This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "BeNeLux OWASP Day 2013"

From OWASP
Jump to: navigation, search
m (Fixed typo)
m (added download link to presentation Jerome)
 
(53 intermediate revisions by 5 users not shown)
Line 8: Line 8:
 
=== Welcome to OWASP BeNeLux 2013  ===
 
=== Welcome to OWASP BeNeLux 2013  ===
  
'''Registration is now open!'''
+
'''Sorry, the registration is closed, no tickets left!'''
 
   
 
   
[http://owaspbenelux2013.eventbrite.com/ http://www.owasp.org/images/7/77/Buttoncreate.png]
+
<!--[http://owaspbenelux2013.eventbrite.com/ http://www.owasp.org/images/7/77/Buttoncreate.png] -->
  
 
<!--
 
<!--
Line 37: Line 37:
 
* Nick Nikiforakis (University Leuven)
 
* Nick Nikiforakis (University Leuven)
 
* Fakos Alexios and Jan Philipp (n.runs AG)
 
* Fakos Alexios and Jan Philipp (n.runs AG)
more to be announced
+
* Migchiel de Jong (HP Fortify)
 
+
* Victor van der Veen (ITQ)
 
}}
 
}}
 
<br>
 
<br>
 
  
 
==== The OWASP BeNeLux Program Committee ====
 
==== The OWASP BeNeLux Program Committee ====
Line 53: Line 52:
 
<br><br>
 
<br><br>
 
==== Donate to OWASP BeNeLux ====
 
==== Donate to OWASP BeNeLux ====
<paypal>BeNeLux OWASP Day 2013</paypal>
+
[https://co.clickandpledge.com/?wid=72689 Donate]
  
 
<!-- Second tab -->
 
<!-- Second tab -->
Line 61: Line 60:
 
==== OWASP BeNeLux training day and conference are free! ====  
 
==== OWASP BeNeLux training day and conference are free! ====  
  
=== Registration is not now open: ===
+
=== Registration is closed ===
   
+
  Sorry but we already reached the maximum number of pariticipants.
[http://owaspbenelux2013.eventbrite.com/ http://www.owasp.org/images/7/77/Buttoncreate.png]
+
 
  
 
<br>
 
<br>
Line 78: Line 77:
 
=== Venue is  ===
 
=== Venue is  ===
  
''<br>
+
'''RAI Amsterdam - Entrance G'''
<br>
+
;Emerald Room
<br>''
+
;(On the first floor of the Auditorium Centre)
<br>
+
;Europaplein 2-22
 +
;1078 Amsterdam, THE NETHERLANDS
  
 
<br>'''Parking & roadmap''':
 
<br>'''Parking & roadmap''':
  
There is a public parking close to the conference venue.
+
There is a public parking at the conference venue.
  
 
Roadmap and parking:  
 
Roadmap and parking:  
Line 158: Line 158:
 
| colspan="2" style="text-align: center; background: grey; color: white" | ''Registration''
 
| colspan="2" style="text-align: center; background: grey; color: white" | ''Registration''
 
|-  
 
|-  
| 10h00 - 10h15 || OWASP Benelux Organization || Welcome  
+
| 10h00 - 10h15 || OWASP Benelux Organization || '''[[Media: OWASP_benelux-day_2013_opening_agenda_closing.pdf | Welcome]]'''
 +
|-
 +
| 10h15 - 10h30 || Sebastien Deleersnyder, OWASP Global || '''[https://www.owasp.org/images/4/49/OWASP_Update_BeNeLux_2013.pptx OWASP update]'''
 
|-
 
|-
| 10h15 - 10h30 || TBD || OWASP update
+
| 10h30 - 11h10 || [[#JanJorisVereijken|Jan Joris Vereijken]] || '''Keynote: Inside the mind of the fraudster'''
 
|-
 
|-
| 10h30 - 11h10 || TBD || ''' Title '''<br>''Abstract:''  
+
| 11h10 - 11h30
 +
| colspan="2" style="text-align: center;background: grey; color: white" | ''Morning Break''  
 
