|
|
| Line 1: |
Line 1: |
| − | {| cellspacing="0" border="2"
| + | == Global AppSec Events == |
| − | |- valign="middle"
| + | {| class="wikitable" |
| − | | height="60" align="center" colspan="5" style="background: rgb(64, 88, 160) none repeat scroll 0% 0%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous; color: white;" | <font size="5">'''Plenary Day 1 - Nov 10th 2010'''</font> | + | |- |
| − | |- valign="bottom" | + | ! Global AppSec Events |
| − | | width="72" valign="middle" height="40" bgcolor="#7b8abd" |
| + | ! Date |
| − | | width="200" valign="middle" height="40" bgcolor="#c0a0a0" align="center" | '''Offense (147B)'''
| + | ! Location |
| − | | width="200" valign="middle" height="40" bgcolor="#ffdf80" align="center" | '''Defense (147A)'''
| + | ! GCC Rep |
| − | | width="200" valign="middle" height="40" bgcolor="#a0c0e0" align="center" | '''Metrics (145B)'''
| + | ! OWASP Introduction/Keynote |
| − | | width="200" valign="middle" height="40" bgcolor="#b3ff99" align="center" | '''Government (145A)'''
| + | |- |
| − | |- valign="bottom" | + | | [http://www.owasp.org/index.php/AppSecEU2011 Global AppSec Europe ] |
| − | | width="72" valign="middle" bgcolor="#7b8abd" | 07:30-08:50 | + | | June 6, 2011 - June 10, 2011 |
| − | | valign="middle" bgcolor="#e0e0e0" align="center" colspan="4" | Registration
| + | | Dublin, Ireland |
| − | |- valign="bottom" | + | | Ralph Durkee |
| − | | width="72" valign="middle" bgcolor="#7b8abd" | 08:50-09:00
| + | | Entire Board |
| − | | valign="middle" height="30" bgcolor="#e0e0e0" align="center" colspan="4" | Welcome and Opening Remarks
| + | |- |
| − | |- valign="bottom"
| + | | [http://www.appsecusa.org/ Global AppSec North America] |
| − | | width="72" valign="middle" bgcolor="#7b8abd" | 09:00-10:00
| + | | Sept. 20, 2011 - Sept. 23, 2011 |
| − | | valign="middle" height="60" bgcolor="#e0e0e0" align="center" colspan="4" | Keynote by Neal Ziring<br>National Security Agency | + | | Minneapolis, MN, USA |
| − | |- valign="bottom"
| + | | Neil Matatall |
| − | | width="72" valign="middle" bgcolor="#7b8abd" | 10:00-10:30 | + | | Entire Board |
| − | | valign="middle" height="60" bgcolor="#e0e0e0" align="center" colspan="4" | All about OWASP<br>OWASP Board | + | |- |
| − | |- valign="bottom" | + | | [http://www.owasp.org/index.php/AppSec_Brasil_2010 Global AppSec Latin America] |
| − | | width="72" valign="middle" bgcolor="#7b8abd" | 10:30-10:45 | + | | Oct. 11, 2011 - Oct. 14, 2011 |
| − | | valign="middle" height="30" bgcolor="#e0e0e0" align="center" colspan="4" | Coffee Break sponsored by [[Image:Redspin30x120.png]]
| + | | Porto Alegre, Brazil |
| − | |- valign="bottom" | + | | TBD |
| − | | width="72" valign="middle" bgcolor="#7b8abd" | 10:45-11:30 | + | | Brennan |
| − | | width="200" valign="middle" height="120" bgcolor="#c0a0a0" align="center" | Python Basics for Web App Pentesters<br><br>Justin Searle
| + | |- |
| − | | width="200" valign="middle" height="120" bgcolor="#ffdf80" align="center" | Drive By Downloads: How To Avoid Getting A Cap Popped In Your App<br><br>Neil Daswani | + | | [http://www.owasp.org/index.php/China_AppSec_2011 Global AppSec Asia 2011] |
| − | | width="200" valign="middle" height="120" bgcolor="#a0c0e0" align="center" | Secure Code Review: Enterprise Metrics<br><br>Richard Tychansky | + | | Nov. 3, 2011 - Nov. 5, 2011 |
| − | | width="200" valign="middle" height="120" bgcolor="#b3ff99" align="center" | Cyber-Assurance Ecosystem - Automation Activities for Securing the Enterprise<br><br>Joe Jarzombek | + | | Wuhan, Hubei, China |
| − | |- valign="bottom" | + | | TBD |
| − | | width="72" valign="middle" height="5" bgcolor="#7b8abd" rowspan="1"| 11:30-11:35 | + | | TBD |
| − | | valign="middle" height="5" bgcolor="#e0e0e0" align="center" colspan="4" | Break | + | |} |
