This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "OWASP New Zealand Day 2019"

From OWASP
Jump to: navigation, search
(Added Mike Clarke's slides, and YouTube links for Track 2 video (added opt-out notices for non-published videos))
(Updated slide and video links for Radich presentation)
 
(13 intermediate revisions by the same user not shown)
Line 7: Line 7:
  
 
=Introduction=
 
=Introduction=
 
<center>
 
<span style="font-size: x-large;">
 
<p><strong>UPDATE #6 (15 February) - Registration for training classes is now CLOSED.</strong></p>
 
<p><strong>UPDATE #5 (23 January) - The presentation schedule, talk abstracts, and speaker bios have been posted.</strong> Check the "Presentation Schedule" and "Abstracts and Bios" tabs below.</p>
 
<p><strong>UPDATE #4 (12 January) - The Call for Presentations is now closed.</strong> Those submitting proposals will be notified shortly whether their talks have been accepted.</p>
 
<p><strong>UPDATE #3 (7 January) - Registration for Training Classes Now Open!</strong> Visit [https://owaspnz2019-training.eventbrite.com EventBrite] to reserve your spot!</p>
 
<p><strong>UPDATE #2 (22 December) - Registration Now Open!</strong> Visit [https://owaspnz2019.eventbrite.com EventBrite] to register now!</p>
 
<p><strong>IMPORTANT UPDATE (21 December) - Call for Presentations Extended:</strong> The Call for Presentations has been extended, and will now close on Friday, 11 January, 2019.</p>
 
</span>
 
</center>
 
  
 
==Introduction==
 
==Introduction==
Line 309: Line 298:
 
Morning and afternoon tea breaks will be provided; lunch will be on your own.
 
Morning and afternoon tea breaks will be provided; lunch will be on your own.
  
=Presentation Schedule - 22 Feb=
+
=Conference - 22 Feb=
  
  
Line 345: Line 334:
 
<td style="background-color: #EEE; text-align: center">
 
<td style="background-color: #EEE; text-align: center">
 
<b>Exploiting Vulnerabilities from the OWASP Top 10: SQLi, XSS, XXE, File Injection</b><br />
 
<b>Exploiting Vulnerabilities from the OWASP Top 10: SQLi, XSS, XXE, File Injection</b><br />
<i>David Waters and Kieran Molloy - Pushpay</i>
+
<i>David Waters and Kieran Molloy - Pushpay</i><br />
 +
[[Media:20190222--Waters Molloy-Exploiting Vulnerabilities.pdf|Slides (PDF, 789 kB)]] |
 +
[https://youtu.be/8TE_peh5Aas Video (YouTube)]
 
</td>
 
</td>
 
<td valign="top" align="right">09:20</td>
 
<td valign="top" align="right">09:20</td>
Line 352: Line 343:
 
<i>Kirk Jackson - RedShield</i><br />
 
<i>Kirk Jackson - RedShield</i><br />
 
[[Media:2019-02-22 - Virtual Patching Does it work - Print.pdf|Slides (PDF, 2.1 MB)]] |  
 
[[Media:2019-02-22 - Virtual Patching Does it work - Print.pdf|Slides (PDF, 2.1 MB)]] |  
[https://www.youtube.com/watch?v=6LqKLILNrko&authuser=0 Video (YouTube)]
+
[https://youtu.be/6LqKLILNrko Video (YouTube)]
 
</td>
 
</td>
 
</tr>
 
</tr>
Line 360: Line 351:
 
<b>Threat Modelling When You've Never Done It Before</b><br />
 
<b>Threat Modelling When You've Never Done It Before</b><br />
 
<i>Kade Morton - Quantum Security</i><br />
 
<i>Kade Morton - Quantum Security</i><br />
Slides (PDF) -
+
[[Media:20190222--Morton-Threat Modelling-Complete.pdf|Slides (PDF, 5.7 MB)]] |
[[Media:20190222--Morton-Threat Modelling-Part1.pdf|Part 1 (7.3 MB)]],
+
[https://youtu.be/YeeIf63Thwc Video (YouTube)]
[[Media:20190222--Morton-Threat Modelling-Part2.pdf|Part 2 (6.1 MB)]],
 
