This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Summit 2011 Working Sessions/Session068"
From OWASP
| (28 intermediate revisions by 16 users not shown) | |||
| Line 2: | Line 2: | ||
|- | |- | ||
| − | | | + | | summit_session_attendee_name1 = Colin Watson |
| − | | | + | | summit_session_attendee_email1 = [email protected] |
| + | | summit_session_attendee_username1 = | ||
| + | | summit_session_attendee_company1= | ||
| + | | summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed1=1. AppSensor equivalent for application-aware configuration monitoring (file integrity, file additions, database integrity, config settings, patching, etc)? 2. Application surface/entry point definition language? | ||
| + | |||
| + | | summit_session_attendee_name1 = Eoin Keary | ||
| + | | summit_session_attendee_email1 = [email protected] | ||
| + | | summit_session_attendee_username1 = EoinKeary | ||
| + | | summit_session_attendee_company1=Ernst & Young | ||
| + | | summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed1= | ||
| + | |||
| + | | summit_session_attendee_name2 = Dinis Cruz | ||
| + | | summit_session_attendee_email2 = [email protected] | ||
| + | | summit_session_attendee_username2 = | ||
| + | | summit_session_attendee_company2= | ||
| + | | summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed2= | ||
| + | |||
| + | | summit_session_attendee_name3 = Chris Schmidt | ||
| + | | summit_session_attendee_email3 = [email protected] | ||
| + | | summit_session_attendee_username3 = | ||
| + | | summit_session_attendee_company3= Aspect Security | ||
| + | | summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed3= | ||
| + | |||
| + | | summit_session_attendee_name4 = Justin Clarke | ||
| + | | summit_session_attendee_email4 = [email protected] | ||
| + | | summit_session_attendee_username4 = | ||
| + | | summit_session_attendee_company4=Gotham Digital Science | ||
| + | | summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed4= | ||
| + | |||
| + | | summit_session_attendee_name5 = Matthias Rohr | ||
| + | | summit_session_attendee_email5 = [email protected] | ||
| + | | summit_session_attendee_username5 = | ||
| + | | summit_session_attendee_company5= SEC Consult | ||
| + | | summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed5= | ||
| + | |||
| + | | summit_session_attendee_name6 = Matteo Meucci | ||
| + | | summit_session_attendee_email6 = [email protected] | ||
| + | | summit_session_attendee_username6 = | ||
| + | | summit_session_attendee_company6= | ||
| + | | summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed6= | ||
| + | |||
| + | | summit_session_attendee_name7 = Mateo Martinez | ||
| + | | summit_session_attendee_email7 = [email protected] | ||
| + | | summit_session_attendee_username7 = | ||
| + | | summit_session_attendee_company7= | ||
| + | | summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed7= | ||
| + | |||
| + | | summit_session_attendee_name8 = Ofer Maor | ||
| + | | summit_session_attendee_email8 = [email protected] | ||
| + | | summit_session_attendee_username8 = | ||
| + | | summit_session_attendee_company8= | ||
| + | | summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed8= | ||
| + | |||
| + | | summit_session_attendee_name9 = Wojciech Dworakowski | ||
| + | | summit_session_attendee_email9 = [email protected] | ||
| + | | summit_session_attendee_username9 = Wojciech Dworakowski | ||
| + | | summit_session_attendee_company9= SecuRing | ||
| + | | summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed9= | ||
| + | |||
| + | | summit_session_attendee_name10 = Tobias Gondrom | ||
| + | | summit_session_attendee_email10 = [email protected] | ||
| + | | summit_session_attendee_username10 = Tgondrom | ||
| + | | summit_session_attendee_company10= IETF | ||
| + | | summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed10= | ||
| + | |||
| + | | summit_session_attendee_name11 = | ||
| + | | summit_session_attendee_email11 = | ||
| + | | summit_session_attendee_username11 = | ||
| + | | summit_session_attendee_company11= | ||
| + | | summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed11= | ||
