This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "OWASP AppSec Asia 2008 - Taiwan"
From OWASP
Line 89: | Line 89: | ||
| style="width:40%; background:#EEF0F7; color:#4A4AFF" align="center" | '''Robert "RSnake" Hansen (SecTheory)<br>''' | | style="width:40%; background:#EEF0F7; color:#4A4AFF" align="center" | '''Robert "RSnake" Hansen (SecTheory)<br>''' | ||
|- | |- | ||
− | | align="center" style="width:20%; background:#4F81BD; color:white" | '''11:00- 12:00''' || style="width:30%; background:#A7BFDE" align="center" | '''Web 2.0, Consumerization, and Application Security<BR><br>''' | + | | align="center" style="width:20%; background:#4F81BD; color:white" | '''11:00- 12:00''' || style="width:30%; background:#A7BFDE" align="center" | '''[[Web 2.0, Consumerization, and Application Security]]<BR><br>''' |
| style="width:40%; background:#EEF0F7; color:#4A4AFF" align="center" | '''Chenxi Wang, Ph.D. (Forrester Research)<br>''' | | style="width:40%; background:#EEF0F7; color:#4A4AFF" align="center" | '''Chenxi Wang, Ph.D. (Forrester Research)<br>''' | ||
|- | |- | ||
Line 103: | Line 103: | ||
|- | |- | ||
− | | align="center" style="width:20%; background:#4F81BD; color:white" | '''13:00 - 13:50''' || style="width:30%; background:#A7BFDE" align="center" | '''Good Business Penetration Testing<BR><br>''' | + | | align="center" style="width:20%; background:#4F81BD; color:white" | '''13:00 - 13:50''' || style="width:30%; background:#A7BFDE" align="center" | '''[[Good Business Penetration Testing]]<BR><br>''' |
| style="width:40%; background:#EEF0F7; color:#4A4AFF" align="center" | '''KK Mookhey (OWASP Mumbai)<br>''' | | style="width:40%; background:#EEF0F7; color:#4A4AFF" align="center" | '''KK Mookhey (OWASP Mumbai)<br>''' | ||
|- | |- | ||
− | | align="center" style="width:20%; background:#4F81BD; color:white" | '''14:00 - 14:50''' || style="width:30%; background:#A7BFDE" align="center" | '''Best Practices Guide: Web Application Firewalls<BR><br>''' | + | | align="center" style="width:20%; background:#4F81BD; color:white" | '''14:00 - 14:50''' || style="width:30%; background:#A7BFDE" align="center" | '''[[Best Practices Guide: Web Application Firewalls]]<BR><br>''' |
| style="width:40%; background:#EEF0F7; color:#4A4AFF" align="center" | '''Alexander Meisel (OWASP Germany)<br>''' | | style="width:40%; background:#EEF0F7; color:#4A4AFF" align="center" | '''Alexander Meisel (OWASP Germany)<br>''' | ||
|- | |- | ||
Line 121: | Line 121: | ||
|- | |- | ||
− | | align="center" style="width:20%; background:#4F81BD; color:white" | '''15:10 - 16:00''' || style="width:30%; background:#A7BFDE" align="center" | '''The HTTP Botnet Research: Focusing on HTTP based DDoS Botnets<BR><br>''' | + | | align="center" style="width:20%; background:#4F81BD; color:white" | '''15:10 - 16:00''' || style="width:30%; background:#A7BFDE" align="center" | '''[[The HTTP Botnet Research: Focusing on HTTP based DDoS Botnets]]<BR><br>''' |
| style="width:40%; background:#EEF0F7; color:#4A4AFF" align="center" | '''Steven Adair (ShadowServer Foundation)<br>''' | | style="width:40%; background:#EEF0F7; color:#4A4AFF" align="center" | '''Steven Adair (ShadowServer Foundation)<br>''' | ||
|- | |- | ||
− | | align="center" style="width:20%; background:#4F81BD; color:white" | '''16:10 - 17:00''' || style="width:30%; background:#A7BFDE" align="center" | '''Panel: Manual auditing or automated tools? Blackbox, whitebox, or WAF?<BR><br>''' | + | | align="center" style="width:20%; background:#4F81BD; color:white" | '''16:10 - 17:00''' || style="width:30%; background:#A7BFDE" align="center" | '''[[Panel: Manual auditing or automated tools? Blackbox, whitebox, or WAF?]]<BR><br>''' |
| style="width:40%; background:#EEF0F7; color:#4A4AFF" align="center" | '''Alex, Chenxi, Dhruv, Fyodor, KK, Robert, Tim Bass, Wayne, YM<br>''' | | style="width:40%; background:#EEF0F7; color:#4A4AFF" align="center" | '''Alex, Chenxi, Dhruv, Fyodor, KK, Robert, Tim Bass, Wayne, YM<br>''' | ||
|- | |- |
Revision as of 07:06, 7 October 2008
Welcome to OWASP AppSec Asia 2008! We'd like to thank Delhi, Mumbai, Singapore Taiwan, Thailand, and Vietnam Chapters for helping out with the conference and for attending the conference. We are working with other chapters across Asia to see if we can invite more chapters. If you represent an Asia chapter and are interested in attending, please email Wayne ([email protected]).
