This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "AppSecAsiaPac2014"

From OWASP
Jump to: navigation, search
(Updated sponsorship documents.)
 
(66 intermediate revisions by 5 users not shown)
Line 5: Line 5:
 
! width="500" align="center" | <br>
 
! width="500" align="center" | <br>
 
|-
 
|-
| align="center" | [[Image:AppSecAPAC_2014.JPG|950px| link=]]  
+
| align="center" | [[Image:AppSecAPAC_2014.JPG|1150px| link=]]  
 
| align="center" |  
 
| align="center" |  
  
 
|}
 
|}
 
+
{{Social Media Links}}
  
 
=WELCOME=
 
=WELCOME=
日本語サイト(Japanese): '''[https://appsecapac.org/2014/ https://appsecapac.org/2014/]'''
+
<br>
 
 
'''We are pleased to announce that the OWASP Japan chapter will host the OWASP AppSec APAC 2014 conference in Tokyo, Japan at the Solar City Conference Center.'''
 
 
 
  
 +
'''日本語サイト Appsec APAC 2014 Japanese site''': '''[https://appsecapac.org/2014/ https://appsecapac.org/2014/]'''
 +
<br>
 +
<br>
 +
'''We are pleased to announce that the OWASP Japan chapter will host the OWASP AppSec APAC 2014 conference in Tokyo, Japan at the Sola City Conference Center.'''
 +
<br>
 +
<br>
 
'''The event will be composed of 2 days of training (March 17-18), followed by 2 days of conference talks (March 19-20).'''
 
'''The event will be composed of 2 days of training (March 17-18), followed by 2 days of conference talks (March 19-20).'''
 
 
 
The Global AppSec APAC 2014 Conference will be a reunion of Information Security Asia-Pacific leaders, and will present cutting-edge ideas.
 
The Global AppSec APAC 2014 Conference will be a reunion of Information Security Asia-Pacific leaders, and will present cutting-edge ideas.
 
OWASP events attract a worldwide audience interested in “what’s next”. The conference is expected to draw 250-300 technologists from Government, Financial Services, Media, Pharmaceuticals, Healthcare, Technology, and many other verticals.
 
OWASP events attract a worldwide audience interested in “what’s next”. The conference is expected to draw 250-300 technologists from Government, Financial Services, Media, Pharmaceuticals, Healthcare, Technology, and many other verticals.
 
<br>
 
<br>
 
<br>
 
<br>
 
+
'''Should you want to REGISTRE FOR A TRAINING SESSION please send an e-mail to [mailto:laura.grau@owasp.org laura.grau@owasp.org]'''
'''Conference Registration is now open for the Early Birds!''' [http://www.cvent.com/d/t4q89d Click here to register]
+
<br>
 +
<br>
 +
'''Conference Registration is CLOSED'''
 
<br>
 
<br>
 
<br>
 
<br>
 
+
'''Who Should Attend Global AppSec APAC 2014:'''
Who Should Attend Global AppSec APAC 2014:
 
 
*Application Developers
 
*Application Developers
 
*Application Testers and Quality Assurance
 
*Application Testers and Quality Assurance
Line 41: Line 43:
  
 
If you have any questions, please email the conference committee: '''[mailto:appsec-apac2014@owaspjapan.org appsec-apac2014@owaspjapan.org]'''
 
If you have any questions, please email the conference committee: '''[mailto:appsec-apac2014@owaspjapan.org appsec-apac2014@owaspjapan.org]'''
<br>
+
<br><br>
 
+
'''OWASP PodCast 24/7'''
==Core Team of Local Executive Committee==
+
* '''[https://soundcloud.com/owasp-podcast/2014-appsec-apac-history-and  Riotaro Okada and Robert Dracea talking about the upcoming 2014 AppSec APAC Conference in Tokyo]'''
 +
* '''[http://trustedsoftwarealliance.com/2014/01/14/appsec-apac-2014-with-tobias-gondrom-what-to-expect/ AppSec APAC 2014 with Tobias Gondrom – What To Expect]'''
  
 +
=TEAM=
 +
==Global AppSec APAC 2014 Executive Committee==
 
'''Riotaro Okada'''
 
'''Riotaro Okada'''
Researcher. Born in Kobe, Hyogo Prefecture, Japan, Mr. Okada has over 20 years of experience in software development and network construction.  He has been involved in network construction, software development and the implementation of information security measures at independent software development companies, the R&D divisions of manufacturing companies as well as consulting firms.  Mr. Okada has also facilitated various technology-related communities such as for Linux and PHP.  In 2004, he founded the Web Application Security Forum and as a member of the board became involved in the diffusion of security-related information.  Moreover, he is also a researcher at the Information-technology Promotion Agency, Japan (IPA) and responsible for the IT strategy as well as disaster response projects at various government organizations.  Mr. Okada is the co-leader of OWASP Japan since its founding, is CISA certified and holds an MBA from BBT (2009).  
+
Researcher. Born in Kobe, Hyogo Prefecture, Japan, Mr. Okada has over 20 years of experience in software development and network construction.  He has been involved in network construction, software development and the implementation of information security measures at independent software development companies, the R&D divisions of manufacturing companies as well as consulting firms.  Mr. Okada has also facilitated various technology-related communities such as for Linux and PHP.  In 2004, he founded the Web Application Security Forum and as a member of the board became involved in the diffusion of security-related information.  Moreover, he was also a researcher at the Information-technology Promotion Agency, Japan (IPA) for 8 years, and responsible for the IT strategy as well as disaster response projects at various government organizations.  Mr. Okada is the co-leader of OWASP Japan since its founding, is CISA certified and holds an MBA from BBT (2009).  
 
