This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "AppSecLatam2012/Schedule Tuesday Nov 20, 2012"
From OWASP
Sarah Baso (talk | contribs) |
|||
| Line 30: | Line 30: | ||
| align="center" colspan="3" style="width: 80%; background: none repeat scroll 0% 0% rgb(246, 246, 246);" | Short Break - Coffee & Snacks | | align="center" colspan="3" style="width: 80%; background: none repeat scroll 0% 0% rgb(246, 246, 246);" | Short Break - Coffee & Snacks | ||
|- | |- | ||
| − | | style="width: 20%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | ''11:00-11:50 AM'' | + | | align="center" style="width: 20%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | ''11:00-11:50 AM'' |
<br> | <br> | ||
| align="left" style="width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);" | '''Assessing Application Security Risk''' | | align="left" style="width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);" | '''Assessing Application Security Risk''' | ||
| Line 37: | Line 37: | ||
Speaker: Breno Silva | Speaker: Breno Silva | ||
|- | |- | ||
| − | | style="width: 20%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | ''11:50-12:00 PM'' | + | | align="center" style="width: 20%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | ''11:50-12:00 PM'' |
| align="center" colspan="3" style="width: 80%; background: none repeat scroll 0% 0% rgb(246, 246, 246);" | Short Break | | align="center" colspan="3" style="width: 80%; background: none repeat scroll 0% 0% rgb(246, 246, 246);" | Short Break | ||
|- | |- | ||
| − | | style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | ''12:00-12:50 PM'' | + | |align="center" style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | ''12:00-12:50 PM'' |
<br> | <br> | ||
| align="left" style="width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);" | '''Your Website: a weapon for cybercrime''' | | align="left" style="width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);" | '''Your Website: a weapon for cybercrime''' | ||
| Line 47: | Line 47: | ||
Speaker: Nicolas Rodriguez | Speaker: Nicolas Rodriguez | ||
|- | |- | ||
| − | | align="center" style="width: 20%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | ''12:50- | + | | align="center" style="width: 20%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | ''12:50-13:50 PM'' |
<br> | <br> | ||
| align="center" colspan="3" style="width: 80%; background: none repeat scroll 0% 0% rgb(194, 194, 194);" | '''Break - Lunch''' | | align="center" colspan="3" style="width: 80%; background: none repeat scroll 0% 0% rgb(194, 194, 194);" | '''Break - Lunch''' | ||
|- | |- | ||
| − | | align="center" style="width: 20%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | '' | + | | align="center" style="width: 20%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | ''13:50-14:50 PM'' |
<br> | <br> | ||
| align="center" colspan="3" style="width: 80%; background: none repeat scroll 0% 0% rgb(188, 133, 122);" | '''KEYNOTE <br> Tainted variables to find Potentially Vulnerable Functions (PVF)''' | | align="center" colspan="3" style="width: 80%; background: none repeat scroll 0% 0% rgb(188, 133, 122);" | '''KEYNOTE <br> Tainted variables to find Potentially Vulnerable Functions (PVF)''' | ||
Speaker: Cristian Borghello | Speaker: Cristian Borghello | ||
|- | |- | ||
| − | | align="center" style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | '' | + | | align="center" style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | ''14:50-15:10 PM'' |
| align="center" colspan="3" style="width: 80%; background: none repeat scroll 0% 0% rgb(246, 246, 246);" | Short Break - Coffee & Snacks | | align="center" colspan="3" style="width: 80%; background: none repeat scroll 0% 0% rgb(246, 246, 246);" | Short Break - Coffee & Snacks | ||
|- | |- | ||
| − | | align="center" style="width: 20%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | '' | + | | align="center" style="width: 20%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | ''15:10-16:00 PM'' |
<br> | <br> | ||
| align="left" style="width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);" | '''Using PASTA as a core ingredient to web application threat modeling''' | | align="left" style="width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);" | '''Using PASTA as a core ingredient to web application threat modeling''' | ||
| Line 66: | Line 66: | ||
Speaker: Sebastian Bortnik | Speaker: Sebastian Bortnik | ||
|- | |- | ||
| − | | align="center" style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | '' | + | | align="center" style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | ''16:00-16:10 PM'' |
| align="center" colspan="3" style="width: 80%; background: none repeat scroll 0% 0% rgb(246, 246, 246);" | Short Break | | align="center" colspan="3" style="width: 80%; background: none repeat scroll 0% 0% rgb(246, 246, 246);" | Short Break | ||
|- | |- | ||
| − | | align="center" style="width: 20%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | '' | + | | align="center" style="width: 20%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | ''16:10-17:00 PM'' |
<br> | <br> | ||
| align="left" style="width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);" | '''Password Security Policies - Lessons Learned from Recent Password Leaks''' | | align="left" style="width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);" | '''Password Security Policies - Lessons Learned from Recent Password Leaks''' | ||