This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "SecurityByte OWASP Conference Tracks"

From OWASP
Jump to: navigation, search
Line 1: Line 1:
'''Xprobe3 - what's new. Going application level''' - Fyodor Yarochkin , Guard-info<br>
+
*'''Xprobe3 - what's new. Going application level''' - Fyodor Yarochkin , Guard-info<br>
'''Client Side hacks''' - Dino Covotsos, Telspace Systems<br>
+
*'''Client Side hacks''' - Dino Covotsos, Telspace Systems<br>
'''Critical Infrastructure Security “Danger Without borders”''' - John Bumgarner, US Cyber Consequence Unit (USCCU)<br>
+
*'''Critical Infrastructure Security “Danger Without borders”''' - John Bumgarner, US Cyber Consequence Unit (USCCU)<br>
'''Exploiting Firefox Extensions''' - Roberto Suggi Liverani, Security-Assessment.com<br>
+
*'''Exploiting Firefox Extensions''' - Roberto Suggi Liverani, Security-Assessment.com<br>
'''Cloud Hacking – Distributed Attack & Exploit Platform''' - Shreeraj Shah, Blueinfy Solutions<br>
+
*'''Cloud Hacking – Distributed Attack & Exploit Platform''' - Shreeraj Shah, Blueinfy Solutions<br>
'''SQL Server Forensics 2.0''' - Kevvie Fowler, TELUS & Ringzero<br>
+
*'''SQL Server Forensics 2.0''' - Kevvie Fowler, TELUS & Ringzero<br>
'''Vbootkit 2.0: Attacking Windows 7 via Boot Sectors''' - Nitin Kumar/Vipin Kumar, Independent Security Researchers, NVlabs<br>
+
*'''Vbootkit 2.0: Attacking Windows 7 via Boot Sectors''' - Nitin Kumar/Vipin Kumar, Independent Security Researchers, NVlabs<br>
'''Testing JSON Applications for security holes''' - Aviram Jenik, Beyond Security<br>
+
*'''Testing JSON Applications for security holes''' - Aviram Jenik, Beyond Security<br>
'''How to blackbox test almost anything''' - Aviram Jenik, Beyond Security<br>
+
*'''How to blackbox test almost anything''' - Aviram Jenik, Beyond Security<br>
'''Topical issues affecting the threat landscape - prevalence of web threats''' - Joshua Talbot, Symantec Corp.<br>
+
*'''Topical issues affecting the threat landscape - prevalence of web threats''' - Joshua Talbot, Symantec Corp.<br>
'''“Do You Want To Play A Game?”: Game Theory And Simulated Cyber War''' - Bryan K. Fite, Symantec Corp.<br>
+
*'''“Do You Want To Play A Game?”: Game Theory And Simulated Cyber War''' - Bryan K. Fite, Symantec Corp.<br>
'''Hacking Oracle From Web''' - Sumit Siddharth (Sid), Independent Security Researcher<br>
+
*'''Hacking Oracle From Web''' - Sumit Siddharth (Sid), Independent Security Researcher<br>
'''TBD''' - Mano Paul, Software Assurance Advisor (ISC)2<br>
+
*'''TBD''' - Mano Paul, Software Assurance Advisor (ISC)2<br>
'''TBD''' - Howard A. Schmidt, Former Cyber Security Advisor to the White house; Former Strategic Advisor – President’s Critical Infrastructure Protection Program<br>
+
*'''TBD''' - Howard A. Schmidt, Former Cyber Security Advisor to the White house; Former Strategic Advisor – President’s Critical Infrastructure Protection Program<br>
'''Hacking mobile wallet / mobile banking systems, OR Anti Forensics (OSX based attacks)''' - The Grugq, Independent Security Researcher<br>
+
*'''Hacking mobile wallet / mobile banking systems, OR Anti Forensics (OSX based attacks)''' - The Grugq, Independent Security Researcher<br>
'''Advanced Web Hacking''' - Saumil Udayan Shah, Net Square<br>
+
*'''Advanced Web Hacking''' - Saumil Udayan Shah, Net Square<br>
'''Data loss Protection''' - Enno Rey, Independent Security Researcher<br>
+
*'''Data loss Protection''' - Enno Rey, Independent Security Researcher<br>
'''Microsoft SDL''' - Adam Shawstack, Microsoft Corp.<br>
+
*'''Microsoft SDL''' - Adam Shawstack, Microsoft Corp.<br>
'''Reconsidering Network Defense''' - Cedric Blancher, EADS Innovation Works<br>
+
*'''Reconsidering Network Defense''' - Cedric Blancher, EADS Innovation Works<br>

Revision as of 06:33, 24 July 2009

  • Xprobe3 - what's new. Going application level - Fyodor Yarochkin , Guard-info
  • Client Side hacks - Dino Covotsos, Telspace Systems
  • Critical Infrastructure Security “Danger Without borders” - John Bumgarner, US Cyber Consequence Unit (USCCU)
  • Exploiting Firefox Extensions - Roberto Suggi Liverani, Security-Assessment.com
  • Cloud Hacking – Distributed Attack & Exploit Platform - Shreeraj Shah, Blueinfy Solutions
  • SQL Server Forensics 2.0 - Kevvie Fowler, TELUS & Ringzero
  • Vbootkit 2.0: Attacking Windows 7 via Boot Sectors - Nitin Kumar/Vipin Kumar, Independent Security Researchers, NVlabs
  • Testing JSON Applications for security holes - Aviram Jenik, Beyond Security
  • How to blackbox test almost anything - Aviram Jenik, Beyond Security
  • Topical issues affecting the threat landscape - prevalence of web threats - Joshua Talbot, Symantec Corp.
  • “Do You Want To Play A Game?”: Game Theory And Simulated Cyber War - Bryan K. Fite, Symantec Corp.
  • Hacking Oracle From Web - Sumit Siddharth (Sid), Independent Security Researcher
  • TBD - Mano Paul, Software Assurance Advisor (ISC)2
  • TBD - Howard A. Schmidt, Former Cyber Security Advisor to the White house; Former Strategic Advisor – President’s Critical Infrastructure Protection Program
  • Hacking mobile wallet / mobile banking systems, OR Anti Forensics (OSX based attacks) - The Grugq, Independent Security Researcher
  • Advanced Web Hacking - Saumil Udayan Shah, Net Square
  • Data loss Protection - Enno Rey, Independent Security Researcher
  • Microsoft SDL - Adam Shawstack, Microsoft Corp.
  • Reconsidering Network Defense - Cedric Blancher, EADS Innovation Works