This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "LatamTour2012 BA Agenda"

From OWASP
Jump to: navigation, search
 
(15 intermediate revisions by 3 users not shown)
Line 1: Line 1:
{|  border=1
+
<noinclude>{{:LatamTour2012 header}}</noinclude>
| height="60" align="center" colspan="5" style="background: rgb(64, 88, 160) none repeat scroll 0% 0%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous; color: white;" | <font size="5"> '''Plenary Day 1 - 4/4/2012'''</font>
 
|-
 
|  width=72 valign=middle bgcolor=#7b8abd |
 
!  width=200 valign=middle height=60 bgcolor=#c0a0a0 align=center | Offense & Tools<br>Room 201
 
!  width=200 valign=middle height=60 bgcolor=#ffdf80 align=center | Case Studies<br>Room 202A
 
!  width=200 valign=middle height=60 bgcolor=#a0c0e0 align=center | IoMT<br>Room 202B
 
!  width=200 valign=middle height=60 bgcolor=#b3ff99 align=center | Interrogate&#33;<br>Room 206
 
|-
 
|  width=72 valign=middle bgcolor=#7b8abd | 7:30 AM - 8:50 AM
 
|  align=center colspan=4 valign=middle height=30 bgcolor=#e0e0e0 align=center | Registration
 
|-
 
|  width=72 valign=middle bgcolor=#7b8abd | 8:50 AM - 9:00 AM
 
|  align=center colspan=4 valign=middle height=30 bgcolor=#e0e0e0 align=center | Welcome and Opening Remarks<br>Room 202A
 
|-
 
|  width=72 valign=middle bgcolor=#7b8abd | 9:00 AM - 10:00 AM
 
|  align=center colspan=4 valign=middle height=60 bgcolor=#e0e0e0 align=center |[https://www.owasp.org/index.php/OWASP_AppSec_DC_2012/Dan_Geer Keynote: Dan Geer]<br>Room 202A
 
|-
 
|  width=72 valign=middle bgcolor=#7b8abd | 10:00 AM - 10:45 AM
 
|  align=center colspan=4 valign=middle height=30 bgcolor=#e0e0e0 align=center |[https://www.owasp.org/index.php/OWASP_AppSec_DC_2012/OWASP_Board OWASP Board]<br>Room 202A
 
|-
 
|  width=72 valign=middle bgcolor=#7b8abd | 10:45 AM - 11:00 AM
 
|  align=center colspan=4 valign=middle height=30 bgcolor=#e0e0e0 align=center | Coffee Break
 
|-
 
|  width=72 valign=middle bgcolor=#7b8abd | 11:00 AM - 11:50 AM
 
| align=center width=200 valign=middle height=60 bgcolor=#c0a0a0 align=center  | [[OWASP_AppSec_DC_2012/DOMJacking__Attack_Exploit_and_Defense|DOMJacking - Attack, Exploit and Defense]]<br>video | [[media: ASDC12-DOMJacking_Attack_Exploit_and_Defense.pdf|slides]]<br><br>Shreeraj Shah
 
| align=center width=200 valign=middle height=60 bgcolor=#ffdf80 align=center  | [[OWASP_AppSec_DC_2012/The_Unfortunate_Reality_of_Insecure_Libraries|The Unfortunate Reality of Insecure Libraries]]<br>video | [[media: ASDC12-The_Unfortunate_Reality_of_Insecure_Libraries.pdf|slides]]<br><br>Jeff Williams and Arshan Dabirsiaghi
 
| align=center width=200 valign=middle height=60 bgcolor=#a0c0e0 align=center  | [[OWASP_AppSec_DC_2012/Python_Basics_for_Web_App_Pentesters__Part_2|Python Basics for Web App Pentesters - Part 2]]<br>video | [[media: ASDC12-Python_Basics_for_Web_App_Pentesters__Part_2.pdf|slides]]<br><br>Justin Searle
 
| align=center width=200 valign=middle height=60 bgcolor=#b3ff99 align=center rowspan=3 | [[OWASP_AppSec_DC_2012/Integrating_Application_Security_into_your_Lifecycle_andProcurement|Integrating Application Security into your Lifecycle and
 
