This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "OWASP NYC AppSec 2008 Conference"
Line 93: | Line 93: | ||
[http://www.linkedin.com/in/crecalde Carlos Recalde] SVP, Lehman Brothers, <br> | [http://www.linkedin.com/in/crecalde Carlos Recalde] SVP, Lehman Brothers, <br> | ||
[http://www.linkedin.com/pub/5/658/872 Tom King] CISO, Barclays Capital <br> | [http://www.linkedin.com/pub/5/658/872 Tom King] CISO, Barclays Capital <br> | ||
− | Moderator: [http://www.linkedin.com/in/mahidontamsetti Mahi Dontamsetti]'' | + | Moderator: [http://www.linkedin.com/in/mahidontamsetti Mahi Dontamsetti]''<br> |
[http://video.google.com/videoplay?docid=-7051719323294878516&hl=en VIDEO] / SLIDES | [http://video.google.com/videoplay?docid=-7051719323294878516&hl=en VIDEO] / SLIDES | ||
| style="width:30%; background:#BCA57A" align="center" | | | style="width:30%; background:#BCA57A" align="center" | | ||
Line 182: | Line 182: | ||
'''Software Development: The Last Security Frontier'''<br> | '''Software Development: The Last Security Frontier'''<br> | ||
''[http://blog.isc2.org/isc2_blog/tipton/index.html W. Hord Tipton], CISSP-ISSEP, CAP, CISA, CNSS and former Chief Information Officer for the U.S. Department of the Interior Executive Director and member of the Board of Directors, (ISC)²''<br> | ''[http://blog.isc2.org/isc2_blog/tipton/index.html W. Hord Tipton], CISSP-ISSEP, CAP, CISA, CNSS and former Chief Information Officer for the U.S. Department of the Interior Executive Director and member of the Board of Directors, (ISC)²''<br> | ||
− | [http://video.google.com/videoplay?docid=- | + | [http://video.google.com/videoplay?docid=-4023599059084294937&hl=en VIDEO] / SLIDES |
| style="width:30%; background:#BCA57A" align="center" | | | style="width:30%; background:#BCA57A" align="center" | | ||
'''[[AppSecEU08_Best_Practices_Guide_Web_Application_Firewalls | Best Practices Guide: Web Application Firewalls]]'''<br> | '''[[AppSecEU08_Best_Practices_Guide_Web_Application_Firewalls | Best Practices Guide: Web Application Firewalls]]'''<br> | ||
''Alexander Meisel''<br> | ''Alexander Meisel''<br> | ||
− | [http://video.google.com/videoplay?docid= | + | [http://video.google.com/videoplay?docid=-2977259539412442033&hl=en VIDEO] / SLIDES |
| style="width:30%; background:#99FF99" align="center" | | | style="width:30%; background:#99FF99" align="center" | | ||
'''The Good The Bad and The Ugly - Pen Testing VS. Source Code Analysis | '''The Good The Bad and The Ugly - Pen Testing VS. Source Code Analysis | ||
'''<br> | '''<br> | ||
''[http://www.linkedin.com/in/tommyryan Thomas Ryan]''<br> | ''[http://www.linkedin.com/in/tommyryan Thomas Ryan]''<br> | ||
− | VIDEO / SLIDES | + | [http://video.google.com/videoplay?docid=-442445248884665643&hl=en VIDEO] / SLIDES |
|- | |- | ||
| style="width:10%; background:#7B8ABD" | 09:00-09:45 || style="width:30%; background:#BC857A" align="center" | | | style="width:10%; background:#7B8ABD" | 09:00-09:45 || style="width:30%; background:#BC857A" align="center" | | ||
'''OWASP Web Services Top Ten'''<br> | '''OWASP Web Services Top Ten'''<br> | ||
''[http://1raindrop.typepad.com Gunnar Peterson]''<br> | ''[http://1raindrop.typepad.com Gunnar Peterson]''<br> | ||
− | [http://video.google.com/videoplay?docid= | + | [http://video.google.com/videoplay?docid=5680040858618100893&hl=en VIDEO] / SLIDES |
| style="width:30%; background:#BCA57A" align="center" | | | style="width:30%; background:#BCA57A" align="center" | | ||
'''[http://www.trutv.com/video/tiger-team/tiger-team-101-1-of-4.html Tiger Team - APPSEC Projects]'''<br> | '''[http://www.trutv.com/video/tiger-team/tiger-team-101-1-of-4.html Tiger Team - APPSEC Projects]'''<br> | ||
