This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "OWASP AU Conference 2009 Agenda"

From OWASP
Jump to: navigation, search
(New page: == OWASP Australia 2009 Conference Schedule - February 26th & 27th 2008 == {| style="width:80%" border="0" align="center" ! colspan="3" align="center" style="background:#4058A0; color:w...)
 
(OWASP Australia 2009 Conference Schedule - February 26th & 27th 2008)
Line 1: Line 1:
 +
The following Agenda is provided currently with approved and accepted Speaking spots. As more information is provided details will be posted online.
  
 
== OWASP Australia 2009 Conference Schedule - February 26th & 27th 2008 ==
 
== OWASP Australia 2009 Conference Schedule - February 26th & 27th 2008 ==
Line 10: Line 11:
 
  | style="width:10%; background:#7B8ABD" | 08:00-09:00 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Registration and Coffee
 
  | style="width:10%; background:#7B8ABD" | 08:00-09:00 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Registration and Coffee
 
  |-
 
  |-
  | style="width:10%; background:#7B8ABD" | 09:00-09:15 || colspan="2" style="width:80%; background:#F2F2F2" align="left" | Welcome to OWASP Australia 2008 Conference - Justin Derry, Australia OWASP Conference Chair and Practice Leader b-sec Consulting
+
  | style="width:10%; background:#7B8ABD" | 09:00-09:15 || colspan="2" style="width:80%; background:#F2F2F2" align="left" | Welcome to OWASP AU 2009
 
  |-
 
  |-
  | style="width:10%; background:#7B8ABD" | 09:15-10:15 || colspan="2" style="width:80%; background:#F2F2F2" align="left" | Keynote: The Microsoft SLD-IT, The process of Building Secure Applications
+
  | style="width:10%; background:#7B8ABD" | 09:15-10:15 || colspan="2" style="width:80%; background:#F2F2F2" align="left" | Keynote: Roger Thorton
Mark Curphey  (European Practice Manager - ACE Team Microsoft)
 
[http://www.owasp.org/download/owasp_confau_2008/OWASPAU08_Session_1_Curphey.mp3 (MP3)]
 
 
 
 
  |-
 
  |-
  | style="width:10%; background:#7B8ABD" | 10:15-10:45 || colspan="2" style="width:80%; background:#F2F2F2" align="left" | An Introduction to OWASP 2008 & Current Projects - Justin Derry, Australia OWASP Conference Chair and Practice Leader b-sec Consulting
+
  | style="width:10%; background:#7B8ABD" | 10:15-10:45 || colspan="2" style="width:80%; background:#F2F2F2" align="left" | Introducing OWASP Projects for 2009
 
  |-
 
  |-
 
  | style="width:10%; background:#7B8ABD" | 10:45-11:15 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Morning Tea/Coffee, Vendor Technology Expo
 
  | style="width:10%; background:#7B8ABD" | 10:45-11:15 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Morning Tea/Coffee, Vendor Technology Expo
 
  |-
 
  |-
  | style="width:10%; background:#7B8ABD" | 11:15-12:30 || style="width:40%; background:#BC857A" align="left" | Secure Software Development (OWASP EDU Project) - Martin Knobloch, Technical Specialist, Sogeti Nederland B.V.
+
  | style="width:10%; background:#7B8ABD" | 11:15-12:30 || style="width:40%; background:#BC857A" align="left" | Speaker TBD
[http://www.owasp.org/download/owasp_confau_2008/OWASPAU08_Session_2_Knobloch.mp3 (MP3)]  [http://www.owasp.org/images/8/8d/OWASPAU08_Session_2_Knobloch.ppt (PPT)]
+
  | style="width:40%; background:#BCA57A" align="left" | Speaker TBD
  | style="width:40%; background:#BCA57A" align="left" | Considerations for application security testing for enterprise projects. - Jean Marie Abighanem, Director Enterprise Risk Services Deloitte Touche Tohmatsu
 
