This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "2015 BASC Agenda"
Tom Conner (talk | contribs) |
Tom Conner (talk | contribs) m |
||
(6 intermediate revisions by the same user not shown) | |||
Line 62: | Line 62: | ||
<span style="font-size: 150%">'''[[2015_BASC_Presentations#How I Teach Security|How I Teach Security]]'''</span><br/> | <span style="font-size: 150%">'''[[2015_BASC_Presentations#How I Teach Security|How I Teach Security]]'''</span><br/> | ||
<span style="font-size:130%">'''[[2015_BASC_Speakers#Rob Cheyne|Rob Cheyne]]'''</span><br/> | <span style="font-size:130%">'''[[2015_BASC_Speakers#Rob Cheyne|Rob Cheyne]]'''</span><br/> | ||
− | |||
|- | |- | ||
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" | || align="center" style="width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" | '''Horace Mann Room''' | | style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" | || align="center" style="width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" | '''Horace Mann Room''' | ||
Line 94: | Line 93: | ||
|- | |- | ||
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 15:00-15:50 || style="width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | | | style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 15:00-15:50 || style="width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | | ||
− | {{2015_BASC: | + | {{2015_BASC:Presentaton_Agenda_Template_2|Presentation|Can Buffer Error Attacks Be Stopped?|Satya Gupta|Ray DeMeo }} |
| style="width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | | | style="width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | | ||
{{2015_BASC:Presentaton_Agenda_Template|Presentation|Securing Hadoop Application Ecosystem|Biju Nair }} | {{2015_BASC:Presentaton_Agenda_Template|Presentation|Securing Hadoop Application Ecosystem|Biju Nair }} | ||
Line 113: | Line 112: | ||
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 1px" align="center" | 17:30-18:30 || colspan="2" style="width:30%; background:#background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 1px; border-bottom-width: 1px" align="center" | | | style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 1px" align="center" | 17:30-18:30 || colspan="2" style="width:30%; background:#background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 1px; border-bottom-width: 1px" align="center" | | ||
<br/> | <br/> | ||
− | <span style="font-size:130%">'''Closing'''</span><br/> | + | <span style="font-size:130%">'''Closing Event'''</span><br/> |
<!--<span style="font-size:140%">'''[[2015_BASC_Speakers#Josh Corman|Josh Corman]]'''</span><br/>--> | <!--<span style="font-size:140%">'''[[2015_BASC_Speakers#Josh Corman|Josh Corman]]'''</span><br/>--> | ||
+ | <span style="font-size: 110%">Paul Roberts</span><br/> | ||
<br/> | <br/> | ||
<span style="font-size:130%">'''Raffle'''</span><br/> | <span style="font-size:130%">'''Raffle'''</span><br/> | ||
Line 120: | Line 120: | ||
<br/> | <br/> | ||
|} | |} | ||
+ | |||
+ | |||
+ | <center> | ||
+ | <table style="border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-width:1px"><tr><td> </td><td style="background:#FFFBDF; font-size:140%"> | ||
+ | <center> | ||
+ | '''Additional Sessions in the Crispus Attucks room''' | ||
+ | |||
+ | [[2015 BASC InfoSec Communication Workshop|InfoSec Communication Workshop]] - Rob Cheyne | ||
+ | |||
+ | [[2015 BASC Resume Room|Resume Room]] - Roy Wattanasin and Jennifer Stitt | ||
+ | </center> | ||
+ | </td><td> </td></tr></table></center> | ||
+ | |||
{{2015_BASC:Footer_Template | Agenda}} | {{2015_BASC:Footer_Template | Agenda}} |
Latest revision as of 16:06, 2 October 2015
2015 BASC: Home | Agenda | Presentations | Speakers
Sponsorships are available: See Sponsorship Kit
Please help us keep BASC free by viewing and visiting all of our sponsors.
| ||||
---|---|---|---|---|
8:30-9:30 |
Breakfast and Registration | |||
09:00-09:50 |
Keynote | |||
Horace Mann Room | Deborah Sampson / Paul Thomas Room | |||
10:00-10:50 | ||||
11:00-11:50 | ||||
12:00-13:00 |
Lunch | |||
13:00-13:50 | ||||
14:00-14:50 | ||||
15:00-15:50 | ||||
16:00-16:50 | ||||
17:00-17:30 |
Social Time | |||
17:30-18:30 |
|
Additional Sessions in the Crispus Attucks room InfoSec Communication Workshop - Rob Cheyne Resume Room - Roy Wattanasin and Jennifer Stitt |