''[http://www.linkedin.com/pub/1/373/994 Chris Nickerson]''<br> | ''[http://www.linkedin.com/pub/1/373/994 Chris Nickerson]''<br> | ||
− | [http://video.google.com/videoplay?docid=- | + | [http://video.google.com/videoplay?docid=-1638710543904774703&hl=en VIDEO] / SLIDES] |
| style="width:30%; background:#99FF99" align="center" | | | style="width:30%; background:#99FF99" align="center" | | ||
'''OpenSource Tools'''<br> | '''OpenSource Tools'''<br> | ||
''Prof. Li-Chiou Chen & Chienitng Lin, [http://www.pace.edu/page.cfm?doc_id=16399 Pace Univ]''<br> | ''Prof. Li-Chiou Chen & Chienitng Lin, [http://www.pace.edu/page.cfm?doc_id=16399 Pace Univ]''<br> | ||
− | [http://video.google.com/videoplay?docid= | + | [http://video.google.com/videoplay?docid=6174945058170583976&hl=en VIDEO] / SLIDES |
|- | |- | ||
| style="width:10%; background:#7B8ABD" | 10:00-10:45 || style="width:30%; background:#BC857A" align="center" | | | style="width:10%; background:#7B8ABD" | 10:00-10:45 || style="width:30%; background:#BC857A" align="center" | | ||
'''Building a tool for Security consultants: A story of a customized source code scanner'''<br> | '''Building a tool for Security consultants: A story of a customized source code scanner'''<br> | ||
''Dinis Cruz''<br> | ''Dinis Cruz''<br> | ||
− | [http://video.google.com/videoplay?docid= | + | [http://video.google.com/videoplay?docid=5269154656993046978&hl=en VIDEO] / SLIDES |
| style="width:30%; background:#BCA57A" align="center" | | | style="width:30%; background:#BCA57A" align="center" | | ||
'''"Help Wanted" [http://www.infosecleaders.com/survey 7 Things You Need to Know APPSEC/INFOSEC Employment]'''<br> | '''"Help Wanted" [http://www.infosecleaders.com/survey 7 Things You Need to Know APPSEC/INFOSEC Employment]'''<br> | ||
''[http://www.linkedin.com/pub/0/29/685 Lee Kushner]''<br> | ''[http://www.linkedin.com/pub/0/29/685 Lee Kushner]''<br> | ||
− | VIDEO / SLIDES | + | [http://video.google.com/videoplay?docid=5330096815878108179&hl=en VIDEO] / SLIDES |
| style="width:30%; background:#99FF99" align="center" | | | style="width:30%; background:#99FF99" align="center" | | ||
'''Industry Analyst with Forrester Research'''<br> | '''Industry Analyst with Forrester Research'''<br> | ||
''[http://www.forrester.com/rb/analyst/chenxi_wang Chenxi Wang]''<br> | ''[http://www.forrester.com/rb/analyst/chenxi_wang Chenxi Wang]''<br> | ||
− | VIDEO / SLIDES | + | [http://video.google.com/videoplay?docid=1391450504589087806&hl=en VIDEO] / SLIDES |
|- | |- | ||
| style="width:10%; background:#7B8ABD" | 11:00-11:45 || style="width:30%; background:#BC857A" align="center" | | | style="width:10%; background:#7B8ABD" | 11:00-11:45 || style="width:30%; background:#BC857A" align="center" | | ||
'''[https://www.owasp.org/index.php/Category:OWASP_CLASP_Project CLASP (Comprehensive, Lightweight Application Security Process)]'''<br> | '''[https://www.owasp.org/index.php/Category:OWASP_CLASP_Project CLASP (Comprehensive, Lightweight Application Security Process)]'''<br> | ||
''Pravir Chandra''<br> | ''Pravir Chandra''<br> | ||
− | [http://video.google.com/videoplay?docid= | + | [http://video.google.com/videoplay?docid=-7453282550277559385&hl=en VIDEO] / SLIDES |
| style="width:30%; background:#BCA57A" align="CENTER" | | | style="width:30%; background:#BCA57A" align="CENTER" | | ||
'''Security in Agile Development'''<br> | '''Security in Agile Development'''<br> | ||
''[[User:Wichers | Dave Wichers]]''<br> | ''[[User:Wichers | Dave Wichers]]''<br> | ||