Procurement]]<br>video | slides<br><br>Moderator: Jim Manico
 
|-
 
|  width=72 valign=middle bgcolor=#7b8abd | 11:50 AM - 12:00 PM
 
|  valign=middle height=30 bgcolor=#e0e0e0 align=center colspan=3 | Coffee Break
 
|-
 
|  width=72 valign=middle bgcolor=#7b8abd | 12:00 PM - 12:50 PM
 
| align=center width=200 valign=middle height=60 bgcolor=#c0a0a0 align=center  | [[OWASP_AppSec_DC_2012/Attacking_CAPTCHAs_for_Fun_and_Profit|Attacking CAPTCHAs for Fun and Profit]]<br>video | [[media: ASDC12-Attacking_CAPTCHAs_for_Fun_and_Profit.pdf|slides]]<br><br>Gursev Singh Kalra
 
| align=center width=200 valign=middle height=60 bgcolor=#ffdf80 align=center  | GoatDroid <br>video | slides<br><br>Jack Manino
 
| align=center width=200 valign=middle height=60 bgcolor=#a0c0e0 align=center  | [[OWASP_AppSec_DC_2012/Security_is_Dead_Long_Live_Rugged_DevOps_IT_at_LudicrousSpeed|Security is Dead. Long Live Rugged DevOps: IT at Ludicrous
 
Speed]]<br>video | [[media: ASDC12-Security_is_Dead_Long_Live_Rugged_DevOps_IT_at_LudicrousSpeed.pdf|slides]]<br><br>Joshua Corman
 
|-
 
|  width=72 valign=middle bgcolor=#7b8abd | 12:50 PM - 2:30 PM
 
|  valign=middle height=30 bgcolor=#e0e0e0 align=center colspan=4 | No-Host Lunch
 
|-
 
|  width=72 valign=middle bgcolor=#7b8abd | 2:30 PM - 3:20 PM
 
| align=center width=200 valign=middle height=60 bgcolor=#c0a0a0 align=center  | [[OWASP_AppSec_DC_2012/Hacking_NETC_Applications_The_Black_Arts|Hacking .NET(C#) Applications: The Black Arts]]<br>video | [[media: ASDC12-Hacking_NETC_Applications_The_Black_Arts.pdf|slides]]<br><br>Jon McCoy
 
| align=center width=200 valign=middle height=60 bgcolor=#ffdf80 align=center  | [[OWASP_AppSec_DC_2012/Security_at_scale_Web_application_security_in_a_continuousdeployment_environment|Security at scale: Web application security in a continuous
 
deployment environment]]<br>video | [[media: ASDC12-Security_at_scale_Web_application_security_in_a_continuousdeployment_environment.pdf|slides]]<br><br>Zane Lackey
 
| align=center width=200 valign=middle height=60 bgcolor=#a0c0e0 align=center  | [[OWASP_AppSec_DC_2012/The_Easy_Button_for_Your_Web_Application_Security_Career|The "Easy" Button for Your Web Application Security Career]]<br>video | [[media: ASDC12-The_Easy_Button_for_Your_Web_Application_Security_Career.pdf|slides]]<br><br>Salvador Grec
 
| align=center width=200 valign=middle height=60 bgcolor=#b3ff99 align=center rowspan=3 | [[OWASP_AppSec_DC_2012/Risk_Analysis_and_Measurement_with_CWRAF|Risk Analysis and Measurement with CWRAF]]<br>video | [[media:ASDC12-Risk Analysis and Measurement with CWRAF-1.pdf|slides]]<br><br>Joe Jarzombek, Bob Martin, Walter Houser and Tom Brennan
 
