|
|
| (14 intermediate revisions by the same user not shown) |
| Line 1: |
Line 1: |
| | = OWASP NYC AppSec 2008 Conference October 7th - 10th 2008 = | | = OWASP NYC AppSec 2008 Conference October 7th - 10th 2008 = |
| | | | |
| − | * Call for papers [[CFPFAQ | READ FAQ ]], trainers and sponsors is now offically open. All submissions needs to be sent to tomb(at)owasp.org any questions, call 973-202-0122
| + | The 2008 event event will be hosted by [http://www.pace.edu/page.cfm?doc_id=16157 PACE UNIVERSITY] at One Pace Plaza |
| − | | + | New York, NY 10038 however we are limited to 1000 attendees |
| | + | <center>TICKETS GO ON SALE Monday JUNE 2nd 2008</center> |
| | + | <br> |
| | + | <center><b>[[CFPFAQ | CALL FOR SPEAKERS, TRAINERS and SPONSORS ]]</b>, IS OFFICALLY OPEN!!!! </center> |
| | <hr> | | <hr> |
| | <h1>Tuesday - October 7th</h1> | | <h1>Tuesday - October 7th</h1> |
| | <table border=1 width=950> | | <table border=1 width=950> |
| − | <tr> <th width=50> Time </th> <th width=300> Build it! </th> <th width=300> Break it!</th> <th width=300> Bring it on!</th></tr> | + | <tr> <th width=50> Time </th> <th width=300> Code it! </th> <th width=300> Break it!</th> <th width=300> Secure it!</th></tr> |
| − | <tr><th>930</th><th colspan=3>Registration Opens </th></tr> | + | <tr><th>0800</th><th colspan=3>Registration Opens & TechExpo </th></tr> |
| − | <tr><th>945</th><th colspan=3>AppSec 2008 Kick Off: Jeff Willams, Dave Wichers, Tom Brennan, Dinis Cruz & Sebastien Deleersnyder - OWASP Foundation Board Members </th></tr> | + | <tr><th>0930</th><th colspan=3> Keynote: OWASP Foundation </th></tr> |
| | | | |
| − | <tr><th>1000</th><td>Active 802.11 Fingerprinting: Gibberish and "Secret Handshakes" to Know Your AP<br><i>Sergey Bratus, Cory Cornelius and Daniel Peebles</i></td> | + | <tr><th>1000</th><td>TOPIC<br><i>SPEAKERS</i></td> |
| − | <td>Virtual Worlds - Real Exploits<br><i>Charlie Miller and Dino Dai Zovi</i></td> | + | <td>TOPICS<br><i>SPEAKERS</i></td> |
| − | <td>Climbing EVEREST - An Inside Look at Voting Systems Used in the US<br><i>Sandy Clark, Eric Cronin, Gaurav Shah and Matt Blaze</i></td></tr> | + | <td>TOPICS<br><i>SPEAKERS</i></td></tr> |
| | | | |
| − | <tr><th>1100</th><td>SIPing Your Network<br><I>Radu State, Humberto Abdelnur, and Olivier Festor</i></td> | + | <tr><th>1100</th><td>TOPIC<br><I>SPEAKERS</i></td> |
| − | <td>Smarter Password Cracking<br><i>Matt Weir</i></td> | + | <td>TOPIC<br><i>SPEAKERS</i></td> |
| − | <td>Forced Internet Condom<br><i>Aaron Higbee and Jaime Fuentes</i></td></tr> | + | <td>TOPIC<br><i>SPEAKERS</i></td></tr> |
| | | | |
| − | <tr><th>1200</th><td>They're Hacking Our Clients! Why are We Focusing Only on the Servers<br><i>Jay Beale</i></td> | + | <tr><th>1200</th><td>TOPIC<br><i>SPEAKERS</i></td> |
| − | <td>21st Century Shellcode for Solaris<br><i>Tim Vidas</i></td> | + | <td>TOPIC<br><i>SPEAKERS</i></td> |
| − | <td>A Hacker Looks Past 50<br><i>G. Mark Hardy</i></td></tr> | + | <td>TOPIC<br><i>SPEAKERS</i></td></tr> |
| | | | |