[[Media:20190222--Morton-Threat Modelling-Part3.pdf|Part 3 (7.5 MB)]],
 
[[Media:20190222--Morton-Threat Modelling-Part4.pdf|Part 4 (1.3 MB)]]
 
 
</td>
 
</td>
 
<td valign="top" align="right">10:10</td>
 
<td valign="top" align="right">10:10</td>
Line 370: Line 358:
 
<b>Cloud Catastrophes and How to Avoid Them</b><br />
 
<b>Cloud Catastrophes and How to Avoid Them</b><br />
 
<i>Michael Haworth - Insomnia Security</i><br />
 
<i>Michael Haworth - Insomnia Security</i><br />
[https://www.youtube.com/watch?v=UqMUNFvnp_E&authuser=0 Video (YouTube)]
+
[[Media:20190222--Haworth-Cloud_Catastrophes.pdf|Slides (PDF, 666 kB)]] |
 +
[https://youtu.be/UqMUNFvnp_E Video (YouTube)]
 
</td>
 
</td>
  
Line 378: Line 367:
 
<td style="background-color: #EEE; text-align: center">
 
<td style="background-color: #EEE; text-align: center">
 
<b>That Vulnerability Looks Quite Risky</b><br />
 
<b>That Vulnerability Looks Quite Risky</b><br />
<i>Peter Jakowetz - Quantum Security</i>
+
<i>Peter Jakowetz - Quantum Security</i><br />
 +
[[Media:20190222--Jakowetz-Vulnerability Looks Quite Risky.pdf|Slides (PDF, 1.0 MB)]] |
 +
[https://youtu.be/NOed0M0Ec-c Video (YouTube)]
 
</td>
 
</td>
 
<td rowspan="2" valign="top" align="right">10:45</td>
 
<td rowspan="2" valign="top" align="right">10:45</td>
Line 384: Line 375:
 
<b>JWAT: Attacking JSON Web Tokens</b><br />
 
<b>JWAT: Attacking JSON Web Tokens</b><br />
 
<i>Louis Nyffenegger - Pentester Lab</i><br />
 
<i>Louis Nyffenegger - Pentester Lab</i><br />
[https://www.youtube.com/watch?v=aYz8yPymyvk&authuser=0 Video (YouTube)]
+
[[Media:20190222--Nyffenegger-JWAT.pdf|Slides (PDF, 3.5 MB)]] |
 +
[https://youtu.be/aYz8yPymyvk Video (YouTube)]
 
</td>
 
</td>
 
</tr>
 
</tr>
Line 392: Line 384:
 
<b>Mob Learning Using the OWASP Top 10 and 30 Days of Security Testing</b><br />
 
<b>Mob Learning Using the OWASP Top 10 and 30 Days of Security Testing</b><br />
 
<i>Mike Clarke - Erudite Software</i><br />
 
<i>Mike Clarke - Erudite Software</i><br />
[[Media:20190222--Clarke-Mob_Learning.pdf|Slides (1.2 MB)]]
+
[[Media:20190222--Clarke-Mob_Learning.pdf|Slides (PDF, 1.2 MB)]] |
 +
[https://youtu.be/5YIdlFdKV00 Video (YouTube)]
 
</td>
 
</td>
 
</tr>
 
</tr>
Line 399: Line 392:
 
<td style="background-color: #EEE; text-align: center">
 
<td style="background-color: #EEE; text-align: center">
 
<b>How Can OWASP SAMM Help You Build More Secure Software?</b><br />
 
<b>How Can OWASP SAMM Help You Build More Secure Software?</b><br />
<i>Mohamed Hassan - Aura Information Security</i>
+
<i>Mohamed Hassan - Aura Information Security</i><br />
 +
<i>Slides not yet available</i> | [https://youtu.be/AEBnmyzDSEo Video (YouTube)]
 
</td>
 
</td>
 
<td valign="top" align="right">11:40</td>
 
<td valign="top" align="right">11:40</td>
Line 405: Line 399:
 
