This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "OWASP NYC AppSec 2008 Conference"

From OWASP
Jump to: navigation, search
Line 93: Line 93:
 
[http://www.linkedin.com/in/crecalde Carlos Recalde] SVP, Lehman Brothers, <br>
 
[http://www.linkedin.com/in/crecalde Carlos Recalde] SVP, Lehman Brothers, <br>
 
[http://www.linkedin.com/pub/5/658/872 Tom King] CISO, Barclays Capital <br>
 
[http://www.linkedin.com/pub/5/658/872 Tom King] CISO, Barclays Capital <br>
Moderator: [http://www.linkedin.com/in/mahidontamsetti  Mahi Dontamsetti]''
+
Moderator: [http://www.linkedin.com/in/mahidontamsetti  Mahi Dontamsetti]''<br>
 
[http://video.google.com/videoplay?docid=-7051719323294878516&hl=en VIDEO] / SLIDES
 
[http://video.google.com/videoplay?docid=-7051719323294878516&hl=en VIDEO] / SLIDES
 
  | style="width:30%; background:#BCA57A" align="center" |  
 
  | style="width:30%; background:#BCA57A" align="center" |  
Line 182: Line 182:
 
'''Software Development: The Last Security Frontier'''<br>
 
'''Software Development: The Last Security Frontier'''<br>
 
''[http://blog.isc2.org/isc2_blog/tipton/index.html W. Hord Tipton], CISSP-ISSEP, CAP, CISA, CNSS and former Chief Information Officer for the U.S. Department of the Interior Executive Director and member of the Board of Directors, (ISC)²''<br>
 
''[http://blog.isc2.org/isc2_blog/tipton/index.html W. Hord Tipton], CISSP-ISSEP, CAP, CISA, CNSS and former Chief Information Officer for the U.S. Department of the Interior Executive Director and member of the Board of Directors, (ISC)²''<br>
[http://video.google.com/videoplay?docid=-3031158902293608814 VIDEO] / SLIDES
+
[http://video.google.com/videoplay?docid=-4023599059084294937&hl=en VIDEO] / SLIDES
 
  | style="width:30%; background:#BCA57A" align="center" |  
 
  | style="width:30%; background:#BCA57A" align="center" |  
 
'''[[AppSecEU08_Best_Practices_Guide_Web_Application_Firewalls | Best Practices Guide: Web Application Firewalls]]'''<br>
 
'''[[AppSecEU08_Best_Practices_Guide_Web_Application_Firewalls | Best Practices Guide: Web Application Firewalls]]'''<br>
 
''Alexander Meisel''<br>
 
''Alexander Meisel''<br>
[http://video.google.com/videoplay?docid=4343557004839100474 VIDEO] / SLIDES
+
[http://video.google.com/videoplay?docid=-2977259539412442033&hl=en VIDEO] / SLIDES
 
| style="width:30%; background:#99FF99" align="center" |  
 
| style="width:30%; background:#99FF99" align="center" |  
 
'''The Good The Bad and The Ugly - Pen Testing VS. Source Code Analysis
 
'''The Good The Bad and The Ugly - Pen Testing VS. Source Code Analysis
 
'''<br>
 
'''<br>
 
''[http://www.linkedin.com/in/tommyryan Thomas Ryan]''<br>
 
''[http://www.linkedin.com/in/tommyryan Thomas Ryan]''<br>
VIDEO / SLIDES
+
[http://video.google.com/videoplay?docid=-442445248884665643&hl=en VIDEO] / SLIDES
 
|-
 
|-
 
| style="width:10%; background:#7B8ABD" | 09:00-09:45 || style="width:30%; background:#BC857A" align="center" |  
 
| style="width:10%; background:#7B8ABD" | 09:00-09:45 || style="width:30%; background:#BC857A" align="center" |  
 
