This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "OWASP New Zealand Day 2012"

From OWASP
Jump to: navigation, search
 
(15 intermediate revisions by 2 users not shown)
Line 21: Line 21:
 
==Registration==
 
==Registration==
  
As with last year, registration will be performed through the RegOnline system. Registrations will be limited to 300 people, so please register using the following link soon to reserve your spot!
+
<center>Registrations are now closed.</center>
 
 
<center>[https://www.regonline.com/owaspnzday2012 Register here!] - https://www.regonline.com/owaspnzday2012</center>
 
  
  
Line 29: Line 27:
  
 
* CFP & CFT closes: 22nd July 2012 [ CLOSED ]
 
* CFP & CFT closes: 22nd July 2012 [ CLOSED ]
* Conference Agenda due: 30th July 2012  
+
* Conference Agenda due: 30th July 2012 [ CLOSED ]
* Conference Registration deadline: 20th August 2012
+
* Conference Registration deadline: 20th August 2012 [ CLOSED ]
* Training Registration deadline: 20th August 2012
+
* Training Registration deadline: 27th August 2012 [ CLOSED ]
 
* Training Day date: 30th August 2012
 
* Training Day date: 30th August 2012
 
* Conference Day date: 31st August 2012
 
* Conference Day date: 31st August 2012
Line 59: Line 57:
 
   </tr>
 
   </tr>
 
</table>
 
</table>
 
+
----
  
 
'''Gold Sponsors:'''
 
'''Gold Sponsors:'''
Line 67: Line 65:
 
     <td>&nbsp;</td>
 
     <td>&nbsp;</td>
 
     <td>&nbsp;</td>
 
     <td>&nbsp;</td>
     <td>&nbsp;</td>
+
     <td><center>[[File:F5aura-small.jpg|center|350px|link=http://www.aurainfosec.com/]]</center></td>
 
   </tr>
 
   </tr>
 
   <tr>
 
   <tr>
Line 73: Line 71:
 
     <td>&nbsp;</td>
 
     <td>&nbsp;</td>
 
     <td>&nbsp;</td>
 
     <td>&nbsp;</td>
     <td>&nbsp;</td>
+
     <td><center>[http://www.aurasoftwaresecurity.co.nz Aura Information Security in partnership with F5 Networks]</center></td>
 
   </tr>
 
   </tr>
 
</table>
 
</table>
 
+
----
 
<br>
 
<br>
 
'''Silver Sponsors:'''
 
'''Silver Sponsors:'''
 
<table width="100%" border="0" cellspacing="0" cellpadding="0">
 
<table width="100%" border="0" cellspacing="0" cellpadding="0">
 
   <tr>
 
   <tr>
     <td><center>[http://www.insomniasec.com/ https://www.owasp.org/images/e/ef/INSOMNIA.PNG]</center></td>
+
     <td><center>[[File:INSOMNIA.PNG|center|200px|link=http://www.insomniasec.com]]</center></td>
 
     <td>&nbsp;</td>
 
     <td>&nbsp;</td>
 
     <td>&nbsp;</td>
 
     <td>&nbsp;</td>
Line 100: Line 98:
 
   <tr>
 
   <tr>
 
     <td><center>[http://www.lateralsecurity.com/ www.lateralsecurity.com]</center></td>
 
     <td><center>[http://www.lateralsecurity.com/ www.lateralsecurity.com]</center></td>
 +
    <td>&nbsp;</td>
 +
    <td>&nbsp;</td>
 +
    <td>&nbsp;</td>
 +
  </tr>
 +
  <tr>
 +
    <td><center>[[File:webdrive_logo.jpg|center|200px|link=]]</center></td>
 +
    <td>&nbsp;</td>
 +
    <td>&nbsp;</td>
 +
    <td>&nbsp;</td>
 +
  </tr>
 +
  <tr>
 +
    <td><center>[http://www.webdrive.co.nz/ www.webdrive.co.nz]</center></td>
 
     <td>&nbsp;</td>
 
     <td>&nbsp;</td>
 
     <td>&nbsp;</td>
 
     <td>&nbsp;</td>
Line 116: Line 126:
  
