This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Front Range OWASP Conference 2013/Schedule"
From OWASP
Jess Garrett (talk | contribs) |
Jess Garrett (talk | contribs) |
||
(28 intermediate revisions by 4 users not shown) | |||
Line 1: | Line 1: | ||
+ | <!-- | ||
====SnowFROC 2013 schedule==== | ====SnowFROC 2013 schedule==== | ||
− | This schedule is subject to | + | This schedule is subject to frequent changes as the conference draws nearer. |
Line 11: | Line 12: | ||
(See the [[Front_Range_OWASP_Conference_2013#CFP|CFP]] section for additional dates and details.) | (See the [[Front_Range_OWASP_Conference_2013#CFP|CFP]] section for additional dates and details.) | ||
− | + | --> | |
− | == | + | ==SnowFROC 2013 Schedule== |
<br> | <br> | ||
Line 24: | Line 25: | ||
|- | |- | ||
| style="background:#024C68; color:white" align="center" | 07:00-08:30 | | style="background:#024C68; color:white" align="center" | 07:00-08:30 | ||
− | | colspan="4" style="background:#AEBEC3; color:#024C68" align="center" | '''Registration and Morning Snacks''' <br> | + | | colspan="4" style="background:#AEBEC3; color:#024C68" align="center" | '''Registration and Morning Snacks''' <br> ''Sponsored by [http://www.hpenterprisesecurity.com '''HP''']'' |
|- | |- | ||
| style="background:#024C68; color:white" align="center" | 08:00-08:15 | | style="background:#024C68; color:white" align="center" | 08:00-08:15 | ||
− | | colspan="4" style="background:#E0E0E0" align="center" | '''Welcome and Kick-off'''<br> ''[[User: | + | | colspan="4" style="background:#E0E0E0" align="center" | '''Welcome and Kick-off'''<br> ''[[User:Brad_Carvalho|Brad Carvalho]], [[User:Mark_Major|Mark Major]]'' |
|- | |- | ||
| style="background:#024C68; color:white" align="center" | 08:15-08:30 | | style="background:#024C68; color:white" align="center" | 08:15-08:30 | ||
− | | colspan="4" style="background:#E0E0E0" align="center" | '''State of OWASP'''<br> ''[[ | + | | colspan="4" style="background:#E0E0E0" align="center" | '''State of OWASP'''<br> ''[[Front_Range_OWASP_Conference_2013/Speakers/Manico|Jim Manico]]'' |
|- | |- | ||
| style="background:#024C68; color:white" align="center" | 08:30-09:30 | | style="background:#024C68; color:white" align="center" | 08:30-09:30 | ||
− | | colspan="4" style="background:#E0E0E0" align="center" | '''Keynote Address'''<br> ''Neal Ziring, Technical Director | + | | colspan="4" style="background:#E0E0E0" align="center" | '''Keynote Address: Data Protection for the 21st Century'''<br> ''[[Front_Range_OWASP_Conference_2013/Speakers/Ziring|Neal Ziring]], Technical Director for the National Security Agency’s Information Assurance Directorate (IAD)''<br>[https://vimeo.com/68058106 Video] |
|- | |- | ||
| style="background:#024C68; color:white" align="center" | 09:30-10:00 | | style="background:#024C68; color:white" align="center" | 09:30-10:00 | ||
− | | colspan="4" style="background:#AEBEC3; color:#024C68" align="center" | '''Coffee Break and Sponsor Expo''' <br> | + | | colspan="4" style="background:#AEBEC3; color:#024C68" align="center" | '''Coffee Break and Sponsor Expo''' <br> ''Sponsored by [https://aerstone.com '''Aerstone''']'' |
