This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "OWASP New Zealand Day 2018"
From OWASP
(Remove Denis and Sam) (Tag: Visual edit) |
John dileo (talk | contribs) |
||
(11 intermediate revisions by 2 users not shown) | |||
Line 92: | Line 92: | ||
<ul> | <ul> | ||
− | <li> | + | <li>Coffee cart and selection of snacks next to the reception on the ground floor, this is the closest but will probably have long lines</li> |
<li>Mojo Symonds - also on campus</li> | <li>Mojo Symonds - also on campus</li> | ||
<li>Shakey Isles - coffee and food across the road on the corner of Symonds & Alfred St</li> | <li>Shakey Isles - coffee and food across the road on the corner of Symonds & Alfred St</li> | ||
Line 104: | Line 104: | ||
<li>The Bluestone Room - also a popular pub just across Queen St</li> | <li>The Bluestone Room - also a popular pub just across Queen St</li> | ||
</ul> | </ul> | ||
− | |||
==Conference Venue== | ==Conference Venue== | ||
Line 400: | Line 399: | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
+ | <td width="7%" valign="top" align="right"></td> | ||
+ | <td style="background-color: #EEE; text-align: center"> | ||
+ | <b>Upstairs room</b> | ||
+ | </td> | ||
<td width="7%" valign="top" align="right">09:45</td> | <td width="7%" valign="top" align="right">09:45</td> | ||
+ | <td style="background-color: #EEE; text-align: center"> | ||
+ | '''Downstairs room''' | ||
+ | </td> | ||
+ | </tr> | ||
+ | <tr> | ||
+ | <td width="7%" valign="top" align="right"></td> | ||
<td style="background-color: #EEE; text-align: center"> | <td style="background-color: #EEE; text-align: center"> | ||
<b>Fear Itself</b><br /> | <b>Fear Itself</b><br /> | ||
Line 408: | Line 417: | ||
<td style="background-color: #EEE; text-align: center"> | <td style="background-color: #EEE; text-align: center"> | ||
<b>Offensive Defence</b><br /> | <b>Offensive Defence</b><br /> | ||
− | <i>Chris Berry - Aura Information Security</i> | + | <i>Chris Berry - Aura Information Security</i><br/> |
+ | [[Media:2018-02-05-ChrisBerry.pdf|Slides: (PDF, 3.4mb)]] | ||
+ | [https://www.youtube.com/edit?o=U&video_id=-z4ID7Rh84E Video] | ||
</td> | </td> | ||
</tr> | </tr> | ||
Line 415: | Line 426: | ||
<td style="background-color: #B9C2DC; text-align: center"> | <td style="background-color: #B9C2DC; text-align: center"> | ||
<b>Pizza Roulette</b><br /> | <b>Pizza Roulette</b><br /> | ||
− | <i>Catherine McIlvride and Fiona Sasse</i> | + | <i>Catherine McIlvride and Fiona Sasse</i><br /> |
+ | [[Media:2018-02-05-CatherineMcIlvrideFionaSasse.pdf|Slides: (PDF, 3.4mb)]] | ||
+ | [https://www.youtube.com/watch?v=FUY-PgZqI3A Video] | ||
</td> | </td> | ||
<td width="7%" valign="top" align="right">10:20</td> | <td width="7%" valign="top" align="right">10:20</td> | ||
<td style="background-color: #B9C2DC; text-align: center"> | <td style="background-color: #B9C2DC; text-align: center"> | ||
<b>Auth* Infrastructure for Everyone</b><br /> | <b>Auth* Infrastructure for Everyone</b><br /> | ||
− | <i>Ryan Kurte and Kirk Holloway</i> | + | <i>Ryan Kurte and Kirk Holloway</i><br /> |
+ | [https://docs.google.com/presentation/d/11tFlGmRQUBJ5ns-8gxRDxL3J0rAkCgOVqAEGqwqxDLM/edit?usp=sharing Slides] | ||
</td> | </td> | ||
Line 428: | Line 442: | ||
<td style="background-color: #EEE; text-align: center"> | <td style="background-color: #EEE; text-align: center"> | ||
<b>Guarding the Pot of Gold while the Rainbow gets bigger</b><br /> | <b>Guarding the Pot of Gold while the Rainbow gets bigger</b><br /> | ||
− | <i>Sarah Bennett and Patricia Ramsden - Xero</i> | + | <i>Sarah Bennett and Patricia Ramsden - Xero</i><br /> |
+ | [https://www.youtube.com/watch?v=kh5q-79Boe8 Video] | ||
</td> | </td> | ||
