This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Mrb Scratchpad"
From OWASP
Mark.bristow (talk | contribs) (→Back to Conference Page) |
Dallendoug (talk | contribs) (Take One -- rearranging talks schedule Day One) |
||
| Line 1: | Line 1: | ||
| + | __NOTOC__ | ||
| + | |||
__NOTOC__ | __NOTOC__ | ||
| Line 64: | Line 66: | ||
|- valign="bottom" | |- valign="bottom" | ||
| width="67" valign="middle" height="40" bgcolor="#7b8abd" | | | width="67" valign="middle" height="40" bgcolor="#7b8abd" | | ||
| − | | width="200" valign="middle" height="40" bgcolor="#c0a0a0" align="center" | '''OWASP ( | + | | width="200" valign="middle" height="40" bgcolor="#c0a0a0" align="center" | '''OWASP (146A)''' |
| width="200" valign="middle" height="40" bgcolor="#ffdf80" align="center" | '''Tools (146B)''' | | width="200" valign="middle" height="40" bgcolor="#ffdf80" align="center" | '''Tools (146B)''' | ||
| − | | width="200" valign="middle" height="40" bgcolor="#a0c0e0" align="center" | ''' | + | | width="200" valign="middle" height="40" bgcolor="#a0c0e0" align="center" | '''Web 2.0 (146C)''' |
| − | | width="200" valign="middle" height="40" bgcolor="#b3ff99" align="center" | ''' | + | | width="200" valign="middle" height="40" bgcolor="#b3ff99" align="center" | '''SDLC (152A)''' |
|- valign="bottom" | |- valign="bottom" | ||
| width="67" valign="middle" bgcolor="#7b8abd" | 07:30-08:50 | | width="67" valign="middle" bgcolor="#7b8abd" | 07:30-08:50 | ||
| Line 87: | Line 89: | ||
| width="200" valign="middle" height="120" bgcolor="#c0a0a0" align="center" | [[OWASP ESAPI AppSecDC|OWASP ESAPI]]<br>Jeff Williams | | width="200" valign="middle" height="120" bgcolor="#c0a0a0" align="center" | [[OWASP ESAPI AppSecDC|OWASP ESAPI]]<br>Jeff Williams | ||
| width="200" valign="middle" height="120" bgcolor="#ffdf80" align="center" | [[Clubbing WebApps with a Botnet]]<br>Gunter Ollmann | | width="200" valign="middle" height="120" bgcolor="#ffdf80" align="center" | [[Clubbing WebApps with a Botnet]]<br>Gunter Ollmann | ||
| − | | width="200" valign="middle" height="120" bgcolor="#a0c0e0" align="center" | [[ | + | | width="200" valign="middle" height="120" bgcolor="#a0c0e0" align="center" | [[Understanding the Implications of Cloud Computing on Application Security]]<br>Dennis Hurst |
| − | | width="200" valign="middle" height="120" bgcolor="#b3ff99" align="center" | [[ | + | | width="200" valign="middle" height="120" bgcolor="#b3ff99" align="center" | [[Enterprise Application Security - GE's approach to solving root cause and establishing a Center of Excellence|Enterprise Application Security - GE's approach to solving root cause]]<br>Darren Challey |
|- valign="bottom" | |- valign="bottom" | ||
| width="67" valign="middle" height="40" bgcolor="#7b8abd" | 11:30-12:30 | | width="67" valign="middle" height="40" bgcolor="#7b8abd" | 11:30-12:30 | ||
| Line 96: | Line 98: | ||
| width="200" valign="middle" height="120" bgcolor="#c0a0a0" align="center" | [[Software Assurance Maturity Model (SAMM)]]<br>Pravir Chandra | | width="200" valign="middle" height="120" bgcolor="#c0a0a0" align="center" | [[Software Assurance Maturity Model (SAMM)]]<br>Pravir Chandra | ||
| width="200" valign="middle" height="120" bgcolor="#ffdf80" align="center" | [[The Case of Promiscuous Parameters and Other Ongoing Capers in Web Security]]<br>Jacob West | | width="200" valign="middle" height="120" bgcolor="#ffdf80" align="center" | [[The Case of Promiscuous Parameters and Other Ongoing Capers in Web Security]]<br>Jacob West | ||
| − | | width="200" valign="middle" height="120" bgcolor="#a0c0e0" align="center" | [[ | + | | width="200" valign="middle" height="120" bgcolor="#a0c0e0" align="center" | [[Transparent Proxy Abuse]]<br>Robert Auger |
| − | | width="200" valign="middle" height="120" bgcolor="#b3ff99" align="center" | [[ | + | | width="200" valign="middle" height="120" bgcolor="#b3ff99" align="center" | [[Software Development The Next Security Frontier]]<br>Jim Molini |
|- valign="bottom" | |- valign="bottom" | ||
| width="67" valign="middle" height="5" bgcolor="#7b8abd" rowspan="1"| 1:15-1:20 | | width="67" valign="middle" height="5" bgcolor="#7b8abd" rowspan="1"| 1:15-1:20 | ||
| Line 105: | Line 107: | ||
