This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "OWASP Israel 2010"
Line 30: | Line 30: | ||
|- style="font-size:11pt" | |- style="font-size:11pt" | ||
|style="color:#1F497D" height="25" align="right" valign="center" | 14:15-14:30 | |style="color:#1F497D" height="25" align="right" valign="center" | 14:15-14:30 | ||
− | | valign="center" colspan="2" | '''Opening Words''' ''Ofer Maor, Hacktics - OWASP Israel Chairman'' | + | | valign="center" colspan="2" | '''Opening Words''' ''Ofer Maor, Hacktics - OWASP Israel Chairman'' ([[Media:OWASPIL2010-OpeningWords-OferMaor.ppt|Download Presentation]]) |
|- style="font-size:11pt" | |- style="font-size:11pt" | ||
|style="color:#1F497D" height="25" align="right" valign="center" | 14:30-15:10 | |style="color:#1F497D" height="25" align="right" valign="center" | 14:30-15:10 | ||
− | | valign="center" colspan="2" | Hacker Intelligence: 6 Months of Attack Vector Research ''Tal Be'ery, Imperva'' | + | | valign="center" colspan="2" | Hacker Intelligence: 6 Months of Attack Vector Research ''Tal Be'ery, Imperva'' ([[Media:OWASPIL2010-HackerIntelligence-TalBeery.pptx|Download Presentation]]) |
|- style="font-size:11pt" | |- style="font-size:11pt" | ||
|style="color:#1F497D" height="25" align="right" valign="center" | 15:10-15:50 | |style="color:#1F497D" height="25" align="right" valign="center" | 15:10-15:50 | ||
− | | valign="center" colspan="2" | CSA Israel & The Challenges of Cloud Security ''Guy Alfassi'' | + | | valign="center" colspan="2" | CSA Israel & The Challenges of Cloud Security ''Guy Alfassi'' ([[Media:OWASPIL2010-CSAIsraelCloudSec-GuyAlfassi.pdf|Download Presentation]]) |
|- style="font-size:11pt" | |- style="font-size:11pt" | ||
|style="color:#1F497D" height="25" align="right" valign="center" | 15:50-16:30 | |style="color:#1F497D" height="25" align="right" valign="center" | 15:50-16:30 | ||
− | | valign="center" colspan="2" | Beyond Negative Security: Signatures Are Not Always Enough ''Or Katz, Trustwave'' | + | | valign="center" colspan="2" | Beyond Negative Security: Signatures Are Not Always Enough ''Or Katz, Trustwave'' ([[Media:OWASPIL2010-BeyondNegativeSec-OrKatz.ppt|Download Presentation]]) |
− | + | ||
|- style="font-size:11pt" | |- style="font-size:11pt" | ||
|style="color:#1F497D" height="50" align="right" valign="center" | 16:30-17:00 | |style="color:#1F497D" height="50" align="right" valign="center" | 16:30-17:00 | ||
Line 55: | Line 55: | ||
|- style="font-size:11pt" | |- style="font-size:11pt" | ||
|style="color:#1F497D" height="25" align="right" valign="center" | 17:00-17:40 | |style="color:#1F497D" height="25" align="right" valign="center" | 17:00-17:40 | ||
− | | valign="center" | Practical Mod Security: Beyond the Core Rule Set ''Josh Amishav-Zlatin, Pure Hacking'' | + | | valign="center" | Practical Mod Security: Beyond the Core Rule Set ''Josh Amishav-Zlatin, Pure Hacking'' ([[Media:BrokenLink|Download Presentation]]) |
− | | valign="center" | PCI:DSS and the New PA:DSS Standards: Myths, Trends and Pragmatic Methods for Building Secure Software that Complies ''Shay Zalalichin, Comsec'' | + | | valign="center" | PCI:DSS and the New PA:DSS Standards: Myths, Trends and Pragmatic Methods for Building Secure Software that Complies ''Shay Zalalichin, Comsec'' ([[Media:BrokenLink|Download Presentation]]) |
|- style="font-size:11pt" | |- style="font-size:11pt" | ||
|style="color:#1F497D" height="25" align="right" valign="center" | 17:40-18:20 | |style="color:#1F497D" height="25" align="right" valign="center" | 17:40-18:20 | ||