| + | |||
| + | | summit_session_attendee_name12 = | ||
| + | | summit_session_attendee_email12 = | ||
| + | | summit_session_attendee_username12 = | ||
| + | | summit_session_attendee_company12= | ||
| + | | summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed12= | ||
| + | |||
| + | | summit_session_attendee_name13 = | ||
| + | | summit_session_attendee_email13 = | ||
| + | | summit_session_attendee_username13 = | ||
| + | | summit_session_attendee_company13= | ||
| + | | summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed13= | ||
| + | |||
| + | | summit_session_attendee_name14 = | ||
| + | | summit_session_attendee_email14 = | ||
| + | | summit_session_attendee_username14 = | ||
| + | | summit_session_attendee_company14= | ||
| + | | summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed14= | ||
| + | |||
| + | | summit_session_attendee_name15 = | ||
| + | | summit_session_attendee_email15 = | ||
| + | | summit_session_attendee_username15 = | ||
| + | | summit_session_attendee_company15= | ||
| + | | summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed15= | ||
| + | |||
| + | | summit_session_attendee_name16 = | ||
| + | | summit_session_attendee_email16 = | ||
| + | | summit_session_attendee_username16 = | ||
| + | | summit_session_attendee_company16= | ||
| + | | summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed16= | ||
| + | |||
| + | | summit_session_attendee_name17 = | ||
| + | | summit_session_attendee_email17 = | ||
| + | | summit_session_attendee_username17 = | ||
| + | | summit_session_attendee_company17= | ||
| + | | summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed17= | ||
| + | |||
| + | | summit_session_attendee_name18 = | ||
| + | | summit_session_attendee_email18 = | ||
| + | | summit_session_attendee_username18 = | ||
| + | | summit_session_attendee_company18= | ||
| + | | summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed18= | ||
| + | |||
| + | | summit_session_attendee_name19 = | ||
| + | | summit_session_attendee_email19 = | ||
| + | | summit_session_attendee_username19 = | ||
| + | | summit_session_attendee_company19= | ||
| + | | summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed19= | ||
| + | |||
| + | | summit_session_attendee_name20 = | ||
| + | | summit_session_attendee_email20 = | ||
| + | | summit_session_attendee_username20 = | ||
| + | | summit_session_attendee_company20= | ||
| + | | summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed20= | ||
| + | |- | ||
| + | | summit_track_logo = [[Image:T._individual_projects.jpg]] | ||
| + | | summit_ws_logo = [[Image:WS._individual_projects.jpg]] | ||
| + | | summit_session_name = Enterprise Web Defense Roundtable | ||
| + | | summit_session_url = http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session068 | ||
| + | | mailing_list = | ||
|- | |- | ||
| − | | short_working_session_description= | + | | short_working_session_description=How are enterprises defending web applications. Discussion of best practices, effective methods, and new ideas to enhance web application defense. |
|- | |- | ||
| Line 28: | Line 157: | ||
|- | |- | ||
| − | | summit_session_objective_name1= | + | | summit_session_objective_name1= What techniques are effective for scaling web security within a large company? |
| − | | summit_session_objective_name2 = | + | | summit_session_objective_name2 = Strategies for developer education that work? |
| − | | summit_session_objective_name3 = | + | | summit_session_objective_name3 = Automated defenses - what techniques are currently in use? |
| − | | summit_session_objective_name4 = | + | | summit_session_objective_name4 = Benefits/considerations for using security bounty programs and public hacking initiatives. |
| − | | summit_session_objective_name5 = | + | | summit_session_objective_name5 = What can OWASP build or develop to assist with enterprise wide application security? |
|- | |- | ||
| Line 56: | Line 185: | ||
|- | |- | ||
| − | |summit_session_deliverable_name1 = | + | |summit_session_deliverable_name1 = A white paper detailing specific recommendations for Enterprise Web Security. |