| − | <tr><th>1300</th><th colspan=3>Lunch </th></tr> | + | <tr><th>1300</th><th colspan=3>TECH-EXPO LUNCH </th></tr> |
| | | | |
| − | <tr><th>1400</th><td>Passive Host Characterization<br><i> Matthew Wollenweber</i></td> | + | <tr><th>1400</th><td>TOPIC<br><i>SPEAKERS</i></td> |
| − | <td>Why are Databases so Hard to Secure<br><i>Sheeri Cabral</i></td> | + | <td>TOPIC<br><i>SPEAKERS</i></td> |
| − | <td>TL1 Device Security<br><i>Rachel Bicknell</i></td></tr> | + | <td>TOPIC<br><i>SPEAKERS</i></td></tr> |
| | | | |
| − | <tr><th>1500</th><td>Practical Hacker Crypto<br><i>Simple Nomad</i></td> | + | <tr><th>1500</th><td>TOPIC<br><i>SPEAKERS</i></td> |
| − | <td>VoIP Penetration Testing: Lessons Learned<br><i>John Kindervag and Jason Ostrom</i></td> | + | <td>TOPIC<br><i>SPEAKERS</i></td> |
| − | <td>I Will Be Your Eyes and Hands: Colossal Cave, Adventure and Reality<br><i>Jason Scott</i></td></tr> | + | <td>TOPIC<br><i>SPEAKERS</i></td></tr> |
| | | | |
| − | <tr><th>1600</th><td>Using Aspect Oriented Programming to Prevent Application Attacks<br><i>Rohit Sethi and Nish Bhalla</i></td> | + | <tr><th>1600</th><td>TOPICS<br><i>SPEAKERS</i></td> |
| − | <td>Got Citrix? Hack It!<br><i>Shanit Gupta</i></td> | + | <td>TOPICS<br><i>SPEAKERS</i></td> |
| − | <td>You Must Be This Tall to Ride the Security Ride<br><i>Joel Wilbanks and Pete Caro</i></td></tr> | + | <td>TOPICS<br><i>SPEAKER</i></td></tr> |
| | | | |
| − | <tr><th>1700</th><td>Flash Drives & Solid State Drives Data Recovery Comparison to Hard Drives: Animated<br><i>Scott Moulton</i></td> | + | <tr><th>1700</th><td>TOPIC<br><i>SPEAKERS</i></td> |
| − | <td>Advanced Protocol Fuzzing - What We Learned when Bringing Layer2 Logic to "SPIKE Land"<br><i>Enno Rey and Daniel Mende</i></td> | + | <td>TOPIC<br><i>SPEAKERS</i></td> |
| − | <td>Legal Issues for Bot-net Researchers and Mitigators<br><i>Alexander Muentz</i></td></tr> | + | <td>TOPIC<br><i>SPEAKERS</i></td></tr> |
| − | <tr><th>1830</th><th colspan=3>Hack or Halo </th></tr> | + | <tr><th>1830</th><th colspan=3>Web Application Capture the Flag </th></tr> |
| − | <tr><th>2100</th><th colspan=3>Saturday Night Party @ TBD </th></tr> | + | <tr><th>2100</th><th colspan=3>Tuesday Night Event @ TBD </th></tr> |
| | </table> | | </table> |
| | <br> | | <br> |
| | | | |
| − | <h1> Wednesday - October 8th</h1> | + | <h1>Wednesday - October 8th</h1> |
| − | | |
| | <table border=1 width=950> | | <table border=1 width=950> |
| − | <tr> <th width=50> Time </th> <th width=300> Build it! </th> <th width=300> Break it!</th> <th width=300> Bring it on!</th></tr> | + | <tr> <th width=50> Time </th> <th width=300> Code it! </th> <th width=300> Break it!</th> <th width=300> Secure it!</th></tr> |
| − | <tr><th>0930</th><th colspan=3>Registration Opens </th></tr> | + | <tr><th>0800</th><th colspan=3>Registration Opens & TechExpo </th></tr> |
| − | <tr><th>0945</th><th colspan=3>Administrivia </th></tr> | + | <tr><th>0930</th><th colspan=3> Keynote: Industry Keynote </th></tr> |
| | | | |
| − | <tr><th>1000</th><td>Hacking Windows Vista Security<br><i>Dan Griffin </i></td> | + | <tr><th>1000</th><td>TOPIC<br><i>SPEAKERS</i></td> |
