This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "OWASP New Zealand Day 2009"
From OWASP
m |
John dileo (talk | contribs) |
||
(13 intermediate revisions by 2 users not shown) | |||
Line 2: | Line 2: | ||
====Introduction==== | ====Introduction==== | ||
− | + | [https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2009 https://www.owasp.org/images/8/85/Owasp_nz_logo.jpg]<br> | |
− | |||
− | [https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2009 https://www.owasp.org/images/8/85/Owasp_nz_logo.jpg]<br> | ||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
+ | Back to the [[New_Zealand|OWASP NZ Chapter page]] | ||
= Introduction = | = Introduction = | ||
− | + | The OWASP New Zealand Day has been the first all day security conference dedicated to web application security in New Zealand. | |
− | + | The event attracted more than 150 attendees from all over the country. The conference has been structured in a single stream with seven talks covering multiple topics in the web application security area. | |
− | |||
− | |||
− | The | ||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | + | For those people who missed the event or are interested in the conference material, the presentations have been published and can be downloaded from the [http://www.owasp.org/index.php/OWASP_New_Zealand_Day_2009#tab=Presentations presentations] page. | |
− | [http | ||
− | |||
− | + | For any comments, feedback or observations, please don't hesitate to contact [mailto:robertosl@owasp.org us]. | |
− | + | Again, big thanks to the sponsors, the speakers and the conference committee for their contributions and support to the organisation of the event. | |
− | + | = Photos = | |
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | + | [[File:IMG_0109.png]] [[File:IMG_0043.png]] [[File:IMG 0029.png]]<br><br> | |
+ | [[File:IMG_0048.png]] [[File:IMG_0067.png]] [[File:IMG_0091.png]]<br> | ||
− | + | = Blogs/Press Coverage = | |
− | + | - <b>Kirk Jackson's Page of Words</b> - OWASP NZ Day Keynotes - http://pageofwords.com/blog/CategoryView,category,OWASP.aspx<br> | |
+ | - <b>NetGuide - August 2009 -</b> The unwelcome guest in your machine, pg. 11 - Browsing may get you foxed, pg.16<br> | ||
+ | - <b>Malerisch.net</b> - http://malerisch.net/<br> | ||
+ | - <b>Risky.biz</b> - OWASP Day NZ: Interview on Web services security testing - http://risky.biz/netcasts/rb2/rb2-owasp-day-nz-interview-web-services-security-testing<br> | ||
+ | - <b>Risky.biz</b> - OWASP Day NZ: Presentation on Web services security testing- http://risky.biz/netcasts/rb2/rb2-owasp-day-nz-presentation-web-services-security-testing<br> | ||
+ | - <b>Risky.biz</b> - OWASP Day podcast: Exploiting Firefox extensions - http://risky.biz/netcasts/rb2/rb2-owasp-day-podcast-exploiting-firefox-extensions<br> | ||
− | + | = Presentations = | |
− | == | + | ==Presentations== |
<center> | <center> | ||
Line 87: | Line 45: | ||
<td class="tcell2" valign="top"><div align="right">09:00</div></td> | <td class="tcell2" valign="top"><div align="right">09:00</div></td> | ||
<td bgcolor="#eeeeee" class="tcell"><div align="center">Welcome to OWASP New Zealand Day 2009<b><br /> | <td bgcolor="#eeeeee" class="tcell"><div align="center">Welcome to OWASP New Zealand Day 2009<b><br /> | ||
− | </b><em>Roberto Suggi Liverani - Security-Assessment.com</em></div></td> | + | </b><em>Roberto Suggi Liverani / Lech Janczewski - Security-Assessment.com / The University of Auckland</em></div></td> |
</tr> | </tr> | ||
<tr> | <tr> | ||
<td class="tcell2" valign="top"><div align="right">09:15</div></td> | <td class="tcell2" valign="top"><div align="right">09:15</div></td> | ||
− | <td bgcolor="#b9c2dc" class="tcell"><div align="center"> | + | <td bgcolor="#b9c2dc" class="tcell"><div align="center">Keynote: [http://www.owasp.org/images/d/df/OWASP_Day_-_Why_Is_The_Internet_Still_Insecure.pptx Insecurity and the Internet] - pptx<br/> |
− | <em> | + | <em>Paul Craig - Security-Assessment.com</em></div></td> |
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td class="tcell2" valign="top"><div align="right"> | + | <td class="tcell2" valign="top"><div align="right">9:50</div></td> |
− | <td bgcolor="#EEEEEE" class="tcell"><div align="center"> | + | <td bgcolor="#EEEEEE" class="tcell"><div align="center">Vulnerabilities In Action<br/> |
