This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "2015 BASC Agenda"

From OWASP
Jump to: navigation, search
Line 51: Line 51:
 
</td>
 
</td>
 
</tr>
 
</tr>
<tr><td>&nbsp;</td></tr>
 
<tr><td colspan="2"><span style="text-align:center;font-size:160%">We have begun to select [[2015_BASC_Speakers | Speakers]] and [[2015_BASC_Presentations | Presentations]].<br/>
 
Specific time slots will be assigned very soon.</span>
 
</td></tr>
 
 
</table>
 
</table>
 
  |-
 
  |-
Line 71: Line 67:
 
|-
 
|-
 
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 10:00-10:50 || style="width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" |   
 
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 10:00-10:50 || style="width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" |   
{{2015_BASC:Presentaton_Agenda_Template|Presentation| | }}
+
{{2015_BASC:Presentaton_Agenda_Template|Presentation|Threat Modeling Global Catastrophic Risks|Luke Donoho }}
 
  | style="width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" |  
 
  | style="width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" |  
{{2015_BASC:Presentaton_Agenda_Template|Presentation| | }}
+
{{2015_BASC:Presentaton_Agenda_Template|Presentation|Scaling Appsec for the Enterprise|Brian Heemsoth }}
 
|-
 
|-
 
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 11:00-11:50 || style="width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" |  
 
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 11:00-11:50 || style="width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" |  
{{2015_BASC:Presentaton_Agenda_Template|Presentation| | }}
+
{{2015_BASC:Presentaton_Agenda_Template|Presentation|Using OSINT to Attack Web Applications|Casey Dunham }}
 
  | style="width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" |  
 
  | style="width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" |  
{{2015_BASC:Presentaton_Agenda_Template|Presentation| | }}
+
{{2015_BASC:Presentaton_Agenda_Template|Presentation|Cutting the Gordian Knot: A Look Under the Hood of Ransomware Attacks|Amin Kharraz }}
 
|-
 
|-
 
  | style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 12:00-13:00 || colspan="2" style="background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 1px; border-bottom-width: 0px" align="center" |  
 
  | style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 12:00-13:00 || colspan="2" style="background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 1px; border-bottom-width: 0px" align="center" |  
Line 86: Line 82:
 
|-
 
|-
 
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 13:00-13:50 || style="width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" |  
 
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 13:00-13:50 || style="width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" |  
{{2015_BASC:Presentaton_Agenda_Template|Presentation| | }}
+
{{2015_BASC:Presentaton_Agenda_Template|Presentation|Account Checking and User Credential Fraud|Kellen Kleinfelter }}
 
  | style="width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" |  
 
  | style="width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" |  
{{2015_BASC:Presentaton_Agenda_Template|Presentation| | }}
+
{{2015_BASC:Presentaton_Agenda_Template|Presentation|Assessing the Security of Web Applications, It is like Penetration Testing|Matt Morency }}
  
 
|-
 
|-
 
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 14:00-14:50 || style="width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" |  
 
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 14:00-14:50 || style="width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" |  
{{2015_BASC:Presentaton_Agenda_Template|Presentation| | }}
+
{{2015_BASC:Presentaton_Agenda_Template|Presentation|Known Vulnerabilities - What Security Testing Tools Miss|Mike Pittenger }}
 
  | style="width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" |  
 
  | style="width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" |  
{{2015_BASC:Presentaton_Agenda_Template|Presentation| | }}
+
{{2015_BASC:Presentaton_Agenda_Template|Presentation|How To Make Threat Modeling Work For You|Robert Hurlbut }}
 
|-
 
|-
 
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 15:00-15:50 || style="width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" |  
 
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 15:00-15:50 || style="width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" |  
{{2015_BASC:Presentaton_Agenda_Template|Presentation| | }}
+
{{2015_BASC:Presentaton_Agenda_Template|Presentation|Can Buffer Overflow Attacks Be Stopped?|Satya Gupta  }}
 
  | style="width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" |  
 
  | style="width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" |  
{{2015_BASC:Presentaton_Agenda_Template|Presentation| | }}
+
{{2015_BASC:Presentaton_Agenda_Template|Presentation|Securing Hadoop Application Ecosystem|Biju Nair }}
  
 
|-
 
|-
 
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 16:00-16:50 || style="width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" |  
 
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 16:00-16:50 || style="width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" |  
{{2015_BASC:Presentaton_Agenda_Template|Presentation| | }}
+
{{2015_BASC:Presentaton_Agenda_Template|Presentation|NeonTool: From XSS to root on your NAS|Tony Martin }}
 
  | style="width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" |  
 
  | style="width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" |  
{{2015_BASC:Presentaton_Agenda_Template|Presentation| | }}
+
{{2015_BASC:Presentaton_Agenda_Template|Presentation|Cryptography: The Devil is in the Details|Matt Cheung }}
 
|-
 
|-
  

Revision as of 02:41, 18 September 2015

Boston-Banner-468x60.gif 2015 BASC: Home | Agenda | Presentations | Speakers

Platinum Sponsors

Rapid7

Silver Sponsors

bugcrowd


Sponsorships are available: See Sponsorship Kit
Please help us keep BASC free by viewing and visiting all of our sponsors.


OWASP Logo.gif

OWASP Boston Application Security Conference
Saturday, October 3, 2015

8:30-9:30

Breakfast and Registration

09:00-09:50

Keynote

Horace Mann Room Deborah Sampson / Paul Thomas Room
10:00-10:50
11:00-11:50
12:00-13:00

Lunch
provided by our Platinum Sponsor

13:00-13:50
14:00-14:50
15:00-15:50
16:00-16:50
17:00-17:30

Social Time
provided by our Platinum Sponsor

17:30-18:30


Closing

Raffle
Wrap Up

You can find out more about this conference at the 2015 BASC Homepage
Conference Organizer: Jim Weiler