|
|
Line 71: |
Line 71: |
| | style="background:#DFC184" align="center" | '''[[Link to Preso Page | Data Mining a Mountain of Zero Day Vulnerabilities]]''' <br> ''[http://authorurl.com Joe Brady]''<br> [http://video.google.com/ VIDEO] / [http://owasp.org SLIDES] | | | style="background:#DFC184" align="center" | '''[[Link to Preso Page | Data Mining a Mountain of Zero Day Vulnerabilities]]''' <br> ''[http://authorurl.com Joe Brady]''<br> [http://video.google.com/ VIDEO] / [http://owasp.org SLIDES] |
| | style="background:#F2F2F2" align="center" | '''[[Link to Preso Page | Linking Security to Business Value in the Customer Service Industry]]''' <br> ''[http://authorurl.com Dan Rojas]''<br> [http://video.google.com/ VIDEO] / [http://owasp.org SLIDES] | | | style="background:#F2F2F2" align="center" | '''[[Link to Preso Page | Linking Security to Business Value in the Customer Service Industry]]''' <br> ''[http://authorurl.com Dan Rojas]''<br> [http://video.google.com/ VIDEO] / [http://owasp.org SLIDES] |
− | | style="background:#B7AFA3" align="center" | '''[[Link to Preso Page | Information Control: The Critical Need for a Defensible Position - Securing the Information Ecosystem]]''' <br> ''[http://authorurl.com Author Name]''<br> [http://video.google.com/ VIDEO] / [http://owasp.org SLIDES] | + | | style="background:#B7AFA3" align="center" | '''[[Link to Preso Page | Information Control: The Critical Need for a Defensible Position - Securing the Information Ecosystem]]''' <br> ''[http://authorurl.com Tom Glanville]''<br> [http://video.google.com/ VIDEO] / [http://owasp.org SLIDES] |
| |- | | |- |
| | style="background:#024C68; color:white" align="center" | 15:15-15:45 | | | style="background:#024C68; color:white" align="center" | 15:15-15:45 |
Revision as of 19:26, 7 March 2013
SnowFROC 2013 schedule
This schedule is subject to frequently changes as the conference draws nearer.
CFP Schedule
Abstract collection will begin January 14th and continue until all speaking slots are filled. Rolling evaluations will occur and selected papers will be announced each Monday beginning on February 11th.
Final presentations of accepted abstracts must be submitted for review by March 17th. Presentations will be delivered during the conference on March 28th.
(See the CFP section for additional dates and details.)
Day of Event Schedule
Thu, Mar 28
|
Technical Track
|
Deep-Dive Track
|
Management Track
|
Legal Track
|
|
07:00-08:30
|
Registration and Morning Snacks Food provided by [SPONSORSHIP AVAILABLE] (07:00 - 08:30)
|
08:00-08:15
|
Welcome and Kick-off Steve Kosten, Mark Major Slides
|
08:15-08:30
|
State of OWASP Jim Manico Slides
|
08:30-09:30
|
Keynote Address Neal Ziring, Technical Director of Information Protection, NSA Slides
|
09:30-10:00
|
Coffee Break and Sponsor Expo Coffee provided by [SPONSORSHIP AVAILABLE]
|
CTF Kick-off Chris Rossi, Mark Major
|
10:00-10:45
|
DevFu: The inner ninja in every application developer Danny Chrastil VIDEO / SLIDES
|
SIP Based Cloud Instances Gregory Disney-Leugers VIDEO / SLIDES
|
Measuring Best Security Practices With Open SAMM Alan Jex VIDEO / SLIDES
|
Electronic Discovery for System Administrators Russell Shumway VIDEO / SLIDES
|
CTF
|
10:55-11:40
|
Adventures in Large Scale HTTP Header Abuse Zachary Wolff VIDEO / SLIDES
|
How Malware Attacks Web Applications Casey Smith VIDEO / SLIDES
|
Software Assurance Improvements Through Innovation and Collaboration (Confirmation Pending) Kevin Greene VIDEO / SLIDES
|
CISPA: Why Privacy Advocates This Legislation Maureen Donohue Feinroth VIDEO / SLIDES
|
11:40-12:40
|
Lunch and Sponsor Expo Lunch provided by [SPONSORSHIP AVAILABLE]
|
12:40-13:25
|
Angry Cars: Hacking the "Car as Platform" (Confirmation Pending) Aaron Weaver VIDEO / SLIDES
|
Top Ten Web Application Defenses Jim Manico VIDEO / SLIDES
|
Using SaaS and the Cloud to Secure the SDLC Andrew Earle VIDEO / SLIDES
|
Digital Bounty Hunters - Decoding Bug Bounty Programs Jon Rose VIDEO / SLIDES
|
13:35-14:20
|
Real World Cloud Application Security Jason Chan VIDEO / SLIDES
|
A Demo of and Preventing XSS in .NET Applications Larry Conklin VIDEO / SLIDES
|
Defending Desktop (.NET/C#) Applications: Mitigating in the Dark (A Case Study Remix) Jon McCoy VIDEO / SLIDES
|
Crafting a Plan for When Security Fails Robert Lelewski VIDEO / SLIDES
|
14:30-15:15
|
DevOps and Security: It's Happening. Right Now. (Confirmation Pending) Helen Bravo VIDEO / SLIDES
|
Data Mining a Mountain of Zero Day Vulnerabilities Joe Brady VIDEO / SLIDES
|
Linking Security to Business Value in the Customer Service Industry Dan Rojas VIDEO / SLIDES
|
Information Control: The Critical Need for a Defensible Position - Securing the Information Ecosystem Tom Glanville VIDEO / SLIDES
|
15:15-15:45
|
Coffee Break and Sponsor Expo Coffee provided by [SPONSORSHIP AVAILABLE]
|
15:45-16:45
|
Moderated Panel Discussion
Panelist Name, Company & Title
Panelist Name, Company & Title
Panelist Name, Company & Title
Moderator: Jim Manico
VIDEO / SLIDES
|
16:45-17:00
|
Closing Statements Steve Kosten, Mark Major
|
17:00-
|
Sponsor Raffles, Drawings, and Contests Steve Kosten, Mark Major
|
CTF Wrap-Up Chris Rossi, Mark Major
|
18:30-21:00+
|
AppliedTrust after-party at TBD CTF awards ceremony (19:30)
|
|
|
|
|
Fri, Mar 29
|
Training
|
Birds of a Feather: A
|
Birds of a Feather: B
|
Capture the Flag
|
|
09:00-9:45
|
Secure Coding
|
DevOps in Cloud environments (edit)
|
BoaF 1b (edit)
|
FLOSSHack: CTF VM
|
10:00-10:45
|
The modern threatscape: what have you seen? (edit)
|
BoaF 2b (edit)
|
10:45-11:15
|
Coffee Break Provided by [SPONSORSHIP AVAILABLE]
|
11:15-12:00
|
Access Control (edit)
|
BoaF 3b (edit)
|
FLOSSHack: CTF Scoreboard
|
12:15-13:00
|
COTS solutions for secure enterprise architectures (edit)
|
BoaF 4b (edit)
|