|
|
| Line 7: |
Line 7: |
| | <table border=1 width=950> | | <table border=1 width=950> |
| | <tr> <th width=50> Time </th> <th width=300> Build it! </th> <th width=300> Break it!</th> <th width=300> Bring it on!</th></tr> | | <tr> <th width=50> Time </th> <th width=300> Build it! </th> <th width=300> Break it!</th> <th width=300> Bring it on!</th></tr> |
| − | <tr><th>930</th><th colspan=3>Registration Opens </th></tr> | + | <tr><th>0800</th><th colspan=3>Registration Opens & TechExpo </th></tr> |
| − | <tr><th>945</th><th colspan=3>AppSec 2008 Kick Off: Jeff Willams, Dave Wichers, Tom Brennan, Dinis Cruz & Sebastien Deleersnyder - OWASP Foundation Board Members </th></tr> | + | <tr><th>0930</th><th colspan=3> Keynote: OWASP Foundation </th></tr> |
| | | | |
| − | <tr><th>1000</th><td>Active 802.11 Fingerprinting: Gibberish and "Secret Handshakes" to Know Your AP<br><i>Sergey Bratus, Cory Cornelius and Daniel Peebles</i></td> | + | <tr><th>1000</th><td>TOPIC<br><i>SPEAKERS</i></td> |
| − | <td>Virtual Worlds - Real Exploits<br><i>Charlie Miller and Dino Dai Zovi</i></td> | + | <td>TOPICS<br><i>SPEAKERS</i></td> |
| − | <td>Climbing EVEREST - An Inside Look at Voting Systems Used in the US<br><i>Sandy Clark, Eric Cronin, Gaurav Shah and Matt Blaze</i></td></tr> | + | <td>TOPICS<br><i>SPEAKERS</i></td></tr> |
| | | | |
| − | <tr><th>1100</th><td>SIPing Your Network<br><I>Radu State, Humberto Abdelnur, and Olivier Festor</i></td> | + | <tr><th>1100</th><td>TOPIC<br><I>SPEAKERS</i></td> |
| − | <td>Smarter Password Cracking<br><i>Matt Weir</i></td> | + | <td>TOPIC<br><i>SPEAKERS</i></td> |
| − | <td>Forced Internet Condom<br><i>Aaron Higbee and Jaime Fuentes</i></td></tr> | + | <td>TOPIC<br><i>SPEAKERS</i></td></tr> |
| | | | |
| − | <tr><th>1200</th><td>They're Hacking Our Clients! Why are We Focusing Only on the Servers<br><i>Jay Beale</i></td> | + | <tr><th>1200</th><td>TOPIC<br><i>SPEAKERS</i></td> |
| − | <td>21st Century Shellcode for Solaris<br><i>Tim Vidas</i></td> | + | <td>TOPIC<br><i>SPEAKERS</i></td> |
| − | <td>A Hacker Looks Past 50<br><i>G. Mark Hardy</i></td></tr> | + | <td>TOPIC<br><i>SPEAKERS</i></td></tr> |
| | | | |
| | <tr><th>1300</th><th colspan=3>Lunch </th></tr> | | <tr><th>1300</th><th colspan=3>Lunch </th></tr> |
| | | | |
| − | <tr><th>1400</th><td>Passive Host Characterization<br><i> Matthew Wollenweber</i></td> | + | <tr><th>1400</th><td>TOPIC<br><i>SPEAKERS</i></td> |
| − | <td>Why are Databases so Hard to Secure<br><i>Sheeri Cabral</i></td> | + | <td>TOPIC<br><i>SPEAKERS</i></td> |
| − | <td>TL1 Device Security<br><i>Rachel Bicknell</i></td></tr> | + | <td>TOPIC<br><i>SPEAKERS</i></td></tr> |
| | | | |
| | <tr><th>1500</th><td>Practical Hacker Crypto<br><i>Simple Nomad</i></td> | | <tr><th>1500</th><td>Practical Hacker Crypto<br><i>Simple Nomad</i></td> |
| Line 70: |
Line 70: |
| | <hr> | | <hr> |
| | | | |
| − |
| |
| − |
| |
| − |
| |
| − | == Seminars - Track 1 / Track 2 / Track 3 ==
| |
| − |
| |
| − | {| style="width:80%" border="0" align="center"
| |
| − | ! colspan="3" align="center" style="background:#4058A0; color:white" | Day 1 - October 7, 2008
| |
| − | |-
| |
| − | | style="width:10%; background:#7B8ABD" | || style="width:40%; background:#BC857A" | Track 1:
