This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "OWASP & WASC AppSec 2008 Conference"

From OWASP
Jump to: navigation, search
 
(14 intermediate revisions by the same user not shown)
Line 1: Line 1:
 
= OWASP NYC AppSec 2008 Conference October 7th - 10th 2008 =
 
= OWASP NYC AppSec 2008 Conference October 7th - 10th 2008 =
  
* Call for papers [[CFPFAQ | READ FAQ ]], trainers and sponsors is now offically open. All submissions needs to be sent to tomb(at)owasp.org any questions, call 973-202-0122
+
The 2008 event event will be hosted by [http://www.pace.edu/page.cfm?doc_id=16157 PACE UNIVERSITY] at One Pace Plaza
 
+
New York, NY 10038 however we are limited to 1000 attendees
 +
<center>TICKETS GO ON SALE Monday JUNE 2nd 2008</center>
 +
<br>
 +
<center><b>[[CFPFAQ | CALL FOR SPEAKERS, TRAINERS and SPONSORS ]]</b>, IS OFFICALLY OPEN!!!! </center>
 
<hr>
 
<hr>
 
<h1>Tuesday - October 7th</h1>
 
<h1>Tuesday - October 7th</h1>
 
<table border=1 width=950>
 
<table border=1 width=950>
     <tr> <th width=50> Time </th> <th width=300> Build it! </th> <th width=300> Break it!</th> <th width=300> Bring it on!</th></tr>
+
     <tr> <th width=50> Time </th> <th width=300> Code it! </th> <th width=300> Break it!</th> <th width=300> Secure it!</th></tr>
<tr><th>930</th><th colspan=3>Registration Opens     </th></tr>
+
<tr><th>0800</th><th colspan=3>Registration Opens & TechExpo    </th></tr>
<tr><th>945</th><th colspan=3>AppSec 2008 Kick Off: Jeff Willams, Dave Wichers, Tom Brennan, Dinis Cruz &  Sebastien Deleersnyder - OWASP Foundation Board Members      </th></tr>
+
<tr><th>0930</th><th colspan=3> Keynote: OWASP Foundation   </th></tr>
  
<tr><th>1000</th><td>Active 802.11 Fingerprinting: Gibberish and "Secret Handshakes" to Know Your AP<br><i>Sergey Bratus, Cory Cornelius and  Daniel Peebles</i></td>
+
<tr><th>1000</th><td>TOPIC<br><i>SPEAKERS</i></td>
<td>Virtual Worlds - Real Exploits<br><i>Charlie Miller and Dino Dai Zovi</i></td>
+
<td>TOPICS<br><i>SPEAKERS</i></td>
<td>Climbing EVEREST - An Inside Look at Voting Systems Used in the US<br><i>Sandy Clark, Eric Cronin, Gaurav Shah and Matt Blaze</i></td></tr>
+
<td>TOPICS<br><i>SPEAKERS</i></td></tr>
  
<tr><th>1100</th><td>SIPing Your Network<br><I>Radu State, Humberto Abdelnur, and Olivier Festor</i></td>
+
<tr><th>1100</th><td>TOPIC<br><I>SPEAKERS</i></td>
<td>Smarter Password Cracking<br><i>Matt Weir</i></td>
+
<td>TOPIC<br><i>SPEAKERS</i></td>
<td>Forced Internet Condom<br><i>Aaron Higbee and Jaime Fuentes</i></td></tr>
+
<td>TOPIC<br><i>SPEAKERS</i></td></tr>
  
<tr><th>1200</th><td>They're Hacking Our Clients! Why are We Focusing Only on the Servers<br><i>Jay Beale</i></td>
+
<tr><th>1200</th><td>TOPIC<br><i>SPEAKERS</i></td>
<td>21st Century Shellcode for Solaris<br><i>Tim Vidas</i></td>
+
<td>TOPIC<br><i>SPEAKERS</i></td>
<td>A Hacker Looks Past 50<br><i>G. Mark Hardy</i></td></tr>
+
<td>TOPIC<br><i>SPEAKERS</i></td></tr>
  
<tr><th>1300</th><th colspan=3>Lunch      </th></tr>
+
<tr><th>1300</th><th colspan=3>TECH-EXPO LUNCH </th></tr>
  