<b>CTF: The Gateway Drug</b><br />
 
<b>CTF: The Gateway Drug</b><br />
 
<i>Toni James - Orion Health</i><br />
 
<i>Toni James - Orion Health</i><br />
[https://www.youtube.com/watch?v=B1CPimcoE7c&authuser=0 Video (YouTube)]
+
<i>Slides not yet available</i> | [https://youtu.be/B1CPimcoE7c Video (YouTube)]
 
</td>
 
</td>
 
</tr>
 
</tr>
Line 419: Line 413:
 
<b>NoHolidayChurchGenius: Password Security with 2020 Vision</b><br />
 
<b>NoHolidayChurchGenius: Password Security with 2020 Vision</b><br />
 
<i>Antonio Radich - Quantum Security</i><br />
 
<i>Antonio Radich - Quantum Security</i><br />
<i>Video not published, at presenter's request</i>
+
[[Media:20190222--Radich-NoHolidayChurchGenius.pdf|Slides (PDF, 1.4 MB)]] |
 +
[https://www.youtube.com/watch?v=5AaOU5bC2fU Video (YouTube)]
 
</td>
 
</td>
 
<td rowspan="2" valign="top" align="right">13:30</td>
 
<td rowspan="2" valign="top" align="right">13:30</td>
Line 425: Line 420:
 
<b>Security Regression Testing on OWASP ZAP Node API</b><br />
 
<b>Security Regression Testing on OWASP ZAP Node API</b><br />
 
<i>Kim Carter - BinaryMist</i><br />
 
<i>Kim Carter - BinaryMist</i><br />
<i>Video not published, at presenter's request</i>
+
<i>Slides not yet available</i> | <i>Video not published, at presenter's request</i>
 
</td>
 
</td>
 
       </tr>
 
       </tr>
Line 432: Line 427:
 
<td style="background-color: #B9C2DC; text-align: center">
 
<td style="background-color: #B9C2DC; text-align: center">
 
<b>Sharing Is Caring: A Beginner's Guide to Security in the Cloud</b><br />
 
<b>Sharing Is Caring: A Beginner's Guide to Security in the Cloud</b><br />
<i>Petra Smith - Aura Information Security</i>
+
<i>Petra Smith - Aura Information Security</i><br />
 +
[[Media:20190222--Smith-Sharing Is Caring.pdf|Slides (PDF, 2.1 MB)]] |
 +
[https://youtu.be/DKRlnea2o00 Video (YouTube)]
 
</td>
 
</td>
 
</tr>
 
</tr>
Line 439: Line 436:
 
<td style="background-color: #EEE; text-align: center">
 
<td style="background-color: #EEE; text-align: center">
 
<b>Eating the Elephant: Application Security When You Aren't a Startup</b><br />
 
<b>Eating the Elephant: Application Security When You Aren't a Startup</b><br />
<i>Stephen Morgan - Westpac New Zealand</i>
+
<i>Stephen Morgan - Westpac New Zealand</i><br />
 +
[[Media:20190222--Morgan-Eating the Elephant.pdf|Slides (PDF, 2.1 MB)]] |
 +
[https://youtu.be/rfK5bSvmdmw Video (YouTube)]
 
</td>
 
</td>
 
<td valign="top" align="right">14:25</td>
 
<td valign="top" align="right">14:25</td>
Line 445: Line 444:
 
<b>CI Can Make $$$ from Thin Air</b><br />
 
<b>CI Can Make $$$ from Thin Air</b><br />
 
<i>Sajeeb Lohani - Privasec</i><br />
 
<i>Sajeeb Lohani - Privasec</i><br />
<i>Video not published, at presenter's request</i>
+
<i>Slides and Video not published, at presenter's request</i>
 
</td>
 
</td>
 
</tr>
 
</tr>
Line 461: Line 460:
 
<i>Nawaz Gayoom - Provoke Solutions</i><br />
 
<i>Nawaz Gayoom - Provoke Solutions</i><br />
 
[[Media:20190222--Gayoom-Secure_Electron_Apps.pdf|Slides (PDF, 587 kB)]] |
 
[[Media:20190222--Gayoom-Secure_Electron_Apps.pdf|Slides (PDF, 587 kB)]] |
[https://www.youtube.com/watch?v=6GNTbvNs0tc&authuser=0 Video (YouTube)]
+
[https://youtu.be/6GNTbvNs0tc Video (YouTube)]
 
