This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "2012 BASC Agenda"
From OWASP
Tom Conner (talk | contribs) |
Tom Conner (talk | contribs) |
||
(14 intermediate revisions by the same user not shown) | |||
Line 41: | Line 41: | ||
<!-- lighter blue: #9BA8CF --> | <!-- lighter blue: #9BA8CF --> | ||
{| style="width:80%" border="0" align="center" | {| style="width:80%" border="0" align="center" | ||
− | ! colspan="3" align="center" | + | ! colspan="3" align="center" | |
− | < | + | <table> |
− | <span style="font-size:150%">'''Boston Application Security Conference | + | <tr> |
− | </ | + | <td> |
+ | [[File:OWASP Logo.gif]]<br/> | ||
+ | </td> | ||
+ | <td> | ||
+ | <span style="font-size:150%">'''OWASP Boston Application Security Conference<br/>Saturday, October 13, 2012'''</span> | ||
+ | </td> | ||
+ | </tr> | ||
+ | </table> | ||
|- | |- | ||
| style="width:10%; background:#7B8ABD" align="center" | 8:30-9:30 || colspan="2" style="width:80%; background:#D2D2D2" align="center" | | | style="width:10%; background:#7B8ABD" align="center" | 8:30-9:30 || colspan="2" style="width:80%; background:#D2D2D2" align="center" | | ||
Line 56: | Line 63: | ||
<div style="margin:10px;"> | <div style="margin:10px;"> | ||
<span style="font-size:130%">'''Keynote'''</span><br> | <span style="font-size:130%">'''Keynote'''</span><br> | ||
− | <span style="font-size: 120%"> | + | <span style="font-size: 120%">[[2012_BASC_Speakers#Josh Corman|Josh Corman]]</span><br/> |
</div> | </div> | ||
|- | |- | ||
Line 63: | Line 70: | ||
|- | |- | ||
| style="width:10%; background:#7B8ABD" align="center" | 10:00-10:50 || style="width:30%; background:#BC857A" align="center" | | | style="width:10%; background:#7B8ABD" align="center" | 10:00-10:50 || style="width:30%; background:#BC857A" align="center" | | ||
− | {{2012_BASC:Presentaton_Agenda_Template|Presentation|Metasploit | + | {{2012_BASC:Presentaton_Agenda_Template|Presentation|Metasploit Fundamental Elements - Course 1|Roy Wattanasin}} |
| style="width:30%; background:#BCA57A" align="center" | | | style="width:30%; background:#BCA57A" align="center" | | ||
− | + | {{2012_BASC:Presentaton_Agenda_Template|Presentation|An Insider's Look: WAF and Identity and Access Management Integration|Barracuda Networks}} | |
|- | |- | ||
| style="width:10%; background:#7B8ABD" align="center" | 11:00-11:50 || style="width:30%; background:#CFA49B" align="center" | | | style="width:10%; background:#7B8ABD" align="center" | 11:00-11:50 || style="width:30%; background:#CFA49B" align="center" | | ||
− | {{2012_BASC:Presentaton_Agenda_Template|Presentation|Metasploit | + | {{2012_BASC:Presentaton_Agenda_Template|Presentation|Metasploit Continued - Course 2|Roy Wattanasin}} |
| style="width:30%; background:#DFC799" align="center" | | | style="width:30%; background:#DFC799" align="center" | | ||
− | {{2012_BASC:Presentaton_Agenda_Template|Presentation| | + | {{2012_BASC:Presentaton_Agenda_Template|Presentation|Worst practices: How to waste 100% of your security budget|Rob Cheyne}} |
− | |||
|- | |- | ||
− | | style="width:10%; background:#7B8ABD" align="center" | 12:00-13:00 || colspan="2" style=" | + | | style="width:10%; background:#7B8ABD" align="center" | 12:00-13:00 || colspan="2" style="background:#D2D2D2" align="center" | |
+ | <table> | ||
+ | <tr> | ||
+ | <td style="width:70%"> | ||
+ | <center> | ||
<span style="font-size:130%">'''Lunch'''</span><br/> | <span style="font-size:130%">'''Lunch'''</span><br/> | ||
provided by our Platinum Sponsor<br/> | provided by our Platinum Sponsor<br/> | ||
[[File:Imperva 250x34.jpg|300px|link=http://www.imperva.com|Imperva]] | [[File:Imperva 250x34.jpg|300px|link=http://www.imperva.com|Imperva]] | ||
+ | </center> | ||
+ | </td> | ||
+ | <td style="width:30%; background:#D2D2D2" align="center"> | ||
+ | <span style="font-size:100%">20-Minute Lightning Talk</span><br/> | ||
+ | <span style="font-size: 130%">'''[[2012_BASC_Presentations#NSA Configuration Guidelines for Baseline Security|NSA Configuration Guidelines for Baseline Security]]'''</span><br/> | ||
+ | <span style="font-size: 120%">[[2012_BASC_Speakers#Ray Cote|Ray Cote]]</span><br/> | ||
+ | </td> | ||
+ | </tr> | ||
+ | </table> | ||
|- | |- | ||