|-
 
|-
| 11h10 - 11h50 || TBD || ''' Title ''' <br>''Abstract:''
+
| 11h30 - 12h10 || [[#TomVanGoethem|Tom Van Goethem]] || '''[[Media:RemoteCodeExecutionInWordPress-OWASPBeNeLux-Tom_Van_Goethem.pdf | Remote code execution in WordPress: an analysis]]'''
 
|-
 
|-
| 11h50 - 12h30 || TBD || ''' Title ''' <br>''Abstract:''
+
| 12h10 - 12h50 || [[#AlexiosFakosAndJanPhilipp|Alexios Fakos & Jan Philipp]] || '''[[Media:OWASP_BeNeLux-SharePoint-Comprehensive_Security_model_v1.0.pdf | Getting a handle on SharePoint security complexity]]'''
 
|-
 
|-
| 12h30 - 13h30
+
| 12h50 - 13h30
 
| colspan="2" style="text-align: center;background: grey; color: white" | ''Lunch''  
 
| colspan="2" style="text-align: center;background: grey; color: white" | ''Lunch''  
 
|-
 
|-
| 13h30 - 14h10 || TBD || ''' Title ''' <br>''Abstract:''
+
| 13h30 - 14h10 || [[#DickBerlijn|Dick Berlijn]] || '''Keynote: Cyber warfare'''  
 
|-
 
|-
| 14h10 - 14h50 || TBD || ''' Title ''' <br>''Abstract:''
+
| 14h10 - 14h50 || [[#MigchieldeJong|Migchiel de Jong]] || ''' [[Media:owasp2013-mdejong.pdf | Static Analysis and code review; A journey through time]]'''
 
|-
 
|-
| 14h50 - 15h30 || TBD || ''' Title ''' <br>''Abstract:''
+
| 14h50 - 15h30 || [[#NickNikiforakis|Nick Nikiforakis]] || '''[[Media:webfingerprinting_owaspBENELUX2013.pdf |Everything you always wanted to know about web-based device fingerprinting (but were afraid to ask)]]'''
 
|-
 
|-
 
| 15h30 - 15h50
 
| 15h30 - 15h50
 
| colspan="2" style="text-align: center;background: grey; color: white" | ''Break''  
 
| colspan="2" style="text-align: center;background: grey; color: white" | ''Break''  
 
|-
 
|-
| 15h50 - 16h30 || TBD || ''' Title ''' <br>''Abstract:''
+
| 16h30 - 17h10 || [[#JeromeNokin|Jerome Nokin]] || '''[http://funoverip.net/wp-content/uploads/2013/12/Turning-your-managed-AV-into-my-botnet_OWASP2013_Nokin-Jerome_v1.1.pdf Turning your managed Anti-Virus into my botnet]'''
|-
 
| 16h30 - 17h10 || TBD || ''' Title ''' <br>''Abstract:''
 
 
|-
 
|-
| 17h10 - 17h50 || TBD|| '''Panel Discussion about...'''
+
| 17h10 - 17h50 || [[#VictorvanderVeen|Victor van der Veen]] || '''[[Media:TraceDroid.pdf | TraceDroid: A Fast and Complete Android Method Tracer]]'''
 
|-
 
|-
 
| 17h50 - 18h00 || OWASP Benelux 2013 organization || '''Closing Notes'''
 
| 17h50 - 18h00 || OWASP Benelux 2013 organization || '''Closing Notes'''
Line 193: Line 194:
  
  
<div id="'JanPhilipp"></div>
+
<div id="JanJorisVereijken"></div>
=== Getting a Handle on SharePoint Security Complexity, by Jan Philipp (Solutions Consultant Security, n.runs,) and Alexios Fakos (Principal IT Security Consultant, n.runs) ===
+
 
 +
=== Key note: Inside the mind of the fraudster, by Jan Joris Vereijken (Chief Security Architect, ING) ===
 
