This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "OWASP NYC AppSec 2008 Conference"
| Line 82: | Line 82: | ||
[http://video.google.com/videoplay?docid=5266888637212683476 VIDEO] / SLIDES | [http://video.google.com/videoplay?docid=5266888637212683476 VIDEO] / SLIDES | ||
|- | |- | ||
| − | | style="width:10%; background:#7B8ABD" | 14:00-14:45 || style="width:30%; background:#BC857A" align=" | + | | style="width:10%; background:#7B8ABD" | 14:00-14:45 || style="width:30%; background:#BC857A" align="center" | '''Industry Outlook Panel:'''<br> |
''[http://www.linkedin.com/in/markclancy Mark Clancy] EVP CitiGroup, <br> | ''[http://www.linkedin.com/in/markclancy Mark Clancy] EVP CitiGroup, <br> | ||
[http://www.linkedin.com/pub/0/497/86a Jim Routh] CISO DTCC, <br> | [http://www.linkedin.com/pub/0/497/86a Jim Routh] CISO DTCC, <br> | ||
| Line 154: | Line 154: | ||
[http://video.google.com/videoplay?docid=7304375845684390995 VIDEO] / SLIDES | [http://video.google.com/videoplay?docid=7304375845684390995 VIDEO] / SLIDES | ||
|- | |- | ||
| − | | style="width:10%; background:#7B8ABD" | 19:00-20:00 || style="width:30%; background:#BC857A" align=" | + | | style="width:10%; background:#7B8ABD" | 19:00-20:00 || style="width:30%; background:#BC857A" align="center" | |
| − | | style="width:30%; background:#BCA57A" align=" | + | '''OWASP Chapter Leader / Project Leader working session'''<br> |
| − | | style="width:30%; background:#99FF99" align=" | + | ''OWSAP Board/Chapter Leaders'' |
| + | | style="width:30%; background:#BCA57A" align="center" | | ||
| + | '''(ISC)2 Cocktail Hour'''<br> | ||
| + | All welcome to attend for a special announcement presented by:<br> | ||
| + | [https://www.isc2.org/cgi-bin/content.cgi?page=351 W. Hord Tipton, Executive Director of (ISC)2] | ||
| + | | style="width:30%; background:#99FF99" align="center" | | ||
| + | '''Technology Movie Night'''<br> | ||
| + | ''[http://www.youtube.com/watch?v=LlKDkTbUFhU&feature=related Sneakers], [http://www.youtube.com/watch?v=tAcEzhQ7oqA WarGames], [http://hackersarepeopletoo.com HackersArePeopleToo], [http://www.youtube.com/watch?v=4Be-ZzcXVLw TigerTeam]'' <br> | ||
| + | from 19:00 - 23:00 | ||
|- | |- | ||
| Line 169: | Line 177: | ||
|- | |- | ||
| − | | style="width:10%; background:#7B8ABD" | 08:00-08:45 || style="width:30%; background:#BC857A" align=" | + | | style="width:10%; background:#7B8ABD" | 08:00-08:45 || style="width:30%; background:#BC857A" align="center" | |
| − | ''[http://blog.isc2.org/isc2_blog/tipton/index.html W. Hord Tipton], CISSP-ISSEP, CAP, CISA, CNSS and former Chief Information Officer for the U.S. Department of the Interior | + | '''Software Development: The Last Security Frontier'''<br> |
| − | Executive Director and member of the Board of Directors, (ISC)²'' | + | ''[http://blog.isc2.org/isc2_blog/tipton/index.html W. Hord Tipton], CISSP-ISSEP, CAP, CISA, CNSS and former Chief Information Officer for the U.S. Department of the Interior Executive Director and member of the Board of Directors, (ISC)²''<br> |
| − | | style="width:30%; background:#BCA57A" align=" | + | [http://video.google.com/videoplay?docid=-3031158902293608814 VIDEO] / SLIDES |
| − | ''Alexander Meisel'' | + | | style="width:30%; background:#BCA57A" align="center" | |
| − | | style="width:30%; background:#99FF99" align=" | + | '''[[AppSecEU08_Best_Practices_Guide_Web_Application_Firewalls | Best Practices Guide: Web Application Firewalls]]'''<br> |
| − | ''[http://www.linkedin.com/in/tommyryan Thomas Ryan]'' | + | ''Alexander Meisel''<br> |
