This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Mrb Scratchpad"

From OWASP
Jump to: navigation, search
Line 1: Line 1:
<font size="2" face="Verdana">
+
<div style="">
<table border="2" cellspacing="0">
+
{| cellspacing="0" border="2"
<tr valign="middle">
+
|- valign="middle"
  <td height="60" colspan="5" align="center" bgcolor="#333399"><font size="5"><b>Day 1 - Nov 12th 2009</b>
+
| height="60" align="center" style="background: rgb(64, 88, 160) none repeat scroll 0% 0%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous; color: white;" colspan="5" | <font size="5">'''Day 1 - Nov 12th 2009'''</font>
<tr valign="bottom">
+
|- valign="bottom"
  <td height="40" bgcolor="#666699" width="67" valign="middle">&nbsp;
+
| valign="middle" height="40" width="67" bgcolor="#7b8abd" | &nbsp;  
  <td height="40" align="center" bgcolor="#ff0000" valign="middle" width="200"><b>OWASP</b>
+
| valign="middle" height="40" width="200" bgcolor="#c0a0a0" align="center" | '''OWASP'''
  <td height="40" align="center" bgcolor="#808000" valign="middle" width="200"><b>Tools</b>
+
| valign="middle" height="40" width="200" bgcolor="#ffdf80" align="center" | '''Tools'''
  <td height="40" align="center" bgcolor="#ccffcc" valign="middle" width="200"><b>SDLC</b>
+
| valign="middle" height="40" width="200" bgcolor="#a0c0e0" align="center" | '''SDLC'''
  <td height="40" align="center" bgcolor="#ff6600" valign="middle" width="200"><b>Web 2.0</b>
+
| valign="middle" height="40" width="200" bgcolor="#b3ff99" align="center" | '''Web 2.0'''
<tr valign="bottom">
+
|- valign="bottom"
  <td bgcolor="#666699" width="67" valign="middle">07:30-09:00
+
| valign="middle" width="67" bgcolor="#7b8abd" | 07:30-09:00  
  <td colspan="4" align="center" bgcolor="#909090" valign="middle">Registration
+
| valign="middle" bgcolor="#909090" align="center" colspan="4" | Registration
<tr valign="bottom">
+
|- valign="bottom"
  <td bgcolor="#666699" width="67" valign="middle">08:45-09:00
+
| valign="middle" width="67" bgcolor="#7b8abd" | 08:45-09:00  
  <td height="30" colspan="4" align="center" bgcolor="#e0e0e0" valign="middle">Welcome and Opening Remarks
+
| valign="middle" height="30" bgcolor="#e0e0e0" align="center" colspan="4" | Welcome and Opening Remarks
<tr valign="bottom">
+
|- valign="bottom"
  <td bgcolor="#666699" width="67" valign="middle">09:00-10:00
+
| valign="middle" width="67" bgcolor="#7b8abd" | 09:00-10:00  
  <td height="60" colspan="4" align="center" bgcolor="#e0e0e0" valign="middle">Keynote: [[AppSecDC Keynote Jarzomnek|Joe Jarzombek]]
+
| valign="middle" height="60" bgcolor="#e0e0e0" align="center" colspan="4" | Keynote: [[AppSecDC Keynote Jarzomnek|Joe Jarzombek]]
<tr valign="bottom">
+
|- valign="bottom"
  <td bgcolor="#666699" width="67" valign="middle">10:30-10:30
+
| valign="middle" width="67" bgcolor="#7b8abd" | 10:30-10:30  
  <td height="30" colspan="4" align="center" bgcolor="#909090" valign="middle">Coffee Break & Room Change
+
| valign="middle" height="30" bgcolor="#909090" align="center" colspan="4" | Coffee Break &amp; Room Change
<tr valign="bottom">
+
|- valign="bottom"
  <td bgcolor="#666699" width="67" valign="middle">10:30-11:30
+
| valign="middle" width="67" bgcolor="#7b8abd" | 10:30-11:30  
  <td height="120" align="center" bgcolor="#ff0000" width="200" valign="middle" width="200">[[OWASP ESAPI AppSecDC|OWASP ESAPI]]<br>Jeff Williams
+
| valign="middle" height="120" width="200" bgcolor="#c0a0a0" align="center" | [[OWASP ESAPI AppSecDC|OWASP ESAPI]]<br>Jeff Williams  
  <td height="120" align="center" bgcolor="#808000" width="200" valign="middle" width="200">[[Manipulating Web Application Interfaces, a new approach to input validation]]<br>Felipe Moreno-Strauch
+
| valign="middle" height="120" width="200" bgcolor="#ffdf80" align="center" | [[Manipulating Web Application Interfaces, a new approach to input validation]]<br>Felipe Moreno-Strauch  
  <td height="120" align="center" bgcolor="#ccffcc" width="200" valign="middle" width="200">[[Development Issues Within AJAX Applications: How to Divert Threats]]<br>Lars Ewe
+
| valign="middle" height="120" width="200" bgcolor="#a0c0e0" align="center" | [[Development Issues Within AJAX Applications: How to Divert Threats]]<br>Lars Ewe  