''Abstract:''<br>
 
''Abstract:''<br>
This presentation’s main goal is to provide decision makers, architects, administrators and developers with a comprehensive SharePoint security overview. We will introduce a SharePoint security model applicable to SharePoint versions 2010 and 2013. Then we will take a closer look at the use of different types of security principals and their effective use. This will be followed by covering security aspects when implementing and extending SharePoint to meet business needs and will be emphasized by showcasing common security pitfalls with examples throughout the presentation. This will be demonstrated with security down to the “nitty-gritty” details based on actual use cases and tips and pitfalls that have been encountered during security assessments and implementation of SharePoint solutions.
+
When we talk about banking malware, we typically think of bits and bytes: Zeus variants, field injections, Man-in-the-Browser attacks, or forensic analysis of infected PCs. What is actually much more interesting, is to understand what is driving the fraudster. He’s doesn’t care about bits and bytes, he’s just in it for the money. If we get into the mind of the fraudster, we can suddenly understand many issues much better. We’ll see that authentication is irrelevant, fraudsters don’t want to steal millions, that they hate the mobile app, and many more surprising things your never realized were keeping our poor fraudster awake at night.
 
<br>
 
<br>
 
<br>
 
<br>
 
''Bio:''<br>
 
''Bio:''<br>
'''Jan Philipp''' (MCT since 1989, MCITP, MCSE) works as a security consultant at n.runs, where he is responsible for design and implementation security assessments of complex global SharePoint infrastructures and solutions for major German and international companies. He has been involved with SharePoint technologies from their inception with Digital Dashboards throughout their many development changes (TeamSpaces, MOSS etc.) to the present day SharePoint and SharePoint Live versions.<br>
+
'''Jan Joris Vereijken''' holds a Ph.D. in Computing Science from the Eindhoven University of Technology, where he worked on algebraic protocol verification. After a brief stint at Bell Laboratories to work on Software Engineering, he moved to ING, the Dutch banking conglomerate. <br>
'''Alexios Fakos''' (CRISC, CSSLP) began his career in development as a Software Engineer back in 1999. After seven years of inspired insights in the software industry he joined n.runs to be part of the security team. Alexios is leading n.runs SDL services and he is since 2008 part of the German OWASP chapter. Alexios held presentations at OWASP AppSec US and Germany.<br>
+
In his current role as Chief Security Architect, he is responsible for the security architecture in the 35-odd countries where ING has banking operations.<br>
 
<br>
 
<br>
  
 
<div id="TomVanGoethem"></div>
 
<div id="TomVanGoethem"></div>
=== Remote Code Exection in WordPress: an analysis, by Tom Van Goethem (PhD Researcher, University of Leuven) ===
+
=== Remote code exection in WordPress: an analysis, by Tom Van Goethem (PhD Researcher, University of Leuven) ===
 
''Abstract:''<br>
 
''Abstract:''<br>
 
With over 13 million downloads, WordPress is one of the most popular open source blog platforms and content management systems. One of its key features is the installation of plugins. These are developed by third parties, but WordPress has to maintain its legacy codebase in order to remain compatible with these plugins. As this codebase makes use of unsafe functions, vulnerabilities may arise, affecting thousands websites - if not more. This presentation will focus on a vulnerability that has been present in WordPress versions up to September 2013. This vulnerability, which may lead to Remote Code Execution, was found by a simple combination of two publicly known elements: PHP Object Injection and unexpected behaviour of MySQL regarding Unicode characters.
 
With over 13 million downloads, WordPress is one of the most popular open source blog platforms and content management systems. One of its key features is the installation of plugins. These are developed by third parties, but WordPress has to maintain its legacy codebase in order to remain compatible with these plugins. As this codebase makes use of unsafe functions, vulnerabilities may arise, affecting thousands websites - if not more. This presentation will focus on a vulnerability that has been present in WordPress versions up to September 2013. This vulnerability, which may lead to Remote Code Execution, was found by a simple combination of two publicly known elements: PHP Object Injection and unexpected behaviour of MySQL regarding Unicode characters.
 