<br>
 
<br>
  
Line 64: Line 69:
  
 
'''Robert Dracea''' Mr. Dracea is responsible for the global strategy of a Japanese internet service company.  With the mission of better sharing Japan’s advanced technological power with the world, from a business perspective, he has successfully architected numerous alliances and tie-ups both domestically in Japan as well as overseas.  Additionally, he has also, on a volunteer-basis, conducted the translation and interpretation at multilingual OWASP Meetings.  Mr. Dracea has been since its founding a member of the OWASP Japan Advisory Board.
 
'''Robert Dracea''' Mr. Dracea is responsible for the global strategy of a Japanese internet service company.  With the mission of better sharing Japan’s advanced technological power with the world, from a business perspective, he has successfully architected numerous alliances and tie-ups both domestically in Japan as well as overseas.  Additionally, he has also, on a volunteer-basis, conducted the translation and interpretation at multilingual OWASP Meetings.  Mr. Dracea has been since its founding a member of the OWASP Japan Advisory Board.
 +
<br>
 +
<br>
 +
 +
==Program Selection Committee==
 +
 +
'''Youki Kadobayashi, Ph.D.'''
 +
Associate professor at Nara Institute of Science and Technology (NAIST).  After being employed at Osaka University’s Cybermedia Center, Dr. Kadobayashi joined his current position in 2000.  Since 2008 he has been involved in cyber security standardization at the International Telecommunications Union Telecommunications Standardization Sector.  Dr. Kadobayashi is also actively involved in cyber security education and training programs.  Additionally, he is a board member of the industry-academic-government collaborative research consortium WIDE Project and since 2013 the Japanese representative of the American-Japanese international joint research project FP7 NECOMA Project.  Dr. Kadobayashi is also a member of the executive committee for the WASForum Hardening Project.
 +
<br>
 +
 +
'''Masakazu Takahashi'''
 +
Chief Security Advisor, Microsoft Japan.
 +
After being involved in standard library, OS development and other basic development, Mr. Takahashi became involved in the security business after engaging in vulnerability assessment and intrusion detection at a security company.
 +
At a time when penetration testing was a common practice in vulnerability assessment, Mr. Takahashi became a proponent of white box testing as a logical and repeatable inspection method.  In terms of intrusion detection, he oversaw the systemization of surveillance and operations technologies and was in charge of starting numerous SOC businesses.
 +
In November of 2006, Mr. Takahashi joined Microsoft Japan.  As the chief security advisor, he is involved in attaining the secure computing that Microsoft aims for while at the same time publishing papers and conducting various lectures.
 +
Additionally, Mr. Takahashi is actively involved in associations within the industry and is the head of a community involved in the promotion of information security measures as well as the vice president of the Japan Network Security Association (JNSA).
 +
<br>
 +
 +
'''Keiji Takeda, Ph.D.'''
 +
Lecturer at Keio University, Faculty of Environment and Information Studies.
 +
Ph.D. from Keio University Graduate School of Media and Governance.  After being employed at the Ministry of Defense, the Japan Air Self-Defense Force and Accenture, Dr. Takeda became a lecturer at Carnegie Mellon University’s school in Japan before moving on to his current position.  Dr. Takeda is also a member of various information security-related committees including participating as an advisor for the Hyogo Prefectural government.  In addition, he is actively involved in the information security industry through a broad array research & development, operations, personnel training and consulting activities including development assessment of intrusion detection systems, participation at various security events and the planning of organizations for the distribution of information related to security vulnerabilities.
 +
<br>
 +
 +
'''Masafumi Negishi'''
 +
Senior Engineer, Office of Emergency Response and Clearinghouse for Security Information, Internet Initiative Japan Inc.
 +
Mr. Negishi has been involved in network construction, security inspection and security consulting, etc. at a major electronics manufacturer, a security company and foreign-affiliated computer vendor.  In 2003 he became employed at IIJ Technology and placed in charge of security services, overseeing numerous security inspections.  Currently he is part of the security incident support team and is primarily responsible for the collection and analysis of security information as well as taking appropriate action when security issues are discovered.  Since 2007 he has been an instructor at the SANS Institute and since 2012 he has also been a member of the Advisory Board for OWASP Japan.
 +
<br>
  
 +
'''Yoshinari Fukumoto'''
 +
System Security Office Manager, Rakuten Inc.
 +
After being involved in research and development of security products at a security-related company, in 2002 Mr. Fukumoto joined Rakuten and became responsible for the internet service security for Rakuten Group.  He is primarily involved in the promotion and development of secure software as well as the support of security-related operations.  Mr. Fukumoto is also a Rakuten-CERT Representative.  He has been a member of the OWASP Japan Advisory Board since the chapter began its activities.
  
  
Line 70: Line 104:
  
 
'''AppSec APAC 2014 will be held at the SOLA CITY CONFERENCE CENTER in Tokyo, Japan'''.<br>
 
'''AppSec APAC 2014 will be held at the SOLA CITY CONFERENCE CENTER in Tokyo, Japan'''.<br>
 +
 +
[https://plus.google.com/110347373259238043803/about?hl=en Google Map of SCCC]
  
  
Line 76: Line 112:
  
  
=REGISTRATION=
+
=HOW TO GET THERE=
  
 +
'''TOKYO''' has two international airports, Tokyo International Airport (Haneda: HND) and Narita International Airport (NRT).<br>
 +
Both airports are located away from the city center but Haneda is the closer of the two.<br><br>
  
