This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "2018 BASC Agenda"

From OWASP
Jump to: navigation, search
(Creating Under Construction page so I can add link to Eventbrite)
 
(final edit?)
 
(9 intermediate revisions by the same user not shown)
Line 42: Line 42:
 
<br/>
 
<br/>
  
= Under Construction =
+
= Presentations =
  
 +
<!-- lighter blue: #9BA8CF -->
 +
{| style="width:80%" border="0" align="center"
 +
! colspan="3" align="center"  |
 +
<table>
 +
<tr>
 +
<td>
 +
[[File:OWASP Logo.gif]]<br/>
 +
</td>
 +
<td>
 +
<span style="font-size:150%">'''Presentations<br/>OWASP Boston Application Security Conference · Saturday, October 27, 2018'''</span>
 +
</td>
 +
</tr>
 +
</table>
 +
|-
 +
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 8:30-9:30
 +
| colspan="7" style="width:80%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px" align="center" | <span style="font-size:130%">'''Breakfast and Registration'''</span><br/>
 +
provided by our Platinum Sponsor<br/>
 +
<span style="font-size:140%">'''[https://www.blackducksoftware.com/ Black Duck Software]'''</span><br/>
 +
|-
 +
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 09:00-09:50
 +
| colspan="6" style="width:80%; margin:10px; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | <span style="font-size:130%">'''Opening Keynote'''</span><br/>
 +
<span style="font-size: 150%">'''[[2018_BASC_Homepage#Keynotes|Secure By Design]]'''</span><br/>
 +
<span style="font-size:130%">'''[[2018_BASC_Homepage#Keynotes|Chris Wysopal]]'''</span><br/>
 +
<!-- | colspan="1" rowspan="12" style="width:10%; margin:10px; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 1px; border-bottom-width: 1px" align="center" |
 +
<span style="font-size: 150%">'''Capture the Flag<br/>Arena'''</span><br/><br/>
 +
<span style="font-size:130%">'''Vic Solem &amp;<br/>Phil Barrows'''<br/>MEI Security</span><br/>
 +
<br/>DEFENDERS<br/>Jay Peak Room<br/><br/>ATTACKERS<br/>Bretton Woods Room<br/><br/>Command &amp; Control<br/>Cranmore Room -->
 +
|-
 +
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px" | || align="center" style="width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" | '''Washington/Jefferson Room'''
 +
| align="center" style="width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" | '''Adams Room'''
 +
|-
 +
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 10:00-10:50
 +
| style="width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2018_BASC:Presentaton_Agenda_Template|Presentation|Painless Threat Modeling|Andrew Gronosky }}
 +
| style="width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2018_BASC:Presentaton_Agenda_Template|Presentation|From Tears to Tiers; using DAST and Tiering to Make Pentesting Great Again|Joshua Piotrowski &amp; Jessica Boy }}
 +
|-
 +
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 11:00-11:50
 +
| style="width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2018_BASC:Presentaton_Agenda_Template|Presentation|MSeVader: Outsmarting the WAF|Brent Dukes }}
 +
| style="width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2018_BASC:Presentaton_Agenda_Template|Presentation|Website Security – AppSec’s partial solution to a complex problem|Chris Olson }}
 +
|-
 +
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 12:00-1:00 || colspan="2" style="background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" |
 +
<span style="font-size:130%">'''Lunch'''</span><br/>
 +
provided by our Platinum Sponsor<br/>
 +
<span style="font-size:140%">'''[https://www.optiv.com/ Optiv]'''</span><br/>
 +
|-
 +
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 1:00-1:50
 +
| style="width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2018_BASC:Presentaton_Agenda_Template|Presentation|A How Not to Fail Your DevSecOps Transformation|Eitan Worcel }}
 +
| style="width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2018_BASC:Presentaton_Agenda_Template|Presentation|Navigating the Bug Bounty Marketplace|Bryan Brannigan }}
 +
|-
 +
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 2:00-2:50
 +
| style="width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2018_BASC:Presentaton_Agenda_Template|Presentation|API Security Challenges|Angelo Castigliola }}
 +
| style="width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2018_BASC:Presentaton_Agenda_Template|Presentation|Voyages of the Security-Driven Enterprise|Katie Knowles }}
 +
|-
 +
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 3:00-3:50
 +
| style="width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2018_BASC:Presentaton_Agenda_Template|Presentation|Modern Security Architecture with OpenID Connect|Brock Allen  }}
 +
| style="width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2018_BASC:Presentaton_Agenda_Template|Presentation|It depends on....|Tania Ward &amp; Kristen Pascale }}
 +
|-
 +
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 4:00-4:50
 +
| style="width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2018_BASC:Presentaton_Agenda_Template|Presentation|Acquiring and Retaining Cybersecurity Talent: A Proven Model|Deidre Diamond }}
 +
| style="width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2018_BASC:Presentaton_Agenda_Template|Presentation|Introduction to Android Security|Dzung Pham }}
 +
|-
 +
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 5:00-5:30
 +
| colspan="2" style="width:30%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width: 1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" |
 +
<span style="font-size:130%">'''Social Time'''</span><br/>
 +
provided by our Platinum Sponsor<br/>
 +
<span style="font-size:140%">'''[http://veracode.com Veracode]'''</span><br/>
 +
|-
 +
