This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "OWASP New Zealand Day 2017"

From OWASP
Jump to: navigation, search
(Conference structure)
Line 417: Line 417:
 
<table width="100%">
 
<table width="100%">
 
<tr>
 
<tr>
<td width="5%" valign="top">08:30</td>
+
<td width="5%" valign="top" align="right">08:30</td>
<td colspan="2" style="background-color: #8595C2; text-align: center">Registration Opens</td>
+
<td colspan="3" style="background-color: #8595C2; text-align: center">Registration Opens</td>
 
</tr>
 
</tr>
 
<tr>
 
<tr>
<td width="7%" valign="top">09:30</td>
+
<td width="7%" valign="top" align="right">09:30</td>
<td colspan="2" style="background-color: #B9C2DC; text-align: center">
+
<td colspan="3" style="background-color: #B9C2DC; text-align: center">
 
<b>Welcome to OWASP New Zealand Day 2017</b><br />
 
<b>Welcome to OWASP New Zealand Day 2017</b><br />
 
<i>Lech Janczewski (Associate Professor), Kirk Jackson, Denis Andzakovic and [https://binarymist.io Kim Carter] (OWASP Leaders)</i>
 
<i>Lech Janczewski (Associate Professor), Kirk Jackson, Denis Andzakovic and [https://binarymist.io Kim Carter] (OWASP Leaders)</i>
 
  
 
</tr>
 
</tr>
 
<tr>
 
<tr>
<td width="7%" valign="top">09:45</td>
+
<td width="7%" valign="top" align="right">09:45</td>
 
<td style="background-color: #EEE; text-align: center">
 
<td style="background-color: #EEE; text-align: center">
 
<b>OWASP Top 10 Review & Preview</b><br />
 
<b>OWASP Top 10 Review & Preview</b><br />
 
<i>Kevin Alcock - Katipo Information Security</i>
 
<i>Kevin Alcock - Katipo Information Security</i>
 
</td>
 
</td>
<td rowspan="2" style="background-color: #EEE; text-align: center">
+
<td width="7%" valign="top" align="right">09:45</td>
 +
<td style="background-color: #EEE; text-align: center">
 
<b>Gaslighting with Honeypits and Mirages</b><br />
 
<b>Gaslighting with Honeypits and Mirages</b><br />
 
<i>Kate Pearce - Cisco</i>
 
<i>Kate Pearce - Cisco</i>
Line 440: Line 440:
 
</tr>
 
</tr>
 
<tr>
 
<tr>
<td width="7%" valign="top">10:20</td>
+
<td width="7%" valign="top" align="right">10:20</td>
 
<td style="background-color: #B9C2DC; text-align: center">
 
<td style="background-color: #B9C2DC; text-align: center">
 
<b>Developer's guide to preventing XSS</b><br />
 
<b>Developer's guide to preventing XSS</b><br />
 
<i>Felix Shi - Xero</i>
 
<i>Felix Shi - Xero</i>
 
</td>
 
</td>
 +
<td width="7%" valign="top" align="right">10:20</td>
 +
<td style="background-color: #B9C2DC; text-align: center">
 +
<b>The Magical World of Cloud Security</b><br />
 +
<i>Erica Anderson</i>
 +
</td>
 +
 
</tr>
 
</tr>
 
<tr>
 
<tr>
<td width="7%" valign="top">10:55</td>
+
<td width="7%" valign="top" align="right">10:55</td>
 
<td style="background-color: #EEE; text-align: center">
 
<td style="background-color: #EEE; text-align: center">
 
<b>The dangerous, exquisite art of safely handling user-uploaded files</b><br />
 
<b>The dangerous, exquisite art of safely handling user-uploaded files</b><br />
 
<i>Tom Eastman</i>
 
<i>Tom Eastman</i>
 
</td>
 
</td>
 +
<td width="7%" valign="top" align="right">10:55</td>
 
<td style="background-color: #EEE; text-align: center">
 
<td style="background-color: #EEE; text-align: center">
 
<b>How to spot and stop a wolf in sheep's clothing (a.k.a Account Takeover)</b><br />
 
<b>How to spot and stop a wolf in sheep's clothing (a.k.a Account Takeover)</b><br />
Line 458: Line 465:
 
</tr>
 
</tr>
 
<tr>
 
<tr>
<td width="7%" valign="top">11:30</td>
+
<td width="7%" valign="top" align="right">11:30</td>
 
