This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "OWASP Global AppSec Asia 2011"

From OWASP
Jump to: navigation, search
m
 
(10 intermediate revisions by 4 users not shown)
Line 3: Line 3:
 
<br>  
 
<br>  
  
==== Welcome  ====
+
= Welcome  =
  
 
=== OWASP Global AppSec Asia Pacific 2011 - Beijing China  ===
 
=== OWASP Global AppSec Asia Pacific 2011 - Beijing China  ===
Line 9: Line 9:
 
[http://www.owasp.org/index.php/China-Mainland OWASP China-Mainland Chapter] will host '''OWASP Global AppSec Asia 2011''' in Beijing, China from Nov. 8 to Nov. 11, 2011. The summit will gather OWASP leaders, security experts, executives, technical thought leaders, developers, scientists and researchers from Asia and around the world for in-depth discussions of cutting-edge application security issues. The summit will draw participation from major Chinese and global organizations across various verticals including government, information technology, services and consulting, telecommunications, finance, e-commerce, Internet, universities and research institutes. About 800 people are expected to attend the summit, which will be covered by major news media. Panel discussions, vendor exhibit, and dinners will be held at the summit, providing sufficient networking opportunities.  
 
[http://www.owasp.org/index.php/China-Mainland OWASP China-Mainland Chapter] will host '''OWASP Global AppSec Asia 2011''' in Beijing, China from Nov. 8 to Nov. 11, 2011. The summit will gather OWASP leaders, security experts, executives, technical thought leaders, developers, scientists and researchers from Asia and around the world for in-depth discussions of cutting-edge application security issues. The summit will draw participation from major Chinese and global organizations across various verticals including government, information technology, services and consulting, telecommunications, finance, e-commerce, Internet, universities and research institutes. About 800 people are expected to attend the summit, which will be covered by major news media. Panel discussions, vendor exhibit, and dinners will be held at the summit, providing sufficient networking opportunities.  
  
==== 中文(Chinese)  ====
+
= [http://www.owasp.org.cn/OWASP_Conference/AppSec_2011/Asia_2011-PPT Presentations Download]=
 +
 
 +
 
 +
= 中文(Chinese)  =
  
 
=== 中文网站  ===
 
=== 中文网站  ===
Line 17: Line 20:
 
[http://www.owasp.org.cn/OWASP_Conference OWASP 2011亚太峰会]  
 
[http://www.owasp.org.cn/OWASP_Conference OWASP 2011亚太峰会]  
  
==== Registration  ====
+
= Registration  =
  
 
请使用[http://www.regonline.com/appsecasia2011 RegOnline 链接]来注册(中文).  
 
请使用[http://www.regonline.com/appsecasia2011 RegOnline 链接]来注册(中文).  
Line 36: Line 39:
 
For student discount, attendees must present proof of enrollment when picking up your badge.  
 
For student discount, attendees must present proof of enrollment when picking up your badge.  
  
==== Keynotes  ====
+
= Keynotes  =
  
 
=== Manoranjan Paul  ===
 
=== Manoranjan Paul  ===
Line 87: Line 90:
 
<br>  
 
<br>  
  
==== Guest Speakers  ====
+
= Guest Speakers  =
 
In Surname's Alphabetical Order
 
In Surname's Alphabetical Order
  
Line 216: Line 219:
 
<br>  
 
<br>  
  
==== CFP and CFT  ====
+
= CFP and CFT  =
  
 
=== OWASP APPSEC ASIA 2011  ===
 
=== OWASP APPSEC ASIA 2011  ===
Line 269: Line 272:
 
<br>  
 
<br>  
  
==== Agenda  ====
+
= Agenda  =
 
<center>
 
<center>
 
== '''November 8th'''  ==
 
== '''November 8th'''  ==
  
{| width="80%" class="t FCK__ShowTableBorders"
+
{| class="t FCK__ShowTableBorders" width="80%"
 
|-
 
|-
| width="14%" height="17" align="right" | 08:00 – 09:00  
+
| height="17" width="14%" align="right" | 08:00 – 09:00  
| align="CENTER" bgcolor="#8595c2" | '''Registration'''
+
| bgcolor="#8595c2" align="center" | '''Registration'''
 