| style="background:#C1DAD6" align="center" | '''CTF Kick-off'''<br>''[[User:Chris_Rossi|Chris Rossi]], [[User:Mark_Major|Mark Major]]'' | | style="background:#C1DAD6" align="center" | '''CTF Kick-off'''<br>''[[User:Chris_Rossi|Chris Rossi]], [[User:Mark_Major|Mark Major]]'' | ||
|- | |- | ||
| style="background:#024C68; color:white" align="center" | 10:00-10:45 | | style="background:#024C68; color:white" align="center" | 10:00-10:45 | ||
− | | style="background:#E8D0A9" align="center" | + | | style="background:#E8D0A9" align="center" | [[Front_Range_OWASP_Conference_2013/Sessions/Sess1_Tech1|'''DevFu: The inner ninja in every application developer''' <br> ''Danny Chrastil'']]<br>[[Media: Chrastil.pptx| Slides ]]<br>[https://vimeo.com/68082818 Video] |
− | | style="background:#DFC184" align="center" | + | | style="background:#DFC184" align="center" | [[Front_Range_OWASP_Conference_2013/Sessions/Sess1_Tech2|'''SIP Based Cloud Instances''' <br> ''Gregory Disney-Leugers]]''<br>[[Media: Disney-Leugers.odp| Slides ]]<br>[https://vimeo.com/68091563 Video] |
− | | style="background:#F2F2F2" align="center" | + | | style="background:#F2F2F2" align="center" | [[Front_Range_OWASP_Conference_2013/Sessions/Sess1_Mgmt1|'''Digital Bounty Hunters - Decoding Bug Bounty Programs''' <br> ''Jon Rose]]''<br>[[Media: Rose.pdf | Slides]]<br>[https://vimeo.com/68107340 Video] |
− | | style="background:#B7AFA3" align="center" | + | | style="background:#B7AFA3" align="center" | [[Front_Range_OWASP_Conference_2013/Sessions/Sess1_Mgmt2|'''Electronic Discovery for System Administrators''' <br> ''Russell Shumway]]''<br>[[Media: Shumway.pptx| Slides ]]<br>[https://vimeo.com/68142345 Video] |
− | | style="background:#C1DAD6" align="center" rowspan="9" | '''CTF''' | + | | style="background:#C1DAD6" align="center" rowspan="9" | [[Front_Range_OWASP_Conference_2013/CTF|'''CTF''']] <br> ''Sponsored by [https://aerstone.com '''Aerstone''']'' |
|- | |- | ||
| style="background:#024C68; color:white" align="center" | 10:55-11:40 | | style="background:#024C68; color:white" align="center" | 10:55-11:40 | ||
− | | style="background:#E8D0A9" align="center" | + | | style="background:#E8D0A9" align="center" | [[Front_Range_OWASP_Conference_2013/Sessions/Sess2_Tech1|'''Adventures in Large Scale HTTP Header Abuse''' <br> ''Zachary Wolff]]''<br>[[Media: Wolff.pptx| Slides ]]<br>[https://vimeo.com/68071431 Video] |
− | | style="background:#DFC184" align="center" | + | | style="background:#DFC184" align="center" | [[Front_Range_OWASP_Conference_2013/Sessions/Sess2_Tech2|'''How Malware Attacks Web Applications''' <br> ''Casey Smith]]''<br>[[Media: Smith.pdf| Slides ]]<br>[https://vimeo.com/68107330 Video] |
− | | style="background:#F2F2F2" align="center" | + | | style="background:#F2F2F2" align="center" | [[Front_Range_OWASP_Conference_2013/Sessions/Sess2_Mgmt1|'''Linking Security to Business Value in the Customer Service Industry''' <br> ''Dan Rojas]]''<br>[[Media: Rojas.pdf | Slides]]<br>[https://vimeo.com/68111318 Video] |
− | | style="background:#B7AFA3" align="center" | + | | style="background:#B7AFA3" align="center" | [[Front_Range_OWASP_Conference_2013/Sessions/Sess2_Mgmt2|'''Legal Issues of Forensics in the Cloud''' <br> ''David Willson]]''<br>[[Media: Willson.pdf| Slides ]]<br>[https://vimeo.com/68082821 Video] |
|- | |- | ||
