This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Mrb Scratchpad"
From OWASP
Dallendoug (talk | contribs) (Take One -- rearranging talks schedule Day One) |
Dallendoug (talk | contribs) (Take Two -- rearranging talks for Day Two) |
||
| Line 1: | Line 1: | ||
| + | __NOTOC__ | ||
| + | |||
__NOTOC__ | __NOTOC__ | ||
| Line 162: | Line 164: | ||
|- valign="bottom" | |- valign="bottom" | ||
| width="67" valign="middle" height="40" bgcolor="#7b8abd" | | | width="67" valign="middle" height="40" bgcolor="#7b8abd" | | ||
| − | | width="200" valign="middle" height="40" bgcolor="#c0a0a0" align="center" | ''' | + | | width="200" valign="middle" height="40" bgcolor="#c0a0a0" align="center" | '''Process (146A)''' |
| − | | width="200" valign="middle" height="40" bgcolor="#ffdf80" align="center" | ''' | + | | width="200" valign="middle" height="40" bgcolor="#ffdf80" align="center" | '''Attack & Defend (146B)''' |
| − | | width="200" valign="middle" height="40" bgcolor="#a0c0e0" align="center" | '''Metrics ( | + | | width="200" valign="middle" height="40" bgcolor="#a0c0e0" align="center" | '''Metrics (146C)''' |
| − | | width="200" valign="middle" height="40" bgcolor="#b3ff99" align="center" | '''Compliance ( | + | | width="200" valign="middle" height="40" bgcolor="#b3ff99" align="center" | '''Compliance (152A)''' |
|- valign="bottom" | |- valign="bottom" | ||
| width="67" valign="middle" bgcolor="#7b8abd" | 8:00-9:00 | | width="67" valign="middle" bgcolor="#7b8abd" | 8:00-9:00 | ||
| Line 171: | Line 173: | ||
|- valign="bottom" | |- valign="bottom" | ||
| width="67" valign="middle" bgcolor="#7b8abd" rowspan="1"| 9:00-9:45 | | width="67" valign="middle" bgcolor="#7b8abd" rowspan="1"| 9:00-9:45 | ||
| − | | width="200" valign="middle" height="120" bgcolor="#c0a0a0" align="center" | [[ | + | | width="200" valign="middle" height="120" bgcolor="#c0a0a0" align="center" | [[The Big Picture: Web Risks and Assessments Beyond Scanning]]<br>Matt Fisher |
| − | | width="200" valign="middle" height="120" bgcolor="#ffdf80" align="center" | [[ | + | | width="200" valign="middle" height="120" bgcolor="#ffdf80" align="center" | [[Securing the Core JEE Patterns]]<br>Rohit Sethi/Krishna Raja |
| width="200" valign="middle" height="120" bgcolor="#a0c0e0" align="center" | [[The Web Hacking Incidents Database]]<br>Ryan C. Barnett | | width="200" valign="middle" height="120" bgcolor="#a0c0e0" align="center" | [[The Web Hacking Incidents Database]]<br>Ryan C. Barnett | ||
| width="200" valign="middle" height="120" bgcolor="#b3ff99" align="center" | [[Business Logic Automatons: Friend or Foe?]]<br>Ofer Shezaf | | width="200" valign="middle" height="120" bgcolor="#b3ff99" align="center" | [[Business Logic Automatons: Friend or Foe?]]<br>Ofer Shezaf | ||
| Line 180: | Line 182: | ||
|- valign="bottom" | |- valign="bottom" | ||
| width="67" valign="middle" height="120" bgcolor="#7b8abd" rowspan="1"| 9:50-10:35 | | width="67" valign="middle" height="120" bgcolor="#7b8abd" rowspan="1"| 9:50-10:35 | ||
| − | | width="200" valign="middle" height="120" bgcolor="#c0a0a0" align="center" | [[ | + | | width="200" valign="middle" height="120" bgcolor="#c0a0a0" align="center" | [[Scalable Application Assessments in the Enterprise]]<br>Tom Parker/Lars Ewe |
| − | | width="200" valign="middle" height="120" bgcolor="#ffdf80" align="center" | [[ | + | | width="200" valign="middle" height="120" bgcolor="#ffdf80" align="center" | [[Unicode Transformations: Finding Elusive Vulnerabilities]]<br>Chris Weber |
| width="200" valign="middle" height="120" bgcolor="#a0c0e0" align="center" | [[Application security metrics from the organization on down to the vulnerabilities]]<br>Chris Wysopal | | width="200" valign="middle" height="120" bgcolor="#a0c0e0" align="center" | [[Application security metrics from the organization on down to the vulnerabilities]]<br>Chris Wysopal | ||
