This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "2011 BASC Agenda"
From OWASP
Tom Conner (talk | contribs) m |
Tom Conner (talk | contribs) |
||
Line 1: | Line 1: | ||
− | {{ | + | {{2012_BASC:Header_Template | Agenda}} |
<!-- -------------------------------------------------------------------- | <!-- -------------------------------------------------------------------- | ||
INSTRUCTIONS FOR EDITORS: | INSTRUCTIONS FOR EDITORS: | ||
Line 57: | Line 57: | ||
<div style="margin:10px;"> | <div style="margin:10px;"> | ||
<span style="font-size:130%">'''Keynote'''</span><br> | <span style="font-size:130%">'''Keynote'''</span><br> | ||
− | <span style="font-size: 120%">[[ | + | <span style="font-size: 120%">[[2012_BASC_Speakers#Rob Cheyne|Rob Cheyne]]</span><br/> |
</div> | </div> | ||
|- | |- | ||
Line 64: | Line 64: | ||
|- | |- | ||
| style="width:10%; background:#7B8ABD" align="center" | 10:00-10:50 || style="width:30%; background:#BC857A" align="center" | | | style="width:10%; background:#7B8ABD" align="center" | 10:00-10:50 || style="width:30%; background:#BC857A" align="center" | | ||
− | {{ | + | {{2012_BASC:Presentaton_Agenda_Template|Presentation|Reversing Web Applications|Andrew Wilson}} |
| style="width:30%; background:#BCA57A" align="center" | | | style="width:30%; background:#BCA57A" align="center" | | ||
− | {{ | + | {{2012_BASC:Presentaton_Agenda_Template|Presentation|Don't Get Pwn3d By Your Phone|John Carmichael}} |
|- | |- | ||
| style="width:10%; background:#7B8ABD" align="center" | 11:00-11:50 || style="width:30%; background:#CFA49B" align="center" | | | style="width:10%; background:#7B8ABD" align="center" | 11:00-11:50 || style="width:30%; background:#CFA49B" align="center" | | ||
− | {{ | + | {{2012_BASC:Presentaton_Agenda_Template|Presentation|Mozilla Secure World: Simple Ways to Secure Your Website|HaoQi Li}} |
| style="width:30%; background:#DFC799" align="center" | | | style="width:30%; background:#DFC799" align="center" | | ||
− | {{ | + | {{2012_BASC:Presentaton_Agenda_Template|Presentation|The Perils of JavaScript APIs|Ming Chow}} |
|- | |- | ||
| style="width:10%; background:#7B8ABD" align="center" | 12:00-13:00 || colspan="2" style="width:80%; background:#D2D2D2" align="center" | | | style="width:10%; background:#7B8ABD" align="center" | 12:00-13:00 || colspan="2" style="width:80%; background:#D2D2D2" align="center" | | ||
Line 81: | Line 81: | ||
|- | |- | ||
| style="width:10%; background:#7B8ABD" align="center" | 13:00-13:50 || style="width:30%; background:#BC857A" align="center" | | | style="width:10%; background:#7B8ABD" align="center" | 13:00-13:50 || style="width:30%; background:#BC857A" align="center" | | ||
− | {{ | + | {{2012_BASC:Presentaton_Agenda_Template|Presentation|OWASP Mobile Top 10 Risks|Zach Lanier}} |
| style="width:30%; background:#BCA57A" align="center" | | | style="width:30%; background:#BCA57A" align="center" | | ||
− | {{ | + | {{2012_BASC:Presentaton_Agenda_Template|Presentation|WAFs - An Overview of Free Web Application Firewalls|Roy Wattanasin}} |
|- | |- | ||
| style="width:10%; background:#7B8ABD" align="center" | 14:00-14:50 || style="width:30%; background:#CFA49B" align="center" | | | style="width:10%; background:#7B8ABD" align="center" | 14:00-14:50 || style="width:30%; background:#CFA49B" align="center" | | ||
− | {{ | + | {{2012_BASC:Presentaton_Agenda_Template|Presentation|Secrets Of Static Binary Analysis|Christien Rioux}} |
| style="width:30%; background:#DFC799" align="center" | | | style="width:30%; background:#DFC799" align="center" | | ||
− | {{ | + | {{2012_BASC:Presentaton_Agenda_Template|Presentation|Don't Be A Victim|Jack Daniel}} |
|- | |- | ||
| style="width:10%; background:#7B8ABD" align="center" | 15:00-15:50 || style="width:30%; background:#BC857A" align="center" | | | style="width:10%; background:#7B8ABD" align="center" | 15:00-15:50 || style="width:30%; background:#BC857A" align="center" | | ||
− | {{ | + | {{2012_BASC:Presentaton_Agenda_Template|Presentation|Binary Instrumentation of Programs|Robert Cohn}} |
| style="width:30%; background:#BCA57A" align="center" | | | style="width:30%; background:#BCA57A" align="center" | | ||
− | {{ | + | {{2012_BASC:Presentaton_Agenda_Template|Presentation|Preventing Data Breaches from Vulnerable Web Applications using Data Provenance|Anirudh Ramachandran}} |
|- | |- | ||
| style="width:10%; background:#7B8ABD" align="center" | 16:00-16:50 || style="width:30%; background:#CFA49B" align="center" | | | style="width:10%; background:#7B8ABD" align="center" | 16:00-16:50 || style="width:30%; background:#CFA49B" align="center" | | ||
− | {{ | + | {{2012_BASC:Presentaton_Agenda_Template|Presentation|Google & Search Hacking|Francis Brown}} |
| style="width:30%; background:#DFC799" align="center" | | | style="width:30%; background:#DFC799" align="center" | | ||
− | {{ | + | {{2012_BASC:Presentaton_Agenda_Template|Presentation|There’s an App for That|Michael Anderson}} |
|- | |- | ||
Line 123: | Line 123: | ||
|} | |} | ||
− | {{ | + | {{2012_BASC:Footer_Template | Agenda}} |
Revision as of 22:32, 12 August 2012
2012 BASC: Home Agenda Presentations Speakers
Sponsorships Available
Platinum Sponsors (Listed Alphabetically)
|
Silver Sponsors (Listed Alphabetically)
|
|
|
|
We kindly thank our sponsors for their support. Please help us keep future BASCs free by viewing and visiting all of our sponsors.
Sponsorships are still available.
Agenda
Saturday, October 8 | |||
---|---|---|---|
8:30-9:30 |
Breakfast and Registration | ||
09:00-09:50 |
Keynote | ||
Track 1 Horace Mann Room |
Track 2 Deborah Sampson / Paul Thomas Room | ||
10:00-10:50 | |||
11:00-11:50 | |||
12:00-13:00 |
Lunch | ||
13:00-13:50 | |||
14:00-14:50 | |||
15:00-15:50 | |||
16:00-16:50 | |||
17:00-17:30 |
Social Time | ||
17:30-18:30 |
| ||
18:30-19:00 |
|