| |
| − | | style="width:40%; background:#BCA57A" | Track 2:
| |
| − | |-
| |
| − | | style="width:10%; background:#7B8ABD" | 08:00-09:00 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Registration and Coffee
| |
| − | |-
| |
| − | | style="width:10%; background:#7B8ABD" | 09:00-09:15 || colspan="2" style="width:80%; background:#F2F2F2" align="left" | OWASP AppSec 2008 Kick Off: Jeff Willams, Dave Wichers, Tom Brennan, Dinis Cruz & Sebastien Deleersnyder - OWASP Foundation Board Members
| |
| − | |-
| |
| − | | style="width:10%; background:#7B8ABD" | 09:10-10:00 || colspan="2" style="width:80%; background:#F2F2F2" align="left" | Keynote: Special Guest
| |
| − | |-
| |
| − | | style="width:10%; background:#7B8ABD" | 10:00-10:45 || colspan="2" style="width:80%; background:#F2F2F2" align="left" | Panel: Industry Roundtable
| |
| − | Moderator: Tom Brennan
| |
| − |
| |
| − | Panelists: Jennifer Bayuk, CISO, Bear Stearns, Warren Axelrod, SVP, Bank of America, Jim Routh, CISO, DTCC
| |
| − | |-
| |
| − | | style="width:10%; background:#7B8ABD" | 11:00-11:45 || colspan="2" style="width:80%; background:#F2F2F2" align="left" | Speaker2
| |
| − | |-
| |
| − | | style="width:10%; background:#7B8ABD" | 12:00-12:45 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Speaker3
| |
| − | |-
| |
| − | | style="width:10%; background:#7B8ABD" | 13:00-14:00 || style="width:40%; background:#BC857A" align="left" | Topic: [http://w3af.sourceforge.net W3AF] is a Web application attack and Audit Framework
| |
| − | Speaker: Andres Riancho a student at UBA and an information security geek that lives in Argentina. He has contributed to other Open Source projects and esporadically writes for SecureArg an information security site co-founded by him
| |
| − | | style="width:40%; background:#BCA57A" align="left" | Speaker5
| |
| − | |-
| |
| − | | style="width:10%; background:#7B8ABD" | 12:45-13:45 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Speaker6
| |
| − | |-
| |
| − | | style="width:10%; background:#7B8ABD" | 13:45-14:30 || style="width:40%; background:#BC857A" align="left" | Speaker7
| |
| − | | style="width:40%; background:#BCA57A" align="left" | Topic: Hacking Intranets Through Web Interfaces
| |
| − | Speaker:[http://www.sectheory.com/bio.htm Robert "RSNAKE" Hansen]
| |
| − | |-
| |
| − | | style="width:10%; background:#7B8ABD" | 14:30-15:10 || style="width:40%; background:#BC857A" align="left" | Speaker9
| |
| − | | style="width:40%; background:#BCA57A" align="left" | Speaker10
| |
| − | |-
| |
| − | | style="width:10%; background:#7B8ABD" | 15:10-15:30 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Break
| |
| − | |-
| |
| − | | style="width:10%; background:#7B8ABD" | 15:30-16:40 || style="width:40%; background:#BC857A" align="left" | Speaker11
| |
| − | | style="width:40%; background:#BCA57A" align="left" | Speaker12
| |
| − | |-
| |
| − | | style="width:10%; background:#7B8ABD" | 16:40-17:00 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Break
| |
| − | |-
| |
| − | | style="width:10%; background:#7B8ABD" | 17:00-18:00 || colspan="2" style="width:40%; background:#F2F2F2" align="left" | Panel: Security Roundtable
| |
| − | Moderator: TBD
| |
| − |
| |
