This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "OWASP NYC AppSec 2008 Conference"

From OWASP
Jump to: navigation, search
Line 15: Line 15:
 
<tr><th>0930</th><th colspan=3>  Industry Outlook - Jennifer Bayuk-CISO Bear Stearns, Mark Clancy-EVP Citi, Jim Routh-CISO DTCC, Sunil Seshadri-CISO NYSE-Euronet, Warren Axelrod-SVP Bank of America, Dennis Brixius, The McGraw-Hill Companies </th></tr>
 
<tr><th>0930</th><th colspan=3>  Industry Outlook - Jennifer Bayuk-CISO Bear Stearns, Mark Clancy-EVP Citi, Jim Routh-CISO DTCC, Sunil Seshadri-CISO NYSE-Euronet, Warren Axelrod-SVP Bank of America, Dennis Brixius, The McGraw-Hill Companies </th></tr>
  
<tr><th>1000</th><td>Logic Attacks and Inefficiencies of Robotic
+
<tr><th>1030</th><td>Logic Attacks and Inefficiencies of Robotic
 
Detection<br><i>Robert "RSnake" Hansen</i></td>
 
Detection<br><i>Robert "RSnake" Hansen</i></td>
 
<td>Offensive Assessing Financial Apps<br><i>Daniel Cuthbert</i></td>
 
<td>Offensive Assessing Financial Apps<br><i>Daniel Cuthbert</i></td>
Line 21: Line 21:
 
<br><i>Ivan Ristic</i></td></tr>
 
<br><i>Ivan Ristic</i></td></tr>
  
<tr><th>1100</th><td>Reverse Engineering .NET<br><I>Adam Boulton</i></td>
+
<tr><th>1130</th><td>Reverse Engineering .NET<br><I>Adam Boulton</i></td>
 
<td>JBroFuzz + Crypto not that hard..<br><i>Yiannis Pavlosoglou </i></td>
 
<td>JBroFuzz + Crypto not that hard..<br><i>Yiannis Pavlosoglou </i></td>
 
<td>Open Reverse Benchmarking <br><i>Tom Stracener</i></td></tr>
 
<td>Open Reverse Benchmarking <br><i>Tom Stracener</i></td></tr>
  
<tr><th>1200</th><td>Black Art White Hat<br><i>Tom Brennan</i></td>
+
<tr><th>1230</th><td>Black Art White Hat<br><i>Tom Brennan</i></td>
 
<td>OWASP CLASP<br><i>Pravir Chandra</i></td>
 
<td>OWASP CLASP<br><i>Pravir Chandra</i></td>
 
<td>.NET Ninja or Pirate? <br><i>Dinis Cruz</i></td></tr>
 
<td>.NET Ninja or Pirate? <br><i>Dinis Cruz</i></td></tr>
  
<tr><th>1300</th><th colspan=3>TECH-EXPO LUNCH </th></tr>
+
<tr><th>1330</th><th colspan=3>TECH-EXPO LUNCH </th></tr>
  
<tr><th>1400</th><td>W3AF Web Application Attack and Audit Framework.<br><i>Andres Riancho</i></td>
+
<tr><th>1430</th><td>W3AF Web Application Attack and Audit Framework.<br><i>Andres Riancho</i></td>
 
<td>WASC Hacking Incidents<br><i>Jeremiah Grossman</i></td>
 
<td>WASC Hacking Incidents<br><i>Jeremiah Grossman</i></td>
 
<td>OWASP CSRFTester Project<br><i>Dave Wichers</i></td></tr>
 
<td>OWASP CSRFTester Project<br><i>Dave Wichers</i></td></tr>
  
<tr><th>1500</th><td>OWASP Enterprise Security API (ESAPI) Project<br><i>Jeff Williams</i></td>
+
<tr><th>1530</th><td>OWASP Enterprise Security API (ESAPI) Project<br><i>Jeff Williams</i></td>
 
