This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Front Range OWASP Conference 2013/Presentations"
Jess Garrett (talk | contribs) (Created page with "Presentation details coming soon.") |
Jess Garrett (talk | contribs) |
||
Line 1: | Line 1: | ||
− | + | =='''10:00-10:45'''== | |
+ | '''Title: '''DevFu: The inner ninja in every application developer | ||
+ | |||
+ | '''Speaker: '''Danny Chrastil | ||
+ | |||
+ | '''Track: '''Technical | ||
+ | |||
+ | '''Abstract: ''' | ||
+ | |||
+ | |||
+ | '''Title: '''SIP Based Cloud Instances | ||
+ | |||
+ | '''Speaker: '''Gregory Disney-Leugers | ||
+ | |||
+ | '''Track: '''Deep Dive | ||
+ | |||
+ | '''Abstract: ''' | ||
+ | |||
+ | |||
+ | '''Title: '''Measuring Best Security Practices With Open SAMM | ||
+ | |||
+ | '''Speaker: '''Alan Jex | ||
+ | |||
+ | '''Track: '''Management | ||
+ | |||
+ | '''Abstract: ''' | ||
+ | |||
+ | |||
+ | '''Title: '''Electronic Discovery for System Administrators | ||
+ | |||
+ | '''Speaker: '''Russell Shumway | ||
+ | |||
+ | '''Track: '''Executive/Legal | ||
+ | |||
+ | '''Abstract: ''' | ||
+ | |||
+ | |||
+ | |||
+ | =='''10:55-11:40'''== | ||
+ | '''Title: '''Adventures in Large Scale HTTP Header Abuse | ||
+ | |||
+ | '''Speaker: '''Zachary Wolff | ||
+ | |||
+ | '''Track: '''Technical | ||
+ | |||
+ | '''Abstract: ''' | ||
+ | |||
+ | |||
+ | '''Title: '''How Malware Attacks Web Applications | ||
+ | |||
+ | '''Speaker: '''Casey Smith | ||
+ | |||
+ | '''Track: '''Deep Dive | ||
+ | |||
+ | '''Abstract: ''' | ||
+ | |||
+ | |||
+ | '''Title: '''Software Assurance Improvements Through Innovation and Collaboration | ||
+ | |||
+ | '''Speaker: '''Kevin Greene | ||
+ | |||
+ | '''Track: '''Management | ||
+ | |||
+ | '''Abstract: ''' | ||
+ | |||
+ | |||
+ | '''Title: '''CISPA Why Privacy Advocates This Legislation | ||
+ | |||
+ | '''Speaker: '''Maureen Donohue Feinroth | ||
+ | |||
+ | '''Track: '''Executive/Legal | ||
+ | |||
+ | '''Abstract: ''' | ||
+ | |||
+ | |||
+ | |||
+ | |||
+ | =='''12:40-13:25'''== | ||
+ | '''Title:'''Angry Cars: Hack the "Car as Platform" | ||
+ | |||
+ | '''Speaker:'''Aaron Weaver | ||
+ | |||
+ | '''Room/Track:'''Technical | ||
+ | |||
+ | '''Abstract:''' | ||
+ | |||
+ | |||
+ | '''Title: '''Top Ten Web Application Defenses | ||
+ | |||
+ | '''Speaker: '''Jim Manico | ||
+ | |||
+ | '''Track: '''Deep Dive | ||
+ | |||
+ | '''Abstract: ''' | ||
+ | |||
+ | |||
+ | '''Title: '''Using SaaS and the Cloud to Secure the SDLC | ||
+ | |||
+ | '''Speaker: '''Andrew Earle | ||
+ | |||
+ | '''Track: '''Management | ||
+ | |||
+ | '''Abstract: ''' | ||
+ | |||
+ | |||
+ | '''Title: '''Digital Bounty Hunters - Decoding Bug Bounty Programs | ||
+ | |||
+ | '''Speaker: '''Jon Rose | ||
+ | |||
+ | '''Track: '''Executive/Legal | ||
+ | |||
+ | '''Abstract: ''' | ||
+ | |||
+ | |||
+ | |||
+ | =='''13:35-14:20'''== | ||
+ | '''Title: '''Real World Cloud Application Security | ||
+ | |||
+ | '''Speaker: '''Jason Chan | ||
+ | |||
+ | '''Track: '''Technical | ||
+ | |||
+ | '''Abstract: ''' | ||
+ | |||
+ | |||
+ | '''Title: '''A Demo of and Preventing XSS in .NET Applications | ||
+ | |||
+ | '''Speaker: '''Larry Conklin | ||
+ | |||
+ | '''Track: '''Deep Dive | ||
+ | |||
+ | '''Abstract: ''' | ||
+ | |||
+ | |||
+ | '''Title: '''Defending Desktop (.NET/C#) Applications: Mitigating in the Dark | ||
+ | |||
+ | '''Speaker: '''Jon McCoy | ||
+ | |||
+ | '''Track: '''Management | ||
