This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "OWASP AU Conference 2009 Training"

From OWASP
Jump to: navigation, search
(OWASP Australia 2008 Training Schedule - February 25th, 2008)
(OWASP Australia 2008 Training Schedule - February 25th, 2008)
 
(3 intermediate revisions by the same user not shown)
Line 11: Line 11:
 
  | style="width:10%; background:#7B8ABD" | 08:00-09:00 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Registration and Coffee - ''Espresso Coffee (Sponsored by IBM) provided.''
 
  | style="width:10%; background:#7B8ABD" | 08:00-09:00 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Registration and Coffee - ''Espresso Coffee (Sponsored by IBM) provided.''
 
  |-
 
  |-
| style="width:10%; background:#7B8ABD" | 11:15-12:15 || style="width:40%; background:#BC857A" align="left" | Andrew Vanderstock
+
| style="width:10%; background:#7B8ABD" | 9:00-10:45 || style="width:40%; background:#BC857A" align="left" | Andrew Vanderstock
 
Session 1 Training
 
Session 1 Training
 
  | style="width:40%; background:#BCA57A" align="left" | Pravir Chandra
 
  | style="width:40%; background:#BCA57A" align="left" | Pravir Chandra
Line 18: Line 18:
 
  | style="width:10%; background:#7B8ABD" | 10:45-11:00 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | ''Morning Tea/Coffee, Vendor Technology Expo'' - ''Espresso Coffee (Sponsored by IBM) provided.''
 
  | style="width:10%; background:#7B8ABD" | 10:45-11:00 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | ''Morning Tea/Coffee, Vendor Technology Expo'' - ''Espresso Coffee (Sponsored by IBM) provided.''
 
  |-
 
  |-
| style="width:10%; background:#7B8ABD" | 11:15-12:15 || style="width:40%; background:#BC857A" align="left" | Christian Heinrich & Darren Skidmore - ''PCI-DSS Application Security''
+
| style="width:10%; background:#7B8ABD" | 11:00-12:30 || style="width:40%; background:#BC857A" align="left" | Andrew Vanderstock
  | style="width:40%; background:#BCA57A" align="left" | Peter Freiberg - ''Determining attack surface and creating security test cases through observing business testing''
+
Session 2 Training
 +
  | style="width:40%; background:#BCA57A" align="left" | Pravir Chandra
 +
Session 2 Training
 
  |-
 
  |-
  | style="width:10%; background:#7B8ABD" | 12:15-13:30 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | ''Lunch, Vendor Technology Expo''
+
  | style="width:10%; background:#7B8ABD" | 12:30-13:30 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | ''Lunch, Vendor Technology Expo''
 +
  |-
 +
| style="width:10%; background:#7B8ABD" | 13:30-13:30 || style="width:40%; background:#BC857A" align="left" | Andrew Vanderstock
 +
Session 3 Training
 +
| style="width:40%; background:#BCA57A" align="left" | Pravir Chandra
 +
Session 3 Training
 
  |-
 
  |-
  | style="width:10%; background:#7B8ABD" | 13:30-14:30 || style="width:40%; background:#BC857A" align="left" | Andrew Vanderstock - ''The future (and past) of web application security how to detect and protect against value attacks''
+
  | style="width:10%; background:#7B8ABD" | 15:30-15:45 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | ''Afternoon Tea/Coffee, Vendor Technology Expo'' - ''Espresso Coffee (Sponsored by IBM) provided.''
  | style="width:40%; background:#BCA57A" align="left" | Siddharth Anbalahan - ''Advanced Techniques in Code Reviews''
+
  |-
 +
| style="width:10%; background:#7B8ABD" | 15:45-17:30 || style="width:40%; background:#BC857A" align="left" | Andrew Vanderstock
 +
Session 4 Training
 +
  | style="width:40%; background:#BCA57A" align="left" | Pravir Chandra
 +
Session 4 Training
 
