This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "OWASP New Zealand Day 2019"
From OWASP
John dileo (talk | contribs) m (Changed "Insomnia Security Specialists" to "Insomnia Security," per sponsor request.) |
John dileo (talk | contribs) (Updated slide and video links for Radich presentation) |
||
(47 intermediate revisions by 2 users not shown) | |||
Line 7: | Line 7: | ||
=Introduction= | =Introduction= | ||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
==Introduction== | ==Introduction== | ||
Line 60: | Line 50: | ||
'''Date:''' Thursday, 21 February 2019<br /> | '''Date:''' Thursday, 21 February 2019<br /> | ||
'''Time:''' 8:45 a.m. - 5:30 p.m.<br /> | '''Time:''' 8:45 a.m. - 5:30 p.m.<br /> | ||
+ | '''Format:''' Live online interaction with instructors; interactive Web-based lab exercises<br /> | ||
'''Instructors:''' Vivek Ramachandran and Nishant Sharma<br /> | '''Instructors:''' Vivek Ramachandran and Nishant Sharma<br /> | ||
'''Instructors' Organisation:''' Pentester Academy<br /> | '''Instructors' Organisation:''' Pentester Academy<br /> | ||
'''Registration Fee:''' $500.00<br /> | '''Registration Fee:''' $500.00<br /> | ||
− | '''[https://owaspnz2019-training.eventbrite.com Training Registration Page]''' | + | '''[https://owaspnz2019-training.eventbrite.com Training Registration Page]''' <strong>(Registration CLOSED)</strong> |
=== [https://www.owasp.org/index.php/OWASP_NZ_Day_2019-Training-Are_You_a_Secure_Code_Warrior '''Are You a Secure Code Warrior?'''] === | === [https://www.owasp.org/index.php/OWASP_NZ_Day_2019-Training-Are_You_a_Secure_Code_Warrior '''Are You a Secure Code Warrior?'''] === | ||
Line 72: | Line 63: | ||
'''Instructor's Organisation:''' Secure Code Warrior<br /> | '''Instructor's Organisation:''' Secure Code Warrior<br /> | ||
'''Registration Fee:''' $250.00<br /> | '''Registration Fee:''' $250.00<br /> | ||
− | '''[https://owaspnz2019-training.eventbrite.com Training Registration Page]''' | + | '''[https://owaspnz2019-training.eventbrite.com Training Registration Page]''' <strong>(Registration CLOSED)</strong> |
=== [https://www.owasp.org/index.php/OWASP_NZ_Day_2019-Training-Threat_Modelling_From_None_to_Done '''Threat Modelling: Getting from None to Done'''] === | === [https://www.owasp.org/index.php/OWASP_NZ_Day_2019-Training-Threat_Modelling_From_None_to_Done '''Threat Modelling: Getting from None to Done'''] === | ||
Line 81: | Line 72: | ||
'''Instructor's Organisation:''' OWASP New Zealand Chapter<br /> | '''Instructor's Organisation:''' OWASP New Zealand Chapter<br /> | ||
'''Registration Fee:''' $500.00<br /> | '''Registration Fee:''' $500.00<br /> | ||
− | '''[https://owaspnz2019-training.eventbrite.com Training Registration Page]''' | + | '''[https://owaspnz2019-training.eventbrite.com Training Registration Page]''' <strong>(SOLD OUT)</strong> |
− | + | <strong>Training registration closed at midnight on 14 February.</strong> | |
==General== | ==General== | ||
Line 106: | Line 97: | ||
|- | |- | ||
! scope="row" style="text-align: right;" | CFT submission deadline: | ! scope="row" style="text-align: right;" | CFT submission deadline: | ||
− | | 21st December 2018 <strong>- Submissions are now closed | + | | 21st December 2018 <strong>- Submissions are now closed</strong> |
|- | |- | ||
! scope="row" style="text-align: right;" | Training Day date: | ! scope="row" style="text-align: right;" | Training Day date: | ||
Line 112: | Line 103: | ||
|- | |- | ||
! scope="row" style="text-align: right;" | Training Registration Deadline: | ! scope="row" style="text-align: right;" | Training Registration Deadline: | ||
− | | 14th February 2019 | + | | 14th February 2019 <strong>- Registration is now closed</strong> |
|- | |- | ||
! scope="row" style="text-align: right;" | Conference Day date: | ! scope="row" style="text-align: right;" | Conference Day date: | ||
Line 125: | Line 116: | ||
==Places to eat & drink on the day== | ==Places to eat & drink on the day== | ||
+ | The University published a handy map (in 2018), to help you find places to eat around campus: | ||
+ | [[File:Retail Map City Campus 2018 v2.pdf|frame Campus dining map]] | ||
+ | |||
+ | Some of the options available: | ||
<ul> | <ul> | ||
− | <li> | + | <li>The Deli - Located on Level 1 of the Owen G. Glenn Building - This is closest, but will probably have long lines</li> |
<li>Mojo Symonds - also on campus</li> | <li>Mojo Symonds - also on campus</li> | ||
<li>Shakey Isles - coffee and food across the road on the corner of Symonds & Alfred St</li> | <li>Shakey Isles - coffee and food across the road on the corner of Symonds & Alfred St</li> | ||
Line 145: | Line 140: | ||
<td> | <td> | ||
