This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "CraigsFROCDraft"
From OWASP
(Created page with "===Notes=== * Can't serve breakfast at 7:30, or can we? James' coffee idea? The agenda follows the successful OWASP conference multi track format, with opening keynotes and ...") |
|||
(2 intermediate revisions by the same user not shown) | |||
Line 1: | Line 1: | ||
− | |||
− | |||
− | |||
− | {| style="width: | + | {| style="width:96%" border="0" align="center" |
! colspan="4" align="center" style="background:#4058A0; color:white" | March 22nd, 2012 | ! colspan="4" align="center" style="background:#4058A0; color:white" | March 22nd, 2012 | ||
|- | |- | ||
− | | style="width:10%; background:#7B8ABD" | 07: | + | | style="width:10%; background:#7B8ABD" | 07:45-08:30 || colspan="3" style="width:80%; background:#C2C2C2" align="left" | Registration and Continental Breakfast in the Adirondack Room |
|- | |- | ||
− | | style="width:10%; background:#7B8ABD" | 08:30-08: | + | | style="width:10%; background:#7B8ABD" | 08:30-08:45 || colspan="3" style="width:80%; background:#F2F2F2" align="center" | Welcome to SnowFROC 2012 Conference |
+ | |||
''OWASP Denver and OWASP Boulder Chapter Leaders'' | ''OWASP Denver and OWASP Boulder Chapter Leaders'' | ||
|- | |- | ||
− | | style="width:10%; background:#7B8ABD" | 08: | + | | style="width:10%; background:#7B8ABD" | 08:45-09:10 || colspan="3" style="width:80%; background:#F2F2F2" align="center" | |
− | '''Keynote:''' | + | '''State of OWASP''' |
+ | |||
+ | ''Matt Tesauro'' | ||
+ | |- | ||
+ | | style="width:10%; background:#7B8ABD" | 09:10-10:10 || colspan="3" style="width:80%; background:#F2F2F2" align="center" | '''Keynote:''' | ||
''John Pirc, Co-Author of [http://www.amazon.com/Cybercrime-Espionage-Analysis-Subversive-Multi-Vector/dp/1597496138/ref=sr_1_1?s=books&ie=UTF8&qid=1330542019&sr=1-1 "Cybercrime and Espionage: An Analysis of Subversive Multi-Vector Threats"]'' | ''John Pirc, Co-Author of [http://www.amazon.com/Cybercrime-Espionage-Analysis-Subversive-Multi-Vector/dp/1597496138/ref=sr_1_1?s=books&ie=UTF8&qid=1330542019&sr=1-1 "Cybercrime and Espionage: An Analysis of Subversive Multi-Vector Threats"]'' | ||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
|- | |- | ||
− | | style="width:10%; background:#7B8ABD" | 10: | + | | style="width:10%; background:#7B8ABD" | 10:10-10:30 || colspan="3" style="width:80%; background:#C2C2C2" align="left" | Break - Expo |
|- | |- | ||
− | | style="width:10%; background:#7B8ABD" | || colspan="1" style="width:45%; background:#BC857A" | '''Track | + | | style="width:10%; background:#7B8ABD" | || colspan="1" style="width:45%; background:#BC857A" | '''Tech Track - Zenith Room 640''' |
− | | colspan="1" style="width:45%; background:#BCA57A" | '''Track | + | | colspan="1" style="width:45%; background:#BCA57A" | '''Management Track - Senate Chamber''' |
<!-- | style="width:22%; background:#C6E2FF" | '''Management / Exec Track: Room 3''' --> | <!-- | style="width:22%; background:#C6E2FF" | '''Management / Exec Track: Room 3''' --> | ||
|- | |- | ||
− | | style="width:10%; background:#7B8ABD" | 10:30-11:15 || style="width:45%; background:#BC857A" align="left" | | + | | style="width:10%; background:#7B8ABD" | 10:30-11:15 || style="width:45%; background:#BC857A" align="left" | OWASP Passfault |
− | '' | + | ''Cameron Morris'' |
− | | style="width:45%; background:#BCA57A" align="left" | | + | | style="width:45%; background:#BCA57A" align="left" | Managing IT Risk in a Cloud Environment |
− | '' | + | ''Karl Steinkamp'' |
<!-- | style="width:22%; background:#C6E2FF" align="left" | TBD | <!-- | style="width:22%; background:#C6E2FF" align="left" | TBD | ||
Line 46: | Line 41: | ||
− | | style="width:10%; background:#7B8ABD" | 11:15-12:00 || style="width:45%; background:#BC857A" align="left" | | + | | style="width:10%; background:#7B8ABD" | 11:15-12:00 || style="width:45%; background:#BC857A" align="left" | State of Web Security: Monitored Attacks |
− | '' | + | |
+ | ''Robert Rowley'' | ||
− | | style="width:45%; background:#BCA57A" align="left" | | + | | style="width:45%; background:#BCA57A" align="left" | PCI vs Risk Management |
− | '' | + | ''Doug Landoll'' |
− | <!-- | style="width:22%; background:#C6E2FF" align="left" | | + | <!-- | style="width:22%; background:#C6E2FF" align="left" | Securing Data from the Web Tier ''Mike Fleck'' --> |
|- | |- | ||
Line 58: | Line 54: | ||
|- | |- | ||
