This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Front Range OWASP Conference 2013/Schedule"
From OWASP
Mark Major (talk | contribs) |
Jess Garrett (talk | contribs) |
||
(47 intermediate revisions by 4 users not shown) | |||
Line 1: | Line 1: | ||
+ | <!-- | ||
====SnowFROC 2013 schedule==== | ====SnowFROC 2013 schedule==== | ||
− | This schedule is subject to | + | This schedule is subject to frequent changes as the conference draws nearer. |
Line 11: | Line 12: | ||
(See the [[Front_Range_OWASP_Conference_2013#CFP|CFP]] section for additional dates and details.) | (See the [[Front_Range_OWASP_Conference_2013#CFP|CFP]] section for additional dates and details.) | ||
+ | --> | ||
+ | ==SnowFROC 2013 Schedule== | ||
+ | <br> | ||
− | == | + | {| style="width:95%; border-collapse:collapse;" border="1" align="right" |
− | + | ! style="width:10%; border-left: 1px solid white; border-top: 1px solid white;" | '''Thu, Mar 28''' | |
− | ''' | + | ! style="width:19%; border-bottom: 1px solid black; background:#E8D0A9" align="center" | Technical Track |
− | + | ! style="width:19%; border-bottom: 1px solid black; background:#DFC184" align="center" | Deep-Dive Track | |
− | {| style="width: | + | ! style="width:19%; border-bottom: 1px solid black; background:#F2F2F2" align="center" | Management Track |
− | + | ! style="width:19%; border-bottom: 1px solid black; background:#B7AFA3" align="center" | Legal Track | |
+ | | style="border-right: 1px solid white; border-top: 1px solid white;" align="center" rowspan="5" | | ||
+ | |- | ||
+ | | style="background:#024C68; color:white" align="center" | 07:00-08:30 | ||
+ | | colspan="4" style="background:#AEBEC3; color:#024C68" align="center" | '''Registration and Morning Snacks''' <br> ''Sponsored by [http://www.hpenterprisesecurity.com '''HP''']'' | ||
+ | |- | ||
+ | | style="background:#024C68; color:white" align="center" | 08:00-08:15 | ||
+ | | colspan="4" style="background:#E0E0E0" align="center" | '''Welcome and Kick-off'''<br> ''[[User:Brad_Carvalho|Brad Carvalho]], [[User:Mark_Major|Mark Major]]'' | ||
+ | |- | ||
+ | | style="background:#024C68; color:white" align="center" | 08:15-08:30 | ||
+ | | colspan="4" style="background:#E0E0E0" align="center" | '''State of OWASP'''<br> ''[[Front_Range_OWASP_Conference_2013/Speakers/Manico|Jim Manico]]'' | ||
+ | |- | ||
+ | | style="background:#024C68; color:white" align="center" | 08:30-09:30 | ||
+ | | colspan="4" style="background:#E0E0E0" align="center" | '''Keynote Address: Data Protection for the 21st Century'''<br> ''[[Front_Range_OWASP_Conference_2013/Speakers/Ziring|Neal Ziring]], Technical Director for the National Security Agency’s Information Assurance Directorate (IAD)''<br>[https://vimeo.com/68058106 Video] | ||
+ | |- | ||
+ | | style="background:#024C68; color:white" align="center" | 09:30-10:00 | ||
+ | | colspan="4" style="background:#AEBEC3; color:#024C68" align="center" | '''Coffee Break and Sponsor Expo''' <br> ''Sponsored by [https://aerstone.com '''Aerstone''']'' | ||
