|
|
| Line 22: |
Line 22: |
| | ''Daniel Cuthbert'' | | ''Daniel Cuthbert'' |
| | |- | | |- |
| − |
| |
| − | | style="width:10%; background:#7B8ABD" | 11:30-12:30 || style="width:30%; background:#BC857A" align="left" | Reverse Engineering .NET
| |
| − | ''Adam Boulton''
| |
| − | | style="width:30%; background:#BCA57A" align="left" | [http://www.owasp.org/index.php/Category:OWASP_JBroFuzz JBroFuzz] 0.1 - 1.1: [https://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference-SPEAKER-Yiannis_Pavlosoglou Building a Java Fuzzer for the Web]
| |
| − | ''[https://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference-SPEAKER-Yiannis_Pavlosoglou Yiannis Pavlosoglou] - Senior Director - [http://www.ouncelabs.com Ounce Labs] ''
| |
| − | | style="width:30%; background:#7B8ABD" align="left" | [http://www.owasp.org/index.php/Category:OWASP_Live_CD_Project OWASP LIVE CD]
| |
| − | ''Joshua Perrymon - CEO [http://www.packetfocus.com Packetfocus]''
| |
| − | |-
| |
| − | | style="width:10%; background:#7B8ABD" | 12:30-13:30 || style="width:30%; background:#BC857A" align="left" | [https://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference-SPEAKER-GunterOllmann Multidisciplinary Bank Attacks]
| |
| − | ''Gunter Ollmann, Director Security Strategy, [http://www.iss.net IBM Internet Security Systems]''
| |
| − | | style="width:30%; background:#BCA57A" align="left" | OWASP CLASP
| |
| − | ''Pravir Chandra''
| |
| − | | style="width:30%; background:#7B8ABD" align="left" | Shootout at the Blackbox Corral
| |
| − | ''Dinis Cruz & Larry Suto''
| |
| − | |-
| |
| − | | style="width:10%; background:#7B8ABD" | 13:30-14:30 || colspan="3" style="width:80%; background:#C2C2C2" align="center" | Collective Intelligence - Jennifer Bayuk-CISO Bear Stearns, Mark Clancy EVP CitiGroup, Jim Routh CISO DTCC, Sunil Seshadri CISO NYSE-Euronet, Warren Axelrod SVP Bank of America, Joe Bernik Royal Bank of Scotland & Philip Venables CIRO, Goldman, Sachs
| |
| − | Moderator: Mahi Dontamsetti
| |
| − | |-
| |
| − | | style="width:10%; background:#7B8ABD" | 14:30-15:30 || style="width:30%; background:#BC857A" align="left" | [https://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference-SPEAKER-Andres_Riancho w3af, a framework to own the web] -
| |
| − | [https://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference-SPEAKER-Andres_Riancho ''Andres Riancho''], [http://www.cybsec.com/ Cybsec]
| |
| − |
| |
| − | | style="width:30%; background:#BCA57A" align="left" | [[AppSecEU08_Trends_in_Web_Hacking_Incidents:_What's_hot_for_2008 | Trends in Web Hacking: What's hot in 2008<br/>Analysis of the Web Hacking Incidents Database (WHID)]]
| |
| − | ''[http://blog.shezaf.com Ofer Shezaf], Breach''
| |
| − | | style="width:30%; background:#7B8ABD" align="left" | Security in Agile Development
| |
| − | ''Dave Wichers, COO [http://www.aspectsecurity.com Aspect Security]''
| |
| − | |-
| |
| − | | style="width:10%; background:#7B8ABD" | 15:30-16:30 || style="width:30%; background:#BC857A" align="left" | [http://www.owasp.org/index.php/ESAPI OWASP Enterprise Security API (ESAPI) Project]
| |
| − | ''Jeff Williams, CEO [http://www.aspectsecurity.com Aspect Security]''
| |
| − | | style="width:30%; background:#BCA57A" align="left" | Next Generation Cross Site Scripting Worms
| |
| − | ''Arshan Dabirsiaghi, Director of Research [http://www.aspectsecurity.com Aspect Security]''
| |
| − | | style="width:30%; background:#7B8ABD" align="left" | "Threading the Needle:
| |
| − | Bypassing web application/service security controls using Encoding, Transcoding, Filter Evasion, and other Canonicalization Attacks."