  <td height="120" align="center" bgcolor="#ff6600" width="200" valign="middle" width="200">[[Understanding the Implications of Cloud Computing on Application Security]]<br>Dennis Hurst
+
| valign="middle" height="120" width="200" bgcolor="#b3ff99" align="center" | [[Understanding the Implications of Cloud Computing on Application Security]]<br>Dennis Hurst
<tr valign="bottom">
+
|- valign="bottom"
  <td height="120" bgcolor="#666699" width="67" valign="middle">11:30-12:30
+
| valign="middle" height="120" width="67" bgcolor="#7b8abd" | 11:30-12:30  
  <td height="120" align="center" bgcolor="#ff0000" width="200" valign="middle" width="200">[[Software Assurance Maturity Model (SAMM)]]<br>Pravir Chandra
+
| valign="middle" height="120" width="200" bgcolor="#c0a0a0" align="center" | [[Software Assurance Maturity Model (SAMM)]]<br>Pravir Chandra  
  <td height="120" align="center" bgcolor="#808000" width="200" valign="middle" width="200">[[The Case of Promiscuous Parameters and Other Ongoing Capers in Web Security]]<br>Jacob West
+
| valign="middle" height="120" width="200" bgcolor="#ffdf80" align="center" | [[The Case of Promiscuous Parameters and Other Ongoing Capers in Web Security]]<br>Jacob West  
  <td height="120" align="center" bgcolor="#ccffcc" width="200" valign="middle" width="200">[[Enterprise Application Security - GE's approach to solving root cause and establishing a Center of Excellence | Enterprise Application Security - GE's approach to solving root cause]]<br>Darren Challey
+
| valign="middle" height="120" width="200" bgcolor="#a0c0e0" align="center" | [[Enterprise Application Security - GE's approach to solving root cause and establishing a Center of Excellence|Enterprise Application Security - GE's approach to solving root cause]]<br>Darren Challey  
  <td height="120" align="center" bgcolor="#ff6600" width="200" valign="middle" width="200">[[Transparent Proxy Abuse]]<br>Robert Auger
+
| valign="middle" height="120" width="200" bgcolor="#b3ff99" align="center" | [[Transparent Proxy Abuse]]<br>Robert Auger
<tr valign="bottom">
+
|- valign="bottom"
  <td height="120" bgcolor="#666699" width="67" valign="middle">12:30-13:30
+
| valign="middle" height="120" width="67" bgcolor="#7b8abd" | 12:30-13:30  
  <td height="120" align="center" bgcolor="#ff0000" width="200" valign="middle" width="200">[[DISA's Application Security and Development STIG: How OWASP Can Help You]]<br>Jason Li
+
| valign="middle" height="120" width="200" bgcolor="#c0a0a0" align="center" | [[DISA's Application Security and Development STIG: How OWASP Can Help You]]<br>Jason Li  
  <td height="120" align="center" bgcolor="#808000" width="200" valign="middle" width="200">[[OWASP ModSecurity Core Rule Set Project]]<br>Ryan C. Barnett
+
| valign="middle" height="120" width="200" bgcolor="#ffdf80" align="center" | [[OWASP ModSecurity Core Rule Set Project]]<br>Ryan C. Barnett  
  <td height="120" align="center" bgcolor="#ccffcc" width="200" valign="middle" width="200">[[The essential role of infosec in secure software development]]<br>Kenneth R. van Wyk
+
| valign="middle" height="120" width="200" bgcolor="#a0c0e0" align="center" | [[The essential role of infosec in secure software development]]<br>Kenneth R. van Wyk  
  <td height="120" align="center" bgcolor="#ff6600" width="200" valign="middle" width="200">[[Fracturing Flex For Fun- An Alliterative Attackers Approach]]<br>Jon Rose/Kevin Stadmeyer
+
| valign="middle" height="120" width="200" bgcolor="#b3ff99" align="center" | [[Fracturing Flex For Fun- An Alliterative Attackers Approach]]<br>Jon Rose/Kevin Stadmeyer
<tr valign="bottom">
+
|- valign="bottom"
  <td height="60" bgcolor="#666699" width="67" valign="middle">13:30-14:30
+
| valign="middle" height="60" width="67" bgcolor="#7b8abd" | 13:30-14:30  
  <td height="60" colspan="4" align="center" bgcolor="#909090" valign="middle">Lunch
+
| valign="middle" height="60" bgcolor="#909090" align="center" colspan="4" | Lunch
<tr valign="bottom">
+
|- valign="bottom"
  <td height="120" bgcolor="#666699" width="67" valign="middle">14:30-15:30
+
| valign="middle" height="120" width="67" bgcolor="#7b8abd" | 14:30-15:30  
