This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "AppSec Brasil 2010"
Line 141: | Line 141: | ||
== Gold Sponsors == | == Gold Sponsors == | ||
− | | | + | | [[Image:LeadComm_Logo_Screen.jpg|200px|link=http://www.leadcomm.com.br]] |
|- | |- | ||
| | | |
Revision as of 22:43, 20 July 2010
Para a versão em português, veja em AppSec Brasil 2010 (pt-br)
OWASP AppSec Brasil 2010
The Second Edition of OWASP's flagship conference in South America will happen in Campinas, SP, Brazil. The Conference consists of two days of training sessions, followed by a two-day conference on a single track.
Conference Dates
The conference will happen from November 16th, 2010 to November 19th, 2010. The first two days will be tutorial days (see below). Plenary sessions will be held on November 18th and 19th.
About
About the conference
Following the success of the first AppSec Brasil, held in Brasilia in 2009, the OWASP Brazilian Chapter is organizing its second edition in 2010. AppSec Brasil 2010 will happen in the city of Campinas, located 90 km from São Paulo.
Campinas is the 3rd biggest city in the State of São Paulo and is an important economic center and hosts major universities and research centers. It is known to concentrate several high tech industries, including important multi-national companies in the fields of electronics, telecom and chemicals.
This year, we expect to gather a number of Brazilian and Latin American practitioners and researchers to share state-of-the-art information about application security.
Calls
The call for presentations will be released soon.
Call for training providers
**OWASP APPSEC BRASIL 2010** **CALL FOR TRAINING SESSIONS** Colleagues, OWASP is currently soliciting training proposals for the OWASP AppSec Brazil 2010 Conference which will take place at Fundação CPqD in Campinas, SP, Brazil, on November 16 through November 19, 2010. There will be training courses on November 16 and 17 followed by plenary sessions on the 18 and 19 with one single track per day. We are seeking training proposals on the following topics (in no particular order): - Application Threat Modeling - Business Risks with Application Security - Hands-on Source Code Review - Metrics for Application Security - OWASP Tools and Projects - Privacy Concerns with Applications and Data Storage - Secure Coding Practices (J2EE/.NET) - Starting and Managing Secure Development Lifecycle Programs - Technology specific presentations on security such as AJAX, XML, etc - Web Application Security countermeasures - Web Application Security Testing - Web Services, XML- and Application Security - Anything else relating to OWASP and Application Security Proposals on topics not listed above but related to the conference (i.e. which are related to Application Security) may also be accepted. To make a submission you must fill out the form available at http://www.owasp.org/images/1/1a/OWASP_AppSec_Brasil_2010_CFT.rtf.zip and submit by email to [email protected] There may be 1 or 2-day courses. The proposals must respect the restrictions of the OWASP Speaker Agreement. The conference will reward trainers with at least 30% of the total revenue of their courses, based on a minimum attendance. Courses that attract more students may be granted higher percentages. No other compensation (such as tickets or lodging) will be provided. If you require a different arrangement, please contact the conference chair at the email address below. **Compensation** Instructors and authors will be paid based on the number of students in their training sessions. If the training gathers only the minimum number of students, the compensation will be 30% of the revenue. For each group of 10 extra students enrolled, the compensation will be increased by 5% of the revenue, up to a maximum of 45% of the training revenue. For example, a 1-day training with 10 to 19 students will generate a compensation of 30% of the revenue. For classes of 20 to 29 students, the compensation raises to 35% percent of the revenue. In exceptional cases, different compensation schemes may be accepted. Please contact the conference organization team by email ([email protected]) for details. **Training cost** 1-day training: R$ 450 per student 2-day training: R$ 900 per student All prices in Brazilian Reais (BRL) **Minimum number of students** 1-day trainings: 10 students 2-day trainings: 20 students **Important Dates:** Submission deadline is July 26, 2010, at 11:59 PM (UTC/GMT-3). Notification of acceptance will be August 16, 2010. Final version is due September 15, 2010. The conference organization team may be contacted by email at organizacao2010 (at) appsecbrasil.org For more information, please see the following web pages: Conference Website: https://www.owasp.org/index.php/AppSec_Brasil_2010 OWASP Speaker Agreement: http://www.owasp.org/index.php/Speaker_Agreement OWASP Website: http://www.owasp.org Easychair conference site: http://www.easychair.org/conferences/?conf=appsecbr2010 Presentation proposal form: http://www.owasp.org/images/1/1a/OWASP_AppSec_Brasil_2010_CFT.rtf.zip ********** WARNING: Submissions without all the information requested in the proposal form will not be considered ************
Sponsorship
We are currently soliciting sponsors for the AppSec Brasil 2010 Conference. Detailed sponsorship oportunities are now available.