=='''Conference Registration is now open!''' [http://www.cvent.com/d/t4q89d Click here to register]==
+
We advise against taking a taxi from the airport since it is farther and more expensive than you might expect. To avoid high costs take the train or bus to the nearest station to your hotel or destination and then take a taxi if needed.<br>'''Please find out what the best way to reach your destination is before arriving.'''
 +
<br>
 +
<br>
 +
[[Image:Train.png |left|150px|caption]] '''From Tokyo International Airport to Tokyo Station (HND: Haneda)'''
 +
* Train  http://www.haneda-airport.jp/inter/en/access/train.html
 +
* Take either the Tokyo Monorail to Hamamatsucho Station (JPY 470, 23 min) or the Airport Limited Express to Keikyu Shinagawa Station (JPY 400, 22 min) <br>
 +
'''From Narita International Airport to Tokyo Station  (NRT: Narita)'''
 +
* Train  http://www.narita-airport.jp/en/access/train/index.html
 +
* Take the Narita Express to Tokyo Station [approx. JPY 3,000 or JPY 4,500 for Green Car (first class), approx. 1 hour]
 +
<br>
 +
<br>
 +
[[Image:Bus.png |left|150px|caption]] '''Taking the bus to Tokyo Station'''
 +
* From Haneda http://www.haneda-airport.jp/inter/en/access/bus.html
 +
* From Narita http://www.narita-airport.jp/en/access/bus/index.html
 +
<br>
 +
There are numerous buses going to Tokyo Station and various locations and some may take you very close to your hotel or other destination.  Some buses go directly to major hotels.
 +
Please find out what your nearest station is and chose the appropriate bus from the list at the URL found above.<br>
 +
<br>
 +
Depending on where your hotel is, you may choose to continue on by train or take a taxi.<br><br>
 +
[[Image:Taxi.png |left|150px|caption]] '''Taxis in Tokyo:'''
 +
Taxis in Japan are extremely reliable and you generally do not have any problems.<br>
 +
To avoid language issues, have the name and address of your hotel, or Sola City Conference Center and other destinations written (with a map if possible) and keep it handy at all times to show it to the driver.
 +
[[Image:Taxi_availabe.png |right|100px|caption]]* Taxis can be found at taxi waiting areas or you can hail an empty cab (indicated by the red “空車” light in the front window).<br><br>
 +
<br>
 +
<br>
 +
<br>
 +
<br>
 +
The JR Yamanote Line or any stations within the Yamanote Line circle are considered '''downtown Tokyo'''.<br>
 +
The venue, '''Sola City Center''', is close to Ochanomizu-Station on the JR Chuo-Line.
 +
[[Image:Metro_map_Tokyo.png|center|800px|caption]]
 +
<br>
 +
<br>
 +
<br>
 +
<br>
 +
<br>
 +
<br>
 +
<br>
 +
<br>
  
 +
= HOTEL RESERVATIONS=
 +
<br>
 +
Tokyo boasts a variety of accommodations from Ryoakans to full-service hotels and luxury inns. '''Rooms may go fast on the conference days, so book early for best availability!'''
 +
<br><br>
 +
The conference venue, [http://solacity.jp/cc/access/index.html Sola City Conference Center], is located in Tokyo Central Region, Kanda/Akihabara/Ochanomizu area. The closest train station is Ochanomizu Station.
  
'''OWASP AppSec APAC features two days of training March 17-18, and two days of talks, March 19-20, 2014.'''<br>
+
As the conference venue is not a hotel, you must reserve your accommodation. The venue is really close to JR Ochanomizu Station, and Tokyo Metro Shin-Ochanomizu station which is at the heart of downtown Tokyo.
 +
Because of the central location, you can reach the venue relatively easily from any area in downtown Tokyo like Akihabara, Kanda and Nihonbashi, so feel free to book your hotel using any web site you like.
 +
<br><br>
  
 +
For your help:
 +
* Hotel Reservation in Tokyo: [http://japanican.com/en/hotel/list/A27/?AFF=GMTCD Japanican Site]
 +
* Hotel reservation near the Conference Venue (Ochanomizu area):  [http://japanican.com/en/hotel/list/A27/130103/?navcheckin=&navcheckout=&sn=1&rn=1&apn=2&hcpn=0&cbn=0?AFF=GMTCD Japanican Site for Ochanomizu Area]
  
'''Conference Registration Fees''' ''(not including training)''
+
Alternatively, if you would like to book your accommodation by contacting JTB Global Marketing and Travel they will be happy to help you with your hotel booking and provide assistance organizing your time in Tokyo.
----
+
* E-mail: owasp_hotel@gmt.jtb.jp 
 +
* Phone: +81-3-5796-5445 
 +
* FAX:+81-3-5495-0685
  
{| class="wikitable"
+
=REGISTRATION=
|-
+
<br>
! scope="col"| Ticket price
+
'''OWASP AppSec APAC features two days of training March 17-18, and two days of talks, March 19-20, 2014.'''<br>
! scope="col"| Early Fee (DEADLINE February 1)
+
<br>
! scope="col"| Regular Fee
+
== '''Training Sessions Registration''' ==
! scope="col"| On-site Fee
 
|-
 
! scope="row"| Active OWASP member
 
| $200 USD <span style="color:blue"> (20,000 Yen)</span>
 
| $300 USD <span style="color:blue"> (30,000 Yen)</span>
 
| $400 USD <span style="color:blue"> (40,000 Yen)</span>
 
|-
 
! scope="row"| Non Member + 1 year OWASP membership
 
| $250 USD <span style="color:blue"> (25,000 Yen)</span>
 
| $350 USD <span style="color:blue"> (35,000 Yen)</span>
 
| $450 USD <span style="color:blue"> (45,000 Yen)</span>
 
|-
 
! scope="row"| Non-Member
 
| $250 USD <span style="color:blue"> (25,000 Yen)</span>
 
| $350 USD <span style="color:blue"> (35,000 Yen)</span>
 
| $450 USD <span style="color:blue"> (45,000 Yen)</span>
 
|-
 
! scope="row"|Student
 
| $50 USD <span style="color:blue"> (5,000 Yen)</span>
 
| $80 USD <span style="color:blue"> (8,000 Yen)</span>
 
| $120 USD <span style="color:blue"> (12,000 Yen)</span>
 
  
|}
+
'''Should you want to register for a Training Session please send an e-mail to [mailto:laura.grau@owasp.org laura.grau@owasp.org]'''<br>
''Please note - payment will be processed in Japanese Yen but we can process invoice and payment in USD or other currencies.''<br>
 
 
<br>
 
<br>
 
+
'''Training Sessions Registration Fees''' ''(Please note that conference Registration is separate.)''
 
