This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Mrb Scratchpad"
From OWASP
Mark.bristow (talk | contribs) |
Mark.bristow (talk | contribs) |
||
| Line 17: | Line 17: | ||
<tr valign="bottom"> | <tr valign="bottom"> | ||
<td bgcolor="#666699" width="67" valign="middle">09:00-10:00 | <td bgcolor="#666699" width="67" valign="middle">09:00-10:00 | ||
| − | <td height="60" colspan="4" align="center" bgcolor="#e0e0e0" valign="middle">Keynote: Joe Jarzombek | + | <td height="60" colspan="4" align="center" bgcolor="#e0e0e0" valign="middle">Keynote: [[AppSecDC Keynote Jarzomnek|Joe Jarzombek]] |
<tr valign="bottom"> | <tr valign="bottom"> | ||
<td bgcolor="#666699" width="67" valign="middle">10:30-10:30 | <td bgcolor="#666699" width="67" valign="middle">10:30-10:30 | ||
| Line 31: | Line 31: | ||
<td height="120" align="center" bgcolor="#ff0000" width="200" valign="middle" width="200">[[Software Assurance Maturity Model (SAMM)]]<br>Pravir Chandra | <td height="120" align="center" bgcolor="#ff0000" width="200" valign="middle" width="200">[[Software Assurance Maturity Model (SAMM)]]<br>Pravir Chandra | ||
<td height="120" align="center" bgcolor="#808000" width="200" valign="middle" width="200">[[The Case of Promiscuous Parameters and Other Ongoing Capers in Web Security]]<br>Jacob West | <td height="120" align="center" bgcolor="#808000" width="200" valign="middle" width="200">[[The Case of Promiscuous Parameters and Other Ongoing Capers in Web Security]]<br>Jacob West | ||
| − | <td height="120" align="center" bgcolor="#ccffcc" width="200" valign="middle" width="200">[[Enterprise Application Security - GE's approach to solving root cause and establishing a Center of Excellence]]<br>Darren Challey | + | <td height="120" align="center" bgcolor="#ccffcc" width="200" valign="middle" width="200">[[Enterprise Application Security - GE's approach to solving root cause and establishing a Center of Excellence | Enterprise Application Security - GE's approach to solving root cause]]<br>Darren Challey |
<td height="120" align="center" bgcolor="#ff6600" width="200" valign="middle" width="200">[[Transparent Proxy Abuse]]<br>Robert Auger | <td height="120" align="center" bgcolor="#ff6600" width="200" valign="middle" width="200">[[Transparent Proxy Abuse]]<br>Robert Auger | ||
<tr valign="bottom"> | <tr valign="bottom"> | ||
| Line 50: | Line 50: | ||
<tr valign="bottom"> | <tr valign="bottom"> | ||
<td height="120" rowspan="2" bgcolor="#666699" width="67" valign="middle">15:30-16:30 | <td height="120" rowspan="2" bgcolor="#666699" width="67" valign="middle">15:30-16:30 | ||
| − | <td height="120" rowspan="2" align="center" bgcolor="#ff0000" width="200" valign="middle" width="200">[[The ESAPI Web Application Firewall]]<br>Arshan Dabirsiaghi | + | <td height="120" rowspan="2" align="center" bgcolor="#ff0000" width="200" valign="middle" width="200">[[The ESAPI Web Application Firewall (ESAPI WAF)|The ESAPI Web Application Firewall]]<br>Arshan Dabirsiaghi |
<td height="60" align="center" bgcolor="#808000" width="200" valign="middle" width="200">[[One Click Ownage]]<br>Ferruh Mavituna | <td height="60" align="center" bgcolor="#808000" width="200" valign="middle" width="200">[[One Click Ownage]]<br>Ferruh Mavituna | ||
<td height="120" rowspan="2" align="center" bgcolor="#ff6600" width="200" valign="middle" width="200">[[Cloudy with a chance of 0-day]]<br>Jon Rose/Tom Leavey | <td height="120" rowspan="2" align="center" bgcolor="#ff6600" width="200" valign="middle" width="200">[[Cloudy with a chance of 0-day]]<br>Jon Rose/Tom Leavey | ||
| Line 62: | Line 62: | ||
<td height="120" rowspan="2" align="center" bgcolor="#ff6600" width="200" valign="middle" width="200">[[Attacking WCF Web Services]]<br>Brian Holyfield | <td height="120" rowspan="2" align="center" bgcolor="#ff6600" width="200" valign="middle" width="200">[[Attacking WCF Web Services]]<br>Brian Holyfield | ||
<tr valign="bottom"> | <tr valign="bottom"> | ||
| − | <td height="60" align="center" bgcolor="#808000" width="200" valign="middle" width="200">[[Synergy! - A world where the tools communicate]]<br> | + | <td height="60" align="center" bgcolor="#808000" width="200" valign="middle" width="200">[[Synergy! An intregrated OWASP Audit: A world where the tools communicate|Synergy! - A world where the tools communicate]]<br> |
Josh Abraham | Josh Abraham | ||
<tr valign="bottom"> | <tr valign="bottom"> | ||
| Line 68: | Line 68: | ||
