This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "AppSecDC Schedule 09"
From OWASP
KateHartmann (talk | contribs) |
Mark.bristow (talk | contribs) |
||
| Line 2: | Line 2: | ||
<table border="2" cellspacing="0"> | <table border="2" cellspacing="0"> | ||
<tr valign="middle"> | <tr valign="middle"> | ||
| − | <td height="60" colspan="5" align="center" | + | <td height="60" colspan="5" align="center" style="background:#4058A0; color:white"><font size="5"><b>Day 1 - Nov 12th 2009</b> |
<tr valign="bottom"> | <tr valign="bottom"> | ||
| − | <td height="40" bgcolor="# | + | <td height="40" bgcolor="#7B8ABD" width="67" valign="middle"> |
| − | <td height="40" align="center" bgcolor="# | + | <td height="40" align="center" bgcolor="#c0a0a0" valign="middle" width="200"><b>OWASP</b> |
| − | <td height="40" align="center" bgcolor="# | + | <td height="40" align="center" bgcolor="#FFDF80" valign="middle" width="200"><b>Tools</b> |
| − | <td height="40" align="center" bgcolor="# | + | <td height="40" align="center" bgcolor="#a0c0e0" valign="middle" width="200"><b>SDLC</b> |
| − | <td height="40" align="center" bgcolor="# | + | <td height="40" align="center" bgcolor="#B3FF99" valign="middle" width="200"><b>Web 2.0</b> |
<tr valign="bottom"> | <tr valign="bottom"> | ||
| − | <td bgcolor="# | + | <td bgcolor="#7B8ABD" width="67" valign="middle">07:30-09:00 |
<td colspan="4" align="center" bgcolor="#909090" valign="middle">Registration | <td colspan="4" align="center" bgcolor="#909090" valign="middle">Registration | ||
<tr valign="bottom"> | <tr valign="bottom"> | ||
| − | <td bgcolor="# | + | <td bgcolor="#7B8ABD" width="67" valign="middle">08:45-09:00 |
<td height="30" colspan="4" align="center" bgcolor="#e0e0e0" valign="middle">Welcome and Opening Remarks | <td height="30" colspan="4" align="center" bgcolor="#e0e0e0" valign="middle">Welcome and Opening Remarks | ||
<tr valign="bottom"> | <tr valign="bottom"> | ||
| − | <td bgcolor="# | + | <td bgcolor="#7B8ABD" width="67" valign="middle">09:00-10:00 |
<td height="60" colspan="4" align="center" bgcolor="#e0e0e0" valign="middle">Keynote: [[AppSecDC Keynote Jarzomnek|Joe Jarzombek]] | <td height="60" colspan="4" align="center" bgcolor="#e0e0e0" valign="middle">Keynote: [[AppSecDC Keynote Jarzomnek|Joe Jarzombek]] | ||
<tr valign="bottom"> | <tr valign="bottom"> | ||
| − | <td bgcolor="# | + | <td bgcolor="#7B8ABD" width="67" valign="middle">10:30-10:30 |
<td height="30" colspan="4" align="center" bgcolor="#909090" valign="middle">Coffee Break & Room Change | <td height="30" colspan="4" align="center" bgcolor="#909090" valign="middle">Coffee Break & Room Change | ||
<tr valign="bottom"> | <tr valign="bottom"> | ||
| − | <td bgcolor="# | + | <td bgcolor="#7B8ABD" width="67" valign="middle">10:30-11:30 |
| − | <td height="120" align="center" bgcolor="# | + | <td height="120" align="center" bgcolor="#c0a0a0" width="200" valign="middle" width="200">[[OWASP ESAPI AppSecDC|OWASP ESAPI]]<br>Jeff Williams |
| − | <td height="120" align="center" bgcolor="# | + | <td height="120" align="center" bgcolor="#FFDF80" width="200" valign="middle" width="200">[[Manipulating Web Application Interfaces, a new approach to input validation]]<br>Felipe Moreno-Strauch |
| − | <td height="120" align="center" bgcolor="# | + | <td height="120" align="center" bgcolor="#a0c0e0" width="200" valign="middle" width="200">[[Development Issues Within AJAX Applications: How to Divert Threats]]<br>Lars Ewe |
| − | <td height="120" align="center" bgcolor="# | + | <td height="120" align="center" bgcolor="#B3FF99" width="200" valign="middle" width="200">[[Understanding the Implications of Cloud Computing on Application Security]]<br>Dennis Hurst |
