This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "OWASP & WASC AppSec 2008 Conference"

From OWASP
Jump to: navigation, search
 
(49 intermediate revisions by the same user not shown)
Line 1: Line 1:
The agenda for the conference is still under development and is subject to change.
+
= OWASP NYC AppSec 2008 Conference October 7th - 10th 2008 =
  
== OWASP AppSec 2008 Training Courses - October 9th and 10th 2008 ==
+
The 2008 event event will be hosted by [http://www.pace.edu/page.cfm?doc_id=16157 PACE UNIVERSITY] at One Pace Plaza
 +
New York, NY 10038 however we are limited to 1000 attendees
 +
<center>TICKETS GO ON SALE Monday JUNE 2nd 2008</center>
 +
<br>
 +
<center><b>[[CFPFAQ | CALL FOR SPEAKERS, TRAINERS and SPONSORS ]]</b>, IS OFFICALLY OPEN!!!! </center>
 +
<hr>
 +
<h1>Tuesday - October 7th</h1>
 +
<table border=1 width=950>
 +
    <tr> <th width=50> Time </th> <th width=300> Code it! </th> <th width=300> Break it!</th> <th width=300> Secure it!</th></tr>
 +
<tr><th>0800</th><th colspan=3>Registration Opens & TechExpo    </th></tr>
 +
<tr><th>0930</th><th colspan=3>  Keynote: OWASP Foundation    </th></tr>
 +
 
 +
<tr><th>1000</th><td>TOPIC<br><i>SPEAKERS</i></td>
 +
<td>TOPICS<br><i>SPEAKERS</i></td>
 +
<td>TOPICS<br><i>SPEAKERS</i></td></tr>
 +
 
 +
<tr><th>1100</th><td>TOPIC<br><I>SPEAKERS</i></td>
 +
<td>TOPIC<br><i>SPEAKERS</i></td>
 +
<td>TOPIC<br><i>SPEAKERS</i></td></tr>
 +
 
 +
<tr><th>1200</th><td>TOPIC<br><i>SPEAKERS</i></td>
 +
<td>TOPIC<br><i>SPEAKERS</i></td>
 +
<td>TOPIC<br><i>SPEAKERS</i></td></tr>
 +
 
 +
<tr><th>1300</th><th colspan=3>TECH-EXPO LUNCH </th></tr>
 +
 
 +
<tr><th>1400</th><td>TOPIC<br><i>SPEAKERS</i></td>
 +
<td>TOPIC<br><i>SPEAKERS</i></td>
 +
<td>TOPIC<br><i>SPEAKERS</i></td></tr>
 +
 
 +
<tr><th>1500</th><td>TOPIC<br><i>SPEAKERS</i></td>
 +
<td>TOPIC<br><i>SPEAKERS</i></td>
 +
<td>TOPIC<br><i>SPEAKERS</i></td></tr>
 +
 
 +
<tr><th>1600</th><td>TOPICS<br><i>SPEAKERS</i></td>
 +
<td>TOPICS<br><i>SPEAKERS</i></td>
 +
<td>TOPICS<br><i>SPEAKER</i></td></tr>
 +
 
 +
<tr><th>1700</th><td>TOPIC<br><i>SPEAKERS</i></td>
 +
<td>TOPIC<br><i>SPEAKERS</i></td>
 +
<td>TOPIC<br><i>SPEAKERS</i></td></tr>
 +
<tr><th>1830</th><th colspan=3>Web Application Capture the Flag  </th></tr>
 +
<tr><th>2100</th><th colspan=3>Tuesday Night Event @ TBD      </th></tr>
 +
</table>
 +
<br>
 +
 
 +
<h1>Wednesday - October 8th</h1>
 +
<table border=1 width=950>
 +
    <tr> <th width=50> Time </th> <th width=300> Code it! </th> <th width=300> Break it!</th> <th width=300> Secure it!</th></tr>
 +
<tr><th>0800</th><th colspan=3>Registration Opens & TechExpo    </th></tr>
 +
<tr><th>0930</th><th colspan=3>  Keynote: Industry Keynote    </th></tr>
 +
 
 +
<tr><th>1000</th><td>TOPIC<br><i>SPEAKERS</i></td>
 +
<td>TOPICS<br><i>SPEAKERS</i></td>
 +
<td>TOPICS<br><i>SPEAKERS</i></td></tr>
 +
 
 +
<tr><th>1100</th><td>TOPIC<br><I>SPEAKERS</i></td>
 +
<td>TOPIC<br><i>SPEAKERS</i></td>
 +
<td>TOPIC<br><i>SPEAKERS</i></td></tr>
 +
 