 
 
 
'''Training Fees''' ''(Please note that conference Registration is separate.)''
 
 
----
 
----
 
{| class="wikitable"
 
{| class="wikitable"
Line 137: Line 199:
 
| $800 USD <span style="color:blue"> (80,000 Yen)</span>
 
| $800 USD <span style="color:blue"> (80,000 Yen)</span>
 
|}
 
|}
''Please note - payment will be processed in Japanese Yen but we can process invoice and payment in USD or other currencies.''<br>
+
''Payment will be processed in Japanese Yen but we can process invoice in USD or other currencies.''<br>
 +
<br>
 
<br>
 
<br>
 +
=='''Conference Registration ''' ==
 +
 +
Conference on-line registration is '''CLOSED'''<br>
 +
<br>
 +
'''Conference Registration Fees''' ''(not including training)''
 +
----
 +
 +
{| class="wikitable"
 +
|-
 +
! scope="col"| Ticket price
 +
! scope="col"| On-site Fee
 +
|-
 +
! scope="row"| Active OWASP member
 +
| $400 USD <span style="color:blue"> (40,000 Yen)</span>
 +
|-
 +
! scope="row"| Non-Member
 +
| $450 USD <span style="color:blue"> (45,000 Yen)</span>
 +
|-
 +
! scope="row"|Student
 +
| $120 USD <span style="color:blue"> (12,000 Yen)</span>
  
 +
|}
 +
''Payment will be processed in Japanese Yen but we can process invoice in USD or other currencies.''<br>
 +
<br>
  
 
'''Cancellations, Refunds, and Substitutions'''
 
'''Cancellations, Refunds, and Substitutions'''
Line 155: Line 241:
  
  
= CALL FOR PAPERS/TRAINING =
+
= TRAINING SESSIONS=
  
'''The AppSec APAC 2014 call for submissions will be open from November 1 to December 15, 2013.''' <br><br>
 
  
==Submission Guidelines==
+
== Monday and Tuesday, March 17th - 18th ==
If you want to submit a paper or training, please take note of the following:<br>
+
*'''''Mobile Security: Securing Mobile Devices & Applications''''' _ ENGLISH <br>
 +
'''Dave Wichers'''<br>
 +
ROOM A 10am-5pm<br><br>
 +
''Mobile applications enable new threats and attacks which introduce significant risks to the enterprise, and many custom applications contain significant vulnerabilities that are unknown to the team that developed them.''
 +
''Considering the number of mobile applications available in the Google Play and Apple AppStore is nearing 1.5 million and vulnerabilities are skyrocketing it is imperative to perform typical application security practices. But, how is mobile different?''<br>
 +
''This two-day, hands-on course enables students to understand how easily mobile devices and applications can be successfully attacked. They will learn how to identify, avoid and remediate common vulnerabilities by walking through a threat analysis and learning critical security areas such as those identified in the OWASP Top Ten Mobile Risks and Controls. Using state-of-the-art testing tools, students will learn how to secure mobile devices across the enterprise. Students will be able to choose from iOS or Android hands-on labs throughout the course, while they learn how easily the bad guy can compromise applications and the data they contain.''<br>
  
'''* Vendor-Specific Proposals''': OWASP does not accept product or vendor-related submissions. If your talk is a thinly-veiled advertisement for a new product, technology or service your company is offering, please do not apply. If you would like to publicize a product, please contact [mailto:kelly.santalucia@owasp.org kelly.santalucia@owasp.org] for information on exhibiting and other vendor opportunities, including sponsored sessions.<br>
 
  
'''* All presentations must be submitted by the original authors:''' We currently only accept submissions by original authors of the presentations. PR firms, speaking relation firms, and all other parties who are not direct authors of submitted presentations are discouraged from submitting a proposal on behalf of their clients/speakers. We require direct contact with presenters to expedite questions during the submission review process.<br>
 
  
'''* Supporting materials:''' If you have an existing body of work available on the subject (blog posts, video, articles, papers...), you now have the possibility to point that out as well. This may help the committee in gauging the nature and the amount of thought and work you have already put into your subject.<br><br>
+
== Monday, March 17th==
 +
* '''''Secure Web Development''''' _ ENGLISH<br>
 +
'''Jerry Hoff'''<br>
 +
ROOM B 10am-6pm<br><br>
 +
''Web application security is the #1 security issue for most enterprises today. This class goes through fundamental security principles for Java and .NET web developers, focusing on secure development practices.''<br>
 +
''This highly interactive, intensive 2-day class provides essential Java application security training for developers, architects and software testers. The class is a combination of lecture, hands-on development and code review. Instructor bring years of hands-on security experience, and provide invaluable insight from numerous security assessments.''
 +
''Participants will not only learn the most common threats against web applications, but more importantly they will learn how to also fix the problems via control based code samples and review. Each student will have their own web application they will secure and test. This class is suitable for web application software engineers, web quality assurance engineers, and web architects''. 
 +
''Focus will be put on covering not only the OWASP Top 10, but other common web vulnerabilities that plague modern web applications. Participants will gain a strong knowledge of web vulnerabilities, how vulnerabilities are exploited, and what security controls need to be in place to write defensible applications.  Emphasis will also be placed on how these secure coding techniques relate to mobile, secure API development, and how security can be introduced throughout the SDLC.''<br>
  
'''What is in it for the Attendees?''' It is important to let the delegates know what is in it for them. The best presentations are generally those that have good audience interaction and are informing as well as entertaining. It is also important to offer the delegates something to take away that they will be able to use immediately on return to their daily work routine.
 