| + | [http://video.google.com/videoplay?docid=4343557004839100474 VIDEO] / SLIDES | ||
| + | | style="width:30%; background:#99FF99" align="center" | | ||
| + | '''The Good The Bad and The Ugly - Pen Testing VS. Source Code Analysis | ||
| + | '''<br> | ||
| + | ''[http://www.linkedin.com/in/tommyryan Thomas Ryan]''<br> | ||
| + | VIDEO / SLIDES | ||
|- | |- | ||
| − | | style="width:10%; background:#7B8ABD" | 09:00-09:45 || style="width:30%; background:#BC857A" align=" | + | | style="width:10%; background:#7B8ABD" | 09:00-09:45 || style="width:30%; background:#BC857A" align="center" | |
| − | ''[http://1raindrop.typepad.com Gunnar Peterson]'' | + | '''OWASP Web Services Top Ten'''<br> |
| − | | style="width:30%; background:#BCA57A" align=" | + | ''[http://1raindrop.typepad.com Gunnar Peterson]''<br> |
| − | ''[http://www.linkedin.com/pub/1/373/994 Chris Nickerson]'' | + | [http://video.google.com/videoplay?docid=-7008552133222293089 VIDEO] / SLIDES |
| − | | style="width:30%; background:#99FF99" align=" | + | | style="width:30%; background:#BCA57A" align="center" | |
| + | '''[http://www.trutv.com/video/tiger-team/tiger-team-101-1-of-4.html Tiger Team - APPSEC Projects]'''<br> | ||
| + | ''[http://www.linkedin.com/pub/1/373/994 Chris Nickerson]''<br> | ||
| + | [http://video.google.com/videoplay?docid=-727310304416763705 VIDEO] / SLIDES] | ||
| + | | style="width:30%; background:#99FF99" align="center" | | ||
| + | '''OpenSource Tools'''<br> | ||
| + | ''Prof. Li-Chiou Chen & Chienitng Lin, [http://www.pace.edu/page.cfm?doc_id=16399 Pace Univ]''<br> | ||
| + | [http://video.google.com/videoplay?docid=7234120429038062610 VIDEO] / SLIDES | ||
|- | |- | ||
| − | | style="width:10%; background:#7B8ABD" | 10:00-10:45 || style="width:30%; background:#BC857A" align=" | + | | style="width:10%; background:#7B8ABD" | 10:00-10:45 || style="width:30%; background:#BC857A" align="center" | |
| − | ''Dinis Cruz'' | + | '''Building a tool for Security consultants: A story of a customized source code scanner'''<br> |
| − | | style="width:30%; background:#BCA57A" align=" | + | ''Dinis Cruz''<br> |
| − | ''[http://www.linkedin.com/pub/0/29/685 Lee Kushner]'' | + | [http://video.google.com/videoplay?docid=-7351771101625317884 VIDEO] / SLIDES |
| − | | style="width:30%; background:#99FF99" align=" | + | | style="width:30%; background:#BCA57A" align="center" | |
| − | ''[http://www.forrester.com/rb/analyst/chenxi_wang Chenxi Wang]'' | + | '''"Help Wanted" [http://www.infosecleaders.com/survey 7 Things You Need to Know APPSEC/INFOSEC Employment]'''<br> |
| + | ''[http://www.linkedin.com/pub/0/29/685 Lee Kushner]''<br> | ||
| + | VIDEO / SLIDES | ||
| + | | style="width:30%; background:#99FF99" align="center" | | ||
| + | '''Industry Analyst with Forrester Research'''<br> | ||
| + | ''[http://www.forrester.com/rb/analyst/chenxi_wang Chenxi Wang]''<br> | ||
| + | VIDEO / SLIDES | ||
|- | |- | ||
| − | | style="width:10%; background:#7B8ABD" | 11:00-11:45 || style="width:30%; background:#BC857A" align=" | + | | style="width:10%; background:#7B8ABD" | 11:00-11:45 || style="width:30%; background:#BC857A" align="center" | |
| − | ''Pravir Chandra'' | + | '''[[Category:OWASP_CLASP_Project | CLASP (Comprehensive, Lightweight Application Security Process)]]'''<br> |
| − | | style="width:30%; background:#BCA57A" align=" | + | ''Pravir Chandra''<br> |
| − | ''[[User:Wichers | Dave Wichers]]'' [http://www.owasp.org/images/a/a3/AppSecNYC08-Agile_and_Secure.ppt | + | [http://video.google.com/videoplay?docid=8296682294441554454 VIDEO] / SLIDES |
