This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "EUTour2013 Denmark Agenda"
From OWASP
Ulf Munkedal (talk | contribs) |
Ulf Munkedal (talk | contribs) |
||
(16 intermediate revisions by the same user not shown) | |||
Line 7: | Line 7: | ||
| align="center" style="background:#EEEEEE;" colspan="2" | | | align="center" style="background:#EEEEEE;" colspan="2" | | ||
== '''OWASP Europe Tour - Denmark 2013''' == | == '''OWASP Europe Tour - Denmark 2013''' == | ||
− | ''Monday 10th of June 2013'' <br> | + | ''Monday 10th of June 2013 from 1700 - 2115'' <br> |
|- | |- | ||
| valign="center" bgcolor="#CCCCEE" align="center" colspan="2" | '''DESCRIPTION''' | | valign="center" bgcolor="#CCCCEE" align="center" colspan="2" | '''DESCRIPTION''' | ||
Line 35: | Line 35: | ||
| valign="middle" bgcolor="#EEEEEE" align="center" | ''' Monday 10th June ''' | | valign="middle" bgcolor="#EEEEEE" align="center" | ''' Monday 10th June ''' | ||
| valign="middle" bgcolor="#EEEEEE" align="left" | '''Venue Location: Technical University of Denmark, DTU Compute, Institut for Matematik og Computer Science (former DTU Informatik)<br> | | valign="middle" bgcolor="#EEEEEE" align="left" | '''Venue Location: Technical University of Denmark, DTU Compute, Institut for Matematik og Computer Science (former DTU Informatik)<br> | ||
− | Venue Address: DTU Compute | + | Venue Address: DTU Compute, Building 324 (between building 322 and 325), entrance from Elektrovej or Matematiktorvet, 2800 Kgs Lyngby, Denmark'''<br> |
− | Venue Map: [http:// | + | Venue Map: [http://goo.gl/maps/KiQ7C Google Maps] |
|- | |- | ||
| align="center" style="background:#CCCCEE;" colspan="2" | '''Price and registration''' | | align="center" style="background:#CCCCEE;" colspan="2" | '''Price and registration''' | ||
|- | |- | ||
| align="center" style="background:#EEEEEE;" colspan="2" | This event is '''FREE''' <br> | | align="center" style="background:#EEEEEE;" colspan="2" | This event is '''FREE''' <br> | ||
− | + | [http://owaspdk2013.eventbrite.com For planning purposes please register here or send an email to [email protected] no later than June 10 at 1200.]'''<br> | |
<br> | <br> | ||
|- | |- | ||
Line 54: | Line 54: | ||
| style="width:40%" valign="middle" height="30" bgcolor="#CCCCEE" align="center" colspan="0" | '''Description''' | | style="width:40%" valign="middle" height="30" bgcolor="#CCCCEE" align="center" colspan="0" | '''Description''' | ||
|- | |- | ||
− | | style="width:10%" valign="middle" height="30" bgcolor="#CCEEEE" align="center" colspan="0" | 16: | + | | style="width:10%" valign="middle" height="30" bgcolor="#CCEEEE" align="center" colspan="0" | 16:30 <br>(45 mins) |
− | | style="width:25%" valign="middle" height="30" bgcolor="#CCEEEE" align="center" colspan="0" | | + | | style="width:25%" valign="middle" height="30" bgcolor="#CCEEEE" align="center" colspan="0" | Arriving and Networking |
| style="width:25%" valign="middle" height="30" bgcolor="#CCEEEE" align="center" colspan="0" | | | style="width:25%" valign="middle" height="30" bgcolor="#CCEEEE" align="center" colspan="0" | | ||
| style="width:40%" valign="middle" height="30" bgcolor="#CCEEEE" align="center" colspan="0" | | | style="width:40%" valign="middle" height="30" bgcolor="#CCEEEE" align="center" colspan="0" | | ||
|- | |- | ||
− | | style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | | + | | style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 17:15 <br>(15 mins) |
| style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Welcome and OWASP | | style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Welcome and OWASP | ||
| style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Ulf Munkedal | | style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Ulf Munkedal | ||
− | | style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | What is OWASP? Why this event? How can you learn more and/or contribute? Thank you to our venue and food sponsor | + | | style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | What is OWASP? Why this event? How can you learn more and/or contribute? Thank you to our venue and food sponsor DTU Compute and the EU Tour 2013 sponsors. |
|- | |- | ||
− | | style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | | + | | style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 17:30 <br>(15 mins) |
| style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Information security at DTU Compute | | style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Information security at DTU Compute | ||
| style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Christian W. Probst, Associate Professor | | style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Christian W. Probst, Associate Professor | ||
| style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | A brief overview of what is going on at DTU Compute when it comes to information security related projects, e.g. the TREsPASS. | | style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | A brief overview of what is going on at DTU Compute when it comes to information security related projects, e.g. the TREsPASS. | ||
|- | |- | ||
− | | style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 17: | + | | style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 17:45 <br>(45 mins) |
− | | style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | | + | | style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | OWASP Tools and resources |
− | | style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | | + | | style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Fabio Cerullo |
− | | style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | | + | | style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Fabio will give an overview of the many tools and resources that OWASP makes available and explain how you can use them. Including the OWASP ESAPI - Enterprise Security API and how you can use it to write lower-risk applications. |
|- | |- | ||
− | | style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | | + | | style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 18:30 <br>(30 mins) |
| style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Dinner break and networking | | style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Dinner break and networking | ||
| style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Sandwiches and soft drinks | | style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Sandwiches and soft drinks | ||