The University of Auckland School of Business<br> | The University of Auckland School of Business<br> | ||
− | Owen | + | Owen G. Glenn Building (OGGB)<br> |
Address: 12 Grafton Road<br> | Address: 12 Grafton Road<br> | ||
<br> | <br> | ||
Line 176: | Line 171: | ||
---- | ---- | ||
− | === Platinum | + | === Platinum Sponsor === |
<table align="center" width="100%" border="0" cellspacing="7" cellpadding="0"> | <table align="center" width="100%" border="0" cellspacing="7" cellpadding="0"> | ||
Line 190: | Line 185: | ||
<table width="100%" border="0" cellspacing="7" cellpadding="0"> | <table width="100%" border="0" cellspacing="7" cellpadding="0"> | ||
<tr> | <tr> | ||
− | <td>[[File:Orion-Health-Logo.png|center|frameless | + | <td>[[File:Orion-Health-Logo 2019 Grey Orange RGB.png|center|x150px|frameless|link=https://www.orionhealth.com|Logo-Orion Health]]</td> |
<td>[[File:Quantum Security (strip)-02.png|center|x150px|frameless|link=https://www.quantumsecurity.co.nz|Logo-Quantum Security]]</td> | <td>[[File:Quantum Security (strip)-02.png|center|x150px|frameless|link=https://www.quantumsecurity.co.nz|Logo-Quantum Security]]</td> | ||
<td>[[File:SCW logo transparent.png|x150px|frameless|link=https://securecodewarrior.com|Logo-Secure Code Warrior]]</td> | <td>[[File:SCW logo transparent.png|x150px|frameless|link=https://securecodewarrior.com|Logo-Secure Code Warrior]]</td> | ||
Line 220: | Line 215: | ||
</td> | </td> | ||
<td align="center"> | <td align="center"> | ||
− | [[File:RedShield.png | + | [[File:Privasec.png|x100px|frameless|link=https://privasec.com.au/|Logo-Privasec]] |
+ | </td> | ||
+ | <td align="center"> | ||
+ | [[File:RedShield.png|frameless|link=https://www.redshield.co/|Logo-RedShield]] | ||
+ | </td> | ||
+ | <td> | ||
+ | [[File:Zimbra-logo-color-282.png|x100px|frameless|link=https://www.zimbra.com/|Logo-Zimbra]] | ||
</td> | </td> | ||
</tr> | </tr> | ||
Line 229: | Line 230: | ||
[https://www.facebook.com/owaspnz OWASP New Zealand on Facebook] | [https://www.facebook.com/owaspnz OWASP New Zealand on Facebook] | ||
− | |||
=Call for Volunteers= | =Call for Volunteers= | ||
Line 243: | Line 243: | ||
So, far, a fair few kind souls have stepped up to help out: | So, far, a fair few kind souls have stepped up to help out: | ||
− | * John DiLeo - Conference Chair, OWASP New Zealand Leader (Auckland) | + | * John DiLeo - Conference Chair, OWASP New Zealand Chapter Leader (Auckland) |
* Lech Janczewski - Conference Host Liaison, on-site Health & Safety contact - Associate Professor, University of Auckland School of Business | * Lech Janczewski - Conference Host Liaison, on-site Health & Safety contact - Associate Professor, University of Auckland School of Business | ||
+ | * Kirk Jackson - Video post-production, OWASP New Zealand Chapter Leader (Wellington) | ||
* Tess Brothersen | * Tess Brothersen | ||
* Austin Chamberlain | * Austin Chamberlain | ||
* Teresa Chan | * Teresa Chan | ||
+ | * Anna Cupples | ||
* Paul Howarth | * Paul Howarth | ||
* Toni James | * Toni James | ||
− | * | + | * Alex McClennan |
− | * | + | * Sam Penfold |
+ | * Stephen Sherry | ||
* Anneke Smitheram | * Anneke Smitheram | ||
* Anthony Vargo | * Anthony Vargo | ||
− | * | + | * Anya Yang |
= Training - 21 Feb = | = Training - 21 Feb = | ||
Line 265: | Line 268: | ||
'''Date:''' Thursday, 21 February 2019<br /> | '''Date:''' Thursday, 21 February 2019<br /> | ||
'''Time:''' 8:45 a.m. - 5:30 p.m.<br /> | '''Time:''' 8:45 a.m. - 5:30 p.m.<br /> | ||
+ | '''Format:''' Live online interaction with instructors; interactive Web-based lab exercises<br /> | ||
'''Instructors:''' Vivek Ramachandran and Nishant Sharma<br /> | '''Instructors:''' Vivek Ramachandran and Nishant Sharma<br /> | ||
'''Instructors' Organisation:''' Pentester Academy<br /> | '''Instructors' Organisation:''' Pentester Academy<br /> | ||
'''Registration Fee:''' $500.00<br /> | '''Registration Fee:''' $500.00<br /> | ||
− | '''[https://owaspnz2019-training.eventbrite.com Training Registration Page]''' | + | '''[https://owaspnz2019-training.eventbrite.com Training Registration Page]''' <strong>(Registration CLOSED)</strong> |
=== [https://www.owasp.org/index.php/OWASP_NZ_Day_2019-Training-Are_You_a_Secure_Code_Warrior '''Are You a Secure Code Warrior?'''] === | === [https://www.owasp.org/index.php/OWASP_NZ_Day_2019-Training-Are_You_a_Secure_Code_Warrior '''Are You a Secure Code Warrior?'''] === | ||
Line 277: | Line 281: | ||
'''Instructor's Organisation:''' Secure Code Warrior<br /> | '''Instructor's Organisation:''' Secure Code Warrior<br /> | ||
'''Registration Fee:''' $250.00<br /> | '''Registration Fee:''' $250.00<br /> | ||