<td style="background-color: #B9C2DC; text-align: center">
 
<td style="background-color: #B9C2DC; text-align: center">
 
<b>Building the ultimate login and signup</b><br />
 
<b>Building the ultimate login and signup</b><br />
 
<i>Matt Cotterell - Fairfax Media</i>
 
<i>Matt Cotterell - Fairfax Media</i>
 
</td>
 
</td>
 +
<td width="7%" valign="top" align="right">11:30</td>
 
<td style="background-color: #B9C2DC; text-align: center">
 
<td style="background-color: #B9C2DC; text-align: center">
 
<b>Security on a shoestring - running a security critical service as a volunteer</b><br />
 
<b>Security on a shoestring - running a security critical service as a volunteer</b><br />
Line 469: Line 477:
 
</tr>
 
</tr>
 
<tr>
 
<tr>
<td width="7%" valign="top">12:05</td>
+
<td width="7%" valign="top" align="right">12:05</td>
 
<td style="background-color: #EEE; text-align: center">
 
<td style="background-color: #EEE; text-align: center">
 
<b>XML: Still Considered Dangerous</b><br />
 
<b>XML: Still Considered Dangerous</b><br />
 
<i>Adam Bell - Lateral Security</i>
 
<i>Adam Bell - Lateral Security</i>
 
</td>
 
</td>
 +
<td width="7%" valign="top" align="right">12:05</td>
 
<td style="background-color: #EEE; text-align: center">
 
<td style="background-color: #EEE; text-align: center">
 
<b>Confession of a lactose intolerant vulnerability hunter</b><br />
 
<b>Confession of a lactose intolerant vulnerability hunter</b><br />
Line 480: Line 489:
 
</tr>
 
</tr>
 
<tr>
 
<tr>
<td width="7%" valign="top">12:35</td>
+
<td width="7%" valign="top" align="right">12:35</td>
<td colspan="2" style="background-color: #D98B66; text-align: center">
+
<td colspan="3" style="background-color: #D98B66; text-align: center">
 
<b>Break for Lunch</b><br />
 
<b>Break for Lunch</b><br />
 
</td>
 
</td>
 
</tr>
 
</tr>
 
<tr>
 
<tr>
<td width="7%" valign="top">14:00</td>
+
<td width="7%" valign="top" align="right">14:00</td>
 
<td style="background-color: #EEE; text-align: center">
 
<td style="background-color: #EEE; text-align: center">
 
<b>Sensible defaults for client-side security</b><br />
 
<b>Sensible defaults for client-side security</b><br />
 
<i>Jen Zajac - Catalyst</i>
 
<i>Jen Zajac - Catalyst</i>
 
</td>
 
</td>
 +
<td width="7%" valign="top" align="right">14:00</td>
 
<td style="background-color: #EEE; text-align: center">
 
<td style="background-color: #EEE; text-align: center">
 
<b>Huzzer, the tree-based generational mutating HTTP fuzzer</b><br />
 
<b>Huzzer, the tree-based generational mutating HTTP fuzzer</b><br />
 
<i>Matthew Daley - Aura Information Security</i>
 
<i>Matthew Daley - Aura Information Security</i>
 
</td>
 
</td>
</tr>
+
      </tr>
 
<tr>
 
<tr>
<td width="7%" valign="top">14:30</td>
+
<td width="7%" valign="top" align="right">14:30</td>
 
<td style="background-color: #B9C2DC; text-align: center">
 
<td style="background-color: #B9C2DC; text-align: center">
 
<b>Changing Perspectives</b><br />
 
<b>Changing Perspectives</b><br />
 
<i>Shahn Harris - Equifax</i>
 
<i>Shahn Harris - Equifax</i>
 
</td>
 
</td>
 +
<td width="7%" valign="top" align="right">14:30</td>
 
<td style="background-color: #B9C2DC; text-align: center">
 
<td style="background-color: #B9C2DC; text-align: center">
 
<b>Root Cause is the Best Cause</b><br />
 
<b>Root Cause is the Best Cause</b><br />
Line 508: Line 519:
 
</tr>
 
</tr>
 
<tr>
 
<tr>
<td width="7%" valign="top">15:15</td>
+
<td width="7%" valign="top" align="right">15:15</td>
 
<td style="background-color: #EEE; text-align: center">
 
<td style="background-color: #EEE; text-align: center">
 
<b>30 Days (ish) of Security</b><br />
 
<b>30 Days (ish) of Security</b><br />
 
<i>Grace Nolan and Catherine McIlvride</i>
 
<i>Grace Nolan and Catherine McIlvride</i>
 
</td>
 
</td>
 +
<td width="7%" valign="top" align="right">15:15</td>
 
<td style="background-color: #EEE; text-align: center">
 
<td style="background-color: #EEE; text-align: center">
 
<b>From JSONP to XSS persistence</b><br />
 
<b>From JSONP to XSS persistence</b><br />
Line 519: Line 531:
 