  <td height="60" align="center" bgcolor="#ff0000" width="200" valign="middle" width="200">[[ Defend Yourself: Integrating Real Time Defenses into Online Applications]]<br>Michael Coates
+
| valign="middle" height="60" width="200" bgcolor="#c0a0a0" align="center" | [[Defend Yourself: Integrating Real Time Defenses into Online Applications]]<br>Michael Coates  
  <td height="60" align="center" bgcolor="#808000" width="200" valign="middle" width="200">[[Finding the Hotspots: Web-security testing with the Watcher tool]]<br>Chris Weber
+
| valign="middle" height="60" width="200" bgcolor="#ffdf80" align="center" | [[Finding the Hotspots: Web-security testing with the Watcher tool]]<br>Chris Weber  
  <td height="120" rowspan="3" align="center" bgcolor="#ccffcc" width="200" valign="middle" width="200">[[SDLC Pannel AppSecDC | SDLC Panel]]
+
| valign="middle" height="120" width="200" bgcolor="#a0c0e0" align="center" rowspan="3" | [[SDLC Pannel AppSecDC|SDLC Panel]]  
  <td height="120" align="center" bgcolor="#ff6600" width="200" valign="middle" width="200">[[Social Zombies: Your Friends Want to Eat Your Brains]]<br>Tom Eston/Kevin Johnson
+
| valign="middle" height="120" width="200" bgcolor="#b3ff99" align="center" | [[Social Zombies: Your Friends Want to Eat Your Brains]]<br>Tom Eston/Kevin Johnson
<tr valign="bottom">
+
|- valign="bottom"
  <td height="120" rowspan="2" bgcolor="#666699" width="67" valign="middle">15:30-16:30
+
| valign="middle" height="120" width="67" bgcolor="#7b8abd" rowspan="2" | 15:30-16:30  
  <td height="120" rowspan="2" align="center" bgcolor="#ff0000" width="200" valign="middle" width="200">[[The ESAPI Web Application Firewall (ESAPI WAF)|The ESAPI Web Application Firewall]]<br>Arshan Dabirsiaghi
+
| valign="middle" height="120" width="200" bgcolor="#c0a0a0" align="center" rowspan="2" | [[The ESAPI Web Application Firewall (ESAPI WAF)|The ESAPI Web Application Firewall]]<br>Arshan Dabirsiaghi  
  <td height="60" align="center" bgcolor="#808000" width="200" valign="middle" width="200">[[One Click Ownage]]<br>Ferruh Mavituna
+
| valign="middle" height="60" width="200" bgcolor="#ffdf80" align="center" | [[One Click Ownage]]<br>Ferruh Mavituna  
  <td height="120" rowspan="2" align="center" bgcolor="#ff6600" width="200" valign="middle" width="200">[[Cloudy with a chance of 0-day]]<br>Jon Rose/Tom Leavey
+
| valign="middle" height="120" width="200" bgcolor="#b3ff99" align="center" rowspan="2" | [[Cloudy with a chance of 0-day]]<br>Jon Rose/Tom Leavey
<tr valign="bottom">
+
|- valign="bottom"
  <td height="60" align="center" bgcolor="#808000" width="200" valign="middle" width="200">[[Web Application Security Scanner Evaluation Criteria]]<br>Brian Shura
+
| valign="middle" height="60" width="200" bgcolor="#ffdf80" align="center" | [[Web Application Security Scanner Evaluation Criteria]]<br>Brian Shura
<tr valign="bottom">
+
|- valign="bottom"
  <td height="120" rowspan="2" bgcolor="#666699" width="67" valign="middle">16:30-17:30
+
| valign="middle" height="120" width="67" bgcolor="#7b8abd" rowspan="2" | 16:30-17:30  
  <td height="120" rowspan="2" align="center" bgcolor="#ff0000" width="200" valign="middle" width="200">[[OWASP Live CD: An open environment for Web Application Security]]<br>Matt Tesauro / Brad Causey
+
| valign="middle" height="120" width="200" bgcolor="#c0a0a0" align="center" rowspan="2" | [[OWASP Live CD: An open environment for Web Application Security]]<br>Matt Tesauro / Brad Causey  
  <td height="60" align="center" bgcolor="#808000" width="200" valign="middle" width="200">[[Learning by Breaking: A New Project Insecure Web Apps]]<br>Chuck Willis
+
| valign="middle" height="60" width="200" bgcolor="#ffdf80" align="center" | [[Learning by Breaking: A New Project Insecure Web Apps]]<br>Chuck Willis  
  <td height="120" rowspan="2" align="center" bgcolor="#ccffcc" width="200" valign="middle" width="200">[[Vulnerability Management in an Application Security World]]<br>Dan Cornell
+
| valign="middle" height="120" width="200" bgcolor="#a0c0e0" align="center" rowspan="2" | [[Vulnerability Management in an Application Security World]]<br>Dan Cornell  
  <td height="120" rowspan="2" align="center" bgcolor="#ff6600" width="200" valign="middle" width="200">[[Attacking WCF Web Services]]<br>Brian Holyfield
