This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "OWASP China Summit 2010"
Weilin Zhong (talk | contribs) (→Media Partners:) |
Weilin Zhong (talk | contribs) (→Kenny Lee) |
||
Line 167: | Line 167: | ||
We have learned a great deal from this journey and we’re glad to have the opportunity to share these findings with you. As always, our goal is that the data and analysis presented in this report prove helpful to the planning and security efforts of the audience. Many of the lessons learnt from this study strongly indicated the need for improvements in web application security. Data breaches are often a series of simple oversights that culminate in a significant event where huge amounts of data are stolen. We will discuss the most common issues through the use of statistics, war stories and case studies. Key recommendations will be discussed that we believe will help your organisation not be the next victim of a data breach. | We have learned a great deal from this journey and we’re glad to have the opportunity to share these findings with you. As always, our goal is that the data and analysis presented in this report prove helpful to the planning and security efforts of the audience. Many of the lessons learnt from this study strongly indicated the need for improvements in web application security. Data breaches are often a series of simple oversights that culminate in a significant event where huge amounts of data are stolen. We will discuss the most common issues through the use of statistics, war stories and case studies. Key recommendations will be discussed that we believe will help your organisation not be the next victim of a data breach. | ||
More information can be found at [http://www.verizonbusiness.com/databreach/ Verizon Business website]. | More information can be found at [http://www.verizonbusiness.com/databreach/ Verizon Business website]. | ||
+ | * [http://www.owasp.org/index.php/File:201008_DBIR_Executive_Summary_CHT_Final.pdf Chinese Executive Summary (中文摘要)] | ||
+ | |||
== Building an effective SSA program in measurable iterations == | == Building an effective SSA program in measurable iterations == | ||
===== Pravir Chandra ===== | ===== Pravir Chandra ===== |
Revision as of 08:45, 15 October 2010
Welcome
OWASP China Summit 2010 - Beijing China
OWASP China-Mainland Chapterwill host OWASP China Summit 2010 in Beijing China on Oct 20-23, 2010, with two days of training followed by two days of conference. The summit will gather OWASP leaders, security experts, executives, technical thought leaders, developers, scientists and researchers from China and around the world for in-depth discussions of cutting-edge application security issues. The summit will draw participation from major Chinese and global organizations across various verticals including government, information technology, services and consulting, telecommunications, finance, e-commerce, Internet, universities and research institutes. About 800 people are expected to attend the summit, which will be covered by major news media. Panel discussions, vendor exhibit, and dinners will be held at the summit, providing sufficient networking opportunities.
Press Release: OWASP China Summit 2010 Announcement
中文(Chinese)
中文网站
本次会议设有专门的中文网站: OWASP 2010 中国峰会中文网站。
Registration
Please register yourself to attend the OWASP China Summit. General admission is FREE.
Who Should Attend OWASP China Summit 2010:
- Application Developers
- Application Testers and Quality Assurance
- Application Project Management and Staff
- Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff
- Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance
- Security Managers and Staff
- Executives, Managers, and Staff Responsible for IT Security Governance
- IT Professionals Interesting in Improving IT Security
For student discount, attendees must present proof of enrollment when picking up your badge.
Questions, please contact: OWASP China Summit 2010 Organization Team
Training: Oct 20 - 21
Training Agenda
Training Oct 20 - Oct 21 | |||||
Time | Trainer | Topic | Language | Price (Before Oct.10) | Price (After Oct.10) |
AM Oct 20 | Yuezhong Bao, Microsoft | Secure Development Lifecycle | Chinese | RMB 1000 ($150) | RMB 1500 ($230) |
PM Oct 20 | Benson Wu, Armorize | Security Code Review | Chinese | RMB 1000 ($150) | RMB 1500 ($230) |
AM Oct 21 | Xin Fang, VulnHunt | Security Testing | Chinese | RMB 1000 ($150) | RMB 1500 ($230) |
PM Oct 21 | Aaron, DBAppSecurity | Security Testing | Chinese | RMB 1000 ($150) | RMB 1500 ($230) |
Enrollment & Questions:
- Ivy: 13510601178, [email protected]
- Rip: 13699898080, [email protected]
Trainer Bios & Course Abstracts
- More details, please see the summit Chinese website (详情请见峰会中文网站).