 +
<tr><th>1200</th><td>TOPIC<br><i>SPEAKERS</i></td>
 +
<td>TOPIC<br><i>SPEAKERS</i></td>
 +
<td>TOPIC<br><i>SPEAKERS</i></td></tr>
 +
 
 +
<tr><th>1300</th><th colspan=3>TECH-EXPO LUNCH</th></tr>
 +
 
 +
<tr><th>1400</th><td>TOPIC<br><i>SPEAKERS</i></td>
 +
<td>TOPIC<br><i>SPEAKERS</i></td>
 +
<td>TOPIC<br><i>SPEAKERS</i></td></tr>
  
{| style="width:80%" border="0" align="center"
+
<tr><th>1500</th><td>TOPIC<br><i>SPEAKERS</i></td>
! align="center" style="background:#4058A0; color:white" | T1. Building and Testing Secure Web Applications
+
<td>TOPIC<br><i>SPEAKERS</i></td>
|-
+
<td>TOPIC<br><i>SPEAKERS</i></td></tr>
| style="background:#F2F2F2" | This powerful two-day course focuses on the most common web application security problems, including the OWASP Top Ten. The course will introduce and demonstrate hacking techniques, illustrating how easily application vulnerabilities can be exploited so students really understand how to avoid introducing such vulnerabilities into their code.
 
|-
 
! align="center" style="background:#4058A0; color:white" | T2. Application Security Forensics
 
|-
 
| style="background:#F2F2F2" | How would you respond to a application security hack? This coure will provide insight into the world or forensics with a focus on Web Application Security'''
 
|-
 
! align="center" style="background:#4058A0; color:white" | T3. tbd
 
|-
 
| style="background:#F2F2F2" | tbd''' [[TBD | Read more here!]]
 
|-
 
! align="center" style="background:#4058A0; color:white" | T4. Web Services and XML Security (to be confirmed)
 
|-
 
| style="background:#F2F2F2" | Many enterprises are currently developing new Web Services and/or adding and acquiring Web Services functionality into existing applications -- now is the time to build security into the system! [[tbd | Read more here!]]
 
|-
 
! align="center" style="background:#4058A0; color:white" | T5. Open Source ModSecurity Training
 
|-
 
| style="background:#F2F2F2" | ModSecurity is currently the most widely deployed web application firewall (WAF) product. This two-day class is for those people who want to learn how to build, deploy, and use ModSecurity in the most effective manner. The course will cover the open source ModSecurity Console, which helps manage alerts on suspicious web activity targeting your web servers. The course also provides an in-depth look at the extremely powerful ModSecurity Rules Language. [[OWASP_AppSec_Europe_2008_-_Belgium/Training#T5._ModSecurity_Boot-Camp_Training_-_2-Day_Course_-_May_20-21.2C_2008 | Read more here!]]
 
|}
 
  
== Technology Expo - May 21st-22nd ==
+
<tr><th>1600</th><td>TOPICS<br><i>SPEAKERS</i></td>
 +
<td>TOPICS<br><i>SPEAKERS</i></td>
 +
<td>TOPICS<br><i>SPEAKER</i></td></tr>
  
Product vendors will demonstrate their application security products to conference attendees for the first time in Europe at this OWASP Conference. The focus of this expo will be on the technical details of the technologies they are offering in the market to help organizations deal with their application security issues.
+
<tr><th>1700</th><td>TOPIC<br><i>SPEAKERS</i></td>
+
<td>TOPIC<br><i>SPEAKERS</i></td>
The technology expo will be held:
+
<td>TOPIC<br><i>SPEAKERS</i></td></tr>
* May 21st: From 12-2, with lunch included for all the OWASP training attendees who will be invited to attend the expo.
+
<tr><th>1830</th><th colspan=3> TBD        </th></tr>
* May 22nd: From 11-6 during the first day of the OWASP conference.
+
<tr><th>2100</th><th colspan=3> TBD      </th></tr>
 +
</table>
  