Audiences do have a preference for presentations which reflect practical applications of something, as opposed to theory.
 
Envisaging the main take-aways for the delegates will help you to develop your presentation. What would you like delegates to tell their colleagues about your session when they get back to work?<br><br>
 
  
'''Topics:'''
+
* '''''Hands on Simple method of the penetration testing using OWASP ZAP''''' _ JAPANESE<br>
* Security aspects of new web technologies (HTML5, CSP, etc.)
+
'''Minoru Sakai''' and '''Yuho Kameda'''<br>
* New Attack and Defense
+
ROOM C 10am - 6pm <br><br>
* Mobile security
+
''This course goes through automated security testing from OWASP tools.''<br>
* Cloud security
+
''Tools:''<br>
* SDLC
+
''OWASP Zed Attack Proxy''<br>
* Automated security testing
+
''OWASP Broken Web Applications''<br><br><br>
* Security awareness and education
 
* Threat modeling
 
* Secure coding and code review
 
* OWASP Projects
 
* Case Studies
 
* Legacy system and maintenance<br><br>
 
  
==Interested in speaking?==
+
== Tuesday, March 18th ==
'''Send an e-mail to the selection committee at [mailto:appsec-apac2014@owaspjapan.org appsec-apac2014@owaspjapan.org]providing them with:'''<br>
 
  
::Title of your presentation or training session.<br>
+
* '''''CISO training: Managing Web & Application Security – OWASP for senior managers''''' _ ENGLISH<br>
::Presentation Type (talk or training).<br>
+
'''Tobias Gondrom'''<br>
::Language: Please note that all proposals and presentations must be in English or Japaneses.<br>
+
ROOM C 10am - 6pm <br> <br>
::Short Description:  A summary of the main idea of your proposal. Absolute limit of 30 words.
+
''Managing and improving your global information security organization, Leverage OWASP and common best practices to improve your security programs and organization. Achieving cost-effective application security, bringing it all together on the management level.''
::Abstract: A concise description of the purpose, methods, and implications of your presentation. Length 150-200 words.<br>
+
''Considering the number of mobile applications available in the Google Play and Apple AppStore is nearing 1.5 million and vulnerabilities are skyrocketing it is imperative to perform typical application security practices. But, how is mobile different?''<br>
::Previous speaking experience (or references).<br>
+
''This two-day, hands-on course enables students to understand how easily mobile devices and applications can be successfully attacked. They will learn how to identify, avoid and remediate common vulnerabilities by walking through a threat analysis and learning critical security areas such as those identified in the OWASP Top Ten Mobile Risks and Controls. Using state-of-the-art testing tools, students will learn how to secure mobile devices across the enterprise. Students will be able to choose from iOS or Android hands-on labs throughout the course, while they learn how easily the bad guy can compromise applications and the data they contain''.<br>
::Your bio.<br>
 
::Your e-mail.<br>
 
  
  
'''Notification of acceptance: January 5, 2014'''<br>
 
  
''Please note that travel and accomodations are not provided''
+
* '''''Developer Security Training''''' _ FREE TRAINING _ ENGLISH<br>
 +
'''Jim Manico'''<br>
 +
ROOM B 1pm - 6pm <br><br>
 +
''This free training session will teach a developer about the fundamentals of secure software development practices.  The session is a fast-paced combination of lecture, security testing and code review. This class will also highlight production quality API's from various languages, frameworks, and 3rd party libraries that provide production quality and scalable security controls''. <br>
  
==Selection Criteria==
 
The Selection Committee will review all abstracts that have been submitted on time. The submissions will be rated on a one to five scale by each of the reviewers on the following criteria:<br>
 
'''1. Concept:''' This is the basic idea of your submission. Is it interesting? Is it relevant? Will it be beneficial for the community to hear? Does the speaker have a unique, fresh, and entertaining online and/or stage persona?<br>
 
'''2. Clarity / Quality of presentation:''' Are the ideas conducive to present in front of an audience? Is the abstract articulate and specific? Abstracts should be logical, well-structured and easy to understand. Abstracts should present complete information. This criterion addresses how well the specific research question(s) and objectives, methods used, primary results, etc are explained, rather than the quality of the study itself. A brief, clearly written abstract follows a logical order (e.g. aims, methods, results, followed by a clear interpretation of the results and any implications).<br>
 
'''3. Correctness:''' First, is the technical approach sound and well-chosen? Second, can one trust the claims of the paper -- are they supported by proper proofs, or other argumentation?<br>
 
'''4. Depth:''' Is the basic idea well considered and thought out? To what extent will the audience gain insight? Does this paper have enough substance, or would it benefit from more ideas or results?<br>
 
'''5. Takeaway / Innovative content/ Originality / Uniqueness:'''  Is the attendee going to leave this session knowing something they didn't know when they walked in? Are they learning or being inspired? Has this talk or sort of talk been given at a recent AppSec event, or it is something that it is relatively untouched or has a new and interesting spin? Does the abstract present truly innovative ideas and creative solutions to new or known challenges within the industry? How original is the approach? Does this paper break new ground in topic, methodology, or content? Submissions showcasing cutting-edge ideas and approaches or containing significant new findings will be favored.<br>
 
'''6. Relevance / contribution to the knowledge:''' How significant is the work described? If the ideas are novel, will they also be useful or inspirational? If the results are sound, are they also important? This criterion addresses the importance of the research in terms of advancing the subject. Abstracts should help the conference contribute to the progression of the industry as a whole. Particular emphasis will be given to abstracts that provide useful outputs and practical advice & tools for the audience in their daily work.
 