+
| valign="middle" height="120" width="200" bgcolor="#b3ff99" align="center" rowspan="2" | [[Attacking WCF Web Services]]<br>Brian Holyfield
<tr valign="bottom">
+
|- valign="bottom"
  <td height="60" align="center" bgcolor="#808000" width="200" valign="middle" width="200">[[Synergy! An intregrated OWASP Audit: A world where the tools communicate|Synergy! - A world where the tools communicate]]<br>
+
| valign="middle" height="60" width="200" bgcolor="#ffdf80" align="center" | [[Synergy! An intregrated OWASP Audit: A world where the tools communicate|Synergy! - A world where the tools communicate]]<br>  
  Josh Abraham
+
Josh Abraham  
<tr valign="bottom">
+
 
  <td height="120" rowspan="2" bgcolor="#666699" width="67" valign="middle">17:30-18:30
+
|- valign="bottom"
  <td height="120" rowspan="2" align="center" bgcolor="#ff0000" width="200" valign="middle" width="200">[[The Entrepreneur's Guide to Career Management]]<br>Lee Kushner
+
| valign="middle" height="120" width="67" bgcolor="#7b8abd" rowspan="2" | 17:30-18:30  
  <td height="60" align="center" bgcolor="#808000" width="200" valign="middle" width="200">[[Advanced SSL: The good, the bad, and the ugly]]<br>Michael Coats
+
| valign="middle" height="120" width="200" bgcolor="#c0a0a0" align="center" rowspan="2" | [[The Entrepreneur's Guide to Career Management]]<br>Lee Kushner  
  <td height="120" rowspan="2" align="center" bgcolor="#ccffcc" width="200" valign="middle" width="200">[[Threat Modeling by John Steven|Threat Modeling]]<br>John Steven
+
| valign="middle" height="60" width="200" bgcolor="#ffdf80" align="center" | [[Advanced SSL: The good, the bad, and the ugly]]<br>Michael Coats  
  <td height="120" rowspan="2" align="center" bgcolor="#ff6600" width="200" valign="middle" width="200">[[When Web 2.0 Attacks - Understanding Security Implications of AJAX, Flash and "Highly Interactive" Technologies]]<br>Rafal Los
+
| valign="middle" height="120" width="200" bgcolor="#a0c0e0" align="center" rowspan="2" | [[Threat Modeling by John Steven|Threat Modeling]]<br>John Steven  
<tr valign="bottom">
+
| valign="middle" height="120" width="200" bgcolor="#b3ff99" align="center" rowspan="2" | [[When Web 2.0 Attacks - Understanding Security Implications of AJAX, Flash and |When Web 2.0 Attacks - Understanding Security Implications of AJAX, Flash and "Highly Interactive" Technologies]]<br>Rafal Los
  <td height="60" align="center" bgcolor="#808000" width="200" valign="middle" width="200">[[User input piercing for Cross Site Scripting Attacks]]<br>Matias Blanco
+
|- valign="bottom"
<tr valign="bottom">
+
| valign="middle" height="60" width="200" bgcolor="#ffdf80" align="center" | [[User input piercing for Cross Site Scripting Attacks]]<br>Matias Blanco
  <td height="60" bgcolor="#666699" width="67" valign="middle">19:00-????
+
|- valign="bottom"
  <td height="60" colspan="4" align="center" bgcolor="#c0c0c0" valign="middle">Reception
+
| valign="middle" height="60" width="67" bgcolor="#7b8abd" | 19:00-????  
<!-- Day 2 -->
+
| valign="middle" height="60" bgcolor="#c0c0c0" align="center" colspan="4" | Reception <!-- Day 2 -->
<tr valign="middle">
+
|- valign="middle"
  <td height="60" colspan="5">
+
| height="60" colspan="5" |
<tr valign="middle">
+
|- valign="middle"
  <td height="60" colspan="5" align="center" bgcolor="#333399"><font size="5"><b>Day 2 - Nov 13th 2009</b>
+
| height="60" align="center" style="background: rgb(64, 88, 160) none repeat scroll 0% 0%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous; color: white;" colspan="5" | <font size="5">'''Day 2 - Nov 13th 2009'''</font>
<tr valign="bottom">
+
|- valign="bottom"
  <td height="40" bgcolor="#666699" width="67" valign="middle">&nbsp;
+
| valign="middle" height="40" width="67" bgcolor="#7b8abd" | &nbsp;  
  <td height="40" align="center" bgcolor="#ff0000" valign="middle" width="200"><b>Attack & Defend</b>
+
| valign="middle" height="40" width="200" bgcolor="#c0a0a0" align="center" | '''Attack &amp; Defend'''
  <td height="40" align="center" bgcolor="#808000" valign="middle" width="200"><b>Process</b>
+
| valign="middle" height="40" width="200" bgcolor="#ffdf80" align="center" | '''Process'''
