This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "OWASP New Zealand Day 2019"
From OWASP
John dileo (talk | contribs) (Added Stephen Sherry to committee list) |
John dileo (talk | contribs) m (Marked out Sarah Young's presentation - she cancelled on 5 February.) (Tag: Visual edit) |
||
Line 220: | Line 220: | ||
</td> | </td> | ||
<td align="center"> | <td align="center"> | ||
− | [[File:RedShield.png | + | [[File:RedShield.png|frameless|link=https://www.redshield.co/|Logo-RedShield]] |
</td> | </td> | ||
</tr> | </tr> | ||
Line 312: | Line 312: | ||
<b>Welcome to OWASP New Zealand Day 2019</b><br /> | <b>Welcome to OWASP New Zealand Day 2019</b><br /> | ||
<i>John DiLeo (Conference Chair), Kirk Jackson, and [https://binarymist.io Kim Carter] - OWASP NZ Chapter Leaders<br />Lech Janczewski (Conference Host) - Associate Professor, Univ. of Auckland</i> | <i>John DiLeo (Conference Chair), Kirk Jackson, and [https://binarymist.io Kim Carter] - OWASP NZ Chapter Leaders<br />Lech Janczewski (Conference Host) - Associate Professor, Univ. of Auckland</i> | ||
+ | |||
</tr> | </tr> | ||
<tr> | <tr> | ||
Line 327: | Line 328: | ||
<td style="background-color: #EEE; text-align: center"> | <td style="background-color: #EEE; text-align: center"> | ||
<b>Exploiting Vulnerabilities from the OWASP Top 10: SQLi, XSS, XXE, File Injection</b><br /> | <b>Exploiting Vulnerabilities from the OWASP Top 10: SQLi, XSS, XXE, File Injection</b><br /> | ||
− | + | <i>David Waters and Kieran Molloy - Pushpay</i> | |
</td> | </td> | ||
<td valign="top" align="right">09:20</td> | <td valign="top" align="right">09:20</td> | ||
<td style="background-color: #EEE; text-align: center"> | <td style="background-color: #EEE; text-align: center"> | ||
<b>Virtual Patching: Does It Work?</b><br /> | <b>Virtual Patching: Does It Work?</b><br /> | ||
− | + | <i>Kirk Jackson - RedShield</i> | |
</td> | </td> | ||
</tr> | </tr> | ||
Line 339: | Line 340: | ||
<td style="background-color: #B9C2DC; text-align: center"> | <td style="background-color: #B9C2DC; text-align: center"> | ||
<b>Threat Modelling When You've Never Done It Before</b><br /> | <b>Threat Modelling When You've Never Done It Before</b><br /> | ||
− | + | <i>Kade Morton - Quantum Security</i> | |
</td> | </td> | ||
<td valign="top" align="right">10:10</td> | <td valign="top" align="right">10:10</td> | ||
<td style="background-color: #B9C2DC; text-align: center"> | <td style="background-color: #B9C2DC; text-align: center"> | ||
<b>Cloud Catastrophes and How to Avoid Them</b><br /> | <b>Cloud Catastrophes and How to Avoid Them</b><br /> | ||
− | + | <i>Michael Haworth - Insomnia Security</i> | |
</td> | </td> | ||
Line 352: | Line 353: | ||
<td style="background-color: #EEE; text-align: center"> | <td style="background-color: #EEE; text-align: center"> | ||
<b>That Vulnerability Looks Quite Risky</b><br /> | <b>That Vulnerability Looks Quite Risky</b><br /> | ||
− | + | <i>Peter Jakowetz - Quantum Security</i> | |
</td> | </td> | ||
<td rowspan="2" valign="top" align="right">10:45</td> | <td rowspan="2" valign="top" align="right">10:45</td> | ||
<td rowspan="2" style="background-color: #EEE; text-align: center"> | <td rowspan="2" style="background-color: #EEE; text-align: center"> | ||
<b>JWAT: Attacking JSON Web Tokens</b><br /> | <b>JWAT: Attacking JSON Web Tokens</b><br /> | ||
− | + | <i>Louis Nyffenegger - Pentester Lab</i> | |
</td> | </td> | ||
</tr> | </tr> | ||
Line 364: | Line 365: | ||