<br>
 
<br>
 +
::[[Media:RemoteCodeExecutionInWordPress-OWASPBeNeLux-Tom_Van_Goethem.pdf | Download the presentation as PDF]]
 
<br>
 
<br>
 
''Bio:''<br>
 
''Bio:''<br>
Line 214: Line 217:
 
<br>
 
<br>
  
 +
<div id="AlexiosFakosAndJanPhilipp"></div>
 +
=== Getting a handle on SharePoint security complexity, by Jan Philipp (Solutions Consultant Security, n.runs) and Alexios Fakos (Principal IT Security Consultant, n.runs) ===
 +
''Abstract:''<br>
 +
This presentation’s main goal is to provide decision makers, architects, administrators and developers with a comprehensive SharePoint security overview. We will introduce a SharePoint security model applicable to SharePoint versions 2010 and 2013. Then we will take a closer look at the use of different types of security principals and their effective use. This will be followed by covering security aspects when implementing and extending SharePoint to meet business needs and will be emphasized by showcasing common security pitfalls with examples throughout the presentation. This will be demonstrated with security down to the “nitty-gritty” details based on actual use cases and tips and pitfalls that have been encountered during security assessments and implementation of SharePoint solutions.
 +
<br>
 +
::[[Media:OWASP_BeNeLux-SharePoint-Comprehensive_Security_model_v1.0.pdf | Download the presentation as PDF]]
 +
<br>
 +
''Bio:''<br>
 +
'''Jan Philipp''' (MCT since 1989, MCITP, MCSE) works as a security consultant at n.runs, where he is responsible for design and implementation security assessments of complex global SharePoint infrastructures and solutions for major German and international companies. He has been involved with SharePoint technologies from their inception with Digital Dashboards throughout their many development changes (TeamSpaces, MOSS etc.) to the present day SharePoint and SharePoint Live versions.<br>
 +
'''Alexios Fakos''' (CRISC, CSSLP) began his career in development as a Software Engineer back in 1999. After seven years of inspired insights in the software industry he joined n.runs to be part of the security team. Alexios is leading n.runs SDL services and he is since 2008 part of the German OWASP chapter. Alexios held presentations at OWASP AppSec US and Germany.
 +
<br>
 +
<br>
 +
 +
 +
<div id="DickBerlijn"></div>
 +
=== Title, by Dick Berlijn ===
 +
''Abstract:''<br>
 +
[http://www.youtube.com/watch?feature=player_embedded&v=l_XOrcBxy-E Link to the movie on YouTube]
 +
<br>
 +
<br>
 +
''Bio:''<br>
 +
'''Dick Berlijn'''
 +
<br>
 +
<br>
 +
 +
<div id="MigchieldeJong"></div>
 +
 +
=== Static Analysis and code review; A journey through time, by Migchiel de Jong (Software Security Consultant, HP Fortify) ===
 +
''Abstract:''<br>
 +
Static analysis techniques to support code review, not just for security, have been around for a long time. This talk will take you on journey from the early days of computer science to this modern day and age of cloud, BYOD and mobile apps and how the passing of time affected code review and the technology to support it. The takeaways from this session are; Understanding the fundamentals problems that have to be addressed to really get the benefits from using static analysis for code review. Trends in code review. Best practices for code review. What the future holds for code review.
 +
<br>
 +
::[[Media:owasp2013-mdejong.pdf | Download the presentation as PDF]]
 +
<br>
 +
''Bio:''<br>
 +
'''Migchiel de Jong''' has developed hardware and software for the nuclear medicine and nuclear industry space for 10 years before joining Rational Software. During the 5 years at Rational Software (later acquired by IBM) he was involved in many software development process improvement projects. Having joined Fortify 9 years ago, Migchiel de Jong is currently working at HP Fortify, as a software security consultant helping large customers succeed with their software security assurance initiatives.<br>
 +
<br>
  
 +
<div id="NickNikiforakis"></div>
 
=== Everything you always wanted to know about web-based device fingerprinting (but were afraid to ask), by Nick Nikiforakis (Postdoctoral Researcher, University of Leuven) ===
 
=== Everything you always wanted to know about web-based device fingerprinting (but were afraid to ask), by Nick Nikiforakis (Postdoctoral Researcher, University of Leuven) ===
 
''Abstract:''<br>
 
''Abstract:''<br>
Line 227: Line 267:
 
are trying to defend against it today.  
 
are trying to defend against it today.  
 