  <td height="40" align="center" bgcolor="#ccffcc" valign="middle" width="200"><b>Metrics</b>
+
| valign="middle" height="40" width="200" bgcolor="#a0c0e0" align="center" | '''Metrics'''
  <td height="40" align="center" bgcolor="#ff6600" valign="middle" width="200"><b>Compliance</b>
+
| valign="middle" height="40" width="200" bgcolor="#b3ff99" align="center" | '''Compliance'''
<tr valign="bottom">
+
|- valign="bottom"
  <td bgcolor="#666699" width="67" valign="middle">07:30-09:00
+
| valign="middle" width="67" bgcolor="#7b8abd" | 07:30-09:00  
  <td colspan="4" align="center" bgcolor="#909090" valign="middle">Registration
+
| valign="middle" bgcolor="#909090" align="center" colspan="4" | Registration
<tr valign="bottom">
+
|- valign="bottom"
  <td bgcolor="#666699" width="67" valign="middle">09:00-10:00
+
| valign="middle" width="67" bgcolor="#7b8abd" | 09:00-10:00  
  <td height="60" colspan="4" align="center" bgcolor="#e0e0e0" valign="middle">Keynote: TBA
+
| valign="middle" height="60" bgcolor="#e0e0e0" align="center" colspan="4" | Keynote: TBA
<tr valign="bottom">
+
|- valign="bottom"
  <td bgcolor="#666699" width="67" valign="middle">10:30-10:30
+
| valign="middle" width="67" bgcolor="#7b8abd" | 10:30-10:30  
  <td height="30" colspan="4" align="center" bgcolor="#909090" valign="middle">Coffee Break & Room Change
+
| valign="middle" height="30" bgcolor="#909090" align="center" colspan="4" | Coffee Break &amp; Room Change
<tr valign="bottom">
+
|- valign="bottom"
  <td bgcolor="#666699" width="67" valign="middle">10:30-11:30
+
| valign="middle" width="67" bgcolor="#7b8abd" | 10:30-11:30  
  <td height="120" align="center" bgcolor="#ff0000" width="200" valign="middle" width="200">[[Securing the Core JEE Patterns]]<br>Rohit Sethi/Krishna Raja
+
| valign="middle" height="120" width="200" bgcolor="#c0a0a0" align="center" | [[Securing the Core JEE Patterns]]<br>Rohit Sethi/Krishna Raja  
  <td height="120" align="center" bgcolor="#808000" width="200" valign="middle" width="200">[[The Big Picture: Web Risks and Assessments Beyond Scanning]]<br>Matt Fisher
+
| valign="middle" height="120" width="200" bgcolor="#ffdf80" align="center" | [[The Big Picture: Web Risks and Assessments Beyond Scanning]]<br>Matt Fisher  
  <td height="120" align="center" bgcolor="#ccffcc" width="200" valign="middle" width="200">[[The Web Hacking Incidents Database]]<br>Ryan C. Barnett
+
| valign="middle" height="120" width="200" bgcolor="#a0c0e0" align="center" | [[The Web Hacking Incidents Database]]<br>Ryan C. Barnett  
  <td height="120" align="center" bgcolor="#ff6600" width="200" valign="middle" width="200">[[Business Logic Automatons: Friend or Foe?]]<br>Ofer Shezaf
+
| valign="middle" height="120" width="200" bgcolor="#b3ff99" align="center" | [[Business Logic Automatons: Friend or Foe?]]<br>Ofer Shezaf
<tr valign="bottom">
+
|- valign="bottom"
  <td height="120" bgcolor="#666699" width="67" valign="middle">11:30-12:30
+
| valign="middle" height="120" width="67" bgcolor="#7b8abd" | 11:30-12:30  
  <td height="120" align="center" bgcolor="#ff0000" width="200" valign="middle" width="200">[[Unicode Transformations: Finding Elusive Vulnerabilities]]<br>Chris Weber
+
| valign="middle" height="120" width="200" bgcolor="#c0a0a0" align="center" | [[Unicode Transformations: Finding Elusive Vulnerabilities]]<br>Chris Weber  
  <td height="120" align="center" bgcolor="#808000" width="200" valign="middle" width="200">[[Scalable Application Assessments in the Enterprise]]<br>Tom Parker/Lars Ewe
+
| valign="middle" height="120" width="200" bgcolor="#ffdf80" align="center" | [[Scalable Application Assessments in the Enterprise]]<br>Tom Parker/Lars Ewe  
  <td height="120" align="center" bgcolor="#ccffcc" width="200" valign="middle" width="200">[[Application security metrics from the organization on down to the vulnerabilities]]<br>Chris Wysopal
+
| valign="middle" height="120" width="200" bgcolor="#a0c0e0" align="center" | [[Application security metrics from the organization on down to the vulnerabilities]]<br>Chris Wysopal  
  <td height="120" align="center" bgcolor="#ff6600" width="200" valign="middle" width="200">[[SCAP: Automating our way out of the Vulnerability Wheel of Pain ]]<br>Ed Bellis
