This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Front Range Web Application Security Summit Planning Page"

From OWASP
Jump to: navigation, search
(FROCo8 Conference Schedule – June 10th 2008)
(FROCo8 Conference Schedule – June 10th 2008)
Line 51: Line 51:
 
  | style="width:10%; background:#7B8ABD" | 08:00-09:30 || colspan="2" style="width:80%; background:#C2C2C2" align="center" | '''Registration Opens and Tech Expo'''
 
  | style="width:10%; background:#7B8ABD" | 08:00-09:30 || colspan="2" style="width:80%; background:#C2C2C2" align="center" | '''Registration Opens and Tech Expo'''
 
  |-
 
  |-
  | style="width:10%; background:#7B8ABD" | 09:30-10:30 || colspan="3" style="width:80%; background:#F2F2F2" align="center" | '''Industry Outlook - Jennifer Bayuk-CISO Bear Stearns, Mark Clancy-EVP Citi, Jim Routh-CISO DTCC, Sunil Seshadri-CISO NYSE-Euronet (unconfirmed), Warren Axelrod-SVP Bank of America
+
  | style="width:10%; background:#7B8ABD" | 09:30-10:30 || colspan="2" style="width:80%; background:#F2F2F2" align="center" | '''Industry Outlook - Jennifer Bayuk-CISO Bear Stearns, Mark Clancy-EVP Citi, Jim Routh-CISO DTCC, Sunil Seshadri-CISO NYSE-Euronet (unconfirmed), Warren Axelrod-SVP Bank of America
 
Moderator - Mahi Dontamsetti'''
 
Moderator - Mahi Dontamsetti'''
 
  |-
 
  |-
Line 58: Line 58:
 
  | style="width:30%; background:#BCA57A" align="left" | Offensive Assessing Financial Apps
 
  | style="width:30%; background:#BCA57A" align="left" | Offensive Assessing Financial Apps
 
''Daniel Cuthbert''
 
''Daniel Cuthbert''
| style="width:30%; background:#7B8ABD" align="left" | Web Intrusion Detection with ModSecurity
 
''Ivan Ristic''
 
 
  |-
 
  |-
 
| style="width:10%; background:#7B8ABD" | 11:30-12:30 || style="width:30%; background:#BC857A" align="left" | Reverse Engineering .NET
 
| style="width:10%; background:#7B8ABD" | 11:30-12:30 || style="width:30%; background:#BC857A" align="left" | Reverse Engineering .NET
Line 65: Line 63:
 
  | style="width:30%; background:#BCA57A" align="left" | JBroFuzz + Crypto not that hard…
 
  | style="width:30%; background:#BCA57A" align="left" | JBroFuzz + Crypto not that hard…
 
''Yiannis Pavlosoglou''
 
''Yiannis Pavlosoglou''
| style="width:30%; background:#7B8ABD" align="left" | OWASP LABRAT
 
''Joshua Perrymon''
 
 
|-
 
|-
 
| style="width:10%; background:#7B8ABD" | 12:30-13:30 || style="width:30%; background:#BC857A" align="left" | Black Art White Hat
 
| style="width:10%; background:#7B8ABD" | 12:30-13:30 || style="width:30%; background:#BC857A" align="left" | Black Art White Hat
Line 72: Line 68:
 
  | style="width:30%; background:#BCA57A" align="left" | OWASP CLASP
 
  | style="width:30%; background:#BCA57A" align="left" | OWASP CLASP
 
''Pravir Chandra''
 
''Pravir Chandra''
| style="width:30%; background:#7B8ABD" align="left" | .NET Ninja or Pirate?
 
