This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "SecurityByte OWASP Conference Tracks"

From OWASP
Jump to: navigation, search
 
(5 intermediate revisions by one other user not shown)
Line 3: Line 3:
 
*'''[http://www.owasp.org/index.php/Critical_Infrastructure_Security Critical Infrastructure Security “Danger Without borders]”''' - John Bumgarner, US Cyber Consequence Unit (USCCU)<br>
 
*'''[http://www.owasp.org/index.php/Critical_Infrastructure_Security Critical Infrastructure Security “Danger Without borders]”''' - John Bumgarner, US Cyber Consequence Unit (USCCU)<br>
 
*'''[http://www.owasp.org/index.php/Exploiting_Firefox_Extensions Exploiting Firefox Extensions]''' - Roberto Suggi Liverani, Security-Assessment.com<br>
 
*'''[http://www.owasp.org/index.php/Exploiting_Firefox_Extensions Exploiting Firefox Extensions]''' - Roberto Suggi Liverani, Security-Assessment.com<br>
*'''[http://www.owasp.org/index.php/Cloud Hacking_–_Distributed_Attack_Exploit_Platform Cloud Hacking – Distributed Attack & Exploit Platform]''' - Shreeraj Shah, Blueinfy Solutions<br>
+
*'''[http://www.owasp.org/index.php/Cloud_Hacking_–_Distributed_Attack_Exploit_Platform Cloud Hacking – Distributed Attack & Exploit Platform]''' - Shreeraj Shah, Blueinfy Solutions<br>
 
*'''[http://www.owasp.org/index.php/SQL_Server_Forensics_2.0 SQL Server Forensics 2.0]''' - Kevvie Fowler, TELUS & Ringzero<br>
 
*'''[http://www.owasp.org/index.php/SQL_Server_Forensics_2.0 SQL Server Forensics 2.0]''' - Kevvie Fowler, TELUS & Ringzero<br>
 
*'''[http://www.owasp.org/index.php/Vbootkit_2.0:_Attacking_Windows_7_Via_Boot Sectors Vbootkit 2.0: Attacking Windows 7 Via Boot Sectors]''' - Nitin Kumar/Vipin Kumar, Independent Security Researchers, NVlabs<br>
 
*'''[http://www.owasp.org/index.php/Vbootkit_2.0:_Attacking_Windows_7_Via_Boot Sectors Vbootkit 2.0: Attacking Windows 7 Via Boot Sectors]''' - Nitin Kumar/Vipin Kumar, Independent Security Researchers, NVlabs<br>
Line 10: Line 10:
 
*'''[http://www.owasp.org/index.php/Topical_Issues_Affecting_The_Threat_Landscape_-_Prevalence_Of_Web_Threats Topical Issues Affecting The Threat Landscape - Prevalence Of Web Threats]''' - Joshua Talbot, Symantec Corp.<br>
 
*'''[http://www.owasp.org/index.php/Topical_Issues_Affecting_The_Threat_Landscape_-_Prevalence_Of_Web_Threats Topical Issues Affecting The Threat Landscape - Prevalence Of Web Threats]''' - Joshua Talbot, Symantec Corp.<br>
 
*'''[http://www.owasp.org/index.php/Do_You_Want_To_Play_A_Game?:_Game_Theory_And_Simulated_Cyber_War “Do You Want To Play A Game?”: Game Theory And Simulated Cyber War]''' - Bryan K. Fite, Symantec Corp.<br>
 
*'''[http://www.owasp.org/index.php/Do_You_Want_To_Play_A_Game?:_Game_Theory_And_Simulated_Cyber_War “Do You Want To Play A Game?”: Game Theory And Simulated Cyber War]''' - Bryan K. Fite, Symantec Corp.<br>
*'''[http://www.owasp.org/index.php/Hacking_Oracle_From_Web Hacking Oracle From Web]''' - Sumit Siddharth (Sid), Independent Security Researcher<br>
+
*'''[http://www.owasp.org/index.php/Hacking_Oracle_From_Web Hacking Oracle From Web]''' - Sid, Independent Security Researcher<br>
 
*'''TBD''' - Mano Paul, Software Assurance Advisor (ISC)2<br>
 
*'''TBD''' - Mano Paul, Software Assurance Advisor (ISC)2<br>
 
*'''TBD''' - Howard A. Schmidt, Former Cyber Security Advisor to the White house; Former Strategic Advisor – President’s Critical Infrastructure Protection Program<br>
 
*'''TBD''' - Howard A. Schmidt, Former Cyber Security Advisor to the White house; Former Strategic Advisor – President’s Critical Infrastructure Protection Program<br>
*'''[http://www.owasp.org/index.php/Hacking_Mobile_Wallet/Mobile_Banking_Systems_OR_Anti_Forensics_(OSX Based Attacks) Hacking Mobile Wallet/Mobile Banking Systems, OR Anti Forensics (OSX Based Attacks)]''' - The Grugq, Independent Security Researcher<br>
+
*'''[http://www.owasp.org/index.php/Hacking_Mobile_Wallet/Mobile_Banking_Systems_/_Anti_Forensics_(OSX Based Attacks) Hacking Mobile Wallet/Mobile Banking Systems, OR Anti Forensics (OSX Based Attacks)]''' - The Grugq, Independent Security Researcher<br>
*'''[http://www.owasp.org/index.php/Advanced_Web_Hacking Advanced Web Hacking]''' - Saumil Udayan Shah, Net Square<br>
+
*'''[http://www.owasp.org/index.php/Advanced_Web_Hacking Advanced Web Hacking]''' - TBA <br>
*'''[http://www.owasp.org/index.php/Data_Loss_Protection Data Loss Protection]''' - Enno Rey, Independent Security Researcher<br>
+
*'''[http://www.owasp.org/index.php/Data_Loss_Protection Data Loss Protection]''' - ER, Independent Security Researcher<br>
*'''[http://www.owasp.org/index.php/Microsoft_SDLC Microsoft SDLC]''' - Adam Shawstack, Microsoft Corp.<br>
+
*'''[http://www.owasp.org/index.php/Microsoft_SDLC Microsoft SDLC]''' - TBA, Microsoft Corp.<br>
 
*'''[http://www.owasp.org/index.php/Reconsidering_Network_Defense Reconsidering Network Defense]''' - Cedric Blancher, EADS Innovation Works<br>
 
*'''[http://www.owasp.org/index.php/Reconsidering_Network_Defense Reconsidering Network Defense]''' - Cedric Blancher, EADS Innovation Works<br>
 +
*'''Source code review vs. Penetration testing''' - K. K. Mookhey, Founder & Principal Consultant, NII Consulting<br><br>
 +
 +
[http://www.owasp.org/index.php/SecurityByte_and_OWASP_Asia_AppSec_Conference_2009 Category: SecurityByte And OWASP Asia AppSec Conference 2009]<br>

Latest revision as of 10:18, 24 July 2009

Category: SecurityByte And OWASP Asia AppSec Conference 2009