This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "2010 BASC Agenda"
(23 intermediate revisions by 3 users not shown) | |||
Line 1: | Line 1: | ||
{{2010_BASC:Header_Template | Agenda}} | {{2010_BASC:Header_Template | Agenda}} | ||
− | |||
<!-- -------------------------------------------------------------------- | <!-- -------------------------------------------------------------------- | ||
INSTRUCTIONS FOR EDITORS: | INSTRUCTIONS FOR EDITORS: | ||
Line 43: | Line 42: | ||
|- | |- | ||
| style="width:10%; background:#9BA8CF" align="center" | 8:00-9:00 || colspan="2" style="width:80%; background:#D2D2D2" align="center" | | | style="width:10%; background:#9BA8CF" align="center" | 8:00-9:00 || colspan="2" style="width:80%; background:#D2D2D2" align="center" | | ||
− | <div style="font-size: | + | <div> |
− | '''Breakfast and Registration'''<br/> | + | <span style="font-size:130%">'''Breakfast and Registration'''</span><br/> |
− | provided by our Platinum Sponsor | + | provided by our Platinum Sponsor |
</div> | </div> | ||
{| border="1" | {| border="1" | ||
Line 52: | Line 51: | ||
|- | |- | ||
| style="width:10%; background:#7B8ABD" align="center" | 09:00-09:50 || colspan="2" style="width:80%; background:#B0B0B0;" align="center" | | | style="width:10%; background:#7B8ABD" align="center" | 09:00-09:50 || colspan="2" style="width:80%; background:#B0B0B0;" align="center" | | ||
− | + | <div style="margin:10px;"> | |
+ | <span style="font-size: 130%">'''[[2010_BASC_Presentations#Keynote|Keynote: From the Era of Vulnerabiquity to the Rugged Age]]'''</span><br/> | ||
+ | <span style="font-size: 120%">[[2010_BASC_Speakers#Josh Corman|Josh Corman]]</span><br/> | ||
+ | </div> | ||
|- | |- | ||
| style="width:10%; background:#9BA8CF" | || align="center" style="width:30%; background:#CFA49B" | '''Track 1'''<br/>Horace Mann Room | | style="width:10%; background:#9BA8CF" | || align="center" style="width:30%; background:#CFA49B" | '''Track 1'''<br/>Horace Mann Room | ||
Line 59: | Line 61: | ||
| style="width:10%; background:#7B8ABD" align="center" | 10:00-10:50 || style="width:30%; background:#BC857A" align="center" | | | style="width:10%; background:#7B8ABD" align="center" | 10:00-10:50 || style="width:30%; background:#BC857A" align="center" | | ||
{{2010_BASC:Presentaton_Agenda_Template|Presentation|HTML5 Security|Ming Chow}} | {{2010_BASC:Presentaton_Agenda_Template|Presentation|HTML5 Security|Ming Chow}} | ||
− | | style="width:30%; background:#BCA57A" align="center" | | + | | style="width:30%; background:#BCA57A" align="center" rowspan="2" | |
{{2010_BASC:Presentaton_Agenda_Template|Presentation|OWASP Basics 1 and 2|Robert Cheyne}} | {{2010_BASC:Presentaton_Agenda_Template|Presentation|OWASP Basics 1 and 2|Robert Cheyne}} | ||
|- | |- | ||
| style="width:10%; background:#9BA8CF" align="center" | 11:00-11:50 || style="width:30%; background:#CFA49B" align="center" | | | style="width:10%; background:#9BA8CF" align="center" | 11:00-11:50 || style="width:30%; background:#CFA49B" align="center" | | ||
{{2010_BASC:Presentaton_Agenda_Template|Presentation|A Crumple Zone for Service Oriented Architectures|Andrew Gronosky}} | {{2010_BASC:Presentaton_Agenda_Template|Presentation|A Crumple Zone for Service Oriented Architectures|Andrew Gronosky}} | ||