+ | | style="background:#C1DAD6" align="center" | '''CTF Kick-off'''<br>''[[User:Chris_Rossi|Chris Rossi]], [[User:Mark_Major|Mark Major]]'' | ||
+ | |- | ||
+ | | style="background:#024C68; color:white" align="center" | 10:00-10:45 | ||
+ | | style="background:#E8D0A9" align="center" | [[Front_Range_OWASP_Conference_2013/Sessions/Sess1_Tech1|'''DevFu: The inner ninja in every application developer''' <br> ''Danny Chrastil'']]<br>[[Media: Chrastil.pptx| Slides ]]<br>[https://vimeo.com/68082818 Video] | ||
+ | | style="background:#DFC184" align="center" | [[Front_Range_OWASP_Conference_2013/Sessions/Sess1_Tech2|'''SIP Based Cloud Instances''' <br> ''Gregory Disney-Leugers]]''<br>[[Media: Disney-Leugers.odp| Slides ]]<br>[https://vimeo.com/68091563 Video] | ||
+ | | style="background:#F2F2F2" align="center" | [[Front_Range_OWASP_Conference_2013/Sessions/Sess1_Mgmt1|'''Digital Bounty Hunters - Decoding Bug Bounty Programs''' <br> ''Jon Rose]]''<br>[[Media: Rose.pdf | Slides]]<br>[https://vimeo.com/68107340 Video] | ||
+ | | style="background:#B7AFA3" align="center" | [[Front_Range_OWASP_Conference_2013/Sessions/Sess1_Mgmt2|'''Electronic Discovery for System Administrators''' <br> ''Russell Shumway]]''<br>[[Media: Shumway.pptx| Slides ]]<br>[https://vimeo.com/68142345 Video] | ||
+ | | style="background:#C1DAD6" align="center" rowspan="9" | [[Front_Range_OWASP_Conference_2013/CTF|'''CTF''']] <br> ''Sponsored by [https://aerstone.com '''Aerstone''']'' | ||
+ | |- | ||
+ | | style="background:#024C68; color:white" align="center" | 10:55-11:40 | ||
+ | | style="background:#E8D0A9" align="center" | [[Front_Range_OWASP_Conference_2013/Sessions/Sess2_Tech1|'''Adventures in Large Scale HTTP Header Abuse''' <br> ''Zachary Wolff]]''<br>[[Media: Wolff.pptx| Slides ]]<br>[https://vimeo.com/68071431 Video] | ||
+ | | style="background:#DFC184" align="center" | [[Front_Range_OWASP_Conference_2013/Sessions/Sess2_Tech2|'''How Malware Attacks Web Applications''' <br> ''Casey Smith]]''<br>[[Media: Smith.pdf| Slides ]]<br>[https://vimeo.com/68107330 Video] | ||
+ | | style="background:#F2F2F2" align="center" | [[Front_Range_OWASP_Conference_2013/Sessions/Sess2_Mgmt1|'''Linking Security to Business Value in the Customer Service Industry''' <br> ''Dan Rojas]]''<br>[[Media: Rojas.pdf | Slides]]<br>[https://vimeo.com/68111318 Video] | ||
+ | | style="background:#B7AFA3" align="center" | [[Front_Range_OWASP_Conference_2013/Sessions/Sess2_Mgmt2|'''Legal Issues of Forensics in the Cloud''' <br> ''David Willson]]''<br>[[Media: Willson.pdf| Slides ]]<br>[https://vimeo.com/68082821 Video] | ||
+ | |- | ||
+ | | style="background:#024C68; color:white" align="center" | 11:40-12:40 | ||
+ | | colspan="4" style="background:#AEBEC3; color:#024C68" align="center" | '''Lunch and Sponsor Expo''' <br> ''Sponsored by [https://aerstone.com '''Aerstone''']'' | ||
+ | |- | ||
+ | | style="background:#024C68; color:white" align="center" | 12:40-13:25 | ||
+ | | style="background:#E8D0A9" align="center" | [[Front_Range_OWASP_Conference_2013/Sessions/Sess3_Tech1|'''Angry Cars: Hacking the "Car as Platform"''' <br> ''Aaron Weaver]]''<br>[[Media: Weaver.pdf | Slides]]<br>[https://vimeo.com/68071432 Video] | ||