| width="200" valign="middle" height="120" bgcolor="#c0a0a0" align="center" | [[DISA's Application Security and Development STIG: How OWASP Can Help You]]<br>Jason Li | | width="200" valign="middle" height="120" bgcolor="#c0a0a0" align="center" | [[DISA's Application Security and Development STIG: How OWASP Can Help You]]<br>Jason Li | ||
| width="200" valign="middle" height="120" bgcolor="#ffdf80" align="center" | [[OWASP ModSecurity Core Rule Set Project]]<br>Ryan C. Barnett | | width="200" valign="middle" height="120" bgcolor="#ffdf80" align="center" | [[OWASP ModSecurity Core Rule Set Project]]<br>Ryan C. Barnett | ||
| − | | width="200" valign="middle" height="120" bgcolor="#a0c0e0" align="center" | [[ | + | | width="200" valign="middle" height="120" bgcolor="#a0c0e0" align="center" | [[Development Issues Within AJAX Applications: How to Divert Threats]]<br>Lars Ewe |
| − | | width="200" valign="middle" height="120" bgcolor="#b3ff99" align="center" | [[ | + | | width="200" valign="middle" height="120" bgcolor="#b3ff99" align="center" | [[The essential role of infosec in secure software development]]<br>Kenneth R. van Wyk |
|- valign="bottom" | |- valign="bottom" | ||
| width="67" valign="middle" height="5" bgcolor="#7b8abd" rowspan="1"| 2:05-2:10 | | width="67" valign="middle" height="5" bgcolor="#7b8abd" rowspan="1"| 2:05-2:10 | ||
| Line 114: | Line 116: | ||
| width="200" valign="middle" height="60" bgcolor="#c0a0a0" align="center" | [[Defend Yourself: Integrating Real Time Defenses into Online Applications]]<br>Michael Coates | | width="200" valign="middle" height="60" bgcolor="#c0a0a0" align="center" | [[Defend Yourself: Integrating Real Time Defenses into Online Applications]]<br>Michael Coates | ||
| width="200" valign="middle" height="60" bgcolor="#ffdf80" align="center" | [[Finding the Hotspots: Web-security testing with the Watcher tool]]<br>Chris Weber | | width="200" valign="middle" height="60" bgcolor="#ffdf80" align="center" | [[Finding the Hotspots: Web-security testing with the Watcher tool]]<br>Chris Weber | ||
| − | | width="200" valign="middle" height="120" bgcolor="#a0c0e0" align="center" rowspan="4" | [[SDLC Panel AppSecDC|SDLC Panel]]<br> <br>Pravir Chandra<br>Dan Cornell<br>Michael Craigue<br>Dennis Hurst<br>Joey Peloquin<br>David Rook<br>Keith Turpin | + | | width="200" valign="middle" height="120" bgcolor="#a0c0e0" align="center" | [[Social Zombies: Your Friends Want to Eat Your Brains]]<br>Tom Eston/Kevin Johnson |
| − | + | | width="200" valign="middle" height="120" bgcolor="#b3ff99" align="center" rowspan="4" | [[SDLC Panel AppSecDC|SDLC Panel]]<br> <br>Pravir Chandra<br>Dan Cornell<br>Michael Craigue<br>Dennis Hurst<br>Joey Peloquin<br>David Rook<br>Keith Turpin | |
|- valign="bottom" | |- valign="bottom" | ||
| width="67" valign="middle" height="5" bgcolor="#7b8abd" rowspan="1"| 2:55-3:00 | | width="67" valign="middle" height="5" bgcolor="#7b8abd" rowspan="1"| 2:55-3:00 | ||
| Line 134: | Line 136: | ||
| width="200" valign="middle" height="120" bgcolor="#c0a0a0" align="center" rowspan="2" | [[OWASP Live CD: An open environment for Web Application Security]]<br>Matt Tesauro / Brad Causey | | width="200" valign="middle" height="120" bgcolor="#c0a0a0" align="center" rowspan="2" | [[OWASP Live CD: An open environment for Web Application Security]]<br>Matt Tesauro / Brad Causey | ||
| width="200" valign="middle" height="60" bgcolor="#ffdf80" align="center" | [[Learning by Breaking: A New Project Insecure Web Apps]]<br>Chuck Willis | | width="200" valign="middle" height="60" bgcolor="#ffdf80" align="center" | [[Learning by Breaking: A New Project Insecure Web Apps]]<br>Chuck Willis | ||
| − | | width="200" valign="middle" height="120" bgcolor="#a0c0e0" align="center" rowspan="2" | [[ | + | | width="200" valign="middle" height="120" bgcolor="#a0c0e0" align="center" rowspan="2" | [[Attacking WCF Web Services]]<br>Brian Holyfield |
| − | | width="200" valign="middle" height="120" bgcolor="#b3ff99" align="center" rowspan="2" | [[ | + | | width="200" valign="middle" height="120" bgcolor="#b3ff99" align="center" rowspan="2" | [[Vulnerability Management in an Application Security World]]<br>Dan Cornell |
|- valign="bottom" | |- valign="bottom" | ||
