This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Mrb Scratchpad"
From OWASP
Mark.bristow (talk | contribs) |
Mark.bristow (talk | contribs) |
||
| Line 1: | Line 1: | ||
__NOTOC__ | __NOTOC__ | ||
| − | [[ | + | ===[[OWASP AppSec DC 2009|Back to Conference Page]]=== |
| − | + | Please note, speaking times are not final, check back regularly for updates. | |
| − | + | ====Training 11/10==== | |
| − | + | {| cellspacing="0" border="2" | |
| − | + | |- valign="middle" | |
| − | ==== | + | | height="60" align="center" colspan="6" style="background: rgb(64, 88, 160) none repeat scroll 0% 0%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous; color: white;" | <font size="5">'''Day 1 - Nov 10th 2009'''</font> |
| − | + | |- valign="bottom" | |
| − | {| | + | | width="67" valign="middle" height="40" bgcolor="#7b8abd" | |
| − | | | + | | width="150" valign="middle" height="40" bgcolor="#c0a0a0" align="center" | '''Room 154A''' |
| − | + | | width="150" valign="middle" height="40" bgcolor="#ffdf80" align="center" | '''Room 149B''' | |
| − | + | | width="150" valign="middle" height="40" bgcolor="#a0c0e0" align="center" | '''Room 149A''' | |
| − | |- | + | | width="150" valign="middle" height="40" bgcolor="#b3ff99" align="center" | '''Room 154B''' |
| − | | | + | | width="150" valign="middle" height="40" bgcolor="#BCA57A" align="center" | '''Room 155''' |
| − | + | |- valign="bottom" | |
| − | ''' | + | | width="67" valign="middle" bgcolor="#7b8abd" | 09:00-12:00 |
| − | + | | width="150" valign="middle" height="120" bgcolor="#c0a0a0" align="center" | Day 1:<br>Assessing and Exploiting Web Applications with the open source Samurai Web Testing Framework<br> Justin Searle | |
| − | + | | width="150" valign="middle" height="120" bgcolor="#ffdf80" align="center" | Day 1:<br>Java EE Secure Code Review<br>Sahba Kazerooni<br>[http://www.securitycompass.com Security Compass] | |
| − | + | | width="150" valign="middle" height="120" bgcolor="#a0c0e0" align="center" | Threat Modeling Express<br>Krishna Raja<br>[http://www.securitycompass.com Security Compass] | |
| − | + | | width="150" valign="middle" height="120" bgcolor="#b3ff99" align="center" | Foundations of Web Services and XML Security<br>Dave Wichers<br>[http://www.aspectsecurity.com Aspect Security] | |
| − | + | | width="150" valign="middle" height="120" bgcolor="#BCA57A" align="center" | Live CD<br>Matt Tesauro | |
| − | + | |- valign="bottom" | |
| − | + | | width="67" valign="middle" height="40" bgcolor="#7b8abd" | 12:00-13:00 | |
| − | + | | valign="middle" height="40" bgcolor="#909090" align="center" colspan="5" | Lunch | |
| − | + | |- valign="bottom" | |
| − | + | | width="67" valign="middle" bgcolor="#7b8abd" | 13:00-17:00 | |
| − | + | | width="150" valign="middle" height="120" bgcolor="#c0a0a0" align="center" | Assessing and Exploiting Web Applications with the open source Samurai Web Testing Framework<br> Justin Searle | |
| − | + | | width="150" valign="middle" height="120" bgcolor="#ffdf80" align="center" | Java EE Secure Code Review<br>Sahba Kazerooni<br>[http://www.securitycompass.com Security Compass] | |
| − | + | | width="150" valign="middle" height="120" bgcolor="#a0c0e0" align="center" | Threat Modeling Express<br>Krishna Raja<br>[http://www.securitycompass.com Security Compass] | |
| − | + | | width="150" valign="middle" height="120" bgcolor="#b3ff99" align="center" | Foundations of Web Services and XML Security<br>Dave Wichers<br>[http://www.aspectsecurity.com Aspect Security] | |
| − | + | | width="150" valign="middle" height="120" bgcolor="#BCA57A" align="center" | Live CD<br>Matt Tesauro <!-- Day 2 --> | |
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | <!-- | ||