'''OWASP Web Services Top Ten'''<br>
 
'''OWASP Web Services Top Ten'''<br>
 
''[http://1raindrop.typepad.com Gunnar Peterson]''<br>
 
''[http://1raindrop.typepad.com Gunnar Peterson]''<br>
[http://video.google.com/videoplay?docid=-7008552133222293089 VIDEO] / SLIDES
+
[http://video.google.com/videoplay?docid=5680040858618100893&hl=en VIDEO] / SLIDES
 
  | style="width:30%; background:#BCA57A" align="center" |  
 
  | style="width:30%; background:#BCA57A" align="center" |  
 
'''[http://www.trutv.com/video/tiger-team/tiger-team-101-1-of-4.html Tiger Team - APPSEC Projects]'''<br>
 
'''[http://www.trutv.com/video/tiger-team/tiger-team-101-1-of-4.html Tiger Team - APPSEC Projects]'''<br>
 
''[http://www.linkedin.com/pub/1/373/994 Chris Nickerson]''<br>
 
''[http://www.linkedin.com/pub/1/373/994 Chris Nickerson]''<br>
[http://video.google.com/videoplay?docid=-727310304416763705 VIDEO] / SLIDES]
+
[http://video.google.com/videoplay?docid=-1638710543904774703&hl=en VIDEO] / SLIDES]
 
| style="width:30%; background:#99FF99" align="center" |  
 
| style="width:30%; background:#99FF99" align="center" |  
 
'''OpenSource Tools'''<br>
 
'''OpenSource Tools'''<br>
 
''Prof. Li-Chiou Chen & Chienitng Lin, [http://www.pace.edu/page.cfm?doc_id=16399 Pace Univ]''<br>
 
''Prof. Li-Chiou Chen & Chienitng Lin, [http://www.pace.edu/page.cfm?doc_id=16399 Pace Univ]''<br>
[http://video.google.com/videoplay?docid=7234120429038062610 VIDEO] / SLIDES
+
[http://video.google.com/videoplay?docid=6174945058170583976&hl=en VIDEO] / SLIDES
 
|-
 
|-
 
| style="width:10%; background:#7B8ABD" | 10:00-10:45 || style="width:30%; background:#BC857A" align="center" |  
 
| style="width:10%; background:#7B8ABD" | 10:00-10:45 || style="width:30%; background:#BC857A" align="center" |  
 
'''Building a tool for Security consultants: A story of a customized source code scanner'''<br>
 
'''Building a tool for Security consultants: A story of a customized source code scanner'''<br>
 
''Dinis Cruz''<br>
 
''Dinis Cruz''<br>
[http://video.google.com/videoplay?docid=-7351771101625317884 VIDEO] / SLIDES
+
[http://video.google.com/videoplay?docid=5269154656993046978&hl=en VIDEO] / SLIDES
 
  | style="width:30%; background:#BCA57A" align="center" |  
 
  | style="width:30%; background:#BCA57A" align="center" |  
 
'''"Help Wanted" [http://www.infosecleaders.com/survey 7 Things You Need to Know APPSEC/INFOSEC Employment]'''<br>
 
'''"Help Wanted" [http://www.infosecleaders.com/survey 7 Things You Need to Know APPSEC/INFOSEC Employment]'''<br>
 
''[http://www.linkedin.com/pub/0/29/685 Lee Kushner]''<br>
 
''[http://www.linkedin.com/pub/0/29/685 Lee Kushner]''<br>
VIDEO / SLIDES
+
[http://video.google.com/videoplay?docid=5330096815878108179&hl=en VIDEO] / SLIDES
 
| style="width:30%; background:#99FF99" align="center" |  
 
| style="width:30%; background:#99FF99" align="center" |  
 
'''Industry Analyst with Forrester Research'''<br>
 
'''Industry Analyst with Forrester Research'''<br>
 
''[http://www.forrester.com/rb/analyst/chenxi_wang Chenxi Wang]''<br>
 
''[http://www.forrester.com/rb/analyst/chenxi_wang Chenxi Wang]''<br>
VIDEO / SLIDES
+
[http://video.google.com/videoplay?docid=1391450504589087806&hl=en VIDEO] / SLIDES
 
|-
 
|-
 
| style="width:10%; background:#7B8ABD" | 11:00-11:45 || style="width:30%; background:#BC857A" align="center" |  
 
| style="width:10%; background:#7B8ABD" | 11:00-11:45 || style="width:30%; background:#BC857A" align="center" |  
 