− | <em> | + | <em>Brett Moore - Insomnia Security</em></div></td> |
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td class="tcell2" valign="top"><div align="right">10: | + | <td class="tcell2" valign="top"><div align="right">10:40</div></td> |
− | <td bgcolor="#D98B66" class="tcell"><div align="left"> | + | <td bgcolor="#D98B66" class="tcell"><div align="left">Coffee Break<br /> |
<br /> | <br /> | ||
</div></td> | </div></td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td class="tcell2" valign="top"><div align="right">11: | + | <td class="tcell2" valign="top"><div align="right">11:10</div></td> |
− | <td bgcolor="#B9C2DC" class="tcell"><div align="center">Testing Web Services<br/> | + | <td bgcolor="#B9C2DC" class="tcell"><div align="center">[http://www.owasp.org/images/3/39/NZOWASP2009_NVD_WEB_SERVICES.pdf Testing Web Services] - pdf<br/> |
<em>Nick von Dadelszen – Lateral Security</em></div></td> | <em>Nick von Dadelszen – Lateral Security</em></div></td> | ||
</tr> | </tr> | ||
Line 120: | Line 78: | ||
<tr> | <tr> | ||
<td class="tcell2" valign="top"><div align="right">13:30</div></td> | <td class="tcell2" valign="top"><div align="right">13:30</div></td> | ||
− | <td bgcolor="#EEEEEE" class="tcell"><div align="center"><b></b>Exploiting Firefox Extensions<br /> | + | <td bgcolor="#EEEEEE" class="tcell"><div align="center"><b></b>[http://www.owasp.org/images/6/6e/Owasp_nz_day_09_roberto_suggi_liverani_nick_freeman_exploiting_ff_extensions.pptx Exploiting Firefox Extensions] - pptx<br /> |
<em>Roberto Suggi Liverani / Nick Freeman - Security-Assessment.com</em></div></td> | <em>Roberto Suggi Liverani / Nick Freeman - Security-Assessment.com</em></div></td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td class="tcell2" valign="top"><div align="right">14:15</div></td> | <td class="tcell2" valign="top"><div align="right">14:15</div></td> | ||
− | <td bgcolor="#B9C2DC" class="tcell"><div align="center"><b></b>Application Bug Chaining<br/> | + | <td bgcolor="#B9C2DC" class="tcell"><div align="center"><b></b>[http://www.owasp.org/images/5/55/Application-Bug-Chaining-Live.pdf Application Bug Chaining] - pdf<br/> |
<em>Mark Piper - Catalyst IT Ltd</em></div></td> | <em>Mark Piper - Catalyst IT Ltd</em></div></td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td class="tcell2" valign="top"><div align="right">15:00</div></td> | <td class="tcell2" valign="top"><div align="right">15:00</div></td> | ||
− | <td bgcolor="#D98B66" class="tcell"> | + | <td bgcolor="#D98B66" class="tcell">Snackie Break<br /> |
<br /></td> | <br /></td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td class="tcell2" valign="top"><div align="right">15:30</div></td> | <td class="tcell2" valign="top"><div align="right">15:30</div></td> | ||
− | <td bgcolor="#EEEEEE" class="tcell"><div align="center">"Where Worlds Collide" - PCI-DSS for OWASP practioners<br/> | + | <td bgcolor="#EEEEEE" class="tcell"><div align="center">[http://www.owasp.org/images/0/04/PCI_for_OWASP_Day_v11.ppt "Where Worlds Collide" - PCI-DSS for OWASP practioners] - ppt<br/> |
<em>Dean Carter - Security-Assessment.com</em></div></td> | <em>Dean Carter - Security-Assessment.com</em></div></td> | ||
</tr> | </tr> | ||
Line 141: | Line 99: | ||
<tr> | <tr> | ||
<td class="tcell2" valign="top"><div align="right">16:15</div></td> | <td class="tcell2" valign="top"><div align="right">16:15</div></td> | ||
− | <td bgcolor="#B9C2DC" class="tcell"><div align="center"><b></b>XSS – The Gloves are Off<br /> | + | <td bgcolor="#B9C2DC" class="tcell"><div align="center"><b></b>[http://www.owasp.org/images/b/b6/OWASP_July_09_-_Andy_Prow_and_Kirk_Jackson_-_XSS_Gloves_are_Off_1.2.pptx XSS – The Gloves are Off] - pptx<br /> |
<em>Andy Prow / Kirk Jackson - Aura Software Security / Xero</em></div></td> | <em>Andy Prow / Kirk Jackson - Aura Software Security / Xero</em></div></td> | ||
</tr> | </tr> | ||
Line 302: | Line 260: | ||
<b>Please note that CFP is now closed.</b> | <b>Please note that CFP is now closed.</b> | ||
− | ====Call For Sponsorships ( | + | ====Call For Sponsorships (CLOSED)==== |
+ | |||
+ | The aims of OWASP - New Zealand community is to guarantee access to the conference for free in order to allow for wide participation and empower the community itself. As so the OWASP - New Zealand community encourages Industries, Research Institutions and Individuals to sponsor their activities and events. | ||