| − | <td>Malware Software Armoring Circumvention<br><i>Danny Quist</i></td> | + | <td>TOPICS<br><i>SPEAKERS</i></td> |
| − | <td>When Lawyers Attack! Dealing with the New Rules of Electronic Discovery<br><i>John Benson, Esq.<i></td></tr> | + | <td>TOPICS<br><i>SPEAKERS</i></td></tr> |
| | | | |
| − | <tr><th>1100</th><td>Vulncatcher: Fun with Vtrace and Programmatic Debugging<br><i>atlas</i></td> | + | <tr><th>1100</th><td>TOPIC<br><I>SPEAKERS</i></td> |
| − | <td>0wn the Con<br><i>The Shmoo Group</i></td> | + | <td>TOPIC<br><i>SPEAKERS</i></td> |
| − | <td>The Geek and the Gumshoe or Can Mathematics and Computers Really Solve Crimes?<br><i>Michael Schearer and Frank Thornton</i></td></tr> | + | <td>TOPIC<br><i>SPEAKERS</i></td></tr> |
| | | | |
| − | <tr><th>1200</th><td>Path X: Explosive Security Testing Tools using XPath<br><i>Andre Gironda, Marcin Wielgoszewski and Tom Stracener</i></td> | + | <tr><th>1200</th><td>TOPIC<br><i>SPEAKERS</i></td> |
| − | <td>PEAP: Pwned Extensible Authentication Protocol<br><i>Josh Wright and Brad Antoniewicz</i></td> | + | <td>TOPIC<br><i>SPEAKERS</i></td> |
| − | <td>How do I Pwn Thee? Let Me Count the Ways<br><i>RenderMan</i></td></tr> | + | <td>TOPIC<br><i>SPEAKERS</i></td></tr> |
| − | <tr><th>1300</th><th colspan=3>Room Split </th></tr>
| |
| − | <tr><th>1330</th><th colspan=3>Something Really Cool </th></tr>
| |
| − | <tr><th>1430</th><th colspan=3>Closing Remarks </th></tr>
| |
| | | | |
| − | </table> | + | <tr><th>1300</th><th colspan=3>TECH-EXPO LUNCH</th></tr> |
| | | | |
| − | <hr> | + | <tr><th>1400</th><td>TOPIC<br><i>SPEAKERS</i></td> |
| | + | <td>TOPIC<br><i>SPEAKERS</i></td> |
| | + | <td>TOPIC<br><i>SPEAKERS</i></td></tr> |
| | | | |
| | + | <tr><th>1500</th><td>TOPIC<br><i>SPEAKERS</i></td> |
| | + | <td>TOPIC<br><i>SPEAKERS</i></td> |
| | + | <td>TOPIC<br><i>SPEAKERS</i></td></tr> |
| | | | |
| | + | <tr><th>1600</th><td>TOPICS<br><i>SPEAKERS</i></td> |
| | + | <td>TOPICS<br><i>SPEAKERS</i></td> |
| | + | <td>TOPICS<br><i>SPEAKER</i></td></tr> |
| | | | |
| | + | <tr><th>1700</th><td>TOPIC<br><i>SPEAKERS</i></td> |
| | + | <td>TOPIC<br><i>SPEAKERS</i></td> |
| | + | <td>TOPIC<br><i>SPEAKERS</i></td></tr> |
| | + | <tr><th>1830</th><th colspan=3> TBD </th></tr> |
| | + | <tr><th>2100</th><th colspan=3> TBD </th></tr> |
| | + | </table> |
| | | | |
| − | == Seminars - Track 1 / Track 2 / Track 3 ==
| + | <hr> |
| − | | |
| − | {| style="width:80%" border="0" align="center"
| |
| − | ! colspan="3" align="center" style="background:#4058A0; color:white" | Day 1 - October 7, 2008
| |
| − | |-
| |
| − | | style="width:10%; background:#7B8ABD" | || style="width:40%; background:#BC857A" | Track 1:
| |
| − | | style="width:40%; background:#BCA57A" | Track 2:
| |
| − | |-
| |
| − | | style="width:10%; background:#7B8ABD" | 08:00-09:00 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Registration and Coffee
| |
| − | |-
| |
