This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "SecurityByte OWASP Conference Tracks"
From OWASP
Line 1: | Line 1: | ||
− | '''Xprobe3 - what's new. Going application level''' - Fyodor Yarochkin , Guard-info<br> | + | *'''Xprobe3 - what's new. Going application level''' - Fyodor Yarochkin , Guard-info<br> |
− | '''Client Side hacks''' - Dino Covotsos, Telspace Systems<br> | + | *'''Client Side hacks''' - Dino Covotsos, Telspace Systems<br> |
− | '''Critical Infrastructure Security “Danger Without borders”''' - John Bumgarner, US Cyber Consequence Unit (USCCU)<br> | + | *'''Critical Infrastructure Security “Danger Without borders”''' - John Bumgarner, US Cyber Consequence Unit (USCCU)<br> |
− | '''Exploiting Firefox Extensions''' - Roberto Suggi Liverani, Security-Assessment.com<br> | + | *'''Exploiting Firefox Extensions''' - Roberto Suggi Liverani, Security-Assessment.com<br> |
− | '''Cloud Hacking – Distributed Attack & Exploit Platform''' - Shreeraj Shah, Blueinfy Solutions<br> | + | *'''Cloud Hacking – Distributed Attack & Exploit Platform''' - Shreeraj Shah, Blueinfy Solutions<br> |
− | '''SQL Server Forensics 2.0''' - Kevvie Fowler, TELUS & Ringzero<br> | + | *'''SQL Server Forensics 2.0''' - Kevvie Fowler, TELUS & Ringzero<br> |
− | '''Vbootkit 2.0: Attacking Windows 7 via Boot Sectors''' - Nitin Kumar/Vipin Kumar, Independent Security Researchers, NVlabs<br> | + | *'''Vbootkit 2.0: Attacking Windows 7 via Boot Sectors''' - Nitin Kumar/Vipin Kumar, Independent Security Researchers, NVlabs<br> |
− | '''Testing JSON Applications for security holes''' - Aviram Jenik, Beyond Security<br> | + | *'''Testing JSON Applications for security holes''' - Aviram Jenik, Beyond Security<br> |
− | '''How to blackbox test almost anything''' - Aviram Jenik, Beyond Security<br> | + | *'''How to blackbox test almost anything''' - Aviram Jenik, Beyond Security<br> |
− | '''Topical issues affecting the threat landscape - prevalence of web threats''' - Joshua Talbot, Symantec Corp.<br> | + | *'''Topical issues affecting the threat landscape - prevalence of web threats''' - Joshua Talbot, Symantec Corp.<br> |
− | '''“Do You Want To Play A Game?”: Game Theory And Simulated Cyber War''' - Bryan K. Fite, Symantec Corp.<br> | + | *'''“Do You Want To Play A Game?”: Game Theory And Simulated Cyber War''' - Bryan K. Fite, Symantec Corp.<br> |
− | '''Hacking Oracle From Web''' - Sumit Siddharth (Sid), Independent Security Researcher<br> | + | *'''Hacking Oracle From Web''' - Sumit Siddharth (Sid), Independent Security Researcher<br> |
− | '''TBD''' - Mano Paul, Software Assurance Advisor (ISC)2<br> | + | *'''TBD''' - Mano Paul, Software Assurance Advisor (ISC)2<br> |
− | '''TBD''' - Howard A. Schmidt, Former Cyber Security Advisor to the White house; Former Strategic Advisor – President’s Critical Infrastructure Protection Program<br> | + | *'''TBD''' - Howard A. Schmidt, Former Cyber Security Advisor to the White house; Former Strategic Advisor – President’s Critical Infrastructure Protection Program<br> |
− | '''Hacking mobile wallet / mobile banking systems, OR Anti Forensics (OSX based attacks)''' - The Grugq, Independent Security Researcher<br> | + | *'''Hacking mobile wallet / mobile banking systems, OR Anti Forensics (OSX based attacks)''' - The Grugq, Independent Security Researcher<br> |
− | '''Advanced Web Hacking''' - Saumil Udayan Shah, Net Square<br> | + | *'''Advanced Web Hacking''' - Saumil Udayan Shah, Net Square<br> |
− | '''Data loss Protection''' - Enno Rey, Independent Security Researcher<br> | + | *'''Data loss Protection''' - Enno Rey, Independent Security Researcher<br> |
− | '''Microsoft SDL''' - Adam Shawstack, Microsoft Corp.<br> | + | *'''Microsoft SDL''' - Adam Shawstack, Microsoft Corp.<br> |
− | '''Reconsidering Network Defense''' - Cedric Blancher, EADS Innovation Works<br> | + | *'''Reconsidering Network Defense''' - Cedric Blancher, EADS Innovation Works<br> |
Revision as of 06:33, 24 July 2009
- Xprobe3 - what's new. Going application level - Fyodor Yarochkin , Guard-info
- Client Side hacks - Dino Covotsos, Telspace Systems
- Critical Infrastructure Security “Danger Without borders” - John Bumgarner, US Cyber Consequence Unit (USCCU)
- Exploiting Firefox Extensions - Roberto Suggi Liverani, Security-Assessment.com
- Cloud Hacking – Distributed Attack & Exploit Platform - Shreeraj Shah, Blueinfy Solutions
- SQL Server Forensics 2.0 - Kevvie Fowler, TELUS & Ringzero
- Vbootkit 2.0: Attacking Windows 7 via Boot Sectors - Nitin Kumar/Vipin Kumar, Independent Security Researchers, NVlabs
- Testing JSON Applications for security holes - Aviram Jenik, Beyond Security
- How to blackbox test almost anything - Aviram Jenik, Beyond Security
- Topical issues affecting the threat landscape - prevalence of web threats - Joshua Talbot, Symantec Corp.
- “Do You Want To Play A Game?”: Game Theory And Simulated Cyber War - Bryan K. Fite, Symantec Corp.
- Hacking Oracle From Web - Sumit Siddharth (Sid), Independent Security Researcher
- TBD - Mano Paul, Software Assurance Advisor (ISC)2
- TBD - Howard A. Schmidt, Former Cyber Security Advisor to the White house; Former Strategic Advisor – President’s Critical Infrastructure Protection Program
- Hacking mobile wallet / mobile banking systems, OR Anti Forensics (OSX based attacks) - The Grugq, Independent Security Researcher
- Advanced Web Hacking - Saumil Udayan Shah, Net Square
- Data loss Protection - Enno Rey, Independent Security Researcher
- Microsoft SDL - Adam Shawstack, Microsoft Corp.
- Reconsidering Network Defense - Cedric Blancher, EADS Innovation Works