| style="width:10%; background:#7B8ABD" align="center" | 13:00-13:50 || style="width:30%; background:#BC857A" align="center" | | | style="width:10%; background:#7B8ABD" align="center" | 13:00-13:50 || style="width:30%; background:#BC857A" align="center" | | ||
{{2012_BASC:Presentaton_Agenda_Template|Presentation|Fuzzing and You: How to Automate Whitebox Testing|Michael Anderson}} | {{2012_BASC:Presentaton_Agenda_Template|Presentation|Fuzzing and You: How to Automate Whitebox Testing|Michael Anderson}} | ||
| style="width:30%; background:#BCA57A" align="center" | | | style="width:30%; background:#BCA57A" align="center" | | ||
− | + | {{2012_BASC:Presentaton_Agenda_Template|Presentation|Securing Mobile Apps - Threat Modeling, Whitebox, Blackbox testing|Greg Wolford }} | |
|- | |- | ||
Line 87: | Line 106: | ||
{{2012_BASC:Presentaton_Agenda_Template|Presentation|Pitfalls of Secure SDLC and How to Succeed With Automation|Rohit Sethi & Ehsan Foroughi }} | {{2012_BASC:Presentaton_Agenda_Template|Presentation|Pitfalls of Secure SDLC and How to Succeed With Automation|Rohit Sethi & Ehsan Foroughi }} | ||
| style="width:30%; background:#DFC799" align="center" | | | style="width:30%; background:#DFC799" align="center" | | ||
+ | {{2012_BASC:Presentaton_Agenda_Template|Presentation|Hiding Inside the "Real-Time Web" (to Take-Over the DMZ)|Matt Wood }} | ||
|- | |- | ||
| style="width:10%; background:#7B8ABD" align="center" | 15:00-15:50 || style="width:30%; background:#BC857A" align="center" | | | style="width:10%; background:#7B8ABD" align="center" | 15:00-15:50 || style="width:30%; background:#BC857A" align="center" | | ||
− | {{2012_BASC:Presentaton_Agenda_Template|Presentation|Streamlining Application Vulnerability Management: Communication Between Development and Security Teams| | + | {{2012_BASC:Presentaton_Agenda_Template|Presentation|Streamlining Application Vulnerability Management: Communication Between Development and Security Teams|Brian Mather}} |
| style="width:30%; background:#BCA57A" align="center" | | | style="width:30%; background:#BCA57A" align="center" | | ||
+ | {{2012_BASC:Presentaton_Agenda_Template|Presentation|Top Ten Web Defenses|Jim Manico }} | ||
|- | |- | ||
| style="width:10%; background:#7B8ABD" align="center" | 16:00-16:50 || style="width:30%; background:#CFA49B" align="center" | | | style="width:10%; background:#7B8ABD" align="center" | 16:00-16:50 || style="width:30%; background:#CFA49B" align="center" | | ||
− | + | {{2012_BASC:Presentaton_Agenda_Template|Presentation|Secure Password Storage: Increasing Resistance to Brute Force Attacks|John Steven, Chandu Ketkar, Scott Matsumoto}} | |
| style="width:30%; background:#DFC799" align="center" | | | style="width:30%; background:#DFC799" align="center" | | ||
− | + | {{2012_BASC:Presentaton_Agenda_Template|Presentation|Offensive Mobile Forensics|Joey Peloquin }} | |
|- | |- | ||
Line 108: | Line 129: | ||
| style="width:10%; background:#7B8ABD" align="center" | 17:30-18:30 || colspan="2" style="width:30%; background:#B0B0B0" align="center" | | | style="width:10%; background:#7B8ABD" align="center" | 17:30-18:30 || colspan="2" style="width:30%; background:#B0B0B0" align="center" | | ||
<br/> | <br/> | ||
− | |||
− | |||
− | + | <div style="margin:10px;"> | |
− | + | <span style="font-size: 130%">'''[[2012_BASC_Presentations#CTF|Capture The Flag]] Results and Analysis'''</span><br/> | |
+ | </div> | ||
+ | |||
+ | |||
+ | <span style="font-size:130%">'''Prize Raffle'''</span><br> | ||
<br/> | <br/> | ||
<span style="font-size:130%">'''Wrap Up'''</span><br> | <span style="font-size:130%">'''Wrap Up'''</span><br> | ||
− | + | ||
|} | |} | ||
{{2012_BASC:Footer_Template | Agenda}} | {{2012_BASC:Footer_Template | Agenda}} |
Latest revision as of 22:05, 11 October 2012
2012 BASC: Home Agenda Presentations Speakers
Sponsorships Available
Platinum Sponsors (Listed Alphabetically)
|
Silver Sponsors (Listed Alphabetically)
|
|
|
|
We kindly thank our sponsors for their support. Please help us keep future BASCs free by viewing and visiting all of our sponsors.
Sponsorships are still available.
Agenda
| ||||
---|---|---|---|---|
8:30-9:30 | ||||
09:00-09:50 |
Keynote | |||
Track 1 Horace Mann Room |
Track 2 Deborah Sampson / Paul Thomas Room | |||
10:00-10:50 | ||||
11:00-11:50 | ||||
12:00-13:00 |
| |||
13:00-13:50 | ||||
14:00-14:50 | ||||
15:00-15:50 | ||||
16:00-16:50 | ||||
17:00-17:30 | ||||
17:30-18:30 |
Capture The Flag Results and Analysis
|