| − | |||
| − | |||
| − | |||
|} | |} | ||
| − | + | ====Training 11/11==== | |
| − | + | {| cellspacing="0" border="2" | |
| − | | | + | |- valign="middle" |
| − | + | | height="60" align="center" colspan="6" style="background: rgb(64, 88, 160) none repeat scroll 0% 0%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous; color: white;" | <font size="5">'''Day 2 - Nov 11th 2009'''</font> | |
| − | + | |- valign="bottom" | |
| − | + | | width="67" valign="middle" height="40" bgcolor="#7b8abd" | | |
| − | + | | width="150" valign="middle" height="40" bgcolor="#c0a0a0" align="center" | '''Room 154A''' | |
| − | | style=" | + | | width="150" valign="middle" height="40" bgcolor="#ffdf80" align="center" | '''Room 149B''' |
| − | + | | width="150" valign="middle" height="40" bgcolor="#a0c0e0" align="center" | '''Room 149A''' | |
| − | + | | width="150" valign="middle" height="40" bgcolor="#b3ff99" align="center" | '''Room 154B''' | |
| − | ''' | + | | width="150" valign="middle" height="40" bgcolor="#BCA57A" align="center" | '''Room 155''' |
| − | + | |- valign="bottom" | |
| − | | | + | | width="67" valign="middle" bgcolor="#7b8abd" | 09:00-12:00 |
| − | | | + | | width="150" valign="middle" height="120" bgcolor="#c0a0a0" align="center" | Day 2:<br>Assessing and Exploiting Web Applications with the open source Samurai Web Testing Framework<br> Justin Searle |
| − | + | | width="150" valign="middle" height="120" bgcolor="#ffdf80" align="center" | Day 2:<br>Java EE Secure Code Review<br>Sahba Kazerooni<br>[http://www.securitycompass.com Security Compass] | |
| − | | | + | | width="150" valign="middle" height="120" bgcolor="#a0c0e0" align="center" | WebAppSec.php: Developing Secure Web Applications<br>Robert Zakon |
| − | | | + | | width="150" valign="middle" height="120" bgcolor="#b3ff99" align="center" | Leader and Manager Training - Leading the Development of Secure Applications<br>John Pavone<br>[http://www.aspectsecurity.com Aspect Security] |
| − | + | | width="150" valign="middle" height="120" bgcolor="#BCA57A" align="center" | | |
| − | + | |- valign="bottom" | |
| − | ==== | + | | width="67" valign="middle" height="40" bgcolor="#7b8abd" | 12:00-13:00 |
| − | + | | valign="middle" height="40" bgcolor="#909090" align="center" colspan="5" | Lunch | |
| − | == [http:// | + | |- valign="bottom" |
| − | + | | width="67" valign="middle" bgcolor="#7b8abd" | 13:00-17:00 | |
| − | === | + | | width="150" valign="middle" height="120" bgcolor="#c0a0a0" align="center" | Assessing and Exploiting Web Applications with the open source Samurai Web Testing Framework<br> Justin Searle |
| − | + | | width="150" valign="middle" height="120" bgcolor="#ffdf80" align="center" | Java EE Secure Code Review<br>Sahba Kazerooni<br>[http://www.securitycompass.com Security Compass] | |
| − | + | | width="150" valign="middle" height="120" bgcolor="#a0c0e0" align="center" | WebAppSec.php: Developing Secure Web Applications<br>Robert Zakon | |
| − | + | | width="150" valign="middle" height="120" bgcolor="#b3ff99" align="center" | Leader and Manager Training - Leading the Development of Secure Applications<br>John Pavone<br>[http://www.aspectsecurity.com Aspect Security] | |
| − | + | | width="150" valign="middle" height="120" bgcolor="#BCA57A" align="center" | <!-- Day 2 --> | |
| − | |||
| − | |||
| − | |- | ||
| − | | | ||
| − | | | ||
| − | |- | ||
| − | | | ||
| − | | | ||
| − | | | ||
| − | | | ||
| − | | | ||
| − | | | ||
| − | | | ||
| − | | | ||
| − | |||
| − | | | ||
| − | | | ||
|} | |} | ||
| − | + | ====Talks 11/12==== | |
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | === | ||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