|-
 
|  width=72 valign=middle bgcolor=#7b8abd | 3:20 PM - 3:30 PM
 
|  valign=middle height=30 bgcolor=#e0e0e0 align=center colspan=3 | Coffee Break
 
|-
 
|  width=72 valign=middle bgcolor=#7b8abd | 3:30 PM - 4:20 PM
 
| align=center width=200 valign=middle height=60 bgcolor=#c0a0a0 align=center  | [[OWASP_AppSec_DC_2012/OWASP_Broken_Web_Applications_OWASP_BWA_10_Release|OWASP Broken Web Applications (OWASP BWA) 1.0 Release]]<br>video | [[media: ASDC12-OWASP_Broken_Web_Applications_OWASP_BWA_10_Release.pdf|slides]]<br><br>Chuck Willis
 
| align=center width=200 valign=middle height=60 bgcolor=#ffdf80 align=center  | [[OWASP_AppSec_DC_2012/Security_Is_Like_An_Onion_Thats_Why_It_Makes_You_Cry|Security Is Like An Onion, That's Why It Makes You Cry]]<br>video | [[media: ASDC12-Security_Is_Like_An_Onion_Thats_Why_It_Makes_You_Cry.pdf|slides]]<br><br>Michele Chubirka
 
| align=center width=200 valign=middle height=60 bgcolor=#a0c0e0 align=center  | [[OWASP_AppSec_DC_2012/Anatomy_of_a_Logic_Flaw|Anatomy of a Logic Flaw]]<br>video | [[media: ASDC12-Anatomy_of_a_Logic_Flaw.pdf|slides]]<br><br>Charles Henderson and David Byrne
 
  
|-  
+
{|style="vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;" align="center" cellspacing="5"
|  width=72 valign=middle bgcolor=#7b8abd | 4:20 PM - 4:30 PM
+
|-
| valign=middle height=30 bgcolor=#e0e0e0 align=center colspan=4 | Coffee Break
+
| align="center" height="30" style="background:#CCCCEE;" colspan="2"      | '''CURSO'''
|-  
+
|-
| width=72 valign=middle bgcolor=#7b8abd | 4:30 PM - 5:20 PM
+
| align="center" style="background:#EEEEEE;" colspan="2"                  | '''OWASP Latam Tour Argentina 2012'''
| align=center width=200 valign=middle height=60 bgcolor=#c0a0a0 align=center | [[OWASP_AppSec_DC_2012/New_and_Improved_Hacking_Oracle_from_Web|New and Improved Hacking Oracle from Web]]<br>video | [[media: ASDC12-New_and_Improved_Hacking_Oracle_From_Web.pdf|slides]]<br><br>Sumit Siddharth
+
|-
| align=center width=200 valign=middle height=60 bgcolor=#ffdf80 align=center | [[OWASP_AppSec_DC_2012/State_of_Web_Security|State of Web Security]]<br>video | [[media: ASDC12-State_of_Web_Security.pdf|slides]]<br><br>Robert Rowley
+
| valign="center" bgcolor="#CCCCEE" align="center" colspan="2"            | '''Descripcion y Objetivo'''
| align=center width=200 valign=middle height=60 bgcolor=#a0c0e0 align=center | [[OWASP_AppSec_DC_2012/Old_Webshells_New_Tricks__How_Persistent_Threats_haverevived_an_old_idea_and_how_you_can_detect_them|Old Webshells, New Tricks -- How Persistent Threats have
+
|-
revived an old idea, and how you can detect them.]]<br>video | [[media: ASDC12-Old_Webshells_New_Tricks_How_Persistent_Threats_haverevived_an_old_idea_and_how_you_can_detect_them.pdf|slides]]<br><br>Ryan Kazanciyan
+
| valign="left" height="80" bgcolor="#EEEEEE" align="left" colspan="2" |
| align=center width=200 valign=middle height=60 bgcolor=#b3ff99 align=center rowspan=3 | [[OWASP_AppSec_DC_2012/Fed_Panel|Fed Panel]]<br>video | slides<br><br>Moderator: Rex Booth<br>
+
 