  
= Conference Schedule =
+
= Training =
==Conference Schedule==
+
==Training==
 +
 
 +
===Test-Driven Security===
 +
-----
 +
<b>Abstract</b>
 +
 
 +
The purpose of this training is to introduce and demonstrate some
 +
application of test-driven security. Based on a ruby application, we
 +
are going to see how developers and testers can quickly improve and
 +
ensure the security of an application by asking themselves some simple
 +
questions and by checking simple things in their test cases.
 +
 +
 
 +
<b>Trainer:</b> Louis Nyffenegger - PentesterLab
 +
 
 +
Louis is a security consultant working in Melbourne for Securus
 +
Global. He focus on web application security and presented to Ruxcon,
 +
Owasp and Auscert. In his spare, he works on 2 side projects:
 +
pentesterlab (a training web site) and pntstr (an easy web to run the
 +
first round of an interview).
 +
 
 +
[https://pentesterlab.com/ PentesterLab.com]
 +
 
 +
 
 +
<b>Trainee Requiements</b>
 +
 
 +
* Laptop
 +
* Some virtualisation software able to run an ISO. I.e. VirtualBox or VMWare.
 +
* A basic Ruby understanding
 +
 
 +
 
 +
<b>Time:</b> 9am till 12pm, 30th August 2012
 +
 
 +
<b>Cost:</b> $250.00
 +
 
 +
[https://www.regonline.com/owaspnzday2012 Register here!]
 +
 
 +
 
 +
 
 +
===Teaching the Good-Guys Bad-Tricks - OWASP Top 10 in real-life===
 +
-----
 +
<b>Abstract</b>
 +
 
 +
"I'm taught and I forget, I do and I remember" is particularly true with web-security.
 +
At this session you will have web-security and insecurity clearly explained and we'll walk through clear examples.
 +
But not only will you learn the OWASP Top 10 but you will also hand-craft your own attacks.
 +
In our fully functional hack-lab websites you will have a variety of hack challenges from hacking into other users' accounts, stealing credit cards and killing websites!
 +
But wait, there's more! We'll also cover techniques you need to employ to defend these attacks. 
 +
 
 +
 
 +
<b>Trainer:</b>  Andy Prow - Aura
 +
 
 +
Andy Prow is an IT Security Consultant, Trainer and software developer who founded Aura back in 2001. With 18 years in the IT industry Andy has developed code for IBM, Vodafone, Telecom and Microsoft. Andy presents around the world at conferences including Microsoft's TechEd.
 +
 
 +
[http://www.aurainfosec.com/ AuraInfoSec.com]
 +
 
 +
 
 +
<b>Trainee Requiements</b>
 +
 
 +
* Laptop
 +
* A working browser and the [http://portswigger.net/burp/ Burp Suite] free edition installed.
 +
 
 +
 
 +
<b>Time:</b> 9am till 5pm, 30th August 2012
 +
 
 +
<b>Cost:</b> $500.00
 +
 
 +
[https://www.regonline.com/owaspnzday2012 Register here!]
 +
 
 +
 
 +
 
 +
= Presentations - UPDATED =
 +
==Conference Schedule / Presentations==
 
<center>
 
<center>
 
31st August 2012
 
31st August 2012
 
<table width="80%">
 
<table width="80%">
 
<tr>
 
<tr>
<td width="7%">08:30</td>
+
<td width="7%" valign="top">08:30</td>
 
<td colspan="2" style="background-color: #8595C2">Registration</td>
 
<td colspan="2" style="background-color: #8595C2">Registration</td>
 
</tr>
 
</tr>
 
 
 
<tr>
 
<tr>
<td width="7%">09:00</td>
+
<td width="7%" valign="top">09:00</td>
 
<td colspan="2" style="background-color: #EEE; text-align: center">
 
<td colspan="2" style="background-color: #EEE; text-align: center">
 
<b>Welcome to OWASP New Zealand Day 2012</b><br />
 
<b>Welcome to OWASP New Zealand Day 2012</b><br />
<i>Adrian Hayes and Nick Freeman (OWASP Leaders)</i>
+
<i>Adrian Hayes and Nick Freeman (OWASP Leaders)<br />Lech Janczewski - The University of Auckland Business School</i>
 