  
==Program Selection Committee==
 
  
'''Youki Kadobayashi, Ph.D.'''
+
= CONFERENCE SESSIONS=
Associate professor at Nara Institute of Science and Technology (NAIST).  After being employed at Osaka University’s Cybermedia Center, Dr. Kadobayashi joined his current position in 2000.  Since 2008 he has been involved in cyber security standardization at the International Telecommunications Union Telecommunications Standardization Sector.  Dr. Kadobayashi is also actively involved in cyber security education and training programs.  Additionally, he is a board member of the industry-academic-government collaborative research consortium WIDE Project and since 2013 the Japanese representative of the American-Japanese international joint research project FP7 NECOMA Project.  Dr. Kadobayashi is also a member of the executive committee for the WASForum Hardening Project.
 
<br>
 
  
'''Masakazu Takahashi'''
+
All conference session will be translated into English - Japanese.
Chief Security Advisor, Microsoft Japan.  
 
After being involved in standard library, OS development and other basic development, Mr. Takahashi became involved in the security business after engaging in vulnerability assessment and intrusion detection at a security company.
 
At a time when penetration testing was a common practice in vulnerability assessment, Mr. Takahashi became a proponent of white box testing as a logical and repeatable inspection method.  In terms of intrusion detection, he oversaw the systemization of surveillance and operations technologies and was in charge of starting numerous SOC businesses.
 
In November of 2006, Mr. Takahashi joined Microsoft Japan.  As the chief security advisor, he is involved in attaining the secure computing that Microsoft aims for while at the same time publishing papers and conducting various lectures.
 
Additionally, Mr. Takahashi is actively involved in associations within the industry and is the head of a community involved in the promotion of information security measures as well as the vice president of the Japan Network Security Association (JNSA).
 
<br>
 
  
'''Keiji Takeda, Ph.D.'''
+
[http://owaspappsecapac2014.sched.org/?iframe=no '''Conference Schedule''']
Lecturer at Keio University, Faculty of Environment and Information Studies.
 
Ph.D. from Keio University Graduate School of Media and Governance.  After being employed at the Ministry of Defense, the Japan Air Self-Defense Force and Accenture, Dr. Takeda became a lecturer at Carnegie Mellon University’s school in Japan before moving on to his current position.  Dr. Takeda is also a member of various information security-related committees including participating as an advisor for the Hyogo Prefectural government.  In addition, he is actively involved in the information security industry through a broad array research & development, operations, personnel training and consulting activities including development assessment of intrusion detection systems, participation at various security events and the planning of organizations for the distribution of information related to security vulnerabilities.
 
<br>
 
  
'''Masafumi Negishi'''
+
== Wednesday, March 19th ==
Senior Engineer, Office of Emergency Response and Clearinghouse for Security Information, Internet Initiative Japan Inc.
 
Mr. Negishi has been involved in network construction, security inspection and security consulting, etc. at a major electronics manufacturer, a security company and foreign-affiliated computer vendor.  In 2003 he became employed at IIJ Technology and placed in charge of security services, overseeing numerous security inspections.  Currently he is part of the security incident support team and is primarily responsible for the collection and analysis of security information as well as taking appropriate action when security issues are discovered.  Since 2007 he has been an instructor at the SANS Institute and since 2012 he has also been a member of the Advisory Board for OWASP Japan.
 
<br>
 
  
'''Yoshinari Fukumoto'''
+
PLENARY SESSIONS:
System Security Office Manager, Rakuten Inc.
+
* 10.00am-10.30am  Welcome Address and Openening Remarks (Riotaro Okada & Tobais Gondrom)
After being involved in research and development of security products at a security-related company, in 2002 Mr. Fukumoto joined Rakuten and became responsible for the internet service security for Rakuten GroupHe is primarily involved in the promotion and development of secure software as well as the support of security-related operationsMr. Fukumoto is also a Rakuten-CERT RepresentativeHe has been a member of the OWASP Japan Advisory Board since the chapter began its activities.  
+
* 10.30am-11.20am  KEYNOTE (Suguru Yamaguchi)
 +
* 11.30am-12.20pm  OWASP Top 10 - 2013. KEYNOTE ([[User:Wichers|Dave Wichers]])<br><br>
 +
TRACK A:
 +
* 1.30pm-2.20pm  The OWASP Proactive Controls. (Jim Manico)
 +
* 2.30pm-3.20pm  OWASP documents for every people.(Chia-Lung Albert Hsieh)
 +
* 4.00pm-4.50pm  12 Case Studies for the Access Controls of Web Application. (Takashi Honda)
 +
* 5.00pm-5.50pm  Get Ready for the Next Big Wave of Attacks: Hacking of Leading CMS Systems. (Helen Bravo, Sanjay Agnani)<br><br>
 +
TRACK B:
 +
* 1.30pm-2.20pm Why OWASP AppSensor is the future of Application Security, and why you should be using it. (Dennis Groves)
 +
* 2.30pm-3.20pm  Inside Story of the first SaaS type WAF Service. (Kana Toko)
 +
* 4.00pm-4.50pm  The Art and Science of Configuring SSL. (Nick Galbreath)
 +
* 5.00pm-5.50pm  Bad Web Apps are Good – The Broken Web Application Project. (Mordecai Kraushar)<br><br>
 +
TERRACE ROOM
 +
* 1.30am-2.20pm Women in AppSec
 +
* 2.30pm-3.20pm  OWASP Japan
 +
* 4.00pm-4.50pm The fact report of attack traffic on the Internet. (Makoto Niimura)
 +
* 5.00pm-5.50pm  The investigation of Web Application Vulnerabilities in Japan. (Koki Takahashi)
  
 +
== Thursday, March 20th ==
 +
TRACK A:
 +
* 9.30am-10.20am  eXtend Security on Xcode. (Tokuji Akamine, Raymund Pedraita)
 +
* 10.30am-11.20am  Getting a handle on mobile security. (Jerry Hoff)
 +
* 11.50am-12.40pm  Preinstalled Android application poisoning. (Yoshitaka Kato)<br><br>
  