</td>
 
</td>
 
</tr>
 
</tr>
Line 475: Line 474:
 
<b>How Do I Content Security Policy?</b><br />
 
<b>How Do I Content Security Policy?</b><br />
 
<i>Kirk Jackson - RedShield</i><br />
 
<i>Kirk Jackson - RedShield</i><br />
[[Media:2019-02-22 - How do I Content Security Policy - Print.pdf|Slides (PDF, 1.6 MB)]]
+
[[Media:2019-02-22 - How do I Content Security Policy - Print.pdf|Slides (PDF, 1.6 MB)]] |
 +
[https://youtu.be/tlCOd-zjdQM Video (YouTube)]
 
</td>
 
</td>
 
<td valign="top" align="right">16:00</td>
 
<td valign="top" align="right">16:00</td>
Line 481: Line 481:
 
<b>Hardening Your Docker Infrastructure</b><br />
 
<b>Hardening Your Docker Infrastructure</b><br />
 
<i>Kim Carter - BinaryMist</i><br />
 
<i>Kim Carter - BinaryMist</i><br />
<i>Video not published, at presenter's request</i>
+
<i>Slides not yet available</i> | <i>Video not published, at presenter's request</i>
 
</td>
 
</td>
 
</tr>
 
</tr>
Line 489: Line 489:
 
<b>OWASP Software Assurance Maturity Model (SAMM) 2.0</b><br />
 
<b>OWASP Software Assurance Maturity Model (SAMM) 2.0</b><br />
 
<i>John DiLeo - Orion Health</i><br />
 
<i>John DiLeo - Orion Health</i><br />
[[Media:20190222--DiLeo-OWASP_SAMM_2.pdf|Slides (PDF, 7.1 MB)]]
+
[[Media:20190222--DiLeo-OWASP_SAMM_2.pdf|Slides (PDF, 7.1 MB)]] |
 +
[https://youtu.be/o-zoers_ckA Video (YouTube)]
 
</td>
 
</td>
 
<td valign="top" align="right">16:50</td>
 
<td valign="top" align="right">16:50</td>
Line 495: Line 496:
 
<b>Reverse Engineering Mobile Apps: Why, What, and the Hows</b><br />
 
<b>Reverse Engineering Mobile Apps: Why, What, and the Hows</b><br />
 
<i>Karan Sharma</i><br />
 
<i>Karan Sharma</i><br />
[https://www.youtube.com/watch?v=N6ffxIcz0L4&authuser=0 Video (YouTube)]
+
Slides (PDF):
 +
[[Media:20190222--Sharma-Mobile App Reverse Engineering-Part1.pdf|Part 1 (4.8 MB)]],
 +
[[Media:20190222--Sharma-Mobile App Reverse Engineering-Part2.pdf|Part 2 (7.1 MB)]],
 +
[[Media:20190222--Sharma-Mobile App Reverse Engineering-Part3.pdf|Part 3 (6.2 MB)]] |
 +
[https://youtu.be/N6ffxIcz0L4 Video (YouTube)]
 
</td>
 
</td>
 
</tr>
 
</tr>
Line 502: Line 507:
 
<td style="background-color: #EEE; text-align: center">
 
<td style="background-color: #EEE; text-align: center">
 
<b>Why 'Positive Security' Is the Next Software Security Game Changer, and How to Do It</b><br />
 
<b>Why 'Positive Security' Is the Next Software Security Game Changer, and How to Do It</b><br />
<i>Jaap Karan Singh - Secure Code Warrior</i>
+
<i>Jaap Karan Singh - Secure Code Warrior</i><br />
 +
[[Media:20190222--Singh-Positive Security.pdf|Slides (PDF, 7.1 MB)]] |
 +
[https://youtu.be/kHYdM690hFM Video (YouTube)]
 