− | VIDEO / [http://www.owasp.org/images/a/a3/AppSecNYC08-Agile_and_Secure.ppt SLIDES] | + | [http://video.google.com/videoplay?docid=-8287209466278543377&hl=en VIDEO] / [http://www.owasp.org/images/a/a3/AppSecNYC08-Agile_and_Secure.ppt SLIDES] |
| style="width:30%; background:#99FF99" align="center" | | | style="width:30%; background:#99FF99" align="center" | | ||
'''Secure Software Impact'''<br> | '''Secure Software Impact'''<br> | ||
''[http://ouncelabs.com/company/team.asp Jack Danahy]''<br> | ''[http://ouncelabs.com/company/team.asp Jack Danahy]''<br> | ||
− | [http://video.google.com/videoplay?docid= | + | [http://video.google.com/videoplay?docid=-3851913297265683210&hl=en VIDEO] / SLIDES |
|- | |- | ||
| style="width:10%; background:#7B8ABD" | 12:00-12:45 || style="width:30%; background:#BC857A" align="center" | | | style="width:10%; background:#7B8ABD" | 12:00-12:45 || style="width:30%; background:#BC857A" align="center" | | ||
'''Next Generation Cross Site Scripting Worms '''<br> | '''Next Generation Cross Site Scripting Worms '''<br> | ||
''[http://i8jesus.com/?page_id=5 Arshan Dabirsiaghi]''<br> | ''[http://i8jesus.com/?page_id=5 Arshan Dabirsiaghi]''<br> | ||
− | [http://video.google.com/videoplay?docid=- | + | [http://video.google.com/videoplay?docid=-2782535918275323123&hl=en VIDEO] / SLIDES |
| style="width:30%; background:#BCA57A" align="center" | | | style="width:30%; background:#BCA57A" align="center" | | ||
'''Security of Software-as-a-Service (SaaS)'''<br> | '''Security of Software-as-a-Service (SaaS)'''<br> | ||
''[http://www.linkedin.com/pub/6/372/45a James Landis]''<br> | ''[http://www.linkedin.com/pub/6/372/45a James Landis]''<br> | ||
− | [http://video.google.com/videoplay?docid= | + | [http://video.google.com/videoplay?docid=-513622114181563795&hl=en VIDEO] / SLIDES |
| style="width:30%; background:#99FF99" align="center" | | | style="width:30%; background:#99FF99" align="center" | | ||
'''[http://reversebenchmarking.com/About.html Open Reverse Benchmarking Project]'''<br> | '''[http://reversebenchmarking.com/About.html Open Reverse Benchmarking Project]'''<br> | ||
''Marce Luck & [http://www.linkedin.com/pub/1/507/616 Tom Stracener]''<br> | ''Marce Luck & [http://www.linkedin.com/pub/1/507/616 Tom Stracener]''<br> | ||
− | [http://video.google.com/videoplay?docid= | + | [http://video.google.com/videoplay?docid=4352770935920515328&hl=en VIDEO] / SLIDES |
|- | |- | ||
| style="width:10%; background:#7B8ABD" | 12:00-13:00 || colspan="3" style="width:80%; background:#F2F2F2" align="center" | [[OWASP_NYC_AppSec_2008_Conference/ctf | Capture the Flag]] Status | | style="width:10%; background:#7B8ABD" | 12:00-13:00 || colspan="3" style="width:80%; background:#F2F2F2" align="center" | [[OWASP_NYC_AppSec_2008_Conference/ctf | Capture the Flag]] Status | ||
Line 251: | Line 251: | ||
'''[[NIST SAMATE Static Analysis Tool Exposition (SATE)]]'''<br> | '''[[NIST SAMATE Static Analysis Tool Exposition (SATE)]]'''<br> | ||
''[[OWASP_NYC_AppSec_2008_Conference-vadim-okun | Vadim Okun]]''<br> | ''[[OWASP_NYC_AppSec_2008_Conference-vadim-okun | Vadim Okun]]''<br> | ||
− | [http://video.google.com/videoplay?docid=- | + | [http://video.google.com/videoplay?docid=-7567012344169452280&hl=en VIDEO] / SLIDES |
| style="width:30%; background:#BCA57A" align="center" | | | style="width:30%; background:#BCA57A" align="center" | | ||
'''[[User_talk:Jian | Lotus Notes/Domino Web Application Security]]'''<br> | '''[[User_talk:Jian | Lotus Notes/Domino Web Application Security]]'''<br> | ||
''[[User_talk:Jian | Jian Hui Wang]]''<br> | ''[[User_talk:Jian | Jian Hui Wang]]''<br> | ||