|-
 
|-
| width="14%" height="49" align="right" | 09:00 – 09:15  
+
| height="49" width="14%" align="right" | 09:00 – 09:15  
| align="CENTER" bgcolor="#b9c2dc" | '''Rip, OWASP China'''<br> Opening Ceremony: Development of OWASP China
+
| bgcolor="#b9c2dc" align="center" | '''Rip, OWASP China (Language: Chinese)'''<br>Opening Ceremony: Development of OWASP China
 
|-
 
|-
| width="14%" height="49" align="right" | 09:15 – 09:30  
+
| height="49" width="14%" align="right" | 09:15 – 09:30  
| align="CENTER" bgcolor="#eeeeee" | '''Sebastien Deleersnyder, OWASP Global Committee'''<br> Opening Ceremony
+
| bgcolor="#eeeeee" align="center" | '''Sebastien Deleersnyder, OWASP Global Committee'''<br>Opening Ceremony&nbsp; '''(Language: English)'''
 
|-
 
|-
| width="14%" height="49" align="right" | 09:30 – 09:50  
+
| height="49" width="14%" align="right" | 09:30 – 09:50  
| align="CENTER" bgcolor="#b9c2dc" | '''Liping Ding'''<br> The Analysis of Hidden Communication Channels within Cloud Computing Environment
+
| bgcolor="#b9c2dc" align="center" | '''Liping Ding &nbsp;(Language: Chinese) '''<br>The Analysis of Hidden Communication Channels within Cloud Computing Environment
 
|-
 
|-
| width="14%" height="49" align="right" | 09:50 – 10:30  
+
| height="49" width="14%" align="right" | 09:50 – 10:30  
| align="CENTER" bgcolor="#eeeeee" | '''Manoranjan Paul'''<br> Silver Lining in Dark Clouds: A Look at Cloud Computing Security
+
| bgcolor="#eeeeee" align="center" | '''Manoranjan Paul &nbsp;(Language: English)'''<br>Silver Lining in Dark Clouds: A Look at Cloud Computing Security
 
|-
 
|-
| width="14%" height="49" align="right" | 10:30 – 11:00  
+
| height="49" width="14%" align="right" | 10:30 – 11:00  
| align="CENTER" bgcolor="#b9c2dc" | '''Frank Fan'''<br> Current Web Security and its' Future
+
| bgcolor="#b9c2dc" align="center" | '''Frank Fan &nbsp;(Language: Chinese)'''<br>Current Web Security and its' Future
 
|-
 
|-
| width="14%" height="49" align="right" | 11:00 – 11:30  
+
| height="49" width="14%" align="right" | 11:00 – 11:30  
| align="CENTER" bgcolor="#eeeeee" | '''Jonathan Werrett'''<br> WAFs: Patch First, Ask Questions Later
+
| bgcolor="#eeeeee" align="center" | '''Jonathan Werrett&nbsp; (Language: English)'''<br>WAFs: Patch First, Ask Questions Later
 
|-
 
|-
| width="14%" height="49" align="right" | 11:30 – 12:00  
+
| height="49" width="14%" align="right" | 11:30 – 12:00  
| align="CENTER" bgcolor="#b9c2dc" | '''Hanqing Wu'''<br> Flaws of Popular Application Applied Encryption Algorithms and the Corresponding Utilization"
+
| bgcolor="#b9c2dc" align="center" | '''Hanqing Wu&nbsp; &nbsp;(Language: Chinese)'''<br>Flaws of Popular Application Applied Encryption Algorithms and the Corresponding Utilization"
 
|-
 
|-
| width="14%" height="17" align="right" | 12:00 – 14:30  
+
| height="17" width="14%" align="right" | 12:00 – 14:30  
| align="CENTER" bgcolor="#d98b66" | '''Lunch & Networking'''
+
| bgcolor="#d98b66" align="center" | '''Lunch &amp; Networking'''
 
|-
 
|-
| width="14%" height="49" align="right" | 14:30 – 15:10  
+
| height="49" width="14%" align="right" | 14:30 – 15:10  
| align="CENTER" bgcolor="#b9c2dc" | ''Cassio Goldschmidt'''<br> The Fundamental Approaches and Tools to Achieve Secured Development Life Cycle
+
| bgcolor="#b9c2dc" align="center" | '''Cassio Goldschmidt'&nbsp;&nbsp;&nbsp; (Language: English)<br>'''The Fundamental Approaches and Tools to Achieve Secured Development Life Cycle
 