− | '''[https://owaspnz2019-training.eventbrite.com Training Registration Page]''' | + | '''[https://owaspnz2019-training.eventbrite.com Training Registration Page]''' <strong>(Registration CLOSED)</strong> |
=== [https://www.owasp.org/index.php/OWASP_NZ_Day_2019-Training-Threat_Modelling_From_None_to_Done '''Threat Modelling: Getting from None to Done'''] === | === [https://www.owasp.org/index.php/OWASP_NZ_Day_2019-Training-Threat_Modelling_From_None_to_Done '''Threat Modelling: Getting from None to Done'''] === | ||
Line 286: | Line 290: | ||
'''Instructor's Organisation:''' OWASP New Zealand Chapter<br /> | '''Instructor's Organisation:''' OWASP New Zealand Chapter<br /> | ||
'''Registration Fee:''' $500.00<br /> | '''Registration Fee:''' $500.00<br /> | ||
− | '''[https://owaspnz2019-training.eventbrite.com Training Registration Page]''' | + | '''[https://owaspnz2019-training.eventbrite.com Training Registration Page]''' <strong>(SOLD OUT)</strong> |
Spaces are going fast, so get in quickly! | Spaces are going fast, so get in quickly! | ||
− | Check-in desk will open at 8:00 a.m. | + | Check-in desk will be located in the Level 0 lobby (outside the Case Study Rooms), and will open at 8:00 a.m. |
Morning and afternoon tea breaks will be provided; lunch will be on your own. | Morning and afternoon tea breaks will be provided; lunch will be on your own. | ||
− | = | + | =Conference - 22 Feb= |
+ | |||
+ | |||
==Presentations== | ==Presentations== | ||
Line 310: | Line 316: | ||
<td colspan="3" style="background-color: #D98B66; text-align: center"> | <td colspan="3" style="background-color: #D98B66; text-align: center"> | ||
<b>Welcome to OWASP New Zealand Day 2019</b><br /> | <b>Welcome to OWASP New Zealand Day 2019</b><br /> | ||
− | <i>John DiLeo (Conference Chair), Kirk Jackson, and [https://binarymist.io Kim Carter] - OWASP NZ Chapter Leaders<br />Lech Janczewski (Conference Host) - Associate Professor, Univ. of Auckland</i> | + | <i>John DiLeo (Conference Chair), Kirk Jackson, and [https://binarymist.io Kim Carter] - OWASP NZ Chapter Leaders<br />Lech Janczewski (Conference Host) - Associate Professor, Univ. of Auckland</i><br /> |
+ | [[Media:20190222--DiLeo-Opening_Session.pdf|Slides (PDF, 7.0 MB)]] | ||
+ | |||
</tr> | </tr> | ||
<tr> | <tr> | ||
Line 326: | Line 334: | ||
<td style="background-color: #EEE; text-align: center"> | <td style="background-color: #EEE; text-align: center"> | ||
<b>Exploiting Vulnerabilities from the OWASP Top 10: SQLi, XSS, XXE, File Injection</b><br /> | <b>Exploiting Vulnerabilities from the OWASP Top 10: SQLi, XSS, XXE, File Injection</b><br /> | ||
− | + | <i>David Waters and Kieran Molloy - Pushpay</i><br /> | |
+ | [[Media:20190222--Waters Molloy-Exploiting Vulnerabilities.pdf|Slides (PDF, 789 kB)]] | | ||
+ | [https://youtu.be/8TE_peh5Aas Video (YouTube)] | ||
</td> | </td> | ||
<td valign="top" align="right">09:20</td> | <td valign="top" align="right">09:20</td> | ||
<td style="background-color: #EEE; text-align: center"> | <td style="background-color: #EEE; text-align: center"> | ||
<b>Virtual Patching: Does It Work?</b><br /> | <b>Virtual Patching: Does It Work?</b><br /> | ||
− | + | <i>Kirk Jackson - RedShield</i><br /> | |
+ | [[Media:2019-02-22 - Virtual Patching Does it work - Print.pdf|Slides (PDF, 2.1 MB)]] | | ||
+ | [https://youtu.be/6LqKLILNrko Video (YouTube)] | ||
</td> | </td> | ||
</tr> | </tr> | ||
Line 338: | Line 350: | ||
<td style="background-color: #B9C2DC; text-align: center"> | <td style="background-color: #B9C2DC; text-align: center"> | ||
<b>Threat Modelling When You've Never Done It Before</b><br /> | <b>Threat Modelling When You've Never Done It Before</b><br /> | ||
− | + | <i>Kade Morton - Quantum Security</i><br /> | |
+ | [[Media:20190222--Morton-Threat Modelling-Complete.pdf|Slides (PDF, 5.7 MB)]] | | ||
+ | [https://youtu.be/YeeIf63Thwc Video (YouTube)] | ||
</td> | </td> | ||
<td valign="top" align="right">10:10</td> | <td valign="top" align="right">10:10</td> | ||
<td style="background-color: #B9C2DC; text-align: center"> | <td style="background-color: #B9C2DC; text-align: center"> | ||
<b>Cloud Catastrophes and How to Avoid Them</b><br /> | <b>Cloud Catastrophes and How to Avoid Them</b><br /> | ||
− | + | <i>Michael Haworth - Insomnia Security</i><br /> | |
+ | [[Media:20190222--Haworth-Cloud_Catastrophes.pdf|Slides (PDF, 666 kB)]] | | ||
+ | [https://youtu.be/UqMUNFvnp_E Video (YouTube)] | ||
</td> | </td> | ||
Line 351: | Line 367: | ||
<td style="background-color: #EEE; text-align: center"> | <td style="background-color: #EEE; text-align: center"> | ||
<b>That Vulnerability Looks Quite Risky</b><br /> | <b>That Vulnerability Looks Quite Risky</b><br /> | ||
− | + | <i>Peter Jakowetz - Quantum Security</i><br /> | |
