This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Category:OWASP Presentations"
m (Reverted edits by Frank Alexander (talk) to last revision by Nishi) |
Hblankenship (talk | contribs) (→Submitting a Presentation) |
||
(24 intermediate revisions by 7 users not shown) | |||
Line 1: | Line 1: | ||
− | == Welcome to the OWASP Presentations Program | + | <div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div> |
+ | = Welcome to the OWASP Presentations Program = | ||
− | In an effort to promote more in-depth work in application security, the OWASP Presentations program is | + | In an effort to promote more in-depth work in application security, the OWASP Presentations program is always accepting presentation submissions. Presentations submitted to the OWASP Presentations program will be reviewed by a team of senior application security experts. These reviewers will provide constructive feedback on submissions in the hopes of achieving a publishable quality paper. Papers that are approved by the review team will be published on the OWASP website and will be candidates for presentation at the next OWASP AppSec conference. |
== Submitting a Presentation == | == Submitting a Presentation == | ||
− | To submit a presentation, please use the | + | To submit a presentation, please use the templates bellow for presentations. You can create a wiki account and upload it yourself or contact your local chapter leader. For more information [https://owasporg.atlassian.net/servicedesk/customer/portal/7/group/18/create/72 Contact Us] |
+ | |||
+ | == OWASP Presentation Template == | ||
+ | |||
+ | [https://www.owasp.org/images/3/3f/PPT_2015_Toolbox.zip 2015 PPT Template Toolbox] (file size: 4.09 MB, MIME type: application/zip) - optimized for 16:9 screen resolution (HDTV, widescreen)<br /> | ||
+ | [https://www.owasp.org/images/5/5d/PPT_2013_Toolbox.zip 2013 PPT Template Toolbox] (file size: 1.38 MB, MIME type: application/zip) - optimized for 4:3 screen resolution (standard TV)<br /> | ||
+ | [[Media:OWASP_Presentatiion_Template.zip | 2012 OWASP Presentation template]] (file size: 4.28 MB, MIME type: application/zip) - Microsoft PowerPoint, Keynote and Open Office format for 4:3 screen resolution | ||
+ | |||
+ | ===PowerPoint 1=== | ||
+ | {| | ||
+ | |- | ||
+ | ! width="500" align="center" | <br> | ||
+ | ! width="300" align="center" | <br> | ||
+ | |- | ||
+ | | align="center" | | ||
+ | [[File:Owasp ppt 1 page1 image1.jpg|650px]] | ||
+ | [https://www.owasp.org/images/0/06/Owasp_ppt_1.pdf PDF] | ||
+ | | align="center" | | ||
+ | |||
+ | |} | ||
+ | |||
+ | ===PowerPoint 2=== | ||
+ | {| | ||
+ | |- | ||
+ | ! width="500" align="center" | <br> | ||
+ | ! width="300" align="center" | <br> | ||
+ | |- | ||
+ | | align="center" | | ||
+ | [[File:Owasp ppt 2 page1 image1.jpg|650px]] | ||
+ | [https://www.owasp.org/images/0/02/Owasp_ppt_2.pdf PDF] | ||
+ | | align="center" | | ||
+ | |||
+ | |} | ||
+ | |||
+ | |||
+ | ===PowerPoint 3=== | ||
+ | {| | ||
+ | |- | ||
+ | ! width="500" align="center" | <br> | ||
+ | ! width="300" align="center" | <br> | ||
+ | |- | ||
+ | | align="center" | | ||
+ | [[File:Owasp ppt 3 page1 image1.jpg|650px]] | ||
+ | [https://www.owasp.org/images/e/e2/Owasp_ppt_3.pdf PDF] | ||
+ | | align="center" | | ||
+ | |||
+ | |} | ||
= OWASP Education Presentation Guidelines = | = OWASP Education Presentation Guidelines = | ||
Some guidelines: | Some guidelines: | ||
− | * Use the | + | * Use any of the templates from the PPT templates listed above |
* Provide a summary next to the slides | * Provide a summary next to the slides | ||
* Add a descriptive summary and expectations on knowledge | * Add a descriptive summary and expectations on knowledge | ||
Line 20: | Line 67: | ||
* limit your presentation to less than 50 slides - better less than 30 slides (a good presentation will be max. 90 minutes and typical time per slide is 2 minutes). If you need more, split the presentation in parts. | * limit your presentation to less than 50 slides - better less than 30 slides (a good presentation will be max. 90 minutes and typical time per slide is 2 minutes). If you need more, split the presentation in parts. | ||
