This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "OWASP AU Conference 2009 Agenda"

From OWASP
Jump to: navigation, search
(New page: == OWASP Australia 2009 Conference Schedule - February 26th & 27th 2008 == {| style="width:80%" border="0" align="center" ! colspan="3" align="center" style="background:#4058A0; color:w...)
 
(OWASP Australia 2009 Conference Schedule - February 26th & 27th 2009)
 
(54 intermediate revisions by 3 users not shown)
Line 1: Line 1:
 +
The following Agenda is provided currently with approved and accepted Speaking spots. As more information is provided details will be posted online.
  
== OWASP Australia 2009 Conference Schedule - February 26th & 27th 2008 ==
+
== OWASP Australia 2009 Conference Schedule - February 26th & 27th 2009 ==
  
 
{| style="width:80%" border="0" align="center"
 
{| style="width:80%" border="0" align="center"
  ! colspan="3" align="center" style="background:#4058A0; color:white" | Day 1 - Thursday Feb 26, 2007
+
  ! colspan="3" align="center" style="background:#4058A0; color:white" | Wednesday Feb 25, 2009
 
  |-
 
  |-
  | style="width:10%; background:#7B8ABD" | || style="width:40%; background:#BC857A" | Track 1  
+
  | style="width:10%; background:#7B8ABD" | || style="width:40%; background:#BC857A" |   
  | style="width:40%; background:#BCA57A" | Track 2
+
  | style="width:40%; background:#BCA57A" |  
 
  |-
 
  |-
  | style="width:10%; background:#7B8ABD" | 08:00-09:00 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Registration and Coffee
+
  | style="width:10%; background:#7B8ABD" | 17:30 - 19:00 || colspan="2" style="width:80%; background:#669966" align="left" | '''Conference Welcome Cocktail Party''' - ''Sponsored by Fortify Inc.'' Presentation on the Fortify Software Assurance Maturity Model.
 +
 
 +
This is a great opportunity to settle in, meet people at the conference and meet up with industry peers.
 +
 
 +
Location: Conference Facility Foyer @ Gold Coast Convention Center (Level 1 FOYER)
 
  |-
 
  |-
| style="width:10%; background:#7B8ABD" | 09:00-09:15 || colspan="2" style="width:80%; background:#F2F2F2" align="left" | Welcome to OWASP Australia 2008 Conference - Justin Derry, Australia OWASP Conference Chair and Practice Leader b-sec Consulting
+
|}
 +
 
 +
 
 +
 
 +
{| style="width:80%" border="0" align="center"
 +
! colspan="3" align="center" style="background:#4058A0; color:white" | Day 1 - Thursday Feb 26, 2009
 
  |-
 
  |-
  | style="width:10%; background:#7B8ABD" | 09:15-10:15 || colspan="2" style="width:80%; background:#F2F2F2" align="left" | Keynote: The Microsoft SLD-IT, The process of Building Secure Applications
+
  | style="width:10%; background:#7B8ABD" | || style="width:40%; background:#BC857A" | '''Track 1 (Rooms 5 & 6)'''
Mark Curphey (European Practice Manager - ACE Team Microsoft)
+
| style="width:40%; background:#BCA57A" | '''Track 2 (Rooms 7 & 8)'''
[http://www.owasp.org/download/owasp_confau_2008/OWASPAU08_Session_1_Curphey.mp3 (MP3)]
+
|-
 
+
| style="width:10%; background:#7B8ABD" | 08:00-09:00 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Registration and Coffee - ''Espresso Coffee (Sponsored by IBM) provided.''
 +
|-
 +
| style="width:10%; background:#7B8ABD" | 09:00-09:15 || colspan="2" style="width:80%; background:#F2F2F2" align="left" | '''Welcome to OWASP AU 2009''' - Justin Derry (OWASP Conference Chair AU2009 & Fortify Practice Director Asia Pacific)
 +
  |-
 +
| style="width:10%; background:#7B8ABD" | 09:15-10:45 || colspan="2" style="width:80%; background:#F2F2F2" align="left" | '''Keynote:''' Roger Thorton, CTO Fortify Inc
 
  |-
 
  |-
  | style="width:10%; background:#7B8ABD" | 10:15-10:45 || colspan="2" style="width:80%; background:#F2F2F2" align="left" | An Introduction to OWASP 2008 & Current Projects - Justin Derry, Australia OWASP Conference Chair and Practice Leader b-sec Consulting
+
  | style="width:10%; background:#7B8ABD" | 10:45-11:15 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | ''Morning Tea/Coffee, Vendor Technology Expo'' - ''Espresso Coffee (Sponsored by IBM) provided.''
 
