This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "AppSec Europe 2006/Agenda"
(→OWASP Europe 2006 Conference Schedule) |
(→OWASP Europe 2006 Conference Schedule) |
||
Line 61: | Line 61: | ||
| style="width:10%; background:#7B8ABD" | 19:00 - 21:00 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Social Gathering: Dinner and Drinks at the Faculty Club | | style="width:10%; background:#7B8ABD" | 19:00 - 21:00 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Social Gathering: Dinner and Drinks at the Faculty Club | ||
|- | |- | ||
− | + | ! colspan="3" align="center" style="background:#4058A0; color:white" | Day 2 - May 31, 2006 | |
|- | |- | ||
+ | | style="width:10%; background:#7B8ABD" | || style="width:40%; background:#BC857A" align="center" | Track 1: Auditorium Zeger Van Hee (Room DV1 91.56) | ||
+ | | style="width:40%; background:#BCA57A" | Track 2: Auditorium 2 (Room DV1 91.54) | ||
|- | |- | ||
| style="width:10%; background:#7B8ABD" | 08:00 - 09:00 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Coffee | | style="width:10%; background:#7B8ABD" | 08:00 - 09:00 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Coffee | ||
|- | |- | ||
− | | style="width:10%; background:#7B8ABD" | 09:00 - 09:50 || colspan="2" style="width:80%; background:#F2F2F2" align="left" | Keynote | + | | style="width:10%; background:#7B8ABD" | 09:00 - 09:50 || colspan="2" style="width:80%; background:#F2F2F2" align="left" | Keynote: Taking OWASP to the next level, Andrew Van Der Stock, Security Engineer - NAB and OWASP Guide Project Lead |
|- | |- | ||
− | | style="width:10%; background:#7B8ABD" | 09:50 - 10:50 || colspan="2" style="width:80%; background:#F2F2F2" align="left" | | + | | style="width:10%; background:#7B8ABD" | 09:50 - 10:50 || colspan="2" style="width:80%; background:#F2F2F2" align="left" | Web Application Firewalls: When are they useful? - Ivan Ristic, Founder Thinking Stone |
|- | |- | ||
| style="width:10%; background:#7B8ABD" | 10:50 - 11:10 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Break | | style="width:10%; background:#7B8ABD" | 10:50 - 11:10 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Break | ||
|- | |- | ||
− | | style="width:10%; background:#7B8ABD" | 11:10 - 12:30 || style="width:40%; background:#BC857A" align="left" | | + | | style="width:10%; background:#7B8ABD" | 11:10 - 12:30 || style="width:40%; background:#BC857A" align="left" | Exposing cryptography for software developers: common pitfalls & countermeasures that every developer should follow when writing crypto-aware applications, Shay Zalalichin, Application Security Unit Manager, Comsec Security Consulting B.V. |
− | | style="width:40%; background:#BCA57A" align="left" | | + | | style="width:40%; background:#BCA57A" align="left" | Refereed Papers Track – Slot 1: Research Papers |
+ | 1)RequestRodeo: Client Side Protection against Session Riding, Martin Johns and Justus Winter | ||
+ | 2)An Inline Approach for Secure SOAP Requests and Early Validation, Mohammad Ashiqur Rahaman, Maarten Rits and Andreas Schaad | ||
|- | |- | ||
| style="width:10%; background:#7B8ABD" | 12:30 - 13:45 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Lunch | | style="width:10%; background:#7B8ABD" | 12:30 - 13:45 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Lunch | ||
|- | |- | ||
− | | style="width:10%; background:#7B8ABD" | 13:45 - 15: | + | | style="width:10%; background:#7B8ABD" | 13:45 - 15:10 || style="width:40%; background:#BC857A" align="left" | SiteGenerator, VulnReport and the other OWASP .Net tools, Dinis Cruz, OWASP .Net Projects Lead |
− | | style="width:40%; background:#BCA57A" align="left" | | + | | style="width:40%; background:#BCA57A" align="left" | Refereed Papers Track – Slot 2: Experience Papers |
+ | 3)Security Testing Web Applications through Unit Tests, Stephen de Vries | ||
+ | 4)Protecting Web Services against Security Threats, Rix Groenboom | ||
|- | |- | ||
− | | style="width:10%; background:#7B8ABD" | 15: | + | | style="width:10%; background:#7B8ABD" | 15:10 - 15:30 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Break |
|- | |- | ||
− | | style="width:10%; background:#7B8ABD" | 15: | + | | style="width:10%; background:#7B8ABD" | 15:30 - 16:30 || style="width:40%; background:#BC857A" align="left" | |
− | + | Panel: “Are we winning the war?” - Are we actually getting a handle on application security issues and making things better, or are things still getting worse? | |
+ | Moderator: Gunnar Peterson | ||
+ | Panelists: Roger Thornton - CTO Fortify; Dave Wichers - COO Aspect Security; André Mariën - Consulting Director - CyberTrust EMEA | ||
|- | |- | ||
| style="width:10%; background:#7B8ABD" | 16:30 - 16:50 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Break | | style="width:10%; background:#7B8ABD" | 16:30 - 16:50 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Break | ||
|- | |- | ||
− | | style="width:10%; background:#7B8ABD" | | + | | style="width:10%; background:#7B8ABD" | 16:50 - 17:30 || style="width:40%; background:#BC857A" align="left" | John Steven - Cigital - Building a Scalable Software Security Practice within your Organization |
− | |||
|} | |} |
Revision as of 12:42, 30 May 2006
OWASP Training Courses
The tutorials and the conference itself will be held at KU in the College De Valk. The specific rooms are specified below.