* Support each slide with notes (the part below the slide in PowerPoint). These notes should provide the presenter with enough material (including references) to prepare the presentation without much extra research. | * Support each slide with notes (the part below the slide in PowerPoint). These notes should provide the presenter with enough material (including references) to prepare the presentation without much extra research. | ||
− | |||
− | |||
− | |||
− | = Papers = | + | = Recent Papers = |
<!-- | <!-- | ||
Line 31: | Line 75: | ||
--> | --> | ||
+ | ;[https://www.owasp.org/images/c/c4/APPSEC2013-Welcome.pptx AppSec 2013 Welcome] | ||
+ | : The slides used for the welcoming at AppSec USA 2013 in NYC. | ||
+ | |||
+ | ;[https://www.owasp.org/images/f/f5/BELNET_Belgium_Presentation_-_Why_hackers_dont_care_about_your_firewall_-_seba.pptx Why Hackers Don't Care About Your Firewall] (Seba Deleersnyer) | ||
+ | : Presentation done at Belnet conference 2011 in Belgium by Seba. While network and ICT infrastructure are important, the current risks have evolved beyond perimeter security. Hackers are attacking the weak spots and going after the easy targets, such as the holes in browsers and vulnerable applications. This presentation will explain the OWASP Top Ten with real life examples; it provides a powerful awareness tool for web application security. The OWASP Top Ten represents a broad consensus about what the most critical web application security flaws are. | ||
+ | |||
+ | |||
+ | =2001 to 2009 Papers= | ||
; [http://www.owasp.org/images/7/74/Advanced_SQL_Injection.ppt Advanced SQL Injection] (Victor Chapela) | ; [http://www.owasp.org/images/7/74/Advanced_SQL_Injection.ppt Advanced SQL Injection] (Victor Chapela) | ||
: Detailed methodology for analyzing applications for SQL injection vulnerabilities. | : Detailed methodology for analyzing applications for SQL injection vulnerabilities. | ||
− | ; [ | + | ;[https://www.owasp.org/images/7/74/Advanced_SQL_Injection.ppt Advanced SQL Injection] (Eric Sheridan) |
− | : | + | : 2006 |
+ | |||
+ | ;[https://www.owasp.org/images/7/7d/Advanced_Topics_on_SQL_Injection_Protection.ppt Advanced Topics on SQL Injection Protection] | ||
+ | : 7 methods to prevent SQL injection attacks correctly and in a more integrated approach. Methods 1 to 3 are applicable during design or development life cycle. Method 4 is mainly from QA’s perspective. Methods 5 and 6 can be applied to production environment and are applicable even if you do not have access to or if you cannot change the source code. Other non-main stream technology are discussed in Method 7. From 2006. | ||
+ | |||
+ | ;[https://www.owasp.org/images/8/89/AppSec2005DC-Alex_Smolen-OWASP_WebServices_Project.ppt OWASP Web Services Project] (Alex Smolen) | ||
+ | : AppSec DC 2005 | ||
+ | |||
+ | ;[https://www.owasp.org/images/d/d1/AppSec2005DC-Alex_Stamos-Attacking_Web_Services.ppt Attacking Web Services] (Alex Stamos) | ||
+ | : AppSec DC 2005 | ||
+ | |||
+ | ;[https://www.owasp.org/images/0/05/AppSec2005DC-Anthony_Canike-Enterprise_AppSec_Program.ppt Enterprise AppSec Program] (Anthony Canike) | ||
+ | : AppSec DC 2005 | ||
+ | |||
+ | ;[https://www.owasp.org/images/c/ca/AppSec2005DC-Dan_Cuthbert-Evolution_of_App_Pen_Testing.ppt Evolution of App Pen Testing] (Dan Cuthbert) | ||
+ | : AppSec DC 2005 | ||
− | + | ;[https://www.owasp.org/images/5/5c/AppSec2005DC-Danny_Allan-Identity_Theft_Phishing_and_Pharming.ppt Identity Theft, Phishing and Pharming] (Danny Allan) | |
+ | : AppSec DC 2005 | ||
− | |||
− | |||
− | |||
− | + | <headertabs / > | |
---- | ---- |
Latest revision as of 04:13, 15 March 2019
Welcome to the OWASP Presentations Program
In an effort to promote more in-depth work in application security, the OWASP Presentations program is always accepting presentation submissions. Presentations submitted to the OWASP Presentations program will be reviewed by a team of senior application security experts. These reviewers will provide constructive feedback on submissions in the hopes of achieving a publishable quality paper. Papers that are approved by the review team will be published on the OWASP website and will be candidates for presentation at the next OWASP AppSec conference.
