This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "SecurityByte OWASP Conference Tracks"
From OWASP
Line 1: | Line 1: | ||
− | *'''Xprobe3 - | + | *'''[http://www.owasp.org/index.php/Xprobe3_What's_New_Going_Application_Level Xprobe3 - What's New? Going Application Level]''' - Fyodor Yarochkin, Guard-info<br> |
− | *'''Client Side | + | *'''[http://www.owasp.org/index.php/Client_Side_Hacks Client Side Hacks]''' - Dino Covotsos, Telspace Systems<br> |
− | *'''Critical Infrastructure Security “Danger Without | + | *'''[http://www.owasp.org/index.php/Critical_Infrastructure_Security Critical Infrastructure Security “Danger Without borders]”''' - John Bumgarner, US Cyber Consequence Unit (USCCU)<br> |
− | *'''Exploiting Firefox Extensions''' - Roberto Suggi Liverani, Security-Assessment.com<br> | + | *'''[http://www.owasp.org/index.php/Exploiting_Firefox_Extensions Exploiting Firefox Extensions]''' - Roberto Suggi Liverani, Security-Assessment.com<br> |
− | *'''Cloud Hacking – Distributed Attack & Exploit Platform''' - Shreeraj Shah, Blueinfy Solutions<br> | + | *'''[http://www.owasp.org/index.php/Cloud Hacking_–_Distributed_Attack_Exploit_Platform Cloud Hacking – Distributed Attack & Exploit Platform]''' - Shreeraj Shah, Blueinfy Solutions<br> |
− | *'''SQL Server Forensics 2.0''' - Kevvie Fowler, TELUS & Ringzero<br> | + | *'''[http://www.owasp.org/index.php/SQL_Server_Forensics_2.0 SQL Server Forensics 2.0]''' - Kevvie Fowler, TELUS & Ringzero<br> |
− | *'''Vbootkit 2.0: Attacking Windows 7 | + | *'''[http://www.owasp.org/index.php/Vbootkit_2.0:_Attacking_Windows_7_Via_Boot Sectors Vbootkit 2.0: Attacking Windows 7 Via Boot Sectors]''' - Nitin Kumar/Vipin Kumar, Independent Security Researchers, NVlabs<br> |
− | *'''Testing JSON Applications | + | *'''[http://www.owasp.org/index.php/Testing_JSON_Applications_For_Security_Holes Testing JSON Applications For Security Holes]''' - Aviram Jenik, Beyond Security<br> |
− | *'''How | + | *'''[http://www.owasp.org/index.php/How_To_Blackbox_Test_Almost_Anything How To Blackbox Test Almost Anything]''' - Aviram Jenik, Beyond Security<br> |
− | *'''Topical | + | *'''[http://www.owasp.org/index.php/Topical_Issues_Affecting_The_Threat_Landscape_-_Prevalence_Of_Web_Threats Topical Issues Affecting The Threat Landscape - Prevalence Of Web Threats]''' - Joshua Talbot, Symantec Corp.<br> |
− | *'''“Do You Want To Play A Game?”: Game Theory And Simulated Cyber War''' - Bryan K. Fite, Symantec Corp.<br> | + | *'''[http://www.owasp.org/index.php/Do_You_Want_To_Play_A_Game?:_Game_Theory_And_Simulated_Cyber_War “Do You Want To Play A Game?”: Game Theory And Simulated Cyber War]''' - Bryan K. Fite, Symantec Corp.<br> |
− | *'''Hacking Oracle From Web''' - Sumit Siddharth (Sid), Independent Security Researcher<br> | + | *'''[http://www.owasp.org/index.php/Hacking_Oracle_From_Web Hacking Oracle From Web]''' - Sumit Siddharth (Sid), Independent Security Researcher<br> |
*'''TBD''' - Mano Paul, Software Assurance Advisor (ISC)2<br> | *'''TBD''' - Mano Paul, Software Assurance Advisor (ISC)2<br> | ||
*'''TBD''' - Howard A. Schmidt, Former Cyber Security Advisor to the White house; Former Strategic Advisor – President’s Critical Infrastructure Protection Program<br> | *'''TBD''' - Howard A. Schmidt, Former Cyber Security Advisor to the White house; Former Strategic Advisor – President’s Critical Infrastructure Protection Program<br> | ||
− | *'''Hacking | + | *'''[http://www.owasp.org/index.php/Hacking_Mobile_Wallet/Mobile_Banking_Systems_OR_Anti_Forensics_(OSX Based Attacks) Hacking Mobile Wallet/Mobile Banking Systems, OR Anti Forensics (OSX Based Attacks)]''' - The Grugq, Independent Security Researcher<br> |
− | *''' | + | *'''[http://www.owasp.org/index.php/Advanced_Web_Hacking_Advanced_Web_Hacking]''' - Saumil Udayan Shah, Net Square<br> |
− | *''' | + | *'''[http://www.owasp.org/index.php/Data_Loss_Protection_Data_Loss_Protection]''' - Enno Rey, Independent Security Researcher<br> |
− | *'''Microsoft | + | *'''[http://www.owasp.org/index.php/Microsoft_SDLC Microsoft SDLC]''' - Adam Shawstack, Microsoft Corp.<br> |
− | *'''Reconsidering Network Defense''' - Cedric Blancher, EADS Innovation Works<br> | + | *'''[http://www.owasp.org/index.php/Reconsidering_Network_Defense Reconsidering Network Defense]''' - Cedric Blancher, EADS Innovation Works<br> |
Revision as of 06:45, 24 July 2009
- Xprobe3 - What's New? Going Application Level - Fyodor Yarochkin, Guard-info
- Client Side Hacks - Dino Covotsos, Telspace Systems
- Critical Infrastructure Security “Danger Without borders” - John Bumgarner, US Cyber Consequence Unit (USCCU)
- Exploiting Firefox Extensions - Roberto Suggi Liverani, Security-Assessment.com
- Hacking_–_Distributed_Attack_Exploit_Platform Cloud Hacking – Distributed Attack & Exploit Platform - Shreeraj Shah, Blueinfy Solutions
- SQL Server Forensics 2.0 - Kevvie Fowler, TELUS & Ringzero
- Sectors Vbootkit 2.0: Attacking Windows 7 Via Boot Sectors - Nitin Kumar/Vipin Kumar, Independent Security Researchers, NVlabs
- Testing JSON Applications For Security Holes - Aviram Jenik, Beyond Security
- How To Blackbox Test Almost Anything - Aviram Jenik, Beyond Security
- Topical Issues Affecting The Threat Landscape - Prevalence Of Web Threats - Joshua Talbot, Symantec Corp.
- “Do You Want To Play A Game?”: Game Theory And Simulated Cyber War - Bryan K. Fite, Symantec Corp.
- Hacking Oracle From Web - Sumit Siddharth (Sid), Independent Security Researcher
- TBD - Mano Paul, Software Assurance Advisor (ISC)2
- TBD - Howard A. Schmidt, Former Cyber Security Advisor to the White house; Former Strategic Advisor – President’s Critical Infrastructure Protection Program
- Based Attacks) Hacking Mobile Wallet/Mobile Banking Systems, OR Anti Forensics (OSX Based Attacks) - The Grugq, Independent Security Researcher
- [1] - Saumil Udayan Shah, Net Square
- [2] - Enno Rey, Independent Security Researcher
- Microsoft SDLC - Adam Shawstack, Microsoft Corp.
- Reconsidering Network Defense - Cedric Blancher, EADS Innovation Works