'''[https://www.owasp.org/index.php/Category:OWASP_CLASP_Project CLASP (Comprehensive, Lightweight Application Security Process)]'''<br>
 
'''[https://www.owasp.org/index.php/Category:OWASP_CLASP_Project CLASP (Comprehensive, Lightweight Application Security Process)]'''<br>
 
''Pravir Chandra''<br>
 
''Pravir Chandra''<br>
[http://video.google.com/videoplay?docid=8296682294441554454 VIDEO] / SLIDES
+
[http://video.google.com/videoplay?docid=-7453282550277559385&hl=en VIDEO] / SLIDES
 
  | style="width:30%; background:#BCA57A" align="CENTER" |  
 
  | style="width:30%; background:#BCA57A" align="CENTER" |  
 
'''Security in Agile Development'''<br>
 
'''Security in Agile Development'''<br>
 
''[[User:Wichers | Dave Wichers]]''<br>
 
''[[User:Wichers | Dave Wichers]]''<br>
VIDEO / [http://www.owasp.org/images/a/a3/AppSecNYC08-Agile_and_Secure.ppt SLIDES]
+
[http://video.google.com/videoplay?docid=-8287209466278543377&hl=en VIDEO] / [http://www.owasp.org/images/a/a3/AppSecNYC08-Agile_and_Secure.ppt SLIDES]
 
| style="width:30%; background:#99FF99" align="center" |  
 
| style="width:30%; background:#99FF99" align="center" |  
 
'''Secure Software Impact'''<br>
 
'''Secure Software Impact'''<br>
 
''[http://ouncelabs.com/company/team.asp Jack Danahy]''<br>
 
''[http://ouncelabs.com/company/team.asp Jack Danahy]''<br>
[http://video.google.com/videoplay?docid=651035914595096427 VIDEO] / SLIDES
+
[http://video.google.com/videoplay?docid=-3851913297265683210&hl=en VIDEO] / SLIDES
 
|-
 
|-
 
| style="width:10%; background:#7B8ABD" | 12:00-12:45 || style="width:30%; background:#BC857A" align="center" |  
 
| style="width:10%; background:#7B8ABD" | 12:00-12:45 || style="width:30%; background:#BC857A" align="center" |  
 
'''Next Generation Cross Site Scripting Worms '''<br>
 
'''Next Generation Cross Site Scripting Worms '''<br>
 
''[http://i8jesus.com/?page_id=5 Arshan Dabirsiaghi]''<br>
 
''[http://i8jesus.com/?page_id=5 Arshan Dabirsiaghi]''<br>
[http://video.google.com/videoplay?docid=-6889876718850707828 VIDEO] / SLIDES
+
[http://video.google.com/videoplay?docid=-2782535918275323123&hl=en VIDEO] / SLIDES
 
  | style="width:30%; background:#BCA57A" align="center" |  
 
  | style="width:30%; background:#BCA57A" align="center" |  
 
'''Security of Software-as-a-Service (SaaS)'''<br>
 
'''Security of Software-as-a-Service (SaaS)'''<br>
 
''[http://www.linkedin.com/pub/6/372/45a James Landis]''<br>
 
''[http://www.linkedin.com/pub/6/372/45a James Landis]''<br>
[http://video.google.com/videoplay?docid=2903708399151786473 VIDEO] / SLIDES
+
[http://video.google.com/videoplay?docid=-513622114181563795&hl=en VIDEO] / SLIDES
 
| style="width:30%; background:#99FF99" align="center" |  
 
| style="width:30%; background:#99FF99" align="center" |  
 
'''[http://reversebenchmarking.com/About.html Open Reverse Benchmarking Project]'''<br>
 