− | | valign="center" | Accelerating Multi-Pattern Matching on Compressed HTTP Traffic ''Yaron Koral, IDC'' | + | | valign="center" | Accelerating Multi-Pattern Matching on Compressed HTTP Traffic ''Yaron Koral, IDC'' ([[Media:BrokenLink|Download Presentation]]) |
− | | valign="center" | Real Life Application DoS Attacks ''Ziv Gadot, Radware'' | + | | valign="center" | Real Life Application DoS Attacks ''Ziv Gadot, Radware'' ([[Media:BrokenLink|Download Presentation]]) |
|- style="font-size:11pt" | |- style="font-size:11pt" | ||
|style="color:#1F497D" height="25" align="right" valign="center" | 18:20-19:00 | |style="color:#1F497D" height="25" align="right" valign="center" | 18:20-19:00 | ||
− | | valign="center" | Runtime Hardening ''Erez Metula, AppSec'' | + | | valign="center" | Runtime Hardening ''Erez Metula, AppSec'' ([[Media:BrokenLink|Download Presentation]]) |
− | | valign="center" | Cloud Computing Security: Mapping Concepts to Practical Techniques ''Gilad Parann-Nissany, Porticor'' | + | | valign="center" | Cloud Computing Security: Mapping Concepts to Practical Techniques ''Gilad Parann-Nissany, Porticor'' ([[Media:BrokenLink|Download Presentation]]) |
|- style="font-size:11pt" | |- style="font-size:11pt" |
Revision as of 17:29, 10 September 2010
Location and Time
The 2010 annual OWASP Israel conference will be held at the Interdisciplinary Center Herzliya (IDC) on September 6th in the Efi Arazi school of computer science. You can find information on how to get to the IDC and a map of the campus here.
All presentations are in Hebrew.
The conference is sponsored by:
Contact
For further details contact Ofer Maor (ofer.maor at owasp.org)
If you would like to participate, please confirm your arrival by mailing Ofer Maor (ofer.maor at owasp.org)
Agenda
13:30-14:15 | Gathering and Socializing | |
14:15-14:30 | Opening Words Ofer Maor, Hacktics - OWASP Israel Chairman (Download Presentation) | |
14:30-15:10 | Hacker Intelligence: 6 Months of Attack Vector Research Tal Be'ery, Imperva (Download Presentation) | |
15:10-15:50 | CSA Israel & The Challenges of Cloud Security Guy Alfassi (Download Presentation) | |
15:50-16:30 | Beyond Negative Security: Signatures Are Not Always Enough Or Katz, Trustwave (Download Presentation) | |
16:30-17:00 | Break | |
Room #1 | Room #2 | |
17:00-17:40 | Practical Mod Security: Beyond the Core Rule Set Josh Amishav-Zlatin, Pure Hacking (Download Presentation) | PCI:DSS and the New PA:DSS Standards: Myths, Trends and Pragmatic Methods for Building Secure Software that Complies Shay Zalalichin, Comsec (Download Presentation) |
17:40-18:20 | Accelerating Multi-Pattern Matching on Compressed HTTP Traffic Yaron Koral, IDC (Download Presentation) | Real Life Application DoS Attacks Ziv Gadot, Radware (Download Presentation) |
18:20-19:00 | Runtime Hardening Erez Metula, AppSec (Download Presentation) | Cloud Computing Security: Mapping Concepts to Practical Techniques Gilad Parann-Nissany, Porticor (Download Presentation) |
19:00-19:05 | Closing Words Ofer Maor, Hacktics - OWASP Israel Chairman |
The people behind the conference
OWASP Israel is made by the people who contribute their time and brain to its success. The following people are working to ensure that OWASP Israel 2010 is a success.
If you feel that you also can contribute or have interesting ideas regarding the conference, don't hesitate to contact me.
Contributors
- Adi Sharabani (IBM)
- Dr. Anat Bremler-Barr (Interdisciplinary Center Herzliya)
- Avi Douglen
- Ofer Maor (Hacktics)
- Ofer Shezaf (Better Place)
- Or Katz (Trustwave)