This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Template:OWASP IL 2012 Agenda"
| Line 43: | Line 43: | ||
|- style="border-style: solid; border-width: 1px;font-size:10pt" | |- style="border-style: solid; border-width: 1px;font-size:10pt" | ||
|style="border-style: solid; border-width: 1px;color:#1F497D" height="25" align="center" valign="center" | 13:30-14:15 | |style="border-style: solid; border-width: 1px;color:#1F497D" height="25" align="center" valign="center" | 13:30-14:15 | ||
| − | | align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5 | ''' | + | | align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5 | '''Advanced Pen-Testing of iPhone Applications''' |
| − | '' | + | ''Chilik Tamir, Chief Scientist, AppSec Labs '' |
| − | | align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5 | ''' | + | | align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5 | '''Positive Logic XSS Detection & Prevention using Generalized JavaScript Assembly ''' |
| − | '' | + | ''Tsvi Cherny, Interdisciplinary Center'' |
| − | |||
|- style="border-style: solid; border-width: 1px;font-size:10pt" | |- style="border-style: solid; border-width: 1px;font-size:10pt" | ||
| − | |style="border-style: solid; border-width: 1px;color:#1F497D" height="25" align="center" valign="center" | 14: | + | |style="border-style: solid; border-width: 1px;color:#1F497D" height="25" align="center" valign="center" | 14:15-15:00 |
| − | | align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5 | ''' | + | | align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5 | '''Attacking Android Mobile Applications''' |
''Erez Metula, Founder, AppSec Labs'' | ''Erez Metula, Founder, AppSec Labs'' | ||
| − | | align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5 | ''' | + | | align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5 | '''Application Counter Attack''' |
| − | '' | + | ''Ziv Gadot, SOC Team Leader, Radware'' |
|- style="border-style: solid; border-width: 1px;font-size:10pt" | |- style="border-style: solid; border-width: 1px;font-size:10pt" | ||
| − | |style="border-style: solid; border-width: 1px;color:#1F497D" height="40" align="center" valign="center" | 15: | + | |style="border-style: solid; border-width: 1px;color:#1F497D" height="40" align="center" valign="center" | 15:00-15:15 |
| valign="center" align="center" style="border-style: solid; border-width: 1px;font-size:12pt" colspan="2" | '''Coffee Break''' | | valign="center" align="center" style="border-style: solid; border-width: 1px;font-size:12pt" colspan="2" | '''Coffee Break''' | ||
|- style="border-style: solid; border-width: 1px;font-size:10pt" | |- style="border-style: solid; border-width: 1px;font-size:10pt" | ||
Revision as of 18:54, 27 August 2012
| 08:45-09:15 | Registration, Gathering, Socializing & Networking | |
| 09:15-09:45 | Opening Words Ofer Maor - Chairman, OWASP Israel; Global Membership Committee, OWASP | |
| 09:45-10:10 | OWASP Top 10 Hebrew Edition
Or Katz, OWASP Israel Board | |
| Breakers (Track #1) | Defenders (Track #2) | |
| 10:15-11:00 | The Diviner – Digital Clairvoyance: Getting an Insight Into Server Code & Memory Using Blackbox Techniques Shay Chen, CTO, Hacktics ASC, Ernst & Young |
Case Study: Providing Secure SDLC in an Agile Environment Using ESAPI Yair Rovek, Security Specialist, Liveperson |
| 11:00-11:15 | Coffee Break | |
| 11:15-12:00 | FYI: You've Got LFI
Tal Beery, Web Security Research Team Leader, Imperva |
I>S+D! – Integrated Application Security Testing (IAST), Beyond SAST/DAST Ofer Maor, CTO, Quotium |
| 12:00-12:30 | Zip It! – Owning Archived File Uploads
Alex Landa, Security Researcher, IBM |
Secure Development Lifecycle – Lessons Learned
Boaz Shunami, Founder, Komodo Consulting |
| 12:30-13:30 | Lunch Break | |
| 13:30-14:15 | Advanced Pen-Testing of iPhone Applications
Chilik Tamir, Chief Scientist, AppSec Labs |
Positive Logic XSS Detection & Prevention using Generalized JavaScript Assembly
Tsvi Cherny, Interdisciplinary Center |
| 14:15-15:00 | Attacking Android Mobile Applications
Erez Metula, Founder, AppSec Labs |
Application Counter Attack
Ziv Gadot, SOC Team Leader, Radware |
| 15:00-15:15 | Coffee Break | |
| 15:30-16:15 | Security Testing of RESTful Services (Presentation)
Ofer Shezaf, Head of AppSec Research, HP |
Hey, What’s your App doing on my (Smart)Phone? (Presentation)
Shay Zalalichin, CTO, Comsec Consulting |
| 16:15-17:00 | The Bank Job II (Presentation)
Adi Sharabani, Cross-Rational Security Strategy and Architecture, IBM | |
| 17:00-17:05 | End Notes
Ofer Maor - Chairman, OWASP Israel; Global Membership Committee, OWASP | |