'''[http://reversebenchmarking.com/About.html Open Reverse Benchmarking Project]'''<br>
 
''Marce Luck & [http://www.linkedin.com/pub/1/507/616 Tom Stracener]''<br>
 
''Marce Luck & [http://www.linkedin.com/pub/1/507/616 Tom Stracener]''<br>
[http://video.google.com/videoplay?docid=-6673781593637811216 VIDEO] / SLIDES
+
[http://video.google.com/videoplay?docid=4352770935920515328&hl=en VIDEO] / SLIDES
 
|-
 
|-
 
  | style="width:10%; background:#7B8ABD" | 12:00-13:00 || colspan="3" style="width:80%; background:#F2F2F2" align="center" | [[OWASP_NYC_AppSec_2008_Conference/ctf | Capture the Flag]] Status
 
  | style="width:10%; background:#7B8ABD" | 12:00-13:00 || colspan="3" style="width:80%; background:#F2F2F2" align="center" | [[OWASP_NYC_AppSec_2008_Conference/ctf | Capture the Flag]] Status
Line 251: Line 251:
 
'''[[NIST SAMATE Static Analysis Tool Exposition (SATE)]]'''<br>
 
'''[[NIST SAMATE Static Analysis Tool Exposition (SATE)]]'''<br>
 
''[[OWASP_NYC_AppSec_2008_Conference-vadim-okun | Vadim Okun]]''<br>
 
''[[OWASP_NYC_AppSec_2008_Conference-vadim-okun | Vadim Okun]]''<br>
[http://video.google.com/videoplay?docid=-1842007587240465528 VIDEO] / SLIDES
+
[http://video.google.com/videoplay?docid=-7567012344169452280&hl=en VIDEO] / SLIDES
 
| style="width:30%; background:#BCA57A" align="center" |  
 
| style="width:30%; background:#BCA57A" align="center" |  
 
'''[[User_talk:Jian | Lotus Notes/Domino Web Application Security]]'''<br>
 
'''[[User_talk:Jian | Lotus Notes/Domino Web Application Security]]'''<br>
 
''[[User_talk:Jian | Jian Hui Wang]]''<br>
 
''[[User_talk:Jian | Jian Hui Wang]]''<br>
VIDEO / SLIDES
+
[http://video.google.com/videoplay?docid=8645149711234878540&hl=en VIDEO] / SLIDES
 
| style="width:30%; background:#99FF99" align="center" |  
 
| style="width:30%; background:#99FF99" align="center" |  
 
'''Shootout @ Blackbox Corral'''<br>
 
'''Shootout @ Blackbox Corral'''<br>
 
''Larry Suto''<br>
 
''Larry Suto''<br>
VIDEO / SLIDES
+
[http://video.google.com/videoplay?docid=-1565567642122481539&hl=en VIDEO] / SLIDES
 
|-
 
|-
 
| style="width:10%; background:#7B8ABD" | 14:00-14:45 || style="width:30%; background:#BC857A" align="center" |  
 
| style="width:10%; background:#7B8ABD" | 14:00-14:45 || style="width:30%; background:#BC857A" align="center" |  
 
'''Practical Advanced Threat Modeling'''<br>
 
'''Practical Advanced Threat Modeling'''<br>
 
''John Steven''<br>
 
''John Steven''<br>
[http://video.google.com/videoplay?docid=1486049967560426907 VIDEO] / SLIDES
+
[http://video.google.com/videoplay?docid=-734106766899160289&hl=en VIDEO] / SLIDES
 
| style="width:30%; background:#BCA57A" align="center" |  
 
| style="width:30%; background:#BCA57A" align="center" |  
 
'''[http://www.owasp.org/index.php/Category:OWASP_Orizon_Project The OWASP Orizon Project: towards version 1.0]'''<br>
 