| − | | style="width:10%; background:#7B8ABD" | 09:00-09:15 || colspan="2" style="width:80%; background:#F2F2F2" align="left" | OWASP AppSec 2008 Kick Off: Jeff Willams, Dave Wichers, Tom Brennan, Dinis Cruz & Sebastien Deleersnyder - OWASP Foundation Board Members
| |
| − | |-
| |
| − | | style="width:10%; background:#7B8ABD" | 09:10-10:00 || colspan="2" style="width:80%; background:#F2F2F2" align="left" | Keynote: Special Guest
| |
| − | |-
| |
| − | | style="width:10%; background:#7B8ABD" | 10:00-10:45 || colspan="2" style="width:80%; background:#F2F2F2" align="left" | Panel: Industry Roundtable
| |
| − | Moderator: Tom Brennan
| |
| − | | |
| − | Panelists: Jennifer Bayuk, CISO, Bear Stearns, Warren Axelrod, SVP, Bank of America, Jim Routh, CISO, DTCC
| |
| − | |-
| |
| − | | style="width:10%; background:#7B8ABD" | 11:00-11:45 || colspan="2" style="width:80%; background:#F2F2F2" align="left" | Speaker2
| |
| − | |-
| |
| − | | style="width:10%; background:#7B8ABD" | 12:00-12:45 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Speaker3
| |
| − | |-
| |
| − | | style="width:10%; background:#7B8ABD" | 13:00-14:00 || style="width:40%; background:#BC857A" align="left" | Topic: [http://w3af.sourceforge.net W3AF] is a Web application attack and Audit Framework
| |
| − | Speaker: Andres Riancho a student at UBA and an information security geek that lives in Argentina. He has contributed to other Open Source projects and esporadically writes for SecureArg an information security site co-founded by him
| |
| − | | style="width:40%; background:#BCA57A" align="left" | Speaker5
| |
| − | |-
| |
| − | | style="width:10%; background:#7B8ABD" | 12:45-13:45 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Speaker6
| |
| − | |-
| |
| − | | style="width:10%; background:#7B8ABD" | 13:45-14:30 || style="width:40%; background:#BC857A" align="left" | Speaker7
| |
| − | | style="width:40%; background:#BCA57A" align="left" | Topic: Hacking Intranets Through Web Interfaces
| |
| − | Speaker:[http://www.sectheory.com/bio.htm Robert "RSNAKE" Hansen]
| |
| − | |-
| |
| − | | style="width:10%; background:#7B8ABD" | 14:30-15:10 || style="width:40%; background:#BC857A" align="left" | Speaker9
| |
| − | | style="width:40%; background:#BCA57A" align="left" | Speaker10
| |
| − | |-
| |
| − | | style="width:10%; background:#7B8ABD" | 15:10-15:30 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Break
| |
| − | |-
| |
| − | | style="width:10%; background:#7B8ABD" | 15:30-16:40 || style="width:40%; background:#BC857A" align="left" | Speaker11
| |
| − | | style="width:40%; background:#BCA57A" align="left" | Speaker12
| |
| − | |-
| |
| − | | style="width:10%; background:#7B8ABD" | 16:40-17:00 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Break
| |
| − | |-
| |
| − | | style="width:10%; background:#7B8ABD" | 17:00-18:00 || colspan="2" style="width:40%; background:#F2F2F2" align="left" | Panel: Security Roundtable
| |
| − | Moderator: TBD
| |
| − | | |
| − | Panelists: Chris Stangle, FBI Cybercrimes, TBD, TBD, TBD, TBD,
| |
| − | |-
| |
| − | | style="width:10%; background:#7B8ABD" | 18:00-19:00 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | OWASP Worldwide Chapter Leader Meeting
