This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "CraigsFROCDraft"
(Created page with "===Notes=== * Can't serve breakfast at 7:30, or can we? James' coffee idea? The agenda follows the successful OWASP conference multi track format, with opening keynotes and ...") |
|||
Line 1: | Line 1: | ||
− | == | + | ==Agenda and Presentations: 22 March 2012== |
− | |||
The agenda follows the successful OWASP conference multi track format, with opening keynotes and presentations in the main room, split tracks in the middle of the day, and closing panel discussions back in the main room. | The agenda follows the successful OWASP conference multi track format, with opening keynotes and presentations in the main room, split tracks in the middle of the day, and closing panel discussions back in the main room. | ||
− | {| style="width: | + | {| style="width:96%" border="0" align="center" |
! colspan="4" align="center" style="background:#4058A0; color:white" | March 22nd, 2012 | ! colspan="4" align="center" style="background:#4058A0; color:white" | March 22nd, 2012 | ||
|- | |- | ||
− | | style="width:10%; background:#7B8ABD" | 07: | + | | style="width:10%; background:#7B8ABD" | 07:45-08:30 || colspan="3" style="width:80%; background:#C2C2C2" align="left" | Registration and Continental Breakfast in the Adirondack Room |
|- | |- | ||
− | | style="width:10%; background:#7B8ABD" | 08:30-08: | + | | style="width:10%; background:#7B8ABD" | 08:30-08:45 || colspan="3" style="width:80%; background:#F2F2F2" align="center" | Welcome to SnowFROC 2012 Conference |
+ | |||
''OWASP Denver and OWASP Boulder Chapter Leaders'' | ''OWASP Denver and OWASP Boulder Chapter Leaders'' | ||
|- | |- | ||
− | | style="width:10%; background:#7B8ABD" | 08: | + | | style="width:10%; background:#7B8ABD" | 08:45-09:10 || colspan="3" style="width:80%; background:#F2F2F2" align="center" | |
− | '''Keynote:''' | + | '''State of OWASP''' |
+ | |||
+ | ''Matt Tesauro'' | ||
+ | |- | ||
+ | | style="width:10%; background:#7B8ABD" | 09:10-10:10 || colspan="3" style="width:80%; background:#F2F2F2" align="center" | '''Keynote:''' | ||
''John Pirc, Co-Author of [http://www.amazon.com/Cybercrime-Espionage-Analysis-Subversive-Multi-Vector/dp/1597496138/ref=sr_1_1?s=books&ie=UTF8&qid=1330542019&sr=1-1 "Cybercrime and Espionage: An Analysis of Subversive Multi-Vector Threats"]'' | ''John Pirc, Co-Author of [http://www.amazon.com/Cybercrime-Espionage-Analysis-Subversive-Multi-Vector/dp/1597496138/ref=sr_1_1?s=books&ie=UTF8&qid=1330542019&sr=1-1 "Cybercrime and Espionage: An Analysis of Subversive Multi-Vector Threats"]'' | ||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
|- | |- | ||
− | | style="width:10%; background:#7B8ABD" | 10: | + | | style="width:10%; background:#7B8ABD" | 10:10-10:30 || colspan="3" style="width:80%; background:#C2C2C2" align="left" | Break - Expo |
|- | |- | ||
− | | style="width:10%; background:#7B8ABD" | || colspan="1" style="width:45%; background:#BC857A" | '''Track | + | | style="width:10%; background:#7B8ABD" | || colspan="1" style="width:45%; background:#BC857A" | '''Tech Track - Zenith Room 640''' |
− | | colspan="1" style="width:45%; background:#BCA57A" | '''Track | + | | colspan="1" style="width:45%; background:#BCA57A" | '''Management Track - Senate Chamber''' |
<!-- | style="width:22%; background:#C6E2FF" | '''Management / Exec Track: Room 3''' --> | <!-- | style="width:22%; background:#C6E2FF" | '''Management / Exec Track: Room 3''' --> | ||
|- | |- | ||
− | | style="width:10%; background:#7B8ABD" | 10:30-11:15 || style="width:45%; background:#BC857A" align="left" | | + | | style="width:10%; background:#7B8ABD" | 10:30-11:15 || style="width:45%; background:#BC857A" align="left" | OWASP Passfault |
− | '' | + | ''Cameron Morris'' |
− | | style="width:45%; background:#BCA57A" align="left" | | + | | style="width:45%; background:#BCA57A" align="left" | Managing IT Risk in a Cloud Environment |
− | '' | + | ''Karl Steinkamp'' |
<!-- | style="width:22%; background:#C6E2FF" align="left" | TBD | <!-- | style="width:22%; background:#C6E2FF" align="left" | TBD | ||
Line 46: | Line 43: | ||
− | | style="width:10%; background:#7B8ABD" | 11:15-12:00 || style="width:45%; background:#BC857A" align="left" | | + | | style="width:10%; background:#7B8ABD" | 11:15-12:00 || style="width:45%; background:#BC857A" align="left" | State of Web Security: Monitored Attacks |