'''TBD Cocktail Party - May 21'''
+
<hr>
tbd
 
  
== OWASP AppSec 2008 Conference Schedule - May 22-23 (Belgium 2008) ==
 
  
{| style="width:80%" border="0" align="center"
+
== Technology Expo - October 7th - 8th ==
! colspan="3" align="center" style="background:#4058A0; color:white" | Day 1 - May 22, 2008
 
|-
 
| style="width:10%; background:#7B8ABD" | || style="width:40%; background:#BC857A" | Track 1:
 
  | style="width:40%; background:#BCA57A" | Track 2:
 
|-
 
| style="width:10%; background:#7B8ABD" | 08:00-09:00 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Registration and Coffee
 
|-
 
| style="width:10%; background:#7B8ABD" | 09:00-09:10 || colspan="2" style="width:80%; background:#F2F2F2" align="left" | Welcome to OWASP AppSec 2008 Conference: Dave Wichers, OWASP Conferences Chair and COO Aspect Security
 
|-
 
| style="width:10%; background:#7B8ABD" | 09:10-10:00 || colspan="2" style="width:80%; background:#F2F2F2" align="left" | Keynote: tbd – Mark Curphey - Microsoft
 
|-
 
| style="width:10%; background:#7B8ABD" | 10:00-10:30 || colspan="2" style="width:80%; background:#F2F2F2" align="left" | tbd
 
|-
 
| style="width:10%; background:#7B8ABD" | 10:30-11:00 || colspan="2" style="width:80%; background:#F2F2F2" align="left" | tbd
 
|-
 
| style="width:10%; background:#7B8ABD" | 11:00-11:20 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Break
 
|-
 
| style="width:10%; background:#7B8ABD" | 11:20-12:20 || style="width:40%; background:#BC857A" align="left" | tbd
 
| style="width:40%; background:#BCA57A" align="left" | tbd
 
|-
 
| style="width:10%; background:#7B8ABD" | 12:20-13:45 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Lunch
 
|-
 
| style="width:10%; background:#7B8ABD" | 13:45-14:30 || style="width:40%; background:#BC857A" align="left" | tbd
 
| style="width:40%; background:#BCA57A" align="left" | tbd
 
|-
 
| style="width:10%; background:#7B8ABD" | 14:30-15:10 || style="width:40%; background:#BC857A" align="left" | tbd
 
| style="width:40%; background:#BCA57A" align="left" | tbd
 
|-
 
| style="width:10%; background:#7B8ABD" | 15:10-15:30 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Break
 
|-
 
| style="width:10%; background:#7B8ABD" | 15:30-16:40 || style="width:40%; background:#BC857A" align="left" | tbd
 
| style="width:40%; background:#BCA57A" align="left" | tbd
 
|-
 
| style="width:10%; background:#7B8ABD" | 16:40-17:00 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Break
 
|-
 
| style="width:10%; background:#7B8ABD" | 17:00-18:00 || colspan="2" style="width:40%; background:#F2F2F2" align="left" | Panel: “tbd”
 
Moderator:tbd
 
  
Panelists: tbd
+
Want to see the latest offerings from best of breed technology firms? For 2 days, Product/Service vendors worldwide will demonstrate their ability to conference attendees.
  |-
 
| style="width:10%; background:#7B8ABD" | 18:00-19:00 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | OWASP Leader Meeting - Organized by Matteo Meucci (tbd)
 
|-
 
| style="width:10%; background:#7B8ABD" | 19:00-21:00 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | OWASP Social Gathering: Dinner and Drinks at tbd
 
|-
 
! colspan="3" align="center" style="background:#4058A0; color:white" | Day 2 - May 23, 2008
 
|-
 
| style="width:10%; background:#7B8ABD" | || style="width:40%; background:#BC857A" | Track 1:
 
| style="width:40%; background:#BCA57A" | Track 2:
 
|-
 
| style="width:10%; background:#7B8ABD" | 08:00-09:00 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Coffee
 
|-
 
| style="width:10%; background:#7B8ABD" | 09:00-9:50 || colspan="2" style="width:80%; background:#F2F2F2" align="left" | Keynote:  tbd
 
|-
 
| style="width:10%; background:#7B8ABD" | 9:50-10:30 || colspan="2" style="width:80%; background:#F2F2F2" align="left" | tbd
 
|-
 
| style="width:10%; background:#7B8ABD" | 10:30-10:50 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Break
 
|-
 
| style="width:10%; background:#7B8ABD" | 10:50-11:30 || style="width:40%; background:#BC857A" align="left" | tbd
 
| style="width:40%; background:#BCA57A" align="left" | tbd
 
|-
 
| style="width:10%; background:#7B8ABD" | 11:30-12:30 || style="width:40%; background:#BC857A" align="left" | tbd
 
| style="width:40%; background:#BCA57A" align="left" | tbd
 
|-
 
| style="width:10%; background:#7B8ABD" | 12:30-13:45 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Lunch
 
|-
 
| style="width:10%; background:#7B8ABD" | 13:45-14:30 || style="width:40%; background:#BC857A" align="left" | tbd
 
