This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "OWASP Israel 2010"
(14 intermediate revisions by the same user not shown) | |||
Line 1: | Line 1: | ||
+ | [[Category:Israel]] | ||
+ | |||
== Location and Time == | == Location and Time == | ||
− | The 2010 annual OWASP Israel conference | + | The 2010 annual OWASP Israel conference was held at the Interdisciplinary Center Herzliya (IDC) on September 6th in the Efi Arazi school of computer science. Map of the venue can be found [http://portal.idc.ac.il/He/Main/about_idc/campus_tour/Pages/MapsDirections1.aspx here]. |
− | All presentations | + | All presentations were in Hebrew. |
The conference was sponsored by: | The conference was sponsored by: | ||
Line 14: | Line 16: | ||
− | == Agenda == | + | == Pictures == |
+ | |||
+ | Pictures of the event can be found [http://picasaweb.google.com/ofer.maor/OWASPIL2010?authkey=Gv1sRgCLv0qL_gqfe4bw#slideshow/5515319243590526722 here]. | ||
+ | |||
+ | |||
+ | == Agenda & Presentations == | ||
{| class="wikitable" <hiddentext>generated with [[:de:Wikipedia:Helferlein/VBA-Macro for EXCEL tableconversion]] V1.7<\hiddentext> | {| class="wikitable" <hiddentext>generated with [[:de:Wikipedia:Helferlein/VBA-Macro for EXCEL tableconversion]] V1.7<\hiddentext> | ||
Line 21: | Line 28: | ||
| valign="center" colspan=2 style="font-size:12pt" | '''Gathering and Socializing''' | | valign="center" colspan=2 style="font-size:12pt" | '''Gathering and Socializing''' | ||
− | |||
− | |||
− | |||
− | |||
− | |||
|- style="font-size:11pt" | |- style="font-size:11pt" | ||
|style="color:#1F497D" height="25" align="right" valign="center" | 14:15-14:30 | |style="color:#1F497D" height="25" align="right" valign="center" | 14:15-14:30 | ||
− | | valign="center" | '''Opening Words''' ''Ofer Maor, OWASP Israel Chairman'' | + | | valign="center" colspan="2" | '''Opening Words''' ''Ofer Maor, Hacktics - OWASP Israel Chairman'' ([[Media:OWASPIL2010-OpeningWords-OferMaor.ppt|Download Presentation]]) |
− | |||
|- style="font-size:11pt" | |- style="font-size:11pt" | ||
|style="color:#1F497D" height="25" align="right" valign="center" | 14:30-15:10 | |style="color:#1F497D" height="25" align="right" valign="center" | 14:30-15:10 | ||
− | | valign="center" | Hacker Intelligence: 6 Months of Attack Vector Research ''Tal Be'ery, Imperva'' | + | | valign="center" colspan="2" | Hacker Intelligence: 6 Months of Attack Vector Research ''Tal Be'ery, Imperva'' ([[Media:OWASPIL2010-HackerIntelligence-TalBeery.pptx|Download Presentation]]) |
− | |||
|- style="font-size:11pt" | |- style="font-size:11pt" | ||
|style="color:#1F497D" height="25" align="right" valign="center" | 15:10-15:50 | |style="color:#1F497D" height="25" align="right" valign="center" | 15:10-15:50 | ||
− | | valign="center" | CSA Israel & The Challenges of Cloud Security ''Guy Alfassi'' | + | | valign="center" colspan="2" | CSA Israel & The Challenges of Cloud Security ''Guy Alfassi'' ([[Media:OWASPIL2010-CSAIsraelCloudSec-GuyAlfassi.pdf|Download Presentation]]) |
− | |||
|- style="font-size:11pt" | |- style="font-size:11pt" | ||
|style="color:#1F497D" height="25" align="right" valign="center" | 15:50-16:30 | |style="color:#1F497D" height="25" align="right" valign="center" | 15:50-16:30 | ||
− | | valign="center" | Beyond Negative Security: | + | | valign="center" colspan="2" | Beyond Negative Security: Signatures Are Not Always Enough ''Or Katz, Trustwave'' ([[Media:OWASPIL2010-BeyondNegativeSec-OrKatz.ppt|Download Presentation]]) |
− | + | ||
− | |||
|- style="font-size:11pt" | |- style="font-size:11pt" | ||
|style="color:#1F497D" height="50" align="right" valign="center" | 16:30-17:00 | |style="color:#1F497D" height="50" align="right" valign="center" | 16:30-17:00 | ||
| valign="center" style="font-size:12pt" colspan="2" | '''Break''' | | valign="center" style="font-size:12pt" colspan="2" | '''Break''' | ||
+ | |||
+ | |- style="font-size:12pt" | ||
+ | |style="color:#1F497D" height="30" align="right" valign="center" | | ||
+ | | width="291" valign="center" align="center" | '''Room #1''' | ||
+ | | width="296" valign="center" align="center" | '''Room #2''' | ||
|- style="font-size:11pt" | |- style="font-size:11pt" | ||
|style="color:#1F497D" height="25" align="right" valign="center" | 17:00-17:40 | |style="color:#1F497D" height="25" align="right" valign="center" | 17:00-17:40 | ||
− | | valign="center" | Practical Mod Security: Beyond the Core Rule Set ''Josh Amishav-Zlatin, Pure Hacking'' | + | | valign="center" | Practical Mod Security: Beyond the Core Rule Set ''Josh Amishav-Zlatin, Pure Hacking'' ([[Media:OWASPIL2010-PracticalModSe-JoshAmishavZlatin.pdf|Download Presentation]]) |