− | '' | + | |
+ | ''Robert Rowley'' | ||
− | | style="width:45%; background:#BCA57A" align="left" | | + | | style="width:45%; background:#BCA57A" align="left" | PCI vs Risk Management |
− | '' | + | ''Doug Landoll'' |
− | <!-- | style="width:22%; background:#C6E2FF" align="left" | | + | <!-- | style="width:22%; background:#C6E2FF" align="left" | Securing Data from the Web Tier ''Mike Fleck'' --> |
|- | |- | ||
Line 58: | Line 56: | ||
|- | |- | ||
− | | style="width:10%; background:#7B8ABD" | 13:00-13:50 || style="width:45%; background:#BC857A" align="left" | | + | | style="width:10%; background:#7B8ABD" | 13:00-13:50 || style="width:45%; background:#BC857A" align="left" | Panel Discussion - Favorite tools and techniques - pen-testing, static analysis, code reviews |
− | '' | + | ''Panelists'' |
− | | style="width:45%; background:#BCA57A" align="left" | | + | | style="width:45%; background:#BCA57A" align="left" | Securing Data from the Web Tier |
− | '' | + | ''Mike Fleck'' |
<!-- | style="width:22%; background:#C6E2FF" align="left" | TBD | <!-- | style="width:22%; background:#C6E2FF" align="left" | TBD | ||
Line 70: | Line 68: | ||
− | | style="width:10%; background:#7B8ABD" | 13:50-14:40 || style="width:45%; background:#BC857A" align="left" | | + | | style="width:10%; background:#7B8ABD" | 13:50-14:40 || style="width:45%; background:#BC857A" align="left" | Gray, the new black: Gray box vulnerability testing |
− | '' | + | ''Adam Hills'' |
+ | |||
+ | | style="width:45%; background:#BCA57A" align="left" | Web Session Intelligence | ||
− | + | ''LAZ'' | |
− | '' | ||
<!-- | style="width:22%; background:#C6E2FF" align="left" | TBD | <!-- | style="width:22%; background:#C6E2FF" align="left" | TBD | ||
Line 84: | Line 83: | ||
|- | |- | ||
− | | style="width:10%; background:#7B8ABD" | 15:00-15:50 || style="width:45%; background:#BC857A" align="left" | " | + | | style="width:10%; background:#7B8ABD" | 15:00-15:50 || style="width:45%; background:#BC857A" align="left" | "The Mobile Top 10" |
− | '' | + | ''Mike Zussman'' |
− | | style="width:45%; background:#BCA57A" align="left" | | + | | style="width:45%; background:#BCA57A" align="left" | A Scalable Secure Development Program |
− | '' | + | ''Rajiv Sharma'' |
<!-- | <!-- | ||
Line 103: | Line 102: | ||
Moderator: Steve Kosten or Andy Lewis | Moderator: Steve Kosten or Andy Lewis | ||
Panelists: Laz, Matt Tesauro, John Pirc, Tanner Coltrin, Steve Kosten, others | Panelists: Laz, Matt Tesauro, John Pirc, Tanner Coltrin, Steve Kosten, others | ||
+ | |||
|- | |- |
Revision as of 00:29, 2 March 2012
Agenda and Presentations: 22 March 2012
The agenda follows the successful OWASP conference multi track format, with opening keynotes and presentations in the main room, split tracks in the middle of the day, and closing panel discussions back in the main room.
March 22nd, 2012 | |||
---|---|---|---|
07:45-08:30 | Registration and Continental Breakfast in the Adirondack Room | ||
08:30-08:45 | Welcome to SnowFROC 2012 Conference
OWASP Denver and OWASP Boulder Chapter Leaders | ||
08:45-09:10 |
State of OWASP Matt Tesauro | ||
09:10-10:10 | Keynote:
John Pirc, Co-Author of "Cybercrime and Espionage: An Analysis of Subversive Multi-Vector Threats" | ||
10:10-10:30 | Break - Expo | ||
Tech Track - Zenith Room 640 | Management Track - Senate Chamber | ||
10:30-11:15 | OWASP Passfault
Cameron Morris |
Managing IT Risk in a Cloud Environment
Karl Steinkamp | |
11:15-12:00 | State of Web Security: Monitored Attacks
Robert Rowley |
PCI vs Risk Management
Doug Landoll | |
12:00-13:00 | Lunch - Expo | ||
13:00-13:50 | Panel Discussion - Favorite tools and techniques - pen-testing, static analysis, code reviews
Panelists |
Securing Data from the Web Tier
Mike Fleck
| |
13:50-14:40 | Gray, the new black: Gray box vulnerability testing
Adam Hills |
Web Session Intelligence
LAZ | |
14:40-15:00 | BREAK | ||
15:00-15:50 | "The Mobile Top 10"
Mike Zussman
|
A Scalable Secure Development Program
Rajiv Sharma
| |
15:50-16:30 | End of Conference Panel Discussion:
Topic: The Crystal Ball and the 2-headed Calf - What's on the Horizon and Why Does It Seem So Unnatural? Moderator: Steve Kosten or Andy Lewis Panelists: Laz, Matt Tesauro, John Pirc, Tanner Coltrin, Steve Kosten, others
| ||
16:30-17:30 | Wrap up, vendor raffles! |