+
| valign="middle" height="120" width="200" bgcolor="#b3ff99" align="center" | [[SCAP: Automating our way out of the Vulnerability Wheel of Pain]]<br>Ed Bellis
<tr valign="bottom">
+
|- valign="bottom"
  <td height="120" bgcolor="#666699" width="67" valign="middle">12:30-13:30
+
| valign="middle" height="120" width="67" bgcolor="#7b8abd" | 12:30-13:30  
  <td height="120" align="center" bgcolor="#ff0000" width="200" valign="middle" width="200">[[Fox in the Henhouse: Java Rootkits]]<br>Jeff Williams
+
| valign="middle" height="120" width="200" bgcolor="#c0a0a0" align="center" | [[Fox in the Henhouse: Java Rootkits]]<br>Jeff Williams  
  <td height="120" align="center" bgcolor="#808000" width="200" valign="middle" width="200">[[Secure Software Updates: Update Like Conficker]]<br>Jeremy Allen
+
| valign="middle" height="120" width="200" bgcolor="#ffdf80" align="center" | [[Secure Software Updates: Update Like Conficker]]<br>Jeremy Allen  
  <td height="120" align="center" bgcolor="#ccffcc" width="200" valign="middle" width="200">[[OWASP Top 10 2009 AppSecDC|OWASP Top 10 2009]]<br>Dave Wichers
+
| valign="middle" height="120" width="200" bgcolor="#a0c0e0" align="center" | [[OWASP Top 10 2009 AppSecDC|OWASP Top 10 2009]]<br>Dave Wichers  
  <td height="120" align="center" bgcolor="#ff6600" width="200" valign="middle" width="200">[[Secure SDLC: The Good, The Bad, and The Ugly]]<br>Joey Peloquin
+
| valign="middle" height="120" width="200" bgcolor="#b3ff99" align="center" | [[Secure SDLC: The Good, The Bad, and The Ugly]]<br>Joey Peloquin
<tr valign="bottom">
+
|- valign="bottom"
  <td height="60" bgcolor="#666699" width="67" valign="middle">13:30-14:30
+
| valign="middle" height="60" width="67" bgcolor="#7b8abd" | 13:30-14:30  
  <td height="60" colspan="4" align="center" bgcolor="#909090" valign="middle">Lunch
+
| valign="middle" height="60" bgcolor="#909090" align="center" colspan="4" | Lunch
<tr valign="bottom">
+
|- valign="bottom"
  <td height="120" bgcolor="#666699" width="67" valign="middle">14:30-15:30
+
| valign="middle" height="120" width="67" bgcolor="#7b8abd" | 14:30-15:30  
  <td height="120" align="center" bgcolor="#ff0000" width="200" valign="middle" width="200">[[TBD AppSecDC Robert Hansen|TBA]]<br>Robert Hansen
+
| valign="middle" height="120" width="200" bgcolor="#c0a0a0" align="center" | [[TBD AppSecDC Robert Hansen|TBA]]<br>Robert Hansen  
  <td height="120" align="center" bgcolor="#808000" width="200" valign="middle" width="200">[[Improving application security after an incident]]<br>Cory Scott
+
| valign="middle" height="120" width="200" bgcolor="#ffdf80" align="center" | [[Improving application security after an incident]]<br>Cory Scott  
  <td height="120" align="center" bgcolor="#ccffcc" width="200" valign="middle" width="200">[[Hacking by Numbers]]<br>Tom Brennan
+
| valign="middle" height="120" width="200" bgcolor="#a0c0e0" align="center" | [[Hacking by Numbers]]<br>Tom Brennan  
  <td height="120" rowspan="2" align="center" bgcolor="#ff6600" width="200" valign="middle" width="200">[[AppSecDC09 Federal CIO Pannel|Federal CIO Pannel]]
+
| valign="middle" height="120" width="200" bgcolor="#b3ff99" align="center" rowspan="2" | [[AppSecDC09 Federal CIO Pannel|Federal CIO Pannel]]
<tr valign="bottom">
+
|- valign="bottom"
  <td height="120" bgcolor="#666699" width="67" valign="middle">15:30-16:30
+
| valign="middle" height="120" width="67" bgcolor="#7b8abd" | 15:30-16:30  
  <td height="120" align="center" bgcolor="#ff0000" width="200" valign="middle" width="200">[[Automated vs. Manual Security: You can't filter The Stupid]]<br>David Byrne/Charles Henderson
+
| valign="middle" height="120" width="200" bgcolor="#c0a0a0" align="center" | [[Automated vs. Manual Security: You can't filter The Stupid]]<br>David Byrne/Charles Henderson  
  <td height="120" align="center" bgcolor="#808000" width="200" valign="middle" width="200">[[Custom Intrusion Detection Techniques for Monitoring Web Applications]]<br>Matthew Olney
+
| valign="middle" height="120" width="200" bgcolor="#ffdf80" align="center" | [[Custom Intrusion Detection Techniques for Monitoring Web Applications]]<br>Matthew Olney  