| width="200" valign="middle" height="120" bgcolor="#b3ff99" align="center" | [[SCAP: Automating our way out of the Vulnerability Wheel of Pain]]<br>Ed Bellis | | width="200" valign="middle" height="120" bgcolor="#b3ff99" align="center" | [[SCAP: Automating our way out of the Vulnerability Wheel of Pain]]<br>Ed Bellis | ||
| Line 189: | Line 191: | ||
|- valign="bottom" | |- valign="bottom" | ||
| width="67" valign="middle" height="120" bgcolor="#7b8abd" | 10:40-11:25 | | width="67" valign="middle" height="120" bgcolor="#7b8abd" | 10:40-11:25 | ||
| − | | width="200" valign="middle" height="120" bgcolor="#c0a0a0" align="center" | [[ | + | | width="200" valign="middle" height="120" bgcolor="#c0a0a0" align="center" | [[Secure Software Updates: Update Like Conficker]]<br>Jeremy Allen |
| − | | width="200" valign="middle" height="120" bgcolor="#ffdf80" align="center" | [[ | + | | width="200" valign="middle" height="120" bgcolor="#ffdf80" align="center" | [[Malicious Developers and Enterprise Java Rootkits]]<br>Jeff Williams |
| width="200" valign="middle" height="120" bgcolor="#a0c0e0" align="center" | [[OWASP Top 10 2010 AppSecDC|OWASP Top 10 - 2010]]<br>Dave Wichers | | width="200" valign="middle" height="120" bgcolor="#a0c0e0" align="center" | [[OWASP Top 10 2010 AppSecDC|OWASP Top 10 - 2010]]<br>Dave Wichers | ||
| width="200" valign="middle" height="120" bgcolor="#b3ff99" align="center" | [[Secure SDLC: The Good, The Bad, and The Ugly]]<br>Joey Peloquin | | width="200" valign="middle" height="120" bgcolor="#b3ff99" align="center" | [[Secure SDLC: The Good, The Bad, and The Ugly]]<br>Joey Peloquin | ||
| Line 198: | Line 200: | ||
|- valign="bottom" | |- valign="bottom" | ||
| width="67" valign="middle" height="120" bgcolor="#7b8abd" rowspan="1"| 12:30-1:15 | | width="67" valign="middle" height="120" bgcolor="#7b8abd" rowspan="1"| 12:30-1:15 | ||
| − | | width="200" valign="middle" height="120" bgcolor="#c0a0a0" align="center" | [[ | + | | width="200" valign="middle" height="120" bgcolor="#c0a0a0" align="center" | [[Improving application security after an incident]]<br>Cory Scott |
| − | | width="200" valign="middle" height="120" bgcolor="#ffdf80" align="center" | [[ | + | | width="200" valign="middle" height="120" bgcolor="#ffdf80" align="center" | [[The 10 least-likely and most dangerous people on the Internet]]<br>Robert Hansen |
| width="200" valign="middle" height="120" bgcolor="#a0c0e0" align="center" | [[Hacking by Numbers]]<br>Tom Brennan | | width="200" valign="middle" height="120" bgcolor="#a0c0e0" align="center" | [[Hacking by Numbers]]<br>Tom Brennan | ||
| width="200" valign="middle" height="120" bgcolor="#b3ff99" align="center" rowspan="3" | [[AppSecDC09 Federal CISO Panel|Federal CISO Panel]] | | width="200" valign="middle" height="120" bgcolor="#b3ff99" align="center" rowspan="3" | [[AppSecDC09 Federal CISO Panel|Federal CISO Panel]] | ||
| Line 207: | Line 209: | ||
|- valign="bottom" | |- valign="bottom" | ||
| width="67" valign="middle" height="120" bgcolor="#7b8abd" rowspan="1"| 1:20-2:05 | | width="67" valign="middle" height="120" bgcolor="#7b8abd" rowspan="1"| 1:20-2:05 | ||
| − | | width="200" valign="middle" height="120" bgcolor="#c0a0a0" align="center" | [[ | + | | width="200" valign="middle" height="120" bgcolor="#c0a0a0" align="center" | [[Custom Intrusion Detection Techniques for Monitoring Web Applications]]<br>Matthew Olney |
| − | | width="200" valign="middle" height="120" bgcolor="#ffdf80" align="center" | [[ | + | | width="200" valign="middle" height="120" bgcolor="#ffdf80" align="center" | [[Automated vs. Manual Security: You can't filter The Stupid]]<br>David Byrne/Charles Henderson |