'''[http://www.owasp.org/index.php/Category:OWASP_Orizon_Project The OWASP Orizon Project: towards version 1.0]'''<br>
 
''[[User:Thesp0nge | Paolo Perego]]''<br>
 
''[[User:Thesp0nge | Paolo Perego]]''<br>
VIDEO / SLIDES
+
[http://video.google.com/videoplay?docid=-9104434795648450379&hl=en VIDEO] / SLIDES
 
| style="width:30%; background:#99FF99" align="center" |  
 
| style="width:30%; background:#99FF99" align="center" |  
 
'''[[Building_Usable_Security | Building Usable Security]]'''<br>
 
'''[[Building_Usable_Security | Building Usable Security]]'''<br>
 
''[[Zed_Abbadi | Zed Abbadi]]''<br>
 
''[[Zed_Abbadi | Zed Abbadi]]''<br>
VIDEO / SLIDES
+
[http://video.google.com/videoplay?docid=8782541141810029760&hl=en VIDEO] / SLIDES
 
|-
 
|-
 
| style="width:10%; background:#7B8ABD" | 15:00-15:45 || style="width:30%; background:#BC857A" align="center" |  
 
| style="width:10%; background:#7B8ABD" | 15:00-15:45 || style="width:30%; background:#BC857A" align="center" |  
 
'''Off-shoring Application Development? Security is Still Your Problem'''<br>
 
'''Off-shoring Application Development? Security is Still Your Problem'''<br>
 
''Rohyt Belani''<br>
 
''Rohyt Belani''<br>
[http://video.google.com/videoplay?docid=-8783560171856908153 VIDEO] / SLIDES
+
[http://video.google.com/videoplay?docid=1042293104444687505&hl=en VIDEO] / SLIDES
 
| style="width:30%; background:#BCA57A" align="center" |  
 
| style="width:30%; background:#BCA57A" align="center" |  
 
'''[[OWASP_EU_Summit_2008 | OWASP EU Summit Portugal]]'''<br>
 
'''[[OWASP_EU_Summit_2008 | OWASP EU Summit Portugal]]'''<br>
 
''Dinis Cruz''<br>
 
''Dinis Cruz''<br>
[http://video.google.com/videoplay?docid=-2105190289056545557 VIDEO] / SLIDES
+
[http://video.google.com/videoplay?docid=-7044581008789784268&hl=en VIDEO] / SLIDES
 
| style="width:30%; background:#99FF99" align="center" |  
 
| style="width:30%; background:#99FF99" align="center" |  
 
'''Code Secrets'''<br>
 
'''Code Secrets'''<br>
 
''[http://johanpeeters.com Johan Peeters]''<br>
 
''[http://johanpeeters.com Johan Peeters]''<br>
VIDEO / SLIDES
+
[http://video.google.com/videoplay?docid=-4553372140069628300&hl=en VIDEO] / SLIDES
 
|-
 
|-
 
| style="width:10%; background:#7B8ABD" | 16:00-16:45 || style="width:30%; background:#BC857A" align="center" |  
 
| style="width:10%; background:#7B8ABD" | 16:00-16:45 || style="width:30%; background:#BC857A" align="center" |  
 
