This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "2018 BASC Agenda"

From OWASP
Jump to: navigation, search
(final edit?)
 
(8 intermediate revisions by the same user not shown)
Line 61: Line 61:
 
  | colspan="7" style="width:80%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px" align="center" | <span style="font-size:130%">'''Breakfast and Registration'''</span><br/>
 
  | colspan="7" style="width:80%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px" align="center" | <span style="font-size:130%">'''Breakfast and Registration'''</span><br/>
 
provided by our Platinum Sponsor<br/>
 
provided by our Platinum Sponsor<br/>
<!-- <span style="font-size:140%">'''[https://www.blackducksoftware.com/ Black Duck Software]'''</span><br/>  -->
+
<span style="font-size:140%">'''[https://www.blackducksoftware.com/ Black Duck Software]'''</span><br/>
 
|-
 
|-
 
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 09:00-09:50  
 
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 09:00-09:50  
Line 67: Line 67:
 
<span style="font-size: 150%">'''[[2018_BASC_Homepage#Keynotes|Secure By Design]]'''</span><br/>
 
<span style="font-size: 150%">'''[[2018_BASC_Homepage#Keynotes|Secure By Design]]'''</span><br/>
 
<span style="font-size:130%">'''[[2018_BASC_Homepage#Keynotes|Chris Wysopal]]'''</span><br/>  
 
<span style="font-size:130%">'''[[2018_BASC_Homepage#Keynotes|Chris Wysopal]]'''</span><br/>  
| colspan="1" rowspan="12" style="width:10%; margin:10px; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 1px; border-bottom-width: 1px" align="center" |  
+
<!-- | colspan="1" rowspan="12" style="width:10%; margin:10px; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 1px; border-bottom-width: 1px" align="center" |  
 
<span style="font-size: 150%">'''Capture the Flag<br/>Arena'''</span><br/><br/>
 
<span style="font-size: 150%">'''Capture the Flag<br/>Arena'''</span><br/><br/>
 
<span style="font-size:130%">'''Vic Solem &amp;<br/>Phil Barrows'''<br/>MEI Security</span><br/>
 
<span style="font-size:130%">'''Vic Solem &amp;<br/>Phil Barrows'''<br/>MEI Security</span><br/>
<br/>DEFENDERS<br/>Jay Peak Room<br/><br/>ATTACKERS<br/>Bretton Woods Room<br/><br/>Command &amp; Control<br/>Cranmore Room
+
<br/>DEFENDERS<br/>Jay Peak Room<br/><br/>ATTACKERS<br/>Bretton Woods Room<br/><br/>Command &amp; Control<br/>Cranmore Room -->
 
|-
 
|-
 
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px" | || align="center" style="width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" | '''Washington/Jefferson Room'''
 
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px" | || align="center" style="width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" | '''Washington/Jefferson Room'''
Line 83: Line 83:
 
| style="width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2018_BASC:Presentaton_Agenda_Template|Presentation|Website Security – AppSec’s partial solution to a complex problem|Chris Olson }}
 
| style="width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2018_BASC:Presentaton_Agenda_Template|Presentation|Website Security – AppSec’s partial solution to a complex problem|Chris Olson }}
 
|-
 
|-
  | style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 12:00-13:00 || colspan="2" style="background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" |  
+
  | style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 12:00-1:00 || colspan="2" style="background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" |  
 
<span style="font-size:130%">'''Lunch'''</span><br/>
 
<span style="font-size:130%">'''Lunch'''</span><br/>
 
provided by our Platinum Sponsor<br/>
 
provided by our Platinum Sponsor<br/>
<!-- <span style="font-size:140%">'''[https://ll.mit.edu/ MIT Lincoln Laboratory]'''</span><br/> -->
+
<span style="font-size:140%">'''[https://www.optiv.com/ Optiv]'''</span><br/>
 
|-
 
|-
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 13:00-13:50
+
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 1:00-1:50
 
| style="width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2018_BASC:Presentaton_Agenda_Template|Presentation|A How Not to Fail Your DevSecOps Transformation|Eitan Worcel }}
 
| style="width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2018_BASC:Presentaton_Agenda_Template|Presentation|A How Not to Fail Your DevSecOps Transformation|Eitan Worcel }}
 