Ron Ross, Joe Jarzombek, Kris Britton & Darren Death
+
*Aparte del OWASP Top 10, la mayoría de los [[:Category:OWASP_Project|Proyectos OWASP]] no son ampliamente utilizados en los ambientes corporativos. En la mayoría de los casos esto no es debido a una falta de calidad en los proyectos o la documentación disponible, sino mas bien por desconocer donde se ubicaran en un Ecosistema de Seguridad de Aplicaciones empresarial.
|-  
+
 
| width=72 valign=middle bgcolor=#7b8abd | 5:20 PM - 5:30 PM
+
* Este curso tiene como objetivo cambiar esta situación proporcionando una explicación sobre los proyectos OWASP mas maduros y listos para ser utilizados en el ambito empresarial.
| valign=middle height=30 bgcolor=#e0e0e0 align=center colspan=3 | Coffee Break
+
|-
|-  
+
| style="width:20%" valign="middle" bgcolor="#CCCCEE" align="center" colspan="0" | '''Fecha'''
| width=72 valign=middle bgcolor=#7b8abd | 5:30 PM - 6:20 PM
+
| style="width:80%" valign="middle"  bgcolor="#CCCCEE" align="center" colspan="0" | '''Lugar'''
| align=center width=200 valign=middle height=60 bgcolor=#c0a0a0 align=center | [[OWASP_AppSec_DC_2012/Unraveling_some_of_the_Mysteries_around_DOMbased_XSS|Unraveling some of the Mysteries around DOM-based XSS]]<br>video | [[media: ASDC12-Unraveling_some_of_the_Mysteries_around_DOMbased_XSS.pdf|slides]]<br><br>Dave Wichers
+
|-
| align=center width=200 valign=middle height=60 bgcolor=#ffdf80 align=center | [[OWASP_AppSec_DC_2012/2012_Global_Security_Report|2012 Global Security Report]]<br>video | [[media: ASDC12-2012_Global_Security_Report.pdf|slides]]<br><br>Tom Brennan and Nick Percoco
+
| valign="middle" bgcolor="#EEEEEE" align="center" | 14 de Mayo de 2012
| align=center width=200 valign=middle height=60 bgcolor=#a0c0e0 align=center | [[OWASP_AppSec_DC_2012/Survivable_Software_for_CyberPhysical_Systems|Survivable Software for Cyber-Physical Systems]]<br>video | [[media: ASDC12-Survivable_Software_for_CyberPhysical_Systems.pdf|slides]]<br><br>Karen Mercedes Goertzel
+
| valign="middle" bgcolor="#EEEEEE" align="left" | Aula Magna - [http://www.udemm.edu.ar Universidad de la Marina Mercante (UdeMM)] ubicado en Av. Rivadavia 2258, Ciudad Autónoma de Buenos Aires, Capital Federal, Argentina.
|-  
+
|-
| width=72 valign=middle bgcolor=#7b8abd | 6:20 PM
+
| align="center" style="background:#CCCCEE;" colspan="2" | '''Precio y Registracion'''
| valign=middle height=30 bgcolor=#e0e0e0 align=center colspan=4 | Networking Opportunity in Room 207AB sponsored by: [[Image:SPL-LOGO-MED.png|link=https://www.trustwave.com/]]
+
|-
 +
| align="center" style="background:#CCCCEE;" colspan="2" | GRATIS - [https://www.regonline.com/latamtourarg2012 Registrate AQUI]
 +
 +
|}
 +
<br>
 +
{|style="vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;" align="center" cellspacing="5"
 +
|-
 +
| style="width:90%" valign="middle" height="40" bgcolor="#CCCCEE" align="center" colspan="6" | '''DETALLES DE LA JORNADA'''
 +
|-
 +
| style="width:10%" valign="middle" height="30" bgcolor="#CCCCEE" align="center" colspan="0" | '''Horario'''
 +
| style="width:27%" valign="middle" height="30" bgcolor="#CCCCEE" align="center" colspan="0" | '''Modulo'''
 +
| style="width:23%" valign="middle" height="30" bgcolor="#CCCCEE" align="center" colspan="0" | '''Ponente'''
 +
| style="width:40%" valign="middle" height="30" bgcolor="#CCCCEE" align="center" colspan="0" | '''Detalles'''
 +
|-
 +
| style="width:10%" valign="middle" height="30" bgcolor="#CCEEEE" align="center" colspan="0" | 09:00 - 09:15
 +
| style="width:27%" valign="middle" height="30" bgcolor="#CCEEEE" align="center" colspan="0" | Inició y presentación del evento
 +
| style="width:23%" valign="middle" height="30" bgcolor="#CCEEEE" align="center" colspan="0" | Martín Tartarelli, Pablo Romanos
 +
| style="width:40%" valign="middle" height="30" bgcolor="#CCEEEE" align="center" colspan="0" |
 +
|-
 +
| style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 09:15 - 10:00
 +
| style="width:27%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Post Explotation: PHP Backdoor Introduction
 +
| style="width:23%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Claudio Caracciolo
 +
| style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | [[File:CCaracciolo_PHPBackdoor.pdf]]
 +
|-
 +
| style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 10:00 - 10:45
 +
| style="width:27%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Consecuencias de un Administrador "perezoso"
 +
| style="width:23%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Cristian Borghello
 +