− | |||
− | |||
|- | |- | ||
| style="width:10%; background:#7B8ABD" align="center" | 12:00-13:00 || colspan="2" style="width:80%; background:#F2F2F2" align="center" | | | style="width:10%; background:#7B8ABD" align="center" | 12:00-13:00 || colspan="2" style="width:80%; background:#F2F2F2" align="center" | | ||
− | '''Lunch provided by our platinum sponsor | + | <span style="font-size:130%">'''Lunch'''</span><br/> |
+ | provided by our platinum sponsor | ||
{| border="1" | {| border="1" | ||
|[[File:SI-Banner-238x57.jpg|link=http://www.securityinnovation.com|Security Innovation]] | |[[File:SI-Banner-238x57.jpg|link=http://www.securityinnovation.com|Security Innovation]] | ||
Line 74: | Line 75: | ||
|- | |- | ||
| style="width:10%; background:#7B8ABD" align="center" | 13:00-13:50 || style="width:30%; background:#BC857A" align="center" | | | style="width:10%; background:#7B8ABD" align="center" | 13:00-13:50 || style="width:30%; background:#BC857A" align="center" | | ||
− | + | {{2010_BASC:Presentaton_Agenda_Template|Presentation|Hacking SAP BusinessObjects|Joshua Abraham and Will Vandevanter}} | |
− | + | | style="width:30%; background:#DFC799" align="center" | | |
− | + | {{2010_BASC:Presentaton_Agenda_Template|Presentation|Coffee Shop Warfare:Protecting Yourself in Dark Territory|John Carmichael}} | |
− | |||
− | |||
− | | style="width:30%; background:# | ||
− | |||
− | |||
− | |||
− | |||
|- | |- | ||
| style="width:10%; background:#7B8ABD" align="center" | 14:00-14:50 || style="width:30%; background:#CFA49B" align="center" | | | style="width:10%; background:#7B8ABD" align="center" | 14:00-14:50 || style="width:30%; background:#CFA49B" align="center" | | ||
− | + | {{2010_BASC:Presentaton_Agenda_Template|Presentation|What's Old Is New Again: An Overview of Mobile Application Security|Zach Lanier}} | |
− | |||
− | |||
− | |||
− | |||
| style="width:30%; background:#DFC799" align="center" | | | style="width:30%; background:#DFC799" align="center" | | ||
− | + | {{2010_BASC:Presentaton_Agenda_Template|Presentation|Url Enlargement|Dan Crowley}} | |
− | |||
− | |||
− | |||
− | |||
|- | |- | ||
| style="width:10%; background:#7B8ABD" align="center" | 15:00-15:50 || style="width:30%; background:#BC857A" align="center" | | | style="width:10%; background:#7B8ABD" align="center" | 15:00-15:50 || style="width:30%; background:#BC857A" align="center" | | ||
− | + | {{2010_BASC:Presentaton_Agenda_Template|Presentation|Business Logic Attacks - BATs and BLBs|Paul Schofield}} | |
− | + | | style="width:30%; background:#DFC799" align="center" | | |
− | + | {{2010_BASC:Presentaton_Agenda_Template|Presentation|Web Applications and Data Tokenization|Kenny Smith}} | |
− | |||
− | |||
− | | style="width:30%; background:# | ||
− | |||
− | |||
− | |||
− | |||
|- | |- | ||
| style="width:10%; background:#7B8ABD" align="center" | 16:00-16:50 || style="width:30%; background:#CFA49B" align="center" | | | style="width:10%; background:#7B8ABD" align="center" | 16:00-16:50 || style="width:30%; background:#CFA49B" align="center" | | ||
− | + | {{2010_BASC:Presentaton_Agenda_Template|Presentation|The Exploit Arms Race|Christien Rioux}} | |
− | |||
− | |||
− | |||
− | |||