| style="width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2018_BASC:Presentaton_Agenda_Template|Presentation|Navigating the Bug Bounty Marketplace|Bryan Brannigan }}
 
| style="width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2018_BASC:Presentaton_Agenda_Template|Presentation|Navigating the Bug Bounty Marketplace|Bryan Brannigan }}
 
|-
 
|-
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 14:00-14:50
+
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 2:00-2:50
 
| style="width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2018_BASC:Presentaton_Agenda_Template|Presentation|API Security Challenges|Angelo Castigliola }}
 
| style="width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2018_BASC:Presentaton_Agenda_Template|Presentation|API Security Challenges|Angelo Castigliola }}
 
| style="width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2018_BASC:Presentaton_Agenda_Template|Presentation|Voyages of the Security-Driven Enterprise|Katie Knowles }}
 
| style="width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2018_BASC:Presentaton_Agenda_Template|Presentation|Voyages of the Security-Driven Enterprise|Katie Knowles }}
 
|-
 
|-
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 15:00-15:50
+
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 3:00-3:50
 
| style="width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2018_BASC:Presentaton_Agenda_Template|Presentation|Modern Security Architecture with OpenID Connect|Brock Allen  }}
 
| style="width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2018_BASC:Presentaton_Agenda_Template|Presentation|Modern Security Architecture with OpenID Connect|Brock Allen  }}
| style="width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2018_BASC:Presentaton_Agenda_Template|Presentation|Introduction to Android Security|Dzung Pham }}
+
| style="width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2018_BASC:Presentaton_Agenda_Template|Presentation|It depends on....|Tania Ward &amp; Kristen Pascale }}
 
|-
 
|-
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 16:00-16:50
+
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 4:00-4:50
 
| style="width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2018_BASC:Presentaton_Agenda_Template|Presentation|Acquiring and Retaining Cybersecurity Talent: A Proven Model|Deidre Diamond }}
 
| style="width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2018_BASC:Presentaton_Agenda_Template|Presentation|Acquiring and Retaining Cybersecurity Talent: A Proven Model|Deidre Diamond }}
| style="width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2018_BASC:Presentaton_Agenda_Template|Presentation|It depends on....|Tania Ward &amp; Kristen Pascale }}
+
| style="width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2018_BASC:Presentaton_Agenda_Template|Presentation|Introduction to Android Security|Dzung Pham }}
 
|-
 
|-
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 17:00-17:30
+
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 5:00-5:30
 
| colspan="2" style="width:30%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width: 1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" |  
 
| colspan="2" style="width:30%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width: 1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" |  
 
<span style="font-size:130%">'''Social Time'''</span><br/>
 
<span style="font-size:130%">'''Social Time'''</span><br/>
 
provided by our Platinum Sponsor<br/>
 
provided by our Platinum Sponsor<br/>
<!-- <span style="font-size:140%">'''[http://veracode.com Veracode]'''</span><br/> -->
+
<span style="font-size:140%">'''[http://veracode.com Veracode]'''</span><br/>
 
|-
 
|-
| rowspan="2" style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 1px" align="center" | 17:30-18:30
+
| rowspan="2" style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 1px" align="center" | 5:30-6:30
 
| colspan="2" style="width:30%; background:#background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | <span style="font-size:130%">'''Closing Keynote'''</span><br/>
 
| colspan="2" style="width:30%; background:#background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | <span style="font-size:130%">'''Closing Keynote'''</span><br/>
 
<span style="font-size: 150%">'''[[2018_BASC_Homepage#Keynotes|Security at the Intersection of Software, Biology, and Science Fiction]]'''</span><br/>
 
<span style="font-size: 150%">'''[[2018_BASC_Homepage#Keynotes|Security at the Intersection of Software, Biology, and Science Fiction]]'''</span><br/>
Line 122: Line 122:
  
 
<!-- lighter blue: #9BA8CF -->
 
<!-- lighter blue: #9BA8CF -->
<!--
 
  
 
= Workshops =
 
= Workshops =
Line 128: Line 127:
  
 
{| style="width:80%" border="0" align="center"
 