'''Vulnerabilities in application interpreters and runtimes'''<br>
 
'''Vulnerabilities in application interpreters and runtimes'''<br>
 
''Erik Cabetas''<br>
 
''Erik Cabetas''<br>
[http://video.google.com/videoplay?docid=-1029518595349409129 VIDEO] / SLIDES
+
[http://video.google.com/videoplay?docid=7859413573034669384&hl=en VIDEO] / SLIDES
 
  | style="width:30%; background:#BCA57A" align="center" |  
 
  | style="width:30%; background:#BCA57A" align="center" |  
 
'''Cryptography For Penetration Testers'''<br>
 
'''Cryptography For Penetration Testers'''<br>
 
''Chris Eng''<br>
 
''Chris Eng''<br>
[http://video.google.com/videoplay?docid=8745946108340390864 VIDEO] / SLIDES
+
[http://video.google.com/videoplay?docid=-5187022592682372937&hl=en VIDEO] / SLIDES
 
| style="width:30%; background:#99FF99" align="center" |  
 
| style="width:30%; background:#99FF99" align="center" |  
'''Corruption'''<br>
+
'''Memory Corruption and Buffer Overflows'''<br>
 
''[http://www.immunitysec.com Dave Aitel]''<br>
 
''[http://www.immunitysec.com Dave Aitel]''<br>
VIDEO / SLIDES
+
[http://video.google.com/videoplay?docid=-1012125050474412771&hl=en VIDEO] / SLIDES
 
|-
 
|-
 
  | style="width:10%; background:#7B8ABD" | 17:00-17:45 || colspan="3" style="width:80%; background:#C2C2C2" align="center" |  '''Event Wrap-Up / Speaker & CTF Awards and Sponsor Raffles'''
 
  | style="width:10%; background:#7B8ABD" | 17:00-17:45 || colspan="3" style="width:80%; background:#C2C2C2" align="center" |  '''Event Wrap-Up / Speaker & CTF Awards and Sponsor Raffles'''
 +
[http://video.google.com/videoplay?docid=8211027328063203438&hl=en VIDEO]
 
|-
 
|-
 
  | style="width:10%; background:#7B8ABD" | 18:30-19:30 || colspan="3" style="width:80%; background:#C2C2C2" align="center" | OWASP Foundation, Chapter Leader Meeting - to collect ideas to make OWASP better!
 
  | style="width:10%; background:#7B8ABD" | 18:30-19:30 || colspan="3" style="width:80%; background:#C2C2C2" align="center" | OWASP Foundation, Chapter Leader Meeting - to collect ideas to make OWASP better!
 
|}
 
|}
  
If you could not find it above... check [http://video.google.com/videosearch?q=owasp.tv&emb=0&aq=f# CLICK HERE FOR VIDEOS]
+
If you could not find it above... check [http://video.google.com/videosearch?q=owasp.tv&emb=0&aq=f# HERE FOR VIDEOS]
 +
<br>
 +
Video content produced, processed and posted by [www.MediaArchives.com www.MediaArchives.com]

Revision as of 22:38, 17 October 2008

2008 OWASP USA, NYC

Last Update: 10/17/2008



Our mission is to make application security "visible," so that people and organizations can make informed decisions about application security risks. Everyone is free to participate in OWASP and all of our materials are available under a free and open software license. The OWASP Foundation is a 501c3 not-for-profit charitable organization that ensures the ongoing availability and support for our work. OWASP is like "public radio" so support our efforts join today as a corporate or individual member learn more CLICK HERE



SEE BELOW FOR VIDEO AND SLIDES - CLICK HERE FOR PHOTOS

Join the OWASP Linked'In Group

2008 OWASP USA, NYC Conference Schedule – Sept 24th - Sept 25th VIDEOS

Day 1 – Sept 24th, 2008

Track 1: BALLROOM Track 2: SKYLINE Track 3: TIMESQUARE
07:30-08:50 Doors Open for Attendee/Speaker Registration

avoid lines come early get your caffeine fix and use free wifi

09:00-09:45 OWASP Version 3.0 who we are, how we got here and where we are going?