  |-
 
  |-
  | style="width:10%; background:#7B8ABD" | 10:45-11:15 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Morning Tea/Coffee, Vendor Technology Expo
+
  | style="width:10%; background:#7B8ABD" | 11:15-12:15 || style="width:40%; background:#BC857A" align="left" | Christian Heinrich & Darren Skidmore - ''PCI-DSS Application Security''
 +
| style="width:40%; background:#BCA57A" align="left" | Ranjita Shankar Iyer - ''A Prescriptive approach to Secure SDLC''
 
  |-
 
  |-
  | style="width:10%; background:#7B8ABD" | 11:15-12:30 || style="width:40%; background:#BC857A" align="left" | Secure Software Development (OWASP EDU Project) - Martin Knobloch, Technical Specialist, Sogeti Nederland B.V.
+
  | style="width:10%; background:#7B8ABD" | 12:15-13:30 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | ''Lunch, Vendor Technology Expo''
[http://www.owasp.org/download/owasp_confau_2008/OWASPAU08_Session_2_Knobloch.mp3 (MP3)]  [http://www.owasp.org/images/8/8d/OWASPAU08_Session_2_Knobloch.ppt (PPT)]
 
| style="width:40%; background:#BCA57A" align="left" | Considerations for application security testing for enterprise projects. - Jean Marie Abighanem, Director Enterprise Risk Services Deloitte Touche Tohmatsu
 
[http://www.owasp.org/download/owasp_confau_2008/OWASPAU08_Session_3_Abighanem.mp3 (MP3)]
 
[http://www.owasp.org/images/9/97/OWASPAU08_Session_3_Abighanem.ppt (PPT)]
 
 
  |-
 
  |-
  | style="width:10%; background:#7B8ABD" | 12:30-13:30 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Lunch, Vendor Technology Expo
+
  | style="width:10%; background:#7B8ABD" | 13:30-14:30 || style="width:40%; background:#BC857A" align="left" | Andrew Vanderstock - ''The future (and past) of web application security how to detect and protect against value attacks''
 +
| style="width:40%; background:#BCA57A" align="left" | Siddharth Anbalahan - ''Advanced Techniques in Code Reviews''
 
  |-
 
  |-
  | style="width:10%; background:#7B8ABD" | 13:30-14:30 || style="width:40%; background:#BC857A" align="left" | Automated web application scanning versus manual testing, choosing the best tools for the job. - Matthew Hackling, Enterprise Risk Services Deloitte Touche Tohmatsu
+
  | style="width:10%; background:#7B8ABD" | 14:45-15:45 || style="width:40%; background:#BC857A" align="left" | Peter Freiberg - ''Determining attack surface and creating security test cases through observing business testing''
[http://www.owasp.org/download/owasp_confau_2008/OWASPAU08_Session_4_Hackling.mp3 (MP3)]
+
  | style="width:40%; background:#BCA57A" align="left" | Brett Moore - ''Vulnerabilities In Action''
[http://www.owasp.org/images/4/41/OWASPAU08_Session_4_Hackling.ppt (PPT)]
 
  | style="width:40%; background:#BCA57A" align="left" | Business Risk & Compliance for Application Security - Malathi Carthigaser, Principal Consultant Application Security b-sec
 
[http://www.owasp.org/download/owasp_confau_2008/OWASPAU08_Session_5_Carthigaser.mp3 (MP3)]
 