+ | [[Media:20190222--Jakowetz-Vulnerability Looks Quite Risky.pdf|Slides (PDF, 1.0 MB)]] | | ||
+ | [https://youtu.be/NOed0M0Ec-c Video (YouTube)] | ||
</td> | </td> | ||
<td rowspan="2" valign="top" align="right">10:45</td> | <td rowspan="2" valign="top" align="right">10:45</td> | ||
<td rowspan="2" style="background-color: #EEE; text-align: center"> | <td rowspan="2" style="background-color: #EEE; text-align: center"> | ||
<b>JWAT: Attacking JSON Web Tokens</b><br /> | <b>JWAT: Attacking JSON Web Tokens</b><br /> | ||
− | + | <i>Louis Nyffenegger - Pentester Lab</i><br /> | |
+ | [[Media:20190222--Nyffenegger-JWAT.pdf|Slides (PDF, 3.5 MB)]] | | ||
+ | [https://youtu.be/aYz8yPymyvk Video (YouTube)] | ||
</td> | </td> | ||
</tr> | </tr> | ||
Line 363: | Line 383: | ||
<td style="background-color: #B9C2DC; text-align: center"> | <td style="background-color: #B9C2DC; text-align: center"> | ||
<b>Mob Learning Using the OWASP Top 10 and 30 Days of Security Testing</b><br /> | <b>Mob Learning Using the OWASP Top 10 and 30 Days of Security Testing</b><br /> | ||
− | + | <i>Mike Clarke - Erudite Software</i><br /> | |
+ | [[Media:20190222--Clarke-Mob_Learning.pdf|Slides (PDF, 1.2 MB)]] | | ||
+ | [https://youtu.be/5YIdlFdKV00 Video (YouTube)] | ||
</td> | </td> | ||
</tr> | </tr> | ||
Line 370: | Line 392: | ||
<td style="background-color: #EEE; text-align: center"> | <td style="background-color: #EEE; text-align: center"> | ||
<b>How Can OWASP SAMM Help You Build More Secure Software?</b><br /> | <b>How Can OWASP SAMM Help You Build More Secure Software?</b><br /> | ||
− | + | <i>Mohamed Hassan - Aura Information Security</i><br /> | |
+ | <i>Slides not yet available</i> | [https://youtu.be/AEBnmyzDSEo Video (YouTube)] | ||
</td> | </td> | ||
<td valign="top" align="right">11:40</td> | <td valign="top" align="right">11:40</td> | ||
<td style="background-color: #B9C2DC; text-align: center"> | <td style="background-color: #B9C2DC; text-align: center"> | ||
− | <b> | + | <b>CTF: The Gateway Drug</b><br /> |
− | + | <i>Toni James - Orion Health</i><br /> | |
+ | <i>Slides not yet available</i> | [https://youtu.be/B1CPimcoE7c Video (YouTube)] | ||
</td> | </td> | ||
</tr> | </tr> | ||
Line 388: | Line 412: | ||
<td style="background-color: #EEE; text-align: center"> | <td style="background-color: #EEE; text-align: center"> | ||
<b>NoHolidayChurchGenius: Password Security with 2020 Vision</b><br /> | <b>NoHolidayChurchGenius: Password Security with 2020 Vision</b><br /> | ||
− | + | <i>Antonio Radich - Quantum Security</i><br /> | |
+ | [[Media:20190222--Radich-NoHolidayChurchGenius.pdf|Slides (PDF, 1.4 MB)]] | | ||
+ | [https://www.youtube.com/watch?v=5AaOU5bC2fU Video (YouTube)] | ||
</td> | </td> | ||
<td rowspan="2" valign="top" align="right">13:30</td> | <td rowspan="2" valign="top" align="right">13:30</td> | ||
<td rowspan="2" style="background-color: #EEE; text-align: center"> | <td rowspan="2" style="background-color: #EEE; text-align: center"> | ||
− | <b> | + | <b>Security Regression Testing on OWASP ZAP Node API</b><br /> |
− | + | <i>Kim Carter - BinaryMist</i><br /> | |
+ | <i>Slides not yet available</i> | <i>Video not published, at presenter's request</i> | ||
</td> | </td> | ||
</tr> | </tr> | ||
Line 400: | Line 427: | ||
<td style="background-color: #B9C2DC; text-align: center"> | <td style="background-color: #B9C2DC; text-align: center"> | ||
<b>Sharing Is Caring: A Beginner's Guide to Security in the Cloud</b><br /> | <b>Sharing Is Caring: A Beginner's Guide to Security in the Cloud</b><br /> | ||
− | + | <i>Petra Smith - Aura Information Security</i><br /> | |
+ | [[Media:20190222--Smith-Sharing Is Caring.pdf|Slides (PDF, 2.1 MB)]] | | ||
+ | [https://youtu.be/DKRlnea2o00 Video (YouTube)] | ||
</td> | </td> | ||
</tr> | </tr> | ||
Line 407: | Line 436: | ||
<td style="background-color: #EEE; text-align: center"> | <td style="background-color: #EEE; text-align: center"> | ||
<b>Eating the Elephant: Application Security When You Aren't a Startup</b><br /> | <b>Eating the Elephant: Application Security When You Aren't a Startup</b><br /> | ||
− | + | <i>Stephen Morgan - Westpac New Zealand</i><br /> | |
+ | [[Media:20190222--Morgan-Eating the Elephant.pdf|Slides (PDF, 2.1 MB)]] | | ||
+ | [https://youtu.be/rfK5bSvmdmw Video (YouTube)] | ||
</td> | </td> | ||
<td valign="top" align="right">14:25</td> | <td valign="top" align="right">14:25</td> | ||
<td style="background-color: #B9C2DC; text-align: center"> | <td style="background-color: #B9C2DC; text-align: center"> | ||
<b>CI Can Make $$$ from Thin Air</b><br /> | <b>CI Can Make $$$ from Thin Air</b><br /> | ||
− | + | <i>Sajeeb Lohani - Privasec</i><br /> | |