OWASP Foundation: Jeff Williams, Dinis Cruz, Dave Wichers, Tom Brennan, Sebastien Deleersnyder
VIDEO / Dave Wichers's SLIDES

10:00-10:45 Analysis of the Web Hacking Incidents Database (WHID)

Ofer Shezaf
VIDEO / SLIDES

Web Application Security Road Map
Joe White
VIDEO / SLIDES

DHS Software Assurance Initiatives
Stan Wisseman & Joe Jarzombek
VIDEO / SLIDES

11:00-11:45

Http Bot Research
Andre M. DiMino - ShadowServer Foundation
VIDEO / SLIDES

OWASP "Google Hacking" Project
Christian Heinrich
VIDEO / SLIDES

MalSpam Research
Garth Bruen
VIDEO / SLIDES

12:00-13:00 Capture the Flag Sign-Up

LUNCH - Provided by event sponsors @ TechExpo

12:00-12:45

Get Rich or Die Trying - Making Money on The Web, The Black Hat Way
Trey Ford, Tom Brennan, Jeremiah Grossman
VIDEO / SLIDES

Framework-level Threat Analysis: Adding Science to the Art of Source-code review
Rohit Sethi & Sahba Kazerooni
VIDEO / SLIDES

Automated Web-based Malware Behavioral Analysis
Tyler Hudak
VIDEO / SLIDES

13:00-13:45

New 0-Day Browser Exploits: Clickjacking - yea, this is bad...
Jeremiah Grossman & Robert "RSnake" Hansen
VIDEO / SLIDES

Web Intrusion Detection with ModSecurity
Ivan Ristic
VIDEO / SLIDES

Using Layer 8 and OWASP to Secure Web Applications
David Stern & Roman Garber
VIDEO / SLIDES

14:00-14:45 Industry Outlook Panel:

Mark Clancy EVP CitiGroup,
Jim Routh CISO DTCC,
Sunil Seshadri CISO NYSE-Euronet,
Warren Axelrod SVP Bank of America,
Joe Bernik SVP, RBS,
Jennifer Bayuk Infosec Consultant,
Philip Venables CISO, Goldman Sachs,
Carlos Recalde SVP, Lehman Brothers,
Tom King CISO, Barclays Capital
Moderator: Mahi Dontamsetti
VIDEO / SLIDES

Security Assessing Java RMI
Adam Boulton
VIDEO / SLIDES

JBroFuzz 0.1 - 1.1: Building a Java Fuzzer for the Web
Yiannis Pavlosoglou
VIDEO / SLIDES

15:00-15:45

OWASP Testing Guide - Offensive Assessing Financial Applications
Daniel Cuthbert
VIDEO / SLIDES

Flash Parameter Injection (FPI)
Ayal Yogev & Adi Sharabani
VIDEO / SLIDES

w3af - A Framework to own the web
Andres Riancho
VIDEO / VIDEO

16:00-16:45

OWASP Enterprise Security API (ESAPI) Project
Jeff Williams
VIDEO / SLIDES

Cross-Site Scripting Filter Evasion
Alexios Fakos
VIDEO / SLIDES

Multidisciplinary Bank Attacks
Gunter Ollmann
VIDEO / SLIDES

17:00-17:45

Open Discussion On Application Security
Joe Bernik & Steve Anton
VIDEO / SLIDES

Mastering PCI Section 6.6
Taylor McKinley and Jacob West
VIDEO / SLIDES

Case Studies: Exploiting application testing tool deficiencies via "out of band" injection
Vijay Akasapu & Marshall Heilman
VIDEO / SLIDES

18:00-18:45

Spearfishing and the OWASP Live CD Project
Joshua Perrymon
VIDEO / SLIDES

Coding Secure w/PHP
Hans Zaunere
VIDEO / SLIDES

Payment Card Data Security and the new Enterprise Java
Dr. B. V. Kumar & Mr. Abhay Bhargav
VIDEO / SLIDES

19:00-20:00

OWASP Chapter Leader / Project Leader working session
OWSAP Board/Chapter Leaders

(ISC)2 Cocktail Hour
All welcome to attend for a special announcement presented by:
W. Hord Tipton, Executive Director of (ISC)2