[http://www.owasp.org/images/2/20/OWASPAU08_Session_5_Carthigaser.ppt (PPT)]
 
 
  |-
 
  |-
  | style="width:10%; background:#7B8ABD" | 14:45-15:45 || style="width:40%; background:#BC857A" align="left" | Whitelisting & Securing HTML Input - Peter Freiberg, b-sec Consulting Pty Ltd
+
  | style="width:10%; background:#7B8ABD" | 15:45-16:15 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | ''Afternoon Tea/Coffee, Vendor Technology Expo'' - ''Espresso Coffee (Sponsored by IBM) provided.''
[http://www.owasp.org/download/owasp_confau_2008/OWASPAU08_Session_6_Freiberg.mp3 (MP3)]
 
| style="width:40%; background:#BCA57A" align="left" | The Next Step in Evolution (Javascript Worms) - Benjamin Mosse, Security Researcher & Analyst Programmer
 
[http://www.owasp.org/download/owasp_confau_2008/OWASPAU08_Session_7_Mosse.mp3 (MP3)]
 
[http://www.owasp.org/images/1/1a/OWASPAU08_Session_7_Mosse.ppt (PPT)]
 
 
  |-
 
  |-
  | style="width:10%; background:#7B8ABD" | 15:45-16:15 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Afternoon Tea/Coffee, Vendor Technology Expo
+
  | style="width:10%; background:#7B8ABD" | 16:15-17:15 || style="width:40%; background:#BC857A" align="left" | Sumit Siddharth - ''Recent Advancements in SQL Injection Exploitation Techniques''
 +
| style="width:40%; background:#BCA57A" align="left" | Karmendra Kohli - ''Wooden Swords and Plastic Guns - Insecure Security Defenses''
 
  |-
 
  |-
  | style="width:10%; background:#7B8ABD" | 16:15-17:00 || style="width:40%; background:#BC857A" align="left" | Three OWASP Projects for Secure Applications - Michael Eddington, Leviathan Security Group
+
  | style="width:10%; background:#7B8ABD" | 17:15-18:00 || colspan="2" style="width:40%; background:#F2F2F2" align="left" | Panel - Industry Experts, Talking about real Application Security Threats. ''(You ask the questions, in this informative 45 minutes of panel discussion on relevant industry issues.)''
[http://www.owasp.org/download/owasp_confau_2008/OWASPAU08_Session_8_Eddington.mp3 (MP3)]
 
[http://www.owasp.org/images/b/b0/OWASPAU08_Session_8_Eddington.ppt (PPT)]
 
| style="width:40%; background:#BCA57A" align="left" | Hacker Attacks on the Horizon: Understanding the Top Web 2.0 Attack Vectors - Danny Allan, IBM Watchfire
 
[http://www.owasp.org/download/owasp_confau_2008/OWASPAU08_Session_9_Allan.mp3 (MP3)]
 
[http://www.owasp.org/images/f/fb/OWASPAU08_Session_9_Allan.pdf (PDF)]
 
 
  |-
 
  |-
  | style="width:10%; background:#7B8ABD" | 17:15-18:00 || colspan="2" style="width:40%; background:#F2F2F2" align="left" | Panel: “Application Security Threats Commonly faced by Organisations!”
+
  | style="width:10%; background:#7B8ABD" | 18:30-19:00 || colspan="2" style="width:80%; background:#669966" align="left" | '''OWASP Social Gathering:''' Pre-Dinner Drinks & Cocktails
Moderator: Oliver Binz, Managing Director, b-sec Consulting Pty Ltd
 
  
Panelists: Jean Marie Abighanem (Deloitte Touche Tohmatsu), Brian Chess (Fortify Software), James Manger (Telstra), Mark Curphey (Microsoft), Christian Heinrich
+
Location: Conference Facility Foyer @ Gold Coast Convention Center (Level 1 FOYER)
[http://www.owasp.org/download/owasp_confau_2008/OWASPAU08_Session_10_Panel.mp3 (MP3)]
 
 
  |-
 
  |-
  | style="width:10%; background:#7B8ABD" | 18:30-19:00 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | OWASP Social Gathering: Pre-Dinner Drinks & Cocktails
+
  | style="width:10%; background:#7B8ABD" | 19:00-22:00 || colspan="2" style="width:80%; background:#669966" align="left" | '''OWASP Social Gathering:''' Gala Dinner, Entertainment and Networking Opportunity. ''This is Free to all attendees and will be a great night.''
Location: Conference Facility Foyer @ Gold Coast Convention Center
+
 
|-
+
Location: Conference Facility Foyer @ Gold Coast Convention Center (Level 1 FOYER)
| style="width:10%; background:#7B8ABD" | 19:00-21:30 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | OWASP Social Gathering: Gala Dinner, Entertainment and Networking Opportunity for all registered attendees.
 
