This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "2018 BASC Agenda"
From OWASP
Tom Conner (talk | contribs) |
Tom Conner (talk | contribs) (final edit?) |
||
(8 intermediate revisions by the same user not shown) | |||
Line 61: | Line 61: | ||
| colspan="7" style="width:80%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px" align="center" | <span style="font-size:130%">'''Breakfast and Registration'''</span><br/> | | colspan="7" style="width:80%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px" align="center" | <span style="font-size:130%">'''Breakfast and Registration'''</span><br/> | ||
provided by our Platinum Sponsor<br/> | provided by our Platinum Sponsor<br/> | ||
− | + | <span style="font-size:140%">'''[https://www.blackducksoftware.com/ Black Duck Software]'''</span><br/> | |
|- | |- | ||
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 09:00-09:50 | | style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 09:00-09:50 | ||
Line 67: | Line 67: | ||
<span style="font-size: 150%">'''[[2018_BASC_Homepage#Keynotes|Secure By Design]]'''</span><br/> | <span style="font-size: 150%">'''[[2018_BASC_Homepage#Keynotes|Secure By Design]]'''</span><br/> | ||
<span style="font-size:130%">'''[[2018_BASC_Homepage#Keynotes|Chris Wysopal]]'''</span><br/> | <span style="font-size:130%">'''[[2018_BASC_Homepage#Keynotes|Chris Wysopal]]'''</span><br/> | ||
− | | colspan="1" rowspan="12" style="width:10%; margin:10px; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 1px; border-bottom-width: 1px" align="center" | | + | <!-- | colspan="1" rowspan="12" style="width:10%; margin:10px; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 1px; border-bottom-width: 1px" align="center" | |
<span style="font-size: 150%">'''Capture the Flag<br/>Arena'''</span><br/><br/> | <span style="font-size: 150%">'''Capture the Flag<br/>Arena'''</span><br/><br/> | ||
<span style="font-size:130%">'''Vic Solem &<br/>Phil Barrows'''<br/>MEI Security</span><br/> | <span style="font-size:130%">'''Vic Solem &<br/>Phil Barrows'''<br/>MEI Security</span><br/> | ||
− | <br/>DEFENDERS<br/>Jay Peak Room<br/><br/>ATTACKERS<br/>Bretton Woods Room<br/><br/>Command & Control<br/>Cranmore Room | + | <br/>DEFENDERS<br/>Jay Peak Room<br/><br/>ATTACKERS<br/>Bretton Woods Room<br/><br/>Command & Control<br/>Cranmore Room --> |
|- | |- | ||
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px" | || align="center" style="width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" | '''Washington/Jefferson Room''' | | style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px" | || align="center" style="width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" | '''Washington/Jefferson Room''' | ||
Line 83: | Line 83: | ||
| style="width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2018_BASC:Presentaton_Agenda_Template|Presentation|Website Security – AppSec’s partial solution to a complex problem|Chris Olson }} | | style="width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2018_BASC:Presentaton_Agenda_Template|Presentation|Website Security – AppSec’s partial solution to a complex problem|Chris Olson }} | ||
|- | |- | ||
− | | style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 12:00- | + | | style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 12:00-1:00 || colspan="2" style="background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | |
<span style="font-size:130%">'''Lunch'''</span><br/> | <span style="font-size:130%">'''Lunch'''</span><br/> | ||
provided by our Platinum Sponsor<br/> | provided by our Platinum Sponsor<br/> | ||
− | + | <span style="font-size:140%">'''[https://www.optiv.com/ Optiv]'''</span><br/> | |
|- | |- | ||
− | | style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px" align="center" | | + | | style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 1:00-1:50 |
| style="width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2018_BASC:Presentaton_Agenda_Template|Presentation|A How Not to Fail Your DevSecOps Transformation|Eitan Worcel }} | | style="width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2018_BASC:Presentaton_Agenda_Template|Presentation|A How Not to Fail Your DevSecOps Transformation|Eitan Worcel }} | ||
| style="width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2018_BASC:Presentaton_Agenda_Template|Presentation|Navigating the Bug Bounty Marketplace|Bryan Brannigan }} | | style="width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2018_BASC:Presentaton_Agenda_Template|Presentation|Navigating the Bug Bounty Marketplace|Bryan Brannigan }} | ||
|- | |- | ||
− | | style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px" align="center" | | + | | style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 2:00-2:50 |
| style="width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2018_BASC:Presentaton_Agenda_Template|Presentation|API Security Challenges|Angelo Castigliola }} | | style="width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2018_BASC:Presentaton_Agenda_Template|Presentation|API Security Challenges|Angelo Castigliola }} | ||
| style="width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2018_BASC:Presentaton_Agenda_Template|Presentation|Voyages of the Security-Driven Enterprise|Katie Knowles }} | | style="width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2018_BASC:Presentaton_Agenda_Template|Presentation|Voyages of the Security-Driven Enterprise|Katie Knowles }} | ||
|- | |- | ||
− | | style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px" align="center" | | + | | style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 3:00-3:50 |