<br>
 
<br>
 +
::[[Media:webfingerprinting_owaspBENELUX2013.pdf | Download the presentation as PDF]]
 
<br>
 
<br>
 
''Bio:''<br>
 
''Bio:''<br>
Line 235: Line 276:
 
<br>
 
<br>
  
 
+
<div id="JeromeNokin"></div>
 
+
=== Turning your managed Anti-Virus into my botnet, by Jerome Nokin (Senior Security Consultant, Verizon Business) ===
 
 
<!--
 
 
 
<div id="TomVanGoethem"></div>
 
=== Remote Code Exection in WordPress: an analysis, by Tom Van Goethem (PhD University Leuven) ===
 
 
''Abstract:''<br>
 
''Abstract:''<br>
With over 13 million downloads, WordPress is one of the most popular open source blog platforms and content management systems. One of its key features is the installation of plugins. These are developed by third parties, but WordPress has to maintain its legacy codebase in order to remain compatible with these plugins. As this codebase makes use of unsafe functions, vulnerabilities may arise, affecting thousands websites - if not more. This presentation will focus on a vulnerability that has been present in WordPress versions up to September 2013. This vulnerability, which may lead to Remote Code Execution, was found by a simple combination of two publicly known elements: PHP Object Injection and unexpected behaviour of MySQL regarding Unicode characters.
+
Today centrally managed Anti-Virus (AV) solutions are used across all enterprises and are relied upon to provide central management, logging and enforcement. This talk presents the journey and the results of a reviewing the security posture of the core components of a few selected managed AV solutions, the central servers themselves.  
 +
Critical security vulnerabilities will be presented, covering SQL Injection, Directory Path Traversal and Buffer Overflow.
 +
Particular focus will be given to the different steps required to analyze both protocols and management functionality and covers reverse-engineering, debugging and the creation of fuzzing tools. Who does not want to transform a major managed AV into his private botnet within minutes?
 
<br>
 
<br>
 +
::[http://funoverip.net/wp-content/uploads/2013/12/Turning-your-managed-AV-into-my-botnet_OWASP2013_Nokin-Jerome_v1.1.pdf Download the presentation as PDF]
 +
 
<br>
 
<br>
 
''Bio:''<br>
 
''Bio:''<br>
Tom Van Goethem is passionate about web security. After getting a master's degree of Applied Informatics, he enrolled in a PhD at the University of Leuven. As a student with a chronic drinking problem, he still found some time to hunt bugs for fun (and profit).<br>
+
'''Jerome Nokin''' works as a Security Consultant for Verizon Enterprise where he is a senior member of the Vulnerability Management Team mainly focusing on Penetration Tests
 +
and Web Application Assessment. Prior to his role at Verizon he worked in the area of security covering both consultancy and ICT.<br>
 
<br>
 
<br>
  
=== Body Armor for Binaries, by Asia Slowinska (Vrije Universiteit Amsterdam) ===
+
<div id="VictorvanderVeen"></div>
 +
=== TraceDroid: A Fast and Complete Android Method Tracer, by Victor van der Veen (Security Consultant, ITQ) ===
 