If you are interested in sponsoring AppSec Brasil 2010, please contact the Conference Organization Team ([email protected]).
Sponsors
Platinum Sponsors |
|
Gold Sponsors |
|
Silver Sponsors |
|
Organizational Sponsors | |
Reception Sponsors | |
Coffee Sponsors |
Promoted by
Keynotes
Bruce Schneier
Title: TBD.
Bio: Bruce Schneier is an internationally renowned security technologist, referred to by The Economist as a "security guru." He is the author of nine books -- including the best sellers Beyond Fear, Secrets and Lies, and Applied Cryptography – as well as hundreds of articles and essays, and many more academic papers. His influential newsletter "Crypto-Gram," and his blog "Schneier on Security," are read by over 250,000 people. He has testified before Congress, is a frequent guest on television and radio, served on several government technical committees, and is regularly quoted in the press. Schneier is the Chief Security Technology Officer of BT.
Jeremiah Grossman
Title: TBD.
Bio: Jeremiah Grossman, founder and CTO, WhiteHat Security, is a world-renowned Web security expert. A co-founder of the Web Application Security Consortium (WASC), he was named to InfoWorld's Top 25 CTOs in 2007 and is frequently quoted by business and technical media. He has authored dozens of articles and whitepapers, is credited with the discovery of many cutting-edge attack and defensive techniques, and is a co-author of "XSS Attacks: Cross Site Scripting Exploits and Defense." Grossman is also an influential blogger who offers insight and encourages open dialogue regarding Web security research and trends. Prior to WhiteHat, Grossman was an information security officer at Yahoo!
Agenda
Conference Program - Day 1 - November 18th 2010
08:30 - 09:00 | Reception Desk Open |
09:00 - 10:20 | Opening Ceremony - About OWASP |
10:20 - 10:40 | Break |
10:40 - 11:40 | Bruce Schneier TBD |
11:40 - 12:30 | TBD TBD |
12:30 - 14:00 | Lunch Break |
14:00 - 14:50 | TBD TBD |
14:50 - 15:40 | TBD TBD |
15:40 - 16:00 | Break |
16:00 - 16:50 | TBD TBD |
16:50 - 17:40 | TBD TBD |
17:40 - 18:30 | TBD TBD |
18:30 - 18:35 | End of the First Day |
Conference Program - Day 2 - November 19th 2010
08:30 - 09:00 | Reception Desk Open |
09:00 - 10:30 | Jeremiah Grossman TBD |
10:30 - 10:50 | Break |
10:30 - 11:40 | TBD TBD |
11:40 - 12:30 | TBD TBD |
12:30 - 14:00 | Lunch Break |
14:00 - 15:10 | TBD TBD |
15:10 - 16:00 | TBD TBD |
16:00 - 16:20 | Break |
16:20 - 17:10 | TBD TBD |
17:10 - 18:00 | TBD TBD |
18:00 - 18:30 | End of the Conference |
Trainings
Secure Coding for J2EE Applications
Date and time: TBD
Instructor: Jason Li
Summary
Training developers on secure coding practices offers one of the highest returns on investment of any security investment by eliminating vulnerabilities at the source.
Aspect’s Java EE Secure Coding Training raises developer awareness of application security issues and provides examples of ‘what to do’ and ‘what not to do.' The class is lead by an experienced developer and is delivered in a very interactive manner. This class includes hands-on exercises where the students get to perform security analysis and testing on a live Java EE web application. This specially designed environment includes deliberate flaws the students have to find, diagnose, and fix. The class also uses Java EE coding exercises to provide students with realistic hands-on secure coding experience. Students gain hands-on experience using freely available web application security test tools to find and diagnose flaws and learn to avoid them in their own code.