<tr><th>1400</th><td>Passive Host Characterization<br><i> Matthew Wollenweber</i></td>
+
<tr><th>1400</th><td>TOPIC<br><i>SPEAKERS</i></td>
<td>Why are Databases so Hard to Secure<br><i>Sheeri Cabral</i></td>
+
<td>TOPIC<br><i>SPEAKERS</i></td>
<td>TL1 Device Security<br><i>Rachel Bicknell</i></td></tr>
+
<td>TOPIC<br><i>SPEAKERS</i></td></tr>
  
<tr><th>1500</th><td>Practical Hacker Crypto<br><i>Simple Nomad</i></td>
+
<tr><th>1500</th><td>TOPIC<br><i>SPEAKERS</i></td>
<td>VoIP Penetration Testing: Lessons Learned<br><i>John Kindervag and Jason Ostrom</i></td>
+
<td>TOPIC<br><i>SPEAKERS</i></td>
<td>I Will Be Your Eyes and Hands: Colossal Cave, Adventure and Reality<br><i>Jason Scott</i></td></tr>
+
<td>TOPIC<br><i>SPEAKERS</i></td></tr>
  
<tr><th>1600</th><td>Using Aspect Oriented Programming to Prevent Application Attacks<br><i>Rohit Sethi and Nish Bhalla</i></td>
+
<tr><th>1600</th><td>TOPICS<br><i>SPEAKERS</i></td>
<td>Got Citrix?  Hack It!<br><i>Shanit Gupta</i></td>
+
<td>TOPICS<br><i>SPEAKERS</i></td>
<td>You Must Be This Tall to Ride the Security Ride<br><i>Joel Wilbanks and Pete Caro</i></td></tr>
+
<td>TOPICS<br><i>SPEAKER</i></td></tr>
  
<tr><th>1700</th><td>Flash Drives & Solid State Drives Data Recovery Comparison to Hard Drives: Animated<br><i>Scott Moulton</i></td>
+
<tr><th>1700</th><td>TOPIC<br><i>SPEAKERS</i></td>
<td>Advanced Protocol Fuzzing - What We Learned when Bringing Layer2 Logic to "SPIKE Land"<br><i>Enno Rey and Daniel Mende</i></td>
+
<td>TOPIC<br><i>SPEAKERS</i></td>
<td>Legal Issues for Bot-net Researchers and Mitigators<br><i>Alexander Muentz</i></td></tr>
+
<td>TOPIC<br><i>SPEAKERS</i></td></tr>
<tr><th>1830</th><th colspan=3>Hack or Halo        </th></tr>
+
<tr><th>1830</th><th colspan=3>Web Application Capture the Flag  </th></tr>
<tr><th>2100</th><th colspan=3>Saturday Night Party @ TBD      </th></tr>
+
<tr><th>2100</th><th colspan=3>Tuesday Night Event @ TBD      </th></tr>
 
</table>
 
</table>
 
<br>
 
<br>
  
<h1> Wednesday - October 8th</h1>
+
<h1>Wednesday - October 8th</h1>
 
 
 
<table border=1 width=950>
 
<table border=1 width=950>
     <tr> <th width=50> Time </th> <th width=300> Build it! </th> <th width=300> Break it!</th> <th width=300> Bring it on!</th></tr>
+
     <tr> <th width=50> Time </th> <th width=300> Code it! </th> <th width=300> Break it!</th> <th width=300> Secure it!</th></tr>
<tr><th>0930</th><th colspan=3>Registration Opens     </th></tr>
+
<tr><th>0800</th><th colspan=3>Registration Opens & TechExpo    </th></tr>
<tr><th>0945</th><th colspan=3>Administrivia      </th></tr>
+
<tr><th>0930</th><th colspan=3> Keynote: Industry Keynote    </th></tr>
  
<tr><th>1000</th><td>Hacking Windows Vista Security<br><i>Dan Griffin </i></td>
+
<tr><th>1000</th><td>TOPIC<br><i>SPEAKERS</i></td>
<td>Malware Software Armoring Circumvention<br><i>Danny Quist</i></td>
+
<td>TOPICS<br><i>SPEAKERS</i></td>
<td>When Lawyers Attack! Dealing with the New Rules of Electronic Discovery<br><i>John Benson, Esq.<i></td></tr>
+
<td>TOPICS<br><i>SPEAKERS</i></td></tr>
  