</td>
 
</td>
 
</tr>
 
</tr>
 
<tr>
 
<tr>
<td width="7%">09:10</td>
+
<td width="7%" valign="top">09:10</td>
 
<td colspan="2" style="background-color: #B9C2DC; text-align: center">
 
<td colspan="2" style="background-color: #B9C2DC; text-align: center">
<b>How do I get into Security? I'm a webdev! (An introduction to in2securITy)</b><br />
+
<b>[https://www.owasp.org/images/0/01/OWASPNZ2012_AdamB.pdf How do I get into Security? I'm a webdev! (An introduction to in2securITy) (pdf)]</b><br />
 
<i>Adam Bell - in2securITy</i>
 
<i>Adam Bell - in2securITy</i>
 
</td>
 
</td>
 
</tr>
 
</tr>
 
<tr>
 
<tr>
<td width="7%">09:25</td>
+
<td width="7%" valign="top">09:25</td>
 
<td colspan="2" style="background-color: #EEE; text-align: center">
 
<td colspan="2" style="background-color: #EEE; text-align: center">
<b>Blindsided by Security - The Reality of Web Security for the Visually Impaired</b><br />
+
<b>[https://www.owasp.org/images/1/1c/OWASPNZ2012_BrittaO_LauraB.pdf Blindsided by Security - The Reality of Web Security for the Visually Impaired (pdf)]</b><br />
<i>Laura Bell - Lateral Security</i>
+
<i>Laura Bell - Lateral Security and Britta Offergeld - Royal New Zealand Foundation of the Blind</i>
 
</td>
 
</td>
 
</tr>
 
</tr>
 
<tr>
 
<tr>
<td width="7%">10:00</td>
+
<td width="7%" valign="top">10:00</td>
 
<td colspan="2" style="background-color: #B9C2DC; text-align: center">
 
<td colspan="2" style="background-color: #B9C2DC; text-align: center">
<b>Internet Junk</b><br />
+
<b>[https://www.owasp.org/images/6/67/OWASPNZ2012_QuintinR.pdf Internet Junk (pdf)]</b><br />
 
<i>Quintin Russ - SiteHost</i>
 
<i>Quintin Russ - SiteHost</i>
 
</td>
 
</td>
Line 156: Line 238:
 
 
 
<tr>
 
<tr>
<td width="7%">10:30</td>
+
<td width="7%" valign="top">10:30</td>
 
<td colspan="2" style="background-color: #D98B66; text-align: center">
 
<td colspan="2" style="background-color: #D98B66; text-align: center">
 
<b>Break for Morning Tea</b><br />
 
<b>Break for Morning Tea</b><br />
Line 163: Line 245:
 
 
 
<tr>
 
<tr>
<td width="7%">11:00</td>
+
<td width="7%" valign="top">11:00</td>
 
<td colspan="2" style="background-color: #EEE; text-align: center">
 
<td colspan="2" style="background-color: #EEE; text-align: center">
<b>Defeating Cross-Site Scripting with Content Security Policy</b><br />
+
<b>[http://www.slideshare.net/fmarier/owaspnzday2012 Defeating Cross-Site Scripting with Content Security Policy (external link)]</b><br />
 
<i>Francois Marier - Mozilla</i>
 
<i>Francois Marier - Mozilla</i>
 
</td>
 
</td>
 
</tr>
 
</tr>
 
<tr>
 
<tr>
<td width="7%">11:20</td>
+
<td width="7%" valign="top">11:20</td>
 
<td colspan="2" style="background-color: #B9C2DC; text-align: center">
 
<td colspan="2" style="background-color: #B9C2DC; text-align: center">
<b>The Dos and Don'ts of Web Application Frameworks</b><br />
+
<b>[https://www.owasp.org/images/7/7f/OWASPNZ2012_DenisA.pdf The Dos and Don'ts of Web Application Frameworks (pdf)]</b><br />
 
<i>Denis Andzakovic - Security-Assessment.com</i>
 
<i>Denis Andzakovic - Security-Assessment.com</i>
 
</td>
 
</td>
 
</tr>
 
</tr>
 
<tr>
 
<tr>
<td width="7%">11:50</td>
+
<td width="7%" valign="top">11:50</td>
 
<td colspan="2" style="background-color: #EEE; text-align: center">
 
<td colspan="2" style="background-color: #EEE; text-align: center">
<b>Web Application Firewalls - Going where no WAFs have gone before...</b><br />
+
<b>[https://www.owasp.org/images/8/81/OWASPNZ2012_AndyP_SamP.pdf Web Application Firewalls - Going where no WAFs have gone before... (pdf)]</b><br />
 