 +
TRACK B:
 +
* 9.30am-10.20am  HTML 5 Security for Web Application Development.  (Yoshinori Matsumoto)
 +
* 10.30am-11.20am  XSS Allstars from Japan. (Yosuke Hasegawa, Masato Kinugawa, Mala)
 +
* 11.50am-12.40pm  Secure Escaping method for the age of HTML 5. (Yoshinori Takesako)<br><br>
 +
TERRACE ROOM
 +
* 9.30am-10.20am  Management for Security Life Cycle. (Shoji Ito)
 +
* 10.30am-11.20am  How to choose (or write) your own source code scanner. (Yu-Lu “Chris” Liu)
 +
* 11.50am-12.40pm  OWASP Japan (Open Mic Session)<br><br>
 +
PLENARY SESSIONS:
 +
* 1.40pm-2.30pm  1 user, 10 places, 100 seconds. (Matias Madou)
 +
* 2.40pm-3.30pm  DevOps. (Dave Wichers)
 +
* 4.00pm-4.50pm  KEYNOTE  (Michael Coates)
 +
* 5.00pm-5.30pm  Closing Remarks (Tobias Gondrom & Riotaro Okada)<br><br>
  
  
= SPEAKERS =
+
= KEYNOTE SPEAKERS & OWASP BOARD MEMBER=
  
 
==Keynote Speaker==
 
==Keynote Speaker==
Line 294: Line 390:
  
 
[http://www.linkedin.com/in/gondrom LinkedIn Tobias Gondrom]
 
[http://www.linkedin.com/in/gondrom LinkedIn Tobias Gondrom]
 +
 +
=WOMEN IN APPSEC=
 +
 +
 +
== The deadline to apply for the Women in AppSec Program for AppSec APAC has been extended until March 7th, 2014. ==
 +
<br>
 +
<br>
 +
Attendance for one woman to the '''OWASP AppSec APAC 2014''' conference, and at least one of the in-depth training sessions, will be the award for this year’s winner. The Women in AppSec Program was successfully launched at AppSec USA in 2011 and this year’s event hopes to build on that trend and further engage women in the community.<br><br>
 +
 +
We encourage you to take advantage of this opportunity by applying as soon as possible if you are a woman either in the software security industry, or interested in learning more about the software security industry.
 +
<br><br>
 +
If you are interested please use the [https://docs.google.com/a/owasp.org/forms/d/1DFNkq2RhBViYD1ItlW8rimE8rSNPIKGW3e23vQPvNlw/viewform '''APPLICATION FORM'''] to send us your details. <br><br>
 +
 +
OWASP’s current program objective is to encourage female students at both the undergraduate and graduate levels, instructors, and professional working-women who are dedicated to a career in information security and/or application development, to expand their skills and pursue application security. <br><br>
  
  
 +
{|
 +
|-
 +
! width="400" align="left" |
 +
! width="400" align="left" |
 +
|-
 +
| align="left" | [[Image:Owasp_summit.jpg|left|250px]]  <br/>
 +
| align="left" | [[Image:WIAS01.JPG|left|300px]]
 +
| align="left" | [[Image:IMG_5579.JPG|left|325px]]
  
= HOTEL AND TRAVEL =
+
|}
 +
<br><br><br><br><br>
  
'''Stay tuned. Information will be posted by January 10th 2014'''
 
  
JTB Global Marketing and Travel is working hard on providing AppSec APAC attendees an unforgettable travel experience in Japan'''
 
  
= SPONSORS =
 
  
==We are looking for sponsors for the Global AppSec APAC 2014.==
+
 
 +
=SPONSORSHIP OPPORTUNITIES =
 +
 
 +
==We are looking for Silver and 'A La Carte" Sponsors for the Global AppSec APAC 2014.==
 
<br>
 
<br>
  
Line 332: Line 451:
 
'''OWASP AppSec APAC 2014 Premium Sponsorship Menu''' on the following package.<br>
 
'''OWASP AppSec APAC 2014 Premium Sponsorship Menu''' on the following package.<br>
  
Download Sponsor Package(Updated 2014.1.7): '''[https://www.owasp.org/images/9/9a/OWASP-sponsorship2014-v1.7English.pdf English]''' |  
+
Download Sponsor Package(Updated 2014.2.20): '''[https://www.owasp.org/images/d/d8/OWASP-sponsorship2014-v2.0-English.pdf English]''' |  
'''[https://www.owasp.org/images/6/6d/OWASP-sponsorship2014-v1.7-Japanese.pdf Japanese]'''
+
'''[https://www.owasp.org/images/c/cd/OWASP-sponsorship2014-v2.0-Japanese.pdf Japanese]'''
  