{| style="width:80%" border="0" align="center"
  ! colspan="4" align="center"  |
+
  ! colspan="7" align="center"  |
 
<table>
 
<table>
 
<tr>
 
<tr>
Line 135: Line 134:
 
</td>
 
</td>
 
<td>
 
<td>
<span style="font-size:150%">'''Workshops<br/>OWASP Boston Application Security Conference · Saturday, October 14, 2018'''</span>
+
<span style="font-size:150%">'''Workshops<br/>OWASP Boston Application Security Conference · Saturday, October 27, 2018'''</span>
 
</td>
 
</td>
 
</tr>
 
</tr>
Line 141: Line 140:
 
|-
 
|-
 
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" |  
 
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" |  
| align="center" style="width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" | '''Attitash'''
+
| align="center" style="width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" | '''Attitash'''
| align="center" style="width:30%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" | '''Monroe'''
+
| align="center" style="width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" | '''Monroe'''
| align="center" style="width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" | '''Cannon'''
+
| align="center" style="width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" | '''Cannon'''
| align="center" style="width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" | '''Bretton Woods'''
+
| align="center" style="width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" | '''Bretton Woods'''
| align="center" style="width:30%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" | '''Jay Peak'''
+
| align="center" style="width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" | '''Jay Peak'''
| align="center" style="width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" | '''Cranmore'''
+
| align="center" style="width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" | '''Cranmore'''
 
|-
 
|-
 
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 10:00-10:50  
 
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 10:00-10:50  
| style="width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2018_BASC:Resume_Agenda_Template|CyberSN / brainbabe }}
+
| rowspan="2" style="width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2018_BASC:Resume_Agenda_Template|Session 1 }}
| rowspan="2" style="width:30%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2018_BASC:Workshop_Agenda_Template|Presentation|AppSec Wars Challenge|Steve Allor }}
+
| rowspan="2" style="width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2018_BASC:Workshop_Agenda_Template|Presentation|Advanced XXE Exploitation|Philippe Arteau }}  
| rowspan="3" style="width:10%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" |   
+
| rowspan="3" style="width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" |   
| rowspan="3" style="width:10%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" |  
+
| rowspan="2" style="width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2018_BASC:Workshop_Agenda_Template|Presentation|AppSec Wars Challenge|Steve Allor }}
| rowspan="3" style="width:10%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" |  
+
| rowspan="2" style="width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2018_BASC:Workshop_Agenda_Template|Presentation|Intro to Osquery - A Hands On Lab|Milan Shah }} 
 +
| rowspan="2" style="width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" |
 
|-
 
|-
 
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 11:00-11:50
 
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 11:00-11:50
| rowspan="3" style="width:30%; background:#FFFBDF; border-style: solid; border-color:#D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | <br/><br/><br/><br/>
 
 
|-
 
|-
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 12:00-12:50
+
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 12:30-1:00
| style="width:30%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2018_BASC:Workshop_Agenda_Template|Presentation|Jackbox Games|Matt Morency }}
+
| rowspan="1" style="width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" |
| style="width:10%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" |  
+
| rowspan="1" style="width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" |
 +
| rowspan="2" colspan="3" style="width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | <div style="margin:0px;"><span style="font-size: 120%">[[2018_BASC_Workshops#Penetration Testing &amp; Network Defender Training Workshop|Penetration Testing &amp; Network Defender Training Workshop]]</span><br/><span style="font-size: 110%">[[2018_BASC_Speakers#|Phil Barrows, John Hammond &amp; Vik Solem]]</span><br/>Initial briefing in Cranmore. Then Red Team moves to Jay Peak, while Blue Team remains in Cranmore.  Scoring in Bretton Woods.</div>   
 +
|-
 +
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 1:00-1:50
 +
| rowspan="4" style="width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2018_BASC:Resume_Agenda_Template|Session 2 }}
 +
| rowspan="5" style="width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 1px" align="center" | {{2018_BASC:Presentaton_Agenda_Template|Workshop|Threat Modeling Workshop|Robert Hurlbut  }}
 +
| rowspan="3" style="width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2018_BASC:Presentaton_Agenda_Template|Workshop|Application Cartography and Defense|Erik Costlow }}
 