− | VIDEO / SLIDES | + | [http://video.google.com/videoplay?docid=8645149711234878540&hl=en VIDEO] / SLIDES |
| style="width:30%; background:#99FF99" align="center" | | | style="width:30%; background:#99FF99" align="center" | | ||
'''Shootout @ Blackbox Corral'''<br> | '''Shootout @ Blackbox Corral'''<br> | ||
''Larry Suto''<br> | ''Larry Suto''<br> | ||
− | VIDEO / SLIDES | + | [http://video.google.com/videoplay?docid=-1565567642122481539&hl=en VIDEO] / SLIDES |
|- | |- | ||
| style="width:10%; background:#7B8ABD" | 14:00-14:45 || style="width:30%; background:#BC857A" align="center" | | | style="width:10%; background:#7B8ABD" | 14:00-14:45 || style="width:30%; background:#BC857A" align="center" | | ||
'''Practical Advanced Threat Modeling'''<br> | '''Practical Advanced Threat Modeling'''<br> | ||
''John Steven''<br> | ''John Steven''<br> | ||
− | [http://video.google.com/videoplay?docid= | + | [http://video.google.com/videoplay?docid=-734106766899160289&hl=en VIDEO] / SLIDES |
| style="width:30%; background:#BCA57A" align="center" | | | style="width:30%; background:#BCA57A" align="center" | | ||
'''[http://www.owasp.org/index.php/Category:OWASP_Orizon_Project The OWASP Orizon Project: towards version 1.0]'''<br> | '''[http://www.owasp.org/index.php/Category:OWASP_Orizon_Project The OWASP Orizon Project: towards version 1.0]'''<br> | ||
''[[User:Thesp0nge | Paolo Perego]]''<br> | ''[[User:Thesp0nge | Paolo Perego]]''<br> | ||
− | VIDEO / SLIDES | + | [http://video.google.com/videoplay?docid=-9104434795648450379&hl=en VIDEO] / SLIDES |
| style="width:30%; background:#99FF99" align="center" | | | style="width:30%; background:#99FF99" align="center" | | ||
'''[[Building_Usable_Security | Building Usable Security]]'''<br> | '''[[Building_Usable_Security | Building Usable Security]]'''<br> | ||
''[[Zed_Abbadi | Zed Abbadi]]''<br> | ''[[Zed_Abbadi | Zed Abbadi]]''<br> | ||
− | VIDEO / SLIDES | + | [http://video.google.com/videoplay?docid=8782541141810029760&hl=en VIDEO] / SLIDES |
|- | |- | ||
| style="width:10%; background:#7B8ABD" | 15:00-15:45 || style="width:30%; background:#BC857A" align="center" | | | style="width:10%; background:#7B8ABD" | 15:00-15:45 || style="width:30%; background:#BC857A" align="center" | | ||
'''Off-shoring Application Development? Security is Still Your Problem'''<br> | '''Off-shoring Application Development? Security is Still Your Problem'''<br> | ||
''Rohyt Belani''<br> | ''Rohyt Belani''<br> | ||
− | [http://video.google.com/videoplay?docid= | + | [http://video.google.com/videoplay?docid=1042293104444687505&hl=en VIDEO] / SLIDES |
| style="width:30%; background:#BCA57A" align="center" | | | style="width:30%; background:#BCA57A" align="center" | | ||
'''[[OWASP_EU_Summit_2008 | OWASP EU Summit Portugal]]'''<br> | '''[[OWASP_EU_Summit_2008 | OWASP EU Summit Portugal]]'''<br> | ||
''Dinis Cruz''<br> | ''Dinis Cruz''<br> | ||
− | [http://video.google.com/videoplay?docid=- | + | [http://video.google.com/videoplay?docid=-7044581008789784268&hl=en VIDEO] / SLIDES |
| style="width:30%; background:#99FF99" align="center" | | | style="width:30%; background:#99FF99" align="center" | | ||
'''Code Secrets'''<br> | '''Code Secrets'''<br> | ||
''[http://johanpeeters.com Johan Peeters]''<br> | ''[http://johanpeeters.com Johan Peeters]''<br> | ||
− | VIDEO / SLIDES | + | [http://video.google.com/videoplay?docid=-4553372140069628300&hl=en VIDEO] / SLIDES |
|- | |- | ||
| style="width:10%; background:#7B8ABD" | 16:00-16:45 || style="width:30%; background:#BC857A" align="center" | | | style="width:10%; background:#7B8ABD" | 16:00-16:45 || style="width:30%; background:#BC857A" align="center" | | ||