| |
| − | ''Arian Evans, Director of Operations [http://www.whitehatsec.com WhiteHat Security]''
| |
| − | |-
| |
| − | | style="width:10%; background:#7B8ABD" | 16:30-17:30 || style="width:30%; background:#BC857A" align="left" | Shhhh Don’t Tell Anybody
| |
| − | ''Petko D. Petkov, a.k.a. pdp''
| |
| − | | style="width:30%; background:#BCA57A" align="left" | Secure PHP
| |
| − | ''Hans Zaunere, CEO [http://www.nyphp.com NYCPHP]''
| |
| − | | style="width:30%; background:#7B8ABD" align="left" | Payment Card Data Security and the new Enterprise Java
| |
| − | ''Dr. B. V. Kumar & Mr. Abhay ''
| |
| − | |-
| |
| − | | style="width:10%; background:#7B8ABD" | 17:30-18:30 || style="width:30%; background:#BC857A" align="left" | Notes Security
| |
| − | ''Jian Hui Wang''
| |
| − | | style="width:30%; background:#BCA57A" align="left" | Mastering PCI Section 6.6
| |
| − | ''Taylor McKinley and Jacob West''
| |
| − | | style="width:30%; background:#7B8ABD" align="left" | AppSec Techniques
| |
| − | ''JD Glaser, CEO [http://www.ntobjectives.com/company/management.php NTO Objectives]''
| |
| − | |-
| |
| − | | style="width:10%; background:#7B8ABD" | 18:30 || colspan="3" style="width:80%; background:#C2C2C2" align="center" | '''Web Application Capture the Flag - [http://isis.poly.edu/projects Polytechnic University]'''
| |
| − | |-
| |
| − | | style="width:10%; background:#7B8ABD" | 20:00 || colspan="3" style="width:80%; background:#C2C2C2" align="center" | ''' Speaker/Attendee Reception'''
| |
| − | |-
| |
| − | ! colspan="4" align="center" style="background:#4058A0; color:white" | Day 2 – Sept 25th, 2008
| |
| − | |-
| |
| − | | style="width:10%; background:#7B8ABD" | 8:00-10:00 || colspan="3" style="width:80%; background:#C2C2C2" align="center" | Breakfast @ Tech-Expo
| |
| − | |-
| |
| − | | style="width:10%; background:#7B8ABD" | 0900-10:00 || colspan="3" style="width:80%; background:#C2C2C2" align="center" | '''"We have all the tools, policies, frameworks, documents, community support available what works... what does not?" ' Industry Panel: Arian J. Evans, Jeremiah Grossman, Gunter Ollmann, Ofer Shezaf, Moderator: Daniel Cuthbert''
| |
| − | |-
| |
| − | | style="width:10%; background:#7B8ABD" | 10:00-11:00 || style="width:30%; background:#BC857A" align="left" | Practical Advanced Threat Modeling
| |
| − | ''John Steven''
| |
| − | | style="width:30%; background:#BCA57A" align="left" | [http://reversebenchmarking.com Open Reverse Benchmarking Project]
| |
| − | ''Marce Luck & Tom Stracener''
| |
| − | | style="width:30%; background:#7B8ABD" align="left" | Building Usable Security
| |
| − | ''Zed Abbadi''
| |
| − | |-
| |
| − | | style="width:10%; background:#7B8ABD" | 11:00-12:00 || style="width:30%; background:#BC857A" align="left" | Offshoring Application Development? Security is Still Your Problem
| |
| − | ''Rohyt Belani''
| |
| − | | style="width:30%; background:#BCA57A" align="left" | OWASP Orizon Project
| |
| − | ''Paolo Perego''
| |
| − | | style="width:30%; background:#7B8ABD" align="left" | NIST SAMATE Static Analysis Tool Exposition (SATE)
| |
| − | ''Vadim Okun''
| |