+ | <i>Slides and Video not published, at presenter's request</i> | ||
</td> | </td> | ||
</tr> | </tr> | ||
Line 419: | Line 451: | ||
<td style="background-color: #B9C2DC; text-align: center"> | <td style="background-color: #B9C2DC; text-align: center"> | ||
<b>What's In a Name? Law of Agency and Domain Name Registrations</b><br /> | <b>What's In a Name? Law of Agency and Domain Name Registrations</b><br /> | ||
− | + | <i>Judy Ting-Edwards - Ports of Auckland</i><br /> | |
+ | [[Media:20190222--Ting-Edwards-Whats_in_a_Name.pdf|Slides (PDF, 4.6 MB)]] | | ||
+ | <i>Video not published, at presenter's request</i> | ||
</td> | </td> | ||
<td valign="top" align="right">15:00</td> | <td valign="top" align="right">15:00</td> | ||
<td style="background-color: #EEE; text-align: center"> | <td style="background-color: #EEE; text-align: center"> | ||
<b>Introduction to Building Secure Electron Applications</b><br /> | <b>Introduction to Building Secure Electron Applications</b><br /> | ||
− | + | <i>Nawaz Gayoom - Provoke Solutions</i><br /> | |
+ | [[Media:20190222--Gayoom-Secure_Electron_Apps.pdf|Slides (PDF, 587 kB)]] | | ||
+ | [https://youtu.be/6GNTbvNs0tc Video (YouTube)] | ||
</td> | </td> | ||
</tr> | </tr> | ||
Line 437: | Line 473: | ||
<td style="background-color: #EEE; text-align: center"> | <td style="background-color: #EEE; text-align: center"> | ||
<b>How Do I Content Security Policy?</b><br /> | <b>How Do I Content Security Policy?</b><br /> | ||
− | + | <i>Kirk Jackson - RedShield</i><br /> | |
+ | [[Media:2019-02-22 - How do I Content Security Policy - Print.pdf|Slides (PDF, 1.6 MB)]] | | ||
+ | [https://youtu.be/tlCOd-zjdQM Video (YouTube)] | ||
</td> | </td> | ||
<td valign="top" align="right">16:00</td> | <td valign="top" align="right">16:00</td> | ||
<td style="background-color: #EEE; text-align: center"> | <td style="background-color: #EEE; text-align: center"> | ||
<b>Hardening Your Docker Infrastructure</b><br /> | <b>Hardening Your Docker Infrastructure</b><br /> | ||
− | + | <i>Kim Carter - BinaryMist</i><br /> | |
+ | <i>Slides not yet available</i> | <i>Video not published, at presenter's request</i> | ||
</td> | </td> | ||
</tr> | </tr> | ||
Line 449: | Line 488: | ||
<td style="background-color: #B9C2DC; text-align: center"> | <td style="background-color: #B9C2DC; text-align: center"> | ||
<b>OWASP Software Assurance Maturity Model (SAMM) 2.0</b><br /> | <b>OWASP Software Assurance Maturity Model (SAMM) 2.0</b><br /> | ||
− | + | <i>John DiLeo - Orion Health</i><br /> | |
+ | [[Media:20190222--DiLeo-OWASP_SAMM_2.pdf|Slides (PDF, 7.1 MB)]] | | ||
+ | [https://youtu.be/o-zoers_ckA Video (YouTube)] | ||
</td> | </td> | ||
<td valign="top" align="right">16:50</td> | <td valign="top" align="right">16:50</td> | ||
<td style="background-color: #B9C2DC; text-align: center"> | <td style="background-color: #B9C2DC; text-align: center"> | ||
<b>Reverse Engineering Mobile Apps: Why, What, and the Hows</b><br /> | <b>Reverse Engineering Mobile Apps: Why, What, and the Hows</b><br /> | ||
− | + | <i>Karan Sharma</i><br /> | |
+ | Slides (PDF): | ||
+ | [[Media:20190222--Sharma-Mobile App Reverse Engineering-Part1.pdf|Part 1 (4.8 MB)]], | ||
+ | [[Media:20190222--Sharma-Mobile App Reverse Engineering-Part2.pdf|Part 2 (7.1 MB)]], | ||
+ | [[Media:20190222--Sharma-Mobile App Reverse Engineering-Part3.pdf|Part 3 (6.2 MB)]] | | ||
+ | [https://youtu.be/N6ffxIcz0L4 Video (YouTube)] | ||
</td> | </td> | ||
</tr> | </tr> | ||
Line 461: | Line 507: | ||
<td style="background-color: #EEE; text-align: center"> | <td style="background-color: #EEE; text-align: center"> | ||
<b>Why 'Positive Security' Is the Next Software Security Game Changer, and How to Do It</b><br /> | <b>Why 'Positive Security' Is the Next Software Security Game Changer, and How to Do It</b><br /> | ||
− | + | <i>Jaap Karan Singh - Secure Code Warrior</i><br /> | |
+ | [[Media:20190222--Singh-Positive Security.pdf|Slides (PDF, 7.1 MB)]] | | ||
+ | [https://youtu.be/kHYdM690hFM Video (YouTube)] | ||
</td> | </td> | ||
<td valign="top" align="right">17:25</td> | <td valign="top" align="right">17:25</td> | ||
<td style="background-color: #EEE; text-align: center"> | <td style="background-color: #EEE; text-align: center"> | ||
<b>Serverless Authentication with JWT</b><br /> | <b>Serverless Authentication with JWT</b><br /> | ||
− | + | <i>Mehul Patel - Zimbra</i><br /> | |
+ | [https://slides.com/rowdymehul/owaspnz2019 Slides (Slides.com)] | | ||
+ | [https://youtu.be/TSGLddT_eG4 Video (YouTube)] | ||
</td> | </td> | ||
</tr> | </tr> | ||
Line 473: | Line 523: | ||
<td colspan="3" style="background-color: #B9C2DC; text-align: center"> | <td colspan="3" style="background-color: #B9C2DC; text-align: center"> | ||