{| cellspacing="0" border="2" | {| cellspacing="0" border="2" | ||
|- valign="middle" | |- valign="middle" | ||
| − | | height="60" align="center" style="background: rgb(64, 88, 160) none repeat scroll 0% 0%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous; color: white; | + | | height="60" align="center" colspan="5" style="background: rgb(64, 88, 160) none repeat scroll 0% 0%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous; color: white;" | <font size="5">'''Day 1 - Nov 12th 2009'''</font> |
|- valign="bottom" | |- valign="bottom" | ||
| − | | valign="middle" height="40 | + | | width="67" valign="middle" height="40" bgcolor="#7b8abd" | |
| − | | valign="middle" height="40 | + | | width="200" valign="middle" height="40" bgcolor="#c0a0a0" align="center" | '''OWASP''' |
| − | | valign="middle" height="40 | + | | width="200" valign="middle" height="40" bgcolor="#ffdf80" align="center" | '''Tools''' |
| − | | valign="middle" height="40 | + | | width="200" valign="middle" height="40" bgcolor="#a0c0e0" align="center" | '''SDLC''' |
| − | | valign="middle" height="40 | + | | width="200" valign="middle" height="40" bgcolor="#b3ff99" align="center" | '''Web 2.0''' |
|- valign="bottom" | |- valign="bottom" | ||
| − | | | + | | width="67" valign="middle" bgcolor="#7b8abd" | 07:30-08:45 |
| valign="middle" bgcolor="#909090" align="center" colspan="4" | Registration | | valign="middle" bgcolor="#909090" align="center" colspan="4" | Registration | ||
|- valign="bottom" | |- valign="bottom" | ||
| − | | | + | | width="67" valign="middle" bgcolor="#7b8abd" | 08:45-09:00 |
| valign="middle" height="30" bgcolor="#e0e0e0" align="center" colspan="4" | Welcome and Opening Remarks | | valign="middle" height="30" bgcolor="#e0e0e0" align="center" colspan="4" | Welcome and Opening Remarks | ||
|- valign="bottom" | |- valign="bottom" | ||
| − | | | + | | width="67" valign="middle" bgcolor="#7b8abd" | 09:00-10:00 |
| valign="middle" height="60" bgcolor="#e0e0e0" align="center" colspan="4" | Keynote: [[AppSecDC Keynote Jarzomnek|Joe Jarzombek]] | | valign="middle" height="60" bgcolor="#e0e0e0" align="center" colspan="4" | Keynote: [[AppSecDC Keynote Jarzomnek|Joe Jarzombek]] | ||
|- valign="bottom" | |- valign="bottom" | ||
| − | | | + | | width="67" valign="middle" bgcolor="#7b8abd" | 10:00-10:30 |
| valign="middle" height="30" bgcolor="#909090" align="center" colspan="4" | Coffee Break & Room Change | | valign="middle" height="30" bgcolor="#909090" align="center" colspan="4" | Coffee Break & Room Change | ||
|- valign="bottom" | |- valign="bottom" | ||
| − | | | + | | width="67" valign="middle" bgcolor="#7b8abd" | 10:30-11:30 |
| − | | valign="middle" height="120 | + | | width="200" valign="middle" height="120" bgcolor="#c0a0a0" align="center" | [[OWASP ESAPI AppSecDC|OWASP ESAPI]]<br>Jeff Williams |
| − | | valign="middle" height="120 | + | | width="200" valign="middle" height="120" bgcolor="#ffdf80" align="center" | [[Clubbing WebApps with a Botnet]]<br>Gunter Ollmann |
| − | | valign="middle" height="120 | + | | width="200" valign="middle" height="120" bgcolor="#a0c0e0" align="center" | [[Enterprise Application Security - GE's approach to solving root cause and establishing a Center of Excellence|Enterprise Application Security - GE's approach to solving root cause]]<br>Darren Challey |
| − | | valign="middle" height="120 | + | | width="200" valign="middle" height="120" bgcolor="#b3ff99" align="center" | [[Understanding the Implications of Cloud Computing on Application Security]]<br>Dennis Hurst |
|- valign="bottom" | |- valign="bottom" | ||
| − | | valign="middle" height="120 | + | | width="67" valign="middle" height="120" bgcolor="#7b8abd" | 11:30-12:30 |