| rowspan="2" style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 1px" align="center" | 5:30-6:30
 +
| colspan="2" style="width:30%; background:#background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | <span style="font-size:130%">'''Closing Keynote'''</span><br/>
 +
<span style="font-size: 150%">'''[[2018_BASC_Homepage#Keynotes|Security at the Intersection of Software, Biology, and Science Fiction]]'''</span><br/>
 +
<span style="font-size:130%">'''[[2018_BASC_Homepage#Keynotes|Chris Poulin]]'''</span>
 +
|-
 +
| colspan="2" style="width:30%; background:#background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 1px" align="center" | <span style="font-size:130%">'''Raffle'''</span><br/>
 +
<span style="font-size:130%">'''Wrap Up'''</span>
 +
<br/>
 +
|}
 +
 +
 +
<!-- lighter blue: #9BA8CF -->
 +
 +
= Workshops =
 +
 +
 +
{| style="width:80%" border="0" align="center"
 +
! colspan="7" align="center"  |
 +
<table>
 +
<tr>
 +
<td>
 +
[[File:OWASP Logo.gif]]<br/>
 +
</td>
 +
<td>
 +
<span style="font-size:150%">'''Workshops<br/>OWASP Boston Application Security Conference · Saturday, October 27, 2018'''</span>
 +
</td>
 +
</tr>
 +
</table>
 +
|-
 +
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" |
 +
| align="center" style="width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" | '''Attitash'''
 +
| align="center" style="width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" | '''Monroe'''
 +
| align="center" style="width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" | '''Cannon'''
 +
| align="center" style="width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" | '''Bretton Woods'''
 +
| align="center" style="width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" | '''Jay Peak'''
 +
| align="center" style="width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" | '''Cranmore'''
 +
|-
 +
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 10:00-10:50
 +
| rowspan="2" style="width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2018_BASC:Resume_Agenda_Template|Session 1 }}
 +
| rowspan="2" style="width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2018_BASC:Workshop_Agenda_Template|Presentation|Advanced XXE Exploitation|Philippe Arteau }}
 +
| rowspan="3" style="width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 
 +
| rowspan="2" style="width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2018_BASC:Workshop_Agenda_Template|Presentation|AppSec Wars Challenge|Steve Allor }}
 +
| rowspan="2" style="width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2018_BASC:Workshop_Agenda_Template|Presentation|Intro to Osquery - A Hands On Lab|Milan Shah }} 
 +
| rowspan="2" style="width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 
 +
|-
 +
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 11:00-11:50
 +
|-
 +
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 12:30-1:00
 +
| rowspan="1" style="width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" |
 +
| rowspan="1" style="width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" |
 +
| rowspan="2" colspan="3" style="width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | <div style="margin:0px;"><span style="font-size: 120%">[[2018_BASC_Workshops#Penetration Testing &amp; Network Defender Training Workshop|Penetration Testing &amp; Network Defender Training Workshop]]</span><br/><span style="font-size: 110%">[[2018_BASC_Speakers#|Phil Barrows, John Hammond &amp; Vik Solem]]</span><br/>Initial briefing in Cranmore. Then Red Team moves to Jay Peak, while Blue Team remains in Cranmore.  Scoring in Bretton Woods.</div>   
 +
|-
 +
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 1:00-1:50
 +
| rowspan="4" style="width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2018_BASC:Resume_Agenda_Template|Session 2 }}
 +
| rowspan="5" style="width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 1px" align="center" | {{2018_BASC:Presentaton_Agenda_Template|Workshop|Threat Modeling Workshop|Robert Hurlbut  }}
 +
| rowspan="3" style="width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2018_BASC:Presentaton_Agenda_Template|Workshop|Application Cartography and Defense|Erik Costlow }}
 +
|-
 +
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 2:00-2:30
 +
| rowspan="1" style="width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" |
 +
| rowspan="1" style="width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" |
 +
| rowspan="1" style="width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" |
 +
|-
 +
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 2:30-2:50
 +
| rowspan="2" colspan="3" style="width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | <div style="margin:0px;"><span style="font-size: 120%">[[2018_BASC_Workshops#Penetration Testing &amp; Network Defender Challenge|Penetration Testing &amp; Network Defender Challenge]]</span><br/><span style="font-size: 110%">[[2018_BASC_Speakers#|Phil Barrows, John Hammond &amp; Vik Solem]]</span><br/>Participants can choose to occupy Jay Peak, Cranmore, or Bretton Woods.  Best Attacker & Best Defender to be announced at close of conference.</div>   
 +
|-
 +
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 3:00-3:50
 +
| rowspan="2" style="width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 
 +
|-
 +
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 1px" align="center" | 4:00-4:50
 +
| style="width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" |
 +
| rowspan="1" style="width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" |
 +
| rowspan="1" style="width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" |
 +
| rowspan="1" style="width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" |
 +
|}
  
  
 
{{2018_BASC:Footer_Template | Agenda}}
 
{{2018_BASC:Footer_Template | Agenda}}

Latest revision as of 00:59, 25 October 2018

Boston-Banner-468x60.gif
Home | Agenda | Code of Conduct | Presentations | Workshops | Speakers | Twitter 32.png


Platinum Sponsors

HackerOne Black Duck Software Optiv Veracode


Gold Sponsors

Checkmarx Dell Qualys nVisium GoSecure

 

Silver Sponsor

TWM

Please help us keep BASC free by viewing and visiting all of our sponsors.




Presentations

OWASP Logo.gif

Presentations
OWASP Boston Application Security Conference · Saturday, October 27, 2018

8:30-9:30 Breakfast and Registration

provided by our Platinum Sponsor
Black Duck Software

09:00-09:50 Opening Keynote

Secure By Design
Chris Wysopal

Washington/Jefferson Room Adams Room
10:00-10:50
11:00-11:50
12:00-1:00

Lunch
provided by our Platinum Sponsor
Optiv

1:00-1:50
2:00-2:50
3:00-3:50
4:00-4:50
5:00-5:30

Social Time
provided by our Platinum Sponsor
Veracode

5:30-6:30 Closing Keynote

Security at the Intersection of Software, Biology, and Science Fiction
Chris Poulin

Raffle

Wrap Up


Workshops

OWASP Logo.gif

Workshops
OWASP Boston Application Security Conference · Saturday, October 27, 2018

Attitash Monroe Cannon Bretton Woods Jay Peak Cranmore
10:00-10:50
11:00-11:50
12:30-1:00
Penetration Testing & Network Defender Training Workshop
Phil Barrows, John Hammond & Vik Solem
Initial briefing in Cranmore. Then Red Team moves to Jay Peak, while Blue Team remains in Cranmore. Scoring in Bretton Woods.
1:00-1:50
2:00-2:30
2:30-2:50
Penetration Testing & Network Defender Challenge
Phil Barrows, John Hammond & Vik Solem
Participants can choose to occupy Jay Peak, Cranmore, or Bretton Woods. Best Attacker & Best Defender to be announced at close of conference.
3:00-3:50
4:00-4:50


You can find out more about this conference at the 2018 BASC Homepage
or by emailing [email protected]
Twitter 32.png