<b>Wrap Up</b><br /> | <b>Wrap Up</b><br /> | ||
− | <i>Time to go out and socialise, for those interested</i> | + | <i>Time to go out and socialise, for those interested</i><br /> |
+ | [[Media:20190222--DiLeo-Closing_Session.pdf|Slides (PDF, 6.0 MB)]] | ||
</td> | </td> | ||
</tr> | </tr> | ||
Line 488: | Line 539: | ||
---- | ---- | ||
=== David Waters and Kieran Molloy - Pushpay === | === David Waters and Kieran Molloy - Pushpay === | ||
+ | |||
+ | ==== Slide Deck (<i>not yet available</i>) ==== | ||
+ | |||
+ | ==== [https://youtu.be/8TE_peh5Aas Presentation Video (YouTube)] ==== | ||
====Abstract==== | ====Abstract==== | ||
Line 497: | Line 552: | ||
David is a Senior Software Engineer/Tech Lead and one of the leaders of the Secure Coding Guild at Pushpay, David previously worked for 3 years in the security industry including 1 year in the Security Team at Google in London and draws on 20 years experience as a systems and web developer, primarily working in .NET, Java and JavaScript. | David is a Senior Software Engineer/Tech Lead and one of the leaders of the Secure Coding Guild at Pushpay, David previously worked for 3 years in the security industry including 1 year in the Security Team at Google in London and draws on 20 years experience as a systems and web developer, primarily working in .NET, Java and JavaScript. | ||
− | Kieran is a developer with an interest in security. | + | Kieran is a developer with an interest in security. |
=== Threat Modelling When You've Never Done It Before === | === Threat Modelling When You've Never Done It Before === | ||
---- | ---- | ||
=== Kade Morton - Quantum Security === | === Kade Morton - Quantum Security === | ||
+ | |||
+ | ==== [[Media:20190222--Morton-Threat Modelling-Complete.pdf|Slide Deck (PDF, 6.7 MB)]] ==== | ||
+ | |||
+ | ==== [https://youtu.be/YeeIf63Thwc Presentation Video (YouTube)] ==== | ||
====Abstract==== | ====Abstract==== | ||
Line 514: | Line 573: | ||
---- | ---- | ||
=== Peter Jakowetz - Quantum Security === | === Peter Jakowetz - Quantum Security === | ||
+ | |||
+ | ==== Slide Deck (<i>not yet available</i>) ==== | ||
+ | |||
+ | ==== [https://youtu.be/NOed0M0Ec-c Presentation Video (YouTube)] ==== | ||
====Abstract==== | ====Abstract==== | ||
Line 526: | Line 589: | ||
---- | ---- | ||
=== Mike Clarke - Erudite Software === | === Mike Clarke - Erudite Software === | ||
+ | |||
+ | ==== [[Media:20190222--Clarke-Mob_Learning.pdf|Slide Deck (PDF, 1.2 MB)]] ==== | ||
+ | |||
+ | ==== [https://youtu.be/5YIdlFdKV00 Presentation Video (YouTube)] ==== | ||
====Abstract==== | ====Abstract==== | ||
Line 540: | Line 607: | ||
---- | ---- | ||
=== Mohamed Hassan - Aura Information Security === | === Mohamed Hassan - Aura Information Security === | ||
+ | |||
+ | ==== Slide Deck (<i>not yet available</i>) ==== | ||
+ | |||
+ | ==== [https://youtu.be/AEBnmyzDSEo Presentation Video (YouTube)] ==== | ||
====Abstract==== | ====Abstract==== | ||
Line 554: | Line 625: | ||
---- | ---- | ||
=== Kirk Jackson - RedShield === | === Kirk Jackson - RedShield === | ||
+ | |||
+ | ==== [[Media:2019-02-22 - Virtual Patching Does it work - Print.pdf|Slide Deck (PDF, 2.1 MB)]] ==== | ||
+ | |||
+ | ==== [https://youtu.be/6LqKLILNrko Presentation Video (YouTube)] ==== | ||
====Abstract==== | ====Abstract==== | ||
Line 570: | Line 645: | ||
---- | ---- | ||
=== Mike Haworth - Insomnia Security === | === Mike Haworth - Insomnia Security === | ||
+ | |||
+ | ==== Slide Deck (<i>not yet available</i>) ==== | ||
+ | |||
+ | ==== [https://youtu.be/UqMUNFvnp_E Presentation Video (YouTube)] ==== | ||
====Abstract==== | ====Abstract==== | ||
Line 582: | Line 661: | ||
---- | ---- | ||
=== Louis Nyffenegger - Pentester Lab === | === Louis Nyffenegger - Pentester Lab === | ||
+ | |||
+ | ==== [[Media:20190222--Nyffenegger-JWAT.pdf|Slide Deck (3.5 MB)]] ==== | ||
+ | |||
+ | ==== [https://youtu.be/aYz8yPymyvk Presentation Video (YouTube)] ==== | ||
====Abstract==== | ====Abstract==== | ||
Line 591: | Line 674: | ||
Louis is a security engineer based in Melbourne, Australia. He performs pentest, architecture and code review. Louis is the founder of PentesterLab, a learning platform for Web penetration testing. Recently, Louis talked at OWASP AppSecDay Melbourne, and ran two workshops at DEF CON 26, in 2018. | Louis is a security engineer based in Melbourne, Australia. He performs pentest, architecture and code review. Louis is the founder of PentesterLab, a learning platform for Web penetration testing. Recently, Louis talked at OWASP AppSecDay Melbourne, and ran two workshops at DEF CON 26, in 2018. | ||
− | === | + | === CTF: The Gateway Drug === |
---- | ---- | ||