OWASP AppSec Asia 2008, Conference Schedule (Oct 27th - Oct 28th)
(2008/10/27) - Day 1 |
---|
08:30 - 09:30 Door opens for registration |
---|
TIME | SESSION | SPEAKER | |
09:30- 09:40 | Opening welcome and an introduction to this year’s program |
Wayne Huang, Conference Chair | |
09:40-09:50 | Welcome by Institute for Information Industry |
| |
09:50-10:00 | Welcome by Information Security Consortium, Information Service Industry Association |
| |
10:00-11:00 | What's Next? Strategies for Web Application Security |
YM Chen, Director, McAfee Foundstone | |
11:10-12:00 | Web-based Malware obfuscation: the kung-fu and the detection | Wayne Huang, OWASP Taiwan Chapter |
12:00 - 13:00 Lunch |
---|
TIME | SESSION | SPEAKER | |
13:00 - 13:40 | Why Webmail systems are hard to secure--using real case studies |
Charmi Lin, Taiwan Information & Communication Security Technology Center | |
13:50 - 14:40 | Proxy Caches and Web Application Security--using the recent Google Docs 0-day as an example |
Tim Bass, OWASP Thailand Chapter |
14:40 - 15:00 Coffee Break |
---|
TIME | SESSION | SPEAKER | |
15:00 - 15:40 | How bad can Web vulnerabilities be—case study on a 50 million personal records breach |
PK (Taiwan Criminal Investigation Bureau) | |
15:50 - 16:40 | Tiny coding errors, big losses: real stories of website 0wnage |
Fyodor (Guard-Info) | |
16:50 - 17:40 | Crossing the Chasm: Anatomy of Client-Side and Browser-Based Attacks |
Dhruv Soi (OWASP Delhi Chapter Leader), Pukhraj Singh (OWASP Delhi Chapter) |
17:40 - 18:40 Asia Chapter Leader’s Meeting |
---|
(2008/10/28) - Day 2 |
---|
TIME | SESSION | SPEAKER | |
10:00- 11:00 | New 0-Day Browser Exploits: Clickjacking - yea, this is bad... |
Robert "RSnake" Hansen (SecTheory) | |
11:00- 12:00 | Web 2.0, Consumerization, and Application Security |
Chenxi Wang, Ph.D. (Forrester Research) |
12:00 - 13:00 Lunch |
---|
TIME | SESSION | SPEAKER | |
13:00 - 13:50 | Good Business Penetration Testing |
KK Mookhey (OWASP Mumbai) | |
14:00 - 14:50 | Best Practices Guide: Web Application Firewalls |
Alexander Meisel (OWASP Germany) |
14:50 - 15:10 Coffee Break |
---|
TIME | SESSION | SPEAKER | |
15:10 - 16:00 | The HTTP Botnet Research: Focusing on HTTP based DDoS Botnets |
Steven Adair (ShadowServer Foundation) | |
16:10 - 17:00 | Panel: Manual auditing or automated tools? Blackbox, whitebox, or WAF? |
Alex, Chenxi, Dhruv, Fyodor, KK, Robert, Tim Bass, Wayne, YM |