''Dinis Cruz''
 
 
|-
 
|-
 
  | style="width:10%; background:#7B8ABD" | 13:30-14:30 || colspan="2" style="width:80%; background:#C2C2C2" align="center" | '''1 HR BREAK / TECH EXPO / LUNCH BREAK'''
 
  | style="width:10%; background:#7B8ABD" | 13:30-14:30 || colspan="2" style="width:80%; background:#C2C2C2" align="center" | '''1 HR BREAK / TECH EXPO / LUNCH BREAK'''
Line 81: Line 75:
 
  | style="width:30%; background:#BCA57A" align="left" | WASC Hacking Incidents
 
  | style="width:30%; background:#BCA57A" align="left" | WASC Hacking Incidents
 
''Ofer Shezaf''
 
''Ofer Shezaf''
| style="width:30%; background:#7B8ABD" align="left" | OWASP CSRFTester Project
 
''Dave Wichers''
 
 
|-
 
|-
 
| style="width:10%; background:#7B8ABD" | 15:30-16:30 || style="width:30%; background:#BC857A" align="left" | OWASP Enterprise Security API (ESAPI) Project
 
| style="width:10%; background:#7B8ABD" | 15:30-16:30 || style="width:30%; background:#BC857A" align="left" | OWASP Enterprise Security API (ESAPI) Project
Line 88: Line 80:
 
  | style="width:30%; background:#BCA57A" align="left" | Next Generation Cross Site Scripting Worms
 
  | style="width:30%; background:#BCA57A" align="left" | Next Generation Cross Site Scripting Worms
 
''Arshan Dabirsiaghi''
 
''Arshan Dabirsiaghi''
| style="width:30%; background:#7B8ABD" align="left" | Application Security Forensics - Now What?
 
''FBI Cybercrimes''
 
 
|-
 
|-
 
| style="width:10%; background:#7B8ABD" | 16:30-17:30 || style="width:30%; background:#BC857A" align="left" | Shhhh Don’t Tell Anybody
 
| style="width:10%; background:#7B8ABD" | 16:30-17:30 || style="width:30%; background:#BC857A" align="left" | Shhhh Don’t Tell Anybody
Line 95: Line 85:
 
  | style="width:30%; background:#BCA57A" align="left" | Secure PHP
 
  | style="width:30%; background:#BCA57A" align="left" | Secure PHP
 
''Hans Zaunere''
 
''Hans Zaunere''
| style="width:30%; background:#7B8ABD" align="left" | Payment Card Data Security and the new Enterprise Java
 
''Dr. B. V. Kumar & Mr. Abhay ''
 
 
|-
 
|-
 
| style="width:10%; background:#7B8ABD" | 17:30-18:30 || style="width:30%; background:#BC857A" align="left" | Notes Security
 
| style="width:10%; background:#7B8ABD" | 17:30-18:30 || style="width:30%; background:#BC857A" align="left" | Notes Security
Line 102: Line 90:
 
  | style="width:30%; background:#BCA57A" align="left" | Full Disclosure vs Non-disclosure vs Responsible Disclosure
 
  | style="width:30%; background:#BCA57A" align="left" | Full Disclosure vs Non-disclosure vs Responsible Disclosure
 
''Panel''
 
''Panel''
| style="width:30%; background:#7B8ABD" align="left" | AppSec Techniques
 
''JD Glaser''
 
 
|-
 
|-
  | style="width:10%; background:#7B8ABD" | 18:30 || colspan="3" style="width:80%; background:#C2C2C2" align="center" | '''Web Application Capture the Flag (All Night – Bring it!!)'''
+
  | style="width:10%; background:#7B8ABD" | 18:30 || colspan="3" style="width:80%; background:#C2C2C2" align="center" | '''Booze and Horse Duvers!!)'''
 