| |
| − | |-
| |
| − | | style="width:10%; background:#7B8ABD" | 19:00-21:00 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | OWASP Social Gathering: Dinner and Drinks
| |
| − | |-
| |
| − | ! colspan="3" align="center" style="background:#4058A0; color:white" | Day 2 - October 8th, 2008
| |
| − | |-
| |
| − | | style="width:10%; background:#7B8ABD" | || style="width:40%; background:#BC857A" | Track 1:
| |
| − | | style="width:40%; background:#BCA57A" | Track 2:
| |
| − | |-
| |
| − | | style="width:10%; background:#7B8ABD" | 08:00-09:00 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Coffee
| |
| − | |-
| |
| − | | style="width:10%; background:#7B8ABD" | 09:00-9:50 || colspan="2" style="width:80%; background:#F2F2F2" align="left" | Keynote: tbd
| |
| − | |-
| |
| − | | style="width:10%; background:#7B8ABD" | 9:50-10:30 || colspan="2" style="width:80%; background:#F2F2F2" align="left" | tbd
| |
| − | |-
| |
| − | | style="width:10%; background:#7B8ABD" | 10:30-10:50 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Break
| |
| − | |-
| |
| − | | style="width:10%; background:#7B8ABD" | 10:50-11:30 || style="width:40%; background:#BC857A" align="left" | tbd
| |
| − | | style="width:40%; background:#BCA57A" align="left" | tbd
| |
| − | |-
| |
| − | | style="width:10%; background:#7B8ABD" | 11:30-12:30 || style="width:40%; background:#BC857A" align="left" | tbd
| |
| − | | style="width:40%; background:#BCA57A" align="left" | tbd
| |
| − | |-
| |
| − | | style="width:10%; background:#7B8ABD" | 12:30-13:45 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Lunch
| |
| − | |-
| |
| − | | style="width:10%; background:#7B8ABD" | 13:45-14:30 || style="width:40%; background:#BC857A" align="left" | tbd
| |
| − | | style="width:40%; background:#BCA57A" align="left" | tbd
| |
| − | |-
| |
| − | | style="width:10%; background:#7B8ABD" | 14:30-15:20 || style="width:40%; background:#BC857A" align="left" | tbd
| |
| − | | style="width:40%; background:#BCA57A" align="left" | tbd
| |
| − | |-
| |
| − | | style="width:10%; background:#7B8ABD" | 15:20-15:40 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Break
| |
| − | |-
| |
| − | | style="width:10%; background:#7B8ABD" | 15:40-16:30 || style="width:40%; background:#BC857A" align="left" | tbd
| |
| − | | style="width:40%; background:#BCA57A" align="left" | tbd
| |
| − | |-
| |
| − | | style="width:10%; background:#7B8ABD" | 16:30-17:30 || style="width:40%; background:#F2F2F2" align="left" | Panel: Responsible "tbd"
| |
| − | Moderator: tbd
| |
| | | | |
| − | Panelists: tbd
| |
| − | | style="width:40%; background:#F2F2F2" align="left" | Panel: "tbd"
| |
| − | Moderator: tbd
| |
| − |
| |
| − | Panelists: tbd
| |
| − | |-
| |
| − | | style="width:10%; background:#7B8ABD" | 17:30-17:45 || colspan="2" style="width:40%; background:#F2F2F2" align="left" | Conference Wrap Up
| |
| − | |-
| |
| − | | style="width:10%; background:#7B8ABD" | 18:30-20:30 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Cocktail Party (tbd?)