+ | | style="background:#DFC184" align="center" | [[Front_Range_OWASP_Conference_2013/Sessions/Sess3_Tech2|'''Top Ten Web Application Defenses''' <br> ''Jim Manico]]''<br>[[Media: Manico.pdf | Slides]]<br>[https://vimeo.com/68091564 Video] | ||
+ | | style="background:#F2F2F2" align="center" | [[Front_Range_OWASP_Conference_2013/Sessions/Sess3_Mgmt1|'''Using SaaS and the Cloud to Secure the SDLC''' <br> ''Andrew Earle]]''<br>[[Media: Earle.pptx| Slides ]]<br>[https://vimeo.com/68111315 Video] | ||
+ | | style="background:#B7AFA3" align="center" | [[Front_Range_OWASP_Conference_2013/Sessions/Sess3_Mgmt2|'''CISPA: Why Privacy Advocates Hate This Legislation''' <br> ''Maureen Donohue Feinroth]]''<br>[[Media: Feinroth.pptx| Slides ]]<br>[https://vimeo.com/68071433 Video] | ||
+ | |- | ||
+ | | style="background:#024C68; color:white" align="center" | 13:35-14:20 | ||
+ | | style="background:#E8D0A9" align="center" | [[Front_Range_OWASP_Conference_2013/Sessions/Sess4_Tech1|'''DevOps and Security: It's Happening. Right Now.''' <br> ''Helen Bravo]]''<br>[[Media: Bravo.pptx| Slides ]]<br>[https://vimeo.com/68335259 Video] | ||
+ | | style="background:#DFC184" align="center" | [[Front_Range_OWASP_Conference_2013/Sessions/Sess4_Tech2|'''A Demo of and Preventing XSS in .NET Applications''' <br> ''Larry Conklin]]''<br>[[Media: Conklin.pptx| Slides ]]<br>[https://vimeo.com/68069847 Video] | ||
+ | | style="background:#F2F2F2" align="center" | [[Front_Range_OWASP_Conference_2013/Sessions/Sess4_Mgmt1|'''Measuring Security Best Practices With OpenSAMM''' <br> ''Alan Jex]]''<br>[[Media: Jex.ppt| Slides ]]<br>[https://vimeo.com/68082823 Video] | ||
+ | | style="background:#B7AFA3" align="center" | [[Front_Range_OWASP_Conference_2013/Sessions/Sess4_Mgmt2|'''Crafting a Plan for When Security Fails''' <br> ''Robert Lelewski]]''<br>[[Media: Lelewski.pdf| Slides ]]<br>[https://vimeo.com/68071439 Video] | ||
+ | |- | ||
+ | | style="background:#024C68; color:white" align="center" | 14:30-15:15 | ||
+ | | style="background:#E8D0A9" align="center" | [[Front_Range_OWASP_Conference_2013/Sessions/Sess5_Tech1|'''Real World Cloud Application Security''' <br> ''Jason Chan]]''<br>[[Media: Chan.pptx| Slides ]]<br>[https://vimeo.com/68082826 Video] | ||
+ | | style="background:#DFC184" align="center" | [[Front_Range_OWASP_Conference_2013/Sessions/Sess5_Tech2|'''Data Mining a Mountain of Zero Day Vulnerabilities''' <br> ''Joe Brady]]''<br>[[Media: Brady.pdf| Slides ]]<br>[https://vimeo.com/68107333 Video] | ||
+ | | style="background:#F2F2F2" align="center" | [[Front_Range_OWASP_Conference_2013/Sessions/Sess5_Mgmt1|'''Defending Desktop (.NET/C#) Applications: Mitigating in the Dark (A Case Study Remix)''' <br> ''Jon McCoy]]''<br>[[Media:McCoy.pdf| Slides ]]<br>[https://vimeo.com/68071440 Video] | ||
+ | | style="background:#B7AFA3" align="center" | [[Front_Range_OWASP_Conference_2013/Sessions/Sess5_Mgmt2|'''Information Control: The Critical Need for a Defensible Position - Securing the Information Ecosystem''' <br> ''Tom Glanville]]''<br>[[Media: Glanville.pptx| Slides ]]<br>[https://vimeo.com/68082819 Video] | ||