| − | |- valign="bottom" | + | |
| − | | width="72" valign="middle" bgcolor="#7b8abd" | 11:35-12:20 | + | == Regional and Local Events == |
| − | | width="200" valign="middle" height="120" bgcolor="#c0a0a0" align="center" | White and Black box testing of Lotus Domino Applications<br><br>Ari Elias-bachrach and Casey Pike | + | {| class="wikitable" |
| − | | width="200" valign="middle" height="120" bgcolor="#ffdf80" align="center" | Protecting Federal Government from Web 2.0 Application Security Risks<br><br>Sarbari Gupta | + | |- |
| − | | width="200" valign="middle" height="120" bgcolor="#a0c0e0" align="center" | Measuring Security: 5 KPIs for Successful Web App Security Programs<br><br>Rafal Los | + | ! Event |
| − | | width="200" valign="middle" height="120" bgcolor="#b3ff99" align="center" | Security Risk and the Software Supply Chain<br><br>Karen Goertzel | + | ! Type |
| − | |- valign="bottom" | + | ! Date |
| − | | width="72" valign="middle" height="40" bgcolor="#7b8abd" | 12:20-1:20 | + | ! Location |
| − | | valign="middle" height="40" bgcolor="#e0e0e0" align="center" colspan="4" | Lunch | + | ! GCC Rep |
| − | |- valign="bottom"
| + | ! OWASP Introduction/Keynote |
| − | | width="72" valign="middle" height="120" bgcolor="#7b8abd" rowspan="1"| 1:20-2:05
| + | |- |
| − | | width="200" valign="middle" height="120" bgcolor="#c0a0a0" align="center" | Pen Testing with Iron<br><br>Andrew Wilson | + | | [http://www.owasp.org/index.php/Category:OWASP_AppSec_Conference OWASP Israel 2011 ] |
| − | | width="200" valign="middle" height="120" bgcolor="#ffdf80" align="center" | Providing application-level assurance through DNSSEC<br><br>Suresh Krishnaswamy, Wes Hardaker and Russ Mundy | + | | Regional Event |
| − | | width="200" valign="middle" height="120" bgcolor="#a0c0e0" align="center" | H.....t.....t....p.......p....o....s....t<br><br>Onn Chee & Tom Brennan
| + | | Sept. 13, 2011 - Sept. 14, 2011 |
| − | | width="200" valign="middle" height="120" bgcolor="#b3ff99" align="center" rowspan="3"| Understanding How They Attack Your Weaknesses: CAPEC<br><br>Sean Barnum
| + | | Israel |
| − | |- valign="bottom"
| + | | TBD |
| − | | width="72" valign="middle" height="5" bgcolor="#7b8abd" rowspan="1"| 2:05-2:10
| + | | TBD |
| − | | valign="middle" height="5" bgcolor="#e0e0e0" align="center" colspan="2" | Break
| + | |- |
| − | | valign="middle" height="5" bgcolor="#e0e0e0" align="center" colspan="1" | Break
| + | | [http://www.lascon.org/ LASCON] |
| − | |- valign="bottom" | + | | Regional Event |
| − | | width="72" valign="middle" height="120" bgcolor="#7b8abd" rowspan="1"| 2:10-2:55 | + | | Oct. 28, 2011 - Oct. 28, 2011 |
| − | | width="200" valign="middle" height="120" bgcolor="#c0a0a0" align="center" | Hacking Oracle From Web Apps<br><br>Sumit Siddharth | + | | Austin, TX, USA |
| − | | width="200" valign="middle" height="120" bgcolor="#ffdf80" align="center" | GuardRails: A Nearly Painless Solution to Insecure Web Applications|GuardRails: A (Nearly) Painless Solution to Insecure Web Applications<br><br>Jonathan Burket, Patrick Mutchler, Michael Weaver and Muzzammil Zaveri | + | | TBD |
| − | | width="200" valign="middle" height="120" bgcolor="#a0c0e0" align="center" | Securing Frameworks Panel | + | | TBD |
| − | |- valign="bottom" | + | |} |
| − | | width="72" valign="middle" bgcolor="#7b8abd" | 2:55-3:10 | + | == Partner and Promotional Events == |
| − | | valign="middle" height="30" bgcolor="#e0e0e0" align="center" colspan="4" | Coffee Break sponsored by [[Image:SecureIdeas_30X65.png]] | + | Want to get your event listed here? Be sure to work with the [[Global Conferences Committee]] |
| − | |- valign="bottom" | + | |
| − | | width="72" valign="middle" height="120" bgcolor="#7b8abd" rowspan="1"| 3:10-3:55 | + | {| class="wikitable" |