| − | Panelists: Chris Stangle, FBI Cybercrimes, TBD, TBD, TBD, TBD,
| |
| − | |-
| |
| − | | style="width:10%; background:#7B8ABD" | 18:00-19:00 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | OWASP Worldwide Chapter Leader Meeting
| |
| − | |-
| |
| − | | style="width:10%; background:#7B8ABD" | 19:00-21:00 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | OWASP Social Gathering: Dinner and Drinks
| |
| − | |-
| |
| − | ! colspan="3" align="center" style="background:#4058A0; color:white" | Day 2 - October 8th, 2008
| |
| − | |-
| |
| − | | style="width:10%; background:#7B8ABD" | || style="width:40%; background:#BC857A" | Track 1:
| |
| − | | style="width:40%; background:#BCA57A" | Track 2:
| |
| − | |-
| |
| − | | style="width:10%; background:#7B8ABD" | 08:00-09:00 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Coffee
| |
| − | |-
| |
| − | | style="width:10%; background:#7B8ABD" | 09:00-9:50 || colspan="2" style="width:80%; background:#F2F2F2" align="left" | Keynote: tbd
| |
| − | |-
| |
| − | | style="width:10%; background:#7B8ABD" | 9:50-10:30 || colspan="2" style="width:80%; background:#F2F2F2" align="left" | tbd
| |
| − | |-
| |
| − | | style="width:10%; background:#7B8ABD" | 10:30-10:50 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Break
| |
| − | |-
| |
| − | | style="width:10%; background:#7B8ABD" | 10:50-11:30 || style="width:40%; background:#BC857A" align="left" | tbd
| |
| − | | style="width:40%; background:#BCA57A" align="left" | tbd
| |
| − | |-
| |
| − | | style="width:10%; background:#7B8ABD" | 11:30-12:30 || style="width:40%; background:#BC857A" align="left" | tbd
| |
| − | | style="width:40%; background:#BCA57A" align="left" | tbd
| |
| − | |-
| |
| − | | style="width:10%; background:#7B8ABD" | 12:30-13:45 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Lunch
| |
| − | |-
| |
| − | | style="width:10%; background:#7B8ABD" | 13:45-14:30 || style="width:40%; background:#BC857A" align="left" | tbd
| |
| − | | style="width:40%; background:#BCA57A" align="left" | tbd
| |
| − | |-
| |
| − | | style="width:10%; background:#7B8ABD" | 14:30-15:20 || style="width:40%; background:#BC857A" align="left" | tbd
| |
| − | | style="width:40%; background:#BCA57A" align="left" | tbd
| |
| − | |-
| |
| − | | style="width:10%; background:#7B8ABD" | 15:20-15:40 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Break
| |
| − | |-
| |
| − | | style="width:10%; background:#7B8ABD" | 15:40-16:30 || style="width:40%; background:#BC857A" align="left" | tbd
| |
| − | | style="width:40%; background:#BCA57A" align="left" | tbd
| |
| − | |-
| |
| − | | style="width:10%; background:#7B8ABD" | 16:30-17:30 || style="width:40%; background:#F2F2F2" align="left" | Panel: Responsible "tbd"
| |
| − | Moderator: tbd
| |
| − |
| |
| − | Panelists: tbd
| |
| − | | style="width:40%; background:#F2F2F2" align="left" | Panel: "tbd"
| |
| − | Moderator: tbd
| |
| − |
| |
| − | Panelists: tbd
| |
| − | |-
| |
| − | | style="width:10%; background:#7B8ABD" | 17:30-17:45 || colspan="2" style="width:40%; background:#F2F2F2" align="left" | Conference Wrap Up
| |
| − | |-
| |
| − | | style="width:10%; background:#7B8ABD" | 18:30-20:30 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Cocktail Party (tbd?)