| |
| − | |}
| |
| − |
| |
| − | Track 3:
| |
| − |
| |
| − | {| style="width:80%" border="0" align="center"
| |
| − | ! colspan="3" align="center" style="background:#4058A0; color:white" | Day 1 - May 22, 2008
| |
| − | |-
| |
| − | | style="width:10%; background:#7B8ABD" | || style="width:80%; background:#BC857A" | Track 3:
| |
| − | |-
| |
| − | | style="width:10%; background:#7B8ABD" | 11:10-11:30 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Break
| |
| − | |-
| |
| − | | style="width:10%; background:#7B8ABD" | 11:30-12:30 || style="width:80%; background:#BC857A" align="left" | tbd
| |
| − | |-
| |
| − | | style="width:10%; background:#7B8ABD" | 12:30-13:45 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Lunch
| |
| − | |-
| |
| − | | style="width:10%; background:#7B8ABD" | 13:45-14:30 || style="width:80%; background:#BC857A" align="left" | tbd
| |
| − | |-
| |
| − | | style="width:10%; background:#7B8ABD" | 14:30-15:10 || style="width:80%; background:#BC857A" align="left" | tbd
| |
| − | |-
| |
| − | | style="width:10%; background:#7B8ABD" | 15:10-15:30 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Break
| |
| − | |-
| |
| − | | style="width:10%; background:#7B8ABD" | 15:30-16:40 || style="width:80%; background:#BC857A" align="left" | tbd
| |
| − | |}
| |
| − | {| style="width:80%" border="0" align="center"
| |
| − | ! colspan="3" align="center" style="background:#4058A0; color:white" | Day 2 - May 23, 2008
| |
| − | |-
| |
| − | | style="width:10%; background:#7B8ABD" | || style="width:80%; background:#BC857A" | Track 3:
| |
| − | |-
| |
| − | | style="width:10%; background:#7B8ABD" | 11:10-11:30 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Break
| |
| − | |-
| |
| − | | style="width:10%; background:#7B8ABD" | 11:30-12:30 || style="width:80%; background:#BC857A" align="left" | tbd
| |
| − | |-
| |
| − | | style="width:10%; background:#7B8ABD" | 12:30-13:45 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Lunch
| |
| − | |-
| |
| − | | style="width:10%; background:#7B8ABD" | 13:45-14:30 || style="width:80%; background:#BC857A" align="left" | tbd
| |
| − | |-
| |
| − | | style="width:10%; background:#7B8ABD" | 14:30-15:10 || style="width:80%; background:#BC857A" align="left" | tbd
| |
| − | |-
| |
| − | | style="width:10%; background:#7B8ABD" | 15:10-15:30 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Break
| |
| − | |-
| |
| − | | style="width:10%; background:#7B8ABD" | 15:30-16:40 || style="width:80%; background:#BC857A" align="left" | tbd
| |
| − | |}
| |
| | | | |
| | == Technology Expo - October 7th - 8th == | | == Technology Expo - October 7th - 8th == |
| Line 216: |
Line 93: |
| | Want to see the latest offerings from best of breed technology firms? For 2 days, Product/Service vendors worldwide will demonstrate their ability to conference attendees. | | Want to see the latest offerings from best of breed technology firms? For 2 days, Product/Service vendors worldwide will demonstrate their ability to conference attendees. |
| | | | |
| − | To be a vendor at this event please contact Tom Brennan at tomb (at) owasp.org or 973-202-0122
| + | <center><b>[[CFPFAQ | CALL FOR SPEAKERS, TRAINERS and SPONSORS ]]</b>, IS OFFICALLY OPEN!!!! </center> |
| | | | |
| | | | |
| Line 243: |
Line 120: |
| | |} | | |} |
| | | | |
| − | To be a trainer at this event please contact Tom Brennan at tomb (at) owasp.org or 973-202-0122
| + | <center><b>[[CFPFAQ | CALL FOR SPEAKERS, TRAINERS and SPONSORS ]]</b>, IS OFFICALLY OPEN!!!! </center> |
Want to see the latest offerings from best of breed technology firms? For 2 days, Product/Service vendors worldwide will demonstrate their ability to conference attendees.