<tr><th>1100</th><td>Vulncatcher:  Fun with Vtrace and Programmatic Debugging<br><i>atlas</i></td>
+
<tr><th>1100</th><td>TOPIC<br><I>SPEAKERS</i></td>
<td>0wn the Con<br><i>The Shmoo Group</i></td>
+
<td>TOPIC<br><i>SPEAKERS</i></td>
<td>The Geek and the Gumshoe or Can Mathematics and Computers Really Solve Crimes?<br><i>Michael Schearer and Frank Thornton</i></td></tr>
+
<td>TOPIC<br><i>SPEAKERS</i></td></tr>
  
<tr><th>1200</th><td>Path X:  Explosive Security Testing Tools using XPath<br><i>Andre Gironda, Marcin Wielgoszewski and Tom Stracener</i></td>
+
<tr><th>1200</th><td>TOPIC<br><i>SPEAKERS</i></td>
<td>PEAP: Pwned Extensible Authentication Protocol<br><i>Josh Wright and Brad Antoniewicz</i></td>
+
<td>TOPIC<br><i>SPEAKERS</i></td>
<td>How do I Pwn Thee? Let Me Count the Ways<br><i>RenderMan</i></td></tr>
+
<td>TOPIC<br><i>SPEAKERS</i></td></tr>
<tr><th>1300</th><th colspan=3>Room Split      </th></tr>
 
<tr><th>1330</th><th colspan=3>Something Really Cool </th></tr>
 
<tr><th>1430</th><th colspan=3>Closing Remarks      </th></tr>
 
  
</table>
+
<tr><th>1300</th><th colspan=3>TECH-EXPO LUNCH</th></tr>
  
<hr>
+
<tr><th>1400</th><td>TOPIC<br><i>SPEAKERS</i></td>
 +
<td>TOPIC<br><i>SPEAKERS</i></td>
 +
<td>TOPIC<br><i>SPEAKERS</i></td></tr>
  
 +
<tr><th>1500</th><td>TOPIC<br><i>SPEAKERS</i></td>
 +
<td>TOPIC<br><i>SPEAKERS</i></td>
 +
<td>TOPIC<br><i>SPEAKERS</i></td></tr>
  
 +
<tr><th>1600</th><td>TOPICS<br><i>SPEAKERS</i></td>
 +
<td>TOPICS<br><i>SPEAKERS</i></td>
 +
<td>TOPICS<br><i>SPEAKER</i></td></tr>
  
 +
<tr><th>1700</th><td>TOPIC<br><i>SPEAKERS</i></td>
 +
<td>TOPIC<br><i>SPEAKERS</i></td>
 +
<td>TOPIC<br><i>SPEAKERS</i></td></tr>
 +
<tr><th>1830</th><th colspan=3> TBD        </th></tr>
 +
<tr><th>2100</th><th colspan=3> TBD      </th></tr>
 +
</table>
  
== Seminars - Track 1 / Track 2 / Track 3 ==
+
<hr>
 
 
{| style="width:80%" border="0" align="center"
 
! colspan="3" align="center" style="background:#4058A0; color:white" | Day 1 - October 7, 2008
 
|-
 
| style="width:10%; background:#7B8ABD" | || style="width:40%; background:#BC857A" | Track 1:
 
| style="width:40%; background:#BCA57A" | Track 2:
 
|-
 
| style="width:10%; background:#7B8ABD" | 08:00-09:00 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Registration and Coffee
 
|-
 
| style="width:10%; background:#7B8ABD" | 09:00-09:15 || colspan="2" style="width:80%; background:#F2F2F2" align="left" | OWASP AppSec 2008 Kick Off: Jeff Willams, Dave Wichers, Tom Brennan, Dinis Cruz &  Sebastien Deleersnyder - OWASP Foundation Board Members
 
|-
 
| style="width:10%; background:#7B8ABD" | 09:10-10:00 || colspan="2" style="width:80%; background:#F2F2F2" align="left" | Keynote: Special Guest
 
|-
 
| style="width:10%; background:#7B8ABD" | 10:00-10:45 || colspan="2" style="width:80%; background:#F2F2F2" align="left" | Panel: Industry Roundtable
 