 +
<headertabs/>
 +
== '''SPONSORS''' ==
 +
 +
<h2>Diamond Sponsors</h2>
 +
<p align=center>
 +
[[Image:Hp_sl.png|300px|link=http://www8.hp.com/jp/ja/home.html]]
 +
[[Image:Scsk_sl.png‎|300px|link=http://www.scsk.jp/index_en.html]]
 +
</p>
 +
<h2>Platinum Sponsors</h2>
 +
<p align=center>
 +
[[Image:Iwi_sl.png‎‎‎|250px|link=http://www.iwi.co.jp/en/ ]]
 +
[[Image:Sst_sl.png‎|250px|link=http://www.securesky-tech.com/ ]]
 +
[[Image:Techmatrix_sl.png‎‎|250px|link=https://www.techmatrix.co.jp/eng/index.html ]]
 +
</p>
 +
<h2>Gold Sponsors</h2>
 +
<p align=center>
 +
[[Image:Arxan sl.png|200px|link=http://www.arxan.com/ ]]
 +
[[Image:Cigital sl.png‎|200px|link=http://www.cigital.com/]]
 +
[[Image:Cyberagent_sl.png‎|200px|link=http://www.cyberagent.co.jp/en/]]
 +
</p>
 +
<p align=center>
 +
[[Image:Iij_sl.png‎|200px|link=http://www.iij.ad.jp/en/index.html ]]
 +
[[Image:Lac_sl.png‎‎|200px|link=http://www.lac.co.jp/corporate/index_en.html ]]
 +
[[Image:Nec_sl.png ‎|200px|link=http://www.nec.com/ ]]
 +
</p>
 +
<p align=center>
 +
[[Image:Panasonic sl.png ‎|200px|link=]]
 +
[[Image:Rakuten_sl.png‎|200px|link=http://www.rakuten.co.jp/]]
 +
[[Image:Si_sl.png‎|200px|link=https://securityinnovation.com/]]
 +
[[Image:Sony-dna_sl.png‎‎|200px|link=http://www.sonydna.com/sdna/e/index.html ]]
 +
</p>
 +
<h2>Silver Sponsors</h2>
 +
<p align=center>
 +
[[Image:DeNA_sl.png‎|180px|link=http://dena.com/intl/ ]]
 +
[[Image:Gehirn_sl.png‎‎|180px|link=http://www.gehirn.co.jp/ ]]
 +
[[Image:Mbsd_sl.png‎‎‎|180px|link=http://www.mbsd.jp/english.html ]]
 +
</p>
 +
<h2>Supporters</h2>
 +
<p align=center>
 +
[[Image:Atmark-it sl.png|150px|link=http://www.atmarkit.co.jp/ ]]
 +
[[Image:Codeblue-200x100.png|150px|link=http://codeblue.jp/en-index.html ]]
 +
[[Image:Eyesjapan_sl.png|150px|link=http://nowhere.co.jp/ ]]
 +
[[Image:Kdl_sl.png‎|150px|link=http://www.kdl.co.jp/ ]]
 +
</p>
 +
<p align=center>
 +
[[Image:Health20 sl.png|150px|link=http://health2con.jp/japan/fukushima/ ]]
 +
[[Image:Isc2_sl.png|150px|link=https://www.isc2.org/japan/Default.aspx ]]
 +
[[Image:Jpcert sl.png|150px|link=https://www.jpcert.or.jp/ ]]
 +
[[Image:Nnw_sl.png‎‎|150px|link=http://coin.nikkeibp.co.jp/coin/nikkeinetwork/ ]]
 +
[[Image:Sns_sl_update.png‎|150px|link=http://scan.netsecurity.ne.jp/ ]]
 +
</p>
 +
 +
==Let us Promote AppSec APAC 2014 in Tokyo!==
 +
[[Image:Appsecapac2014logo.jpg |center|400px| link=https://www.owasp.org/index.php/AppSecAsiaPac2014]]
 +
The AppSec APAC logo features a Sumo wrestler representing security and defense whereas the rising sun symbolizes raising awareness of OWASP in Japan. 
 +
Through this we hope to create a more secure internet society not only in Japan but throughout the world.
  
 +
We would truly appreciate your help with promoting the event and definitely want you to be involved as much as possible! 
 +
I look forward to seeing you in Tokyo next March!
  
 +
- Riotaro OKADA,
 +
OWASP Japan chapter
  
<headertabs/>
+
{{Social Media Links}}

Latest revision as of 08:34, 26 March 2014



AppSecAPAC 2014.JPG



日本語サイト Appsec APAC 2014 Japanese site: https://appsecapac.org/2014/

We are pleased to announce that the OWASP Japan chapter will host the OWASP AppSec APAC 2014 conference in Tokyo, Japan at the Sola City Conference Center.

The event will be composed of 2 days of training (March 17-18), followed by 2 days of conference talks (March 19-20). The Global AppSec APAC 2014 Conference will be a reunion of Information Security Asia-Pacific leaders, and will present cutting-edge ideas. OWASP events attract a worldwide audience interested in “what’s next”. The conference is expected to draw 250-300 technologists from Government, Financial Services, Media, Pharmaceuticals, Healthcare, Technology, and many other verticals.

Should you want to REGISTRE FOR A TRAINING SESSION please send an e-mail to laura.grau@owasp.org

Conference Registration is CLOSED

Who Should Attend Global AppSec APAC 2014:

  • Application Developers
  • Application Testers and Quality Assurance
  • Application Project Management and Staff
  • Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff
  • Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance
  • Security Managers and Staff
  • Executives, Managers, and Staff Responsible for IT Security Governance
  • IT Professionals Interested in Improving IT Security


If you have any questions, please email the conference committee: appsec-apac2014@owaspjapan.org

OWASP PodCast 24/7

SPONSORS

Diamond Sponsors

Hp sl.png Scsk sl.png

Platinum Sponsors

Iwi sl.png Sst sl.png Techmatrix sl.png

Gold Sponsors

Arxan sl.png Cigital sl.png Cyberagent sl.png

Iij sl.png Lac sl.png Nec sl.png

Panasonic sl.png Rakuten sl.png Si sl.png Sony-dna sl.png

Silver Sponsors

DeNA sl.png Gehirn sl.png Mbsd sl.png

Supporters

Atmark-it sl.png Codeblue-200x100.png Eyesjapan sl.png Kdl sl.png

Health20 sl.png Isc2 sl.png Jpcert sl.png Nnw sl.png Sns sl update.png

Let us Promote AppSec APAC 2014 in Tokyo!

Appsecapac2014logo.jpg

The AppSec APAC logo features a Sumo wrestler representing security and defense whereas the rising sun symbolizes raising awareness of OWASP in Japan. Through this we hope to create a more secure internet society not only in Japan but throughout the world.

We would truly appreciate your help with promoting the event and definitely want you to be involved as much as possible! I look forward to seeing you in Tokyo next March!

- Riotaro OKADA, OWASP Japan chapter