− | | valign="center" | PCI:DSS and the New PA:DSS Standards: Myths, Trends and Pragmatic Methods for Building Secure Software that Complies | + | | valign="center" | PCI:DSS and the New PA:DSS Standards: Myths, Trends and Pragmatic Methods for Building Secure Software that Complies ''Shay Zalalichin, Comsec'' ([[Media:OWASPIL2010-PCIAppSec-ShayZalalichin.pdf|Download Presentation]]) |
|- style="font-size:11pt" | |- style="font-size:11pt" | ||
|style="color:#1F497D" height="25" align="right" valign="center" | 17:40-18:20 | |style="color:#1F497D" height="25" align="right" valign="center" | 17:40-18:20 | ||
− | | valign="center" | Accelerating Multi-Pattern Matching on Compressed HTTP Traffic ''Yaron Koral, IDC'' | + | | valign="center" | Accelerating Multi-Pattern Matching on Compressed HTTP Traffic ''Yaron Koral, IDC'' ([[Media:OWASPIL2010-CompressedHTTPMatching-YaronKoral.pptx|Download Presentation]]) |
− | | valign="center" | | + | | valign="center" | Real Life Application DoS Attacks ''Ziv Gadot, Radware'' ([[Media:OWASPIL2010-RealLifeDoS-ZivGadot.ppt|Download Presentation]]) |
|- style="font-size:11pt" | |- style="font-size:11pt" | ||
|style="color:#1F497D" height="25" align="right" valign="center" | 18:20-19:00 | |style="color:#1F497D" height="25" align="right" valign="center" | 18:20-19:00 | ||
− | | valign="center" | Runtime Hardening ''Erez Metula, AppSec'' | + | | valign="center" | Runtime Hardening ''Erez Metula, AppSec'' ([[Media:OWASPIL2010-RuntimeHardening-ErezMetula.pdf|Download Presentation]]) |
− | | valign="center" | | + | | valign="center" | Cloud Computing Security: Mapping Concepts to Practical Techniques ''Gilad Parann-Nissany, Porticor'' ([[Media:OWASPIL2010-PracticalCloudSec-GiladParannNissany.pptx|Download Presentation]]) |
|- style="font-size:11pt" | |- style="font-size:11pt" | ||
|style="color:#1F497D" height="25" align="right" valign="center" | 19:00-19:05 | |style="color:#1F497D" height="25" align="right" valign="center" | 19:00-19:05 | ||
− | | valign="center" colspan="2"| '''Closing Words''' ''Ofer Maor, OWASP Israel Chairman'' | + | | valign="center" colspan="2"| '''Closing Words''' ''Ofer Maor, Hacktics - OWASP Israel Chairman'' |
|} | |} | ||
Latest revision as of 17:39, 10 September 2010
Location and Time
The 2010 annual OWASP Israel conference was held at the Interdisciplinary Center Herzliya (IDC) on September 6th in the Efi Arazi school of computer science. Map of the venue can be found here.
All presentations were in Hebrew.
The conference was sponsored by:
Contact
For further details contact Ofer Maor (ofer.maor at owasp.org)
Pictures
Pictures of the event can be found here.
Agenda & Presentations
13:30-14:15 | Gathering and Socializing | |
14:15-14:30 | Opening Words Ofer Maor, Hacktics - OWASP Israel Chairman (Download Presentation) | |
14:30-15:10 | Hacker Intelligence: 6 Months of Attack Vector Research Tal Be'ery, Imperva (Download Presentation) | |
15:10-15:50 | CSA Israel & The Challenges of Cloud Security Guy Alfassi (Download Presentation) | |
15:50-16:30 | Beyond Negative Security: Signatures Are Not Always Enough Or Katz, Trustwave (Download Presentation) | |
16:30-17:00 | Break | |
Room #1 | Room #2 | |
17:00-17:40 | Practical Mod Security: Beyond the Core Rule Set Josh Amishav-Zlatin, Pure Hacking (Download Presentation) | PCI:DSS and the New PA:DSS Standards: Myths, Trends and Pragmatic Methods for Building Secure Software that Complies Shay Zalalichin, Comsec (Download Presentation) |
17:40-18:20 | Accelerating Multi-Pattern Matching on Compressed HTTP Traffic Yaron Koral, IDC (Download Presentation) | Real Life Application DoS Attacks Ziv Gadot, Radware (Download Presentation) |
18:20-19:00 | Runtime Hardening Erez Metula, AppSec (Download Presentation) | Cloud Computing Security: Mapping Concepts to Practical Techniques Gilad Parann-Nissany, Porticor (Download Presentation) |
19:00-19:05 | Closing Words Ofer Maor, Hacktics - OWASP Israel Chairman |
The people behind the conference
OWASP Israel is made by the people who contribute their time and brain to its success. The following people are working to ensure that OWASP Israel 2010 is a success.
If you feel that you also can contribute or have interesting ideas regarding the conference, don't hesitate to contact me.
Contributors
- Adi Sharabani (IBM)
- Dr. Anat Bremler-Barr (Interdisciplinary Center Herzliya)
- Avi Douglen
- Ofer Maor (Hacktics)
- Ofer Shezaf (Better Place)
- Or Katz (Trustwave)