+ | |- | ||
+ | | style="background:#024C68; color:white" align="center" | 15:15-15:45 | ||
+ | | colspan="4" style="background:#AEBEC3; color:#024C68" align="center" | '''Coffee Break and Sponsor Expo''' <br> ''Sponsored by [https://aerstone.com '''Aerstone''']'' | ||
+ | |- | ||
+ | | style="background:#024C68; color:white" align="center" | 15:45-16:45 | ||
+ | | colspan="4" style="background:#E0E0E0" align="center" | '''Moderated Panel Discussion''' '' | ||
+ | [[Front_Range_OWASP_Conference_2013/Speakers/Weaver|Aaron Weaver]] | ||
+ | [[Front_Range_OWASP_Conference_2013/Speakers/Willson|David Willson]] | ||
+ | [[Front_Range_OWASP_Conference_2013/Speakers/Wilson|Dan Wilson]] | ||
+ | [[Front_Range_OWASP_Conference_2013/Speakers/Ziring|Neal Ziring]] | ||
+ | Moderator: [[Front_Range_OWASP_Conference_2013/Speakers/Manico|Jim Manico]]'' | ||
+ | [https://vimeo.com/68058105 Video] | ||
+ | |- | ||
+ | | style="background:#024C68; color:white" align="center" | 16:45-17:00 | ||
+ | | colspan="4" style="background:#E0E0E0" align="center" | '''Closing Statements'''<br>''[[User:Brad_Carvalho|Brad Carvalho]], [[User:Mark_Major|Mark Major]]'' | ||
+ | |- | ||
+ | | style="background:#024C68; color:white" align="center" | 17:00- | ||
+ | | colspan="4" style="background:#E0E0E0" align="center" | '''Sponsor Raffles, Drawings, and Contests''' | ||
+ | | style="background:#C1DAD6" align="center" | '''CTF Wrap-Up'''<br>''[[User:Chris_Rossi|Chris Rossi]], [[User:Mark_Major|Mark Major]]'' | ||
+ | |- | ||
+ | | style="background:#024C68; color:white" align="center" | 19:00-22:00+ | ||
+ | | colspan="4" style="background:#AEBEC3; color:#024C68" align="center" | '''After-party at [http://denverpoolhall.com/ Tarantula Billiards]''' <br> ''Sponsored by [https://www.appliedtrust.com '''AppliedTrust''']'' <br> ''Tarantula is located 3 blocks from the Marriott at the corner of 15th and Stout (1520 Stout Street, Denver)'' | ||
+ | | style="background:#C1DAD6" align="center" | '''Awards Ceremony''' ''at [http://denverpoolhall.com/ Tarantula]'' (20:00) | ||
+ | |- | ||
+ | | style="border-left: 1px solid white; border-right: 1px solid white; border-bottom: 1px solid white; border-top: 1px solid black;" | <br><br> | ||
+ | | style="border-left: 1px solid white; border-right: 1px solid white;" colspan="4" | | ||
+ | | style="border-left: 1px solid white; border-right: 1px solid white; border-bottom: 1px solid white" | | ||
+ | |- | ||
+ | ! style="border-left: 1px solid white; border-top: 1px solid white;" | '''Fri, Mar 29''' | ||
+ | ! style="border-bottom: 1px solid black; background:#E8D0A9" align="center" | Training | ||
+ | ! style="border-bottom: 1px solid black; background:#DFC184" align="center" | Birds of a Feather: A | ||
+ | ! style="border-bottom: 1px solid black; background:#F2F2F2" align="center" | Birds of a Feather: B | ||
+ | ! style="border-bottom: 1px solid black; background:#B7AFA3" align="center" | Capture the Flag | ||