Location: Gold Coast Convention Center Main Hall.
 
 
|-
 
|-
 +
|}
 +
  
  ! colspan="3" align="center" style="background:#4058A0; color:white" | Day 2 - Friday Feb 29, 2007
+
 
 +
{| style="width:80%" border="0" align="center"
 +
  ! colspan="3" align="center" style="background:#4058A0; color:white" | Day 2 - Friday Feb 27, 2009
 
  |-
 
  |-
  | style="width:10%; background:#7B8ABD" | || style="width:40%; background:#BC857A" | Track 1
+
  | style="width:10%; background:#7B8ABD" | || style="width:40%; background:#BC857A" | '''Track 1 (Rooms 5 & 6)'''
  | style="width:40%; background:#BCA57A" | Track 2
+
  | style="width:40%; background:#BCA57A" | '''Track 2 (Rooms 7 & 8)'''
 
  |-
 
  |-
  | style="width:10%; background:#7B8ABD" | 08:00-09:00 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Registration and Coffee
+
  | style="width:10%; background:#7B8ABD" | 08:00-09:00 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Registration and Coffee - ''Espresso Coffee (Sponsored by IBM) provided.''
 
  |-
 
  |-
  | style="width:10%; background:#7B8ABD" | 09:00-9:15 || colspan="2" style="width:80%; background:#F2F2F2" align="left" | Conference Day 2 Open: Justin Derry, Australia OWASP Conference Chair and Practice Leader b-sec Consulting
+
  | style="width:10%; background:#7B8ABD" | 09:00-9:15 || colspan="2" style="width:80%; background:#F2F2F2" align="left" | '''Conference Day 2 Open''' - Justin Derry (OWASP Conference Chair AU2009 & Fortify Practice Director Asia Pacific)
 
  |-
 
  |-
  | style="width:10%; background:#7B8ABD" | 09:15-10:15 || colspan="2" style="width:80%; background:#F2F2F2" align="left" | Keynote2: Static Analysis & Secure Coding for Enterprises - Brian Chess, Fortify Software Ph.D., Founder & Chief Scientist
+
  | style="width:10%; background:#7B8ABD" | 09:15-10:45 || colspan="2" style="width:80%; background:#F2F2F2" align="left" | '''Keynote:''' Adi Sharabani (IBM Rational Application Security Research) ''[http://blog.watchfire.com/wfblog/2009/02/active-man-in-the-middle-attacks.html Web-Based Man-in-the-Middle Attacks]''
Author of Secure Programming with Static Analysis by Brian Chess and Jacob West
 
[http://www.owasp.org/download/owasp_confau_2008/OWASPAU08_Session_11_Chess.mp3 (MP3)]
 
[http://www.owasp.org/images/4/4a/OWASPAU08_Session_11_Chess.zip (PPT/ZIP)]  
 
 
  |-
 
  |-
  | style="width:10%; background:#7B8ABD" | 10:15-10:45 || colspan="2" style="width:80%; background:#F2F2F2" align="left" | OWASP Top Ten, OWASP Guide Project Updates
+
  | style="width:10%; background:#7B8ABD" | 10:45-11:15 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | ''Morning Tea/Coffee, Vendor Technology Expo'' - ''Espresso Coffee (Sponsored by IBM) provided.''
 