− | === | + | === Toni James - Orion Health === |
+ | |||
+ | ==== Slide Deck (<i>not yet available</i>) ==== | ||
+ | |||
+ | ==== [https://youtu.be/B1CPimcoE7c Presentation Video (YouTube)] ==== | ||
====Abstract==== | ====Abstract==== | ||
− | + | I can't stop thinking about it, I can't wait for the next one, it keeps me up late at night, and I always want more. Flags that is! A how-to and where-to-start with Capture the Flag competitions, accompanied by a casual discourse about imposter syndrome, sexism in tech, and pondering the harsh realities of vim (not really, I never use vim, I'd never be able to get out of it). Followed by a live walkthrough of my favourite CTF challenges, the ones I think would entice other devs and wanna-be hackers to give it a try. "The first one's free." | |
====Speaker Biography==== | ====Speaker Biography==== | ||
− | + | Toni is a snowboarder turned software engineer, with an addiction to security. She's won a few scholarships in her quest to get more women into tech and she's really good at supporting others to do 'all the things'. A firm believer in ‘you need to see it to be it,’ she puts herself out there to enable others to step up and challenge the status quo. She/Her. [https://twitter.com/_tonijames @_tonijames] | |
==Track One - Afternoon 1 (13:30 - 15:30) == | ==Track One - Afternoon 1 (13:30 - 15:30) == | ||
Line 608: | Line 695: | ||
---- | ---- | ||
=== Antonio Radich - Quantum Security === | === Antonio Radich - Quantum Security === | ||
+ | |||
+ | ==== [[Media:20190222--Radich-NoHolidayChurchGenius.pdf|Slide Deck (PDF, 1.4 MB)]] ==== | ||
+ | |||
+ | ==== [https://www.youtube.com/watch?v=5AaOU5bC2fU Presentation Video (YouTube)] ==== | ||
====Abstract==== | ====Abstract==== | ||
Line 620: | Line 711: | ||
---- | ---- | ||
=== Petra Smith - Aura Information Security === | === Petra Smith - Aura Information Security === | ||
+ | |||
+ | ==== Slide Deck (<i>not yet available</i>) ==== | ||
+ | |||
+ | ==== [https://youtu.be/DKRlnea2o00 Presentation Video (YouTube)] ==== | ||
====Abstract==== | ====Abstract==== | ||
Line 632: | Line 727: | ||
---- | ---- | ||
=== Stephen Morgan - Westpac New Zealand === | === Stephen Morgan - Westpac New Zealand === | ||
+ | |||
+ | ==== Slide Deck (<i>not yet available</i>) ==== | ||
+ | |||
+ | ==== [https://youtu.be/rfK5bSvmdmw Presentation Video (YouTube)] ==== | ||
====Abstract==== | ====Abstract==== | ||
Line 644: | Line 743: | ||
---- | ---- | ||
=== Judy Ting-Edwards - Ports of Auckland === | === Judy Ting-Edwards - Ports of Auckland === | ||
+ | |||
+ | ==== [[Media:20190222--Ting-Edwards-Whats_in_a_Name.pdf|Slide Deck (PDF, 4.6 MB)]] ==== | ||
+ | |||
+ | ==== <i>Presentation Video not available, at presenter's request</i> ==== | ||
====Abstract==== | ====Abstract==== | ||
− | Have you ever hired Web developers to make a Web site for you but then find out that you don’t actually own the domain name when you checked on | + | Have you ever hired Web developers to make a Web site for you, but then find out that you don’t actually own the domain name when you checked on Whois? Find out why this is the case and how we (maybe) should be doing domain name registrations, by taking a leaf from the law of agency’s book. |
====Speaker Biography==== | ====Speaker Biography==== | ||
Line 655: | Line 758: | ||
==Track Two - Afternoon 1 (13:30 - 15:30)== | ==Track Two - Afternoon 1 (13:30 - 15:30)== | ||
− | === | + | === Security Regression Testing on OWASP ZAP Node API === |
---- | ---- | ||
− | === | + | === Kim Carter - BinaryMist === |
+ | |||
+ | ==== Slide Deck (<i>not yet available</i>) ==== | ||
+ | |||
+ | ==== <i>Presentation Video not available, at presenter's request</i> ==== | ||
====Abstract==== | ====Abstract==== | ||
− | + | The OWASP ZAP HTTP intercepting proxy is useful for manually attacking your Web apps and APIs. Now, we have the official Node API to programatically drive ZAP to regression test our creations. I’ll show you how to build a fully featured security regression testing CLI, consumable by your CI/nightly builds. | |
====Speaker Biography==== | ====Speaker Biography==== | ||
− | + | Kim is a Technologist / Engineer, Information Security Professional, Entrepreneur, and the founder of BinaryMist Ltd. He is one of the OWASP NZ Chapter leaders and a Certified Scrum Master. Facilitator, mentor and motivator of cross functional, self managing teams. With a solid 17 years of commercial industry experience across many domains, Kim enjoys teaching others how to apply information security to their Agile processes, bringing the security focus up front where it’s the cheapest to implement, increasing profit and reducing costs. Co-organiser of the Christchurch Hacker Con, International trainer, speaker, published author, and Software Engineering Radio podcast host, focusing on software and network architecture, Web development and engineering, and information security. Kim is also a regular blog poster. Kim loves designing and creating robust software and networks, breaking software and networks, then fixing them and helping organisations increase productivity. | |