Agenda: Oct 22
Detailed Agenda in Chinese (详细会议日程).
Conference Day 1 - Oct 22, 2010 Tentative | |||
Time | Speaker | Presentation | Language |
08:30-09:00 | Registration and Networking | ||
09:00-09:10 | Rip Torn, OWASP China Chapter and Tom Brennan OWASP Board | Opening Statement: Welcome to OWASP China Summit 2010 | Chinese/English |
09:10-10:00 | Keynote: Chenxi Wang, PhD, Forrester Research | #Application Security Market Trend 应用安全市场动态 | Chinese |
10:10-10:40 | Weilin Zhong, OWASP | OWASP TOP 10 | Chinese |
10:50-11:20 | Frank Fan, DBAppSecurity | Web Attack and Defense Trends | Chinese |
11:30-12:00 | Wong Onn Chee, OWASP Singapore Chapter | #Outbound Monitoring of Web Servers: a Forgotten Child in Information Security? | Chinese/English |
12:00-13:30 | Lunch Break | ||
13:30-14:10 | Kenny Lee, Verizon Business | #2010 Data Breach Investigation Report | English with real-time Chinese translation |
14:20-15:00 | Pravir Chandra, OWASP | #Building an effective SSA program in measurable iterations | English with real-time Chinese translation |
15:10-15:40 | Helen Gao, OWASP Long Island Chapter | OWASP and OWASP Projects | Chinese |
16:00-17:00 | Panel | Round Table: Web App Security - State of Art | Chinese |
Application Security Market Trend 应用安全市场动态
Chenxi Wang, PhD
应用安全是很多企业安全部门的重要运行目标。在这个报告中我们将分析全球应用安全市场动态,并看一下世界的一些领先机构是怎样在内部推广和运行应用安全产品。我们将分析一些金融界和保险行业的成功案例 ,看一下这些公司是怎样把应用安全产品分门别类融进他们的日常运行程序,并怎样克服运行中遇到的困难。最后我们还将讨论应用安全产品的发展和研究趋势。
Outbound Monitoring of Web Servers: a Forgotten Child in Information Security?
Wong Onn Chee
Outbound monitoring of enterprise web servers is an oft-neglected aspect in the overall security of an enterprise web infrastructure.When outbound monitoring is missing, risks from information leakage and transmission of malware are ever present. Onn Chee will walk through the most common causes of information leakage and malware transmission from web servers. Anonymised case studies of major US and Chinese organisations will be presented for the audience to have a better understanding.
2010 Data Breach Investigation Report
Kenny Lee
This presentation is based on the Verizon Business Data Breach Investigations Report1 (DBIR) and will be delivered by Kenny Lee, one of the contributors of the report. The DBIR is a collaborative effort between the United States Secret Service Cyber Intelligence Section and Verizon Business to collect and analyse what we believe to be the world’s largest study of data breaches consisting of over 900 cases and 900 million compromised records across six years of first hand forensic investigations. We have learned a great deal from this journey and we’re glad to have the opportunity to share these findings with you. As always, our goal is that the data and analysis presented in this report prove helpful to the planning and security efforts of the audience. Many of the lessons learnt from this study strongly indicated the need for improvements in web application security. Data breaches are often a series of simple oversights that culminate in a significant event where huge amounts of data are stolen. We will discuss the most common issues through the use of statistics, war stories and case studies. Key recommendations will be discussed that we believe will help your organisation not be the next victim of a data breach. More information can be found at Verizon Business website.