| − | | valign="middle" height="120 | + | | width="200" valign="middle" height="120" bgcolor="#c0a0a0" align="center" | [[Software Assurance Maturity Model (SAMM)]]<br>Pravir Chandra |
| − | | valign="middle" height="120 | + | | width="200" valign="middle" height="120" bgcolor="#ffdf80" align="center" | [[The Case of Promiscuous Parameters and Other Ongoing Capers in Web Security]]<br>Jacob West |
| − | | valign="middle" height="120 | + | | width="200" valign="middle" height="120" bgcolor="#a0c0e0" align="center" | [[Software Development The Next Security Frontier]]<br>Jim Molini |
| − | | valign="middle" height="120 | + | | width="200" valign="middle" height="120" bgcolor="#b3ff99" align="center" | [[Transparent Proxy Abuse]]<br>Robert Auger |
|- valign="bottom" | |- valign="bottom" | ||
| − | | valign="middle" height="120 | + | | width="67" valign="middle" height="120" bgcolor="#7b8abd" | 12:30-13:30 |
| − | | valign="middle" height="120 | + | | width="200" valign="middle" height="120" bgcolor="#c0a0a0" align="center" | [[DISA's Application Security and Development STIG: How OWASP Can Help You]]<br>Jason Li |
| − | | valign="middle" height="120 | + | | width="200" valign="middle" height="120" bgcolor="#ffdf80" align="center" | [[OWASP ModSecurity Core Rule Set Project]]<br>Ryan C. Barnett |
| − | | valign="middle" height="120 | + | | width="200" valign="middle" height="120" bgcolor="#a0c0e0" align="center" | [[The essential role of infosec in secure software development]]<br>Kenneth R. van Wyk |
| − | | valign="middle" height="120 | + | | width="200" valign="middle" height="120" bgcolor="#b3ff99" align="center" | [[Development Issues Within AJAX Applications: How to Divert Threats]]<br>Lars Ewe |
|- valign="bottom" | |- valign="bottom" | ||
| − | | valign="middle" height=" | + | | width="67" valign="middle" height="40" bgcolor="#7b8abd" | 13:30-14:30 |
| − | | valign="middle" height=" | + | | valign="middle" height="40" bgcolor="#909090" align="center" colspan="4" | Lunch |
|- valign="bottom" | |- valign="bottom" | ||
| − | | valign="middle" height="120 | + | | width="67" valign="middle" height="120" bgcolor="#7b8abd" | 14:30-15:30 |
| − | | valign="middle" height="60 | + | | width="200" valign="middle" height="60" bgcolor="#c0a0a0" align="center" | [[Defend Yourself: Integrating Real Time Defenses into Online Applications]]<br>Michael Coates |
| − | | valign="middle" height="60 | + | | width="200" valign="middle" height="60" bgcolor="#ffdf80" align="center" | [[Finding the Hotspots: Web-security testing with the Watcher tool]]<br>Chris Weber |
| − | | valign="middle" height="120 | + | | width="200" valign="middle" height="120" bgcolor="#a0c0e0" align="center" rowspan="3" | [[SDLC Panel AppSecDC|SDLC Panel]]<br> <br>Pravir Chandra<br>Dan Cornell<br>Michael Craigue<br>Dennis Hurst<br>Joey Peloquin<br>David Rook<br>Keith Turpin |
| − | | valign="middle" height="120 | + | | width="200" valign="middle" height="120" bgcolor="#b3ff99" align="center" | [[Social Zombies: Your Friends Want to Eat Your Brains]]<br>Tom Eston/Kevin Johnson |
|- valign="bottom" | |- valign="bottom" | ||
| − | | valign="middle" height="120 | + | | width="67" valign="middle" height="120" bgcolor="#7b8abd" rowspan="2" | 15:30-16:30 |
| − | | valign="middle" height="120 | + | | width="200" valign="middle" height="120" bgcolor="#c0a0a0" align="center" rowspan="2" | [[The ESAPI Web Application Firewall (ESAPI WAF)|The ESAPI Web Application Firewall]]<br>Arshan Dabirsiaghi |
| − | | valign="middle" height="60 | + | | width="200" valign="middle" height="60" bgcolor="#ffdf80" align="center" | [[One Click Ownage]]<br>Ferruh Mavituna |