| style="background:#024C68; color:white" align="center" | 11:40-12:40 | | style="background:#024C68; color:white" align="center" | 11:40-12:40 | ||
− | | colspan="4" style="background:#AEBEC3; color:#024C68" align="center" | '''Lunch and Sponsor Expo''' <br> | + | | colspan="4" style="background:#AEBEC3; color:#024C68" align="center" | '''Lunch and Sponsor Expo''' <br> ''Sponsored by [https://aerstone.com '''Aerstone''']'' |
|- | |- | ||
| style="background:#024C68; color:white" align="center" | 12:40-13:25 | | style="background:#024C68; color:white" align="center" | 12:40-13:25 | ||
− | | style="background:#E8D0A9" align="center" | + | | style="background:#E8D0A9" align="center" | [[Front_Range_OWASP_Conference_2013/Sessions/Sess3_Tech1|'''Angry Cars: Hacking the "Car as Platform"''' <br> ''Aaron Weaver]]''<br>[[Media: Weaver.pdf | Slides]]<br>[https://vimeo.com/68071432 Video] |
− | | style="background:#DFC184" align="center" | + | | style="background:#DFC184" align="center" | [[Front_Range_OWASP_Conference_2013/Sessions/Sess3_Tech2|'''Top Ten Web Application Defenses''' <br> ''Jim Manico]]''<br>[[Media: Manico.pdf | Slides]]<br>[https://vimeo.com/68091564 Video] |
− | | style="background:#F2F2F2" align="center" | + | | style="background:#F2F2F2" align="center" | [[Front_Range_OWASP_Conference_2013/Sessions/Sess3_Mgmt1|'''Using SaaS and the Cloud to Secure the SDLC''' <br> ''Andrew Earle]]''<br>[[Media: Earle.pptx| Slides ]]<br>[https://vimeo.com/68111315 Video] |
− | | style="background:#B7AFA3" align="center" | + | | style="background:#B7AFA3" align="center" | [[Front_Range_OWASP_Conference_2013/Sessions/Sess3_Mgmt2|'''CISPA: Why Privacy Advocates Hate This Legislation''' <br> ''Maureen Donohue Feinroth]]''<br>[[Media: Feinroth.pptx| Slides ]]<br>[https://vimeo.com/68071433 Video] |
|- | |- | ||
| style="background:#024C68; color:white" align="center" | 13:35-14:20 | | style="background:#024C68; color:white" align="center" | 13:35-14:20 | ||
− | | style="background:#E8D0A9" align="center" | + | | style="background:#E8D0A9" align="center" | [[Front_Range_OWASP_Conference_2013/Sessions/Sess4_Tech1|'''DevOps and Security: It's Happening. Right Now.''' <br> ''Helen Bravo]]''<br>[[Media: Bravo.pptx| Slides ]]<br>[https://vimeo.com/68335259 Video] |
− | | style="background:#DFC184" align="center" | + | | style="background:#DFC184" align="center" | [[Front_Range_OWASP_Conference_2013/Sessions/Sess4_Tech2|'''A Demo of and Preventing XSS in .NET Applications''' <br> ''Larry Conklin]]''<br>[[Media: Conklin.pptx| Slides ]]<br>[https://vimeo.com/68069847 Video] |
− | | style="background:#F2F2F2" align="center" | + | | style="background:#F2F2F2" align="center" | [[Front_Range_OWASP_Conference_2013/Sessions/Sess4_Mgmt1|'''Measuring Security Best Practices With OpenSAMM''' <br> ''Alan Jex]]''<br>[[Media: Jex.ppt| Slides ]]<br>[https://vimeo.com/68082823 Video] |
− | | style="background:#B7AFA3" align="center" | + | | style="background:#B7AFA3" align="center" | [[Front_Range_OWASP_Conference_2013/Sessions/Sess4_Mgmt2|'''Crafting a Plan for When Security Fails''' <br> ''Robert Lelewski]]''<br>[[Media: Lelewski.pdf| Slides ]]<br>[https://vimeo.com/68071439 Video] |
|- | |- | ||
| style="background:#024C68; color:white" align="center" | 14:30-15:15 | | style="background:#024C68; color:white" align="center" | 14:30-15:15 | ||