+ | | style="border-right: 1px solid white; border-bottom: 1px solid white;" rowspan="6" | | ||
+ | |- | ||
+ | | style="width:10%; background:#024C68; color:white" align="center" | 09:00-9:45 | ||
+ | | style="width:20%; background:#E8D0A9" align="center" rowspan="5" | [[Front_Range_OWASP_Conference_2013/Sessions/Training | '''Training: Secure Coding''' <br> ''Aaron Weaver'']] | ||
+ | | style="width:20%; background:#DFC184" align="center" | {{:Front_Range_OWASP_Conference_2013/boaf1a}} ''([[Front_Range_OWASP_Conference_2013/boaf1a|edit]])'' | ||
+ | | style="width:20%; background:#F2F2F2" align="center" | {{:Front_Range_OWASP_Conference_2013/boaf1b}} ''([[Front_Range_OWASP_Conference_2013/boaf1b|edit]])'' | ||
+ | | style="width:20%; background:#B7AFA3" align="center" rowspan="2" | FLOSSHack: CTF VM | ||
+ | |- | ||
+ | | style="width:10%; background:#024C68; color:white" align="center" | 10:00-10:45 | ||
+ | | style="width:20%; background:#DFC184" align="center" | {{:Front_Range_OWASP_Conference_2013/boaf2a}} ''([[Front_Range_OWASP_Conference_2013/boaf2a|edit]])'' | ||
+ | | style="width:20%; background:#F2F2F2" align="center" | {{:Front_Range_OWASP_Conference_2013/boaf2b}} ''([[Front_Range_OWASP_Conference_2013/boaf2b|edit]])'' | ||
+ | |- | ||
+ | | style="width:10%; background:#024C68; color:white" align="center" | 10:45-11:15 | ||
+ | | colspan="3" style="background:#AEBEC3; color:#024C68" align="center" | '''Coffee Break''' <br> ''Sponsored by [https://aerstone.com '''Aerstone''']'' | ||
|- | |- | ||
− | | style="width:10%; background:# | + | | style="width:10%; background:#024C68; color:white" align="center" | 11:15-12:00 |
− | + | | style="width:20%; background:#DFC184" align="center" | {{:Front_Range_OWASP_Conference_2013/boaf3a}} ''([[Front_Range_OWASP_Conference_2013/boaf3a|edit]])'' | |
− | + | | style="width:20%; background:#F2F2F2" align="center" | {{:Front_Range_OWASP_Conference_2013/boaf3b}} ''([[Front_Range_OWASP_Conference_2013/boaf3b|edit]])'' | |
− | + | | style="width:20%; background:#B7AFA3" align="center" rowspan="2" | FLOSSHack: CTF Scoreboard | |
− | |||
− | |||
− | |||
− | |||
− | | style="width: | ||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | | style="width: | ||
− | |||
− | |||
− | |||
− | |||
− | |||
− | | style="width: | ||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
|- | |- | ||
− | | style="width:10%; background:# | + | | style="width:10%; background:#024C68; color:white" align="center" | 12:15-13:00 |
− | + | | style="width:20%; background:#DFC184" align="center" | {{:Front_Range_OWASP_Conference_2013/boaf4a}} ''([[Front_Range_OWASP_Conference_2013/boaf4a|edit]])'' | |
− | + | | style="width:20%; background:#F2F2F2" align="center" | {{:Front_Range_OWASP_Conference_2013/boaf4b}} ''([[Front_Range_OWASP_Conference_2013/boaf4b|edit]])'' | |
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | | style="width: | ||
− | |||
− | |||
− | |||
− | | style="width: | ||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
|} | |} |
Latest revision as of 15:53, 17 June 2013
SnowFROC 2013 Schedule