This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Template:OWASP IL 2011 Agenda"
Line 5: | Line 5: | ||
|- style="font-size:10pt" | |- style="font-size:10pt" | ||
|style="border-style: solid; border-width: 1px;color:#1F497D" align="center" valign="center" | 09:15-09:30 | |style="border-style: solid; border-width: 1px;color:#1F497D" align="center" valign="center" | 09:15-09:30 | ||
− | | align=center valign="center" colspan="2" style="border-style: solid; border-width: 1px;font-size:11pt" | '''Opening Words''' | + | | align=center valign="center" colspan="2" style="border-style: solid; border-width: 1px;font-size:11pt" | '''Opening Words'''<br> |
''Ofer Maor - Chairman, OWASP Israel; Global Membership Committee, OWASP'' | ''Ofer Maor - Chairman, OWASP Israel; Global Membership Committee, OWASP'' | ||
|- style="border-style: solid; border-width: 1px;font-size:10pt" | |- style="border-style: solid; border-width: 1px;font-size:10pt" | ||
Line 11: | Line 11: | ||
| align=center valign="center" colspan="2" style="border-style: solid; border-width: 1px;font-size:11pt"| '''Keynote''' | | align=center valign="center" colspan="2" style="border-style: solid; border-width: 1px;font-size:11pt"| '''Keynote''' | ||
'''[[OWASP_Israel_2011_Presentations#Composite_Applications_Over_Hybrid_Clouds_.E2.80.93_Enterprise_Security_Challenges_of_the_IT_Supply_Chain|Composite Applications Over Hybrid Clouds – Enterprise Security Challenges of the IT Supply Chain]]''' | '''[[OWASP_Israel_2011_Presentations#Composite_Applications_Over_Hybrid_Clouds_.E2.80.93_Enterprise_Security_Challenges_of_the_IT_Supply_Chain|Composite Applications Over Hybrid Clouds – Enterprise Security Challenges of the IT Supply Chain]]''' | ||
− | + | <br>''Dr. Ethan Hadar, Senior Vice President Corporate Technical Strategy, CA'' | |
− | ''Dr. Ethan Hadar, Senior Vice President Corporate Technical Strategy, CA'' | ||
|- style="border-style: solid; border-width: 1px;font-size:12pt" | |- style="border-style: solid; border-width: 1px;font-size:12pt" | ||
|style="border-style: solid; border-width: 1px;color:#1F497D" height="30" align="right" valign="center" | | |style="border-style: solid; border-width: 1px;color:#1F497D" height="30" align="right" valign="center" | | ||
Line 20: | Line 19: | ||
|- style="border-style: solid; border-width: 1px;font-size:10pt" | |- style="border-style: solid; border-width: 1px;font-size:10pt" | ||
|style="border-style: solid; border-width: 1px;color:#1F497D" height="25" align="center" valign="center" | 10:15-11:00 | |style="border-style: solid; border-width: 1px;color:#1F497D" height="25" align="center" valign="center" | 10:15-11:00 | ||
− | | align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" | '''[[OWASP_Israel_2011_Presentations#Finding_Security_in_Misery_of_Others|Finding Security in Misery of Others]]''' | + | | align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" | '''[[OWASP_Israel_2011_Presentations#Finding_Security_in_Misery_of_Others|Finding Security in Misery of Others]]'''<br> |
''Amichai Shulman, CTO, Imperva'' | ''Amichai Shulman, CTO, Imperva'' | ||
| align="center" valign="top" style="font-size:11pt" | '''[[OWASP_Israel_2011_Presentations#Temporal_Session_Race_Conditions|Temporal Session Race Conditions]]''' | | align="center" valign="top" style="font-size:11pt" | '''[[OWASP_Israel_2011_Presentations#Temporal_Session_Race_Conditions|Temporal Session Race Conditions]]''' | ||
Line 30: | Line 29: | ||
|style="border-style: solid; border-width: 1px;color:#1F497D" height="25" align="center" valign="center" | 11:15-12:00 | |style="border-style: solid; border-width: 1px;color:#1F497D" height="25" align="center" valign="center" | 11:15-12:00 | ||