|-
 
|-
| width="14%" height="49" align="right" | 15:10 – 15:40  
+
| height="49" width="14%" align="right" | 15:10 – 15:40  
| align="CENTER" bgcolor="#eeeeee" | '''Yuming Xia'''<br> Web2.0 Secure Coding Practice
+
| bgcolor="#eeeeee" align="center" | '''Yuming Xia&nbsp; &nbsp;(Language: Chinese)'''<br>Web2.0 Secure Coding Practice
 
|-
 
|-
| width="14%" height="49" align="right" | 15:40 – 16:10  
+
| height="49" width="14%" align="right" | 15:40 – 16:10  
| align="CENTER" bgcolor="#b9c2dc" | '''Marco M. Morana & Wei Zhang'''<br> The Financial Industry Web Application Single Sign-On (SSO) Framework Design and Case Studies
+
| bgcolor="#b9c2dc" align="center" | '''Marco M. Morana &amp; Wei Zhang&nbsp; &nbsp;(Language: Chinese)'''<br>The Financial Industry Web Application Single Sign-On (SSO) Framework Design and Case Studies
 
|-
 
|-
| width="14%" height="49" align="right" | 16:10 – 16:40  
+
| height="49" width="14%" align="right" | 16:10 – 16:40  
| align="CENTER" bgcolor="#eeeeee" | '''Chenxi Liu'''<br> Security is Service
+
| bgcolor="#eeeeee" align="center" | '''Noa Bar Yosef&nbsp;&nbsp; &nbsp;(Language: English)'''<br>Hacking 2011:Lesson for 2012
 
|-
 
|-
| width="14%" height="49" align="right" | 16:40 – 17:10  
+
| height="49" width="14%" align="right" | 16:40 – 17:10  
| align="CENTER" bgcolor="#b9c2dc" | '''Noa Bar Yosef'''<br> Hacking 2011:Lesson for 2012
+
| bgcolor="#b9c2dc" align="center" | '''Sebastien Deleersnyder&nbsp;&nbsp; &nbsp;(Language: English)'''<br>OWASP WTE: testing your way
 
|-
 
|-
| width="14%" height="49" align="right" | 17:10 – 18:00  
+
| height="49" width="14%" align="right" | 17:10 – 18:00  
| align="CENTER" bgcolor="#eeeeee" | Exhibition of Internet Security Products
+
| bgcolor="#eeeeee" align="center" | Exhibition of Internet Security Products
 
|}
 
|}
</center>
 
<br>
 
<center>
 
  
 
== '''November 9th'''  ==
 
== '''November 9th'''  ==
  
{| width="80%" class="t FCK__ShowTableBorders"
+
{| class="t FCK__ShowTableBorders" width="80%"
 +
|-
 +
| height="17" width="14%" align="right" | 08:00 – 09:00
 +
| bgcolor="#8595c2" align="center" | '''Registration'''
 
|-
 
|-
| width="14%" height="17" align="right" | 08:00 – 09:00
+
| height="49" width="14%" align="right" | 09:00 – 09:30
| align="CENTER" bgcolor="#8595c2" | '''Registration'''
+
| bgcolor="#b9c2dc" align="center" | '''Wenju Wang&nbsp; (Language: Chinese)'''<br>The XSS Detection and Defense Techniques and Case Studies
 
|-
 
|-
| width="14%" height="49" align="right" | 09:00 09:30
+
| height="49" width="14%" align="right" | 09:30 10:00
| align="CENTER" bgcolor="#b9c2dc" | '''Wenju Wang'''<br> The XSS Detection and Defense Techniques and Case Studies
+
| bgcolor="#eeeeee" align="center" | '''Larry Man&nbsp; (Language: Chinese)'''<br>Data Control: Improve Database Security through Vulnerability Management
 
|-
 
|-
| width="14%" height="49" align="right" | 09:30 – 10:00
+
| height="49" width="14%" align="right" | 10:00 – 10:30
| align="CENTER" bgcolor="#eeeeee" | '''Larry Man'''<br> Data Control: Improve Database Security through Vulnerability Management
+
| bgcolor="#b9c2dc" align="center" | '''Daniel Ng&nbsp; (Language: Chinese)'''<br>Beefing up Cloud Application through Genetic Network Coding
 