| style="width:40%; background:#BCA57A" align="left" | tbd
 
|-
 
| style="width:10%; background:#7B8ABD" | 14:30-15:20 || style="width:40%; background:#BC857A" align="left" | tbd
 
| style="width:40%; background:#BCA57A" align="left" | tbd
 
|-
 
| style="width:10%; background:#7B8ABD" | 15:20-15:40 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Break
 
|-
 
| style="width:10%; background:#7B8ABD" | 15:40-16:30 || style="width:40%; background:#BC857A" align="left" | tbd
 
| style="width:40%; background:#BCA57A" align="left" | tbd
 
|-
 
| style="width:10%; background:#7B8ABD" | 16:30-17:30 || style="width:40%; background:#F2F2F2" align="left" | Panel: Responsible "tbd"
 
Moderator: tbd
 
  
Panelists: tbd
+
<center><b>[[CFPFAQ | CALL FOR SPEAKERS, TRAINERS and SPONSORS ]]</b>, IS OFFICALLY OPEN!!!! </center>
| style="width:40%; background:#F2F2F2" align="left" | Panel: "tbd"
 
Moderator: tbd
 
  
Panelists: tbd
 
|-
 
| style="width:10%; background:#7B8ABD" | 17:30-17:45 || colspan="2" style="width:40%; background:#F2F2F2" align="left" | Conference Wrap Up - Dave Wichers, OWASP Conferences Chair
 
|-
 
| style="width:10%; background:#7B8ABD" | 18:30-20:30 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Cocktail Party (tbd?)
 
|}
 
  
== Track 3: Refereed Papers Track ==
+
== OWASP AppSec 2008 Training Courses - October 9th and 10th 2008 ==
  
 
{| style="width:80%" border="0" align="center"
 
{| style="width:80%" border="0" align="center"
  ! colspan="3" align="center" style="background:#4058A0; color:white" | Day 1 - May 22, 2008
+
  ! align="center" style="background:#4058A0; color:white" | T1. Building and Testing Secure Web Applications
 
  |-
 
  |-
  | style="width:10%; background:#7B8ABD" | || style="width:80%; background:#BC857A" | Track 3:  Refereed Papers Track
+
  | style="background:#F2F2F2" | This powerful two-day course focuses on the most common web application security problems, including the OWASP Top Ten. The course will introduce and demonstrate hacking techniques, illustrating how easily application vulnerabilities can be exploited so students really understand how to avoid introducing such vulnerabilities into their code.
 
  |-
 
  |-
  | style="width:10%; background:#7B8ABD" | 11:10-11:30 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Break
+
  ! align="center" style="background:#4058A0; color:white" | T2. Application Security Forensics
 
  |-
 
  |-
  | style="width:10%; background:#7B8ABD" | 11:30-12:30 || style="width:80%; background:#BC857A" align="left" | tbd
+
  | style="background:#F2F2F2" | How would you respond to a application security hack? This coure will provide insight into the world or forensics with a focus on Web Application Security'''
 
  |-
 
  |-
  | style="width:10%; background:#7B8ABD" | 12:30-13:45 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Lunch
+
  ! align="center" style="background:#4058A0; color:white" | T3. TBD
 
  |-
 
  |-
  | style="width:10%; background:#7B8ABD" | 13:45-14:30 || style="width:80%; background:#BC857A" align="left" | tbd
+
  | style="background:#F2F2F2" | tbd''' [[TBD | Read more here!]]
|-
 
| style="width:10%; background:#7B8ABD" | 14:30-15:10 || style="width:80%; background:#BC857A" align="left" | tbd
 
|-
 
| style="width:10%; background:#7B8ABD" | 15:10-15:30 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Break
 
|-
 
| style="width:10%; background:#7B8ABD" | 15:30-16:40 || style="width:80%; background:#BC857A" align="left" | tbd
 
|}
 
{| style="width:80%" border="0" align="center"
 
! colspan="3" align="center" style="background:#4058A0; color:white" | Day 2 - May 23, 2008
 
|-
 
| style="width:10%; background:#7B8ABD" | || style="width:80%; background:#BC857A" | Track 3:  Refereed Papers Track
 
 
  |-
 
  |-
  | style="width:10%; background:#7B8ABD" | 11:10-11:30 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Break
+
  ! align="center" style="background:#4058A0; color:white" | T4. TBD
 
  |-
 
  |-
  | style="width:10%; background:#7B8ABD" | 11:30-12:30 || style="width:80%; background:#BC857A" align="left" | tbd
+
  | style="background:#F2F2F2" | tbd''' [[TBD | Read more here!]]
 