| align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5 | '''[[OWASP_Israel_2011_Presentations#Building_an_Effective_SDLC_Program_-_Case_Study|Building an Effective SDLC Program - Case Study]]''' | | align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5 | '''[[OWASP_Israel_2011_Presentations#Building_an_Effective_SDLC_Program_-_Case_Study|Building an Effective SDLC Program - Case Study]]''' | ||
− | ''Guy Bejerano, CSO, Liveperson'' | + | ''Guy Bejerano, CSO, Liveperson''<br> |
− | |||
''Ofer Maor, CTO, Seeker Security'' | ''Ofer Maor, CTO, Seeker Security'' | ||
| align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5 | '''[[OWASP_Israel_2011_Presentations#Space-Time_Tradeoffs_in_Software-Based_Deep_Packet_Inspection|Space-Time Tradeoffs in Software-Based Deep Packet Inspection]]''' | | align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5 | '''[[OWASP_Israel_2011_Presentations#Space-Time_Tradeoffs_in_Software-Based_Deep_Packet_Inspection|Space-Time Tradeoffs in Software-Based Deep Packet Inspection]]''' | ||
Line 62: | Line 60: | ||
|style="border-style: solid; border-width: 1px;color:#1F497D" height="25" align="center" valign="center" | 15:30-16:15 | |style="border-style: solid; border-width: 1px;color:#1F497D" height="25" align="center" valign="center" | 15:30-16:15 | ||
| align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5 | '''[[OWASP_Israel_2011_Presentations#Security_Testing_of_RESTful_Services|Security Testing of RESTful Services]]''' | | align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5 | '''[[OWASP_Israel_2011_Presentations#Security_Testing_of_RESTful_Services|Security Testing of RESTful Services]]''' | ||
− | ''Ofer Shezaf, Head of AppSec Research, HP'' | + | ''Ofer Shezaf, Head of AppSec Research, HP''<br> |
− | |||
''Eyal Fingold, Senior Security Developer, HP'' | ''Eyal Fingold, Senior Security Developer, HP'' | ||
| align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5 | '''[[OWASP_Israel_2011_Presentations#Hey.2C_What.E2.80.99s_your_App_is_doing_on_my_.28Smart.29Phone.3F|Hey, What’s your App is doing on my (Smart)Phone?]]''' | | align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5 | '''[[OWASP_Israel_2011_Presentations#Hey.2C_What.E2.80.99s_your_App_is_doing_on_my_.28Smart.29Phone.3F|Hey, What’s your App is doing on my (Smart)Phone?]]''' |
Revision as of 21:41, 16 August 2011
08:30-09:15 | Registration, Gathering and Socializing | |
09:15-09:30 | Opening Words Ofer Maor - Chairman, OWASP Israel; Global Membership Committee, OWASP | |
09:30-10:10 | Keynote
Composite Applications Over Hybrid Clouds – Enterprise Security Challenges of the IT Supply Chain
| |
Track #1 | Track #2 | |
10:15-11:00 | Finding Security in Misery of Others Amichai Shulman, CTO, Imperva |
Temporal Session Race Conditions
Shay Chen, CTO, Hacktics Advanced Security Center, Ernst & Young |
11:00-11:15 | Coffee Break | |
11:15-12:00 | Building an Effective SDLC Program - Case Study
Guy Bejerano, CSO, Liveperson |
Space-Time Tradeoffs in Software-Based Deep Packet Inspection
Yotam Harchol, IDC |
12:00-12:45 | All Your Mobile Applications Are Belong to Us
Itzik Kotler, CTO, Security Art |
Glass Box Testing - Thinking Inside the Box
Omri Weisman, Manager, Security Research Group, IBM |
12:45-13:45 | Lunch Break | |
13:45-14:30 | CMS And Other Giants - The Nightmare of AppSec Testing
Irene Abezgauz, Product Manager, Seeker Security |
SDL for Agile
Avi Douglen, Independent Security Architect & Developer |
14:30-15:15 | When Crypto Goes Wrong
Erez Metula, Founder, AppSec Labs |
Advanced Techniques & Tools for Testing Binary Protocols
Chilik Tamir, Information Security Architect, AppSec Labs |
15:15-15:30 | Coffee Break | |
15:30-16:15 | Security Testing of RESTful Services
Ofer Shezaf, Head of AppSec Research, HP |
Hey, What’s your App is doing on my (Smart)Phone?
Shay Zalalichin, CTO, Comsec |
16:15-17:00 | The Bank Job
Adi Sharabani, Cross-Rational Security Strategy and Architecture, IBM | |
17:00-17:05 | End Notes
Ofer Maor - Chairman, OWASP Israel; Global Membership Committee, OWASP |