Technology Movie Night
Sneakers, WarGames, HackersArePeopleToo, TigerTeam
from 19:00 - 23:00

20:00-23:00+ OWASP Event Party/Reception
Event badge required for admission
Food, Drinks w/ New & Old Friends - break out the laptop and play capture the flag for fun and prizes.
Location: HOTEL BALLROOM


Day 2 – Sept 25th, 2008

08:00-10:00 BREAKFAST - Provided by event sponsors @ TechExpo
08:00-08:45

Software Development: The Last Security Frontier
W. Hord Tipton, CISSP-ISSEP, CAP, CISA, CNSS and former Chief Information Officer for the U.S. Department of the Interior Executive Director and member of the Board of Directors, (ISC)²
VIDEO / SLIDES

Best Practices Guide: Web Application Firewalls
Alexander Meisel
VIDEO / SLIDES

The Good The Bad and The Ugly - Pen Testing VS. Source Code Analysis
Thomas Ryan
VIDEO / SLIDES

09:00-09:45

OWASP Web Services Top Ten
Gunnar Peterson
VIDEO / SLIDES

Tiger Team - APPSEC Projects
Chris Nickerson
VIDEO / SLIDES]

OpenSource Tools
Prof. Li-Chiou Chen & Chienitng Lin, Pace Univ
VIDEO / SLIDES

10:00-10:45

Building a tool for Security consultants: A story of a customized source code scanner
Dinis Cruz
VIDEO / SLIDES

"Help Wanted" 7 Things You Need to Know APPSEC/INFOSEC Employment
Lee Kushner
VIDEO / SLIDES

Industry Analyst with Forrester Research
Chenxi Wang
VIDEO / SLIDES

11:00-11:45

CLASP (Comprehensive, Lightweight Application Security Process)
Pravir Chandra
VIDEO / SLIDES

Security in Agile Development
Dave Wichers
VIDEO / SLIDES

Secure Software Impact
Jack Danahy
VIDEO / SLIDES

12:00-12:45

Next Generation Cross Site Scripting Worms
Arshan Dabirsiaghi
VIDEO / SLIDES

Security of Software-as-a-Service (SaaS)
James Landis
VIDEO / SLIDES

Open Reverse Benchmarking Project
Marce Luck & Tom Stracener
VIDEO / SLIDES

12:00-13:00 Capture the Flag Status

LUNCH - Provided @ TechExpo

13:00-13:45

NIST SAMATE Static Analysis Tool Exposition (SATE)
Vadim Okun
VIDEO / SLIDES

Lotus Notes/Domino Web Application Security
Jian Hui Wang
VIDEO / SLIDES

Shootout @ Blackbox Corral
Larry Suto
VIDEO / SLIDES

14:00-14:45

Practical Advanced Threat Modeling
John Steven
VIDEO / SLIDES

The OWASP Orizon Project: towards version 1.0
Paolo Perego
VIDEO / SLIDES

Building Usable Security
Zed Abbadi
VIDEO / SLIDES

15:00-15:45

Off-shoring Application Development? Security is Still Your Problem
Rohyt Belani
VIDEO / SLIDES

OWASP EU Summit Portugal
Dinis Cruz
VIDEO / SLIDES

Code Secrets
Johan Peeters
VIDEO / SLIDES

16:00-16:45

Vulnerabilities in application interpreters and runtimes
Erik Cabetas
VIDEO / SLIDES

Cryptography For Penetration Testers
Chris Eng
VIDEO / SLIDES

Memory Corruption and Buffer Overflows
Dave Aitel
VIDEO / SLIDES

17:00-17:45 Event Wrap-Up / Speaker & CTF Awards and Sponsor Raffles

VIDEO

18:30-19:30 OWASP Foundation, Chapter Leader Meeting - to collect ideas to make OWASP better!

If you could not find it above... check HERE FOR VIDEOS
Video content produced, processed and posted by [www.MediaArchives.com www.MediaArchives.com]