This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "OWASP AppSec DC 2012/Schedule/4-4-2012"
From OWASP
Mark.bristow (talk | contribs) |
Mark.bristow (talk | contribs) |
||
Line 39: | Line 39: | ||
| align=center width=200 valign=middle height=60 bgcolor=#c0a0a0 align=center |[https://www.owasp.org/index.php/OWASP_AppSec_DC_2012/Attacking_CAPTCHAs_for_Fun_and_Profit Attacking CAPTCHAs for Fun and Profit]<br><br> | | align=center width=200 valign=middle height=60 bgcolor=#c0a0a0 align=center |[https://www.owasp.org/index.php/OWASP_AppSec_DC_2012/Attacking_CAPTCHAs_for_Fun_and_Profit Attacking CAPTCHAs for Fun and Profit]<br><br> | ||
Gursev Singh Kalra | Gursev Singh Kalra | ||
− | | align=center width=200 valign=middle height=60 bgcolor=#ffdf80 align=center | | + | | align=center width=200 valign=middle height=60 bgcolor=#ffdf80 align=center |TBA |
− | |||
| align=center width=200 valign=middle height=60 bgcolor=#a0c0e0 align=center |[https://www.owasp.org/index.php/OWASP_AppSec_DC_2012/Security_is_Dead_Long_Live_Rugged_DevOps_IT_at_LudicrousSpeed Security is Dead. Long Live Rugged DevOps: IT at Ludicrous Speed]<br><br> | | align=center width=200 valign=middle height=60 bgcolor=#a0c0e0 align=center |[https://www.owasp.org/index.php/OWASP_AppSec_DC_2012/Security_is_Dead_Long_Live_Rugged_DevOps_IT_at_LudicrousSpeed Security is Dead. Long Live Rugged DevOps: IT at Ludicrous Speed]<br><br> | ||
Joshua Corman | Joshua Corman |
Revision as of 16:27, 29 March 2012
Plenary Day 1 - 4/4/2012 | ||||
Offense & Tools Room 201 |
Case Studies Room 202A |
IoMT Room 202B |
Interrogate! Room 206 | |
---|---|---|---|---|
7:30 AM - 8:50 AM | Registration | |||
8:50 AM - 9:00 AM | Welcome and Opening Remarks Room 202A | |||
9:00 AM - 10:00 AM | Keynote: Dan Geer Room 202A | |||
10:00 AM - 10:45 AM | OWASP Board Room 202A | |||
10:45 AM - 11:00 AM | Coffee Break | |||
11:00 AM - 11:50 AM | DOMJacking - Attack, Exploit and Defense Shreeraj Shah |
The Unfortunate Reality of Insecure Libraries Jeff Williams and Arshan Dabirsiaghi |
Python Basics for Web App Pentesters - Part 2 Justin Searle |
Integrating Application Security into your Lifecycle and Procurement Moderator: Jim Manico |
11:50 AM - 12:00 PM | Coffee Break | |||
12:00 PM - 12:50 PM | Attacking CAPTCHAs for Fun and Profit Gursev Singh Kalra |
TBA | Security is Dead. Long Live Rugged DevOps: IT at Ludicrous Speed Joshua Corman | |
12:50 PM - 2:30 PM | No-Host Lunch | |||
2:30 PM - 3:20 PM | Hacking .NET(C#) Applications: The Black Arts Jon McCoy |
Security at scale: Web application security in a continuous deployment environment Zane Lackey |
The "Easy" Button for Your Web Application Security Career Salvador Grec |
Risk Analysis and Measurement with CWRAF Joe Jarzombek, Bob Martin, Walter Houser and Tom Brennan |
3:20 PM - 3:30 PM | Coffee Break | |||
3:30 PM - 4:20 PM | OWASP Broken Web Applications (OWASP BWA) 1.0 Release Chuck Willis |
Security Is Like An Onion, That's Why It Makes You Cry |
Anatomy of a Logic Flaw Charles Henderson and David Byrne | |
4:20 PM - 4:30 PM | Coffee Break | |||
4:30 PM - 5:20 PM | New and Improved Hacking Oracle from Web Sumit Siddharth |
State of Web Security Robert Rowley |
Old Webshells, New Tricks -- How Persistent Threats have revived an old idea, and how you can detect them. Ryan Kazanciyan |
Fed Panel Moderator: Rex Booth |
5:20 PM - 5:30 PM | Coffee Break | |||
5:30 PM - 6:20 PM | Unraveling some of the Mysteries around DOM-based XSS Dave Wichers |
2012 Global Security Report Tom Brennan and Nick Percoco |
Survivable Software for Cyber-Physical Systems Karen Mercedes Goertzel | |
6:20 PM | Networking Opportunity in Room 207AB sponsored by: |