[http://www.owasp.org/download/owasp_confau_2008/OWASPAU08_Session_3_Abighanem.mp3 (MP3)]
 
[http://www.owasp.org/images/9/97/OWASPAU08_Session_3_Abighanem.ppt (PPT)]
 
 
  |-
 
  |-
 
  | style="width:10%; background:#7B8ABD" | 12:30-13:30 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Lunch, Vendor Technology Expo
 
  | style="width:10%; background:#7B8ABD" | 12:30-13:30 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Lunch, Vendor Technology Expo
 
  |-
 
  |-
  | style="width:10%; background:#7B8ABD" | 13:30-14:30 || style="width:40%; background:#BC857A" align="left" | Automated web application scanning versus manual testing, choosing the best tools for the job. - Matthew Hackling, Enterprise Risk Services Deloitte Touche Tohmatsu
+
  | style="width:10%; background:#7B8ABD" | 13:30-14:30 || style="width:40%; background:#BC857A" align="left" | Speaker TBD
[http://www.owasp.org/download/owasp_confau_2008/OWASPAU08_Session_4_Hackling.mp3 (MP3)]
+
  | style="width:40%; background:#BCA57A" align="left" | Speaker TBD
[http://www.owasp.org/images/4/41/OWASPAU08_Session_4_Hackling.ppt (PPT)]
 
  | style="width:40%; background:#BCA57A" align="left" | Business Risk & Compliance for Application Security - Malathi Carthigaser, Principal Consultant Application Security b-sec
 
[http://www.owasp.org/download/owasp_confau_2008/OWASPAU08_Session_5_Carthigaser.mp3 (MP3)]
 
[http://www.owasp.org/images/2/20/OWASPAU08_Session_5_Carthigaser.ppt (PPT)]
 
 
  |-
 
  |-
  | style="width:10%; background:#7B8ABD" | 14:45-15:45 || style="width:40%; background:#BC857A" align="left" | Whitelisting & Securing HTML Input - Peter Freiberg, b-sec Consulting Pty Ltd
+
  | style="width:10%; background:#7B8ABD" | 14:45-15:45 || style="width:40%; background:#BC857A" align="left" | Speaker TBD
[http://www.owasp.org/download/owasp_confau_2008/OWASPAU08_Session_6_Freiberg.mp3 (MP3)]
+
  | style="width:40%; background:#BCA57A" align="left" | Speaker TBD
  | style="width:40%; background:#BCA57A" align="left" | The Next Step in Evolution (Javascript Worms) - Benjamin Mosse, Security Researcher & Analyst Programmer
 
[http://www.owasp.org/download/owasp_confau_2008/OWASPAU08_Session_7_Mosse.mp3 (MP3)]
 
[http://www.owasp.org/images/1/1a/OWASPAU08_Session_7_Mosse.ppt (PPT)]
 
 
  |-
 
  |-
 
  | style="width:10%; background:#7B8ABD" | 15:45-16:15 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Afternoon Tea/Coffee, Vendor Technology Expo
 
  | style="width:10%; background:#7B8ABD" | 15:45-16:15 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Afternoon Tea/Coffee, Vendor Technology Expo
 
  |-
 
  |-
  | style="width:10%; background:#7B8ABD" | 16:15-17:00 || style="width:40%; background:#BC857A" align="left" | Three OWASP Projects for Secure Applications - Michael Eddington, Leviathan Security Group
+
  | style="width:10%; background:#7B8ABD" | 16:15-17:00 || style="width:40%; background:#BC857A" align="left" | Speaker TBD
[http://www.owasp.org/download/owasp_confau_2008/OWASPAU08_Session_8_Eddington.mp3 (MP3)]
+
  | style="width:40%; background:#BCA57A" align="left" | Speaker TBD
[http://www.owasp.org/images/b/b0/OWASPAU08_Session_8_Eddington.ppt (PPT)]
 
  | style="width:40%; background:#BCA57A" align="left" | Hacker Attacks on the Horizon: Understanding the Top Web 2.0 Attack Vectors - Danny Allan, IBM Watchfire
 