T1. Foundations of Web Application Security - One Day Course - May 29th, 2006 |
---|
This powerful one day course focuses on the most common web application security problems, including the OWASP Top Ten. The course will introduce and demonstrate hacking techniques, illustrating how application vulnerabilities can be exploited so students really understand how to avoid introducing such vulnerabilities into their code. Read more here! This class will be held in room DV3 01.08 |
T2. WebServices and XML Security - One Day Course - May 29th, 2006 |
Many enterprises are currently developing new Web Services and/or adding and acquiring Web Services functionality into existing applications -- now is the time to build security into the system! Read more here! This class will be held in room DV3 01.10 |
OWASP Europe 2006 Conference Schedule
Day 1 - May 30, 2006 | ||
---|---|---|
Track 1: Auditorium Zeger Van Hee (Room DV1 91.56) | Track 2: Auditorium 2 (Room DV1 91.54) | |
08:00 - 09:00 | Registration and Coffee | |
09:00 - 09:10 | Welcome to AppSec Europe 2006: Dave Wichers, OWASP Conferences Chair | |
09:10 - 10:00 | Keynote: OWASP 2.0 - A new vision for OWASP: Enabling organizations to develop, maintain, and acquire applications they can trust - Andrew Van Der Stock, Security Engineer - NAB and OWASP Guide Project Lead | |
10:00 - 11:10 | Panel: "Should companies be emulating Microsoft’s Security Development Lifecycle (SDL)?”
Moderator: Johan Peeters, Program Director secappdev.org Panelists: Dinis Cruz, Andrew Van Der Stock, Pravir Chandra - Chief Security Architect - Secure Software, Alex Lucas - Security Engineer - Microsoft | |
11:10 - 11:30 | Break | |
11:30 - 12:30 | OWASP Process Project – Pravir Chandra, Chief Security Architect, Secure Software | Can (Automated) Testing Tools Really Find the OWASP Top 10?, Erwin Geirnaert, Partner ZION Security |
12:30 - 13:45 | Lunch | |
13:45 - 15:00 | Bootstrapping a Software Security Assurance Process – Sebastien Deleersnyder, OWASP Belgium Chapter Lead | AJAX Security – Andrew Van Der Stock, Security Engineer - NAB and OWASP Guide Project Lead |
15:00 - 15:20 | Break | |
15:20-16:30 | From Theory to Reality: Seven Practical Steps to Delivering More Secure Software – Roger Thornton, CTO Fortify | HTTP Message Splitting, Smuggling and Other Animals [1]- Amit Klein, Internationally Recognized Web Application Security Researcher and OWASP Israel Chapter Leader |
16:30-16:50 | Break | |
16:50 - 18:00 | Panel: "The role of Sandboxing in creating secure .Net and Java applications.”
Organizer: Dinis Cruz Panelists: Stephen de Vries - Corsaire, Roger Thornton - CTO Fortify | |
18:00 - 19:00 | Walking Tour of Leuven on the way to the Faculty Club | |
18:40 - 19:20 | Chapter Leads Meeting at the Faculty Club: Led by Sebastien Deleersnyder | |
19:00 - 21:00 | Social Gathering: Dinner and Drinks at the Faculty Club | |
Day 2 - May 31, 2006 | ||
Track 1: Auditorium Zeger Van Hee (Room DV1 91.56) | Track 2: Auditorium 2 (Room DV1 91.54) | |
08:00 - 09:00 | Coffee | |
09:00 - 09:50 | Keynote: Taking OWASP to the next level, Andrew Van Der Stock, Security Engineer - NAB and OWASP Guide Project Lead | |
09:50 - 10:50 | Web Application Firewalls: When are they useful? - Ivan Ristic, Founder Thinking Stone | |
10:50 - 11:10 | Break | |
11:10 - 12:30 | Exposing cryptography for software developers: common pitfalls & countermeasures that every developer should follow when writing crypto-aware applications, Shay Zalalichin, Application Security Unit Manager, Comsec Security Consulting B.V. | Refereed Papers Track – Slot 1: Research Papers
1)RequestRodeo: Client Side Protection against Session Riding, Martin Johns and Justus Winter 2)An Inline Approach for Secure SOAP Requests and Early Validation, Mohammad Ashiqur Rahaman, Maarten Rits and Andreas Schaad |
12:30 - 13:45 | Lunch | |
13:45 - 15:10 | SiteGenerator, VulnReport and the other OWASP .Net tools, Dinis Cruz, OWASP .Net Projects Lead | Refereed Papers Track – Slot 2: Experience Papers
3)Security Testing Web Applications through Unit Tests, Stephen de Vries 4)Protecting Web Services against Security Threats, Rix Groenboom |
15:10 - 15:30 | Break | |
15:30 - 16:30 |
Panel: “Are we winning the war?” - Are we actually getting a handle on application security issues and making things better, or are things still getting worse? Moderator: Gunnar Peterson Panelists: Roger Thornton - CTO Fortify; Dave Wichers - COO Aspect Security; André Mariën - Consulting Director - CyberTrust EMEA | |
16:30 - 16:50 | Break | |
16:50 - 17:30 | John Steven - Cigital - Building a Scalable Software Security Practice within your Organization |