<i>Sam Pickles - F5, and Andy Prow - Aura</i>
 
<i>Sam Pickles - F5, and Andy Prow - Aura</i>
 
</td>
 
</td>
Line 185: Line 267:
 
 
 
<tr>
 
<tr>
<td width="7%">12:30</td>
+
<td width="7%" valign="top">12:30</td>
 
<td colspan="2" style="background-color: #D98B66; text-align: center">
 
<td colspan="2" style="background-color: #D98B66; text-align: center">
 
<b>Break for Lunch</b><br />
 
<b>Break for Lunch</b><br />
Line 192: Line 274:
 
 
 
<tr>
 
<tr>
<td width="7%">13:45</td>
+
<td width="7%" valign="top">13:45</td>
 
<td style="background-color: #B9C2DC; text-align: center">
 
<td style="background-color: #B9C2DC; text-align: center">
<b>Mobile NFC 101</b><br />
+
<b>[https://www.owasp.org/images/e/ed/OWASPNZ2012_NickVD.pdf Mobile NFC 101 (pdf)]</b><br />
 
<i>Nick von Dadelszen - Lateral Security</i>
 
<i>Nick von Dadelszen - Lateral Security</i>
 
</td>
 
</td>
 
<td style="background-color: #B9C2DC; text-align: center">
 
<td style="background-color: #B9C2DC; text-align: center">
<b>Comply or Die Trying</b><br />
+
<b>[https://www.owasp.org/images/e/e3/OWASPNZ2012_AndrewK.pdf Comply or Die Trying (pdf)]</b><br />
 
<i>Andrew Kelly</i>
 
<i>Andrew Kelly</i>
 
</td>
 
</td>
 
</tr>
 
</tr>
 
<tr>
 
<tr>
<td width="7%">14:45</td>
+
<td width="7%" valign="top">14:45</td>
 
<td rowspan="2" style="background-color: #EEE; text-align: center">
 
<td rowspan="2" style="background-color: #EEE; text-align: center">
<b>Going Down to the Wire</b><br />
+
<b>[https://www.owasp.org/images/a/a9/OWASPNZ2012_KirkJ_MikeH.pdf Going Down to the Wire (pdf)]</b><br />
<i>Kirk Jackson - Xero</i>
+
<i>Kirk Jackson - Xero and Mike Haworth - Aura</i>
 
</td>
 
</td>
 
<td style="background-color: #EEE; text-align: center">
 
<td style="background-color: #EEE; text-align: center">
<b>Increasing The Value of Penetration Testing</b><br />
+
<b>[https://www.owasp.org/images/d/d3/OWASPNZ2012_BrettM.pdf Increasing The Value of Penetration Testing (pdf)]</b><br />
 
<i>Brett Moore- Insomnia Security</i>
 
<i>Brett Moore- Insomnia Security</i>
 
</td>
 
</td>
 
</tr>
 
</tr>
 
<tr>
 
<tr>
<td width="7%">15:30</td>
+
<td width="7%" valign="top">15:30</td>
  
 
<td style="background-color: #B9C2DC; text-align: center">
 
<td style="background-color: #B9C2DC; text-align: center">
<b>An (Unofficial) OWASP Top 10 for Managers</b><br />
+
<b>[https://www.owasp.org/images/8/85/OWASPNZ2012_DeanC_ShahnH.pdf An (Unofficial) OWASP Top 10 for Managers (pdf)]</b><br />
 
<i>Dean Carter and Shahn Harris - Lateral Security</i>
 
<i>Dean Carter and Shahn Harris - Lateral Security</i>
 
</td>
 
</td>
Line 223: Line 305:
 
 
 
<tr>
 
<tr>
<td width="7%">16:00</td>
+
<td width="7%" valign="top">16:00</td>
 
<td colspan="2" style="background-color: #D98B66; text-align: center">
 
<td colspan="2" style="background-color: #D98B66; text-align: center">
 
<b>Break for Afternoon Tea</b><br />
 
<b>Break for Afternoon Tea</b><br />
Line 230: Line 312:
  
 
<tr>
 
<tr>
<td width="7%">16:30</td>
+
<td width="7%" valign="top">16:30</td>
 
<td colspan="2" style="background-color: #EEE; text-align: center">
 
<td colspan="2" style="background-color: #EEE; text-align: center">
 
<b>Discussion Panel and Wrap-up</b><br />
 
<b>Discussion Panel and Wrap-up</b><br />
Line 249: Line 331:
  
 
A brief introduction to in2securITy, it's aims and goals.  A particular focus on the availability of mentoring, peers and the secure development stream.
 