Moderator: Tom Brennan
 
 
 
Panelists: Jennifer Bayuk, CISO, Bear Stearns, Warren Axelrod, SVP, Bank of America, Jim Routh, CISO, DTCC
 
|-
 
| style="width:10%; background:#7B8ABD" | 11:00-11:45 || colspan="2" style="width:80%; background:#F2F2F2" align="left" | Speaker2
 
|-
 
| style="width:10%; background:#7B8ABD" | 12:00-12:45 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Speaker3
 
|-
 
| style="width:10%; background:#7B8ABD" | 13:00-14:00 || style="width:40%; background:#BC857A" align="left" | Topic: [http://w3af.sourceforge.net W3AF] is a Web application attack and Audit Framework
 
Speaker: Andres Riancho a student at UBA and an information security geek that lives in Argentina. He has contributed to other Open Source projects and esporadically writes for SecureArg an information security site co-founded by him
 
| style="width:40%; background:#BCA57A" align="left" | Speaker5
 
|-
 
| style="width:10%; background:#7B8ABD" | 12:45-13:45 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Speaker6
 
|-
 
| style="width:10%; background:#7B8ABD" | 13:45-14:30 || style="width:40%; background:#BC857A" align="left" | Speaker7
 
| style="width:40%; background:#BCA57A" align="left" | Topic: Hacking Intranets Through Web Interfaces
 
Speaker:[http://www.sectheory.com/bio.htm Robert "RSNAKE" Hansen]
 
|-
 
| style="width:10%; background:#7B8ABD" | 14:30-15:10 || style="width:40%; background:#BC857A" align="left" | Speaker9
 
| style="width:40%; background:#BCA57A" align="left" | Speaker10
 
|-
 
| style="width:10%; background:#7B8ABD" | 15:10-15:30 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Break
 
|-
 
| style="width:10%; background:#7B8ABD" | 15:30-16:40 || style="width:40%; background:#BC857A" align="left" | Speaker11
 
| style="width:40%; background:#BCA57A" align="left" | Speaker12
 
|-
 
| style="width:10%; background:#7B8ABD" | 16:40-17:00 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Break
 
|-
 
| style="width:10%; background:#7B8ABD" | 17:00-18:00 || colspan="2" style="width:40%; background:#F2F2F2" align="left" | Panel: Security Roundtable
 
Moderator: TBD
 
 
 
Panelists: Chris Stangle, FBI Cybercrimes, TBD, TBD, TBD, TBD,
 
|-
 
| style="width:10%; background:#7B8ABD" | 18:00-19:00 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | OWASP Worldwide Chapter Leader Meeting
 
|-
 
| style="width:10%; background:#7B8ABD" | 19:00-21:00 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | OWASP Social Gathering: Dinner and Drinks
 
|-
 
! colspan="3" align="center" style="background:#4058A0; color:white" | Day 2 - October 8th, 2008
 
|-
 
| style="width:10%; background:#7B8ABD" | || style="width:40%; background:#BC857A" | Track 1:
 
| style="width:40%; background:#BCA57A" | Track 2:
 
|-
 
| style="width:10%; background:#7B8ABD" | 08:00-09:00 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Coffee
 
|-
 
| style="width:10%; background:#7B8ABD" | 09:00-9:50 || colspan="2" style="width:80%; background:#F2F2F2" align="left" | Keynote:  tbd
 
|-
 
| style="width:10%; background:#7B8ABD" | 9:50-10:30 || colspan="2" style="width:80%; background:#F2F2F2" align="left" | tbd
 
|-
 
| style="width:10%; background:#7B8ABD" | 10:30-10:50 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Break
 
|-
 
| style="width:10%; background:#7B8ABD" | 10:50-11:30 || style="width:40%; background:#BC857A" align="left" | tbd
 
| style="width:40%; background:#BCA57A" align="left" | tbd
 
|-
 
| style="width:10%; background:#7B8ABD" | 11:30-12:30 || style="width:40%; background:#BC857A" align="left" | tbd
 
| style="width:40%; background:#BCA57A" align="left" | tbd
 
|-
 
| style="width:10%; background:#7B8ABD" | 12:30-13:45 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Lunch
 