+ | |||
+ | '''Abstract: ''' | ||
+ | |||
+ | |||
+ | '''Title: '''Crafting a Plan for When Security Fails | ||
+ | |||
+ | '''Speaker: '''Robert Lelewski | ||
+ | |||
+ | '''Track: '''Executive/Legal | ||
+ | |||
+ | '''Abstract: ''' | ||
+ | |||
+ | |||
+ | |||
+ | =='''14:30-15:15'''== | ||
+ | '''Title: '''DevOps and Security: It's Happening. Right Now. | ||
+ | |||
+ | '''Speaker: '''Helen Bravo | ||
+ | |||
+ | '''Track: '''Technical | ||
+ | |||
+ | '''Abstract: ''' | ||
+ | |||
+ | |||
+ | '''Title: '''Data Mining a Mountain of Zero Day Vulnerabilities | ||
+ | |||
+ | '''Speaker: '''Joe Brady | ||
+ | |||
+ | '''Track: '''Deep Dive | ||
+ | |||
+ | '''Abstract: ''' | ||
+ | |||
+ | |||
+ | '''Title: '''Linking Security to Business Value in the Customer Service Industry | ||
+ | |||
+ | '''Speaker: '''Dan Rojas | ||
+ | |||
+ | '''Track: '''Management | ||
+ | |||
+ | '''Abstract: ''' | ||
+ | |||
+ | |||
+ | '''Title: '''Information Control: The Critical Need for a Defensible Position - Securing the Information Ecosystem | ||
+ | |||
+ | '''Speaker: '''Tom Glanville | ||
+ | |||
+ | '''Track: '''Executive/Legal | ||
+ | |||
+ | '''Abstract: ''' |
Revision as of 21:35, 7 March 2013
10:00-10:45
Title: DevFu: The inner ninja in every application developer
Speaker: Danny Chrastil
Track: Technical
Abstract:
Title: SIP Based Cloud Instances
Speaker: Gregory Disney-Leugers
Track: Deep Dive
Abstract:
Title: Measuring Best Security Practices With Open SAMM
Speaker: Alan Jex
Track: Management
Abstract:
Title: Electronic Discovery for System Administrators
Speaker: Russell Shumway
Track: Executive/Legal
Abstract:
10:55-11:40
Title: Adventures in Large Scale HTTP Header Abuse
Speaker: Zachary Wolff
Track: Technical
Abstract:
Title: How Malware Attacks Web Applications
Speaker: Casey Smith
Track: Deep Dive
Abstract:
Title: Software Assurance Improvements Through Innovation and Collaboration
Speaker: Kevin Greene
Track: Management
Abstract:
Title: CISPA Why Privacy Advocates This Legislation
Speaker: Maureen Donohue Feinroth
Track: Executive/Legal
Abstract:
12:40-13:25
Title:Angry Cars: Hack the "Car as Platform"
Speaker:Aaron Weaver
Room/Track:Technical
Abstract:
Title: Top Ten Web Application Defenses
Speaker: Jim Manico
Track: Deep Dive
Abstract:
Title: Using SaaS and the Cloud to Secure the SDLC
Speaker: Andrew Earle
Track: Management
Abstract:
Title: Digital Bounty Hunters - Decoding Bug Bounty Programs
Speaker: Jon Rose
Track: Executive/Legal
Abstract:
13:35-14:20
Title: Real World Cloud Application Security
Speaker: Jason Chan
Track: Technical
Abstract:
Title: A Demo of and Preventing XSS in .NET Applications
Speaker: Larry Conklin
Track: Deep Dive
Abstract:
Title: Defending Desktop (.NET/C#) Applications: Mitigating in the Dark
Speaker: Jon McCoy
Track: Management
Abstract:
Title: Crafting a Plan for When Security Fails
Speaker: Robert Lelewski
Track: Executive/Legal
Abstract:
14:30-15:15
Title: DevOps and Security: It's Happening. Right Now.
Speaker: Helen Bravo
Track: Technical
Abstract:
Title: Data Mining a Mountain of Zero Day Vulnerabilities
Speaker: Joe Brady
Track: Deep Dive
Abstract:
Title: Linking Security to Business Value in the Customer Service Industry
Speaker: Dan Rojas
Track: Management
Abstract:
Title: Information Control: The Critical Need for a Defensible Position - Securing the Information Ecosystem
Speaker: Tom Glanville
Track: Executive/Legal
Abstract: