:Aat.jpg|200px]] <br>'''Achmad Syafaat'''<br>
 
Achmad Syafaat, working in Id-SIRTII/CC as a cyber security researcher in data mining, digital forensics and also managing cyber security training. As well as a lecturer at the Faculty of Computer Science University of Subang. He holds a master of computer science from Langlangbuana University. Experienced as cyber security analyst, security assessment, digital forensics, cyber defense, cyber security incident response, and cyber security trainer.
 
Achmad Syafaat, working in Id-SIRTII/CC as a cyber security researcher in data mining, digital forensics and also managing cyber security training. As well as a lecturer at the Faculty of Computer Science University of Subang. He holds a master of computer science from Langlangbuana University. Experienced as cyber security analyst, security assessment, digital forensics, cyber defense, cyber security incident response, and cyber security trainer.
 
+
<br>Introduction Digital Forensics([[Media:Introduction_to_Digital_Forensics--en-id--OWASP-ID-DAY-2017.pdf|PDF]])<br>
 
<br>
 
<br>
  
Topic: Statefull tracking with ids/ips <br><br>
 
[[File:Zak.jpg|200px]]] <br>''' Zakaria Achmad'''<br>
 
Training experience <br>
 
Amanah Ikhtiar Malaysia Network Forensic TCPIP 4 days<br>
 
Wireshark Analaysis Kolej Komuniti Sabak Bernam 3 days<br>
 
Linux Basic-Inter Mdec program graduate  15 days<br>
 
Jabatan Perkhidmatan Awam(JPA) linux basic  Admin-Server 4 days<br>
 
Network Forensic with wireshark TCPIP University Perguruan Sultan Idris(UPSI) 1 days<br>
 
Network Forensic Tunnelling/Reverse Shell University Petronas Malaysia(UTP) 2 days Tronoh Perak<br>
 
Network DDOS attack analysis  University Petronas Malaysia(UTP) 1 days Tronoh Perak<br>
 
Web Honeypot Training for Mindef Military 2 days <br>
 
<br>
 
  
  

Latest revision as of 08:56, 29 January 2018




Bro.jpg



We are proud to announce the first OWASP Indonesia Day conference, to be held at STMIK AKAKOM Yogyakarta on Saturday September 09th, 2017. Workshop on September 10 th, 2017. OWASP Indonesia Day is a one-day conference dedicated to application security, with an emphasis on secure architecture and development techniques to help developers build more secure applications.


Call for Speakers is Closed

Who is it for?

  • Web Developers: There will be a choice of two streams in the morning. First stream covering introductory talks to application security, second stream covering deeper technical topics. Afternoon sessions will cover various defensive topics, with a DevSecOps cluster of talks in stream two after afternoon tea break.
  • Security Professionals and Enthusiasts: Technical sessions later in the day will showcase new and interesting attack and defence topics.


Who Should Attend OWASP Indonesia Day conference 2017:

  • Application Developers
  • Application Testers and Quality Assurance
  • Application Project Management and Staff
  • Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff
  • Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance
  • Security Managers and Staff
  • Executives, Managers, and Staff Responsible for IT Security Governance
  • IT Professionals Interested in Improving IT Security


             
     

Platinum Sponsors

     
   
Vantage.png
     
Rumahweb.png
 
     

Gold Sponsor

     
      []      
     

Silver Sponsor

     
      &nbsp    
     

Support

     
   
 
Cybermantra new.jpg
 
Logo-atmik-akakom-768x768.png
 
      &nbsp    
     


Media Partner

     
   
     
Fodkom.jpg
Left
Logo-ecn-medium.png