|-
 
| style="width:10%; background:#7B8ABD" | 13:45-14:30 || style="width:40%; background:#BC857A" align="left" | tbd
 
| style="width:40%; background:#BCA57A" align="left" | tbd
 
|-
 
| style="width:10%; background:#7B8ABD" | 14:30-15:20 || style="width:40%; background:#BC857A" align="left" | tbd
 
| style="width:40%; background:#BCA57A" align="left" | tbd
 
|-
 
| style="width:10%; background:#7B8ABD" | 15:20-15:40 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Break
 
|-
 
| style="width:10%; background:#7B8ABD" | 15:40-16:30 || style="width:40%; background:#BC857A" align="left" | tbd
 
| style="width:40%; background:#BCA57A" align="left" | tbd
 
|-
 
| style="width:10%; background:#7B8ABD" | 16:30-17:30 || style="width:40%; background:#F2F2F2" align="left" | Panel: Responsible "tbd"
 
Moderator: tbd
 
  
Panelists: tbd
 
| style="width:40%; background:#F2F2F2" align="left" | Panel: "tbd"
 
Moderator: tbd
 
 
Panelists: tbd
 
|-
 
| style="width:10%; background:#7B8ABD" | 17:30-17:45 || colspan="2" style="width:40%; background:#F2F2F2" align="left" | Conference Wrap Up
 
|-
 
| style="width:10%; background:#7B8ABD" | 18:30-20:30 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Cocktail Party (tbd?)
 
|}
 
 
Track 3:
 
 
{| style="width:80%" border="0" align="center"
 
! colspan="3" align="center" style="background:#4058A0; color:white" | Day 1 - May 22, 2008
 
|-
 
| style="width:10%; background:#7B8ABD" | || style="width:80%; background:#BC857A" | Track 3:
 
|-
 
| style="width:10%; background:#7B8ABD" | 11:10-11:30 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Break
 
|-
 
| style="width:10%; background:#7B8ABD" | 11:30-12:30 || style="width:80%; background:#BC857A" align="left" | tbd
 
|-
 
| style="width:10%; background:#7B8ABD" | 12:30-13:45 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Lunch
 
|-
 
| style="width:10%; background:#7B8ABD" | 13:45-14:30 || style="width:80%; background:#BC857A" align="left" | tbd
 
|-
 
| style="width:10%; background:#7B8ABD" | 14:30-15:10 || style="width:80%; background:#BC857A" align="left" | tbd
 
|-
 
| style="width:10%; background:#7B8ABD" | 15:10-15:30 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Break
 
|-
 
| style="width:10%; background:#7B8ABD" | 15:30-16:40 || style="width:80%; background:#BC857A" align="left" | tbd
 
|}
 
{| style="width:80%" border="0" align="center"
 
! colspan="3" align="center" style="background:#4058A0; color:white" | Day 2 - May 23, 2008
 
|-
 
| style="width:10%; background:#7B8ABD" | || style="width:80%; background:#BC857A" | Track 3:
 
|-
 
| style="width:10%; background:#7B8ABD" | 11:10-11:30 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Break
 
|-
 
| style="width:10%; background:#7B8ABD" | 11:30-12:30 || style="width:80%; background:#BC857A" align="left" | tbd
 
|-
 
| style="width:10%; background:#7B8ABD" | 12:30-13:45 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Lunch
 
|-
 
| style="width:10%; background:#7B8ABD" | 13:45-14:30 || style="width:80%; background:#BC857A" align="left" | tbd
 
|-
 
| style="width:10%; background:#7B8ABD" | 14:30-15:10 || style="width:80%; background:#BC857A" align="left" | tbd
 
|-
 
| style="width:10%; background:#7B8ABD" | 15:10-15:30 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Break
 
|-
 
| style="width:10%; background:#7B8ABD" | 15:30-16:40 || style="width:80%; background:#BC857A" align="left" | tbd
 
|}
 
  
 
== Technology Expo - October 7th - 8th  ==
 
== Technology Expo - October 7th - 8th  ==
Line 216: Line 93:
 
Want to see the latest offerings from best of breed technology firms?  For 2 days, Product/Service vendors worldwide will demonstrate their ability to conference attendees.
 