<td style="background-color: #B9C2DC; text-align: center"> | <td style="background-color: #B9C2DC; text-align: center"> | ||
<b>Mob Learning Using the OWASP Top 10 and 30 Days of Security Testing</b><br /> | <b>Mob Learning Using the OWASP Top 10 and 30 Days of Security Testing</b><br /> | ||
− | + | <i>Mike Clarke - Erudite Software</i> | |
</td> | </td> | ||
</tr> | </tr> | ||
Line 371: | Line 372: | ||
<td style="background-color: #EEE; text-align: center"> | <td style="background-color: #EEE; text-align: center"> | ||
<b>How Can OWASP SAMM Help You Build More Secure Software?</b><br /> | <b>How Can OWASP SAMM Help You Build More Secure Software?</b><br /> | ||
− | + | <i>Mohamed Hassan - Aura Information Security</i> | |
</td> | </td> | ||
<td valign="top" align="right">11:40</td> | <td valign="top" align="right">11:40</td> | ||
<td style="background-color: #B9C2DC; text-align: center"> | <td style="background-color: #B9C2DC; text-align: center"> | ||
<b>Security Regression Testing on OWASP ZAP Node API</b><br /> | <b>Security Regression Testing on OWASP ZAP Node API</b><br /> | ||
− | + | <i>Kim Carter - BinaryMist</i> | |
</td> | </td> | ||
</tr> | </tr> | ||
Line 389: | Line 390: | ||
<td style="background-color: #EEE; text-align: center"> | <td style="background-color: #EEE; text-align: center"> | ||
<b>NoHolidayChurchGenius: Password Security with 2020 Vision</b><br /> | <b>NoHolidayChurchGenius: Password Security with 2020 Vision</b><br /> | ||
− | + | <i>Antonio Radich - Quantum Security</i> | |
</td> | </td> | ||
<td rowspan="2" valign="top" align="right">13:30</td> | <td rowspan="2" valign="top" align="right">13:30</td> | ||
<td rowspan="2" style="background-color: #EEE; text-align: center"> | <td rowspan="2" style="background-color: #EEE; text-align: center"> | ||
− | <b>How to Lose a Container in 10 Minutes</b><br /> | + | <b><s>How to Lose a Container in 10 Minutes</s></b><br /> |
− | + | <i><s>Sarah Young - Microsoft</s></i> | |
</td> | </td> | ||
</tr> | </tr> | ||
Line 401: | Line 402: | ||
<td style="background-color: #B9C2DC; text-align: center"> | <td style="background-color: #B9C2DC; text-align: center"> | ||
<b>Sharing Is Caring: A Beginner's Guide to Security in the Cloud</b><br /> | <b>Sharing Is Caring: A Beginner's Guide to Security in the Cloud</b><br /> | ||
− | + | <i>Petra Smith - Aura Information Security</i> | |
</td> | </td> | ||
</tr> | </tr> | ||
Line 408: | Line 409: | ||
<td style="background-color: #EEE; text-align: center"> | <td style="background-color: #EEE; text-align: center"> | ||
<b>Eating the Elephant: Application Security When You Aren't a Startup</b><br /> | <b>Eating the Elephant: Application Security When You Aren't a Startup</b><br /> | ||
− | + | <i>Stephen Morgan - Westpac New Zealand</i> | |
</td> | </td> | ||
<td valign="top" align="right">14:25</td> | <td valign="top" align="right">14:25</td> | ||
<td style="background-color: #B9C2DC; text-align: center"> | <td style="background-color: #B9C2DC; text-align: center"> | ||
<b>CI Can Make $$$ from Thin Air</b><br /> | <b>CI Can Make $$$ from Thin Air</b><br /> | ||
− | + | <i>Sajeeb Lohani - Privasec</i> | |
</td> | </td> | ||
</tr> | </tr> | ||
Line 420: | Line 421: | ||
<td style="background-color: #B9C2DC; text-align: center"> | <td style="background-color: #B9C2DC; text-align: center"> | ||
<b>What's In a Name? Law of Agency and Domain Name Registrations</b><br /> | <b>What's In a Name? Law of Agency and Domain Name Registrations</b><br /> | ||