| width="200" valign="middle" height="60" bgcolor="#ffdf80" align="center" | [[Synergy! A world where the tools communicate]]<br> | | width="200" valign="middle" height="60" bgcolor="#ffdf80" align="center" | [[Synergy! A world where the tools communicate]]<br> | ||
| Line 146: | Line 148: | ||
| width="200" valign="middle" height="120" bgcolor="#c0a0a0" align="center" rowspan="2" | [[The Entrepreneur's Guide to Career Management]]<br>Lee Kushner | | width="200" valign="middle" height="120" bgcolor="#c0a0a0" align="center" rowspan="2" | [[The Entrepreneur's Guide to Career Management]]<br>Lee Kushner | ||
| width="200" valign="middle" height="60" bgcolor="#ffdf80" align="center" | [[Advanced SSL: The good, the bad, and the ugly]]<br>Michael Coates | | width="200" valign="middle" height="60" bgcolor="#ffdf80" align="center" | [[Advanced SSL: The good, the bad, and the ugly]]<br>Michael Coates | ||
| − | | width="200" valign="middle" height="120" bgcolor="#a0c0e0" align="center" rowspan="2" | [[ | + | | width="200" valign="middle" height="120" bgcolor="#a0c0e0" align="center" rowspan="2" | [[When Web 2.0 Attacks - Understanding Security Implications of AJAX, Flash and |When Web 2.0 Attacks - Understanding Security Implications of AJAX, Flash and "Highly Interactive" Technologies]]<br>Rafal Los |
| − | | width="200" valign="middle" height="120" bgcolor="#b3ff99" align="center" rowspan="2" | [[ | + | | width="200" valign="middle" height="120" bgcolor="#b3ff99" align="center" rowspan="2" | [[Threat Modeling by John Steven|Threat Modeling]]<br>John Steven |
|- valign="bottom" | |- valign="bottom" | ||
| width="200" valign="middle" height="60" bgcolor="#ffdf80" align="center" | [[User input piercing for Cross Site Scripting Attacks]]<br>Matias Blanco | | width="200" valign="middle" height="60" bgcolor="#ffdf80" align="center" | [[User input piercing for Cross Site Scripting Attacks]]<br>Matias Blanco | ||
| Line 236: | Line 238: | ||
|} | |} | ||
<headertabs /> | <headertabs /> | ||
| + | |||
| + | ===[[OWASP AppSec DC 2009|Back to Conference Page]]=== | ||
| + | |||
| + | [[Category:OWASP_AppSec_Conference]] [[Category:OWASP_AppSec_DC_09]] | ||
===[[OWASP AppSec DC 2009|Back to Conference Page]]=== | ===[[OWASP AppSec DC 2009|Back to Conference Page]]=== | ||
[[Category:OWASP_AppSec_Conference]] [[Category:OWASP_AppSec_DC_09]] | [[Category:OWASP_AppSec_Conference]] [[Category:OWASP_AppSec_DC_09]] | ||
Revision as of 05:27, 3 November 2009
Back to Conference Page
Please note, speaking times are not final, check back regularly for updates.
Training 11/10
| Day 1 - Nov 10th 2009 | |||||
| Room 154A | Room 149B | Room 149A | Room 154B | Room 155 | |
| 09:00-12:00 | Day 1: Assessing and Exploiting Web Applications with the open source Samurai Web Testing Framework Justin Searle |
Day 1: Java EE Secure Code Review Sahba Kazerooni Security Compass |
Threat Modeling Express Krishna Raja Security Compass |
Foundations of Web Services and XML Security Dave Wichers Aspect Security |
Live CD Matt Tesauro |
| 12:00-13:00 | Lunch | ||||
| 13:00-17:00 | Assessing and Exploiting Web Applications with the open source Samurai Web Testing Framework Justin Searle |
Java EE Secure Code Review Sahba Kazerooni Security Compass |
Threat Modeling Express Krishna Raja Security Compass |
Foundations of Web Services and XML Security Dave Wichers Aspect Security |
Live CD Matt Tesauro |
Training 11/11
| Day 2 - Nov 11th 2009 | |||||
| Room 154A | Room 149B | Room 149A | Room 154B | ||
| 09:00-12:00 | Day 2: Assessing and Exploiting Web Applications with the open source Samurai Web Testing Framework Justin Searle |
Day 2: Java EE Secure Code Review Sahba Kazerooni Security Compass |
WebAppSec.php: Developing Secure Web Applications Robert Zakon |
Leader and Manager Training - Leading the Development of Secure Applications John Pavone Aspect Security | |
| 12:00-13:00 | Lunch | ||||
| 13:00-17:00 | Assessing and Exploiting Web Applications with the open source Samurai Web Testing Framework Justin Searle |
Java EE Secure Code Review Sahba Kazerooni Security Compass |
WebAppSec.php: Developing Secure Web Applications Robert Zakon |
Leader and Manager Training - Leading the Development of Secure Applications John Pavone Aspect Security | |