</tr>
 
</tr>
 
<tr>
 
<tr>
<td width="7%" valign="top">15:30</td>
+
<td width="7%" valign="top" align="right">15:30</td>
<td colspan="2" style="background-color: #D98B66; text-align: center">
+
<td colspan="3" style="background-color: #D98B66; text-align: center">
 
<b>Break for Afternoon Tea</b><br />
 
<b>Break for Afternoon Tea</b><br />
 
</td>
 
</td>
 
</tr>
 
</tr>
 
<tr>
 
<tr>
<td width="7%" valign="top">16:00</td>
+
<td width="7%" valign="top" align="right">16:00</td>
 
<td style="background-color: #EEE; text-align: center">
 
<td style="background-color: #EEE; text-align: center">
 
<b>So we broke all CSPs... You won't guess what happened next!</b><br />
 
<b>So we broke all CSPs... You won't guess what happened next!</b><br />
 
<i>Lukas Weichselbaum & Michele Spagnuolo - Google Switzerland</i>
 
<i>Lukas Weichselbaum & Michele Spagnuolo - Google Switzerland</i>
 
</td>
 
</td>
 +
<td width="7%" valign="top" align="right">16:00</td>
 
<td style="background-color: #EEE; text-align: center">
 
<td style="background-color: #EEE; text-align: center">
 
<b>AppSec in a DevOps World</b><br />
 
<b>AppSec in a DevOps World</b><br />
Line 536: Line 549:
 
</tr>
 
</tr>
 
<tr>
 
<tr>
<td width="7%" valign="top">16:45</td>
+
<td width="7%" valign="top" align="right">16:45</td>
 
<td style="background-color: #B9C2DC; text-align: center">
 
<td style="background-color: #B9C2DC; text-align: center">
 
<b>Hacking the Talent Pipeline</b><br />
 
<b>Hacking the Talent Pipeline</b><br />
 
<i>Ruth McDavitt - Summer of Tech</i>
 
<i>Ruth McDavitt - Summer of Tech</i>
 
</td>
 
</td>
<td rowspan="2" style="background-color: #B9C2DC; text-align: center">
+
<td width="7%" valign="top" align="right">16:30</td>
 +
<td style="background-color: #B9C2DC; text-align: center">
 
<b>Trust me, I'm a cloud</b><br />
 
<b>Trust me, I'm a cloud</b><br />
 
<i>Sam Macleod - SafeStack</i>
 
<i>Sam Macleod - SafeStack</i>
Line 547: Line 561:
 
</tr>
 
</tr>
 
<tr>
 
<tr>
<td width="7%" valign="top">17:00</td>
+
<td width="7%" valign="top" align="right">17:00</td>
 
<td style="background-color: #EEE; text-align: center">
 
<td style="background-color: #EEE; text-align: center">
 
<b>Conscious Incompetence: Started from the bottom, now we're here</b><br />
 
<b>Conscious Incompetence: Started from the bottom, now we're here</b><br />
 
<i>Charlie Gavey - Snapper Services</i>
 
<i>Charlie Gavey - Snapper Services</i>
 
</td>
 
</td>
 +
<td colspan="2">&nbsp;</td>
 
</tr>
 
</tr>
 
<tr>
 
<tr>
<td width="7%" valign="top">17:15</td>
+
<td width="7%" valign="top" align="right">17:15</td>
 
<td style="background-color: #B9C2DC; text-align: center">
 
<td style="background-color: #B9C2DC; text-align: center">
 
<b>Graphing when your Facebook friends are awake</b><br />
 
<b>Graphing when your Facebook friends are awake</b><br />
 
<i>Alex Hogue - Atlassian</i>
 
<i>Alex Hogue - Atlassian</i>
 
</td>
 
</td>
<td style="background-color: #B9C2DC; text-align: center">
+
<td colspan="2">&nbsp;</td>
<b>The Magical World of Cloud Security</b><br />
 
<i>Erica Anderson</i>
 
</td>
 
 
</tr>
 
</tr>
 
<tr>
 
<tr>
<td width="7%" valign="top">17:45</td>
+
<td width="7%" valign="top" align="right">17:45</td>
<td colspan="2" style="background-color: #EEE; text-align: center">
+
<td style="background-color: #EEE; text-align: center">
 