<tr valign="bottom"> | <tr valign="bottom"> | ||
| − | <td height="120" bgcolor="# | + | <td height="120" bgcolor="#7B8ABD" width="67" valign="middle">11:30-12:30 |
| − | <td height="120" align="center" bgcolor="# | + | <td height="120" align="center" bgcolor="#c0a0a0" width="200" valign="middle" width="200">[[Software Assurance Maturity Model (SAMM)]]<br>Pravir Chandra |
| − | <td height="120" align="center" bgcolor="# | + | <td height="120" align="center" bgcolor="#FFDF80" width="200" valign="middle" width="200">[[The Case of Promiscuous Parameters and Other Ongoing Capers in Web Security]]<br>Jacob West |
| − | <td height="120" align="center" bgcolor="# | + | <td height="120" align="center" bgcolor="#a0c0e0" width="200" valign="middle" width="200">[[Enterprise Application Security - GE's approach to solving root cause and establishing a Center of Excellence | Enterprise Application Security - GE's approach to solving root cause]]<br>Darren Challey |
| − | <td height="120" align="center" bgcolor="# | + | <td height="120" align="center" bgcolor="#B3FF99" width="200" valign="middle" width="200">[[Transparent Proxy Abuse]]<br>Robert Auger |
<tr valign="bottom"> | <tr valign="bottom"> | ||
| − | <td height="120" bgcolor="# | + | <td height="120" bgcolor="#7B8ABD" width="67" valign="middle">12:30-13:30 |
| − | <td height="120" align="center" bgcolor="# | + | <td height="120" align="center" bgcolor="#c0a0a0" width="200" valign="middle" width="200">[[DISA's Application Security and Development STIG: How OWASP Can Help You]]<br>Jason Li |
| − | <td height="120" align="center" bgcolor="# | + | <td height="120" align="center" bgcolor="#FFDF80" width="200" valign="middle" width="200">[[OWASP ModSecurity Core Rule Set Project]]<br>Ryan C. Barnett |
| − | <td height="120" align="center" bgcolor="# | + | <td height="120" align="center" bgcolor="#a0c0e0" width="200" valign="middle" width="200">[[The essential role of infosec in secure software development]]<br>Kenneth R. van Wyk |
| − | <td height="120" align="center" bgcolor="# | + | <td height="120" align="center" bgcolor="#B3FF99" width="200" valign="middle" width="200">[[Fracturing Flex For Fun- An Alliterative Attackers Approach]]<br>Jon Rose/Kevin Stadmeyer |
<tr valign="bottom"> | <tr valign="bottom"> | ||
| − | <td height="60" bgcolor="# | + | <td height="60" bgcolor="#7B8ABD" width="67" valign="middle">13:30-14:30 |
<td height="60" colspan="4" align="center" bgcolor="#909090" valign="middle">Lunch | <td height="60" colspan="4" align="center" bgcolor="#909090" valign="middle">Lunch | ||
<tr valign="bottom"> | <tr valign="bottom"> | ||
| − | <td height="120" bgcolor="# | + | <td height="120" bgcolor="#7B8ABD" width="67" valign="middle">14:30-15:30 |
| − | <td height="60" align="center" bgcolor="# | + | <td height="60" align="center" bgcolor="#c0a0a0" width="200" valign="middle" width="200">[[ Defend Yourself: Integrating Real Time Defenses into Online Applications]]<br>Michael Coates |
| − | <td height="60" align="center" bgcolor="# | + | <td height="60" align="center" bgcolor="#FFDF80" width="200" valign="middle" width="200">[[Finding the Hotspots: Web-security testing with the Watcher tool]]<br>Chris Weber |
| − | <td height="120" rowspan="3" align="center" bgcolor="# | + | <td height="120" rowspan="3" align="center" bgcolor="#a0c0e0" width="200" valign="middle" width="200">[[SDLC Pannel AppSecDC | SDLC Panel]] |
| − | <td height="120" align="center" bgcolor="# | + | <td height="120" align="center" bgcolor="#B3FF99" width="200" valign="middle" width="200">[[Social Zombies: Your Friends Want to Eat Your Brains]]<br>Tom Eston/Kevin Johnson |