− | | style="background:#E8D0A9" align="center" | + | | style="background:#E8D0A9" align="center" | [[Front_Range_OWASP_Conference_2013/Sessions/Sess5_Tech1|'''Real World Cloud Application Security''' <br> ''Jason Chan]]''<br>[[Media: Chan.pptx| Slides ]]<br>[https://vimeo.com/68082826 Video] |
− | | style="background:#DFC184" align="center" | + | | style="background:#DFC184" align="center" | [[Front_Range_OWASP_Conference_2013/Sessions/Sess5_Tech2|'''Data Mining a Mountain of Zero Day Vulnerabilities''' <br> ''Joe Brady]]''<br>[[Media: Brady.pdf| Slides ]]<br>[https://vimeo.com/68107333 Video] |
− | | style="background:#F2F2F2" align="center" | + | | style="background:#F2F2F2" align="center" | [[Front_Range_OWASP_Conference_2013/Sessions/Sess5_Mgmt1|'''Defending Desktop (.NET/C#) Applications: Mitigating in the Dark (A Case Study Remix)''' <br> ''Jon McCoy]]''<br>[[Media:McCoy.pdf| Slides ]]<br>[https://vimeo.com/68071440 Video] |
− | | style="background:#B7AFA3" align="center" | + | | style="background:#B7AFA3" align="center" | [[Front_Range_OWASP_Conference_2013/Sessions/Sess5_Mgmt2|'''Information Control: The Critical Need for a Defensible Position - Securing the Information Ecosystem''' <br> ''Tom Glanville]]''<br>[[Media: Glanville.pptx| Slides ]]<br>[https://vimeo.com/68082819 Video] |
|- | |- | ||
| style="background:#024C68; color:white" align="center" | 15:15-15:45 | | style="background:#024C68; color:white" align="center" | 15:15-15:45 | ||
− | | colspan="4" style="background:#AEBEC3; color:#024C68" align="center" | '''Coffee Break and Sponsor Expo''' <br> | + | | colspan="4" style="background:#AEBEC3; color:#024C68" align="center" | '''Coffee Break and Sponsor Expo''' <br> ''Sponsored by [https://aerstone.com '''Aerstone''']'' |
|- | |- | ||
| style="background:#024C68; color:white" align="center" | 15:45-16:45 | | style="background:#024C68; color:white" align="center" | 15:45-16:45 | ||
| colspan="4" style="background:#E0E0E0" align="center" | '''Moderated Panel Discussion''' '' | | colspan="4" style="background:#E0E0E0" align="center" | '''Moderated Panel Discussion''' '' | ||
− | + | [[Front_Range_OWASP_Conference_2013/Speakers/Weaver|Aaron Weaver]] | |
− | + | [[Front_Range_OWASP_Conference_2013/Speakers/Willson|David Willson]] | |
− | + | [[Front_Range_OWASP_Conference_2013/Speakers/Wilson|Dan Wilson]] | |
− | Moderator: [[ | + | [[Front_Range_OWASP_Conference_2013/Speakers/Ziring|Neal Ziring]] |
− | [ | + | Moderator: [[Front_Range_OWASP_Conference_2013/Speakers/Manico|Jim Manico]]'' |
+ | [https://vimeo.com/68058105 Video] | ||
|- | |- | ||
| style="background:#024C68; color:white" align="center" | 16:45-17:00 | | style="background:#024C68; color:white" align="center" | 16:45-17:00 | ||
− | | colspan="4" style="background:#E0E0E0" align="center" | '''Closing Statements'''<br>''[[User: | + | | colspan="4" style="background:#E0E0E0" align="center" | '''Closing Statements'''<br>''[[User:Brad_Carvalho|Brad Carvalho]], [[User:Mark_Major|Mark Major]]'' |
|- | |- | ||
| style="background:#024C68; color:white" align="center" | 17:00- | | style="background:#024C68; color:white" align="center" | 17:00- | ||