| width="200" valign="middle" height="120" bgcolor="#a0c0e0" align="center" | [[Building an in-house application security assessment team]]<br>Keith Turpin | | width="200" valign="middle" height="120" bgcolor="#a0c0e0" align="center" | [[Building an in-house application security assessment team]]<br>Keith Turpin | ||
|- valign="bottom" | |- valign="bottom" | ||
| Line 224: | Line 226: | ||
|- valign="bottom" | |- valign="bottom" | ||
| width="67" valign="middle" height="120" bgcolor="#7b8abd" rowspan="2" | 3:00-3:45 | | width="67" valign="middle" height="120" bgcolor="#7b8abd" rowspan="2" | 3:00-3:45 | ||
| − | | width="200" valign="middle" height=" | + | | width="200" valign="middle" height="120" bgcolor="#c0a0a0" align="center" rowspan="2" | [[Deploying Secure Web Applications with OWASP Resources]]<br>Kuai Hinojosa |
| − | | width="200" valign="middle" height=" | + | | width="200" valign="middle" height="60" bgcolor="#ffdf80" align="center" | [[Manipulating Web Application Interfaces, a new approach to input validation]]<br>Felipe Moreno-Strauch |
| width="200" valign="middle" height="120" bgcolor="#a0c0e0" align="center" rowspan="2" | [[SANS Dshield Webhoneypot Project]]<br>Jason Lam | | width="200" valign="middle" height="120" bgcolor="#a0c0e0" align="center" rowspan="2" | [[SANS Dshield Webhoneypot Project]]<br>Jason Lam | ||
| width="200" valign="middle" height="120" bgcolor="#b3ff99" align="center" rowspan="2" | [[Techniques in Attacking and Defending XML/Web Services]]<br>Mamoon Yunus/Jason Macy | | width="200" valign="middle" height="120" bgcolor="#b3ff99" align="center" rowspan="2" | [[Techniques in Attacking and Defending XML/Web Services]]<br>Mamoon Yunus/Jason Macy | ||
| Line 238: | Line 240: | ||
|} | |} | ||
<headertabs /> | <headertabs /> | ||
| + | |||
| + | ===[[OWASP AppSec DC 2009|Back to Conference Page]]=== | ||
| + | |||
| + | [[Category:OWASP_AppSec_Conference]] [[Category:OWASP_AppSec_DC_09]] | ||
===[[OWASP AppSec DC 2009|Back to Conference Page]]=== | ===[[OWASP AppSec DC 2009|Back to Conference Page]]=== | ||
Revision as of 05:34, 3 November 2009
Back to Conference Page
Please note, speaking times are not final, check back regularly for updates.
Training 11/10
| Day 1 - Nov 10th 2009 | |||||
| Room 154A | Room 149B | Room 149A | Room 154B | Room 155 | |
| 09:00-12:00 | Day 1: Assessing and Exploiting Web Applications with the open source Samurai Web Testing Framework Justin Searle |
Day 1: Java EE Secure Code Review Sahba Kazerooni Security Compass |
Threat Modeling Express Krishna Raja Security Compass |
Foundations of Web Services and XML Security Dave Wichers Aspect Security |
Live CD Matt Tesauro |
| 12:00-13:00 | Lunch | ||||
| 13:00-17:00 | Assessing and Exploiting Web Applications with the open source Samurai Web Testing Framework Justin Searle |
Java EE Secure Code Review Sahba Kazerooni Security Compass |
Threat Modeling Express Krishna Raja Security Compass |
Foundations of Web Services and XML Security Dave Wichers Aspect Security |
Live CD Matt Tesauro |
Training 11/11
| Day 2 - Nov 11th 2009 | |||||
| Room 154A | Room 149B | Room 149A | Room 154B | ||
| 09:00-12:00 | Day 2: Assessing and Exploiting Web Applications with the open source Samurai Web Testing Framework Justin Searle |
Day 2: Java EE Secure Code Review Sahba Kazerooni Security Compass |
WebAppSec.php: Developing Secure Web Applications Robert Zakon |
Leader and Manager Training - Leading the Development of Secure Applications John Pavone Aspect Security | |
| 12:00-13:00 | Lunch | ||||
| 13:00-17:00 | Assessing and Exploiting Web Applications with the open source Samurai Web Testing Framework Justin Searle |
Java EE Secure Code Review Sahba Kazerooni Security Compass |
WebAppSec.php: Developing Secure Web Applications Robert Zakon |
Leader and Manager Training - Leading the Development of Secure Applications John Pavone Aspect Security | |