<tr valign="bottom"> | <tr valign="bottom"> | ||
| − | <td height="120" rowspan="2" bgcolor="# | + | <td height="120" rowspan="2" bgcolor="#7B8ABD" width="67" valign="middle">15:30-16:30 |
| − | <td height="120" rowspan="2" align="center" bgcolor="# | + | <td height="120" rowspan="2" align="center" bgcolor="#c0a0a0" width="200" valign="middle" width="200">[[The ESAPI Web Application Firewall (ESAPI WAF)|The ESAPI Web Application Firewall]]<br>Arshan Dabirsiaghi |
| − | <td height="60" align="center" bgcolor="# | + | <td height="60" align="center" bgcolor="#FFDF80" width="200" valign="middle" width="200">[[One Click Ownage]]<br>Ferruh Mavituna |
| − | <td height="120" rowspan="2" align="center" bgcolor="# | + | <td height="120" rowspan="2" align="center" bgcolor="#B3FF99" width="200" valign="middle" width="200">[[Cloudy with a chance of 0-day]]<br>Jon Rose/Tom Leavey |
<tr valign="bottom"> | <tr valign="bottom"> | ||
| − | <td height="60" align="center" bgcolor="# | + | <td height="60" align="center" bgcolor="#FFDF80" width="200" valign="middle" width="200">[[Web Application Security Scanner Evaluation Criteria]]<br>Brian Shura |
<tr valign="bottom"> | <tr valign="bottom"> | ||
| − | <td height="120" rowspan="2" bgcolor="# | + | <td height="120" rowspan="2" bgcolor="#7B8ABD" width="67" valign="middle">16:30-17:30 |
| − | <td height="120" rowspan="2" align="center" bgcolor="# | + | <td height="120" rowspan="2" align="center" bgcolor="#c0a0a0" width="200" valign="middle" width="200">[[OWASP Live CD: An open environment for Web Application Security]]<br>Matt Tesauro / Brad Causey |
| − | <td height="60" align="center" bgcolor="# | + | <td height="60" align="center" bgcolor="#FFDF80" width="200" valign="middle" width="200">[[Learning by Breaking: A New Project Insecure Web Apps]]<br>Chuck Willis |
| − | <td height="120" rowspan="2" align="center" bgcolor="# | + | <td height="120" rowspan="2" align="center" bgcolor="#a0c0e0" width="200" valign="middle" width="200">[[Vulnerability Management in an Application Security World]]<br>Dan Cornell |
| − | <td height="120" rowspan="2" align="center" bgcolor="# | + | <td height="120" rowspan="2" align="center" bgcolor="#B3FF99" width="200" valign="middle" width="200">[[Attacking WCF Web Services]]<br>Brian Holyfield |
<tr valign="bottom"> | <tr valign="bottom"> | ||
| − | <td height="60" align="center" bgcolor="# | + | <td height="60" align="center" bgcolor="#FFDF80" width="200" valign="middle" width="200">[[Synergy! An intregrated OWASP Audit: A world where the tools communicate|Synergy! - A world where the tools communicate]]<br> |
Josh Abraham | Josh Abraham | ||
<tr valign="bottom"> | <tr valign="bottom"> | ||
| − | <td height="120" rowspan="2" bgcolor="# | + | <td height="120" rowspan="2" bgcolor="#7B8ABD" width="67" valign="middle">17:30-18:30 |
| − | <td height="120" rowspan="2" align="center" bgcolor="# | + | <td height="120" rowspan="2" align="center" bgcolor="#c0a0a0" width="200" valign="middle" width="200">[[The Entrepreneur's Guide to Career Management]]<br>Lee Kushner |
| − | <td height="60" align="center" bgcolor="# | + | <td height="60" align="center" bgcolor="#FFDF80" width="200" valign="middle" width="200">[[Advanced SSL: The good, the bad, and the ugly]]<br>Michael Coats |
| − | <td height="120" rowspan="2" align="center" bgcolor="# | + | <td height="120" rowspan="2" align="center" bgcolor="#a0c0e0" width="200" valign="middle" width="200">[[Threat Modeling by John Steven|Threat Modeling]]<br>John Steven |
| − | <td height="120" rowspan="2" align="center" bgcolor="# | + | <td height="120" rowspan="2" align="center" bgcolor="#B3FF99" width="200" valign="middle" width="200">[[When Web 2.0 Attacks - Understanding Security Implications of AJAX, Flash and "Highly Interactive" Technologies]]<br>Rafal Los |
<tr valign="bottom"> | <tr valign="bottom"> | ||
| − | <td height="60" align="center" bgcolor="# | + | <td height="60" align="center" bgcolor="#FFDF80" width="200" valign="middle" width="200">[[User input piercing for Cross Site Scripting Attacks]]<br>Matias Blanco |
<tr valign="bottom"> | <tr valign="bottom"> | ||
| − | <td height="60" bgcolor="# | + | <td height="60" bgcolor="#7B8ABD" width="67" valign="middle">19:00-???? |
<td height="60" colspan="4" align="center" bgcolor="#c0c0c0" valign="middle">Reception | <td height="60" colspan="4" align="center" bgcolor="#c0c0c0" valign="middle">Reception | ||
<!-- Day 2 --> | <!-- Day 2 --> | ||
| Line 79: | Line 79: | ||
<td height="60" colspan="5"> | <td height="60" colspan="5"> | ||
<tr valign="middle"> | <tr valign="middle"> | ||
| − | <td height="60" colspan="5" align="center" | + | <td height="60" colspan="5" align="center" style="background:#4058A0; color:white"><font size="5"><b>Day 2 - Nov 13th 2009</b> |
<tr valign="bottom"> | <tr valign="bottom"> | ||
| − | <td height="40" bgcolor="# | + | <td height="40" bgcolor="#7B8ABD" width="67" valign="middle"> |
| − | <td height="40" align="center" bgcolor="# | + | <td height="40" align="center" bgcolor="#c0a0a0" valign="middle" width="200"><b>Attack & Defend</b> |
| − | <td height="40" align="center" bgcolor="# | + | <td height="40" align="center" bgcolor="#FFDF80" valign="middle" width="200"><b>Process</b> |
| − | <td height="40" align="center" bgcolor="# | + | <td height="40" align="center" bgcolor="#a0c0e0" valign="middle" width="200"><b>Metrics</b> |
| − | <td height="40" align="center" bgcolor="# | + | <td height="40" align="center" bgcolor="#B3FF99" valign="middle" width="200"><b>Compliance</b> |
<tr valign="bottom"> | <tr valign="bottom"> | ||
| − | <td bgcolor="# | + | <td bgcolor="#7B8ABD" width="67" valign="middle">07:30-09:00 |
<td colspan="4" align="center" bgcolor="#909090" valign="middle">Registration | <td colspan="4" align="center" bgcolor="#909090" valign="middle">Registration | ||
<tr valign="bottom"> | <tr valign="bottom"> | ||
| − | <td bgcolor="# | + | <td bgcolor="#7B8ABD" width="67" valign="middle">09:00-10:00 |
<td height="60" colspan="4" align="center" bgcolor="#e0e0e0" valign="middle">Keynote: TBA | <td height="60" colspan="4" align="center" bgcolor="#e0e0e0" valign="middle">Keynote: TBA | ||
<tr valign="bottom"> | <tr valign="bottom"> | ||
| − | <td bgcolor="# | + | <td bgcolor="#7B8ABD" width="67" valign="middle">10:30-10:30 |
<td height="30" colspan="4" align="center" bgcolor="#909090" valign="middle">Coffee Break & Room Change | <td height="30" colspan="4" align="center" bgcolor="#909090" valign="middle">Coffee Break & Room Change | ||
<tr valign="bottom"> | <tr valign="bottom"> | ||
| − | <td bgcolor="# | + | <td bgcolor="#7B8ABD" width="67" valign="middle">10:30-11:30 |
| − | <td height="120" align="center" bgcolor="# | + | <td height="120" align="center" bgcolor="#c0a0a0" width="200" valign="middle" width="200">[[Securing the Core JEE Patterns]]<br>Rohit Sethi/Krishna Raja |
| − | <td height="120" align="center" bgcolor="# | + | <td height="120" align="center" bgcolor="#FFDF80" width="200" valign="middle" width="200">[[The Big Picture: Web Risks and Assessments Beyond Scanning]]<br>Matt Fisher |
| − | <td height="120" align="center" bgcolor="# | + | <td height="120" align="center" bgcolor="#a0c0e0" width="200" valign="middle" width="200">[[The Web Hacking Incidents Database]]<br>Ryan C. Barnett |