|-
 
|-
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 13:00-13:50
+
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 2:00-2:30
| rowspan="4" style="width:30%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 1px" align="center" | {{2018_BASC:Presentaton_Agenda_Template|Workshop|Threat Modeling Workshop|Robert Hurlbut  }}
+
| rowspan="1" style="width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" |  
| rowspan="3" style="width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2018_BASC:Presentaton_Agenda_Template|Workshop|Pen Testing Android Applications Workshop|Roshan Thomas &amp; Abhishek Singh }}
+
| rowspan="1" style="width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" |  
 +
| rowspan="1" style="width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" |  
 
|-
 
|-
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 14:00-14:50
+
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 2:30-2:50
| style="width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2018_BASC:Resume_Agenda_Template|CyberSN / brainbabe }}
+
| rowspan="2" colspan="3" style="width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | <div style="margin:0px;"><span style="font-size: 120%">[[2018_BASC_Workshops#Penetration Testing &amp; Network Defender Challenge|Penetration Testing &amp; Network Defender Challenge]]</span><br/><span style="font-size: 110%">[[2018_BASC_Speakers#|Phil Barrows, John Hammond &amp; Vik Solem]]</span><br/>Participants can choose to occupy Jay Peak, Cranmore, or Bretton Woods.  Best Attacker & Best Defender to be announced at close of conference.</div>   
 
|-
 
|-
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 15:00-15:50
+
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 3:00-3:50
| rowspan="2" style="width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 1px" align="center" | <br/><br/><br/><br/>
+
| rowspan="2" style="width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" |  
 
|-
 
|-
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 1px" align="center" | 16:00-16:50
+
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 1px" align="center" | 4:00-4:50
| style="width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 1px" align="center" |  
+
| style="width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" |
 +
| rowspan="1" style="width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" |
 +
| rowspan="1" style="width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" |
 +
| rowspan="1" style="width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" |  
 
|}
 
|}
-->
 
  
  
 
{{2018_BASC:Footer_Template | Agenda}}
 
{{2018_BASC:Footer_Template | Agenda}}

Latest revision as of 00:59, 25 October 2018

Boston-Banner-468x60.gif
Home | Agenda | Code of Conduct | Presentations | Workshops | Speakers | Twitter 32.png


Platinum Sponsors

HackerOne Black Duck Software Optiv Veracode


Gold Sponsors

Checkmarx Dell Qualys nVisium GoSecure

 

Silver Sponsor

TWM

Please help us keep BASC free by viewing and visiting all of our sponsors.




Presentations

OWASP Logo.gif

Presentations
OWASP Boston Application Security Conference · Saturday, October 27, 2018

8:30-9:30 Breakfast and Registration

provided by our Platinum Sponsor
Black Duck Software

09:00-09:50 Opening Keynote

Secure By Design
Chris Wysopal

Washington/Jefferson Room Adams Room
10:00-10:50
11:00-11:50
12:00-1:00

Lunch
provided by our Platinum Sponsor
Optiv

1:00-1:50
2:00-2:50
3:00-3:50
4:00-4:50
5:00-5:30

Social Time
provided by our Platinum Sponsor
Veracode

5:30-6:30 Closing Keynote

Security at the Intersection of Software, Biology, and Science Fiction
Chris Poulin

Raffle

Wrap Up


Workshops

OWASP Logo.gif

Workshops
OWASP Boston Application Security Conference · Saturday, October 27, 2018

Attitash Monroe Cannon Bretton Woods Jay Peak Cranmore
10:00-10:50
11:00-11:50
12:30-1:00
Penetration Testing & Network Defender Training Workshop
Phil Barrows, John Hammond & Vik Solem
Initial briefing in Cranmore. Then Red Team moves to Jay Peak, while Blue Team remains in Cranmore. Scoring in Bretton Woods.
1:00-1:50
2:00-2:30
2:30-2:50
Penetration Testing & Network Defender Challenge
Phil Barrows, John Hammond & Vik Solem
Participants can choose to occupy Jay Peak, Cranmore, or Bretton Woods. Best Attacker & Best Defender to be announced at close of conference.
3:00-3:50
4:00-4:50


You can find out more about this conference at the 2018 BASC Homepage
or by emailing [email protected]
Twitter 32.png