<td width="7%" valign="top" align="right">10:55</td> | <td width="7%" valign="top" align="right">10:55</td> | ||
<td style="background-color: #EEE; text-align: center"> | <td style="background-color: #EEE; text-align: center"> | ||
<b>Bermudez - a honeypit designed to waste hacker's time</b><br /> | <b>Bermudez - a honeypit designed to waste hacker's time</b><br /> | ||
− | <i>Ian Welch and Kaishuo Yang</i> | + | <i>Ian Welch and Kaishuo Yang</i><br /> |
+ | [https://www.youtube.com/watch?v=t5XBf4LApoo Video] | ||
</td> | </td> | ||
</tr> | </tr> | ||
Line 440: | Line 456: | ||
<td style="background-color: #B9C2DC; text-align: center"> | <td style="background-color: #B9C2DC; text-align: center"> | ||
<b>Enough theory, how are websites getting hacked in real life?</b><br /> | <b>Enough theory, how are websites getting hacked in real life?</b><br /> | ||
− | <i>Declan Ingram - CERT</i> | + | <i>Declan Ingram - CERT</i><br/> |
+ | [https://www.youtube.com/watch?v=WhYh-eUqxIA&t=137s Video] | ||
</td> | </td> | ||
<td width="7%" valign="top" align="right">11:30</td> | <td width="7%" valign="top" align="right">11:30</td> | ||
<td style="background-color: #B9C2DC; text-align: center"> | <td style="background-color: #B9C2DC; text-align: center"> | ||
<b>Rails Derailed</b><br /> | <b>Rails Derailed</b><br /> | ||
− | <i>Tim Goddard</i> | + | <i>Tim Goddard</i><br /> |
+ | [https://insomniasec.com/releases Slides] | ||
+ | [https://www.youtube.com/watch?v=fGlS6w2naN0 Video] | ||
</td> | </td> | ||
</tr> | </tr> | ||
Line 452: | Line 471: | ||
<td style="background-color: #EEE; text-align: center"> | <td style="background-color: #EEE; text-align: center"> | ||
<b>Secure APIs: Road to Business Growth</b><br /> | <b>Secure APIs: Road to Business Growth</b><br /> | ||
− | <i>Anupama Natarajan - Unisys New Zealand</i> | + | <i>Anupama Natarajan - Unisys New Zealand</i><br /> |
+ | [[Media:2018-02-05-AnupamaNatarajan.pdf|Slides: (PDF, 719kb)]] | ||
+ | [https://www.youtube.com/watch?v=WIz6pS9L5l0 Video] | ||
</td> | </td> | ||
<td width="7%" valign="top" align="right">12:05</td> | <td width="7%" valign="top" align="right">12:05</td> | ||
<td style="background-color: #EEE; text-align: center"> | <td style="background-color: #EEE; text-align: center"> | ||
<b>Timing-Based Attacks in Web Applications</b><br /> | <b>Timing-Based Attacks in Web Applications</b><br /> | ||
− | <i>Yappare</i> | + | <i>Yappare</i><br /> |
+ | [[Media:2018-02-05-AhmadAshraff.pdf|Slides: (PDF, 7.7mb)]] | ||
</td> | </td> | ||
</tr> | </tr> | ||
Line 475: | Line 497: | ||
<td style="background-color: #EEE; text-align: center"> | <td style="background-color: #EEE; text-align: center"> | ||
<b>IoT - How to fight the tyre fire</b><br /> | <b>IoT - How to fight the tyre fire</b><br /> | ||
− | <i>Tom Isaacson</i> | + | <i>Tom Isaacson</i><br /> |
+ | [https://speakerdeck.com/parsley72/iot-how-to-fight-the-tyre-fire-1 Slides (speakerdeck)] | ||
</td> | </td> | ||
</tr> | </tr> | ||
Line 487: | Line 510: | ||
<td style="background-color: #B9C2DC; text-align: center"> | <td style="background-color: #B9C2DC; text-align: center"> | ||
<b>Thinking like an Attacker (Hacking your own organisation)</b><br /> | <b>Thinking like an Attacker (Hacking your own organisation)</b><br /> | ||
− | <i>Nick Le Mouton - drugs.com</i> | + | <i>Nick Le Mouton - drugs.com</i><br /> |
+ | [https://speakerdeck.com/noodlesnz/thinking-like-an-attacker Slides (speakerdeck)] | ||
+ | [https://www.youtube.com/watch?v=fGlS6w2naN0 Video] | ||
</td> | </td> | ||
</tr> | </tr> | ||
Line 494: | Line 519: | ||
<td style="background-color: #EEE; text-align: center"> | <td style="background-color: #EEE; text-align: center"> | ||
<b>When Shoestrings Snap</b><br /> | <b>When Shoestrings Snap</b><br /> | ||