|-
 
|-
 
  | style="width:10%; background:#7B8ABD" | 20:00 || colspan="3" style="width:80%; background:#C2C2C2" align="center" | '''Tuesday Night Reception at [http://websterhall.com/2007_websterhall/ NYC Famous Webster Hall]'''
 
  | style="width:10%; background:#7B8ABD" | 20:00 || colspan="3" style="width:80%; background:#C2C2C2" align="center" | '''Tuesday Night Reception at [http://websterhall.com/2007_websterhall/ NYC Famous Webster Hall]'''
 
|-
 
|-
! colspan="4" align="center" style="background:#4058A0; color:white" | Day 2 – Oct 8, 2008
 
|-
 
| style="width:10%; background:#7B8ABD" | 08:00-09:30 || colspan="3" style="width:80%; background:#C2C2C2" align="center" | '''Web Application Capture the Flag Results'''
 
|-
 
| style="width:10%; background:#7B8ABD" | 09:30-10:00 || colspan="3" style="width:80%; background:#C2C2C2" align="center" | '''Keynote: OWASP Foundation Board – “This thing, we have”'''
 
|-
 
| style="width:10%; background:#7B8ABD" | 10:00-11:00 || style="width:30%; background:#BC857A" align="left" | Practical Advanced Threat Modeling
 
''John Steven''
 
| style="width:30%; background:#BCA57A" align="left" | Taking the Risk out of Web 2.0
 
''Tom Stracener''
 
| style="width:30%; background:#7B8ABD" align="left" | Building Usable Security
 
''Zed Abbadi''
 
|-
 
| style="width:10%; background:#7B8ABD" | 11:00-12:00 || style="width:30%; background:#BC857A" align="left" | Offshoring Application Development? Security is Still Your Problem
 
''Rohyt Belani''
 
| style="width:30%; background:#BCA57A" align="left" | OWASP Orizon Project
 
''Paolo Perego''
 
| style="width:30%; background:#7B8ABD" align="left" | NIST SAMATE Static Analysis Tool Exposition (SATE)
 
''Vadim Okun''
 
|-
 
| style="width:10%; background:#7B8ABD" | 12:00-13:00 || style="width:30%; background:#BC857A" align="left" | AppSec Research
 
''Mano Paul''
 
| style="width:30%; background:#BCA57A" align="left" | Software Liability
 
''Jack Danahy''
 
| style="width:30%; background:#7B8ABD" align="left" | Cross-Site Scripting Filter Evasion
 
''Alexios Fakos''
 
|-
 
| style="width:10%; background:#7B8ABD" | 13:00-14:00 || colspan="3" style="width:80%; background:#C2C2C2" align="center" | '''1 HR BREAK / TECH EXPO / LUNCH BREAK'''
 
|-
 
| style="width:10%; background:#7B8ABD" | 14:00-15:00 || style="width:30%; background:#BC857A" align="left" | Projects with OWASP
 
''Steve Malson''
 
| style="width:30%; background:#BCA57A" align="left" | OWASP Pantera and Web Graph Analysis
 
''Simon Roses''
 
| style="width:30%; background:#7B8ABD" align="left" | Software-as-a-Service (SaaS)
 
''James Landis''
 
|-
 
| style="width:10%; background:#7B8ABD" | 15:00-16:00 || style="width:30%; background:#BC857A" align="left" | "Out of Band" Injection
 
''Vijay Akasapu & Marshall Heilman''
 
| style="width:30%; background:#BCA57A" align="left" | OWASP V2 Testing Guide 4.2.3 Spidering and Googling in depth
 
''Christian Heinrich''
 
| style="width:30%; background:#7B8ABD" align="left" | Caution, Java ahead
 
''Jeremiah Grossman''
 
|-
 
| style="width:10%; background:#7B8ABD" | 16:00-17:00 || style="width:30%; background:#BC857A" align="left" | TOPIC
 
''SPEAKERS''
 
| style="width:30%; background:#BCA57A" align="left" | TOPIC
 
''SPEAKERS''
 
| style="width:30%; background:#7B8ABD" align="left" | TOPIC
 
''SPEAKERS''
 
|-
 
| style="width:10%; background:#7B8ABD" | 17:00-18:00 || style="width:30%; background:#BC857A" align="left" | TOPIC
 