[http://www.owasp.org/download/owasp_confau_2008/OWASPAU08_Session_9_Allan.mp3 (MP3)]
 
[http://www.owasp.org/images/f/fb/OWASPAU08_Session_9_Allan.pdf (PDF)]
 
 
  |-
 
  |-
  | style="width:10%; background:#7B8ABD" | 17:15-18:00 || colspan="2" style="width:40%; background:#F2F2F2" align="left" | Panel: “Application Security Threats Commonly faced by Organisations!”
+
  | style="width:10%; background:#7B8ABD" | 17:15-18:00 || colspan="2" style="width:40%; background:#F2F2F2" align="left" | Panel: TBD
Moderator: Oliver Binz, Managing Director, b-sec Consulting Pty Ltd
 
 
 
Panelists: Jean Marie Abighanem (Deloitte Touche Tohmatsu), Brian Chess (Fortify Software), James Manger (Telstra), Mark Curphey (Microsoft), Christian Heinrich
 
[http://www.owasp.org/download/owasp_confau_2008/OWASPAU08_Session_10_Panel.mp3 (MP3)]
 
 
  |-
 
  |-
 
  | style="width:10%; background:#7B8ABD" | 18:30-19:00 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | OWASP Social Gathering: Pre-Dinner Drinks & Cocktails
 
  | style="width:10%; background:#7B8ABD" | 18:30-19:00 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | OWASP Social Gathering: Pre-Dinner Drinks & Cocktails
Line 64: Line 44:
 
|-
 
|-
  
  ! colspan="3" align="center" style="background:#4058A0; color:white" | Day 2 - Friday Feb 29, 2007
+
  ! colspan="3" align="center" style="background:#4058A0; color:white" | Day 2 - Friday Feb 27, 2007
 
  |-
 
  |-
 
  | style="width:10%; background:#7B8ABD" | || style="width:40%; background:#BC857A" | Track 1
 
  | style="width:10%; background:#7B8ABD" | || style="width:40%; background:#BC857A" | Track 1
Line 71: Line 51:
 
  | style="width:10%; background:#7B8ABD" | 08:00-09:00 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Registration and Coffee
 
  | style="width:10%; background:#7B8ABD" | 08:00-09:00 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Registration and Coffee
 
  |-
 
  |-
  | style="width:10%; background:#7B8ABD" | 09:00-9:15 || colspan="2" style="width:80%; background:#F2F2F2" align="left" | Conference Day 2 Open: Justin Derry, Australia OWASP Conference Chair and Practice Leader b-sec Consulting
+
  | style="width:10%; background:#7B8ABD" | 09:00-9:15 || colspan="2" style="width:80%; background:#F2F2F2" align="left" | Conference Day 2 Open
 
  |-
 
  |-
  | style="width:10%; background:#7B8ABD" | 09:15-10:15 || colspan="2" style="width:80%; background:#F2F2F2" align="left" | Keynote2: Static Analysis & Secure Coding for Enterprises - Brian Chess, Fortify Software Ph.D., Founder & Chief Scientist
+
  | style="width:10%; background:#7B8ABD" | 09:15-10:15 || colspan="2" style="width:80%; background:#F2F2F2" align="left" | Keynote2: IBM Rational
Author of Secure Programming with Static Analysis by Brian Chess and Jacob West
 
[http://www.owasp.org/download/owasp_confau_2008/OWASPAU08_Session_11_Chess.mp3 (MP3)]
 