| − | | valign="middle" height="120 | + | | width="200" valign="middle" height="120" bgcolor="#b3ff99" align="center" rowspan="2" | [[Cloudy with a chance of 0-day]]<br>Jon Rose/Tom Leavey |
|- valign="bottom" | |- valign="bottom" | ||
| − | | valign="middle" height="60 | + | | width="200" valign="middle" height="60" bgcolor="#ffdf80" align="center" | [[Web Application Security Scanner Evaluation Criteria]]<br>Brian Shura |
|- valign="bottom" | |- valign="bottom" | ||
| − | | valign="middle" height="120 | + | | width="67" valign="middle" height="120" bgcolor="#7b8abd" rowspan="2" | 16:30-17:30 |
| − | | valign="middle" height="120 | + | | width="200" valign="middle" height="120" bgcolor="#c0a0a0" align="center" rowspan="2" | [[OWASP Live CD: An open environment for Web Application Security]]<br>Matt Tesauro / Brad Causey |
| − | | valign="middle" height="60 | + | | width="200" valign="middle" height="60" bgcolor="#ffdf80" align="center" | [[Learning by Breaking: A New Project Insecure Web Apps]]<br>Chuck Willis |
| − | | valign="middle" height="120 | + | | width="200" valign="middle" height="120" bgcolor="#a0c0e0" align="center" rowspan="2" | [[Vulnerability Management in an Application Security World]]<br>Dan Cornell |
| − | | valign="middle" height="120 | + | | width="200" valign="middle" height="120" bgcolor="#b3ff99" align="center" rowspan="2" | [[Attacking WCF Web Services]]<br>Brian Holyfield |
|- valign="bottom" | |- valign="bottom" | ||
| − | | valign="middle" height="60 | + | | width="200" valign="middle" height="60" bgcolor="#ffdf80" align="center" | [[Synergy! A world where the tools communicate]]<br> |
Josh Abraham | Josh Abraham | ||
|- valign="bottom" | |- valign="bottom" | ||
| − | | valign="middle" height="120 | + | | width="67" valign="middle" height="120" bgcolor="#7b8abd" rowspan="2" | 17:30-18:30 |
| − | | valign="middle" height="120 | + | | width="200" valign="middle" height="120" bgcolor="#c0a0a0" align="center" rowspan="2" | [[The Entrepreneur's Guide to Career Management]]<br>Lee Kushner |
| − | | valign="middle" height="60 | + | | width="200" valign="middle" height="60" bgcolor="#ffdf80" align="center" | [[Advanced SSL: The good, the bad, and the ugly]]<br>Michael Coates |
| − | | valign="middle" height="120 | + | | width="200" valign="middle" height="120" bgcolor="#a0c0e0" align="center" rowspan="2" | [[Threat Modeling by John Steven|Threat Modeling]]<br>John Steven |
| − | | valign="middle" height="120 | + | | width="200" valign="middle" height="120" bgcolor="#b3ff99" align="center" rowspan="2" | [[When Web 2.0 Attacks - Understanding Security Implications of AJAX, Flash and |When Web 2.0 Attacks - Understanding Security Implications of AJAX, Flash and "Highly Interactive" Technologies]]<br>Rafal Los |
|- valign="bottom" | |- valign="bottom" | ||
| − | | valign="middle" height="60 | + | | width="200" valign="middle" height="60" bgcolor="#ffdf80" align="center" | [[User input piercing for Cross Site Scripting Attacks]]<br>Matias Blanco |
|- valign="bottom" | |- valign="bottom" | ||
| − | | valign="middle" height="60 | + | | width="67" valign="middle" height="60" bgcolor="#7b8abd" | 19:00-???? |
| valign="middle" height="60" bgcolor="#c0c0c0" align="center" colspan="4" | Reception <!-- Day 2 --> | | valign="middle" height="60" bgcolor="#c0c0c0" align="center" colspan="4" | Reception <!-- Day 2 --> | ||
| + | |} | ||
| + | ====Talks 11/13==== | ||
| + | {| cellspacing="0" border="2" | ||
|- valign="middle" | |- valign="middle" | ||
| − | | height="60" | + | | height="60" align="center" colspan="5" style="background: rgb(64, 88, 160) none repeat scroll 0% 0%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous; color: white;" | <font size="5">'''Day 2 - Nov 13th 2009'''</font> |