| − | <td height="120" align="center" bgcolor="# | + | <td height="120" align="center" bgcolor="#B3FF99" width="200" valign="middle" width="200">[[Business Logic Automatons: Friend or Foe?]]<br>Ofer Shezaf |
<tr valign="bottom"> | <tr valign="bottom"> | ||
| − | <td height="120" bgcolor="# | + | <td height="120" bgcolor="#7B8ABD" width="67" valign="middle">11:30-12:30 |
| − | <td height="120" align="center" bgcolor="# | + | <td height="120" align="center" bgcolor="#c0a0a0" width="200" valign="middle" width="200">[[Unicode Transformations: Finding Elusive Vulnerabilities]]<br>Chris Weber |
| − | <td height="120" align="center" bgcolor="# | + | <td height="120" align="center" bgcolor="#FFDF80" width="200" valign="middle" width="200">[[Scalable Application Assessments in the Enterprise]]<br>Tom Parker/Lars Ewe |
| − | <td height="120" align="center" bgcolor="# | + | <td height="120" align="center" bgcolor="#a0c0e0" width="200" valign="middle" width="200">[[Application security metrics from the organization on down to the vulnerabilities]]<br>Chris Wysopal |
| − | <td height="120" align="center" bgcolor="# | + | <td height="120" align="center" bgcolor="#B3FF99" width="200" valign="middle" width="200">[[SCAP: Automating our way out of the Vulnerability Wheel of Pain ]]<br>Ed Bellis |
<tr valign="bottom"> | <tr valign="bottom"> | ||
| − | <td height="120" bgcolor="# | + | <td height="120" bgcolor="#7B8ABD" width="67" valign="middle">12:30-13:30 |
| − | <td height="120" align="center" bgcolor="# | + | <td height="120" align="center" bgcolor="#c0a0a0" width="200" valign="middle" width="200">[[Fox in the Henhouse: Java Rootkits]]<br>Jeff Williams |
| − | <td height="120" align="center" bgcolor="# | + | <td height="120" align="center" bgcolor="#FFDF80" width="200" valign="middle" width="200">[[Secure Software Updates: Update Like Conficker]]<br>Jeremy Allen |
| − | <td height="120" align="center" bgcolor="# | + | <td height="120" align="center" bgcolor="#a0c0e0" width="200" valign="middle" width="200">[[OWASP Top 10 2009 AppSecDC|OWASP Top 10 2009]]<br>Dave Wichers |
| − | <td height="120" align="center" bgcolor="# | + | <td height="120" align="center" bgcolor="#B3FF99" width="200" valign="middle" width="200">[[Secure SDLC: The Good, The Bad, and The Ugly]]<br>Joey Peloquin |
<tr valign="bottom"> | <tr valign="bottom"> | ||
| − | <td height="60" bgcolor="# | + | <td height="60" bgcolor="#7B8ABD" width="67" valign="middle">13:30-14:30 |
<td height="60" colspan="4" align="center" bgcolor="#909090" valign="middle">Lunch | <td height="60" colspan="4" align="center" bgcolor="#909090" valign="middle">Lunch | ||
<tr valign="bottom"> | <tr valign="bottom"> | ||
| − | <td height="120" bgcolor="# | + | <td height="120" bgcolor="#7B8ABD" width="67" valign="middle">14:30-15:30 |
| − | <td height="120" align="center" bgcolor="# | + | <td height="120" align="center" bgcolor="#c0a0a0" width="200" valign="middle" width="200">[[TBD AppSecDC Robert Hansen|TBA]]<br>Robert Hansen |
| − | <td height="120" align="center" bgcolor="# | + | <td height="120" align="center" bgcolor="#FFDF80" width="200" valign="middle" width="200">[[Improving application security after an incident]]<br>Cory Scott |
| − | <td height="120" align="center" bgcolor="# | + | <td height="120" align="center" bgcolor="#a0c0e0" width="200" valign="middle" width="200">[[Hacking by Numbers]]<br>Tom Brennan |
| − | <td height="120" rowspan="2" align="center" bgcolor="# | + | <td height="120" rowspan="2" align="center" bgcolor="#B3FF99" width="200" valign="middle" width="200">[[AppSecDC09 Federal CIO Pannel|Federal CIO Pannel]] |
<tr valign="bottom"> | <tr valign="bottom"> | ||
