This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "2012 BASC Agenda"

From OWASP
Jump to: navigation, search
 
(14 intermediate revisions by the same user not shown)
Line 41: Line 41:
 
<!-- lighter blue: #9BA8CF -->
 
<!-- lighter blue: #9BA8CF -->
 
{| style="width:80%" border="0" align="center"
 
{| style="width:80%" border="0" align="center"
  ! colspan="3" align="center" style="background:#7B8ABD; color:white" |
+
  ! colspan="3" align="center" |
<div>
+
<table>
<span style="font-size:150%">'''Boston Application Security Conference, Saturday, October 13, 2012'''</span><br/>  
+
<tr>
</div>
+
<td>
 +
[[File:OWASP Logo.gif]]<br/>
 +
</td>
 +
<td>
 +
<span style="font-size:150%">'''OWASP Boston Application Security Conference<br/>Saturday, October 13, 2012'''</span>
 +
</td>
 +
</tr>
 +
</table>
 
  |-
 
  |-
 
  | style="width:10%; background:#7B8ABD" align="center" | 8:30-9:30 || colspan="2" style="width:80%; background:#D2D2D2" align="center" |  
 
  | style="width:10%; background:#7B8ABD" align="center" | 8:30-9:30 || colspan="2" style="width:80%; background:#D2D2D2" align="center" |  
Line 56: Line 63:
 
<div style="margin:10px;">
 
<div style="margin:10px;">
 
<span style="font-size:130%">'''Keynote'''</span><br>
 
<span style="font-size:130%">'''Keynote'''</span><br>
<span style="font-size: 120%"> </span><br/>
+
<span style="font-size: 120%">[[2012_BASC_Speakers#Josh Corman|Josh Corman]]</span><br/>
 
</div>
 
</div>
 
  |-
 
  |-
Line 63: Line 70:
 
|-
 
|-
 
| style="width:10%; background:#7B8ABD" align="center" | 10:00-10:50 || style="width:30%; background:#BC857A" align="center" |   
 
| style="width:10%; background:#7B8ABD" align="center" | 10:00-10:50 || style="width:30%; background:#BC857A" align="center" |   
{{2012_BASC:Presentaton_Agenda_Template|Presentation|Metasploit Hands On Presentation|Roy Wattanasin}}
+
{{2012_BASC:Presentaton_Agenda_Template|Presentation|Metasploit Fundamental Elements - Course 1|Roy Wattanasin}}
 
  | style="width:30%; background:#BCA57A" align="center" |  
 
  | style="width:30%; background:#BCA57A" align="center" |  
 
+
{{2012_BASC:Presentaton_Agenda_Template|Presentation|An Insider's Look: WAF and Identity and Access Management Integration|Barracuda Networks}}
 
|-
 
|-
 
| style="width:10%; background:#7B8ABD" align="center" | 11:00-11:50 || style="width:30%; background:#CFA49B" align="center" |  
 
| style="width:10%; background:#7B8ABD" align="center" | 11:00-11:50 || style="width:30%; background:#CFA49B" align="center" |  
{{2012_BASC:Presentaton_Agenda_Template|Presentation|Metasploit Hands On Presentation|Roy Wattanasin}}
+
{{2012_BASC:Presentaton_Agenda_Template|Presentation|Metasploit Continued - Course 2|Roy Wattanasin}}
 
  | style="width:30%; background:#DFC799" align="center" |  
 
  | style="width:30%; background:#DFC799" align="center" |  
{{2012_BASC:Presentaton_Agenda_Template|Presentation|NSA Configuration Guidelines for Baseline Security|Ray Cote}}
+
{{2012_BASC:Presentaton_Agenda_Template|Presentation|Worst practices: How to waste 100% of your security budget|Rob Cheyne}}
{{2012_BASC:Presentaton_Agenda_Template|Presentation|Quick Response Mal-Codes|Jim Weiler}}
 
 
|-
 
|-
  | style="width:10%; background:#7B8ABD" align="center" | 12:00-13:00 || colspan="2" style="width:80%; background:#D2D2D2" align="center" |  
+
  | style="width:10%; background:#7B8ABD" align="center" | 12:00-13:00 || colspan="2" style="background:#D2D2D2" align="center" |  
 +
<table>
 +
<tr>
 +
<td style="width:70%">
 +
<center>
 