Audience
The intended audience for this course is intended for Java EE software developers and Java EE software testers who know how to program.
Learning Objectives
At the highest level, the objective for this course is to ensure that developers are capable of designing, building, and testing secure Java EE applications and understand why this is important.
Topics
- HTTP Fundamentals
- Understand and be able to employ the security features involved with using HTTP (e.g., headers, cookies, SSL)
- Understand and be able to employ the security features involved with using HTTP (e.g., headers, cookies, SSL)
- Design Principles and Patterns
- Understand and be able to apply application security design principles.
- Understand and be able to apply application security design principles.
- Threats
- Be able to identify and explain common web application security threats (e.g. , cross-site scripting, SQL injection, denial of service attacks, "Man-in-the-middle" attacks, etc.) and implement mitigation techniques.
- Be able to identify and explain common web application security threats (e.g. , cross-site scripting, SQL injection, denial of service attacks, "Man-in-the-middle" attacks, etc.) and implement mitigation techniques.
- Authentication and Session Management
- Be able to handle credentials securely while providing the full range of authentication support functions, including login, change password, forgot password, remember password, logout, reauthentication, and timeouts.
- Be able to handle credentials securely while providing the full range of authentication support functions, including login, change password, forgot password, remember password, logout, reauthentication, and timeouts.
- Access Control
- Be able to implement access control rules for the user interface, business logic, and data layers.
- Be able to implement access control rules for the user interface, business logic, and data layers.
- Input Validation
- Be able to recognize potential input validation issues, particularly injection and Cross-site Scripting (XSS) problems, and implement appropriate input validation mechanisms for user input and other sources of input.
- Be able to recognize potential input validation issues, particularly injection and Cross-site Scripting (XSS) problems, and implement appropriate input validation mechanisms for user input and other sources of input.
- Command Injection
- Understand the dangers of command injection and techniques for avoiding the introduction of this type vulnerability.
- Understand the dangers of command injection and techniques for avoiding the introduction of this type vulnerability.
- Error Handling
- Be able to implement a consistent error (exception) handling and logging approach for an entire web application.
- Be able to implement a consistent error (exception) handling and logging approach for an entire web application.
- Cryptography
- Learn when to apply cryptographic techniques and be able to choose algorithms and use encryption/decryption and hash functions securely.
- Learn when to apply cryptographic techniques and be able to choose algorithms and use encryption/decryption and hash functions securely.
Jason’s Bio
Jason is a remarkable trainer, mastering five different training courses within a year’s time to our most valuable longstanding but diverse clients. The client base included a large financial institution, several leading shipping and logistics Management Company, and a leading Government systems integrator.
Jason has also taught Advanced Web Application Security Testing and Building Secure Web Applications classes at OWASP 2008 conferences in Belgium and India.
Common remarks returned from Jason’s class evaluations include “This is probably one of the most important classes I‘ve been exposed to here” and “One of the best instructors I’ve ever had. Really knowledgeable of the subject. Kept class interested by sharing real life examples that depicted good scenarios”
Venue
The event will be held in Campinas, SP, Brazil at: Fundação CPQD.
You can check the location at Google Maps
How to get there
TBD
Registration
Online Registration
TBD
Conference Fees
TBD
Committees
Conference Committee
OWASP Global Conferences Committee Chair: Mark Bristow
OWASP Brazilian Chapter Leader: Wagner Elias
AppSec Brasil 2010 Organization Team (organizacao2010 at appsecbrasil.org):
- Conference General Chair: Lucas C. Ferreira
- Tutorials Chair: Eduardo Camargo Neves
- Tracks Chair: Luiz Otávio Duarte
- Local Chair: Alexandre Melo Braga
Team Members
- Alexandre Melo Braga
- Eduardo Camargo Neves
- Lucas C. Ferreira
- Luiz Otávio Duarte
- Wagner Elias
- Eduardo Alves Nonato da Silva
- Leonardo Buonsanti
- Dinis Cruz
- Paulo Coimbra
Travel
TBD
Links
Blog: http://blog.appsecbrasil.org
Twitter: http://twitter.com/owaspappsecbr