| − | |-
| |
| − | | style="width:10%; background:#7B8ABD" | 12:00-13:00 || style="width:30%; background:#BC857A" align="left" | The Art and Nature of Web Application Security
| |
| − | ''Mano Paul CEO [http://www.expresscertifications.com Express Certifications]''
| |
| − | | style="width:30%; background:#BCA57A" align="left" | Software Liability
| |
| − | ''Jack Danahy''
| |
| − | | style="width:30%; background:#7B8ABD" align="left" | Cross-Site Scripting Filter Evasion
| |
| − | ''Alexios Fakos''
| |
| − | |-
| |
| − | | style="width:10%; background:#7B8ABD" | 13:00-14:00 || colspan="3" style="width:80%; background:#C2C2C2" align="center" | OWASP Projects "Dinis Cruz & OWASP Project Leaders"
| |
| − | |-
| |
| − | | style="width:10%; background:#7B8ABD" | 14:00-15:00 || style="width:30%; background:#BC857A" align="left" | Projects with OWASP
| |
| − | ''Steve Malson''
| |
| − | | style="width:30%; background:#BCA57A" align="left" | OWASP Pantera Advances
| |
| − | ''Simon Roses Femerling''
| |
| − | | style="width:30%; background:#7B8ABD" align="left" | Software-as-a-Service (SaaS)
| |
| − | ''James Landis''
| |
| − | |-
| |
| − | | style="width:10%; background:#7B8ABD" | 15:00-16:00 || style="width:30%; background:#BC857A" align="left" | "Out of Band" Injection
| |
| − | ''Vijay Akasapu & Marshall Heilman''
| |
| − | | style="width:30%; background:#BCA57A" align="left" | OWASP V2 Testing Guide 4.2.3 Spidering and Googling in depth
| |
| − | ''Christian Heinrich''
| |
| − | | style="width:30%; background:#7B8ABD" align="left" | Caution, Java ahead
| |
| − | ''Jeremiah Grossman CTO [http://www.whitehatsec.com WhiteHat Security]''
| |
| − | |-
| |
| − | | style="width:10%; background:#7B8ABD" | 16:00-17:00 || style="width:30%; background:#BC857A" align="left" | [[Input validation: the Good, the Bad and the Ugly]]
| |
| − | ''[[Johan Peeters]]''
| |
| − | | style="width:30%; background:#BCA57A" align="left" | Flash Parameter Injection (FPI)
| |
| − | ''Ayal Yogev & Yuval Baror''
| |
| − | | style="width:30%; background:#7B8ABD" align="left" | Learning the .Net Debugging API
| |
| − | ''Kevin Spett''
| |
| − | |-
| |
| − | | style="width:10%; background:#7B8ABD" | 17:00-18:00 || style="width:30%; background:#BC857A" align="left" | Secure System Development Life Cycle (SSDLC) Methodology for SOA
| |
| − | ''Ken Huang''
| |
| − | | style="width:30%; background:#BCA57A" align="left" | Web Security Education using Open Source Tools
| |
| − | ''Prof. Li-Chiou Chen & Chienitng Lin''
| |
| − | | style="width:30%; background:#7B8ABD" align="left" | Friend or Foe: Penetration Testing VS Source Code Analysis
| |
| − | ''Tom Ryan''
| |
| − | |-
| |
| − | | style="width:10%; background:#7B8ABD" | 18:30 || colspan="3" style="width:80%; background:#C2C2C2" align="center" | '''Closing Remarks / CTF Awards / Raffles'''
| |
| − | |-
| |
| − | | style="width:10%; background:#7B8ABD" | 21:00 || colspan="3" style="width:80%; background:#C2C2C2" align="center" | '''Farewell dinner.. Go secure the world'''
| |
| | |} | | |} |
Please contact OWASP Delhi chapter board for sponsorship opportunities.