  |-
 
  |-
  | style="width:10%; background:#7B8ABD" | 12:30-13:45 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Lunch
+
  ! align="center" style="background:#4058A0; color:white" | T5. TBD
 
  |-
 
  |-
  | style="width:10%; background:#7B8ABD" | 13:45-14:30 || style="width:80%; background:#BC857A" align="left" | tbd
+
  | style="background:#F2F2F2" | TBD
|-
 
| style="width:10%; background:#7B8ABD" | 14:30-15:10 || style="width:80%; background:#BC857A" align="left" | tbd
 
|-
 
| style="width:10%; background:#7B8ABD" | 15:10-15:30 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Break
 
|-
 
| style="width:10%; background:#7B8ABD" | 15:30-16:40 || style="width:80%; background:#BC857A" align="left" | tbd
 
 
|}
 
|}
 +
 +
<center><b>[[CFPFAQ | CALL FOR SPEAKERS, TRAINERS and SPONSORS ]]</b>, IS OFFICALLY OPEN!!!! </center>

Latest revision as of 03:05, 1 February 2008

OWASP NYC AppSec 2008 Conference October 7th - 10th 2008

The 2008 event event will be hosted by PACE UNIVERSITY at One Pace Plaza New York, NY 10038 however we are limited to 1000 attendees

TICKETS GO ON SALE Monday JUNE 2nd 2008


CALL FOR SPEAKERS, TRAINERS and SPONSORS , IS OFFICALLY OPEN!!!!

Tuesday - October 7th

Time Code it! Break it! Secure it!
0800Registration Opens & TechExpo
0930 Keynote: OWASP Foundation
1000TOPIC
SPEAKERS
TOPICS
SPEAKERS
TOPICS
SPEAKERS
1100TOPIC
SPEAKERS
TOPIC
SPEAKERS
TOPIC
SPEAKERS
1200TOPIC
SPEAKERS
TOPIC
SPEAKERS
TOPIC
SPEAKERS
1300TECH-EXPO LUNCH
1400TOPIC
SPEAKERS
TOPIC
SPEAKERS
TOPIC
SPEAKERS
1500TOPIC
SPEAKERS
TOPIC
SPEAKERS
TOPIC
SPEAKERS
1600TOPICS
SPEAKERS
TOPICS
SPEAKERS
TOPICS
SPEAKER
1700TOPIC
SPEAKERS
TOPIC
SPEAKERS
TOPIC
SPEAKERS
1830Web Application Capture the Flag
2100Tuesday Night Event @ TBD


Wednesday - October 8th

Time Code it! Break it! Secure it!
0800Registration Opens & TechExpo
0930 Keynote: Industry Keynote
1000TOPIC
SPEAKERS
TOPICS
SPEAKERS
TOPICS
SPEAKERS
1100TOPIC
SPEAKERS
TOPIC
SPEAKERS
TOPIC
SPEAKERS
1200TOPIC
SPEAKERS
TOPIC
SPEAKERS
TOPIC
SPEAKERS
1300TECH-EXPO LUNCH
1400TOPIC
SPEAKERS
TOPIC
SPEAKERS
TOPIC
SPEAKERS
1500TOPIC
SPEAKERS
TOPIC
SPEAKERS
TOPIC
SPEAKERS
1600TOPICS
SPEAKERS
TOPICS
SPEAKERS
TOPICS
SPEAKER
1700TOPIC
SPEAKERS
TOPIC
SPEAKERS
TOPIC
SPEAKERS
1830 TBD
2100 TBD


Technology Expo - October 7th - 8th

Want to see the latest offerings from best of breed technology firms? For 2 days, Product/Service vendors worldwide will demonstrate their ability to conference attendees.

CALL FOR SPEAKERS, TRAINERS and SPONSORS , IS OFFICALLY OPEN!!!!


OWASP AppSec 2008 Training Courses - October 9th and 10th 2008

T1. Building and Testing Secure Web Applications
This powerful two-day course focuses on the most common web application security problems, including the OWASP Top Ten. The course will introduce and demonstrate hacking techniques, illustrating how easily application vulnerabilities can be exploited so students really understand how to avoid introducing such vulnerabilities into their code.
T2. Application Security Forensics
How would you respond to a application security hack? This coure will provide insight into the world or forensics with a focus on Web Application Security
T3. TBD
tbd Read more here!
T4. TBD
tbd Read more here!
T5. TBD
TBD
CALL FOR SPEAKERS, TRAINERS and SPONSORS , IS OFFICALLY OPEN!!!!