This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "OWASP AppSec DC 2009 Schedule"
From OWASP
Line 16: | Line 16: | ||
|- valign="bottom" | |- valign="bottom" | ||
| width="67" valign="middle" bgcolor="#7b8abd" | 09:00-12:00 | | width="67" valign="middle" bgcolor="#7b8abd" | 09:00-12:00 | ||
− | | width="150" valign="middle" height="120" bgcolor="#c0a0a0" align="center" | Assessing and Exploiting Web Applications with the open source Samurai Web Testing Framework<br> Justin Searle | + | | width="150" valign="middle" height="120" bgcolor="#c0a0a0" align="center" | Day 1:<br>Assessing and Exploiting Web Applications with the open source Samurai Web Testing Framework<br> Justin Searle |
− | | width="150" valign="middle" height="120" bgcolor="#ffdf80" align="center" | Java EE Secure Code Review<br>Sahba Kazerooni | + | | width="150" valign="middle" height="120" bgcolor="#ffdf80" align="center" | Day 1:<br>Java EE Secure Code Review<br>Sahba Kazerooni |
| width="150" valign="middle" height="120" bgcolor="#a0c0e0" align="center" | Threat Modeling Express<br>Krishna Raja | | width="150" valign="middle" height="120" bgcolor="#a0c0e0" align="center" | Threat Modeling Express<br>Krishna Raja | ||
| width="150" valign="middle" height="120" bgcolor="#b3ff99" align="center" | Web 2.0 Security - SOA, Web Services, and XML | | width="150" valign="middle" height="120" bgcolor="#b3ff99" align="center" | Web 2.0 Security - SOA, Web Services, and XML | ||
| width="150" valign="middle" height="120" bgcolor="#BCA57A" align="center" | Secure Coding for .Net<br>Whitehat | | width="150" valign="middle" height="120" bgcolor="#BCA57A" align="center" | Secure Coding for .Net<br>Whitehat | ||
|- valign="bottom" | |- valign="bottom" | ||
− | | width="67" valign="middle" height=" | + | | width="67" valign="middle" height="40" bgcolor="#7b8abd" | 12:00-13:00 |
− | | valign="middle" height=" | + | | valign="middle" height="40" bgcolor="#909090" align="center" colspan="5" | Lunch |
|- valign="bottom" | |- valign="bottom" | ||
| width="67" valign="middle" bgcolor="#7b8abd" | 13:00-17:00 | | width="67" valign="middle" bgcolor="#7b8abd" | 13:00-17:00 | ||
Line 45: | Line 45: | ||
|- valign="bottom" | |- valign="bottom" | ||
| width="67" valign="middle" bgcolor="#7b8abd" | 09:00-12:00 | | width="67" valign="middle" bgcolor="#7b8abd" | 09:00-12:00 | ||
− | | width="150" valign="middle" height="120" bgcolor="#c0a0a0" align="center" | Assessing and Exploiting Web Applications with the open source Samurai Web Testing Framework<br> Justin Searle | + | | width="150" valign="middle" height="120" bgcolor="#c0a0a0" align="center" | Day 2:<br>Assessing and Exploiting Web Applications with the open source Samurai Web Testing Framework<br> Justin Searle |
− | | width="150" valign="middle" height="120" bgcolor="#ffdf80" align="center" | Java EE Secure Code Review<br>Sahba Kazerooni | + | | width="150" valign="middle" height="120" bgcolor="#ffdf80" align="center" | Day 2:<br>Java EE Secure Code Review<br>Sahba Kazerooni |
| width="150" valign="middle" height="120" bgcolor="#a0c0e0" align="center" | WebAppSec.php: Developing Secure Web Applications<br>Robert Zakon | | width="150" valign="middle" height="120" bgcolor="#a0c0e0" align="center" | WebAppSec.php: Developing Secure Web Applications<br>Robert Zakon | ||
| width="150" valign="middle" height="120" bgcolor="#b3ff99" align="center" | Applying the OWASP Testing Guide with the OWASP Live CD<br>Matt Tesauro | | width="150" valign="middle" height="120" bgcolor="#b3ff99" align="center" | Applying the OWASP Testing Guide with the OWASP Live CD<br>Matt Tesauro | ||
| width="150" valign="middle" height="120" bgcolor="#BCA57A" align="center" | Leader and Manager Training - Leading the Development of Secure Applications<br>John Pavone<br>[http://www.aspectsecurity.com Aspect Security] | | width="150" valign="middle" height="120" bgcolor="#BCA57A" align="center" | Leader and Manager Training - Leading the Development of Secure Applications<br>John Pavone<br>[http://www.aspectsecurity.com Aspect Security] | ||
|- valign="bottom" | |- valign="bottom" | ||
− | | width="67" valign="middle" height=" | + | | width="67" valign="middle" height="40" bgcolor="#7b8abd" | 12:00-13:00 |
− | | valign="middle" height=" | + | | valign="middle" height="40" bgcolor="#909090" align="center" colspan="5" | Lunch |
|- valign="bottom" | |- valign="bottom" | ||
| width="67" valign="middle" bgcolor="#7b8abd" | 13:00-17:00 | | width="67" valign="middle" bgcolor="#7b8abd" | 13:00-17:00 | ||
Line 81: | Line 81: | ||