| − | | style="width:30%; background:#99FF99" align=" | + | | style="width:30%; background:#BCA57A" align="CENTER" | |
| − | ''[http://ouncelabs.com/company/team.asp Jack Danahy]'' | + | '''Security in Agile Development'''<br> |
| + | ''[[User:Wichers | Dave Wichers]]''<br> | ||
| + | VIDEO / [http://www.owasp.org/images/a/a3/AppSecNYC08-Agile_and_Secure.ppt SLIDES] | ||
| + | | style="width:30%; background:#99FF99" align="center" | | ||
| + | '''Secure Software Impact'''<br> | ||
| + | ''[http://ouncelabs.com/company/team.asp Jack Danahy]''<br> | ||
| + | [http://video.google.com/videoplay?docid=651035914595096427 VIDEO] / SLIDES | ||
|- | |- | ||
| − | | style="width:10%; background:#7B8ABD" | 12:00-12:45 || style="width:30%; background:#BC857A" align=" | + | | style="width:10%; background:#7B8ABD" | 12:00-12:45 || style="width:30%; background:#BC857A" align="center" | |
| − | ''[http://i8jesus.com/?page_id=5 Arshan Dabirsiaghi]'' | + | '''Next Generation Cross Site Scripting Worms '''<br> |
| − | | style="width:30%; background:#BCA57A" align=" | + | ''[http://i8jesus.com/?page_id=5 Arshan Dabirsiaghi]''<br> |
| − | ''[http://www.linkedin.com/pub/6/372/45a James Landis]'' | + | [http://video.google.com/videoplay?docid=-6889876718850707828 VIDEO] / SLIDES |
| − | | style="width:30%; background:#99FF99" align=" | + | | style="width:30%; background:#BCA57A" align="center" | |
| − | ''Marce Luck & [http://www.linkedin.com/pub/1/507/616 Tom Stracener]'' | + | '''Security of Software-as-a-Service (SaaS)'''<br> |
| + | ''[http://www.linkedin.com/pub/6/372/45a James Landis]''<br> | ||
| + | [http://video.google.com/videoplay?docid=2903708399151786473 VIDEO] / SLIDES | ||
| + | | style="width:30%; background:#99FF99" align="center" | | ||
| + | '''[http://reversebenchmarking.com/About.html Open Reverse Benchmarking Project]'''<br> | ||
| + | ''Marce Luck & [http://www.linkedin.com/pub/1/507/616 Tom Stracener]''<br> | ||
| + | [http://video.google.com/videoplay?docid=-6673781593637811216 VIDEO] / SLIDES | ||
|- | |- | ||
| style="width:10%; background:#7B8ABD" | 12:00-13:00 || colspan="3" style="width:80%; background:#F2F2F2" align="center" | [[OWASP_NYC_AppSec_2008_Conference/ctf | Capture the Flag]] Status | | style="width:10%; background:#7B8ABD" | 12:00-13:00 || colspan="3" style="width:80%; background:#F2F2F2" align="center" | [[OWASP_NYC_AppSec_2008_Conference/ctf | Capture the Flag]] Status | ||
Revision as of 18:26, 15 October 2008
2008 OWASP USA, NYC
Last Update: 10/15/2008
Our mission is to make application security "visible," so that people and organizations can make informed decisions about application security risks. Everyone is free to participate in OWASP and all of our materials are available under a free and open software license. The OWASP Foundation is a 501c3 not-for-profit charitable organization that ensures the ongoing availability and support for our work. OWASP is like "public radio" so support our efforts join today as a corporate or individual member learn more CLICK HERE
CLICK HERE FOR VIDEOS - CLICK HERE FOR PHOTOS
2008 OWASP USA, NYC Conference Schedule – Sept 24th - Sept 25th VIDEOS
Day 1 – Sept 24th, 2008 | |||||||||
|---|---|---|---|---|---|---|---|---|---|
| Track 1: BALLROOM | Track 2: SKYLINE | Track 3: TIMESQUARE | |||||||
| 07:30-08:50 | Doors Open for Attendee/Speaker Registration
avoid lines come early get your caffeine fix and use free wifi | ||||||||
| 09:00-09:45 | OWASP Version 3.0 who we are, how we got here and where we are going?