  <td height="120" align="center" bgcolor="#ccffcc" width="200" valign="middle" width="200">[[Building an in-house application security assessment team]]<br>Keith Turpin
+
| valign="middle" height="120" width="200" bgcolor="#a0c0e0" align="center" | [[Building an in-house application security assessment team]]<br>Keith Turpin
<tr valign="bottom">
+
|- valign="bottom"
  <td height="120" bgcolor="#666699" width="67" valign="middle">16:30-17:30
+
| valign="middle" height="120" width="67" bgcolor="#7b8abd" | 16:30-17:30  
  <td height="120" align="center" bgcolor="#ff0000" width="200" valign="middle" width="200">[[Advanced SQL Injection]]<br>Joe McCray
+
| valign="middle" height="120" width="200" bgcolor="#c0a0a0" align="center" | [[Advanced SQL Injection]]<br>Joe McCray  
  <td height="120" align="center" bgcolor="#808000" width="200" valign="middle" width="200">[[Is your organization secured against internal threats?]]<br>Lars Ewe
+
| valign="middle" height="120" width="200" bgcolor="#ffdf80" align="center" | [[Is your organization secured against internal threats?]]<br>Lars Ewe  
  <td height="120" align="center" bgcolor="#ccffcc" width="200" valign="middle" width="200">[[The OWASP Security Spending Benchmarks Project]]<br>Dr. Boaz Gelbord
+
| valign="middle" height="120" width="200" bgcolor="#a0c0e0" align="center" | [[The OWASP Security Spending Benchmarks Project]]<br>Dr. Boaz Gelbord  
  <td height="120" align="center" bgcolor="#ff6600" width="200" valign="middle" width="200">[[Promoting Application Security within Federal Government]]<br>Sarbari Gupta
+
| valign="middle" height="120" width="200" bgcolor="#b3ff99" align="center" | [[Promoting Application Security within Federal Government]]<br>Sarbari Gupta
<tr valign="bottom">
+
|- valign="bottom"
  <td height="120" rowspan="2" bgcolor="#666699" width="67" valign="middle">17:30-18:30
+
| valign="middle" height="120" width="67" bgcolor="#7b8abd" rowspan="2" | 17:30-18:30  
  <td height="60" align="center" bgcolor="#ff0000" width="200" valign="middle" width="200">[[Clubbing WebApps with a Botnet ]]<br>Gunter Ollmann  
+
| valign="middle" height="60" width="200" bgcolor="#c0a0a0" align="center" | [[Clubbing WebApps with a Botnet]]<br>Gunter Ollmann  
  <td height="120" rowspan="2" align="center" bgcolor="#808000" width="200" valign="middle" width="200">[[Deploying Secure Web Applications with OWASP Resources]]<br>Kuai Hinojosa
+
| valign="middle" height="120" width="200" bgcolor="#ffdf80" align="center" rowspan="2" | [[Deploying Secure Web Applications with OWASP Resources]]<br>Kuai Hinojosa  
  <td height="120" rowspan="2" align="center" bgcolor="#ccffcc" width="200" valign="middle" width="200">[[SANS Dshield Webhoneypot Project]]<br>Jason Lamn
+
| valign="middle" height="120" width="200" bgcolor="#a0c0e0" align="center" rowspan="2" | [[SANS Dshield Webhoneypot Project]]<br>Jason Lam
  <td height="120" rowspan="2" align="center" bgcolor="#ff6600" width="200" valign="middle" width="200">[[Techniques in Attacking and Defending XML/Web Services]]<br>Mamoon Yunus/Jason Macy
+
| valign="middle" height="120" width="200" bgcolor="#b3ff99" align="center" rowspan="2" | [[Techniques in Attacking and Defending XML/Web Services]]<br>Mamoon Yunus/Jason Macy
<tr valign="bottom">
+
|- valign="bottom"
  <td height="60" align="center" bgcolor="#ff0000" width="200" valign="middle" width="200">[[Injectable Exploits: Two New Tools for Pwning Web Apps and Browsers]]<br>Kevin Johnson, Justin Searle, Frank DiMaggio
+
| valign="middle" height="60" width="200" bgcolor="#c0a0a0" align="center" | [[Injectable Exploits: Two New Tools for Pwning Web Apps and Browsers]]<br>Kevin Johnson, Justin Searle, Frank DiMaggio
<tr valign="bottom">
+
|- valign="bottom"
  <td height="60" bgcolor="#666699" width="67" valign="middle">18:30-19:00
+
| valign="middle" height="60" width="67" bgcolor="#7b8abd" | 18:30-19:00  
  <td height="60" colspan="4" align="center" bgcolor="#c0c0c0" valign="middle">Closing Remarks
+
| valign="middle" height="60" bgcolor="#c0c0c0" align="center" colspan="4" | Closing Remarks  
</font>
+
 
 +
 
 +
|}
 +
</div>  
 +
[[Category:OWASP_AppSec_DC_09]]

Revision as of 14:24, 21 August 2009

Day 1 - Nov 12th 2009
  OWASP Tools SDLC Web 2.0