''Abstract:''<br>
 
''Abstract:''<br>
BinArmor is a novel technique to protect existing C binaries from memory corruption attacks on both control data and non-control data. Without access to source code, non-control data attacks cannot be detected with current techniques. Our approach hardens binaries against both kinds of overflow, without requiring the pro- grams’ source or symbol tables. We show that BinArmor is able to stop real attacks—including the recent non- control data attack on Exim. Moreover, we did not in- cur a single false positive in practice. On the downside, the current overhead of BinArmor is high—although no worse than competing technologies like taint analysis that do not catch attacks on non-control data. Specifi- cally, we measured an overhead of 70% for gzip, 16%- 180% for lighttpd, and 190% for the nbench suite.<br>
+
Tracedroid allows you to upload any Android APK file (i.e., an Android app) for automated analysis. Tracedroid records the behavior of the executed app, such as its network communication, the UI, but also its internal function calls and Java code that is executed. To trigger the app's real behavior, Tracedroid emulates a few actions, such as user interaction, incoming calls and SMS messages, etc. - this will reveal most malicious intents of an app (if any).<br>
 +
During this presentation, I will outline how Tracedroid is implemented and how its stimulation engine performs in terms of code coverage. I will also demonstrate how Tracedroid's output can help malware researchers to gain a better understanding of unknown Android applications during a live demo.<br>
 +
You can already give TraceDroid a try via http://tracedroid.few.vu.nl
 +
<br>
 +
::[[Media:TraceDroid.pdf | Download the presentation as PDF]]
 
<br>
 
<br>
 
''Bio:''<br>
 
''Bio:''<br>
I am a postdoctoral researcher in the System and Network Security group at the Vrije Universiteit Amsterdam, under the guidance of Prof. dr. ir. Herbert Bos.<br>
+
'''Victor van der Veen''' is a security consultant at ITQ and holds a MSc degree in Computer Science from the VU University Amsterdam. TraceDroid is part of his master thesis titled ‘Dynamic Analysis of Android Malware’ for which he co-worked with the Andrubis team from Vienna’s iSecLab. His interests are low-level system topics that enhance system security, as well as reverse engineering and analyzing malicious code. His previous work involves the implementation of a (partial) thrust-worthy voting machine and an in depth analysis on trends in the field of memory errors (published at RAID 2012).
I obtained my PhD from the Vrije Universiteit Amsterdam. My dissertation Using information flow tracking to protect legacy binaries was completed under the supervision of Prof. dr. ir. Herbert Bos, while my copromotor was Prof. dr. ir. Henri E. Bal.<br>
 
During my PhD studies, I interned twice with Microsoft Research Cambridge, where I joined the Systems and Performance Group. I also spent few months interning with the Systems and Security Department at Institute for Infocomm Research in Singapore.<br>
 
My research focuses on developing techniques to automatically analyze and reverse engineer complex software that is available only in binary form. Further, I’ve been looking into mechanisms that proactively protect software from malicious activities. Currently, I am involved in a project on Reverse Engineering of binaries, known as Rosetta.<br>
 
 
<br>
 
<br>
  
-->
 
  
 
<!-- Sixth tab -->
 
<!-- Sixth tab -->
Line 268: Line 310:
  
 
==== Social Event, November 28th ====
 
==== Social Event, November 28th ====
'''TBD'''
+
'''You (still) got that swing, and what about the moves ? We've got the Balls!'''
 +
 
 +
:So "Pin" your schedule to the OWASP Benelux Days - Social Event.
 +
:Thursday Night the 28th of November, our partner Vest Information Security is happy to invite you at:
 +
 
 +
:::Knijn Bowling
 +
:::Scheldeplein 3
 +
:::1078 GR  Amsterdam
 +
:::http://www.knijnbowling.nl/
 +
 
 +
;This is Amsterdams most famous retro-style bowling centre.
 +
 
 +
:We are very happy to welcome you from 20:30.
 +
:Our Bowling Tracks are open from 21:30 - 24:00
 +
 
 +
<hr>
 +
'''The OWASP BeNeLux-Day 2013 Social Event is sponsored by:"
 +
[http://www.vest.nl https://www.owasp.org/images/1/1d/Logo_Vest_BIG_170.gif]
 
<!-- Seventh tab -->
 
<!-- Seventh tab -->
  
Line 296: Line 355:
 