| − | <td height="120" bgcolor="# | + | <td height="120" bgcolor="#7B8ABD" width="67" valign="middle">15:30-16:30 |
| − | <td height="120" align="center" bgcolor="# | + | <td height="120" align="center" bgcolor="#c0a0a0" width="200" valign="middle" width="200">[[Automated vs. Manual Security: You can't filter The Stupid]]<br>David Byrne/Charles Henderson |
| − | <td height="120" align="center" bgcolor="# | + | <td height="120" align="center" bgcolor="#FFDF80" width="200" valign="middle" width="200">[[Custom Intrusion Detection Techniques for Monitoring Web Applications]]<br>Matthew Olney |
| − | <td height="120" align="center" bgcolor="# | + | <td height="120" align="center" bgcolor="#a0c0e0" width="200" valign="middle" width="200">[[Building an in-house application security assessment team]]<br>Keith Turpin |
<tr valign="bottom"> | <tr valign="bottom"> | ||
| − | <td height="120" bgcolor="# | + | <td height="120" bgcolor="#7B8ABD" width="67" valign="middle">16:30-17:30 |
| − | <td height="120" align="center" bgcolor="# | + | <td height="120" align="center" bgcolor="#c0a0a0" width="200" valign="middle" width="200">[[Advanced SQL Injection]]<br>Joe McCray |
| − | <td height="120" align="center" bgcolor="# | + | <td height="120" align="center" bgcolor="#FFDF80" width="200" valign="middle" width="200">[[Is your organization secured against internal threats?]]<br>Lars Ewe |
| − | <td height="120" align="center" bgcolor="# | + | <td height="120" align="center" bgcolor="#a0c0e0" width="200" valign="middle" width="200">[[The OWASP Security Spending Benchmarks Project]]<br>Dr. Boaz Gelbord |
| − | <td height="120" align="center" bgcolor="# | + | <td height="120" align="center" bgcolor="#B3FF99" width="200" valign="middle" width="200">[[Promoting Application Security within Federal Government]]<br>Sarbari Gupta |
<tr valign="bottom"> | <tr valign="bottom"> | ||
| − | <td height="120" rowspan="2" bgcolor="# | + | <td height="120" rowspan="2" bgcolor="#7B8ABD" width="67" valign="middle">17:30-18:30 |
| − | <td height="60" align="center" bgcolor="# | + | <td height="60" align="center" bgcolor="#c0a0a0" width="200" valign="middle" width="200">[[Clubbing WebApps with a Botnet ]]<br>Gunter Ollmann |
| − | <td height="120" rowspan="2" align="center" bgcolor="# | + | <td height="120" rowspan="2" align="center" bgcolor="#FFDF80" width="200" valign="middle" width="200">[[Deploying Secure Web Applications with OWASP Resources]]<br>Kuai Hinojosa |
| − | <td height="120" rowspan="2" align="center" bgcolor="# | + | <td height="120" rowspan="2" align="center" bgcolor="#a0c0e0" width="200" valign="middle" width="200">[[SANS Dshield Webhoneypot Project]]<br>Jason Lam |
| − | <td height="120" rowspan="2" align="center" bgcolor="# | + | <td height="120" rowspan="2" align="center" bgcolor="#B3FF99" width="200" valign="middle" width="200">[[Techniques in Attacking and Defending XML/Web Services]]<br>Mamoon Yunus/Jason Macy |
<tr valign="bottom"> | <tr valign="bottom"> | ||
| − | <td height="60" align="center" bgcolor="# | + | <td height="60" align="center" bgcolor="#c0a0a0" width="200" valign="middle" width="200">[[Injectable Exploits: Two New Tools for Pwning Web Apps and Browsers]]<br>Kevin Johnson, Justin Searle, Frank DiMaggio |
<tr valign="bottom"> | <tr valign="bottom"> | ||
| − | <td height="60" bgcolor="# | + | <td height="60" bgcolor="#7B8ABD" width="67" valign="middle">18:30-19:00 |
<td height="60" colspan="4" align="center" bgcolor="#c0c0c0" valign="middle">Closing Remarks | <td height="60" colspan="4" align="center" bgcolor="#c0c0c0" valign="middle">Closing Remarks | ||
[[Category:OWASP_AppSec_DC_09]] | [[Category:OWASP_AppSec_DC_09]] | ||