|-
 
|-
| width="14%" height="49" align="right" | 10:00 10:30
+
| height="49" width="14%" align="right" | 10:30 11:00
| align="CENTER" bgcolor="#b9c2dc" | '''Daniel Ng'''<br> Beefing up Cloud Application through Genetic Network Coding
+
| bgcolor="#eeeeee" align="center" | '''Dr. Meng-Chow Kang&nbsp; (Language: Chinese)'''<br>Overview of ISO/IEC 27034 - the Application Security Standards
 
|-
 
|-
| width="14%" height="49" align="right" | 10:30 – 11:00
+
| height="49" width="14%" align="right" | 11:00 – 11:30
| align="CENTER" bgcolor="#eeeeee" | '''Dr. Meng-Chow Kang'''<br> Overview of ISO/IEC 27034 - the Application Security Standards
+
| bgcolor="#b9c2dc" align="center" | '''Jianmeng Li (Language: Chinese)'''<br>Secure C Function: The Lightweight Solution for Buffer Overflow
 
|-
 
|-
| width="14%" height="49" align="right" | 11:00 11:30
+
| height="49" width="14%" align="right" | 11:30 12:00
| align="CENTER" bgcolor="#b9c2dc" | '''Jianmeng Li'''<br> Secure C Function: The Lightweight Solution for Buffer Overflow
+
| bgcolor="#eeeeee" align="center" | '''Langyu Hu (Language: Chinese)'''<br>RFID Security
 
|-
 
|-
| width="14%" height="49" align="right" | 11:30 12:00
+
| height="17" width="14%" align="right" | 12:00 14:30
| align="CENTER" bgcolor="#eeeeee" | '''Langyu Hu'''<br> RFID Security
+
| bgcolor="#d98b66" align="center" | '''Lunch &amp; Networking'''
 
|-
 
|-
| width="14%" height="17" align="right" | 12:00 – 15:00  
+
| height="49" width="14%" align="right" | 14:30 – 15:00  
| align="CENTER" bgcolor="#d98b66" | '''Lunch & Networking'''
+
| bgcolor="#b9c2dc" align="center" | '''Yongjian Guo (Language: Chinese)'''<br>Information Security Forensics
 
|-
 
|-
| width="14%" height="49" align="right" | 15:00 – 15:30  
+
| height="49" width="14%" align="right" | 15:00 – 15:30  
| align="CENTER" bgcolor="#b9c2dc" | '''Chenming Zhong'''<br>Overview of Website Security
+
| bgcolor="#eeeeee" align="center" | '''Chenming Zhong (Language: Chinese)'''<br>Overview of Website Security
 
|-
 
|-
| width="14%" height="49" align="right" | 15:30 – 16:00  
+
| height="49" width="14%" align="right" | 15:30 – 16:00  
| align="CENTER" bgcolor="#eeeeee" | '''Tony'''<br> 2011 Application Security with 0-Day Vulnerability Analysis
+
| bgcolor="#b9c2dc" align="center" | '''Tony (Language: Chinese)'''<br>2011 Application Security with 0-Day Vulnerability Analysis
 
|-
 
|-
| width="14%" height="49" align="right" | 16:00 – 16:15  
+
| height="49" width="14%" align="right" | 16:00 – 16:15  
| align="CENTER" bgcolor="#b9c2dc" | Lucky Draw
+
| bgcolor="#eeeeee" align="center" | Lucky Draw
 
|-
 
|-
| width="14%" height="49" align="right" | 16:15 – 16:45  
+
| height="49" width="14%" align="right" | 16:15 – 16:45  
| align="CENTER" bgcolor="#b9c2dc" | '''Yongbo Liu'''<br> The Challenges of China's Post Information Security Era
+
| bgcolor="#b9c2dc" align="center" | '''Yongbo Liu (Language: Chinese)'''<br>The Challenges of China's Post Information Security Era
 