'''Vulnerabilities in application interpreters and runtimes'''<br> | '''Vulnerabilities in application interpreters and runtimes'''<br> | ||
''Erik Cabetas''<br> | ''Erik Cabetas''<br> | ||
− | [http://video.google.com/videoplay?docid= | + | [http://video.google.com/videoplay?docid=7859413573034669384&hl=en VIDEO] / SLIDES |
| style="width:30%; background:#BCA57A" align="center" | | | style="width:30%; background:#BCA57A" align="center" | | ||
'''Cryptography For Penetration Testers'''<br> | '''Cryptography For Penetration Testers'''<br> | ||
''Chris Eng''<br> | ''Chris Eng''<br> | ||
− | [http://video.google.com/videoplay?docid= | + | [http://video.google.com/videoplay?docid=-5187022592682372937&hl=en VIDEO] / SLIDES |
| style="width:30%; background:#99FF99" align="center" | | | style="width:30%; background:#99FF99" align="center" | | ||
− | '''Corruption'''<br> | + | '''Memory Corruption and Buffer Overflows'''<br> |
''[http://www.immunitysec.com Dave Aitel]''<br> | ''[http://www.immunitysec.com Dave Aitel]''<br> | ||
− | VIDEO / SLIDES | + | [http://video.google.com/videoplay?docid=-1012125050474412771&hl=en VIDEO] / SLIDES |
|- | |- | ||
| style="width:10%; background:#7B8ABD" | 17:00-17:45 || colspan="3" style="width:80%; background:#C2C2C2" align="center" | '''Event Wrap-Up / Speaker & CTF Awards and Sponsor Raffles''' | | style="width:10%; background:#7B8ABD" | 17:00-17:45 || colspan="3" style="width:80%; background:#C2C2C2" align="center" | '''Event Wrap-Up / Speaker & CTF Awards and Sponsor Raffles''' | ||
+ | [http://video.google.com/videoplay?docid=8211027328063203438&hl=en VIDEO] | ||
|- | |- | ||
| style="width:10%; background:#7B8ABD" | 18:30-19:30 || colspan="3" style="width:80%; background:#C2C2C2" align="center" | OWASP Foundation, Chapter Leader Meeting - to collect ideas to make OWASP better! | | style="width:10%; background:#7B8ABD" | 18:30-19:30 || colspan="3" style="width:80%; background:#C2C2C2" align="center" | OWASP Foundation, Chapter Leader Meeting - to collect ideas to make OWASP better! | ||
|} | |} | ||
− | If you could not find it above... check [http://video.google.com/videosearch?q=owasp.tv&emb=0&aq=f# | + | If you could not find it above... check [http://video.google.com/videosearch?q=owasp.tv&emb=0&aq=f# HERE FOR VIDEOS] |
+ | <br> | ||
+ | Video content produced, processed and posted by [www.MediaArchives.com www.MediaArchives.com] |
Revision as of 22:38, 17 October 2008
2008 OWASP USA, NYC
Last Update: 10/17/2008
Our mission is to make application security "visible," so that people and organizations can make informed decisions about application security risks. Everyone is free to participate in OWASP and all of our materials are available under a free and open software license. The OWASP Foundation is a 501c3 not-for-profit charitable organization that ensures the ongoing availability and support for our work. OWASP is like "public radio" so support our efforts join today as a corporate or individual member learn more CLICK HERE
SEE BELOW FOR VIDEO AND SLIDES - CLICK HERE FOR PHOTOS
2008 OWASP USA, NYC Conference Schedule – Sept 24th - Sept 25th VIDEOS
Day 1 – Sept 24th, 2008 | |||||||||
---|---|---|---|---|---|---|---|---|---|
Track 1: BALLROOM | Track 2: SKYLINE | Track 3: TIMESQUARE | |||||||
07:30-08:50 | Doors Open for Attendee/Speaker Registration
avoid lines come early get your caffeine fix and use free wifi | ||||||||
09:00-09:45 | OWASP Version 3.0 who we are, how we got here and where we are going?