| style="width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2018_BASC:Presentaton_Agenda_Template|Presentation|Modern Security Architecture with OpenID Connect|Brock Allen }} | | style="width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2018_BASC:Presentaton_Agenda_Template|Presentation|Modern Security Architecture with OpenID Connect|Brock Allen }} | ||
− | | style="width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2018_BASC:Presentaton_Agenda_Template|Presentation| | + | | style="width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2018_BASC:Presentaton_Agenda_Template|Presentation|It depends on....|Tania Ward & Kristen Pascale }} |
|- | |- | ||
− | | style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px" align="center" | | + | | style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 4:00-4:50 |
| style="width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2018_BASC:Presentaton_Agenda_Template|Presentation|Acquiring and Retaining Cybersecurity Talent: A Proven Model|Deidre Diamond }} | | style="width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2018_BASC:Presentaton_Agenda_Template|Presentation|Acquiring and Retaining Cybersecurity Talent: A Proven Model|Deidre Diamond }} | ||
− | | style="width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2018_BASC:Presentaton_Agenda_Template|Presentation| | + | | style="width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2018_BASC:Presentaton_Agenda_Template|Presentation|Introduction to Android Security|Dzung Pham }} |
|- | |- | ||
− | | style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px" align="center" | | + | | style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 5:00-5:30 |
| colspan="2" style="width:30%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width: 1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | | | colspan="2" style="width:30%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width: 1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | | ||
<span style="font-size:130%">'''Social Time'''</span><br/> | <span style="font-size:130%">'''Social Time'''</span><br/> | ||
provided by our Platinum Sponsor<br/> | provided by our Platinum Sponsor<br/> | ||
− | + | <span style="font-size:140%">'''[http://veracode.com Veracode]'''</span><br/> | |
|- | |- | ||
− | | rowspan="2" style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 1px" align="center" | | + | | rowspan="2" style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 1px" align="center" | 5:30-6:30 |
| colspan="2" style="width:30%; background:#background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | <span style="font-size:130%">'''Closing Keynote'''</span><br/> | | colspan="2" style="width:30%; background:#background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | <span style="font-size:130%">'''Closing Keynote'''</span><br/> | ||
<span style="font-size: 150%">'''[[2018_BASC_Homepage#Keynotes|Security at the Intersection of Software, Biology, and Science Fiction]]'''</span><br/> | <span style="font-size: 150%">'''[[2018_BASC_Homepage#Keynotes|Security at the Intersection of Software, Biology, and Science Fiction]]'''</span><br/> | ||
Line 122: | Line 122: | ||
<!-- lighter blue: #9BA8CF --> | <!-- lighter blue: #9BA8CF --> | ||
− | |||
= Workshops = | = Workshops = | ||
Line 128: | Line 127: | ||
{| style="width:80%" border="0" align="center" | {| style="width:80%" border="0" align="center" | ||
− | ! colspan=" | + | ! colspan="7" align="center" | |
<table> | <table> | ||
<tr> | <tr> | ||
Line 135: | Line 134: | ||
</td> | </td> | ||
<td> | <td> | ||
− | <span style="font-size:150%">'''Workshops<br/>OWASP Boston Application Security Conference · Saturday, October | + | <span style="font-size:150%">'''Workshops<br/>OWASP Boston Application Security Conference · Saturday, October 27, 2018'''</span> |
</td> | </td> | ||
</tr> | </tr> | ||
Line 141: | Line 140: | ||
|- | |- | ||
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" | | | style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" | | ||
− | | align="center" style="width: | + | | align="center" style="width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" | '''Attitash''' |
− | | align="center" style="width: | + | | align="center" style="width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" | '''Monroe''' |
− | | align="center" style="width: | + | | align="center" style="width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" | '''Cannon''' |
− | | align="center" style="width: | + | | align="center" style="width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" | '''Bretton Woods''' |
− | | align="center" style="width: | + | | align="center" style="width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" | '''Jay Peak''' |
− | | align="center" style="width: | + | | align="center" style="width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" | '''Cranmore''' |
|- | |- | ||
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 10:00-10:50 | | style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 10:00-10:50 | ||
− | | style="width: | + | | rowspan="2" style="width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2018_BASC:Resume_Agenda_Template|Session 1 }} |
− | | rowspan="2" style="width: | + | | rowspan="2" style="width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2018_BASC:Workshop_Agenda_Template|Presentation|Advanced XXE Exploitation|Philippe Arteau }} |
− | | rowspan="3" style="width: | + | | rowspan="3" style="width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | |
− | | rowspan=" | + | | rowspan="2" style="width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2018_BASC:Workshop_Agenda_Template|Presentation|AppSec Wars Challenge|Steve Allor }} |
− | | rowspan=" | + | | rowspan="2" style="width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2018_BASC:Workshop_Agenda_Template|Presentation|Intro to Osquery - A Hands On Lab|Milan Shah }} |
+ | | rowspan="2" style="width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | | ||
|- | |- | ||
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 11:00-11:50 | | style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 11:00-11:50 | ||
− | |||
|- | |- | ||
− | | style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 12:00- | + | | style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 12:30-1:00 |
− | | style="width: | + | | rowspan="1" style="width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | |
− | | style="width: | + | | rowspan="1" style="width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | |
+ | | rowspan="2" colspan="3" style="width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | <div style="margin:0px;"><span style="font-size: 120%">[[2018_BASC_Workshops#Penetration Testing & Network Defender Training Workshop|Penetration Testing & Network Defender Training Workshop]]</span><br/><span style="font-size: 110%">[[2018_BASC_Speakers#|Phil Barrows, John Hammond & Vik Solem]]</span><br/>Initial briefing in Cranmore. Then Red Team moves to Jay Peak, while Blue Team remains in Cranmore. Scoring in Bretton Woods.</div> | ||
+ | |- | ||
+ | | style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 1:00-1:50 | ||
+ | | rowspan="4" style="width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2018_BASC:Resume_Agenda_Template|Session 2 }} | ||
+ | | rowspan="5" style="width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 1px" align="center" | {{2018_BASC:Presentaton_Agenda_Template|Workshop|Threat Modeling Workshop|Robert Hurlbut }} | ||
+ | | rowspan="3" style="width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2018_BASC:Presentaton_Agenda_Template|Workshop|Application Cartography and Defense|Erik Costlow }} | ||
|- | |- | ||
− | | style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | | + | | style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 2:00-2:30 |
− | | rowspan=" | + | | rowspan="1" style="width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | |
− | | rowspan=" | + | | rowspan="1" style="width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | |
+ | | rowspan="1" style="width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | | ||
|- | |- | ||
− | | style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | | + | | style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 2:30-2:50 |
− | | style="width: | + | | rowspan="2" colspan="3" style="width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | <div style="margin:0px;"><span style="font-size: 120%">[[2018_BASC_Workshops#Penetration Testing & Network Defender Challenge|Penetration Testing & Network Defender Challenge]]</span><br/><span style="font-size: 110%">[[2018_BASC_Speakers#|Phil Barrows, John Hammond & Vik Solem]]</span><br/>Participants can choose to occupy Jay Peak, Cranmore, or Bretton Woods. Best Attacker & Best Defender to be announced at close of conference.</div> |
|- | |- | ||
− | | style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | | + | | style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 3:00-3:50 |
− | | rowspan="2" style="width: | + | | rowspan="2" style="width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | |
|- | |- | ||
− | | style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 1px" align="center" | | + | | style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 1px" align="center" | 4:00-4:50 |
− | | style="width: | + | | style="width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | |
+ | | rowspan="1" style="width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | | ||
+ | | rowspan="1" style="width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | | ||
+ | | rowspan="1" style="width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | | ||
|} | |} | ||
− | |||
{{2018_BASC:Footer_Template | Agenda}} | {{2018_BASC:Footer_Template | Agenda}} |
Latest revision as of 00:59, 25 October 2018
Please help us keep BASC free by viewing and visiting all of our sponsors.
Presentations
| |||||||
---|---|---|---|---|---|---|---|
8:30-9:30 | Breakfast and Registration provided by our Platinum Sponsor | ||||||
09:00-09:50 | Opening Keynote | ||||||
Washington/Jefferson Room | Adams Room | ||||||
10:00-10:50 | |||||||
11:00-11:50 | |||||||
12:00-1:00 |
Lunch | ||||||
1:00-1:50 | |||||||
2:00-2:50 | |||||||
3:00-3:50 | |||||||
4:00-4:50 | |||||||
5:00-5:30 |
Social Time | ||||||
5:30-6:30 | Closing Keynote Security at the Intersection of Software, Biology, and Science Fiction | ||||||
Raffle Wrap Up
|
Workshops
| ||||||||
---|---|---|---|---|---|---|---|---|
Attitash | Monroe | Cannon | Bretton Woods | Jay Peak | Cranmore | |||
10:00-10:50 |
CyberSN Career Center |
|||||||
11:00-11:50 | ||||||||
12:30-1:00 | Penetration Testing & Network Defender Training Workshop
Phil Barrows, John Hammond & Vik Solem Initial briefing in Cranmore. Then Red Team moves to Jay Peak, while Blue Team remains in Cranmore. Scoring in Bretton Woods. | |||||||
1:00-1:50 |
CyberSN Career Center |
|||||||
2:00-2:30 | ||||||||
2:30-2:50 | Penetration Testing & Network Defender Challenge
Phil Barrows, John Hammond & Vik Solem Participants can choose to occupy Jay Peak, Cranmore, or Bretton Woods. Best Attacker & Best Defender to be announced at close of conference. | |||||||
3:00-3:50 | ||||||||
4:00-4:50 |