  |-
 
  |-
  | style="width:10%; background:#7B8ABD" | 10:45-11:15 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Morning Tea/Coffee, Vendor Technology Expo
+
  | style="width:10%; background:#7B8ABD" | 11:15 -12:15 || style="width:40%; background:#BC857A" align="left" | Alex Kouzemtchenko - ''Examining and Bypassing the IE8 XSS Filter''
 +
| style="width:40%; background:#BCA57A" align="left" | Paul Theriault - ''Plug-in Purgatory''
 
  |-
 
  |-
  | style="width:10%; background:#7B8ABD" | 11:15-12:30 || style="width:40%; background:#BC857A" align="left" | Google Hacking - Christian Heinrich
+
  | style="width:10%; background:#7B8ABD" | 12:15-13:30 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | ''Lunch, Vendor Technology Expo''
[http://www.owasp.org/download/owasp_confau_2008/OWASPAU08_Session_12_Heinrich.mp3 (MP3)]
 
| style="width:40%; background:#BCA57A" align="left" | Scalability and Security — Together - James Manger, Identity and Security team – Chief Technology Office – Telstra
 
[http://www.owasp.org/download/owasp_confau_2008/OWASPAU08_Session_13_Manager.mp3 (MP3)]
 
[http://www.owasp.org/images/8/89/OWASPAU08_Session_13_Manger.ppt (PPT)]
 
 
 
 
  |-
 
  |-
  | style="width:10%; background:#7B8ABD" | 12:30-13:30 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Lunch, Vendor Technology Expo
+
  | style="width:10%; background:#7B8ABD" | 13:30-14:00 || colspan="2" style="width:80%; background:#F2F2F2" align="left" | Panel Discussion - OWASP Australia Discussion. ''(Help us to plan for OWASP chapter sessions, presentations and the 2010 conference in this session.)''
 
  |-
 
  |-
  | style="width:10%; background:#7B8ABD" | 13:30-14:30 || style="width:40%; background:#BC857A" align="left" | Using WS-SecurityPolicy to Defend Web Services Attacks - Symon Chang, BEA Systems
+
  | style="width:10%; background:#7B8ABD" | 14:00-14:45 || style="width:40%; background:#BC857A" align="left" | Mark Goudie - ''An Insight into the World of Computer Forensics''
[http://www.owasp.org/download/owasp_confau_2008/OWASPAU08_Session_14_Chang.mp3 (MP3)]
+
  | style="width:40%; background:#BCA57A" align="left" | Malathi Carthigaser - STRAW ''- A security Threat & Risk Assessment Methodology for Web Applications''
[http://www.owasp.org/images/1/1d/OWASPAU08_Session_14_Chang.ppt (PPT)]
 
  | style="width:40%; background:#BCA57A" align="left" | PCI Security Standards & Policies for Application Security - Darren Skidmore, Team Lead InfoSec and BCP, FIS Australasia Card Services Pty Ltd
 
[http://www.owasp.org/download/owasp_confau_2008/OWASPAU08_Session_15_Skidmore.mp3 (MP3)]
 
 
  |-
 
  |-
  | style="width:10%; background:#7B8ABD" | 14:30-15:30 || style="width:40%; background:#BC857A" align="left" | Dealing with threats to Databases - Sandeep Singh Nain, Security Analyst IBM
+
  | style="width:10%; background:#7B8ABD" | 14:45-15:45 || style="width:40%; background:#BC857A" align="left" | Drew Ames - ''Improving Application Security using pre-processing input filters – a case study''
[http://www.owasp.org/download/owasp_confau_2008/OWASPAU08_Session_16_Nain.mp3 (MP3)]
+
  | style="width:40%; background:#BCA57A" align="left" | Pravir Chandra (OWASP CLASP Project) - ''The Software Assurance Maturity Model (SAMM), a new OWASP Project''
[http://www.owasp.org/images/a/a3/OWASPAU08_Session_16_Nain.ppt (PPT)]
+
|-
  | style="width:40%; background:#BCA57A" align="left" | On the job browser exploitation - Mark Piper, Security-Assessment.com
+
| style="width:10%; background:#7B8ABD" | 15:45-16:15 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | ''Afternoon Tea/Coffee, Vendor Technology Expo'' - ''Espresso Coffee (Sponsored by IBM) provided.''
[http://www.owasp.org/download/owasp_confau_2008/OWASPAU08_Session_17_Mark.mp3 (MP3)]
 