Want to see the latest offerings from best of breed technology firms?  For 2 days, Product/Service vendors worldwide will demonstrate their ability to conference attendees.
  
To be a vendor at this event please contact Tom Brennan at tomb (at) owasp.org or 973-202-0122
+
<center><b>[[CFPFAQ | CALL FOR SPEAKERS, TRAINERS and SPONSORS ]]</b>, IS OFFICALLY OPEN!!!! </center>
  
  
Line 243: Line 120:
 
|}
 
|}
  
To be a trainer at this event please contact Tom Brennan at tomb (at) owasp.org or 973-202-0122
+
<center><b>[[CFPFAQ | CALL FOR SPEAKERS, TRAINERS and SPONSORS ]]</b>, IS OFFICALLY OPEN!!!! </center>

Latest revision as of 03:05, 1 February 2008

OWASP NYC AppSec 2008 Conference October 7th - 10th 2008

The 2008 event event will be hosted by PACE UNIVERSITY at One Pace Plaza New York, NY 10038 however we are limited to 1000 attendees

TICKETS GO ON SALE Monday JUNE 2nd 2008


CALL FOR SPEAKERS, TRAINERS and SPONSORS , IS OFFICALLY OPEN!!!!

Tuesday - October 7th

Time Code it! Break it! Secure it!
0800Registration Opens & TechExpo
0930 Keynote: OWASP Foundation
1000TOPIC
SPEAKERS
TOPICS
SPEAKERS
TOPICS
SPEAKERS
1100TOPIC
SPEAKERS
TOPIC
SPEAKERS
TOPIC
SPEAKERS
1200TOPIC
SPEAKERS
TOPIC
SPEAKERS
TOPIC
SPEAKERS
1300TECH-EXPO LUNCH
1400TOPIC
SPEAKERS
TOPIC
SPEAKERS
TOPIC
SPEAKERS
1500TOPIC
SPEAKERS
TOPIC
SPEAKERS
TOPIC
SPEAKERS
1600TOPICS
SPEAKERS
TOPICS
SPEAKERS
TOPICS
SPEAKER
1700TOPIC
SPEAKERS
TOPIC
SPEAKERS
TOPIC
SPEAKERS
1830Web Application Capture the Flag
2100Tuesday Night Event @ TBD


Wednesday - October 8th

Time Code it! Break it! Secure it!
0800Registration Opens & TechExpo
0930 Keynote: Industry Keynote
1000TOPIC
SPEAKERS
TOPICS
SPEAKERS
TOPICS
SPEAKERS
1100TOPIC
SPEAKERS
TOPIC
SPEAKERS
TOPIC
SPEAKERS
1200TOPIC
SPEAKERS
TOPIC
SPEAKERS
TOPIC
SPEAKERS
1300TECH-EXPO LUNCH
1400TOPIC
SPEAKERS
TOPIC
SPEAKERS
TOPIC
SPEAKERS
1500TOPIC
SPEAKERS
TOPIC
SPEAKERS
TOPIC
SPEAKERS
1600TOPICS
SPEAKERS
TOPICS
SPEAKERS
TOPICS
SPEAKER
1700TOPIC
SPEAKERS
TOPIC
SPEAKERS
TOPIC
SPEAKERS
1830 TBD
2100 TBD


Technology Expo - October 7th - 8th

Want to see the latest offerings from best of breed technology firms? For 2 days, Product/Service vendors worldwide will demonstrate their ability to conference attendees.

CALL FOR SPEAKERS, TRAINERS and SPONSORS , IS OFFICALLY OPEN!!!!


OWASP AppSec 2008 Training Courses - October 9th and 10th 2008

T1. Building and Testing Secure Web Applications
This powerful two-day course focuses on the most common web application security problems, including the OWASP Top Ten. The course will introduce and demonstrate hacking techniques, illustrating how easily application vulnerabilities can be exploited so students really understand how to avoid introducing such vulnerabilities into their code.
T2. Application Security Forensics
How would you respond to a application security hack? This coure will provide insight into the world or forensics with a focus on Web Application Security
T3. TBD
tbd Read more here!
T4. TBD
tbd Read more here!
T5. TBD
TBD
CALL FOR SPEAKERS, TRAINERS and SPONSORS , IS OFFICALLY OPEN!!!!