| ||||||||
10:00-10:45 | Analysis of the Web Hacking Incidents Database (WHID) Ofer Shezaf |
DHS Software Assurance Initiatives | |||||||
11:00-11:45 |
Http Bot Research |
OWASP "Google Hacking" Project |
MalSpam Research | ||||||
12:00-13:00 | Capture the Flag Sign-Up
LUNCH - Provided by event sponsors @ TechExpo | ||||||||
12:00-12:45 |
Get Rich or Die Trying - Making Money on The Web, The Black Hat Way |
Framework-level Threat Analysis: Adding Science to the Art of Source-code review |
Automated Web-based Malware Behavioral Analysis | ||||||
13:00-13:45 |
New 0-Day Browser Exploits: Clickjacking - yea, this is bad... |
Web Intrusion Detection with ModSecurity |
Using Layer 8 and OWASP to Secure Web Applications | ||||||
14:00-14:45 | Industry Outlook Panel: Mark Clancy EVP CitiGroup, |
Security Assessing Java RMI |
JBroFuzz 0.1 - 1.1: Building a Java Fuzzer for the Web | ||||||
15:00-15:45 |
OWASP Testing Guide - Offensive Assessing Financial Applications |
Flash Parameter Injection (FPI) |
w3af - A Framework to own the web | ||||||
16:00-16:45 |
OWASP Enterprise Security API (ESAPI) Project |
Cross-Site Scripting Filter Evasion |
Multidisciplinary Bank Attacks | ||||||
17:00-17:45 |
Open Discussion On Application Security |
Mastering PCI Section 6.6 |
Case Studies: Exploiting application testing tool deficiencies via "out of band" injection | ||||||
18:00-18:45 |
Spearfishing and the OWASP Live CD Project |
Coding Secure w/PHP |
Payment Card Data Security and the new Enterprise Java | ||||||
19:00-20:00 |
OWASP Chapter Leader / Project Leader working session |
(ISC)2 Cocktail Hour |
Technology Movie Night | ||||||
20:00-23:00+ | OWASP Event Party/Reception Event badge required for admission Food, Drinks w/ New & Old Friends - break out the laptop and play capture the flag for fun and prizes. Location: HOTEL BALLROOM
| ||||||||
Day 2 – Sept 25th, 2008 | |||||||||
08:00-10:00 | BREAKFAST - Provided by event sponsors @ TechExpo | ||||||||
08:00-08:45 |
Software Development: The Last Security Frontier |
Best Practices Guide: Web Application Firewalls |
The Good The Bad and The Ugly - Pen Testing VS. Source Code Analysis
| ||||||
09:00-09:45 |
OWASP Web Services Top Ten |
Tiger Team - APPSEC Projects |
OpenSource Tools | ||||||
10:00-10:45 |
Building a tool for Security consultants: A story of a customized source code scanner |
"Help Wanted" 7 Things You Need to Know APPSEC/INFOSEC Employment |
Industry Analyst with Forrester Research | ||||||
11:00-11:45 |
CLASP (Comprehensive, Lightweight Application Security Process) |
Security in Agile Development |
Secure Software Impact | ||||||
12:00-12:45 |
Next Generation Cross Site Scripting Worms |
Security of Software-as-a-Service (SaaS) |
Open Reverse Benchmarking Project | ||||||
12:00-13:00 | Capture the Flag Status
LUNCH - Provided @ TechExpo | ||||||||
13:00-13:45 |
NIST SAMATE Static Analysis Tool Exposition (SATE) |
Lotus Notes/Domino Web Application Security |
Shootout @ Blackbox Corral | ||||||
14:00-14:45 |
Practical Advanced Threat Modeling |
The OWASP Orizon Project: towards version 1.0 |
Building Usable Security | ||||||
15:00-15:45 |
Off-shoring Application Development? Security is Still Your Problem |
OWASP EU Summit Portugal |
Code Secrets | ||||||
16:00-16:45 |
Vulnerabilities in application interpreters and runtimes |
Cryptography For Penetration Testers |
Memory Corruption and Buffer Overflows | ||||||
17:00-17:45 | Event Wrap-Up / Speaker & CTF Awards and Sponsor Raffles | ||||||||
18:30-19:30 | OWASP Foundation, Chapter Leader Meeting - to collect ideas to make OWASP better! |
If you could not find it above... check HERE FOR VIDEOS
Video content produced, processed and posted by [www.MediaArchives.com www.MediaArchives.com]