This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "BeNeLux OWASP Day 2009 draft agenda"
From OWASP
| (10 intermediate revisions by the same user not shown) | |||
| Line 1: | Line 1: | ||
| − | {| | + | {| border="0" align="center" style="width: 80%;" |
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
|- | |- | ||
| − | + | ! align="center" colspan="3" | '''College De Valck''' - December 2, 2009 | |
| − | |||
| − | |||
| − | |||
| − | ''' | ||
| − | |||
| − | |||
|- | |- | ||
| − | + | | style="background: rgb(123, 138, 189) none repeat scroll 0% 0%; width: 15%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;" | 12:00 - 12:30 | |
| − | + | | align="left" style="background: rgb(194, 194, 194) none repeat scroll 0% 0%; width: 75%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;" colspan="2" | Registration | |
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
|- | |- | ||
| − | + | | style="background: rgb(123, 138, 189) none repeat scroll 0% 0%; width: 15%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;" | 12:30 - 15:30 | |
| − | + | | align="center" style="background: rgb(242, 242, 242) none repeat scroll 0% 0%; width: 75%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;" colspan="2" | OWASP Live CD - WebGoat workshop | |
| − | + | '''Erwin Geirnaert & Martin Knobloch''' | |
| − | + | ||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | ''' | ||
|- | |- | ||
| − | + | | style="background: rgb(123, 138, 189) none repeat scroll 0% 0%; width: 15%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;" | 15:30 - 16:00 | |
| + | | align="left" style="background: rgb(194, 194, 194) none repeat scroll 0% 0%; width: 75%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;" colspan="2" | Break | ||
| + | |- | ||
| + | | style="background: rgb(123, 138, 189) none repeat scroll 0% 0%; width: 15%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;" | 16:00 - 16:35 | ||
| + | | align="center" style="background: rgb(242, 242, 242) none repeat scroll 0% 0%; width: 75%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;" colspan="2" | [[BeNeLux09 - Secure development (for a secure planet).|Secure development (for a secure planet).]] | ||
| + | '''Eoin Keary''' | ||
| + | |||
| + | |- | ||
| + | | style="background: rgb(123, 138, 189) none repeat scroll 0% 0%; width: 15%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;" | 16:35 - 17:10 | ||
| + | | align="center" style="background: rgb(242, 242, 242) none repeat scroll 0% 0%; width: 75%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;" colspan="2" | [[WAF and Business Logic Attacks]] | ||
| + | '''Noa Bar-Yosef''' | ||
| + | |||
| + | |- | ||
| + | | style="background: rgb(123, 138, 189) none repeat scroll 0% 0%; width: 15%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;" | 17:10 - 17:45 | ||
| + | | align="center" style="background: rgb(242, 242, 242) none repeat scroll 0% 0%; width: 75%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;" colspan="2" | [[Compliance driven vulnerabilities]] | ||
| + | '''Colin Watson''' | ||
| + | |||
| + | |- | ||
| + | | style="background: rgb(123, 138, 189) none repeat scroll 0% 0%; width: 15%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;" | 17:45 - 18:25 | ||
| + | | align="left" style="background: rgb(194, 194, 194) none repeat scroll 0% 0%; width: 75%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;" colspan="2" | Dinner (Sandwiches)<br> | ||
| + | |- | ||
| + | | style="background: rgb(123, 138, 189) none repeat scroll 0% 0%; width: 15%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;" | 18:25 - 19:00 | ||
| + | | align="center" style="background: rgb(242, 242, 242) none repeat scroll 0% 0%; width: 75%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;" colspan="2" | [[SHA-3 Competition: The Quest for Long-Term Security in Cryptographic Hashing]] | ||