<td height="120" rowspan="2" align="center" bgcolor="#ff0000" width="200" valign="middle" width="200">[[The Entrepreneur's Guide to Career Management]]<br>Lee Kushner | <td height="120" rowspan="2" align="center" bgcolor="#ff0000" width="200" valign="middle" width="200">[[The Entrepreneur's Guide to Career Management]]<br>Lee Kushner | ||
<td height="60" align="center" bgcolor="#808000" width="200" valign="middle" width="200">[[Advanced SSL: The good, the bad, and the ugly]]<br>Michael Coats | <td height="60" align="center" bgcolor="#808000" width="200" valign="middle" width="200">[[Advanced SSL: The good, the bad, and the ugly]]<br>Michael Coats | ||
| − | <td height="120" rowspan="2" align="center" bgcolor="#ccffcc" width="200" valign="middle" width="200">[[Threat Modeling]]<br>John Steven | + | <td height="120" rowspan="2" align="center" bgcolor="#ccffcc" width="200" valign="middle" width="200">[[Threat Modeling by John Steven|Threat Modeling]]<br>John Steven |
<td height="120" rowspan="2" align="center" bgcolor="#ff6600" width="200" valign="middle" width="200">[[When Web 2.0 Attacks - Understanding Security Implications of AJAX, Flash and "Highly Interactive" Technologies]]<br>Rafal Los | <td height="120" rowspan="2" align="center" bgcolor="#ff6600" width="200" valign="middle" width="200">[[When Web 2.0 Attacks - Understanding Security Implications of AJAX, Flash and "Highly Interactive" Technologies]]<br>Rafal Los | ||
<tr valign="bottom"> | <tr valign="bottom"> | ||
| Line 75: | Line 75: | ||
<td height="60" bgcolor="#666699" width="67" valign="middle">19:00-???? | <td height="60" bgcolor="#666699" width="67" valign="middle">19:00-???? | ||
<td height="60" colspan="4" align="center" bgcolor="#c0c0c0" valign="middle">Reception | <td height="60" colspan="4" align="center" bgcolor="#c0c0c0" valign="middle">Reception | ||
| + | <!-- Day 2 --> | ||
<tr valign="middle"> | <tr valign="middle"> | ||
| − | <td height="60" colspan="5"> | + | <td height="60" colspan="5"> |
<tr valign="middle"> | <tr valign="middle"> | ||
<td height="60" colspan="5" align="center" bgcolor="#333399"><font size="5"><b>Day 2 - Nov 13th 2009</b> | <td height="60" colspan="5" align="center" bgcolor="#333399"><font size="5"><b>Day 2 - Nov 13th 2009</b> | ||
| Line 110: | Line 111: | ||
<td height="120" align="center" bgcolor="#ff0000" width="200" valign="middle" width="200">[[Fox in the Henhouse: Java Rootkits]]<br>Jeff Williams | <td height="120" align="center" bgcolor="#ff0000" width="200" valign="middle" width="200">[[Fox in the Henhouse: Java Rootkits]]<br>Jeff Williams | ||
<td height="120" align="center" bgcolor="#808000" width="200" valign="middle" width="200">[[Secure Software Updates: Update Like Conficker]]<br>Jeremy Allen | <td height="120" align="center" bgcolor="#808000" width="200" valign="middle" width="200">[[Secure Software Updates: Update Like Conficker]]<br>Jeremy Allen | ||
| − | <td height="120" align="center" bgcolor="#ccffcc" width="200" valign="middle" width="200">[[OWASP Top 10 2009]]<br>Dave Wichers | + | <td height="120" align="center" bgcolor="#ccffcc" width="200" valign="middle" width="200">[[OWASP Top 10 2009 AppSecDC|OWASP Top 10 2009]]<br>Dave Wichers |
<td height="120" align="center" bgcolor="#ff6600" width="200" valign="middle" width="200">[[Secure SDLC: The Good, The Bad, and The Ugly]]<br>Joey Peloquin | <td height="120" align="center" bgcolor="#ff6600" width="200" valign="middle" width="200">[[Secure SDLC: The Good, The Bad, and The Ugly]]<br>Joey Peloquin | ||
<tr valign="bottom"> | <tr valign="bottom"> | ||
| Line 117: | Line 118: | ||
<tr valign="bottom"> | <tr valign="bottom"> | ||
<td height="120" bgcolor="#666699" width="67" valign="middle">14:30-15:30 | <td height="120" bgcolor="#666699" width="67" valign="middle">14:30-15:30 | ||
| − | <td height="120" align="center" bgcolor="#ff0000" width="200" valign="middle" width="200">[[TBA]]<br>Robert Hansen | + | <td height="120" align="center" bgcolor="#ff0000" width="200" valign="middle" width="200">[[TBD AppSecDC Robert Hansen|TBA]]<br>Robert Hansen |
<td height="120" align="center" bgcolor="#808000" width="200" valign="middle" width="200">[[Improving application security after an incident]]<br>Cory Scott | <td height="120" align="center" bgcolor="#808000" width="200" valign="middle" width="200">[[Improving application security after an incident]]<br>Cory Scott | ||
<td height="120" align="center" bgcolor="#ccffcc" width="200" valign="middle" width="200">[[Hacking by Numbers]]<br>Tom Brennan | <td height="120" align="center" bgcolor="#ccffcc" width="200" valign="middle" width="200">[[Hacking by Numbers]]<br>Tom Brennan | ||
Revision as of 02:57, 20 August 2009