Submitting a Presentation
To submit a presentation, please use the templates bellow for presentations. You can create a wiki account and upload it yourself or contact your local chapter leader. For more information Contact Us
OWASP Presentation Template
2015 PPT Template Toolbox (file size: 4.09 MB, MIME type: application/zip) - optimized for 16:9 screen resolution (HDTV, widescreen)
2013 PPT Template Toolbox (file size: 1.38 MB, MIME type: application/zip) - optimized for 4:3 screen resolution (standard TV)
2012 OWASP Presentation template (file size: 4.28 MB, MIME type: application/zip) - Microsoft PowerPoint, Keynote and Open Office format for 4:3 screen resolution
PowerPoint 1
|
|
---|---|
PowerPoint 2
|
|
---|---|
PowerPoint 3
|
|
---|---|
OWASP Education Presentation Guidelines
Some guidelines:
- Use any of the templates from the PPT templates listed above
- Provide a summary next to the slides
- Add a descriptive summary and expectations on knowledge
- Only include necessary data
- Slide contents should be self evident
- One slide should cover only one specific topic, avoid overly dense slides
- Max seven words per line, seven lines per slide
- Present information graphically: an image can say more than thousand words
- Don't use all capital letters
- limit your presentation to less than 50 slides - better less than 30 slides (a good presentation will be max. 90 minutes and typical time per slide is 2 minutes). If you need more, split the presentation in parts.
- Support each slide with notes (the part below the slide in PowerPoint). These notes should provide the presenter with enough material (including references) to prepare the presentation without much extra research.
Recent Papers
- AppSec 2013 Welcome
- The slides used for the welcoming at AppSec USA 2013 in NYC.
- Why Hackers Don't Care About Your Firewall (Seba Deleersnyer)
- Presentation done at Belnet conference 2011 in Belgium by Seba. While network and ICT infrastructure are important, the current risks have evolved beyond perimeter security. Hackers are attacking the weak spots and going after the easy targets, such as the holes in browsers and vulnerable applications. This presentation will explain the OWASP Top Ten with real life examples; it provides a powerful awareness tool for web application security. The OWASP Top Ten represents a broad consensus about what the most critical web application security flaws are.
2001 to 2009 Papers
- Advanced SQL Injection (Victor Chapela)
- Detailed methodology for analyzing applications for SQL injection vulnerabilities.
- Advanced SQL Injection (Eric Sheridan)
- 2006
- Advanced Topics on SQL Injection Protection
- 7 methods to prevent SQL injection attacks correctly and in a more integrated approach. Methods 1 to 3 are applicable during design or development life cycle. Method 4 is mainly from QA’s perspective. Methods 5 and 6 can be applied to production environment and are applicable even if you do not have access to or if you cannot change the source code. Other non-main stream technology are discussed in Method 7. From 2006.
- OWASP Web Services Project (Alex Smolen)
- AppSec DC 2005
- Attacking Web Services (Alex Stamos)
- AppSec DC 2005
- Enterprise AppSec Program (Anthony Canike)
- AppSec DC 2005
- Evolution of App Pen Testing (Dan Cuthbert)
- AppSec DC 2005
- Identity Theft, Phishing and Pharming (Danny Allan)
- AppSec DC 2005
<headertabs / >
Pages in category "OWASP Presentations"
The following 3 pages are in this category, out of 3 total.
Media in category "OWASP Presentations"
The following 70 files are in this category, out of 70 total.