| ||||||||
| 10:00-10:45 | Analysis of the Web Hacking Incidents Database (WHID) Ofer Shezaf |
DHS Software Assurance Initiatives | |||||||
| 11:00-11:45 |
Http Bot Research |
OWASP "Google Hacking" Project |
MalSpam Research | ||||||
| 12:00-13:00 | Capture the Flag Sign-Up
LUNCH - Provided by event sponsors @ TechExpo | ||||||||
| 12:00-12:45 |
Get Rich or Die Trying - Making Money on The Web, The Black Hat Way |
Framework-level Threat Analysis: Adding Science to the Art of Source-code review |
Automated Web-based Malware Behavioral Analysis | ||||||
| 13:00-13:45 |
New 0-Day Browser Exploits: Clickjacking - yea, this is bad... |
Web Intrusion Detection with ModSecurity |
Using Layer 8 and OWASP to Secure Web Applications | ||||||
| 14:00-14:45 | Industry Outlook Panel: Mark Clancy EVP CitiGroup, |
Security Assessing Java RMI |
JBroFuzz 0.1 - 1.1: Building a Java Fuzzer for the Web | ||||||
| 15:00-15:45 |
OWASP Testing Guide - Offensive Assessing Financial Applications |
Flash Parameter Injection (FPI) |
w3af - A Framework to own the web | ||||||
| 16:00-16:45 |
OWASP Enterprise Security API (ESAPI) Project |
Cross-Site Scripting Filter Evasion |
Case Studies: Exploiting application testing tool deficiencies via "out of band" injection | ||||||
| 17:00-17:45 |
Open Discussion On Application Security |
Mastering PCI Section 6.6 |
Multidisciplinary Bank Attacks | ||||||
| 18:00-18:45 |
Spearfishing and the OWASP Live CD Project |
Coding Secure w/PHP |
Payment Card Data Security and the new Enterprise Java | ||||||
| 19:00-20:00 |
OWASP Chapter Leader / Project Leader working session |
(ISC)2 Cocktail Hour |
Technology Movie Night | ||||||
| 20:00-23:00+ | OWASP Event Party/Reception Event badge required for admission Food, Drinks w/ New & Old Friends - break out the laptop and play capture the flag for fun and prizes. Location: HOTEL BALLROOM
| ||||||||
Day 2 – Sept 25th, 2008 | |||||||||
| 08:00-10:00 | BREAKFAST - Provided by event sponsors @ TechExpo | ||||||||
| 08:00-08:45 |
Software Development: The Last Security Frontier |
Best Practices Guide: Web Application Firewalls |
The Good The Bad and The Ugly - Pen Testing VS. Source Code Analysis
| ||||||
| 09:00-09:45 |
OWASP Web Services Top Ten |
Tiger Team - APPSEC Projects |
OpenSource Tools | ||||||
| 10:00-10:45 |
Building a tool for Security consultants: A story of a customized source code scanner |
"Help Wanted" 7 Things You Need to Know APPSEC/INFOSEC Employment |
Industry Analyst with Forrester Research | ||||||
| 11:00-11:45 |
' |
Security in Agile Development |
Secure Software Impact | ||||||
| 12:00-12:45 |
Next Generation Cross Site Scripting Worms |
Security of Software-as-a-Service (SaaS) |
Open Reverse Benchmarking Project | ||||||
| 12:00-13:00 | Capture the Flag Status
LUNCH - Provided @ TechExpo | ||||||||
| 13:00-13:45 | NIST SAMATE Static Analysis Tool Exposition (SATE) | Lotus Notes/Domino Web Application Security | Shootout @ Blackbox Corral
Larry Suto | ||||||
| 14:00-14:45 | Practical Advanced Threat Modeling
John Steven |
The OWASP Orizon Project: towards version 1.0 Paolo Perego | Building Usable Security | ||||||
| 15:00-15:45 | Off-shoring Application Development? Security is Still Your Problem
Rohyt Belani |
OWASP EU Summit Portugal
Dinis Cruz |
Code Secrets | ||||||
| 16:00-16:45 | Vulnerabilities in application interpreters and runtimes
Erik Cabetas |
Detecting User Disposition - Polar Bears in a Whiteout Robert "RSnake" Hansen | Corruption Dave Aitel | ||||||
| 17:00-17:45 | Event Wrap-Up / Speaker & CTF Awards and Sponsor Raffles | ||||||||
| 18:30-19:30 | OWASP Foundation, Chapter Leader Meeting - to collect ideas to make OWASP better! | ||||||||