07:30-09:00 Registration
08:45-09:00 Welcome and Opening Remarks
09:00-10:00 Keynote: Joe Jarzombek
10:30-10:30 Coffee Break & Room Change
10:30-11:30 OWASP ESAPI
Jeff Williams
Manipulating Web Application Interfaces, a new approach to input validation
Felipe Moreno-Strauch
Development Issues Within AJAX Applications: How to Divert Threats
Lars Ewe
Understanding the Implications of Cloud Computing on Application Security
Dennis Hurst
11:30-12:30 Software Assurance Maturity Model (SAMM)
Pravir Chandra
The Case of Promiscuous Parameters and Other Ongoing Capers in Web Security
Jacob West
Enterprise Application Security - GE's approach to solving root cause
Darren Challey
Transparent Proxy Abuse
Robert Auger
12:30-13:30 DISA's Application Security and Development STIG: How OWASP Can Help You
Jason Li
OWASP ModSecurity Core Rule Set Project
Ryan C. Barnett
The essential role of infosec in secure software development
Kenneth R. van Wyk
Fracturing Flex For Fun- An Alliterative Attackers Approach
Jon Rose/Kevin Stadmeyer
13:30-14:30 Lunch
14:30-15:30 Defend Yourself: Integrating Real Time Defenses into Online Applications
Michael Coates
Finding the Hotspots: Web-security testing with the Watcher tool
Chris Weber
SDLC Panel Social Zombies: Your Friends Want to Eat Your Brains
Tom Eston/Kevin Johnson
15:30-16:30 The ESAPI Web Application Firewall
Arshan Dabirsiaghi
One Click Ownage
Ferruh Mavituna
Cloudy with a chance of 0-day
Jon Rose/Tom Leavey
Web Application Security Scanner Evaluation Criteria
Brian Shura
16:30-17:30 OWASP Live CD: An open environment for Web Application Security
Matt Tesauro / Brad Causey
Learning by Breaking: A New Project Insecure Web Apps
Chuck Willis
Vulnerability Management in an Application Security World
Dan Cornell
Attacking WCF Web Services
Brian Holyfield
Synergy! - A world where the tools communicate

Josh Abraham

17:30-18:30 The Entrepreneur's Guide to Career Management
Lee Kushner
Advanced SSL: The good, the bad, and the ugly
Michael Coats
Threat Modeling
John Steven
When Web 2.0 Attacks - Understanding Security Implications of AJAX, Flash and "Highly Interactive" Technologies
Rafal Los
User input piercing for Cross Site Scripting Attacks
Matias Blanco
19:00-???? Reception
Day 2 - Nov 13th 2009
  Attack & Defend Process Metrics Compliance
07:30-09:00 Registration
09:00-10:00 Keynote: TBA
10:30-10:30 Coffee Break & Room Change
10:30-11:30 Securing the Core JEE Patterns
Rohit Sethi/Krishna Raja
The Big Picture: Web Risks and Assessments Beyond Scanning
Matt Fisher
The Web Hacking Incidents Database
Ryan C. Barnett
Business Logic Automatons: Friend or Foe?
Ofer Shezaf
11:30-12:30 Unicode Transformations: Finding Elusive Vulnerabilities
Chris Weber
Scalable Application Assessments in the Enterprise
Tom Parker/Lars Ewe
Application security metrics from the organization on down to the vulnerabilities
Chris Wysopal
SCAP: Automating our way out of the Vulnerability Wheel of Pain
Ed Bellis
12:30-13:30 Fox in the Henhouse: Java Rootkits
Jeff Williams
Secure Software Updates: Update Like Conficker
Jeremy Allen
OWASP Top 10 2009
Dave Wichers
Secure SDLC: The Good, The Bad, and The Ugly
Joey Peloquin
13:30-14:30 Lunch
14:30-15:30 TBA
Robert Hansen
Improving application security after an incident
Cory Scott
Hacking by Numbers
Tom Brennan
Federal CIO Pannel
15:30-16:30 Automated vs. Manual Security: You can't filter The Stupid
David Byrne/Charles Henderson
Custom Intrusion Detection Techniques for Monitoring Web Applications
Matthew Olney
Building an in-house application security assessment team
Keith Turpin
16:30-17:30 Advanced SQL Injection
Joe McCray
Is your organization secured against internal threats?
Lars Ewe
The OWASP Security Spending Benchmarks Project
Dr. Boaz Gelbord
Promoting Application Security within Federal Government
Sarbari Gupta
17:30-18:30 Clubbing WebApps with a Botnet
Gunter Ollmann
Deploying Secure Web Applications with OWASP Resources
Kuai Hinojosa
SANS Dshield Webhoneypot Project
Jason Lam
Techniques in Attacking and Defending XML/Web Services
Mamoon Yunus/Jason Macy
Injectable Exploits: Two New Tools for Pwning Web Apps and Browsers
Kevin Johnson, Justin Searle, Frank DiMaggio
18:30-19:00 Closing Remarks