''SPEAKERS''
 
| style="width:30%; background:#BCA57A" align="left" | TOPIC
 
''SPEAKERS''
 
| style="width:30%; background:#7B8ABD" align="left" | TOPIC
 
''SPEAKERS''
 
|-
 
| style="width:10%; background:#7B8ABD" | 18:30 || colspan="3" style="width:80%; background:#C2C2C2" align="center" | '''TBD'''
 
|-
 
| style="width:10%; background:#7B8ABD" | 21:00 || colspan="3" style="width:80%; background:#C2C2C2" align="center" | '''Closing Remarks / Awards / Raffles'''
 
 
|}
 
|}
  

Revision as of 17:37, 25 March 2008

Front Range Web Application Security Summit Planning

The purpose of this page is to provide a workspace for Denver/Boulder OWASP members to collaborate and plan the upcoming Front Range Web Application Security Summit. It is official, and we have the meeting space reservation to prove it! Date: June 10, 2008 Location: Tivoli Baerresen Conference Rooms (located on the Auraria Campus in Downtown Denver)

Call For Papers

We are seeking presentations for both the Technical and Management tracks at the June 10th conference. A Call For Papers has been issued. The deadline for submissions is March 28th, and speakers who are selected will be notified the week of March 31st. Please download the Call for Papers here

Mission Statement

The purpose of the Front Range Web Application Security Summit is to provide a one-day workshop/conference during which individuals and organizations interested in Web Application Security can congregate to transfer knowledge, increase awareness of application layer security in the enterprise, and meet other like minded individuals.

Guiding Principles
No vendor soap boxes
Open, friendly environment
High quality content, professional delivery

Proposed Summit Agenda

Planner Contact Info

Project Manager: Dariush Rusta

Project Leads:

Overall planning and coordination: Kathy Thaxton kthaxton at businesspartnersolutions d0t c0m

Tech track lead: David Campbell (dcampbell at owasp dot org)

Management track lead: tbd

Project Planning Site (Basecamp login required)

Schedule

FROCo8 Conference Schedule – June 10th 2008

  • PLEASE NOTE - This is just a notional schedule. Speaker times/dates/topics WILL change once we have a full agenda.
June 10th, 2008
Tech Track: Management Track:
08:00-09:30 Registration Opens and Tech Expo
09:30-10:30 Industry Outlook - Jennifer Bayuk-CISO Bear Stearns, Mark Clancy-EVP Citi, Jim Routh-CISO DTCC, Sunil Seshadri-CISO NYSE-Euronet (unconfirmed), Warren Axelrod-SVP Bank of America

Moderator - Mahi Dontamsetti

10:30-11:30 Logic Attacks and Inefficiencies of Robotic Detection

Robert "RSnake" Hansen

Offensive Assessing Financial Apps

Daniel Cuthbert

11:30-12:30 Reverse Engineering .NET

Adam Boulton

JBroFuzz + Crypto not that hard…

Yiannis Pavlosoglou

12:30-13:30 Black Art White Hat

Tom Brennan

OWASP CLASP

Pravir Chandra

13:30-14:30 1 HR BREAK / TECH EXPO / LUNCH BREAK
14:30-15:30 W3AF Web Application Attack and Audit Framework

Andres Riancho

WASC Hacking Incidents

Ofer Shezaf

15:30-16:30 OWASP Enterprise Security API (ESAPI) Project

Jeff Williams

Next Generation Cross Site Scripting Worms

Arshan Dabirsiaghi

16:30-17:30 Shhhh Don’t Tell Anybody

Petko D. Petkov, a.k.a. pdp

Secure PHP

Hans Zaunere

17:30-18:30 Notes Security

Jian Hui Wang

Full Disclosure vs Non-disclosure vs Responsible Disclosure

Panel

18:30 Booze and Horse Duvers!!)
20:00 Tuesday Night Reception at NYC Famous Webster Hall



Back to OWASP Denver

Back to OWASP Boulder