Building an effective SSA program in measurable iterations
Pravir Chandra
Integrating security activities into the software development process remains a challenge for most organizations despite the existence of several secure SDLC models. We've learned from experience that the hard questions of "what", "when", and "how much" require answers customized to each organization and there are no simple, one-size-fits-all answers. To help organizations find their own answers, this session will introduce the Open Software Assurance Maturity Model (OpenSAMM), a flexible framework for building a balanced software security assurance (SSA) program. Using the framework, attendees will learn how to self-assess their security activities and use roadmap templates to improve in small and measurable iterations. We'll also talk about several real-world case studies that demonstrate the framework in action. Time allowing, additional case studies will also be discussed. OpenSAMM is an open a free project and has recently been donated to the Open Web Application Security Project (OWASP) Foundation. For more information on OpenSAMM, visit http://www.opensamm.org/.
Sponsors
Diamond Sponsors:
Platinum Sponsors:
Gold Sponsors:
Supporting Sponsors:
Educational Sponsors:
Organizing Partners:
Media Partners:
OWASP media resources and China mainstream IT Medias publicize this web application security summit in every rolling stage. Participated Medias include:
- Print Media:CIW, CNW, 365master, TTM, CCW, CISMAG, CBINEWS, etc
- Network Media:
Sponsor US!
We are still soliciting sponsors for the OWASP China Summit. An exhibit hall will be held for vendor booths and presentations. For more details, please see the OWASP China Summit 2010 Investment Guide [English][Chinese]. Slots are going fast so contact OWASP China Summit 2010 Organization Team to sponsor today!
Conference Committee
Contact
Organizers
- Local host:
- Overseas:
Conference Committee
- Rip Torn 万振华,Chair of OWASP China Mainland chapter
- Frank Fan 范渊,Vice President of OWASP China Mainland chapter, President of DBAPPSecurity Ltd.
- Weilin Zhong 钟卫林,Lead of OWASP Chinese Project and Honeycomb Project, Senior Info Sec Eng at Wells Fargo, CISSP
- Helen Gao 高雯,Lead of OWASP Long Island Chapter and OWASP Chinese Project, CISSP
- Zhendong Yu 于振东, OWASP Chinese Project, Co-Founder, VP Engineering, Innovative Query Inc, CISSP
- Eric Chio 趙嘉言, Lead of OWASP Shanghai Chapter, Microsoft.
- Jianchun Jiang 蒋建春 - Lead of OWASP Beijing Chapter, Associate Professor, The Software Institute, Chinese Academy of Sciences, 中科院软件所副研究员. NSACE 负责人
- Jie Wang 王颉 - High Speed Network Group, Dept of Electronic and Electrical Engineering, Loughborough Univ.,UK.
- Wayne Huang 黃耀文 - OWASP conference committee, OWASP Taiwan Chapter Chair, Founder and CEO of Armorize Technology.
- Ivy Zhang 张小姐 - OWASP China Summit Secretary, OWASP China-Mainland Chapter, 会务秘书
Volunteer
Volunteers Needed!
Get involved! We will take all the help we can get to pull off the best Web Application Security Conference of the year! E-mail the OWASP China Summit 2010 Organization Team.
Logistics
Venue
Hotel Nikko New Century Beijing Conference Center
Hotel
Hotel Nikko New Century Beijing 北京新世纪日航酒店 北京市海淀区首体南路6号
- Add: No.6 Southern Road, Capital Gym, Haidian District, Beijing 100044
- Tel: 86-10-6849 2001
- Fax: 86-10-6849 1103
- http://www.newcenturyhotel.com.cn
Hotel Booking
- Mention attending the "OWASP China Summit", you can get the discount prices.
- The summit local team is happy to book the hotel for you, please contact:
- Peter Zhang
- Email: [email protected]
- Tel: 010-85655622
- Fax: +86-10-85653108
- For more detail information, please see the summit Chinese website (详情请见峰会中文网站).
Travel
How to obtain a visa for the event
- Invitation letter will be sent out for overseas attendees after registration.
- For detailed information on obtaining a business visa for this event, please refer to Chinese embassy
- More questions, please contact Helen Gao