| − | | width="200" valign="middle" height="120" bgcolor="#c0a0a0" align="center" | wXf: Web Exploitation Framework<br><br>Ken Johnson and Chris Gates ] | + | |- |
| − | | width="200" valign="middle" height="120" bgcolor="#ffdf80" align="center" | The Strengths of Combining Code Review with Application Penetration Testing<br><br>Dave Wichers | + | ! Event |
| − | | width="200" valign="middle" height="120" bgcolor="#a0c0e0" align="center" | Dealing with Web Application Security, Regulation Style<br><br>Andrew Weidenhamer | + | ! Date |
| − | | width="200" valign="middle" height="120" bgcolor="#b3ff99" align="center" | Ensuring Software Assurance Process Maturity<br><br>Edmund Wotring
| + | ! Location |
| − | |- valign="bottom"
| + | ! OWASP Participation |
| − | | width="72" valign="middle" height="5" bgcolor="#7b8abd" rowspan="1"| 3:55-4:00
| + | |- |
| − | | valign="middle" height="5" bgcolor="#e0e0e0" align="center" colspan="4" | Break | + | | [http://www.securitybsides.com/w/page/33728032/BSidesAustin2011 BSides Austin 2011] |
| − | |- valign="bottom" | + | | March 11, 2011 - March 11, 2011 |
| − | | width="72" valign="middle" height="120" bgcolor="#7b8abd" rowspan="2"| 4:00-4:45
| + | | Austin, TX, USA |
| − | | width="200" valign="middle" height="120" bgcolor="#c0a0a0" align="center" rowspan="5" | Pen-Test Panel
| + | | |
| − | | width="200" valign="middle" height="120" bgcolor="#ffdf80" align="center" rowspan="2" | Botnet Resistant Coding: Protecting Your Users from Script Kiddies<br><br>Fabian Rothschild and Peter Greko
| + | |- |
| − | | width="200" valign="middle" height="90" bgcolor="#a0c0e0" align="center" rowspan="1" | OWASP Broken Web Applications Project Update<br><br>Chuck Willis<br><br>
| + | | [http://uberconf.com/conference/denver/2011/07/home UberConf] |
| − | | width="200" valign="middle" height="120" bgcolor="#b3ff99" align="center" rowspan="2" | People, Process, and Technology: OWASP Impact on the SwA Processes and Practices Working Group<br><br>Michele Moss
| + | | July 12, 2011 - July 15, 2011 |
| − | |- valign="bottom" | + | | Denver, CO, USA |
| − | | width="200" valign="middle" height="90" bgcolor="#a0c0e0" align="center" | Smashing WebGoat for Fun and Research: Static Code Scanner Evaluation<br><br>Joshua Windsor and Joshua Pauli<br><br> | + | | |
| − | |- valign="bottom" | + | |- |
| − | | width="72" valign="middle" height="5" bgcolor="#7b8abd" rowspan="1"| 4:45-4:50 | + | | [http://2011.brucon.org/ BrucCON] |
| − | | valign="middle" height="5" bgcolor="#e0e0e0" align="center" colspan="4" | Break | + | | Sept. 19, 2011 - Sept. 22, 2011 |
| − | |- valign="bottom" | + | | Brussels |
| − | | width="72" valign="middle" height="120" bgcolor="#7b8abd" rowspan="2"| 4:50-5:35 | + | | |
| − | | width="200" valign="middle" height="120" bgcolor="#ffdf80" align="center" rowspan="2" | A new approach to preventing injection attacks on the Web Application Stack<br><br>Ahmed Masud | |
| − | | width="200" valign="middle" height="90" bgcolor="#a0c0e0" align="center" | Using Misuse Cases to Articulate Vulnerabilities to Stakeholders<br><br>Scott Mendenhall<br><br> | |
| − | | width="200" valign="middle" height="120" bgcolor="#b3ff99" align="center" rowspan="2" | Federal Perspectives on Application Security - Panel | |
| − | |- valign="bottom" | |
| − | | width="200" valign="middle" height="90" bgcolor="#a0c0e0" align="center" | The Web Hacking Incident Database (WHID) Report<br><br>Ryan Barnett<br><br> | |
| − | |- valign="bottom" | |
| − | | width="72" valign="middle" height="60" bgcolor="#7b8abd" | 5:30-7:30 | |
| − | | valign="middle" height="60" bgcolor="#e0e0e0" align="center" colspan="4" | Cocktails sponsored by [[Image:Trustwave50x250.png]] | |
| − | <!-- Day 1 -->
| |
| | |} | | |} |