=== CI Can Make $$$ from Thin Air === | === CI Can Make $$$ from Thin Air === | ||
---- | ---- | ||
=== Sajeeb Lohani - Privasec === | === Sajeeb Lohani - Privasec === | ||
+ | |||
+ | ==== Slide Deck (<i>not yet available</i>) ==== | ||
+ | |||
+ | ==== <i>Presentation Video not available, at presenter's request</i> ==== | ||
====Abstract==== | ====Abstract==== | ||
Line 682: | Line 793: | ||
---- | ---- | ||
=== Nawaz Gayoom - Provoke Solutions === | === Nawaz Gayoom - Provoke Solutions === | ||
+ | |||
+ | ==== [[Media:20190222--Gayoom-Secure_Electron_Apps.pdf|Slide Deck (PDF, 587 kB)]] ==== | ||
+ | |||
+ | ==== [https://youtu.be/6GNTbvNs0tc Presentation Video (YouTube)] ==== | ||
====Abstract==== | ====Abstract==== | ||
Line 696: | Line 811: | ||
---- | ---- | ||
=== Kirk Jackson - RedShield === | === Kirk Jackson - RedShield === | ||
+ | |||
+ | ==== [[Media:2019-02-22 - How do I Content Security Policy - Print.pdf|Slide Deck (PDF, 1.6 MB)]] ==== | ||
+ | |||
+ | ==== [https://youtu.be/tlCOd-zjdQM Presentation Video (YouTube)] ==== | ||
====Abstract==== | ====Abstract==== | ||
Line 712: | Line 831: | ||
---- | ---- | ||
=== John DiLeo - Orion Health === | === John DiLeo - Orion Health === | ||
+ | |||
+ | ==== [[Media:20190222--DiLeo-OWASP_SAMM_2.pdf|Slide Deck (PDF, 7.1 MB)]] ==== | ||
+ | |||
+ | ==== [https://youtu.be/o-zoers_ckA Presentation Video (YouTube)] ==== | ||
====Abstract==== | ====Abstract==== | ||
Line 726: | Line 849: | ||
---- | ---- | ||
=== Jaap Karan Singh - Secure Code Warrior === | === Jaap Karan Singh - Secure Code Warrior === | ||
+ | |||
+ | ==== Slide Deck (<i>not yet available</i>) ==== | ||
+ | |||
+ | ==== [https://youtu.be/kHYdM690hFM Presentation Video (YouTube)] ==== | ||
====Abstract==== | ====Abstract==== | ||
Line 740: | Line 867: | ||
---- | ---- | ||
=== Kim Carter - BinaryMist === | === Kim Carter - BinaryMist === | ||
+ | |||
+ | ==== Slide Deck (<i>not yet available</i>) ==== | ||
+ | |||
+ | ==== <i>Presentation Video not available, at presenter's request</i> ==== | ||
====Abstract==== | ====Abstract==== | ||
Line 752: | Line 883: | ||
---- | ---- | ||
=== Karan Sharma === | === Karan Sharma === | ||
+ | |||
+ | ==== Slide Deck (<i>not yet available</i>) ==== | ||
+ | |||
+ | ==== [https://youtu.be/N6ffxIcz0L4 Presentation Video (YouTube)] ==== | ||
====Abstract==== | ====Abstract==== | ||
Line 764: | Line 899: | ||
---- | ---- | ||
=== Mehul Patel === | === Mehul Patel === | ||
+ | |||
+ | ==== [https://slides.com/rowdymehul/owaspnz2019 Slide Deck (Slides.com)] ==== | ||
+ | |||
+ | ==== [https://youtu.be/TSGLddT_eG4 Presentation Video (YouTube)] ==== | ||
====Abstract==== | ====Abstract==== | ||
Line 771: | Line 910: | ||
====Speaker Biography==== | ====Speaker Biography==== | ||
− | + | Mehul is an engineer who loves digging into technology, and public speaker currently living in India. His interests range from technology to innovation. He is also interested in Web development, writing, and safe programming. | |
− | |||
− | |||
− | + | Mehul holds a Masters in Computers Science and has been working and contributing towards the open source community in all ways he can. He is a social guy, loves to interacting with new people, traveling, playing cricket, He can dance like crazy!!! | |
+ | Currently, Mehul is an Engineer at Zimbra, Ambassador at Auth0, Mentor at Mozilla Reps and Campus Advisory Committee at Mozilla and Founder/Organizer of Google Developer Group - Nashik. Moreover, He is the initiator of Rust Hacks - the super safe system programming language of course and co-founder of Infinite Defense Foundation (IDF). | ||
=Call for Sponsorships= | =Call for Sponsorships= | ||
Line 894: | Line 1,032: | ||
| style="text-align: center; font-weight: bold;" | Yes | | style="text-align: center; font-weight: bold;" | Yes | ||
| style="text-align: center; font-weight: bold;" | Yes | | style="text-align: center; font-weight: bold;" | Yes | ||
− | | style="text-align: center; font-weight: bold; | Yes | + | | style="text-align: center; font-weight: bold; " | Yes |
| style="text-align: center;" | Yes | | style="text-align: center;" | Yes | ||
| style="text-align: center; font-weight: bold; font-style: italic;" | Varies | | style="text-align: center; font-weight: bold; font-style: italic;" | Varies |