<span style="font-size:130%">'''Lunch'''</span><br/>
 
<span style="font-size:130%">'''Lunch'''</span><br/>
 
provided by our Platinum Sponsor<br/>
 
provided by our Platinum Sponsor<br/>
 
[[File:Imperva 250x34.jpg|300px|link=http://www.imperva.com|Imperva]]
 
[[File:Imperva 250x34.jpg|300px|link=http://www.imperva.com|Imperva]]
 +
</center>
 +
</td>
 +
<td style="width:30%; background:#D2D2D2" align="center">
 +
<span style="font-size:100%">20-Minute Lightning Talk</span><br/>
 +
<span style="font-size: 130%">'''[[2012_BASC_Presentations#NSA Configuration Guidelines for Baseline Security|NSA Configuration Guidelines for Baseline Security]]'''</span><br/>
 +
<span style="font-size: 120%">[[2012_BASC_Speakers#Ray Cote|Ray Cote]]</span><br/>
 +
</td>
 +
</tr>
 +
</table>
 
|-
 
|-
 
| style="width:10%; background:#7B8ABD" align="center" | 13:00-13:50 || style="width:30%; background:#BC857A" align="center" |  
 
| style="width:10%; background:#7B8ABD" align="center" | 13:00-13:50 || style="width:30%; background:#BC857A" align="center" |  
 
{{2012_BASC:Presentaton_Agenda_Template|Presentation|Fuzzing and You:  How to Automate Whitebox Testing|Michael Anderson}}
 
{{2012_BASC:Presentaton_Agenda_Template|Presentation|Fuzzing and You:  How to Automate Whitebox Testing|Michael Anderson}}
 
  | style="width:30%; background:#BCA57A" align="center" |  
 
  | style="width:30%; background:#BCA57A" align="center" |  
 
+
{{2012_BASC:Presentaton_Agenda_Template|Presentation|Securing Mobile Apps - Threat Modeling, Whitebox, Blackbox testing|Greg Wolford }}
  
 
|-
 
|-
Line 87: Line 106:
 
{{2012_BASC:Presentaton_Agenda_Template|Presentation|Pitfalls of Secure SDLC and How to Succeed With Automation|Rohit Sethi & Ehsan Foroughi }}
 
{{2012_BASC:Presentaton_Agenda_Template|Presentation|Pitfalls of Secure SDLC and How to Succeed With Automation|Rohit Sethi & Ehsan Foroughi }}
 
  | style="width:30%; background:#DFC799" align="center" |  
 
  | style="width:30%; background:#DFC799" align="center" |  
 +
{{2012_BASC:Presentaton_Agenda_Template|Presentation|Hiding Inside the "Real-Time Web" (to Take-Over the DMZ)|Matt Wood }}
 
|-
 
|-
 
| style="width:10%; background:#7B8ABD" align="center" | 15:00-15:50 || style="width:30%; background:#BC857A" align="center" |  
 
| style="width:10%; background:#7B8ABD" align="center" | 15:00-15:50 || style="width:30%; background:#BC857A" align="center" |  
{{2012_BASC:Presentaton_Agenda_Template|Presentation|Streamlining Application Vulnerability Management: Communication Between Development and Security Teams|John Dickson}}
+
{{2012_BASC:Presentaton_Agenda_Template|Presentation|Streamlining Application Vulnerability Management: Communication Between Development and Security Teams|Brian Mather}}
  
 
  | style="width:30%; background:#BCA57A" align="center" |  
 
  | style="width:30%; background:#BCA57A" align="center" |  
 +
{{2012_BASC:Presentaton_Agenda_Template|Presentation|Top Ten Web Defenses|Jim Manico }}
  
