This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "AppSecResearch2012"

From OWASP
Jump to: navigation, search
Line 196: Line 196:
 
| style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | <br>  
 
| style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | <br>  
 
| style="width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);" | Builders  
 
| style="width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);" | Builders  
| style="width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);" | Defenders
+
| style="width: 30%; background: none repeat scroll 0% 0% rgb(161, 161, 161);" | Defenders
 
| style="width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);" | Brakers
 
| style="width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);" | Brakers
 
|-
 
|-
 
| style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 08:45-09:30  
 
| style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 08:45-09:30  
| align="left" colspan="3" style="width: 80%; background: none repeat scroll 0% 0% rgb(194, 194, 194);" | Registration/Coffee
+
| align="center" colspan="3" style="width: 80%; background: none repeat scroll 0% 0% rgb(194, 194, 194);" | Registration/Coffee
 
|-
 
|-
 
| style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 09:30-10:00  
 
| style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 09:30-10:00  
| align="center" colspan="3" style="width: 80%; background: none repeat scroll 0% 0% rgb(242, 242, 242);" | Welcome OWASP Foundation, Where we are… Where we are Going OWASP Board
+
| align="center" colspan="3" style="width: 80%; background: none repeat scroll 0% 0% rgb(242, 242, 242);" | Welcome <br> OWASP Foundation, Where we are… Where we are Going <br> OWASP Board
 
|-
 
|-
 
| style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 10:00-10:45  
 
| style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 10:00-10:45  
| align="center" colspan="3" style="width: 80%; background: none repeat scroll 0% 0% rgb(252, 252, 150);" | Keynote: Software Security Goes Mobile
+
| align="center" colspan="3" style="width: 80%; background: none repeat scroll 0% 0% rgb(252, 252, 150);" | Keynote: Software Security Goes Mobile <br>Jacob West, CTO, Fortify Products, HP
Jacob West, CTO, Fortify Products, HP
 
 
 
 
 
|-
 
|-
 
| style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 10:45-11:00  
 
| style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 10:45-11:00  
| align="left" style="width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);" |  
+
| align="center" colspan="3" style="width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);" | Coffee Brake
 +
|-
 +
| style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 11:00-11:40
 +
| align="center" style="width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);" | (P) Teaching an Old Dog New Tricks Securing Development with PMD<br>
 +
Justin Clarke<br>
 +
''(Gotham Digital Science)''
 +
| align="center" style="width: 30%; background: none repeat scroll 0% 0% rgb(161, 161, 161);" | OWASP Top Ten Defensive Techniques<br>
 +
Jim Manico<br>
 +
''(Whitehat)''
  
<br>  
+
| align="center" style="width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);" |(P) Screw You and the Script You Rode in On<br>
 +
David Byrne and Charles Henderson<br>
 +
''(Trustwave)''
  
| align="left" style="width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);" |  
+
|-
 
+
| style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 11:40-11:50
<br>
+
| align="center" colspan="3" style="width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);" |Brake
 
 
| align="left" style="width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);" |  
 
  
 
|-
 
|-
| style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 10:45-11:10
+
| style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 11:50-12:30
| align="left" colspan="3" style="width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);" |
+
| align="center" style="width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);" | Unraveling some of the Mysteries around DOMbased XSS
|-
+
''Dave Wichers<br>
| style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 11:10-11:45
+
(Aspect Security)''
| align="left" style="width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);" |  
 
  
| align="left" style="width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);" |  
+
| align="center" style="width: 30%; background: none repeat scroll 0% 0% rgb(161, 161, 161);" | (P) Breaking is easy, preventing is hard
 +
''Matias Madou<br>
 +
(HP)''
  
<br><br>''
+
| align="center" style="width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);" | What Permissions Does Your Database User REALLY Need?
 +
''Dan Cornell<br>
 +
(Denim Group)''
  
<br>
+
|-
 +
| style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 12:30-12:40
 +
| align="center" colspan="3" style="width: 80%; background: none repeat scroll 0% 0% rgb(194, 194, 194);" |Brake
  
| align="left" style="width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);" |
+
|-
 +
| style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 12:40-13:25
 +
| align="center" colspan="3" style="width: 80%; background: none repeat scroll 0% 0% rgb(252, 252, 150);" | Keynote:  From EasySQL to CPUs<br>
 +
''Duncan Harris, Director of Security Assurance, Oracle''
  
 
|-
 
|-
| style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 11:55-12:30
+
| style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 13:25-14:25
| align="left" style="width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);" |  
+
| align="center" colspan="3" style="width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);" | Lunch Brake
  
