This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "San Pedro Sula"
From OWASP
(9 intermediate revisions by the same user not shown) | |||
Line 12: | Line 12: | ||
<li>[mailto:fernando.calix@owasp.org Fernando Calix]</li> | <li>[mailto:fernando.calix@owasp.org Fernando Calix]</li> | ||
<li>[mailto:amilcar.deleon@owasp.org Amilcar De Leon]</li> | <li>[mailto:amilcar.deleon@owasp.org Amilcar De Leon]</li> | ||
+ | <li>[mailto:me@jescoto.com Jaime Escoto]</li> | ||
== Nuestras Redes Sociales == | == Nuestras Redes Sociales == | ||
<li>[https://www.facebook.com/OWASP-San-Pedro-Sula-Honduras-338044763737072/ Facebook]</li> | <li>[https://www.facebook.com/OWASP-San-Pedro-Sula-Honduras-338044763737072/ Facebook]</li> | ||
Line 85: | Line 86: | ||
| style="text-align: center;" | Acreditación y Bienvenida | | style="text-align: center;" | Acreditación y Bienvenida | ||
| Raúl Aguilar | | Raúl Aguilar | ||
− | | Honduras | + | | Honduras |
+ | | | ||
|- | |- | ||
| 09:00 - 09:45 | | 09:00 - 09:45 | ||
| style="text-align: center;" | OWASP TOP 10 | | style="text-align: center;" | OWASP TOP 10 | ||
| Armando Rodas | | Armando Rodas | ||
− | | Honduras | + | | Honduras |
+ | | [https://drive.google.com/file/d/1Wu7ujvisCBYTjYjAEDBVn_Vuyb8b-uNL/view?usp=sharing Descarga Aquí] | ||
|- | |- | ||
| 09:45 - 10:30 | | 09:45 - 10:30 | ||
| style="text-align: center;" | La Privacidad y Manejo de Vulnerabilidades de la Información | | style="text-align: center;" | La Privacidad y Manejo de Vulnerabilidades de la Información | ||
| Sandy Palma | | Sandy Palma | ||
− | | Honduras | + | | Honduras |
+ | | [https://drive.google.com/file/d/19U1vOuie3b0mDHYEGhy9Ca7FNuSLmPrv/view?usp=sharing Descarga Aquí] | ||
|- | |- | ||
| 10:30 - 10:45 | | 10:30 - 10:45 | ||
| style="text-align: center;" | Coffee Break | | style="text-align: center;" | Coffee Break | ||
| - | | - | ||
− | | - | + | | - |
+ | | | ||
|- | |- | ||
| 10:45 - 11:15 | | 10:45 - 11:15 | ||
| style="text-align: center;" | Evitar Infectar tu Smartphone | | style="text-align: center;" | Evitar Infectar tu Smartphone | ||
| Henry Serrano | | Henry Serrano | ||
− | | Honduras | + | | Honduras |
+ | | [https://drive.google.com/file/d/18kY_T86nhTf22MGG0jXVcu-4XjEFh4xd/view Descarga Aquí] | ||
|- | |- | ||
| 11:15 - 11:45 | | 11:15 - 11:45 | ||
| style="text-align: center;" | SOC de Alto Nivel | | style="text-align: center;" | SOC de Alto Nivel | ||
| Reivyn Calix | | Reivyn Calix | ||
− | | Honduras | + | | Honduras |
+ | | [https://drive.google.com/file/d/1uwr8Y7qiDTUeVn5Cs1L0N8j6Y_eEUngf/view?usp=sharing Descarga Aquí] | ||
|- | |- | ||
| 11:45 - 12:15 | | 11:45 - 12:15 | ||
| style="text-align: center;" | How to Exploit Eternalblue | | style="text-align: center;" | How to Exploit Eternalblue | ||
| Juan Carlos Inestroza | | Juan Carlos Inestroza | ||
− | | Honduras | + | | Honduras |
+ | | | ||
|- | |- | ||
| 12:15 - 13:00 | | 12:15 - 13:00 | ||
| style="text-align: center;" | Pausa para Almuerzo | | style="text-align: center;" | Pausa para Almuerzo | ||
| - | | - | ||
− | | - | + | | - |
+ | | | ||
|- | |- | ||
| 13:00- 13:45 | | 13:00- 13:45 | ||
| style="text-align: center;" | Gestión de la Seguridad de la Información y Riesgos de TI ( ISO 27001) | | style="text-align: center;" | Gestión de la Seguridad de la Información y Riesgos de TI ( ISO 27001) | ||
| Victoria Cáceres | | Victoria Cáceres | ||
− | | Honduras | + | | Honduras |
+ | | [https://drive.google.com/file/d/1LgHeaifzWeZ-8R91mvV5YnA29vsNE4_J/view?usp=sharing Descarga Aquí] | ||
|- | |- | ||
| 13:45 - 14:15 | | 13:45 - 14:15 | ||
| style="text-align: center;" | Érase una vez cuando hackearón un NIC | | style="text-align: center;" | Érase una vez cuando hackearón un NIC | ||
| Ricardo Supo Picón | | Ricardo Supo Picón | ||
− | | Brasil | + | | Brasil |
+ | | | ||
|- | |- | ||
| 14:15 - 15:15 | | 14:15 - 15:15 | ||
| style="text-align: center;" | Técnicas de Hacking en Honduras | | style="text-align: center;" | Técnicas de Hacking en Honduras | ||
| Jorge Fernández | | Jorge Fernández | ||
− | | Honduras | + | | Honduras |
+ | | [https://drive.google.com/file/d/1dqX1wgPE5zs0GuOpmIJzA21XEWME4n4W/view?usp=sharing Descarga Aquí] | ||
|- | |- | ||
| 15:15 - 15: 30 | | 15:15 - 15: 30 | ||
| style="text-align: center;" | Coffee Break | | style="text-align: center;" | Coffee Break | ||
| - | | - | ||
− | | - | + | | - |
+ | | | ||
|- | |- | ||
| 15:30 - 16:15 | | 15:30 - 16:15 | ||
| style="text-align: center;" | Cyber Threat Hunting | | style="text-align: center;" | Cyber Threat Hunting | ||
| Ramiro Pulgar | | Ramiro Pulgar | ||
− | | Ecuador | + | | Ecuador |
+ | | | ||
|- | |- | ||
| 16:15 - 16:45 | | 16:15 - 16:45 | ||
| style="text-align: center;" | Estándar de Verificación de Seguridad en Aplicaciones | | style="text-align: center;" | Estándar de Verificación de Seguridad en Aplicaciones | ||
| Raúl Aguilar | | Raúl Aguilar | ||
− | | Honduras | + | | Honduras |
+ | | [https://drive.google.com/file/d/1Ru4zWCB_VwHNxaCtKwu3G6cALR4Sqe62/view?usp=sharing Descarga Aquí] | ||
|- | |- | ||
| 16:45 - 17:15 | | 16:45 - 17:15 | ||
Line 156: | Line 171: | ||
| Amilcar De León | | Amilcar De León | ||
| Guatemala | | Guatemala | ||
+ | | [https://drive.google.com/file/d/1QTx8gVHHdor7CkchG8w6NBgTkx1xj3Py/view?usp=sharing Descarga Aquí] | ||
|- | |- | ||
| 17:15 - 17:30 | | 17:15 - 17:30 | ||
| style="text-align: center;" | Clausura del Evento | | style="text-align: center;" | Clausura del Evento | ||
| Armando Rodas | | Armando Rodas | ||
− | | Honduras | + | | Honduras |
+ | | | ||
|- | |- | ||
|} | |} |
Latest revision as of 17:57, 24 August 2019