<td>ANTI-Samy<br><i>Arshan Dabirsiaghi</i></td>
 
<td>ANTI-Samy<br><i>Arshan Dabirsiaghi</i></td>
 
<td>Application Security Forensics - Now What<br><i>FBI Cybercrimes</i></td></tr>
 
<td>Application Security Forensics - Now What<br><i>FBI Cybercrimes</i></td></tr>
  
<tr><th>1600</th><td>TOPICS<br><i>SPEAKERS</i></td>
+
<tr><th>1630</th><td>TOPICS<br><i>SPEAKERS</i></td>
 
<td>TOPICS<br><i>SPEAKERS</i></td>
 
<td>TOPICS<br><i>SPEAKERS</i></td>
 
<td>TOPICS<br><i>SPEAKER</i></td></tr>
 
<td>TOPICS<br><i>SPEAKER</i></td></tr>
  
<tr><th>1700</th><td>TOPIC<br><i>SPEAKERS</i></td>
+
<tr><th>1730</th><td>TOPIC<br><i>SPEAKERS</i></td>
 
<td>TOPIC<br><i>SPEAKERS</i></td>
 
<td>TOPIC<br><i>SPEAKERS</i></td>
 
<td>TOPIC<br><i>SPEAKERS</i></td></tr>
 
<td>TOPIC<br><i>SPEAKERS</i></td></tr>
<tr><th>1830</th><th colspan=3>Web Application Capture the Flag </th></tr>
+
<tr><th>1830</th><th colspan=3>Web Application Capture the Flag (All night - Bring It!)</th></tr>
<tr><th>2100</th><th colspan=3>Tuesday Night Event @ TBD       </th></tr>
+
<tr><th>2100</th><th colspan=3>Tuesday Night Reception @ [http://www.websterhall.com/2007_websterhall NYC Famous Webster Hall]       </th></tr>
 
</table>
 
</table>
 
<br>
 
<br>
Line 55: Line 55:
 
     <tr> <th width=50> Time </th> <th width=300> Code it! </th> <th width=300> Break it!</th> <th width=300> Secure it!</th></tr>
 
     <tr> <th width=50> Time </th> <th width=300> Code it! </th> <th width=300> Break it!</th> <th width=300> Secure it!</th></tr>
 
<tr><th>0800</th><th colspan=3>Web Application Capture the Flag Results</th></tr>
 
<tr><th>0800</th><th colspan=3>Web Application Capture the Flag Results</th></tr>
<tr><th>0930</th><th colspan=3> KeyNote Day #2 </th></tr>
+
<tr><th>0930</th><th colspan=3> Keynote: OWASP Foundation Board - "This thing, we have" </th></tr>
  
 
<tr><th>1000</th><td>TOPIC<br><i>SPEAKERS</i></td>
 
<tr><th>1000</th><td>TOPIC<br><i>SPEAKERS</i></td>

Revision as of 13:02, 25 February 2008

NYC Cyber Security 2008 Conference - October 7th - 10th 2008

In Association with: WASC, NYM InfraGard, AIT Global, ISACA, ISSA and Pace University


Two days of Seminars from the world's best technology minds, 2 days of hardcore hands-on training in the Big Apple at Pace University, located at One Pace Plaza New York, NY 10038.