</td>
 
</td>
 
<td valign="top" align="right">17:25</td>
 
<td valign="top" align="right">17:25</td>
Line 509: Line 516:
 
<i>Mehul Patel - Zimbra</i><br />
 
<i>Mehul Patel - Zimbra</i><br />
 
[https://slides.com/rowdymehul/owaspnz2019 Slides (Slides.com)] |
 
[https://slides.com/rowdymehul/owaspnz2019 Slides (Slides.com)] |
[https://www.youtube.com/watch?v=TSGLddT_eG4&authuser=0 Video (YouTube)]
+
[https://youtu.be/TSGLddT_eG4 Video (YouTube)]
 
</td>
 
</td>
 
</tr>
 
</tr>
Line 532: Line 539:
 
----
 
----
 
=== David Waters and Kieran Molloy - Pushpay ===
 
=== David Waters and Kieran Molloy - Pushpay ===
 +
 +
==== Slide Deck (<i>not yet available</i>) ====
 +
 +
==== [https://youtu.be/8TE_peh5Aas Presentation Video (YouTube)] ====
  
 
====Abstract====
 
====Abstract====
Line 541: Line 552:
 
David is a Senior Software Engineer/Tech Lead and one of the leaders of the Secure Coding Guild at Pushpay, David previously worked for 3 years in the security industry including 1 year in the Security Team at Google in London and draws on 20 years experience as a systems and web developer, primarily working in .NET, Java and JavaScript.
 
David is a Senior Software Engineer/Tech Lead and one of the leaders of the Secure Coding Guild at Pushpay, David previously worked for 3 years in the security industry including 1 year in the Security Team at Google in London and draws on 20 years experience as a systems and web developer, primarily working in .NET, Java and JavaScript.
  
Kieran is a developer with an interest in security.  
+
Kieran is a developer with an interest in security.
  
 
=== Threat Modelling When You've Never Done It Before ===
 
=== Threat Modelling When You've Never Done It Before ===
 
----
 
----
 
=== Kade Morton - Quantum Security ===
 
=== Kade Morton - Quantum Security ===
 +
 +
==== [[Media:20190222--Morton-Threat Modelling-Complete.pdf|Slide Deck (PDF, 6.7 MB)]] ====
 +
 +
==== [https://youtu.be/YeeIf63Thwc Presentation Video (YouTube)] ====
  
 
====Abstract====
 
====Abstract====
Line 558: Line 573:
 
----
 
----
 
=== Peter Jakowetz - Quantum Security ===
 
=== Peter Jakowetz - Quantum Security ===
 +
 +
==== Slide Deck (<i>not yet available</i>) ====
 +
 +
==== [https://youtu.be/NOed0M0Ec-c Presentation Video (YouTube)] ====
  
 
====Abstract====
 
====Abstract====
Line 570: Line 589:
 
----
 
----
 
=== Mike Clarke - Erudite Software ===
 
=== Mike Clarke - Erudite Software ===
 +
 +
==== [[Media:20190222--Clarke-Mob_Learning.pdf|Slide Deck (PDF, 1.2 MB)]] ====
 +
 +
==== [https://youtu.be/5YIdlFdKV00 Presentation Video (YouTube)] ====
  
 
====Abstract====
 
====Abstract====
Line 584: Line 607:
 
----
 
----
 
=== Mohamed Hassan - Aura Information Security ===
 
=== Mohamed Hassan - Aura Information Security ===
 +
 +
==== Slide Deck (<i>not yet available</i>) ====
 +
 +
==== [https://youtu.be/AEBnmyzDSEo Presentation Video (YouTube)] ====
  
 
====Abstract====
 
====Abstract====
Line 598: Line 625:
 
----
 
----
 
=== Kirk Jackson - RedShield ===
 
=== Kirk Jackson - RedShield ===
 +
 +
==== [[Media:2019-02-22 - Virtual Patching Does it work - Print.pdf|Slide Deck (PDF, 2.1 MB)]] ====
 +
 +
==== [https://youtu.be/6LqKLILNrko Presentation Video (YouTube)] ====
  