<b>Wrap Up</b><br />
 
<b>Wrap Up</b><br />
 
<i>Time for the pub, for those interested</i>
 
<i>Time for the pub, for those interested</i>
 
</td>
 
</td>
 +
<td colspan="2">&nbsp;</td>
 
</tr>
 
</tr>
 
</table>
 
</table>

Revision as of 02:09, 17 April 2017

https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2017

19th and 20th April 2017 - Auckland


Introduction

We are proud to announce the eighth OWASP New Zealand Day conference, to be held at the University of Auckland on Thursday April 20th, 2017. OWASP New Zealand Day is a one-day conference dedicated to application security, with an emphasis on secure architecture and development techniques to help Kiwi developers build more secure applications.


Who is it for?

  • Web Developers: There will be a choice of two streams in the morning. First stream covering introductory talks to application security, second stream covering deeper technical topics. Afternoon sessions will cover various defensive topics, with a DevSecOps cluster of talks in stream two after afternoon tea break.
  • Security Professionals and Enthusiasts: Technical sessions later in the day will showcase new and interesting attack and defence topics.

Conference structure

Date: Thurs 20 April 2017
Time: 9:30am - 6:00pm
Cost: Free

The main conference is on Thursday 20th of April, and will have two streams in both the morning and the afternoon:


Registration for the main conference day is now open: Conference Registration Here


Training

As well as the main conference on Thursday, we are pleased to be able to provide training on Wednesday at the same venue. All details including registration are as follows:

LittleHackMe - Morning Date: Wed 19 April 2017
Afternoon session: 9:00am - 12:00pm or part thereof
Morning Training Registration Page

LittleHackMe - Afternoon Date: Wed 19 April 2017
Afternoon session: 1:00pm - 5:00pm or part thereof
Afternoon Training Registration Page SOLD OUT

Advanced Web Hacking and Secure Coding Date: Wed 19 April 2017
Time: 9:00am - 5:00pm or part thereof
Training Registration Page SOLD OUT

(Additional training sessions are being provided privately by Vikram)


Security Testing for Software Testers Date: Wed 19 April 2017
Time: 9:00am - 5:00pm or part thereof
Training Registration Page SOLD OUT


Spaces going fast, so get in quick

General

The eighth OWASP New Zealand Day will be happening thanks to the support provided by the University of Auckland, which will kindly offer the same location as last year for stream one, with the addition of another room near by for the stream two room. Entry to the event will, as in the past, be free.


For any comments, feedback or observations, please don't hesitate to contact us.

Registration

Sold out!

Please add yourself to the waitlist if you'd like to be notified when tickets become available.


Registration for the main conference day is now open: Conference Registration Here Follow us on twitter @owaspnz


There is no cost for the main conference day. Unfortunately due to increased conference running costs, lunch, morning and afternoon tea's will not be provided as it has been for the past OWASP NZ Days. We do ask that if at any point you realise you cannot make it please cancel your registration to make room for others as spaces are limited.


Important dates

  • CFP submission deadline: 18th March 2017
  • CFT submission deadline: 28th February 2017
  • Conference Registration deadline: 15th April 2017
  • Training Registration deadline: 15th April 2017
  • Training Day date: 19th April 2017
  • Conference Day date: 20th April 2017


For those of you booking flights, ensure you can be at the venue at 9:00am, the conference will end by 6:00pm however we will have post conference drinks at a local drinking establishment for those interested.


Conference Venue

The University of Auckland School of Business
Owen Glen Building
Address: 12 Grafton Road

Stream one room: Level 1
Room: 115 (Fisher & Paykel Auditorium)

Stream two room: Level 0
Room: 092

Auckland
New Zealand
Map

073 AUBiz 10Apr08small.jpg OWASPNZDayLectureTheatre.jpg

Conference Sponsors

http://www.auckland.ac.nz

Gold Sponsors:

SA Logo w DD.gif
   
INSOMNIA.PNG
   
Aura PBK Colour.jpg
Redshield.png
   
Zx.png
   
Quantumblack3.png

Support Sponsor:

BinaryMistLimited.png
   
Atlassian.png

Conference Committee

  • Denis Andzakovic - OWASP New Zealand Leader (Auckland)
  • Kirk Jackson - OWASP New Zealand Leader (Wellington)
  • Kim Carter - OWASP New Zealand Leader (Christchurch)
  • Lech Janczewski - Associate Professor - University of Auckland School of Business

Please direct all enquiries to denis.andzakovic@owasp.org | kirk.jackson@owasp.org | kim.carter@owasp.org