| − | |||
| − | |||
|- valign="bottom" | |- valign="bottom" | ||
| − | | valign="middle" height="40 | + | | width="67" valign="middle" height="40" bgcolor="#7b8abd" | |
| − | | valign="middle" height="40 | + | | width="200" valign="middle" height="40" bgcolor="#c0a0a0" align="center" | '''Attack & Defend''' |
| − | | valign="middle" height="40 | + | | width="200" valign="middle" height="40" bgcolor="#ffdf80" align="center" | '''Process''' |
| − | | valign="middle" height="40 | + | | width="200" valign="middle" height="40" bgcolor="#a0c0e0" align="center" | '''Metrics''' |
| − | | valign="middle" height="40 | + | | width="200" valign="middle" height="40" bgcolor="#b3ff99" align="center" | '''Compliance''' |
|- valign="bottom" | |- valign="bottom" | ||
| − | | | + | | width="67" valign="middle" bgcolor="#7b8abd" | 07:30-09:00 |
| valign="middle" bgcolor="#909090" align="center" colspan="4" | Registration | | valign="middle" bgcolor="#909090" align="center" colspan="4" | Registration | ||
|- valign="bottom" | |- valign="bottom" | ||
| − | | | + | | width="67" valign="middle" bgcolor="#7b8abd" | 09:00-10:00 |
| valign="middle" height="60" bgcolor="#e0e0e0" align="center" colspan="4" | Keynote: TBA | | valign="middle" height="60" bgcolor="#e0e0e0" align="center" colspan="4" | Keynote: TBA | ||
|- valign="bottom" | |- valign="bottom" | ||
| − | | | + | | width="67" valign="middle" bgcolor="#7b8abd" | 10:00-10:30 |
| valign="middle" height="30" bgcolor="#909090" align="center" colspan="4" | Coffee Break & Room Change | | valign="middle" height="30" bgcolor="#909090" align="center" colspan="4" | Coffee Break & Room Change | ||
|- valign="bottom" | |- valign="bottom" | ||
| − | | | + | | width="67" valign="middle" bgcolor="#7b8abd" | 10:30-11:30 |
| − | | valign="middle" height="120 | + | | width="200" valign="middle" height="120" bgcolor="#c0a0a0" align="center" | [[Securing the Core JEE Patterns]]<br>Rohit Sethi/Krishna Raja |
| − | | valign="middle" height="120 | + | | width="200" valign="middle" height="120" bgcolor="#ffdf80" align="center" | [[The Big Picture: Web Risks and Assessments Beyond Scanning]]<br>Matt Fisher |
| − | | valign="middle" height="120 | + | | width="200" valign="middle" height="120" bgcolor="#a0c0e0" align="center" | [[The Web Hacking Incidents Database]]<br>Ryan C. Barnett |
| − | | valign="middle" height="120 | + | | width="200" valign="middle" height="120" bgcolor="#b3ff99" align="center" | [[Business Logic Automatons: Friend or Foe?]]<br>Ofer Shezaf |
|- valign="bottom" | |- valign="bottom" | ||
| − | | valign="middle" height="120 | + | | width="67" valign="middle" height="120" bgcolor="#7b8abd" | 11:30-12:30 |
| − | | valign="middle" height="120 | + | | width="200" valign="middle" height="120" bgcolor="#c0a0a0" align="center" | [[Unicode Transformations: Finding Elusive Vulnerabilities]]<br>Chris Weber |
| − | | valign="middle" height="120 | + | | width="200" valign="middle" height="120" bgcolor="#ffdf80" align="center" | [[Scalable Application Assessments in the Enterprise]]<br>Tom Parker/Lars Ewe |
| − | | valign="middle" height="120 | + | | width="200" valign="middle" height="120" bgcolor="#a0c0e0" align="center" | [[Application security metrics from the organization on down to the vulnerabilities]]<br>Chris Wysopal |
| − | | valign="middle" height="120 | + | | width="200" valign="middle" height="120" bgcolor="#b3ff99" align="center" | [[SCAP: Automating our way out of the Vulnerability Wheel of Pain]]<br>Ed Bellis |
|- valign="bottom" | |- valign="bottom" | ||
| − | | valign="middle" height="120 | + | | width="67" valign="middle" height="120" bgcolor="#7b8abd" | 12:30-13:30 |