 
====Abstract====
 
====Abstract====
Line 614: Line 645:
 
----
 
----
 
=== Mike Haworth - Insomnia Security ===
 
=== Mike Haworth - Insomnia Security ===
 +
 +
==== Slide Deck (<i>not yet available</i>) ====
 +
 +
==== [https://youtu.be/UqMUNFvnp_E Presentation Video (YouTube)] ====
  
 
====Abstract====
 
====Abstract====
Line 626: Line 661:
 
----
 
----
 
=== Louis Nyffenegger - Pentester Lab ===
 
=== Louis Nyffenegger - Pentester Lab ===
 +
 +
==== [[Media:20190222--Nyffenegger-JWAT.pdf|Slide Deck (3.5 MB)]] ====
 +
 +
==== [https://youtu.be/aYz8yPymyvk Presentation Video (YouTube)] ====
  
 
====Abstract====
 
====Abstract====
Line 638: Line 677:
 
----
 
----
 
=== Toni James - Orion Health ===
 
=== Toni James - Orion Health ===
 +
 +
==== Slide Deck (<i>not yet available</i>) ====
 +
 +
==== [https://youtu.be/B1CPimcoE7c Presentation Video (YouTube)] ====
  
 
====Abstract====
 
====Abstract====
Line 652: Line 695:
 
----
 
----
 
=== Antonio Radich - Quantum Security ===
 
=== Antonio Radich - Quantum Security ===
 +
 +
==== [[Media:20190222--Radich-NoHolidayChurchGenius.pdf|Slide Deck (PDF, 1.4 MB)]] ====
 +
 +
==== [https://www.youtube.com/watch?v=5AaOU5bC2fU Presentation Video (YouTube)] ====
  
 
====Abstract====
 
====Abstract====
Line 664: Line 711:
 
----
 
----
 
=== Petra Smith - Aura Information Security ===
 
=== Petra Smith - Aura Information Security ===
 +
 +
==== Slide Deck (<i>not yet available</i>) ====
 +
 +
==== [https://youtu.be/DKRlnea2o00 Presentation Video (YouTube)] ====
  
 
====Abstract====
 
====Abstract====
Line 676: Line 727:
 
----
 
----
 
=== Stephen Morgan - Westpac New Zealand ===
 
=== Stephen Morgan - Westpac New Zealand ===
 +
 +
==== Slide Deck (<i>not yet available</i>) ====
 +
 +
==== [https://youtu.be/rfK5bSvmdmw Presentation Video (YouTube)] ====
  
 
====Abstract====
 
====Abstract====
Line 688: Line 743:
 
----
 
----
 
=== Judy Ting-Edwards - Ports of Auckland ===
 
=== Judy Ting-Edwards - Ports of Auckland ===
 +
 +
==== [[Media:20190222--Ting-Edwards-Whats_in_a_Name.pdf|Slide Deck (PDF, 4.6 MB)]] ====
 +
 +
==== <i>Presentation Video not available, at presenter's request</i> ====
  
 
====Abstract====
 
====Abstract====
Line 702: Line 761:
 
----
 
----
 
=== Kim Carter - BinaryMist ===
 
=== Kim Carter - BinaryMist ===
 +
 +
==== Slide Deck (<i>not yet available</i>) ====
 +
 +
==== <i>Presentation Video not available, at presenter's request</i> ====
  
 
====Abstract====
 
====Abstract====
Line 714: Line 777:
 
----
 
----
 
=== Sajeeb Lohani - Privasec ===
 
=== Sajeeb Lohani - Privasec ===
 +
 +
==== Slide Deck (<i>not yet available</i>) ====
 +
 +
==== <i>Presentation Video not available, at presenter's request</i> ====
  
 
====Abstract====
 
====Abstract====
Line 726: Line 793:
 
----
 
----
 
=== Nawaz Gayoom - Provoke Solutions ===
 
=== Nawaz Gayoom - Provoke Solutions ===
 +
 +
==== [[Media:20190222--Gayoom-Secure_Electron_Apps.pdf|Slide Deck (PDF, 587 kB)]] ====
 +
 +
==== [https://youtu.be/6GNTbvNs0tc Presentation Video (YouTube)] ====
  
