This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Template:OWASP IL 2011 Agenda"

From OWASP
Jump to: navigation, search
Line 1: Line 1:
{| class="wikitable"  
+
{| style="border-collapse: collapse; border-width: 1px; border-style: solid; border-color: #000" cellpadding=5
 +
|- style="border-style: solid; border-width: 1px;font-size:10pt"
 +
|style="border-style: solid; border-width: 1px;color:#1F497D" width="90" height="40" align="center" valign="center" | 08:30-09:15
 +
| align=center valign="center" colspan=2 style="border-style: solid; border-width: 1px;font-size:12pt" | '''Registration, Gathering and Socializing'''
 
|- style="font-size:10pt"
 
|- style="font-size:10pt"
|style="color:#1F497D" width="90" height="40" align="center" valign="center" | 08:30-09:15
+
|style="border-style: solid; border-width: 1px;color:#1F497D" height="25" align="center" valign="center" | 09:15-09:30
| align=center valign="center" colspan=2 style="font-size:12pt" | '''Registration, Gathering and Socializing'''
+
| align=center valign="center" colspan="2" style="border-style: solid; border-width: 1px;font-size:11pt" | '''Opening Words'''  
 
 
|- style="font-size:10pt"
 
|style="color:#1F497D" height="25" align="center" valign="center" | 09:15-09:30
 
| align=center valign="center" colspan="2" style="font-size:11pt" | '''Opening Words'''  
 
 
''Ofer Maor - Chairman, OWASP Israel; Global Membership Committee, OWASP''     
 
''Ofer Maor - Chairman, OWASP Israel; Global Membership Committee, OWASP''     
|- style="font-size:10pt"
+
|- style="border-style: solid; border-width: 1px;font-size:10pt"
|style="color:#1F497D" height="25" align="center" valign="center" | 09:30-10:10
+
|style="border-style: solid; border-width: 1px;color:#1F497D" height="25" align="center" valign="center" | 09:30-10:10
|  align=center valign="center" colspan="2" style="font-size:11pt"| '''Keynote'''
+
|  align=center valign="center" colspan="2" style="border-style: solid; border-width: 1px;font-size:11pt"| '''Keynote'''
 
'''[[OWASP_Israel_2011_Presentations#Composite_Applications_Over_Hybrid_Clouds_.E2.80.93_Enterprise_Security_Challenges_of_the_IT_Supply_Chain|Composite Applications Over Hybrid Clouds –Enterprise Security Challenges of the IT Supply Chain]]'''
 
'''[[OWASP_Israel_2011_Presentations#Composite_Applications_Over_Hybrid_Clouds_.E2.80.93_Enterprise_Security_Challenges_of_the_IT_Supply_Chain|Composite Applications Over Hybrid Clouds –Enterprise Security Challenges of the IT Supply Chain]]'''
  
 
''Dr. Ethan Hadar - Senior Vice President Corporate Technical Strategy, CA''
 
''Dr. Ethan Hadar - Senior Vice President Corporate Technical Strategy, CA''
|- style="font-size:12pt"
+
|- style="border-style: solid; border-width: 1px;font-size:12pt"
|style="color:#1F497D" height="30" align="right" valign="center" |  
+
|style="border-style: solid; border-width: 1px;color:#1F497D" height="30" align="right" valign="center" |  
|  valign="center" align="center" | <u>'''Track #1'''</u>
+
style="border-style: solid; border-width: 1px;" valign="center" align="center" | <u>'''Track #1'''</u>
|  valign="center" align="center" | <u>'''Track #2'''</u>
+
style="border-style: solid; border-width: 1px;" valign="center" align="center" | <u>'''Track #2'''</u>
  
|- style="font-size:10pt"
+
|- style="border-style: solid; border-width: 1px;font-size:10pt"
|style="color:#1F497D" height="25" align="center" valign="center" | 10:15-11:00
+
|style="border-style: solid; border-width: 1px;color:#1F497D" height="25" align="center" valign="center" | 10:15-11:00
|  align="center" valign="top" style="font-size:11pt" | '''[[OWASP_Israel_2011_Presentations#Finding_Security_in_Misery_of_Others|Finding Security in Misery of Others]]'''
+
|  align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" | '''[[OWASP_Israel_2011_Presentations#Finding_Security_in_Misery_of_Others|Finding Security in Misery of Others]]'''
 
''Amichai Shulman - CTO, Imperva''
 
''Amichai Shulman - CTO, Imperva''
 
|  align="center" valign="top" style="font-size:11pt"  | '''[[OWASP_Israel_2011_Presentations#Temporal_Session_Race_Conditions|Temporal Race Conditions]]'''
 
|  align="center" valign="top" style="font-size:11pt"  | '''[[OWASP_Israel_2011_Presentations#Temporal_Session_Race_Conditions|Temporal Race Conditions]]'''
 