  |-
 
  |-
  | style="width:10%; background:#7B8ABD" | 14:45-15:45 || style="width:40%; background:#BC857A" align="left" | Ranjita Shankar Iyer - ''A Prescriptive approach to Secure SDLC''
+
  | style="width:10%; background:#7B8ABD" | 17:30 - 19:00 || colspan="2" style="width:80%; background:#669966" align="left" | '''Conference Welcome Cocktail Party''' - ''Sponsored by Fortify Inc.'' Presentation on the Fortify Software Assurance Maturity Model.
| style="width:40%; background:#BCA57A" align="left" | Brett Moore - ''Vulnerabilities In Action''
+
 
|-
+
This is a great opportunity to settle in, meet people at the conference and meet up with industry peers.
| style="width:10%; background:#7B8ABD" | 15:45-16:15 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | ''Afternoon Tea/Coffee, Vendor Technology Expo'' - ''Espresso Coffee (Sponsored by IBM) provided.''
 
|-
 
| style="width:10%; background:#7B8ABD" | 16:15-17:15 || style="width:40%; background:#BC857A" align="left" | Sumit Siddharth - ''Recent Advancements in SQL Injection Exploitation Techniques''
 
| style="width:40%; background:#BCA57A" align="left" | Karmendra Kohli - ''Wooden Swords and Plastic Guns - Insecure Security Defenses''
 
|-
 
| style="width:10%; background:#7B8ABD" | 17:15-18:00 || colspan="2" style="width:40%; background:#F2F2F2" align="left" | Panel - Industry Experts, Talking about real Application Security Threats. ''(You ask the questions, in this informative 45 minutes of panel discussion on relevant industry issues.)''
 
|-
 
| style="width:10%; background:#7B8ABD" | 18:30-19:00 || colspan="2" style="width:80%; background:#669966" align="left" | '''OWASP Social Gathering:''' Pre-Dinner Drinks & Cocktails
 
  
 
Location: Conference Facility Foyer @ Gold Coast Convention Center (Level 1 FOYER)
 
Location: Conference Facility Foyer @ Gold Coast Convention Center (Level 1 FOYER)
 
  |-
 
  |-
| style="width:10%; background:#7B8ABD" | 19:00-22:00 || colspan="2" style="width:80%; background:#669966" align="left" | '''OWASP Social Gathering:''' Gala Dinner, Entertainment and Networking Opportunity. ''This is Free to all attendees and will be a great night.''
 
 
Location: Conference Facility Foyer @ Gold Coast Convention Center (Level 1 FOYER)
 
|-
 
 
|}
 
|}

Latest revision as of 09:56, 18 February 2009

OWASP Australia 2008 Training Schedule - February 25th, 2008

There are two training sessions held in seperate rooms at this year's conference. During the registration process select which training session you will join. Also all meals and a cocktail party are provided for everyone during the training day.

Day 1 - Wednesday Feb 25, 2009
Application Secure Architecture/Coding Course In-depth Assessment Techniques: Design, Code, and Runtime
08:00-09:00 Registration and Coffee - Espresso Coffee (Sponsored by IBM) provided.
9:00-10:45 Andrew Vanderstock

Session 1 Training

Pravir Chandra

Session 1 Training

10:45-11:00 Morning Tea/Coffee, Vendor Technology Expo - Espresso Coffee (Sponsored by IBM) provided.
11:00-12:30 Andrew Vanderstock

Session 2 Training

Pravir Chandra

Session 2 Training

12:30-13:30 Lunch, Vendor Technology Expo
13:30-13:30 Andrew Vanderstock

Session 3 Training

Pravir Chandra

Session 3 Training

15:30-15:45 Afternoon Tea/Coffee, Vendor Technology Expo - Espresso Coffee (Sponsored by IBM) provided.
15:45-17:30 Andrew Vanderstock

Session 4 Training

Pravir Chandra

Session 4 Training

17:30 - 19:00 Conference Welcome Cocktail Party - Sponsored by Fortify Inc. Presentation on the Fortify Software Assurance Maturity Model.

This is a great opportunity to settle in, meet people at the conference and meet up with industry peers.

Location: Conference Facility Foyer @ Gold Coast Convention Center (Level 1 FOYER)