A brief introduction to in2securITy, it's aims and goals.  A particular focus on the availability of mentoring, peers and the secure development stream.
 +
 +
<b>Speaker Bio</b>
 +
 +
Adam Bell is a security consultant with two years experience in the security industry backed by a further seven years experience in other IT industries. In this time he has worked for both local and national governments in network defence roles as well as working in more generalised system administration, programming, and (the dreaded) service centre.  He currently works for Lateral Security and is the Network Defence writer for in2security.
  
  
Line 342: Line 428:
  
 
Content Security Policy adds another layer to a website's defenses: browser-enforced restrictions against external resources or unauthorized scripting. An extra response header instructs browsers to enforce a policy set by the server administrator.
 
Content Security Policy adds another layer to a website's defenses: browser-enforced restrictions against external resources or unauthorized scripting. An extra response header instructs browsers to enforce a policy set by the server administrator.
 +
 +
<b>Speaker Bio</b>
 +
 +
Francois is a software engineer on the Mozilla Identity team where he
 +
works on Persona, the new decentralized authentication system for the
 +
open web. A long time Debian developer, Francois has been involved in Open Source
 +
and web development for a while and has always had a strong interest in
 +
security.
  
  
  
===Kirk Jackson - Xero -  Going Down to the Wire===
+
===Kirk Jackson and Mike Haworth - Xero and Aura -  Going Down to the Wire===
 
----
 
----
 
<b>Abstract</b>
 
<b>Abstract</b>
Line 357: Line 451:
 
Are you perhaps, in fact, doing a little _too much_?
 
Are you perhaps, in fact, doing a little _too much_?
  
A common issue I've come across in the past few years is applications
+
A common issue we've come across in the past few years is applications
 
that share too much information over the wire, or trust too much of
 
that share too much information over the wire, or trust too much of
what they receive. In this talk I'll look at some common pitfalls and
+
what they receive. In this talk we'll look at some common pitfalls and
 
techniques to counter them in modern web applications.
 
techniques to counter them in modern web applications.
  
 
Let's go down to the wire.
 
Let's go down to the wire.
 +
 +
<b>Speaker Bio</b>
 +
 +
Kirk works at Xero as a Security Architect, co-hosts the Wellington .NET user group, and is a Microsoft Developer Security MVP. He has previous experience in building and penetration testing large web applications.
 +
 +
Mike has previously spoken at OWASP and Kiwicon. He is a contributor to the BeEF project and spends his days pentesting for Aura Information Security.
  
  
  
===Laura Bell - Lateral Security - Blindsided by Security - The Reality of Web Security for the Visually Impaired===
+
===Laura Bell - Lateral Security and Britta Offergeld – Royal New Zealand Foundation of the Blind - Blindsided by Security - The Reality of Web Security for the Visually Impaired===
 
----
 
----
 
<b>Abstract</b>
 
<b>Abstract</b>
Digital self-defence is now seen as a valuable life skill. As web developers we try to design systems that can protect as well as provide for our clients. As security consultants, we develop guidelines and frameworks that people can use to decide if a web application is trustworthy and secure. Even the least technical home users are becoming more confident in spotting suspicious behaviour online. Unfortunately, for the visually impaired, it’s not that simple. In a world where visual clues are not enough and where additional technologies such as screen readers are business as usual – web security is a very different matter.
 