| − | | valign="middle" height="120 | + | | width="200" valign="middle" height="120" bgcolor="#c0a0a0" align="center" | [[Malicious Developers and Enterprise Java Rootkits]]<br>Jeff Williams |
| − | | valign="middle" height="120 | + | | width="200" valign="middle" height="120" bgcolor="#ffdf80" align="center" | [[Secure Software Updates: Update Like Conficker]]<br>Jeremy Allen |
| − | | valign="middle" height="120 | + | | width="200" valign="middle" height="120" bgcolor="#a0c0e0" align="center" | [[OWASP Top 10 2010 AppSecDC|OWASP Top 10 - 2010]]<br>Dave Wichers |
| − | | valign="middle" height="120 | + | | width="200" valign="middle" height="120" bgcolor="#b3ff99" align="center" | [[Secure SDLC: The Good, The Bad, and The Ugly]]<br>Joey Peloquin |
|- valign="bottom" | |- valign="bottom" | ||
| − | | valign="middle" height=" | + | | width="67" valign="middle" height="40" bgcolor="#7b8abd" | 13:30-14:30 |
| − | | valign="middle" height=" | + | | valign="middle" height="40" bgcolor="#909090" align="center" colspan="4" | Lunch |
|- valign="bottom" | |- valign="bottom" | ||
| − | | valign="middle" height="120 | + | | width="67" valign="middle" height="120" bgcolor="#7b8abd" | 14:30-15:30 |
| − | | valign="middle" height="120 | + | | width="200" valign="middle" height="120" bgcolor="#c0a0a0" align="center" | [[The 10 least-likely and most dangerous people on the Internet]]<br>Robert Hansen |
| − | | valign="middle" height="120 | + | | width="200" valign="middle" height="120" bgcolor="#ffdf80" align="center" | [[Improving application security after an incident]]<br>Cory Scott |
| − | | valign="middle" height="120 | + | | width="200" valign="middle" height="120" bgcolor="#a0c0e0" align="center" | [[Hacking by Numbers]]<br>Tom Brennan |
| − | | valign="middle" height="120 | + | | width="200" valign="middle" height="120" bgcolor="#b3ff99" align="center" rowspan="2" | [[AppSecDC09 Federal CISO Panel|Federal CISO Panel]] |
|- valign="bottom" | |- valign="bottom" | ||
| − | | valign="middle" height="120 | + | | width="67" valign="middle" height="120" bgcolor="#7b8abd" | 15:30-16:30 |
| − | | valign="middle" height="120 | + | | width="200" valign="middle" height="120" bgcolor="#c0a0a0" align="center" | [[Automated vs. Manual Security: You can't filter The Stupid]]<br>David Byrne/Charles Henderson |
| − | | valign="middle" height="120 | + | | width="200" valign="middle" height="120" bgcolor="#ffdf80" align="center" | [[Custom Intrusion Detection Techniques for Monitoring Web Applications]]<br>Matthew Olney |
| − | | valign="middle" height="120 | + | | width="200" valign="middle" height="120" bgcolor="#a0c0e0" align="center" | [[Building an in-house application security assessment team]]<br>Keith Turpin |
|- valign="bottom" | |- valign="bottom" | ||
| − | | valign="middle" height="120 | + | | width="67" valign="middle" height="120" bgcolor="#7b8abd" | 16:30-17:30 |
| − | | valign="middle" height="120 | + | | width="200" valign="middle" height="120" bgcolor="#c0a0a0" align="center" | TBD |
| − | | valign="middle" height="120 | + | | width="200" valign="middle" height="120" bgcolor="#ffdf80" align="center" | TBD |
| − | | valign="middle" height="120 | + | | width="200" valign="middle" height="120" bgcolor="#a0c0e0" align="center" | [[The OWASP Security Spending Benchmarks Project]]<br>Dr. Boaz Gelbord |
| − | | valign="middle" height="120 | + | | width="200" valign="middle" height="120" bgcolor="#b3ff99" align="center" | [[Promoting Application Security within Federal Government]]<br>Sarbari Gupta |
|- valign="bottom" | |- valign="bottom" | ||
| − | | valign="middle" height="120 | + | | width="67" valign="middle" height="120" bgcolor="#7b8abd" rowspan="2" | 17:30-18:30 |