 
====Abstract====
 
====Abstract====
Line 740: Line 811:
 
----
 
----
 
=== Kirk Jackson - RedShield ===
 
=== Kirk Jackson - RedShield ===
 +
 +
==== [[Media:2019-02-22 - How do I Content Security Policy - Print.pdf|Slide Deck (PDF, 1.6 MB)]] ====
 +
 +
==== [https://youtu.be/tlCOd-zjdQM Presentation Video (YouTube)] ====
  
 
====Abstract====
 
====Abstract====
Line 756: Line 831:
 
----
 
----
 
=== John DiLeo - Orion Health ===
 
=== John DiLeo - Orion Health ===
 +
 +
==== [[Media:20190222--DiLeo-OWASP_SAMM_2.pdf|Slide Deck (PDF, 7.1 MB)]] ====
 +
 +
==== [https://youtu.be/o-zoers_ckA Presentation Video (YouTube)] ====
  
 
====Abstract====
 
====Abstract====
Line 770: Line 849:
 
----
 
----
 
=== Jaap Karan Singh - Secure Code Warrior ===
 
=== Jaap Karan Singh - Secure Code Warrior ===
 +
 +
==== Slide Deck (<i>not yet available</i>) ====
 +
 +
==== [https://youtu.be/kHYdM690hFM Presentation Video (YouTube)] ====
  
 
====Abstract====
 
====Abstract====
Line 784: Line 867:
 
----
 
----
 
=== Kim Carter - BinaryMist ===
 
=== Kim Carter - BinaryMist ===
 +
 +
==== Slide Deck (<i>not yet available</i>) ====
 +
 +
==== <i>Presentation Video not available, at presenter's request</i> ====
  
 
====Abstract====
 
====Abstract====
Line 796: Line 883:
 
----
 
----
 
=== Karan Sharma ===
 
=== Karan Sharma ===
 +
 +
==== Slide Deck (<i>not yet available</i>) ====
 +
 +
==== [https://youtu.be/N6ffxIcz0L4 Presentation Video (YouTube)] ====
  
 
====Abstract====
 
====Abstract====
Line 808: Line 899:
 
----
 
----
 
=== Mehul Patel ===
 
=== Mehul Patel ===
 +
 +
==== [https://slides.com/rowdymehul/owaspnz2019 Slide Deck (Slides.com)] ====
 +
 +
==== [https://youtu.be/TSGLddT_eG4 Presentation Video (YouTube)] ====
  
 
====Abstract====
 
====Abstract====

Latest revision as of 02:32, 11 March 2019

NZDay_2019_web_banner.jpg

21st and 22nd February 2019 - Auckland


Introduction

We are proud to announce the tenth OWASP New Zealand Day conference, to be held at the University of Auckland on Friday, February 22nd, 2019. OWASP New Zealand Day is a one-day conference dedicated to information security, with an emphasis on secure architecture and development techniques to help Kiwi developers build more secure applications.

There will be two streams throughout the day. The first stream will include introductory talks on application and information security topics, as well as on policy, compliance, and risk management. The second stream will primarily address deeper technical topics.

Who is it for?

  • Web Developers
  • Security Professionals and Enthusiasts
  • Program and Project Managers
  • Business Analysts
  • Requirements Analysts
  • Software Testers

Conference structure

Date: Friday, 22 February 2019

Time: 9:00am - 6:00pm

Cost: FREE

The main conference is on Friday, the 22nd of February, and will have two streams in both the morning and the afternoon:

Stream One:

  • Introductory Topics
  • Program Management, Policy, Compliance, Risk Management

Stream Two:

  • Technical Topics

Training

In addition the main conference on Friday, we are pleased to be offer three training opportunities on Thursday, at the same venue. Course details, including registration, are as follows:

Real-World Penetration Testing

Date: Thursday, 21 February 2019
Time: 8:45 a.m. - 5:30 p.m.
Format: Live online interaction with instructors; interactive Web-based lab exercises
Instructors: Vivek Ramachandran and Nishant Sharma
Instructors' Organisation: Pentester Academy
Registration Fee: $500.00
Training Registration Page (Registration CLOSED)

Are You a Secure Code Warrior?

