This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Template:OWASP IL 2011 Agenda"
From OWASP
Line 1: | Line 1: | ||
− | {| class="wikitable" | + | {| class="wikitable" |
|- style="font-size:10pt" | |- style="font-size:10pt" | ||
− | |style="color:#1F497D" width=" | + | |style="color:#1F497D" width="90" height="30" align="center" valign="center" | 08:30-09:15 |
− | | valign="center" colspan=2 style="font-size:12pt" | | + | | valign="center" colspan=2 style="font-size:12pt" | '''Registration, Gathering and Socializing''' |
− | |||
− | |||
− | |||
− | |||
+ | |- style="font-size:10pt" | ||
+ | |style="color:#1F497D" height="25" align="center" valign="center" | 09:15-09:30 | ||
+ | | valign="center" colspan="2" style="font-size:11pt" | '''Opening Notes''' | ||
+ | ''Ofer Maor - Chairman, OWASP Israel; Global Membership Committee, OWASP'' | ||
|- style="font-size:11pt" | |- style="font-size:11pt" | ||
− | |style="color:#1F497D" height="25" align="right" valign="center" | | + | |style="color:#1F497D" height="25" align="right" valign="center" | 09:30-10:10 |
− | | valign="center" colspan="2" | | + | | valign="center" colspan="2" | '''Keynote: Composite Applications Over Hybrid Clouds –Enterprise Security Challenges of the IT Supply Chain''' |
− | + | ''Dr. Ethan Hadar - Senior Vice President Corporate Technical Strategy, CA'' | |
|- style="font-size:11pt" | |- style="font-size:11pt" | ||
|style="color:#1F497D" height="25" align="right" valign="center" | 15:10-15:50 | |style="color:#1F497D" height="25" align="right" valign="center" | 15:10-15:50 | ||
Line 30: | Line 30: | ||
|- style="font-size:11pt" | |- style="font-size:11pt" | ||
− | |style="color:#1F497D" height="25" align=" | + | |style="color:#1F497D" height="25" align="center" valign="center" | 17:00-17:40 |
| valign="center" | Practical Mod Security: Beyond the Core Rule Set ''Josh Amishav-Zlatin, Pure Hacking'' ([[Media:OWASPIL2010-PracticalModSe-JoshAmishavZlatin.pdf|Download Presentation]]) | | valign="center" | Practical Mod Security: Beyond the Core Rule Set ''Josh Amishav-Zlatin, Pure Hacking'' ([[Media:OWASPIL2010-PracticalModSe-JoshAmishavZlatin.pdf|Download Presentation]]) | ||
| valign="center" | PCI:DSS and the New PA:DSS Standards: Myths, Trends and Pragmatic Methods for Building Secure Software that Complies ''Shay Zalalichin, Comsec'' ([[Media:OWASPIL2010-PCIAppSec-ShayZalalichin.pdf|Download Presentation]]) | | valign="center" | PCI:DSS and the New PA:DSS Standards: Myths, Trends and Pragmatic Methods for Building Secure Software that Complies ''Shay Zalalichin, Comsec'' ([[Media:OWASPIL2010-PCIAppSec-ShayZalalichin.pdf|Download Presentation]]) | ||
|- style="font-size:11pt" | |- style="font-size:11pt" | ||
− | |style="color:#1F497D" height="25" align=" | + | |style="color:#1F497D" height="25" align="center" valign="center" | 17:40-18:20 |
| valign="center" | Accelerating Multi-Pattern Matching on Compressed HTTP Traffic ''Yaron Koral, IDC'' ([[Media:OWASPIL2010-CompressedHTTPMatching-YaronKoral.pptx|Download Presentation]]) | | valign="center" | Accelerating Multi-Pattern Matching on Compressed HTTP Traffic ''Yaron Koral, IDC'' ([[Media:OWASPIL2010-CompressedHTTPMatching-YaronKoral.pptx|Download Presentation]]) | ||
| valign="center" | Real Life Application DoS Attacks ''Ziv Gadot, Radware'' ([[Media:OWASPIL2010-RealLifeDoS-ZivGadot.ppt|Download Presentation]]) | | valign="center" | Real Life Application DoS Attacks ''Ziv Gadot, Radware'' ([[Media:OWASPIL2010-RealLifeDoS-ZivGadot.ppt|Download Presentation]]) |
Revision as of 19:59, 16 August 2011
08:30-09:15 | Registration, Gathering and Socializing | |
09:15-09:30 | Opening Notes
Ofer Maor - Chairman, OWASP Israel; Global Membership Committee, OWASP | |
09:30-10:10 | Keynote: Composite Applications Over Hybrid Clouds –Enterprise Security Challenges of the IT Supply Chain
Dr. Ethan Hadar - Senior Vice President Corporate Technical Strategy, CA | |
15:10-15:50 | CSA Israel & The Challenges of Cloud Security Guy Alfassi (Download Presentation) | |
15:50-16:30 | Beyond Negative Security: Signatures Are Not Always Enough Or Katz, Trustwave (Download Presentation) | |
16:30-17:00 | Break | |
Room #1 | Room #2 | |
17:00-17:40 | Practical Mod Security: Beyond the Core Rule Set Josh Amishav-Zlatin, Pure Hacking (Download Presentation) | PCI:DSS and the New PA:DSS Standards: Myths, Trends and Pragmatic Methods for Building Secure Software that Complies Shay Zalalichin, Comsec (Download Presentation) |
17:40-18:20 | Accelerating Multi-Pattern Matching on Compressed HTTP Traffic Yaron Koral, IDC (Download Presentation) | Real Life Application DoS Attacks Ziv Gadot, Radware (Download Presentation) |
18:20-19:00 | Runtime Hardening Erez Metula, AppSec (Download Presentation) | Cloud Computing Security: Mapping Concepts to Practical Techniques Gilad Parann-Nissany, Porticor (Download Presentation) |
19:00-19:05 | Closing Words Ofer Maor, Hacktics - OWASP Israel Chairman |