| |
| − | |}
| |
| − |
| |
| − | Track 3:
| |
| − |
| |
| − | {| style="width:80%" border="0" align="center"
| |
| − | ! colspan="3" align="center" style="background:#4058A0; color:white" | Day 1 - May 22, 2008
| |
| − | |-
| |
| − | | style="width:10%; background:#7B8ABD" | || style="width:80%; background:#BC857A" | Track 3:
| |
| − | |-
| |
| − | | style="width:10%; background:#7B8ABD" | 11:10-11:30 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Break
| |
| − | |-
| |
| − | | style="width:10%; background:#7B8ABD" | 11:30-12:30 || style="width:80%; background:#BC857A" align="left" | tbd
| |
| − | |-
| |
| − | | style="width:10%; background:#7B8ABD" | 12:30-13:45 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Lunch
| |
| − | |-
| |
| − | | style="width:10%; background:#7B8ABD" | 13:45-14:30 || style="width:80%; background:#BC857A" align="left" | tbd
| |
| − | |-
| |
| − | | style="width:10%; background:#7B8ABD" | 14:30-15:10 || style="width:80%; background:#BC857A" align="left" | tbd
| |
| − | |-
| |
| − | | style="width:10%; background:#7B8ABD" | 15:10-15:30 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Break
| |
| − | |-
| |
| − | | style="width:10%; background:#7B8ABD" | 15:30-16:40 || style="width:80%; background:#BC857A" align="left" | tbd
| |
| − | |}
| |
| − | {| style="width:80%" border="0" align="center"
| |
| − | ! colspan="3" align="center" style="background:#4058A0; color:white" | Day 2 - May 23, 2008
| |
| − | |-
| |
| − | | style="width:10%; background:#7B8ABD" | || style="width:80%; background:#BC857A" | Track 3:
| |
| − | |-
| |
| − | | style="width:10%; background:#7B8ABD" | 11:10-11:30 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Break
| |
| − | |-
| |
| − | | style="width:10%; background:#7B8ABD" | 11:30-12:30 || style="width:80%; background:#BC857A" align="left" | tbd
| |
| − | |-
| |
| − | | style="width:10%; background:#7B8ABD" | 12:30-13:45 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Lunch
| |
| − | |-
| |
| − | | style="width:10%; background:#7B8ABD" | 13:45-14:30 || style="width:80%; background:#BC857A" align="left" | tbd
| |
| − | |-
| |
| − | | style="width:10%; background:#7B8ABD" | 14:30-15:10 || style="width:80%; background:#BC857A" align="left" | tbd
| |
| − | |-
| |
| − | | style="width:10%; background:#7B8ABD" | 15:10-15:30 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Break
| |
| − | |-
| |
| − | | style="width:10%; background:#7B8ABD" | 15:30-16:40 || style="width:80%; background:#BC857A" align="left" | tbd
| |
| − | |}
| |
| | | | |
| | == Technology Expo - October 7th - 8th == | | == Technology Expo - October 7th - 8th == |
| Line 217: |
Line 76: |
| | | | |
| | To be a vendor at this event please contact Tom Brennan at tomb (at) owasp.org or 973-202-0122 | | To be a vendor at this event please contact Tom Brennan at tomb (at) owasp.org or 973-202-0122 |
| − |
| |
| | | | |
| | == OWASP AppSec 2008 Training Courses - October 9th and 10th 2008 == | | == OWASP AppSec 2008 Training Courses - October 9th and 10th 2008 == |
Want to see the latest offerings from best of breed technology firms? For 2 days, Product/Service vendors worldwide will demonstrate their ability to conference attendees.
To be a vendor at this event please contact Tom Brennan at tomb (at) owasp.org or 973-202-0122
To be a trainer at this event please contact Tom Brennan at tomb (at) owasp.org or 973-202-0122