==== Donate to OWASP BeNeLux ====
 
==== Donate to OWASP BeNeLux ====
  
<paypal>BeNeLux OWASP Day 2013</paypal>
+
[https://co.clickandpledge.com/?wid=72689 Sponsor]
  
  
Line 322: Line 381:
 
[http://www.Checkmarx.com https://www.owasp.org/images/a/a2/Checkmarx.jpg]
 
[http://www.Checkmarx.com https://www.owasp.org/images/a/a2/Checkmarx.jpg]
 
[http://www.sogeti.nl https://www.owasp.org/images/9/94/Sogeti_logo.png]
 
[http://www.sogeti.nl https://www.owasp.org/images/9/94/Sogeti_logo.png]
<!--
+
[http://www.securify.nl https://www.owasp.org/images/7/7a/Securify_BV_logo.png]
[http://www.madisongurkha.nl https://www.owasp.org/images/6/6e/Madison-gurkha-logo.jpg]
+
{{MemberLinks|link=https://www.whitehatsec.com/|logo=Whitehat.gif}}
[http://www.sogeti.nl https://www.owasp.org/images/9/94/Sogeti_logo.png]
+
[http://www.nviso.be https://www.owasp.org/images/5/5e/Nviso_logo_RGB_baseline_200px.png]
<br>
+
[https://informatiebeveiliging.nl/ https://www.owasp.org/images/9/9a/Logo_Informatiebeveiliging-200.png]
[http://www.iminds.be https://www.owasp.org/images/thumb/a/a1/Iminds-logo.png/200px-Iminds-logo.png]
+
[http://www8.hp.com/us/en/software-solutions/software-security/index.html https://www.owasp.org/images/a/af/HP_Blue_RGB_150_LG-200.png]
[http://on2it.net https://www.owasp.org/images/3/3d/On2it-sponsor.png]
+
[http://www.northwave.nl https://www.owasp.org/images/4/4c/LogoNorthwave.jpg]
--!>
+
[http://www.cigital.com https://www.owasp.org/images/7/73/AppSecDC2012-Cigital.jpg]
 +
[[File:Deloitte.jpg||170px|link=http://www.deloitte.com/view/en_NL/nl]]
 +
[[File:Logo secwatch.jpg||170px|link=http://www.secwatch.nl]]
 +
 
 
<br>
 
<br>
  
  
 
[[Category:OWASP_AppSec_Conference]] [[Category:OWASP_BeNeLux_Archives]]
 
[[Category:OWASP_AppSec_Conference]] [[Category:OWASP_BeNeLux_Archives]]

Latest revision as of 10:48, 12 December 2013

Bnl13header-v.1.0.png



Welcome to OWASP BeNeLux 2013

Sorry, the registration is closed, no tickets left!


Confirmed speakers Conference

  • Dick Berlijn (ex Chief of Defence NL)
  • Jan Joris Vereijken (ING)
  • Tom Van Goethem (University Leuven)
  • Jerome Nokin (Verizon Business)
  • Nick Nikiforakis (University Leuven)
  • Fakos Alexios and Jan Philipp (n.runs AG)
  • Migchiel de Jong (HP Fortify)
  • Victor van der Veen (ITQ)


The OWASP BeNeLux Program Committee

  • Bart De Win / Sebastien Deleersnyder/ Lieven Desmet/ David Mathy, OWASP Belgium
  • Martin Knobloch / Ferdinand Vroom, OWASP Netherlands
  • Jocelyn Aubert / Andre Adelsbach/ Thierry Zoller, OWASP Luxembourg


Tweet!

Event tag is #owaspbnl13

Donate


Made possible by our Sponsors

PWC_log_resized.png        Zionsecurity.jpg Logo_Vest_BIG_170.gif Checkmarx.jpg Sogeti_logo.png Securify_BV_logo.png Whitehat.gif        Nviso_logo_RGB_baseline_200px.png Logo_Informatiebeveiliging-200.png HP_Blue_RGB_150_LG-200.png LogoNorthwave.jpg AppSecDC2012-Cigital.jpg Deloitte.jpg Logo secwatch.jpg