 
  |-
 
  |-
  | style="width:10%; background:#7B8ABD" | 15:30-16:00 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Afternoon Tea/Coffee, Vendor Technology Expo
+
  | style="width:10%; background:#7B8ABD" | 16:15-17:15 || style="width:40%; background:#BC857A" align="left" | Christian Heinrich - ''Googleless''
 +
| style="width:40%; background:#BCA57A" align="left" | Benjamin Mosse - ''Browser Rider: what you never expected your browser could do to you.''
 
  |-
 
  |-
  | style="width:10%; background:#7B8ABD" | 16:00-17:00 || style="width:40%; background:#BC857A" align="left" | The detection and analysis of Flash based malware. - Paul Theriault, Senior Associate SIFT
+
  | style="width:10%; background:#7B8ABD" | 17:15-17:30 || colspan="2" style="width:40%; background:#F2F2F2" align="left" | '''Conference Close''', Justin Derry (OWASP Conference Chair AU2009 & Fortify Practice Director Asia Pacific)
[http://www.owasp.org/download/owasp_confau_2008/OWASPAU08_Session_18_Theriault.mp3 (MP3)]
 
[http://www.owasp.org/images/7/77/OWASPAU08_Session_18_Theriault.ppt (PPT)]
 
| style="width:40%; background:#BCA57A" align="left" | Web Application Security. - Aidan Clarke F5 Systems Engineer
 
[http://www.owasp.org/download/owasp_confau_2008/OWASPAU08_Session_19_Clark.mp3 (MP3)]
 
[http://www.owasp.org/images/4/48/OWASPAU08_Session_19_Clark.pdf (PDF)]
 
 
  |-
 
  |-
| style="width:10%; background:#7B8ABD" | 17:00-17:30 || colspan="2" style="width:40%; background:#F2F2F2" align="left" | Conference Close, Justin Derry, Australia OWASP Conference Chair and Practice Leader b-sec Consulting
+
  | style="width:10%; background:#7B8ABD" | 17:30-19:00 || colspan="2" style="width:80%; background:#669966" align="left" | '''Happy Hour & Half''' - Drinks and Cocktails in Vendor Technology Expo  
|-
+
A Great opportunity to talk about relevant topics presented on and meet/discuss topics with presenters from the day.
  | style="width:10%; background:#7B8ABD" | 17:30-19:00 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Happy Hour Drinks and Cocktails in Vendor Technology Expo
 
 
  |-
 
  |-
 
|}
 
|}
 +
 +
== OWASP Australia 2009 Conference Facilities Map ==
 +
To assist delegates the following map of the Conference Facilities is provided. The Gold Coast Convention Center has provided OWASP with the entire top floor of the Conference Facility for all services including presentations, meals and the vendor technology expo.
 +
 +
[http://www.owasp.org/index.php/OWASP_AU_Conference_2009 http://www.owasp.org/images/1/16/OWASP-AUS_CONFERENCE_LAYOUT_FIRSTFLOOR.png]

Latest revision as of 17:13, 27 February 2009

The following Agenda is provided currently with approved and accepted Speaking spots. As more information is provided details will be posted online.

OWASP Australia 2009 Conference Schedule - February 26th & 27th 2009

Wednesday Feb 25, 2009
17:30 - 19:00 Conference Welcome Cocktail Party - Sponsored by Fortify Inc. Presentation on the Fortify Software Assurance Maturity Model.

This is a great opportunity to settle in, meet people at the conference and meet up with industry peers.