| style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | [[File:CBorghello_ConsecuenciasdeunAdmin.pdf]]
 +
|-
 +
| style="width:10%" valign="middle" height="30" bgcolor="#CCCCEE" align="center" colspan="0" | 10:45 - 11:15
 +
| style="width:27%" valign="middle" height="30" bgcolor="#CCCCEE" align="center" colspan="0" | Break
 +
| style="width:23%" valign="middle" height="30" bgcolor="#CCCCEE" align="center" colspan="0" |
 +
| style="width:40%" valign="middle" height="30" bgcolor="#CCCCEE" align="center" colspan="0" |
 +
|-
 +
| style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 11:15 - 11:45
 +
| style="width:27%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Datos Personales en el Ciclo de Vida de Desarrollo Seguro
 +
| style="width:23%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Pablo Romanos
 +
| style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | [[File:PRomanos_DatosPersonales.pdf]]
 +
|-
 +
|-
 +
| style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 11:45 - 12:15
 +
| style="width:27%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | HTExploit - Bypassing htaccess and beyond
 +
| style="width:23%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Maximiliano Soler, Matias Katz
 +
| style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | [[File:MSoler_MKatz_HTExploit.pdf]]
 +
|-
 +
|-
 +
| style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 12:15 - 12:45
 +
| style="width:27%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Intro a HTML5
 +
| style="width:23%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Andres Riancho
 +
| style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | [[File:OWASP_Latam_2012_-_HTML5_-_Andres_Riancho.pdf]]
 +
|-
 +
|-
 +
| style="width:10%" valign="middle" height="30" bgcolor="#CCCCEE" align="center" colspan="0" | 12:45 - 14:00
 +
| style="width:27%" valign="middle" height="30" bgcolor="#CCCCEE" align="center" colspan="0" | Almuerzo
 +
| style="width:23%" valign="middle" height="30" bgcolor="#CCCCEE" align="center" colspan="0" |
 +
| style="width:40%" valign="middle" height="30" bgcolor="#CCCCEE" align="center" colspan="0" |  
 +
|-
 +
|-
 +
| style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 14:00 - 14:45
 +
| style="width:27%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Tu sitio web: un arma para el cibercrimen
 +
| style="width:23%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Sebastian Bortnik
 +
| style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | TBD
 +
|-
 +
|-
 +
|-
 +
| style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 14:45 - 15:30
 +
| style="width:27%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Modelado de Amenazas: Una Introducción
 +
| style="width:23%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Hernan Racciatti
 +
| style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | [[File:HRacciatti_ModeladodeAmenazas.pdf]]
 +
|-
 +
|-
 +
| style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 15:30 - 16:15
 +
| style="width:27%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Desarrollo seguro con herramientas y procesos OWASP
 +
| style="width:23%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Fabio Cerullo
 +
| style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | TBD
 +
|-
 +
|-
 +
| style="width:10%" valign="middle" height="30" bgcolor="#CCCCEE" align="center" colspan="0" | 16:15 - 16:45
 +
| style="width:27%" valign="middle" height="30" bgcolor="#CCCCEE" align="center" colspan="0" | Break
 +
| style="width:23%" valign="middle" height="30" bgcolor="#CCCCEE" align="center" colspan="0" |
 +
| style="width:40%" valign="middle" height="30" bgcolor="#CCCCEE" align="center" colspan="0" |
 +
|-
 +
|-
 +
| style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 16:45 - 17:45
 +
| style="width:27%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Panel de Hacktivismo
 +
| style="width:23%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Hernan Racciatti, Ricardo Saenz, Daniel Monastersky, Mariano del Rio
 +
| style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | TBD
 +
|-
 +
|-
 +
| style="width:10%" valign="middle" height="30" bgcolor="#CCEEEE" align="center" colspan="0" | 17:45 - 18:00
 +
| style="width:27%" valign="middle" height="30" bgcolor="#CCEEEE" align="center" colspan="0" | Entrega de premios y cierre del evento
 +
| style="width:23%" valign="middle" height="30" bgcolor="#CCEEEE" align="center" colspan="0" | Martín Tartarelli
 +
| style="width:40%" valign="middle" height="30" bgcolor="#CCEEEE" align="center" colspan="0" |
 +
|-
 