| − | |||
| − | |summit_session_deliverable_name2 = | + | |summit_session_deliverable_name2 = A plan for building an ecosystem specifically targeting enterprise web security. What does it take to scientifically advance the state of the art? |
| − | |||
|summit_session_deliverable_name3 = | |summit_session_deliverable_name3 = | ||
| − | |||
|summit_session_deliverable_name4 = | |summit_session_deliverable_name4 = | ||
| − | |||
|summit_session_deliverable_name5 = | |summit_session_deliverable_name5 = | ||
| − | | | + | |
| + | |summit_session_deliverable_name6 = | ||
| + | |||
| + | |summit_session_deliverable_name7 = | ||
| + | |||
| + | |summit_session_deliverable_name8 = | ||
|- | |- | ||
| − | | summit_session_leader_name1 = | + | | summit_session_leader_name1 = Michael Coates |
| − | | summit_session_leader_email1 = | + | | summit_session_leader_email1 = [email protected] |
| − | |||
| − | | summit_session_leader_name2 = | + | | summit_session_leader_name2 = Chris Lyon |
| − | | summit_session_leader_email2 = | + | | summit_session_leader_email2 = [email protected] |
| − | |||
| summit_session_leader_name3 = | | summit_session_leader_name3 = | ||
| summit_session_leader_email3 = | | summit_session_leader_email3 = | ||
| − | | | + | | summit_session_leader_username3 = |
|- | |- | ||
| Line 89: | Line 217: | ||
| operational_leader_name1 = | | operational_leader_name1 = | ||
| operational_leader_email1 = | | operational_leader_email1 = | ||
| − | | | + | | operational_leader_username1 = |
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
|- | |- | ||
Latest revision as of 23:18, 6 February 2011
Global Summit 2011 Home Page
Global Summit 2011 Tracks
| Please see/use the 'discussion' page for more details about this Working Session | ||||||
|---|---|---|---|---|---|---|
| Working Sessions Operational Rules - Please see here the general frame of rules. |
| WORKING SESSION IDENTIFICATION | ||||||
|---|---|---|---|---|---|---|
| Short Work Session Description | How are enterprises defending web applications. Discussion of best practices, effective methods, and new ideas to enhance web application defense. | |||||
| Related Projects (if any) |
| |||||
| Email Contacts & Roles | Chair Michael Coates @ Chris Lyon @ |
Operational Manager |
Mailing list Subscription Page | |||
| WORKING SESSION SPECIFICS | ||||||
|---|---|---|---|---|---|---|
| Objectives |
| |||||
| Venue/Date&Time/Model | Venue/Room OWASP Global Summit Portugal 2011 |
Date & Time
|
Discussion Model participants and attendees | |||
| |
|---|
| WORKING SESSION OPERATIONAL RESOURCES | ||||||
|---|---|---|---|---|---|---|
| Projector, whiteboards, markers, Internet connectivity, power | ||||||
| |
|---|
| WORKING SESSION ADDITIONAL DETAILS | ||||||
|---|---|---|---|---|---|---|
| WORKING SESSION OUTCOMES / DELIVERABLES | ||
|---|---|---|
| Proposed by Working Group | Approved by OWASP Board | |
|
A white paper detailing specific recommendations for Enterprise Web Security. |
After the Board Meeting - fill in here. | |
| After the Board Meeting - fill in here. | ||
| After the Board Meeting - fill in here. | ||
| After the Board Meeting - fill in here. | ||
| After the Board Meeting - fill in here. | ||
| After the Board Meeting - fill in here. | ||
| After the Board Meeting - fill in here. | ||
| After the Board Meeting - fill in here. | ||
Working Session Participants
(Add you name by clicking "edit" on the tab on the upper left side of this page)
| WORKING SESSION PARTICIPANTS | ||||||
|---|---|---|---|---|---|---|
| Name | Company | Notes & reason for participating, issues to be discussed/addressed | ||||
| Eoin Keary @ |
Ernst & Young |
| ||||
| Dinis Cruz @ |
| |||||
| Chris Schmidt @ |
Aspect Security |
| ||||
| Justin Clarke @ |
Gotham Digital Science |
| ||||
| Matthias Rohr @ |
SEC Consult |
| ||||
| Matteo Meucci @ |
| |||||
| Mateo Martinez @ |
| |||||
| Ofer Maor @ |
| |||||
| Wojciech Dworakowski @ |
SecuRing |
| ||||
| Tobias Gondrom @ |
IETF |
| ||||
| |
| |||||
| |
| |||||
| |
| |||||
| |
| |||||
| |
| |||||
| |
| |||||
| |
| |||||
| |
| |||||
| |
| |||||
| |
| |||||