[http://www.owasp.org/images/4/4a/OWASPAU08_Session_11_Chess.zip (PPT/ZIP)]
 
 
  |-
 
  |-
  | style="width:10%; background:#7B8ABD" | 10:15-10:45 || colspan="2" style="width:80%; background:#F2F2F2" align="left" | OWASP Top Ten, OWASP Guide Project Updates
+
  | style="width:10%; background:#7B8ABD" | 10:15-10:45 || colspan="2" style="width:80%; background:#F2F2F2" align="left" | TBD
 
  |-
 
  |-
 
  | style="width:10%; background:#7B8ABD" | 10:45-11:15 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Morning Tea/Coffee, Vendor Technology Expo
 
  | style="width:10%; background:#7B8ABD" | 10:45-11:15 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Morning Tea/Coffee, Vendor Technology Expo
 
  |-
 
  |-
  | style="width:10%; background:#7B8ABD" | 11:15-12:30 || style="width:40%; background:#BC857A" align="left" | Google Hacking - Christian Heinrich
+
  | style="width:10%; background:#7B8ABD" | 11:15-12:30 || style="width:40%; background:#BC857A" align="left" | Speaker TBD
[http://www.owasp.org/download/owasp_confau_2008/OWASPAU08_Session_12_Heinrich.mp3 (MP3)]
+
  | style="width:40%; background:#BCA57A" align="left" | Speaker TBD
  | style="width:40%; background:#BCA57A" align="left" | Scalability and Security — Together - James Manger, Identity and Security team – Chief Technology Office – Telstra
 
[http://www.owasp.org/download/owasp_confau_2008/OWASPAU08_Session_13_Manager.mp3 (MP3)]
 
[http://www.owasp.org/images/8/89/OWASPAU08_Session_13_Manger.ppt (PPT)]
 
 
 
 
  |-
 
  |-
 
  | style="width:10%; background:#7B8ABD" | 12:30-13:30 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Lunch, Vendor Technology Expo
 
  | style="width:10%; background:#7B8ABD" | 12:30-13:30 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Lunch, Vendor Technology Expo
 
  |-
 
  |-
  | style="width:10%; background:#7B8ABD" | 13:30-14:30 || style="width:40%; background:#BC857A" align="left" | Using WS-SecurityPolicy to Defend Web Services Attacks - Symon Chang, BEA Systems
+
  | style="width:10%; background:#7B8ABD" | 13:30-14:30 || style="width:40%; background:#BC857A" align="left" | Speaker TBD
[http://www.owasp.org/download/owasp_confau_2008/OWASPAU08_Session_14_Chang.mp3 (MP3)]
+
  | style="width:40%; background:#BCA57A" align="left" | Speaker TBD
[http://www.owasp.org/images/1/1d/OWASPAU08_Session_14_Chang.ppt (PPT)]
 
  | style="width:40%; background:#BCA57A" align="left" | PCI Security Standards & Policies for Application Security - Darren Skidmore, Team Lead InfoSec and BCP, FIS Australasia Card Services Pty Ltd
 
[http://www.owasp.org/download/owasp_confau_2008/OWASPAU08_Session_15_Skidmore.mp3 (MP3)]
 
 
  |-
 
  |-
  | style="width:10%; background:#7B8ABD" | 14:30-15:30 || style="width:40%; background:#BC857A" align="left" | Dealing with threats to Databases - Sandeep Singh Nain, Security Analyst IBM
+
  | style="width:10%; background:#7B8ABD" | 14:30-15:30 || style="width:40%; background:#BC857A" align="left" | Speaker TBD
[http://www.owasp.org/download/owasp_confau_2008/OWASPAU08_Session_16_Nain.mp3 (MP3)]
+
  | style="width:40%; background:#BCA57A" align="left" | Speaker TBD
[http://www.owasp.org/images/a/a3/OWASPAU08_Session_16_Nain.ppt (PPT)]
 
  | style="width:40%; background:#BCA57A" align="left" | On the job browser exploitation - Mark Piper, Security-Assessment.com
 