− | | colspan="4" style="background:#E0E0E0" align="center" | '''Sponsor Raffles, Drawings, and Contests' | + | | colspan="4" style="background:#E0E0E0" align="center" | '''Sponsor Raffles, Drawings, and Contests''' |
| style="background:#C1DAD6" align="center" | '''CTF Wrap-Up'''<br>''[[User:Chris_Rossi|Chris Rossi]], [[User:Mark_Major|Mark Major]]'' | | style="background:#C1DAD6" align="center" | '''CTF Wrap-Up'''<br>''[[User:Chris_Rossi|Chris Rossi]], [[User:Mark_Major|Mark Major]]'' | ||
|- | |- | ||
− | | style="background:#024C68; color:white" align="center" | | + | | style="background:#024C68; color:white" align="center" | 19:00-22:00+ |
− | | colspan="4" style="background:#AEBEC3; color:#024C68" align="center" | '''[ | + | | colspan="4" style="background:#AEBEC3; color:#024C68" align="center" | '''After-party at [http://denverpoolhall.com/ Tarantula Billiards]''' <br> ''Sponsored by [https://www.appliedtrust.com '''AppliedTrust''']'' <br> ''Tarantula is located 3 blocks from the Marriott at the corner of 15th and Stout (1520 Stout Street, Denver)'' |
− | | style=" | + | | style="background:#C1DAD6" align="center" | '''Awards Ceremony''' ''at [http://denverpoolhall.com/ Tarantula]'' (20:00) |
|- | |- | ||
| style="border-left: 1px solid white; border-right: 1px solid white; border-bottom: 1px solid white; border-top: 1px solid black;" | <br><br> | | style="border-left: 1px solid white; border-right: 1px solid white; border-bottom: 1px solid white; border-top: 1px solid black;" | <br><br> | ||
Line 107: | Line 109: | ||
|- | |- | ||
| style="width:10%; background:#024C68; color:white" align="center" | 09:00-9:45 | | style="width:10%; background:#024C68; color:white" align="center" | 09:00-9:45 | ||
− | | style="width:20%; background:#E8D0A9" align="center" rowspan="5" | Secure Coding | + | | style="width:20%; background:#E8D0A9" align="center" rowspan="5" | [[Front_Range_OWASP_Conference_2013/Sessions/Training | '''Training: Secure Coding''' <br> ''Aaron Weaver'']] |
| style="width:20%; background:#DFC184" align="center" | {{:Front_Range_OWASP_Conference_2013/boaf1a}} ''([[Front_Range_OWASP_Conference_2013/boaf1a|edit]])'' | | style="width:20%; background:#DFC184" align="center" | {{:Front_Range_OWASP_Conference_2013/boaf1a}} ''([[Front_Range_OWASP_Conference_2013/boaf1a|edit]])'' | ||
| style="width:20%; background:#F2F2F2" align="center" | {{:Front_Range_OWASP_Conference_2013/boaf1b}} ''([[Front_Range_OWASP_Conference_2013/boaf1b|edit]])'' | | style="width:20%; background:#F2F2F2" align="center" | {{:Front_Range_OWASP_Conference_2013/boaf1b}} ''([[Front_Range_OWASP_Conference_2013/boaf1b|edit]])'' | ||
Line 117: | Line 119: | ||
|- | |- | ||
| style="width:10%; background:#024C68; color:white" align="center" | 10:45-11:15 | | style="width:10%; background:#024C68; color:white" align="center" | 10:45-11:15 | ||
− | | colspan="3" style="background:#AEBEC3; color:#024C68" align="center" | '''Coffee Break'''<br> | + | | colspan="3" style="background:#AEBEC3; color:#024C68" align="center" | '''Coffee Break''' <br> ''Sponsored by [https://aerstone.com '''Aerstone''']'' |
|- | |- | ||
| style="width:10%; background:#024C68; color:white" align="center" | 11:15-12:00 | | style="width:10%; background:#024C68; color:white" align="center" | 11:15-12:00 |
Latest revision as of 15:53, 17 June 2013
SnowFROC 2013 Schedule