''Shay Chen - CTO, Hacktics Advanced Security Center, Ernst & Young''
 
''Shay Chen - CTO, Hacktics Advanced Security Center, Ernst & Young''
|- style="font-size:10pt"
+
|- style="border-style: solid; border-width: 1px;font-size:10pt"
|style="color:#1F497D" height="50" align="center" valign="center" | 11:00-11:15
+
|style="border-style: solid; border-width: 1px;color:#1F497D" height="40" align="center" valign="center" | 11:00-11:15
|  valign="center" align="center" style="font-size:12pt" colspan="2" | &nbsp; '''Coffee Break'''
+
|  valign="center" align="center" style="border-style: solid; border-width: 1px;font-size:12pt" colspan="2" | '''Coffee Break'''
|- style="font-size:10pt"
+
|- style="border-style: solid; border-width: 1px;font-size:10pt"
|style="color:#1F497D" height="25" align="center" valign="center" | 10:15-11:00
+
|style="border-style: solid; border-width: 1px;color:#1F497D" height="25" align="center" valign="center" | 11:15-12:00
|  align="center" valign="top" style="font-size:11pt" | '''[[OWASP_Israel_2011_Presentations#Building_an_Effective_SDLC_Program_-_Case_Study|Building an Effective SDLC Program - Case Study]]'''
+
|  align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5  | '''[[OWASP_Israel_2011_Presentations#Building_an_Effective_SDLC_Program_-_Case_Study|Building an Effective SDLC Program - Case Study]]'''
 
''Guy Bejerano - CSO, Liveperson''
 
''Guy Bejerano - CSO, Liveperson''
  
 
''Ofer Maor - CTO, Seeker Security''
 
''Ofer Maor - CTO, Seeker Security''
|  align="center" valign="top" style="font-size:11pt;margin: 10em auto 10em auto;"  | '''[[OWASP_Israel_2011_Presentations#Space-Time_Tradeoffs_in_Software-Based_Deep_Packet_Inspection|Space-Time Tradeoffs in Software-Based Deep Packet Inspection]]'''
+
|  align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5 | '''[[OWASP_Israel_2011_Presentations#Space-Time_Tradeoffs_in_Software-Based_Deep_Packet_Inspection|Space-Time Tradeoffs in Software-Based Deep Packet Inspection]]'''
 
''Yotam Harchol, IDC''
 
''Yotam Harchol, IDC''
 +
|- style="border-style: solid; border-width: 1px;font-size:10pt"
 +
|style="border-style: solid; border-width: 1px;color:#1F497D" height="25" align="center" valign="center" | 12:00-12:45
 +
|  align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5  | '''[OWASP_Israel_2011_Presentations#All_Your_Mobile_Applications_Are_Belong_to_Us|All Your Mobile Applications Are Belong to Us]]'''
 +
''Itzik Kotler - CTO, Security Art''
 +
|  align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5  | '''[[OWASP_Israel_2011_Presentations#Glass_Box_Testing_-_Think_Inside_the_Box|Glass Box Testing - Thinking Inside the Box]]'''
 +
''Omri Weisman - Manager, Security Research Group, IBM''
  
  
  
 
|}
 
|}

Revision as of 21:06, 16 August 2011

08:30-09:15 Registration, Gathering and Socializing
09:15-09:30 Opening Words  

Ofer Maor - Chairman, OWASP Israel; Global Membership Committee, OWASP   

09:30-10:10 Keynote

Composite Applications Over Hybrid Clouds –Enterprise Security Challenges of the IT Supply Chain

Dr. Ethan Hadar - Senior Vice President Corporate Technical Strategy, CA

  Track #1 Track #2
10:15-11:00 Finding Security in Misery of Others

Amichai Shulman - CTO, Imperva

Temporal Race Conditions

Shay Chen - CTO, Hacktics Advanced Security Center, Ernst & Young

11:00-11:15 Coffee Break
11:15-12:00 Building an Effective SDLC Program - Case Study

Guy Bejerano - CSO, Liveperson

Ofer Maor - CTO, Seeker Security

Space-Time Tradeoffs in Software-Based Deep Packet Inspection

Yotam Harchol, IDC

12:00-12:45 [OWASP_Israel_2011_Presentations#All_Your_Mobile_Applications_Are_Belong_to_Us|All Your Mobile Applications Are Belong to Us]]

Itzik Kotler - CTO, Security Art

Glass Box Testing - Thinking Inside the Box

Omri Weisman - Manager, Security Research Group, IBM