| − | | valign="middle" height="60 | + | | width="200" valign="middle" height="60" bgcolor="#c0a0a0" align="center" | [[Manipulating Web Application Interfaces, a new approach to input validation]]<br>Felipe Moreno-Strauch |
| − | | valign="middle" height="120 | + | | width="200" valign="middle" height="120" bgcolor="#ffdf80" align="center" rowspan="2" | [[Deploying Secure Web Applications with OWASP Resources]]<br>Kuai Hinojosa |
| − | | valign="middle" height="120 | + | | width="200" valign="middle" height="120" bgcolor="#a0c0e0" align="center" rowspan="2" | [[SANS Dshield Webhoneypot Project]]<br>Jason Lam |
| − | | valign="middle" height="120 | + | | width="200" valign="middle" height="120" bgcolor="#b3ff99" align="center" rowspan="2" | [[Techniques in Attacking and Defending XML/Web Services]]<br>Mamoon Yunus/Jason Macy |
|- valign="bottom" | |- valign="bottom" | ||
| − | | valign="middle" height="60 | + | | width="200" valign="middle" height="60" bgcolor="#c0a0a0" align="center" | [[Injectable Exploits: Two New Tools for Pwning Web Apps and Browsers]]<br>Kevin Johnson, Justin Searle, Frank DiMaggio |
|- valign="bottom" | |- valign="bottom" | ||
| − | | valign="middle" height="60 | + | | width="67" valign="middle" height="60" bgcolor="#7b8abd" | 18:30-19:00 |
| − | | valign="middle" height="60" bgcolor="#c0c0c0" align="center" colspan="4" | Closing Remarks | + | | valign="middle" height="60" bgcolor="#c0c0c0" align="center" colspan="4" | Closing Remarks |
|} | |} | ||
| + | <headertabs /> | ||
| − | === | + | ===[[OWASP AppSec DC 2009|Back to Conference Page]]=== |
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | AppSec DC 2009 | ||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | [[Category:OWASP_AppSec_Conference]] | + | [[Category:OWASP_AppSec_Conference]] [[Category:OWASP_AppSec_DC_09]] |
Revision as of 21:45, 1 November 2009
Back to Conference Page
Please note, speaking times are not final, check back regularly for updates.
Training 11/10
| Day 1 - Nov 10th 2009 | |||||
| Room 154A | Room 149B | Room 149A | Room 154B | Room 155 | |
| 09:00-12:00 | Day 1: Assessing and Exploiting Web Applications with the open source Samurai Web Testing Framework Justin Searle |
Day 1: Java EE Secure Code Review Sahba Kazerooni Security Compass |
Threat Modeling Express Krishna Raja Security Compass |
Foundations of Web Services and XML Security Dave Wichers Aspect Security |
Live CD Matt Tesauro |
| 12:00-13:00 | Lunch | ||||
| 13:00-17:00 | Assessing and Exploiting Web Applications with the open source Samurai Web Testing Framework Justin Searle |
Java EE Secure Code Review Sahba Kazerooni Security Compass |
Threat Modeling Express Krishna Raja Security Compass |
Foundations of Web Services and XML Security Dave Wichers Aspect Security |
Live CD Matt Tesauro |
Training 11/11
| Day 2 - Nov 11th 2009 | |||||
| Room 154A | Room 149B | Room 149A | Room 154B | Room 155 | |
| 09:00-12:00 | Day 2: Assessing and Exploiting Web Applications with the open source Samurai Web Testing Framework Justin Searle |
Day 2: Java EE Secure Code Review Sahba Kazerooni Security Compass |
WebAppSec.php: Developing Secure Web Applications Robert Zakon |
Leader and Manager Training - Leading the Development of Secure Applications John Pavone Aspect Security |
|
| 12:00-13:00 | Lunch | ||||
| 13:00-17:00 | Assessing and Exploiting Web Applications with the open source Samurai Web Testing Framework Justin Searle |
Java EE Secure Code Review Sahba Kazerooni Security Compass |
WebAppSec.php: Developing Secure Web Applications Robert Zakon |
Leader and Manager Training - Leading the Development of Secure Applications John Pavone Aspect Security |
|