Location: Conference Facility Foyer @ Gold Coast Convention Center (Level 1 FOYER)


Day 1 - Thursday Feb 26, 2009
Track 1 (Rooms 5 & 6) Track 2 (Rooms 7 & 8)
08:00-09:00 Registration and Coffee - Espresso Coffee (Sponsored by IBM) provided.
09:00-09:15 Welcome to OWASP AU 2009 - Justin Derry (OWASP Conference Chair AU2009 & Fortify Practice Director Asia Pacific)
09:15-10:45 Keynote: Roger Thorton, CTO Fortify Inc
10:45-11:15 Morning Tea/Coffee, Vendor Technology Expo - Espresso Coffee (Sponsored by IBM) provided.
11:15-12:15 Christian Heinrich & Darren Skidmore - PCI-DSS Application Security Ranjita Shankar Iyer - A Prescriptive approach to Secure SDLC
12:15-13:30 Lunch, Vendor Technology Expo
13:30-14:30 Andrew Vanderstock - The future (and past) of web application security how to detect and protect against value attacks Siddharth Anbalahan - Advanced Techniques in Code Reviews
14:45-15:45 Peter Freiberg - Determining attack surface and creating security test cases through observing business testing Brett Moore - Vulnerabilities In Action
15:45-16:15 Afternoon Tea/Coffee, Vendor Technology Expo - Espresso Coffee (Sponsored by IBM) provided.
16:15-17:15 Sumit Siddharth - Recent Advancements in SQL Injection Exploitation Techniques Karmendra Kohli - Wooden Swords and Plastic Guns - Insecure Security Defenses
17:15-18:00 Panel - Industry Experts, Talking about real Application Security Threats. (You ask the questions, in this informative 45 minutes of panel discussion on relevant industry issues.)
18:30-19:00 OWASP Social Gathering: Pre-Dinner Drinks & Cocktails

Location: Conference Facility Foyer @ Gold Coast Convention Center (Level 1 FOYER)

19:00-22:00 OWASP Social Gathering: Gala Dinner, Entertainment and Networking Opportunity. This is Free to all attendees and will be a great night.

Location: Conference Facility Foyer @ Gold Coast Convention Center (Level 1 FOYER)


Day 2 - Friday Feb 27, 2009
Track 1 (Rooms 5 & 6) Track 2 (Rooms 7 & 8)
08:00-09:00 Registration and Coffee - Espresso Coffee (Sponsored by IBM) provided.
09:00-9:15 Conference Day 2 Open - Justin Derry (OWASP Conference Chair AU2009 & Fortify Practice Director Asia Pacific)
09:15-10:45 Keynote: Adi Sharabani (IBM Rational Application Security Research) Web-Based Man-in-the-Middle Attacks
10:45-11:15 Morning Tea/Coffee, Vendor Technology Expo - Espresso Coffee (Sponsored by IBM) provided.
11:15 -12:15 Alex Kouzemtchenko - Examining and Bypassing the IE8 XSS Filter Paul Theriault - Plug-in Purgatory
12:15-13:30 Lunch, Vendor Technology Expo
13:30-14:00 Panel Discussion - OWASP Australia Discussion. (Help us to plan for OWASP chapter sessions, presentations and the 2010 conference in this session.)
14:00-14:45 Mark Goudie - An Insight into the World of Computer Forensics Malathi Carthigaser - STRAW - A security Threat & Risk Assessment Methodology for Web Applications
14:45-15:45 Drew Ames - Improving Application Security using pre-processing input filters – a case study Pravir Chandra (OWASP CLASP Project) - The Software Assurance Maturity Model (SAMM), a new OWASP Project
15:45-16:15 Afternoon Tea/Coffee, Vendor Technology Expo - Espresso Coffee (Sponsored by IBM) provided.
16:15-17:15 Christian Heinrich - Googleless Benjamin Mosse - Browser Rider: what you never expected your browser could do to you.
17:15-17:30 Conference Close, Justin Derry (OWASP Conference Chair AU2009 & Fortify Practice Director Asia Pacific)
17:30-19:00 Happy Hour & Half - Drinks and Cocktails in Vendor Technology Expo

A Great opportunity to talk about relevant topics presented on and meet/discuss topics with presenters from the day.

OWASP Australia 2009 Conference Facilities Map

To assist delegates the following map of the Conference Facilities is provided. The Gold Coast Convention Center has provided OWASP with the entire top floor of the Conference Facility for all services including presentations, meals and the vendor technology expo.

OWASP-AUS_CONFERENCE_LAYOUT_FIRSTFLOOR.png