|}
 
|}

Latest revision as of 01:10, 5 June 2012

Logo Latam2012.jpg
CURSO
OWASP Latam Tour Argentina 2012
Descripcion y Objetivo
  • Aparte del OWASP Top 10, la mayoría de los Proyectos OWASP no son ampliamente utilizados en los ambientes corporativos. En la mayoría de los casos esto no es debido a una falta de calidad en los proyectos o la documentación disponible, sino mas bien por desconocer donde se ubicaran en un Ecosistema de Seguridad de Aplicaciones empresarial.
  • Este curso tiene como objetivo cambiar esta situación proporcionando una explicación sobre los proyectos OWASP mas maduros y listos para ser utilizados en el ambito empresarial.
Fecha Lugar
14 de Mayo de 2012 Aula Magna - Universidad de la Marina Mercante (UdeMM) ubicado en Av. Rivadavia 2258, Ciudad Autónoma de Buenos Aires, Capital Federal, Argentina.
Precio y Registracion
GRATIS - Registrate AQUI


DETALLES DE LA JORNADA
Horario Modulo Ponente Detalles
09:00 - 09:15 Inició y presentación del evento Martín Tartarelli, Pablo Romanos
09:15 - 10:00 Post Explotation: PHP Backdoor Introduction Claudio Caracciolo File:CCaracciolo PHPBackdoor.pdf
10:00 - 10:45 Consecuencias de un Administrador "perezoso" Cristian Borghello File:CBorghello ConsecuenciasdeunAdmin.pdf
10:45 - 11:15 Break
11:15 - 11:45 Datos Personales en el Ciclo de Vida de Desarrollo Seguro Pablo Romanos File:PRomanos DatosPersonales.pdf
11:45 - 12:15 HTExploit - Bypassing htaccess and beyond Maximiliano Soler, Matias Katz File:MSoler MKatz HTExploit.pdf
12:15 - 12:45 Intro a HTML5 Andres Riancho File:OWASP Latam 2012 - HTML5 - Andres Riancho.pdf
12:45 - 14:00 Almuerzo
14:00 - 14:45 Tu sitio web: un arma para el cibercrimen Sebastian Bortnik TBD
14:45 - 15:30 Modelado de Amenazas: Una Introducción Hernan Racciatti File:HRacciatti ModeladodeAmenazas.pdf
15:30 - 16:15 Desarrollo seguro con herramientas y procesos OWASP Fabio Cerullo TBD
16:15 - 16:45 Break
16:45 - 17:45 Panel de Hacktivismo Hernan Racciatti, Ricardo Saenz, Daniel Monastersky, Mariano del Rio TBD
17:45 - 18:00 Entrega de premios y cierre del evento Martín Tartarelli