− | + | <i>Judy Ting-Edwards - Ports of Auckland</i> | |
</td> | </td> | ||
<td valign="top" align="right">15:00</td> | <td valign="top" align="right">15:00</td> | ||
<td style="background-color: #EEE; text-align: center"> | <td style="background-color: #EEE; text-align: center"> | ||
<b>Introduction to Building Secure Electron Applications</b><br /> | <b>Introduction to Building Secure Electron Applications</b><br /> | ||
− | + | <i>Nawaz Gayoom - Provoke Solutions</i> | |
</td> | </td> | ||
</tr> | </tr> | ||
Line 438: | Line 439: | ||
<td style="background-color: #EEE; text-align: center"> | <td style="background-color: #EEE; text-align: center"> | ||
<b>How Do I Content Security Policy?</b><br /> | <b>How Do I Content Security Policy?</b><br /> | ||
− | + | <i>Kirk Jackson - RedShield</i> | |
</td> | </td> | ||
<td valign="top" align="right">16:00</td> | <td valign="top" align="right">16:00</td> | ||
<td style="background-color: #EEE; text-align: center"> | <td style="background-color: #EEE; text-align: center"> | ||
<b>Hardening Your Docker Infrastructure</b><br /> | <b>Hardening Your Docker Infrastructure</b><br /> | ||
− | + | <i>Kim Carter - BinaryMist</i> | |
</td> | </td> | ||
</tr> | </tr> | ||
Line 450: | Line 451: | ||
<td style="background-color: #B9C2DC; text-align: center"> | <td style="background-color: #B9C2DC; text-align: center"> | ||
<b>OWASP Software Assurance Maturity Model (SAMM) 2.0</b><br /> | <b>OWASP Software Assurance Maturity Model (SAMM) 2.0</b><br /> | ||
− | + | <i>John DiLeo - Orion Health</i> | |
</td> | </td> | ||
<td valign="top" align="right">16:50</td> | <td valign="top" align="right">16:50</td> | ||
<td style="background-color: #B9C2DC; text-align: center"> | <td style="background-color: #B9C2DC; text-align: center"> | ||
<b>Reverse Engineering Mobile Apps: Why, What, and the Hows</b><br /> | <b>Reverse Engineering Mobile Apps: Why, What, and the Hows</b><br /> | ||
− | + | <i>Karan Sharma</i> | |
</td> | </td> | ||
</tr> | </tr> | ||
Line 462: | Line 463: | ||
<td style="background-color: #EEE; text-align: center"> | <td style="background-color: #EEE; text-align: center"> | ||
<b>Why 'Positive Security' Is the Next Software Security Game Changer, and How to Do It</b><br /> | <b>Why 'Positive Security' Is the Next Software Security Game Changer, and How to Do It</b><br /> | ||
− | + | <i>Jaap Karan Singh - Secure Code Warrior</i> | |
</td> | </td> | ||
<td valign="top" align="right">17:25</td> | <td valign="top" align="right">17:25</td> | ||
<td style="background-color: #EEE; text-align: center"> | <td style="background-color: #EEE; text-align: center"> | ||
<b>Serverless Authentication with JWT</b><br /> | <b>Serverless Authentication with JWT</b><br /> | ||
− | + | <i>Mehul Patel</i> | |
</td> | </td> | ||
</tr> | </tr> | ||
Line 895: | Line 896: | ||
| style="text-align: center; font-weight: bold;" | Yes | | style="text-align: center; font-weight: bold;" | Yes | ||
| style="text-align: center; font-weight: bold;" | Yes | | style="text-align: center; font-weight: bold;" | Yes | ||
− | | style="text-align: center; font-weight: bold; | Yes | + | | style="text-align: center; font-weight: bold; " | Yes |
| style="text-align: center;" | Yes | | style="text-align: center;" | Yes | ||
| style="text-align: center; font-weight: bold; font-style: italic;" | Varies | | style="text-align: center; font-weight: bold; font-style: italic;" | Varies |