| valign="middle" height="60" bgcolor="#e0e0e0" align="center" colspan="4" | Keynote: [[AppSecDC Keynote Jarzomnek|Joe Jarzombek]] | | valign="middle" height="60" bgcolor="#e0e0e0" align="center" colspan="4" | Keynote: [[AppSecDC Keynote Jarzomnek|Joe Jarzombek]] | ||
|- valign="bottom" | |- valign="bottom" | ||
− | | width="67" valign="middle" bgcolor="#7b8abd" | 10: | + | | width="67" valign="middle" bgcolor="#7b8abd" | 10:00-10:30 |
| valign="middle" height="30" bgcolor="#909090" align="center" colspan="4" | Coffee Break & Room Change | | valign="middle" height="30" bgcolor="#909090" align="center" colspan="4" | Coffee Break & Room Change | ||
|- valign="bottom" | |- valign="bottom" | ||
Line 102: | Line 102: | ||
| width="200" valign="middle" height="120" bgcolor="#b3ff99" align="center" | [[Development Issues Within AJAX Applications: How to Divert Threats]]<br>Lars Ewe | | width="200" valign="middle" height="120" bgcolor="#b3ff99" align="center" | [[Development Issues Within AJAX Applications: How to Divert Threats]]<br>Lars Ewe | ||
|- valign="bottom" | |- valign="bottom" | ||
− | | width="67" valign="middle" height=" | + | | width="67" valign="middle" height="40" bgcolor="#7b8abd" | 13:30-14:30 |
− | | valign="middle" height=" | + | | valign="middle" height="40" bgcolor="#909090" align="center" colspan="4" | Lunch |
|- valign="bottom" | |- valign="bottom" | ||
| width="67" valign="middle" height="120" bgcolor="#7b8abd" | 14:30-15:30 | | width="67" valign="middle" height="120" bgcolor="#7b8abd" | 14:30-15:30 | ||
Line 156: | Line 156: | ||
| valign="middle" height="60" bgcolor="#e0e0e0" align="center" colspan="4" | Keynote: TBA | | valign="middle" height="60" bgcolor="#e0e0e0" align="center" colspan="4" | Keynote: TBA | ||
|- valign="bottom" | |- valign="bottom" | ||
− | | width="67" valign="middle" bgcolor="#7b8abd" | 10: | + | | width="67" valign="middle" bgcolor="#7b8abd" | 10:00-10:30 |
| valign="middle" height="30" bgcolor="#909090" align="center" colspan="4" | Coffee Break & Room Change | | valign="middle" height="30" bgcolor="#909090" align="center" colspan="4" | Coffee Break & Room Change | ||
|- valign="bottom" | |- valign="bottom" | ||
Line 177: | Line 177: | ||
| width="200" valign="middle" height="120" bgcolor="#b3ff99" align="center" | [[Secure SDLC: The Good, The Bad, and The Ugly]]<br>Joey Peloquin | | width="200" valign="middle" height="120" bgcolor="#b3ff99" align="center" | [[Secure SDLC: The Good, The Bad, and The Ugly]]<br>Joey Peloquin | ||
|- valign="bottom" | |- valign="bottom" | ||
− | | width="67" valign="middle" height=" | + | | width="67" valign="middle" height="40" bgcolor="#7b8abd" | 13:30-14:30 |
− | | valign="middle" height=" | + | | valign="middle" height="40" bgcolor="#909090" align="center" colspan="4" | Lunch |
|- valign="bottom" | |- valign="bottom" | ||
| width="67" valign="middle" height="120" bgcolor="#7b8abd" | 14:30-15:30 | | width="67" valign="middle" height="120" bgcolor="#7b8abd" | 14:30-15:30 |
Revision as of 18:23, 2 October 2009
Back to Conference Page
Please note, speaking times are not final, check back regularly for updates.
Training 11/10
Day 1 - Nov 10th 2009 | |||||
Room 1 | Room 2 | Room 3 | Room 4 | Room 5 | |
09:00-12:00 | Day 1: Assessing and Exploiting Web Applications with the open source Samurai Web Testing Framework Justin Searle |
Day 1: Java EE Secure Code Review Sahba Kazerooni |
Threat Modeling Express Krishna Raja |
Web 2.0 Security - SOA, Web Services, and XML | Secure Coding for .Net Whitehat |
12:00-13:00 | Lunch | ||||
13:00-17:00 | Assessing and Exploiting Web Applications with the open source Samurai Web Testing Framework Justin Searle |
Java EE Secure Code Review Sahba Kazerooni |
Threat Modeling Express Krishna Raja |
Web 2.0 Security - SOA, Web Services, and XML | Secure Coding for .Net Whitehat |
Training 11/11
Day 2 - Nov 11th 2009 | |||||
Room 1 | Room 2 | Room 3 | Room 4 | Room 5 | |
09:00-12:00 | Day 2: Assessing and Exploiting Web Applications with the open source Samurai Web Testing Framework Justin Searle |
Day 2: Java EE Secure Code Review Sahba Kazerooni |
WebAppSec.php: Developing Secure Web Applications Robert Zakon |
Applying the OWASP Testing Guide with the OWASP Live CD Matt Tesauro |
Leader and Manager Training - Leading the Development of Secure Applications John Pavone Aspect Security |
12:00-13:00 | Lunch | ||||
13:00-17:00 | Assessing and Exploiting Web Applications with the open source Samurai Web Testing Framework Justin Searle |
Java EE Secure Code Review Sahba Kazerooni |
WebAppSec.php: Developing Secure Web Applications Robert Zakon |
Applying the OWASP Testing Guide with the OWASP Live CD Matt Tesauro |
Leader and Manager Training - Leading the Development of Secure Applications John Pavone Aspect Security |