− | | style="width:10%; background:#7B8ABD" | 13:00-13:50 || style="width:45%; background:#BC857A" align="left" | | + | | style="width:10%; background:#7B8ABD" | 13:00-13:50 || style="width:45%; background:#BC857A" align="left" | Panel Discussion - Favorite tools and techniques - pen-testing, static analysis, code reviews |
− | '' | + | ''Panelists'' |
− | | style="width:45%; background:#BCA57A" align="left" | | + | | style="width:45%; background:#BCA57A" align="left" | Securing Data from the Web Tier |
− | '' | + | ''Mike Fleck'' |
<!-- | style="width:22%; background:#C6E2FF" align="left" | TBD | <!-- | style="width:22%; background:#C6E2FF" align="left" | TBD | ||
Line 70: | Line 66: | ||
− | | style="width:10%; background:#7B8ABD" | 13:50-14:40 || style="width:45%; background:#BC857A" align="left" | | + | | style="width:10%; background:#7B8ABD" | 13:50-14:40 || style="width:45%; background:#BC857A" align="left" | Gray, the new black: Gray box vulnerability testing |
− | '' | + | ''Adam Hills'' |
+ | |||
+ | | style="width:45%; background:#BCA57A" align="left" | Web Session Intelligence | ||
− | + | ''LAZ'' | |
− | '' | ||
<!-- | style="width:22%; background:#C6E2FF" align="left" | TBD | <!-- | style="width:22%; background:#C6E2FF" align="left" | TBD | ||
Line 84: | Line 81: | ||
|- | |- | ||
− | | style="width:10%; background:#7B8ABD" | 15:00-15:50 || style="width:45%; background:#BC857A" align="left" | " | + | | style="width:10%; background:#7B8ABD" | 15:00-15:50 || style="width:45%; background:#BC857A" align="left" | "The Mobile Top 10" |
− | '' | + | ''Mike Zussman'' |
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
+ | | style="width:45%; background:#BCA57A" align="left" | A Scalable Secure Development Program | ||
+ | ''Rajiv Sharma'' | ||
|- | |- | ||
| style="width:10%; background:#7B8ABD" | 15:50-16:30 || colspan="3" style="width:80%; background:#C2C2C2" align="left" | End of Conference Panel Discussion: | | style="width:10%; background:#7B8ABD" | 15:50-16:30 || colspan="3" style="width:80%; background:#C2C2C2" align="left" | End of Conference Panel Discussion: | ||
Line 101: | Line 91: | ||
Topic: ''The Crystal Ball and the 2-headed Calf - What's on the Horizon and Why Does It Seem So Unnatural?'' | Topic: ''The Crystal Ball and the 2-headed Calf - What's on the Horizon and Why Does It Seem So Unnatural?'' | ||
− | Moderator: Steve Kosten | + | Moderator: Steve Kosten |
Panelists: Laz, Matt Tesauro, John Pirc, Tanner Coltrin, Steve Kosten, others | Panelists: Laz, Matt Tesauro, John Pirc, Tanner Coltrin, Steve Kosten, others | ||
− | |||
|- | |- | ||
− | |||
|- | |- | ||
| style="width:10%; background:#7B8ABD" | 16:30-17:30 || colspan="3" style="width:80%; background:#C2C2C2" align="left" | Wrap up, vendor raffles! | | style="width:10%; background:#7B8ABD" | 16:30-17:30 || colspan="3" style="width:80%; background:#C2C2C2" align="left" | Wrap up, vendor raffles! | ||
|- | |- | ||
− | |||
|} | |} |
Latest revision as of 00:32, 2 March 2012
March 22nd, 2012 | |||
---|---|---|---|
07:45-08:30 | Registration and Continental Breakfast in the Adirondack Room | ||
08:30-08:45 | Welcome to SnowFROC 2012 Conference
OWASP Denver and OWASP Boulder Chapter Leaders | ||
08:45-09:10 |
State of OWASP Matt Tesauro | ||
09:10-10:10 | Keynote:
John Pirc, Co-Author of "Cybercrime and Espionage: An Analysis of Subversive Multi-Vector Threats" | ||
10:10-10:30 | Break - Expo | ||
Tech Track - Zenith Room 640 | Management Track - Senate Chamber | ||
10:30-11:15 | OWASP Passfault
Cameron Morris |
Managing IT Risk in a Cloud Environment
Karl Steinkamp | |
11:15-12:00 | State of Web Security: Monitored Attacks
Robert Rowley |
PCI vs Risk Management
Doug Landoll | |
12:00-13:00 | Lunch - Expo | ||
13:00-13:50 | Panel Discussion - Favorite tools and techniques - pen-testing, static analysis, code reviews
Panelists |
Securing Data from the Web Tier
Mike Fleck
| |
13:50-14:40 | Gray, the new black: Gray box vulnerability testing
Adam Hills |
Web Session Intelligence
LAZ | |
14:40-15:00 | BREAK | ||
15:00-15:50 | "The Mobile Top 10"
Mike Zussman |
A Scalable Secure Development Program
Rajiv Sharma | |
15:50-16:30 | End of Conference Panel Discussion:
Topic: The Crystal Ball and the 2-headed Calf - What's on the Horizon and Why Does It Seem So Unnatural? Moderator: Steve Kosten Panelists: Laz, Matt Tesauro, John Pirc, Tanner Coltrin, Steve Kosten, others | ||
16:30-17:30 | Wrap up, vendor raffles! |