| + | '''Bart Preneel''' | ||
| + | |||
| + | |- | ||
| + | | style="background: rgb(123, 138, 189) none repeat scroll 0% 0%; width: 15%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;" | 19:00 - 19:35 | ||
| + | | align="center" style="background: rgb(242, 242, 242) none repeat scroll 0% 0%; width: 75%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;" colspan="2" | [[BeNeLux09 - Web Application Firewalls: Detection, Bypassing and Exploitation|Web Application Firewalls: Detection, Bypassing and Exploitation]] | ||
| + | '''Sandro Gauci''' | ||
| + | |||
| + | |- | ||
| + | | style="background: rgb(123, 138, 189) none repeat scroll 0% 0%; width: 15%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;" | 19:35 - 20:10 | ||
| + | | align="center" style="background: rgb(242, 242, 242) none repeat scroll 0% 0%; width: 75%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;" colspan="2" | [[The OWASP Top 10 is dead, long live the OWASP Top 10 !]] | ||
| + | '''Sebastien Deleersnyder''' | ||
| + | |||
| + | |- | ||
| + | | style="background: rgb(123, 138, 189) none repeat scroll 0% 0%; width: 15%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;" | 20:10 - 20:40 | ||
| + | | align="left" style="background: rgb(194, 194, 194) none repeat scroll 0% 0%; width: 75%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;" colspan="2" | Break | ||
| + | |- | ||
| + | | style="background: rgb(123, 138, 189) none repeat scroll 0% 0%; width: 15%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;" | 20:40 - 21:15 | ||
| + | | align="center" style="background: rgb(242, 242, 242) none repeat scroll 0% 0%; width: 75%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;" colspan="2" | [[BeNeLux09 - Hybrid Analysis 2.0 - A demonstration of precision results correlation for improved software security testing|Hybrid Analysis 2.0 - A demonstration of precision results correlation for improved software security testing]] | ||
| + | '''Roger Thornton''' | ||
| + | |||
| + | |- | ||
| + | | style="background: rgb(123, 138, 189) none repeat scroll 0% 0%; width: 15%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;" | 21:15 - 21:50 | ||
| + | | align="center" style="background: rgb(242, 242, 242) none repeat scroll 0% 0%; width: 75%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;" colspan="2" | SDLC pannel | ||
| + | '''Migchiel de Jong (Fortify), Bart De Win (Ascure), Florence Mottay (Cigital), moderator: Sebastien Deleersnyder (OWASP Foundation)''' | ||
| + | |||
| + | |} | ||
[[Category:OWASP_AppSec_Conference]] [[Category:OWASP_BeNeLux_09]] | [[Category:OWASP_AppSec_Conference]] [[Category:OWASP_BeNeLux_09]] | ||
Latest revision as of 21:00, 16 November 2009
| College De Valck - December 2, 2009 | ||
|---|---|---|
| 12:00 - 12:30 | Registration | |
| 12:30 - 15:30 | OWASP Live CD - WebGoat workshop
Erwin Geirnaert & Martin Knobloch | |
| 15:30 - 16:00 | Break | |
| 16:00 - 16:35 | Secure development (for a secure planet).
Eoin Keary | |
| 16:35 - 17:10 | WAF and Business Logic Attacks
Noa Bar-Yosef | |
| 17:10 - 17:45 | Compliance driven vulnerabilities
Colin Watson | |
| 17:45 - 18:25 | Dinner (Sandwiches) | |
| 18:25 - 19:00 | SHA-3 Competition: The Quest for Long-Term Security in Cryptographic Hashing
Bart Preneel | |
| 19:00 - 19:35 | Web Application Firewalls: Detection, Bypassing and Exploitation
Sandro Gauci | |
| 19:35 - 20:10 | The OWASP Top 10 is dead, long live the OWASP Top 10 !
Sebastien Deleersnyder | |
| 20:10 - 20:40 | Break | |
| 20:40 - 21:15 | Hybrid Analysis 2.0 - A demonstration of precision results correlation for improved software security testing
Roger Thornton | |
| 21:15 - 21:50 | SDLC pannel
Migchiel de Jong (Fortify), Bart De Win (Ascure), Florence Mottay (Cigital), moderator: Sebastien Deleersnyder (OWASP Foundation) | |