Click here for more info: CFP/SPEAKERS, TRAINERS and SPONSORS


Tickets go on sale Monday June 2, 2008

Tuesday - October 7th

- Times/Topics subject to change - Submissions due April 1st
Time Code it! Break it! Secure it!
0800Registration Opens & TechExpo
0930 Industry Outlook - Jennifer Bayuk-CISO Bear Stearns, Mark Clancy-EVP Citi, Jim Routh-CISO DTCC, Sunil Seshadri-CISO NYSE-Euronet, Warren Axelrod-SVP Bank of America, Dennis Brixius, The McGraw-Hill Companies
1030Logic Attacks and Inefficiencies of Robotic Detection
Robert "RSnake" Hansen
Offensive Assessing Financial Apps
Daniel Cuthbert
Web Intrusion Detection with ModSecurity
Ivan Ristic
1130Reverse Engineering .NET
Adam Boulton
JBroFuzz + Crypto not that hard..
Yiannis Pavlosoglou
Open Reverse Benchmarking
Tom Stracener
1230Black Art White Hat
Tom Brennan
OWASP CLASP
Pravir Chandra
.NET Ninja or Pirate?
Dinis Cruz
1330TECH-EXPO LUNCH
1430W3AF Web Application Attack and Audit Framework.
Andres Riancho
WASC Hacking Incidents
Jeremiah Grossman
OWASP CSRFTester Project
Dave Wichers
1530OWASP Enterprise Security API (ESAPI) Project
Jeff Williams
ANTI-Samy
Arshan Dabirsiaghi
Application Security Forensics - Now What
FBI Cybercrimes
1630TOPICS
SPEAKERS
TOPICS
SPEAKERS
TOPICS
SPEAKER
1730TOPIC
SPEAKERS
TOPIC
SPEAKERS
TOPIC
SPEAKERS
1830Web Application Capture the Flag (All night - Bring It!)
2100Tuesday Night Reception @ NYC Famous Webster Hall


Wednesday - October 8th

- Check Back Soon
Time Code it! Break it! Secure it!
0800Web Application Capture the Flag Results
0930 Keynote: OWASP Foundation Board - "This thing, we have"
1000TOPIC
SPEAKERS
TOPICS
SPEAKERS
TOPICS
SPEAKERS
1100TOPIC
SPEAKERS
TOPIC
SPEAKERS
TOPIC
SPEAKERS
1200TOPIC
SPEAKERS
TOPIC
SPEAKERS
TOPIC
SPEAKERS
1300TECH-EXPO LUNCH
1400TOPIC
SPEAKERS
TOPIC
SPEAKERS
TOPIC
SPEAKERS
1500TOPIC
SPEAKERS
TOPIC
SPEAKERS
TOPIC
SPEAKERS
1600TOPICS
SPEAKERS
TOPICS
SPEAKERS
TOPICS
SPEAKER
1700TOPIC
SPEAKERS
TOPIC
SPEAKERS
TOPIC
SPEAKERS
1830 TBD
2100 TBD


Technology Expo - October 7th - 8th

Want to see the latest offerings from best of breed technology firms? For 2 days, Product/Service vendors worldwide will demonstrate their ability to conference attendees.

Click here for more info: SPEAKERS, TRAINERS and SPONSORS

OWASP AppSec 2008 Training Courses - October 9th and 10th 2008

T1. Building and Testing Secure Web Applications
This powerful two-day course focuses on the most common web application security problems, including the OWASP Top Ten. The course will introduce and demonstrate hacking techniques, illustrating how easily application vulnerabilities can be exploited so students really understand how to avoid introducing such vulnerabilities into their code.

Lecturer: Rogan Dawes, Project Lead OWASP WebScarab Project, Consultant, Aspect Security

T2. Application Security Forensics
How would you respond to a application security hack? This course will provide insight into the world or forensics with a focus on Web Application Security
T3. Defensive Programming
This class will teach you how to program defensively. A must for developers, managers, testers and security professionals. Learn the latest techniques to build attack resistant code, protect from current and future vulnerabilities and how to secure an application from both implementation bugs and design flaws. The instructor Pravir Chandra is well known security expert, project lead for OWASP CLASP project and former co-founder & CTO of secure software

Lecturer: Pravir Chandra, Project Lead OWASP CLASP Project, Principal Consultant, Cigital

T4. TBD
Trainers Wanted
T5. TBD
Trainers Wanted

Click here for more info: CFP/SPEAKERS, TRAINERS and SPONSORS

HOTELS / TRAVEL

Hotel's in the area of the event