This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Template:OWASP IL 2012 Agenda"
(Created page with "{| style="border-collapse: collapse; border-width: 1px; border-style: solid; border-color: #000" cellpadding=2 |- style="border-style: solid; border-width: 1px;font-size:10pt"...") |
|||
| Line 9: | Line 9: | ||
|- style="border-style: solid; border-width: 1px;font-size:10pt" | |- style="border-style: solid; border-width: 1px;font-size:10pt" | ||
|style="border-style: solid; border-width: 1px;color:#1F497D" height="25" align="center" valign="center" | 09:45-10:10 | |style="border-style: solid; border-width: 1px;color:#1F497D" height="25" align="center" valign="center" | 09:45-10:10 | ||
| − | | align=center valign="center" colspan="2" style="border-style: solid; border-width: 1px;font-size:11pt"| '''OWASP Top 10 Hebrew''' | + | | align=center valign="center" colspan="2" style="border-style: solid; border-width: 1px;font-size:11pt"| '''OWASP Top 10 Hebrew Edition''' |
| − | + | ''Or Katz, OWASP Israel Board'' | |
|- style="border-style: solid; border-width: 1px;font-size:12pt" | |- style="border-style: solid; border-width: 1px;font-size:12pt" | ||
|style="border-style: solid; border-width: 1px;color:#1F497D" height="30" align="right" valign="center" | | |style="border-style: solid; border-width: 1px;color:#1F497D" height="30" align="right" valign="center" | | ||
| − | | style="border-style: solid; border-width: 1px;" valign="center" align="center" width=500 | <u>''' | + | | style="border-style: solid; border-width: 1px;" valign="center" align="center" width=500 | <u>'''Breakers'''</u> |
| − | | style="border-style: solid; border-width: 1px;" valign="center" align="center" width=500 | <u>''' | + | | style="border-style: solid; border-width: 1px;" valign="center" align="center" width=500 | <u>'''Defenders'''</u> |
|- style="border-style: solid; border-width: 1px;font-size:10pt" | |- style="border-style: solid; border-width: 1px;font-size:10pt" | ||
|style="border-style: solid; border-width: 1px;color:#1F497D" height="25" align="center" valign="center" | 10:15-11:00 | |style="border-style: solid; border-width: 1px;color:#1F497D" height="25" align="center" valign="center" | 10:15-11:00 | ||
| − | | align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" | ''' | + | | align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" | '''The Diviner – Digital Clairvoyance: Getting an Insight Into Server Code & Memory Using Blackbox Techniques''' <br> |
| − | |||
| − | |||
''Shay Chen, CTO, Hacktics Advanced Security Center, Ernst & Young'' | ''Shay Chen, CTO, Hacktics Advanced Security Center, Ernst & Young'' | ||
| + | ''Eran Tamir, Senior Consultant & Team Leader, Hacktics Advanced Security Center, Ernst & Young'' | ||
| + | | align="center" valign="top" style="font-size:11pt" | '''Case Study - Providing Secure SDLC in an Agile Environment Using ESAPI ''' | ||
| + | ''Yair Rovek, Security Specialist, Liveperson'' | ||
|- style="border-style: solid; border-width: 1px;font-size:10pt" | |- style="border-style: solid; border-width: 1px;font-size:10pt" | ||
|style="border-style: solid; border-width: 1px;color:#1F497D" height="40" align="center" valign="center" | 11:00-11:15 | |style="border-style: solid; border-width: 1px;color:#1F497D" height="40" align="center" valign="center" | 11:00-11:15 | ||
Revision as of 18:36, 27 August 2012
| 08:45-09:15 | Registration, Gathering, Socializing & Networking | |
| 09:15-09:45 | Opening Words Ofer Maor - Chairman, OWASP Israel; Global Membership Committee, OWASP | |
| 09:45-10:10 | OWASP Top 10 Hebrew Edition
Or Katz, OWASP Israel Board | |
| Breakers | Defenders | |
| 10:15-11:00 | The Diviner – Digital Clairvoyance: Getting an Insight Into Server Code & Memory Using Blackbox Techniques Shay Chen, CTO, Hacktics Advanced Security Center, Ernst & Young Eran Tamir, Senior Consultant & Team Leader, Hacktics Advanced Security Center, Ernst & Young |
Case Study - Providing Secure SDLC in an Agile Environment Using ESAPI
Yair Rovek, Security Specialist, Liveperson |
| 11:00-11:15 | Coffee Break | |
| 11:15-12:00 | Building an Effective SDLC Program - Case Study (Presentation)
Guy Bejerano, CSO, Liveperson |
Space-Time Tradeoffs in Software-Based Deep Packet Inspection (Presentation)
Yotam Harchol, IDC |
| 12:00-12:45 | All Your Mobile Applications Are Belong to Us (Presentation)
Itzik Kotler, CTO, Security Art |
Glass Box Testing - Thinking Inside the Box (Presentation)
Omri Weisman, Manager, Security Research Group, IBM |
| 12:45-13:45 | Lunch Break | |
| 13:45-14:30 | CMS And Other Giants - The Nightmare of AppSec Testing (Presentation)
Irene Abezgauz, Product Manager, Seeker Security |
Agile + SDL – Concepts and Misconceptions (Presentation)
Avi Douglen, Security Architect, Aware Security |
| 14:30-15:15 | When Crypto Goes Wrong (Presentation)
Erez Metula, Founder, AppSec Labs |
Advanced Techniques & Tools for Testing Binary Protocols (Presentation)
Chilik Tamir, Information Security Architect, AppSec Labs |
| 15:15-15:30 | Coffee Break | |
| 15:30-16:15 | Security Testing of RESTful Services (Presentation)
Ofer Shezaf, Head of AppSec Research, HP |
Hey, What’s your App doing on my (Smart)Phone? (Presentation)
Shay Zalalichin, CTO, Comsec Consulting |
| 16:15-17:00 | The Bank Job II (Presentation)
Adi Sharabani, Cross-Rational Security Strategy and Architecture, IBM | |
| 17:00-17:05 | End Notes
Ofer Maor - Chairman, OWASP Israel; Global Membership Committee, OWASP | |