[http://www.owasp.org/download/owasp_confau_2008/OWASPAU08_Session_17_Mark.mp3 (MP3)]
 
 
  |-
 
  |-
 
  | style="width:10%; background:#7B8ABD" | 15:30-16:00 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Afternoon Tea/Coffee, Vendor Technology Expo
 
  | style="width:10%; background:#7B8ABD" | 15:30-16:00 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Afternoon Tea/Coffee, Vendor Technology Expo
 
  |-
 
  |-
  | style="width:10%; background:#7B8ABD" | 16:00-17:00 || style="width:40%; background:#BC857A" align="left" | The detection and analysis of Flash based malware. - Paul Theriault, Senior Associate SIFT
+
  | style="width:10%; background:#7B8ABD" | 16:00-17:00 || style="width:40%; background:#BC857A" align="left" | Speaker TBD
[http://www.owasp.org/download/owasp_confau_2008/OWASPAU08_Session_18_Theriault.mp3 (MP3)]
+
  | style="width:40%; background:#BCA57A" align="left" | Speaker TBD
[http://www.owasp.org/images/7/77/OWASPAU08_Session_18_Theriault.ppt (PPT)]
 
  | style="width:40%; background:#BCA57A" align="left" | Web Application Security. - Aidan Clarke F5 Systems Engineer
 
[http://www.owasp.org/download/owasp_confau_2008/OWASPAU08_Session_19_Clark.mp3 (MP3)]
 
[http://www.owasp.org/images/4/48/OWASPAU08_Session_19_Clark.pdf (PDF)]
 
 
  |-
 
  |-
 
  | style="width:10%; background:#7B8ABD" | 17:00-17:30 || colspan="2" style="width:40%; background:#F2F2F2" align="left" | Conference Close, Justin Derry, Australia OWASP Conference Chair and Practice Leader b-sec Consulting
 
  | style="width:10%; background:#7B8ABD" | 17:00-17:30 || colspan="2" style="width:40%; background:#F2F2F2" align="left" | Conference Close, Justin Derry, Australia OWASP Conference Chair and Practice Leader b-sec Consulting

Revision as of 07:59, 5 January 2009

The following Agenda is provided currently with approved and accepted Speaking spots. As more information is provided details will be posted online.

OWASP Australia 2009 Conference Schedule - February 26th & 27th 2008

Day 1 - Thursday Feb 26, 2007
Track 1 Track 2
08:00-09:00 Registration and Coffee
09:00-09:15 Welcome to OWASP AU 2009
09:15-10:15 Keynote: Roger Thorton
10:15-10:45 Introducing OWASP Projects for 2009
10:45-11:15 Morning Tea/Coffee, Vendor Technology Expo
11:15-12:30 Speaker TBD Speaker TBD
12:30-13:30 Lunch, Vendor Technology Expo
13:30-14:30 Speaker TBD Speaker TBD
14:45-15:45 Speaker TBD Speaker TBD
15:45-16:15 Afternoon Tea/Coffee, Vendor Technology Expo
16:15-17:00 Speaker TBD Speaker TBD
17:15-18:00 Panel: TBD
18:30-19:00 OWASP Social Gathering: Pre-Dinner Drinks & Cocktails

Location: Conference Facility Foyer @ Gold Coast Convention Center

19:00-21:30 OWASP Social Gathering: Gala Dinner, Entertainment and Networking Opportunity for all registered attendees.

Location: Gold Coast Convention Center Main Hall.

Day 2 - Friday Feb 27, 2007
Track 1 Track 2
08:00-09:00 Registration and Coffee
09:00-9:15 Conference Day 2 Open
09:15-10:15 Keynote2: IBM Rational
10:15-10:45 TBD
10:45-11:15 Morning Tea/Coffee, Vendor Technology Expo
11:15-12:30 Speaker TBD Speaker TBD
12:30-13:30 Lunch, Vendor Technology Expo
13:30-14:30 Speaker TBD Speaker TBD
14:30-15:30 Speaker TBD Speaker TBD
15:30-16:00 Afternoon Tea/Coffee, Vendor Technology Expo
16:00-17:00 Speaker TBD Speaker TBD
17:00-17:30 Conference Close, Justin Derry, Australia OWASP Conference Chair and Practice Leader b-sec Consulting
17:30-19:00 Happy Hour Drinks and Cocktails in Vendor Technology Expo