− | | style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Thanks to DTU Compute | + | | style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Thanks to DTU Compute |
|- | |- | ||
− | | style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 19: | + | | style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 19:00 <br>(60 mins) |
− | | style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | | + | | style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Android Security and App Testing |
− | | style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | | + | | style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Alexandru Gherman |
− | | style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | | + | | style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Practical examples of the risks from OWASP Mobile Top 10 with proof-of-concepts and practical reverse engineering and testing of a downloaded app. |
|- | |- | ||
− | | style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 21: | + | | style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 20:00 <br>(15 mins) |
+ | | style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Coffee break and networking | ||
+ | | style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Coffee, the and possibly a cake :) | ||
+ | | style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Thanks to DTU Compute | ||
+ | |- | ||
+ | | style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 20:15 <br>(45 mins) | ||
+ | | style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | The Building Security in Maturity Model (BSIMM) | ||
+ | | style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Ellen Moar | ||
+ | | style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | How do you know what security activities belong in your software lifecycle? How do you measure what you're doing? Begun in 2009, the BSIMM, is an observation-based scientific model directly describing the collective software security activities of more than sixty software security initiatives. Used as a measuring tool, BSIMM helps an organisation understand and plan their software security initiative. It covers the full framework of software development from requirements, architecture, code and test, to release management, governance, and training. This talk will introduce the measurements, explain what is measured, how it is measured, and how the measurement can be used to create or improve a software security initiative. | ||
+ | |- | ||
+ | | style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 21:00 <br>(15 min) | ||
| style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Rounding up | | style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Rounding up | ||
| style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Ulf Munkedal | | style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Ulf Munkedal | ||
− | | style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Conclusions and last questions | + | | style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Conclusions and last questions before splitting up after a great evening :) |
|} | |} |
Latest revision as of 12:40, 6 June 2013
|
OWASP EUROPE TOUR 2013 Tour Home Page |
CONFERENCE AND TRAINING | |
OWASP Europe Tour - Denmark 2013Monday 10th of June 2013 from 1700 - 2115 | |
DESCRIPTION | |
OWASP Europe TOUR, is an event across the European region that promotes awareness about application security, so that people and organizations can make informed decisions about true application security risks. Everyone is free to participate in OWASP and all of our materials are available under a free and open software license.
| |
OWASP MEMBERSHIP | |
During the OWASP Europe Tour you could become a member and support our mission. |
Monday 10th of June | |
Fecha | Lugar |
Monday 10th June | Venue Location: Technical University of Denmark, DTU Compute, Institut for Matematik og Computer Science (former DTU Informatik) Venue Address: DTU Compute, Building 324 (between building 322 and 325), entrance from Elektrovej or Matematiktorvet, 2800 Kgs Lyngby, Denmark |
Price and registration | |
This event is FREE |
Conference Details | |||||
Time | Title | Speaker | Description | ||
16:30 (45 mins) |
Arriving and Networking | ||||
17:15 (15 mins) |
Welcome and OWASP | Ulf Munkedal | What is OWASP? Why this event? How can you learn more and/or contribute? Thank you to our venue and food sponsor DTU Compute and the EU Tour 2013 sponsors. | ||
17:30 (15 mins) |
Information security at DTU Compute | Christian W. Probst, Associate Professor | A brief overview of what is going on at DTU Compute when it comes to information security related projects, e.g. the TREsPASS. | ||
17:45 (45 mins) |
OWASP Tools and resources | Fabio Cerullo | Fabio will give an overview of the many tools and resources that OWASP makes available and explain how you can use them. Including the OWASP ESAPI - Enterprise Security API and how you can use it to write lower-risk applications. | ||
18:30 (30 mins) |
Dinner break and networking | Sandwiches and soft drinks | Thanks to DTU Compute | ||
19:00 (60 mins) |
Android Security and App Testing | Alexandru Gherman | Practical examples of the risks from OWASP Mobile Top 10 with proof-of-concepts and practical reverse engineering and testing of a downloaded app. | ||
20:00 (15 mins) |
Coffee break and networking | Coffee, the and possibly a cake :) | Thanks to DTU Compute | ||
20:15 (45 mins) |
The Building Security in Maturity Model (BSIMM) | Ellen Moar | How do you know what security activities belong in your software lifecycle? How do you measure what you're doing? Begun in 2009, the BSIMM, is an observation-based scientific model directly describing the collective software security activities of more than sixty software security initiatives. Used as a measuring tool, BSIMM helps an organisation understand and plan their software security initiative. It covers the full framework of software development from requirements, architecture, code and test, to release management, governance, and training. This talk will introduce the measurements, explain what is measured, how it is measured, and how the measurement can be used to create or improve a software security initiative. | ||
21:00 (15 min) |
Rounding up | Ulf Munkedal | Conclusions and last questions before splitting up after a great evening :) |