− | |||
Two types of sponsorships are available: | Two types of sponsorships are available: | ||
Line 344: | Line 303: | ||
The submission will be reviewed by the OWASP New Zealand Board and the 12-14 most interesting ones will be selected and invited for presentation. | The submission will be reviewed by the OWASP New Zealand Board and the 12-14 most interesting ones will be selected and invited for presentation. | ||
+ | |||
+ | ====Conference==== | ||
+ | ==Conference Venue== | ||
+ | |||
+ | The University of Auckland Business School<br> | ||
+ | Owen G Glenn Building<br> | ||
+ | Room: OGGB 260-073 (OGGB4)<br> | ||
+ | Address: 12 Grafton Road<br> | ||
+ | Auckland<br> | ||
+ | New Zealand<br> | ||
+ | [http://maps.google.com/maps?oe=UTF-8&ie=UTF8&q=auckland+business+school&fb=1&split=1&cid=0,0,12303692579639430581&ei=6WeqSZr_OZLFkAWR--zbDQ&ll=-36.852308,174.770916&spn=0.01056,0.020621&z=16&iwloc=A Map]<br> | ||
+ | <center>[[Image:Auckland_business_school_small2.jpg]] [[Image:Room_hall.jpg]]</center> | ||
+ | |||
+ | ==Topics== | ||
+ | |||
+ | The OWASP Days have always offered a forum for discussion and exchange of ideas among researchers and practitioners who present their experiences and discuss issues related to Web Application Security from a higher level to a technical point of view. | ||
+ | |||
+ | Conference topics include, but are not limited to: | ||
+ | |||
+ | * OWASP Project Presentation (i.e Tool Updates/Project Status etc) | ||
+ | * Threat modelling of web applications | ||
+ | * Privacy Concerns with Applications and Data Storage | ||
+ | * Vulnerability analysis of web applications (code review, pentest, static analysis, scanning) | ||
+ | * Baseline or Metrics for Application Security | ||
+ | * Countermeasures for web application vulnerabilities | ||
+ | * Web application security | ||
+ | * Platform or language (e.g. Java, .NET) security features that help secure web applications | ||
+ | * Secure application development | ||
+ | * How to use databases securely in web applications | ||
+ | * Security of Service Oriented Architectures | ||
+ | * Access control in web applications | ||
+ | * Web services security | ||
+ | * Browser security | ||
+ | |||
+ | ===Conference structure and schedule=== | ||
+ | |||
+ | OWASP New Zealand Day 2009 will be all day Conference. The conference aims to provide a workshop-like atmosphere in which contributions can be presented and then time is allowed for constructive discussion of their results and processes. | ||
+ | |||
+ | It will be structured in a single stream. During the conference two coffee breaks (one in the morning and one in the afternoon) and the lunch are in program. These might be offered by the sponsors. | ||
+ | |||
+ | The detailed agenda of the conference will be available on the web site before the event. | ||
====Conference dates==== | ====Conference dates==== | ||
Line 365: | Line 365: | ||
==Conference Sponsors== | ==Conference Sponsors== | ||
+ | <center> | ||
+ | <table width="100%" border="0" cellspacing="1" cellpadding="1"> | ||
+ | <tr> | ||
+ | <td valign="bottom" width="50%"><center>[http://www.auckland.ac.nz/ https://www.owasp.org/images/8/82/University_of_Auckland_crest_small.png]</center></td> | ||
+ | <td valign="bottom" width="50%"><center>[http://www.security.org.nz/NZISF_NZISForumContent.php https://www.owasp.org/images/5/5a/Nz_information_security_forum.png]</center></td> | ||
+ | </tr> | ||
+ | <tr> | ||
+ | <td valign="top" width="50%"><center>Department of Computer Science<br>ICT and Department of Information Systems and Operations Management</center></td> | ||
+ | <td valign="top" width="50%"> </td> | ||
+ | </tr> | ||
+ | </table> | ||
+ | </center> | ||
+ | |||
+ | ---- | ||
'''Gold Sponsors:''' | '''Gold Sponsors:''' | ||
<table width="100%" border="0" cellspacing="0" cellpadding="0"> | <table width="100%" border="0" cellspacing="0" cellpadding="0"> |
Latest revision as of 02:25, 8 March 2019
Introduction
Back to the OWASP NZ Chapter page
Conference Sponsors
![]() |
![]() |
ICT and Department of Information Systems and Operations Management |
Gold Sponsors:
![]() |
|||
Silver Sponsors:
![]() |
|||