Date: Thursday, 21 February 2019
Time: 8:45 a.m. - 12:30 p.m.
Instructor: Jaap Karan Singh
Instructor's Organisation: Secure Code Warrior
Registration Fee: $250.00
Training Registration Page (Registration CLOSED)

Threat Modelling: Getting from None to Done

Date: Thursday, 21 February 2019
Time: 8:45 a.m. - 5:30 p.m.
Instructor: Dr. John DiLeo
Instructor's Organisation: OWASP New Zealand Chapter
Registration Fee: $500.00
Training Registration Page (SOLD OUT)

Training registration closed at midnight on 14 February.

General

The tenth OWASP New Zealand Day will be happening thanks to the support provided by the University of Auckland, which will kindly offer the same facilities as those we used in 2018. Entry to the event will, as in the past, be free.

For any comments, feedback or observations, please don't hesitate to contact us.

Registration

Registration is now open. Visit EventBrite to register.

Please join our low volume mailing list to be notified as further schedule information becomes available, and/or follow us on Twitter @owaspnz.

There is no cost for the main conference day. Currently, we are planning to provide morning and afternoon tea; however, this is subject to meeting our sponsorship goals for the event. Spaces are limited, so we do ask that, if at any point you realise you will not be able to attend, you cancel your registration (i.e., "request a refund" in EventBrite) to make room for others.

Important dates

CFP submission deadline: 11th January 2019 - Submissions are now closed
CFT submission deadline: 21st December 2018 - Submissions are now closed
Training Day date: 21st February 2019
Training Registration Deadline: 14th February 2019 - Registration is now closed
Conference Day date: 22nd February 2019
Conference Registration deadline: 22nd February 2019 (Same-day registration is permitted, if space is available)

For those of you booking flights, ensure you can be at the venue by 8:30am. The conference will end by 6:00pm. However, we will have post conference drinks at a local drinking establishment for those interested. We are planning to hold a special event on Thursday evening for speakers, trainers, sponsors, and conference volunteers - more details on that to follow.

Places to eat & drink on the day

The University published a handy map (in 2018), to help you find places to eat around campus: File:Retail Map City Campus 2018 v2.pdf

Some of the options available:

  • The Deli - Located on Level 1 of the Owen G. Glenn Building - This is closest, but will probably have long lines
  • Mojo Symonds - also on campus
  • Shakey Isles - coffee and food across the road on the corner of Symonds & Alfred St
  • The CBD - walk up and over Albert Park to get to the CBD with many great food options
    • Fort Street has burgers, kebabs, and KFC
    • High Street & Lorne Street have lots of little cafes and restaurants
  • Subway, Starbucks, St. Pierre's Sushi & Pita Pit - walk up Symonds Street
  • Vulture’s Lane is a popular pub with the InfoSec crowd, there are more seats downstairs
  • The Bluestone Room - also a popular pub just across Queen St

Conference Venue

The University of Auckland School of Business
Owen G. Glenn Building (OGGB)
Address: 12 Grafton Road

Stream One: Level 1
Room: 115 (Fisher & Paykel Auditorium)

Stream Two: Level 0
Room: 098

Auckland
New Zealand
Map

073 AUBiz 10Apr08small.jpg OWASPNZDayLectureTheatre.jpg

Conference Sponsors

For more information on our Premier Sponsors, please visit our About Our Sponsors page

Conference Host

AuckUni.png

Platinum Sponsor

 
Logo-Insomnia Security
 

Gold Sponsors

Logo-Orion Health
Logo-Quantum Security
Logo-Secure Code Warrior
Logo-ZX Security
 

Silver Sponsors

Sponsoring Provider - Training Day Tea Breaks

Logo-Aura Information Security

Supporting Sponsors

     Logo-Binary Mist Limited
     Logo-PentesterLab
      Logo-Privasec
     Logo-RedShield

Logo-Zimbra


Follow us on Twitter (@owaspnz)

OWASP New Zealand on Facebook