|-
 
|-
| width="14%" height="49" align="right" | 16:45 – 17:15  
+
| height="49" width="14%" align="right" | 16:45 – 17:15  
| align="CENTER" bgcolor="#b9c2dc" | '''Dr. Jianchun Jiang'‘’ <br> NSACE - The Network Security Capability Oriented Training and Certificates
+
| bgcolor="#eeeeee" align="center" | '''Dr. Jianchun Jiang (Language: Chinese)<br>NSACE - The Network Security Capability Oriented Training and Certificates'''
 
|-
 
|-
| width="14%" height="49" align="right" | 17:15 – 17:45  
+
| height="49" width="14%" align="right" | 17:15 – 17:45  
| align="CENTER" bgcolor="#eeeeee" | TBD<br>Future Plan of OWASP China and Release of WAF Testing Benchmark
+
| bgcolor="#b9c2dc" align="center" | <br>Future Plan of OWASP China and Release of WAF Testing Benchmark
 
|-
 
|-
| width="14%" height="17" align="right" | 17:45 – 18:00  
+
| height="17" width="14%" align="right" | 17:45 – 18:00  
| align="CENTER" bgcolor="#eeeeee" | '''Closing'''
+
| bgcolor="#eeeeee" align="center" | '''Closing'''
 
|}
 
|}
</center>
 
<br>
 
  
<br>  
+
<br>
 +
 
 +
<br>
  
==== Training  ====
+
= Training  =
<center>
+
<center></center>
  
 
== '''November 10th'''  ==
 
== '''November 10th'''  ==
Line 408: Line 411:
 
|}
 
|}
 
</center>  
 
</center>  
==== Sponsors  ====
+
= Sponsors  =
  
 
=== Sponsor US!  ===
 
=== Sponsor US!  ===
Line 479: Line 482:
  
  
==== Media Partners  ====
+
= Media Partners  =
  
 
'''International Media:'''  
 
'''International Media:'''  
Line 523: Line 526:
 
|}
 
|}
  
==== Team  ====
+
= Team  =
  
 
*[mailto:heleng@owasp.org Contact us]
 
*[mailto:heleng@owasp.org Contact us]
Line 538: Line 541:
 
*[mailto:zhendong.yu@owasp.org Zhendong Yu 于振东]
 
*[mailto:zhendong.yu@owasp.org Zhendong Yu 于振东]
  
==== Expense  ====
+
= Expense  =
  
 
=== Registration Fee  ===
 
=== Registration Fee  ===
Line 548: Line 551:
 
Please check the local hotel website for detail information.  
 
Please check the local hotel website for detail information.  
  
==== Logistics ====
+
= Logistics =
  
 
=== Venue  ===
 
=== Venue  ===
Line 583: Line 586:
 
*For detailed information on obtaining a business visa for this event, please refer to [http://www.china-embassy.org/eng/hzqz/zgqz/t84247.htm Chinese embassy]
 
*For detailed information on obtaining a business visa for this event, please refer to [http://www.china-embassy.org/eng/hzqz/zgqz/t84247.htm Chinese embassy]
  
==== Chapter Leader Workshop  ====
+
= Chapter Leader Workshop =
 +
 
 +
  '''[https://docs.google.com/a/owasp.org/document/d/1z_3ehI9T_lIeMmkeUo9QL9mbjh8ygSKquVlBaJY7ed4/edit Meeting Minutes from Chapters Workshop]'''
 +
 
 +
'''[https://plus.google.com/photos/100460852248386556939/albums/5676383343638946545 Photos of Chapters Workshop]'''
  
 
== '''What is the Chapter Leader Workshop?'''  ==
 
== '''What is the Chapter Leader Workshop?'''  ==

Latest revision as of 10:39, 1 February 2012

OWASP 2011 AppSec Asia.jpg


OWASP Global AppSec Asia Pacific 2011 - Beijing China

OWASP China-Mainland Chapter will host OWASP Global AppSec Asia 2011 in Beijing, China from Nov. 8 to Nov. 11, 2011. The summit will gather OWASP leaders, security experts, executives, technical thought leaders, developers, scientists and researchers from Asia and around the world for in-depth discussions of cutting-edge application security issues. The summit will draw participation from major Chinese and global organizations across various verticals including government, information technology, services and consulting, telecommunications, finance, e-commerce, Internet, universities and research institutes. About 800 people are expected to attend the summit, which will be covered by major news media. Panel discussions, vendor exhibit, and dinners will be held at the summit, providing sufficient networking opportunities.