 
|-
 
|-
 
| style="width:10%; background:#7B8ABD" align="center" | 16:00-16:50 || style="width:30%; background:#CFA49B" align="center" |  
 
| style="width:10%; background:#7B8ABD" align="center" | 16:00-16:50 || style="width:30%; background:#CFA49B" align="center" |  
<!-- {{2012_BASC:Presentaton_Agenda_Template|Presentation|Secure Password Storage: Increasing Resistance to Brute Force Attacks|John Steven, Chandu Ketkar, Scott Matsumoto}} -->
+
{{2012_BASC:Presentaton_Agenda_Template|Presentation|Secure Password Storage: Increasing Resistance to Brute Force Attacks|John Steven, Chandu Ketkar, Scott Matsumoto}}
 
  | style="width:30%; background:#DFC799" align="center" |  
 
  | style="width:30%; background:#DFC799" align="center" |  
 
+
{{2012_BASC:Presentaton_Agenda_Template|Presentation|Offensive Mobile Forensics|Joey Peloquin }}
 
|-
 
|-
  
Line 108: Line 129:
 
| style="width:10%; background:#7B8ABD" align="center" | 17:30-18:30 || colspan="2" style="width:30%; background:#B0B0B0" align="center" |  
 
| style="width:10%; background:#7B8ABD" align="center" | 17:30-18:30 || colspan="2" style="width:30%; background:#B0B0B0" align="center" |  
 
<br/>
 
<br/>
<span style="font-size:130%">'''Expert Panel'''</span><br>
 
<br/>
 
  
|-
+
<div style="margin:10px;">
| style="width:10%; background:#7B8ABD" align="center" | 18:30-19:00 || colspan="2" style="width:30%; background:#99FF99" align="center" |
+
<span style="font-size: 130%">'''[[2012_BASC_Presentations#CTF|Capture The Flag]] Results and Analysis'''</span><br/>
 +
</div>
 +
 
 +
 
 +
<span style="font-size:130%">'''Prize Raffle'''</span><br>
 
<br/>
 
<br/>
 
<span style="font-size:130%">'''Wrap Up'''</span><br>
 
<span style="font-size:130%">'''Wrap Up'''</span><br>
<br/>
+
 
  
 
|}
 
|}
  
 
{{2012_BASC:Footer_Template | Agenda}}
 
{{2012_BASC:Footer_Template | Agenda}}

Latest revision as of 22:05, 11 October 2012

2012 BASC: Home Agenda Presentations Speakers

Sponsorships Available

Platinum Sponsors (Listed Alphabetically)
Silver Sponsors (Listed Alphabetically)

Akamai




Imperva




Rapid7

Cigital

Denim Group

GlobalSign

NetSPI

Praetorian

Security Management Partners

We kindly thank our sponsors for their support. Please help us keep future BASCs free by viewing and visiting all of our sponsors.
Sponsorships are still available.

Agenda

OWASP Logo.gif

OWASP Boston Application Security Conference
Saturday, October 13, 2012

8:30-9:30

Breakfast and Registration
provided by our Platinum Sponsor
Akamai

09:00-09:50

Keynote
Josh Corman

Track 1
Horace Mann Room
Track 2
Deborah Sampson / Paul Thomas Room
10:00-10:50
11:00-11:50
12:00-13:00

Lunch
provided by our Platinum Sponsor
Imperva

20-Minute Lightning Talk
NSA Configuration Guidelines for Baseline Security
Ray Cote

13:00-13:50
14:00-14:50
15:00-15:50
16:00-16:50
17:00-17:30

Social Time
provided by our Platinum Sponsor
Rapid7

17:30-18:30


Capture The Flag Results and Analysis


Prize Raffle

Wrap Up


You can find out more about this conference at basc2012.org
Conference Organizer: Jim Weiler