| style="width:30%; background:#DFC799" align="center" | | | style="width:30%; background:#DFC799" align="center" | | ||
− | + | {{2010_BASC:Presentaton_Agenda_Template|Presentation|Open SAMM|Shakeel Tufail}} | |
− | + | |- | |
− | |||
|- | |- | ||
| style="width:10%; background:#7B8ABD" align="center" | 17:00-17:30 || colspan="2" style="width:30%; background:#C2C2C2" align="center" | | | style="width:10%; background:#7B8ABD" align="center" | 17:00-17:30 || colspan="2" style="width:30%; background:#C2C2C2" align="center" | | ||
− | '''Social Time provided by our platinum sponsor | + | <span style="font-size:130%">'''Social Time'''</span><br/> |
+ | provided by our platinum sponsor | ||
{| border="1" | {| border="1" | ||
| [[File:boston-2010-source-277x70.jpg|link=http://www.sourceconference.com|SOURCE]] | | [[File:boston-2010-source-277x70.jpg|link=http://www.sourceconference.com|SOURCE]] | ||
Line 129: | Line 104: | ||
|- | |- | ||
| style="width:10%; background:#7B8ABD" align="center" | 17:30-18:30 || colspan="2" style="width:30%; background:#D2D2D2" align="center" | | | style="width:10%; background:#7B8ABD" align="center" | 17:30-18:30 || colspan="2" style="width:30%; background:#D2D2D2" align="center" | | ||
− | '''Expert Panel:'''<br> | + | <span style="font-size:130%">'''Expert Panel: Will we ''EVER'' be Secure?'''</span><br> |
− | ''[http://authorurl.com | + | '' |
− | [http://authorurl.com | + | Moderator:[http://authorurl.com Rob Cheyne], CEO, Safelight Security Advisors<br> |
− | [http://authorurl.com | + | Panelist:[http://authorurl.com Josh Corman], Security Analyst, The 451 Group <br> |
− | [http://authorurl.com | + | Panelist:[http://authorurl.com Justin Peavey], CISO, Omgeo <br> |
− | [http://authorurl.com | + | Panelist:[http://authorurl.com Brian Weekes], Linux Infrastructure Lead, GMO<br> |
− | + | Panelist:[http://authorurl.com Adriel DeSautels], CTO, NetRagard<br> | |
− | + | Panelist:[http://authorurl.com Shakeel Tufail], Security Analyst, Fortify<br> | |
− | |||
+ | ''<br> | ||
|- | |- | ||
| style="width:10%; background:#7B8ABD" align="center" | 18:30-19:00 || colspan="2" style="width:30%; background:#99FF99" align="center" | | | style="width:10%; background:#7B8ABD" align="center" | 18:30-19:00 || colspan="2" style="width:30%; background:#99FF99" align="center" | | ||
− | '''Wrap Up'''<br> | + | <span style="font-size:130%">'''Wrap Up'''</span><br> |
|} | |} | ||
− | |||
{{2010_BASC:Footer_Template | Agenda}} | {{2010_BASC:Footer_Template | Agenda}} |
Latest revision as of 22:36, 18 November 2010
We kindly thank our sponsors for their support. Please help us keep future BASCs free by viewing and visiting all of our sponsors.
Agenda
Saturday, November 20 | |||
---|---|---|---|
8:00-9:00 |
Breakfast and Registration | ||
09:00-09:50 | |||
Track 1 Horace Mann Room |
Track 2 Deborah Sampson / Paul Thomas Room | ||
10:00-10:50 | |||
11:00-11:50 | |||
12:00-13:00 |
Lunch | ||
13:00-13:50 | |||
14:00-14:50 | |||
15:00-15:50 | |||
16:00-16:50 | |||
17:00-17:30 |
Social Time | ||
17:30-18:30 |
Expert Panel: Will we EVER be Secure?
| ||
18:30-19:00 |
Wrap Up |
We kindly thank our sponsors for their support.
Please help us keep future BASCs free by viewing and visiting all of our sponsors.
Gold Sponsors | |||