− | <i>Rory Shillington - VoltsAndBits</i> | + | <i>Rory Shillington - VoltsAndBits</i><br /> |
+ | [[Media:2018-02-05-RoryShillington.pdf|Slides: (PDF, 7.3mb)]] | ||
+ | [https://www.youtube.com/watch?v=ElbY05nfZ2M Video] | ||
</td> | </td> | ||
<td width="7%" valign="top" align="right">15:00</td> | <td width="7%" valign="top" align="right">15:00</td> | ||
<td style="background-color: #EEE; text-align: center"> | <td style="background-color: #EEE; text-align: center"> | ||
<b>Evil Pickles: DoS Attacks Based on Object-Graph Engineering</b><br /> | <b>Evil Pickles: DoS Attacks Based on Object-Graph Engineering</b><br /> | ||
− | <i>Jens Dietrich - Massey University</i> | + | <i>Jens Dietrich - Massey University</i><br /> |
+ | [https://docs.google.com/presentation/d/1WSDq_k6z4rZeuZlvdYfNyS1IwJhVLH-gxUROi98qkL8/edit#slide=id.p Slides (google)] | ||
+ | [https://www.youtube.com/watch?v=1q2rZyR17jU Video] | ||
</td> | </td> | ||
</tr> | </tr> | ||
Line 512: | Line 541: | ||
<td style="background-color: #EEE; text-align: center"> | <td style="background-color: #EEE; text-align: center"> | ||
<b>Enough with XSS, let's talk about something else?</b><br /> | <b>Enough with XSS, let's talk about something else?</b><br /> | ||
− | <i>Karan Sharma</i> | + | <i>Karan Sharma</i><br /> |
+ | [[Media:2018-02-05-KaranSharma.pptx|Slides: (PPTX, 4mb)]] | ||
+ | [https://www.youtube.com/watch?v=KbVWJcf2CRQ Video] | ||
</td> | </td> | ||
<td width="7%" valign="top" align="right">16:00</td> | <td width="7%" valign="top" align="right">16:00</td> | ||
<td style="background-color: #EEE; text-align: center"> | <td style="background-color: #EEE; text-align: center"> | ||
<b>Secure development in Go</b><br /> | <b>Secure development in Go</b><br /> | ||
− | <i>Dion Bramley</i> | + | <i>Dion Bramley</i><br /> |
+ | [https://github.com/dionb/GoSecureDev Slides (github)] | ||
+ | [https://www.youtube.com/watch?v=4O2OShd-Su8 Video] | ||
</td> | </td> | ||
</tr> | </tr> | ||
Line 524: | Line 557: | ||
<td style="background-color: #B9C2DC; text-align: center"> | <td style="background-color: #B9C2DC; text-align: center"> | ||
<b>Riding someone else’s wave with CSRF</b><br /> | <b>Riding someone else’s wave with CSRF</b><br /> | ||
− | <i>Sam Shute - Quantum Security</i> | + | <i>Sam Shute - Quantum Security</i><br /> |
+ | [[Media:2018-02-05-SamShute.pptx|Slides: (PPTX, 234kb)]] | ||
</td> | </td> | ||
<td width="7%" valign="top" align="right">16:35</td> | <td width="7%" valign="top" align="right">16:35</td> | ||
<td style="background-color: #B9C2DC; text-align: center"> | <td style="background-color: #B9C2DC; text-align: center"> | ||
<b>Secure Your Programming Future!</b><br /> | <b>Secure Your Programming Future!</b><br /> | ||
− | <i>David Pearce</i> | + | <i>David Pearce</i><br /> |
+ | [[Media:2018-02-05-DavidPearce.pdf|Slides: (PDF, 1.8mb)]] | ||
</td> | </td> | ||
</tr> | </tr> | ||
Line 851: | Line 886: | ||
==Code of Conduct== | ==Code of Conduct== | ||
− | We want to make the OWASP NZ Day a welcoming environment for all attendees. To that end, we would like to remind you of OWASP's anti-harassment policy: [https://www.owasp.org/index.php/Governance/Conference_Policies]. | + | We want to make the OWASP NZ Day a welcoming environment for all attendees. To that end, we would like to remind you of OWASP's anti-harassment policy: [https://www.owasp.org/index.php/Governance/Conference_Policies], including the '''Anti-Harassment Policy''', '''Privacy Policy''', and '''OWASP Code of Conduct'''. |
Speakers, trainers and sponsors have all been reminded of these policies, and are expected to abide by them like all attendees. | Speakers, trainers and sponsors have all been reminded of these policies, and are expected to abide by them like all attendees. |