<br>
+
|-
 
+
| style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 14:25-15:10
| align="left" style="width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);" |
+
| align="center" colspan="3" style="width: 80%; background: none repeat scroll 0% 0% rgb(252, 252, 150);" | Keynote: Finding Malware on a Web Scale<br>
 
+
''Ben Livshits, Researcher, Microsoft Research''
| align="left" style="width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);" |  
+
|-
 +
| style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 15:10-15:20
 +
| align="center" colspan="3" style="width: 80%; background: none repeat scroll 0% 0% rgb(194, 194, 194);" | Break
  
 
|-
 
|-
| style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 12:30-13:45
+
| style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 15:20-16:00
| align="left" colspan="3" style="width: 80%; background: none repeat scroll 0% 0% rgb(194, 194, 194);" |
 
|-
 
| style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 13:45-14:20
 
| align="left" style="width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);" |
 
  
| align="left" style="width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);" |  
+
| align="center" style="width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);" | (P) Tricolour Alphanumerical Spaghetti
<br>''  
+
''Colin Watson<br>
 +
(Watson Hall)
 +
''
 +
| align="center" style="width: 30%; background: none repeat scroll 0% 0% rgb(161, 161, 161);" | CISO’s Guide to Securing SharePoint
 +
''Tsvika Klein<br>
 +
(Imperva)''
  
| align="left" style="width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);" |  
+
| align="center" style="width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);" | (P) I>S+D! – Integrated Application Security Testing (IAST), Beyond SAST/DAST
 +
''Ofer Maor<br>
 +
(Seeker Security)''
  
 
|-
 
|-
| style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 14:30-15:05
+
| style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 16:00-16:15  
| align="left" style="width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);" |
+
| align="center" colspan="3" style="width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);" | Coffee Brake
 
 
| align="left" style="width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);" |  
 
  
| align="left" style="width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);" |
 
|-
 
| style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 15:05-15:30
 
| align="left" colspan="3" style="width: 80%; background: none repeat scroll 0% 0% rgb(194, 194, 194);" |
 
 
|-
 
|-
| style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 15:30-16:05
+
| style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 16:15-16:55
 
| align="left" style="width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);" |
 
| align="left" style="width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);" |
  
| align="left" style="width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);" |
+
| align="left" style="width: 30%; background: none repeat scroll 0% 0% rgb(161, 161, 161);" |
  
 
| align="left" style="width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);" |  
 
| align="left" style="width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);" |  
 +
  
 
|-
 
|-
| style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 16:15-17:00
+
| style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 16:55-17:45
| align="center" colspan="3" style="width: 90%; background: none repeat scroll 0% 0% rgb(242, 242, 242);" |  
+
| align="center" colspan="3" style="width: 80%; background: none repeat scroll 0% 0% rgb(252, 252, 150);" | Keynote:
 
|-
 
|-
| style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 19:00-23:00  
+
| style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 20:00  
| align="center" colspan="1" style="background: none repeat scroll 0% 0% rgb(43, 58, 109);" |
+
| align="center" colspan="3" style="width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);" | Cocktail
| align="center" colspan="1" style="background: none repeat scroll 0% 0% rgb(43, 58, 109); color: white;" | 
 
| align="center" colspan="1" style="background: none repeat scroll 0% 0% rgb(43, 58, 109);" |  
 
 
|}
 
|}
  

Revision as of 16:47, 21 July 2012


AppsecResearch2012Banner.jpg

We are happy to announce that the OWASP Greek Chapter will be hosting the AppSec Research 2012 in Athens Greece

This conference is practically the OWASP AppSec Europe. Every two years we add “Research” in order to highlight that we invite both industry and academia to participate, share thoughts, knowledge and insight on application security.

OWASP AppSec Research is the European conference for anyone interested in application security

This year it will be hosted by the Department of Informatics and Telecommunications of the University of Athens, Greece and will take place between July 10-13th.

The first OWASP AppSec Research conference was held in Stockholm in 2010.


AppSec Research Conference Website



@appseceu Twitter Feed (follow us on Twitter!) <twitter>228539824</twitter>