  
Lateral Security and The Royal New Zealand Foundation for the Blind will examine the guidance and security best practice commonly in use for web applications today and how effective they are for those with visual impairments. In a talk that mixes real world examples, demonstrations and discussion from both a usability and security perspective, we aim to not only outline the issues but also suggest some solutions.
+
Digital self-defence is now seen as a valuable life skill. As web developers we try to design systems that can protect as well as provide for our clients. As security consultants, we develop guidelines and frameworks that people can use to decide if a web application is trustworthy and secure. Even the least technical home users are becoming more confident in spotting suspicious behaviour online. Unfortunately, for the visually impaired, it’s not that simple. In a world where visual clues are not enough and where additional technologies such as screen readers are business as usual – web security is a very different matter.
 +
 
 +
Lateral Security and The Royal New Zealand Foundation of the Blind will examine the guidance and security best practice commonly in use for web applications today and how effective they are for those with visual impairments. In a talk that mixes real world examples, demonstrations and discussion from both a usability and security perspective, we aim to not only outline the issues but also suggest some solutions.
  
  
Line 388: Line 489:
 
- Analyse the technology involved and how this is used to develop NFC applications
 
- Analyse the technology involved and how this is used to develop NFC applications
 
- Discuss the security considerations of NFC on mobile devices
 
- Discuss the security considerations of NFC on mobile devices
 +
 +
<b>Speaker Bio</b>
 +
 +
Nick von Dadelszen is the technical director at Lateral Security. Nick has been performing professional pen testing for over 12 years and has managed several successful penetration testing teams. He has worked with the majority of large corporates and Government agencies in New Zealand and is a regular presenter at OWASP and kiwicon conferences.
  
  
Line 403: Line 508:
  
  
= Registration =
 
==Registration==
 
 
As with last year, registration will be performed through the RegOnline system. Registrations will be limited to 300 people, so please register using the following link soon to reserve your spot!
 
 
<center>[https://www.regonline.com/owaspnzday2012 Register here!] - https://www.regonline.com/owaspnzday2012</center>
 
  
 
= Call For Sponsorships =
 
= Call For Sponsorships =

Latest revision as of 01:08, 13 September 2012

OWASP New Zealand Day 2012
30th and 31st August 2012 - Auckland

Owaspnz2012logo.png


Introduction

We are proud to announce the fourth annual OWASP New Zealand Day conference, to be held at the University of Auckland on Friday August 31st, 2012. OWASP New Zealand Day is a one-day conference dedicated to web application security, with an emphasis on secure development techniques to help Kiwi developers build more secure applications.

Based on feedback from last year, the structure of the conference will be slightly different this time.

  • We will be offering training on the day before the conference (Thursday August 30th) rather than at the same time as the conference.
  • After lunch on the conference day, we will split to two tracks - one focused on deep technical topics, the other on policy, compliance and risk management.

The fourth OWASP New Zealand Day will be happening thanks to the support provided by the University of Auckland School of Business, which will kindly offer the same conference venue of the last three years. Entry to the event will, as in the past, be free.

For any comments, feedback or observations, please don't hesitate to contact us.

Registration

Registrations are now closed.


Important dates

  • CFP & CFT closes: 22nd July 2012 [ CLOSED ]
  • Conference Agenda due: 30th July 2012 [ CLOSED ]
  • Conference Registration deadline: 20th August 2012 [ CLOSED ]
  • Training Registration deadline: 27th August 2012 [ CLOSED ]
  • Training Day date: 30th August 2012
  • Conference Day date: 31st August 2012


Conference Venue

The University of Auckland Business School
Owen G Glenn Building
Room: OGGB 260-073 (OGGB4)
Address: 12 Grafton Road
Auckland
New Zealand
Map

Auckland business school small2.jpg Room hall.jpg


Conference Sponsors

University_of_Auckland_crest_small.png
Nz_information_security_forum.png
ICT and Department of Information Systems and Operations Management
 

Gold Sponsors:

SA_Logo_w_DD.gif
   
F5aura-small.jpg
www.security-assessment.com
   
Aura Information Security in partnership with F5 Networks


Silver Sponsors:

INSOMNIA.PNG
     
www.insomniasec.com
     
Lateral_security.jpeg
     
www.lateralsecurity.com
     
Webdrive logo.jpg
     
www.webdrive.co.nz
     


Conference Committee

  • Nick Freeman - OWASP New Zealand Leader (Auckland)
  • Adrian Hayes - OWASP New Zealand Leader (Wellington)
  • Lech Janczewski - Associate Professor - University of Auckland School of Business

Please direct all enquiries to nick.freeman@owasp.org and adrian.hayes@owasp.org.