This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Template:OWASP IL 2011 Agenda"
From OWASP
Line 1: | Line 1: | ||
{| class="wikitable" | {| class="wikitable" | ||
|- style="font-size:10pt" | |- style="font-size:10pt" | ||
− | |style="color:#1F497D" width="90" height=" | + | |style="color:#1F497D" width="90" height="40" align="center" valign="center" | 08:30-09:15 |
| align=center valign="center" colspan=2 style="font-size:12pt" | '''Registration, Gathering and Socializing''' | | align=center valign="center" colspan=2 style="font-size:12pt" | '''Registration, Gathering and Socializing''' | ||
Line 16: | Line 16: | ||
|- style="font-size:12pt" | |- style="font-size:12pt" | ||
|style="color:#1F497D" height="30" align="right" valign="center" | | |style="color:#1F497D" height="30" align="right" valign="center" | | ||
− | | | + | | valign="center" align="center" | <u>'''Track #1'''</u> |
− | | | + | | valign="center" align="center" | <u>'''Track #2'''</u> |
|- style="font-size:10pt" | |- style="font-size:10pt" | ||
|style="color:#1F497D" height="25" align="center" valign="center" | 10:15-11:00 | |style="color:#1F497D" height="25" align="center" valign="center" | 10:15-11:00 | ||
− | | valign="center" | '''[[OWASP_Israel_2011_Presentations#Finding_Security_in_Misery_of_Others|Finding Security in Misery of Others]]''' | + | | align="center" valign="center" style="font-size:11pt" | '''[[OWASP_Israel_2011_Presentations#Finding_Security_in_Misery_of_Others|Finding Security in Misery of Others]]''' |
''Amichai Shulman - CTO, Imperva'' | ''Amichai Shulman - CTO, Imperva'' | ||
− | | valign="center" | '''[[OWASP_Israel_2011_Presentations#Temporal_Session_Race_Conditions|Temporal Race Conditions]]''' | + | | align="center" valign="center" style="font-size:11pt" | '''[[OWASP_Israel_2011_Presentations#Temporal_Session_Race_Conditions|Temporal Race Conditions]]''' |
''Shay Chen - CTO, Hacktics Advanced Security Center, Ernst & Young'' | ''Shay Chen - CTO, Hacktics Advanced Security Center, Ernst & Young'' | ||
+ | |- style="font-size:10pt" | ||
+ | |style="color:#1F497D" height="50" align="center" valign="center" | 11:00-11:15 | ||
+ | | valign="center" align="center" style="font-size:12pt" colspan="2" | '''Coffee Break''' | ||
+ | |- style="font-size:10pt" | ||
+ | |style="color:#1F497D" height="25" align="center" valign="center" | 10:15-11:00 | ||
+ | | align="center" valign="center" style="font-size:11pt" | '''[[OWASP_Israel_2011_Presentations#Building_an_Effective_SDLC_Program_-_Case_Study|Building an Effective SDLC Program - Case Study]]''' | ||
+ | ''Guy Bejerano - CSO, Liveperson'' | ||
+ | ''Ofer Maor - CTO, Seeker Security'' | ||
+ | | align="center" valign="center" style="font-size:11pt" | '''[[OWASP_Israel_2011_Presentations#Space-Time_Tradeoffs_in_Software-Based_Deep_Packet_Inspection|Space-Time Tradeoffs in Software-Based Deep Packet Inspection]]''' | ||
+ | ''Yotam Harchol, IDC'' | ||
+ | |- style="font-size:10pt" | ||
+ | |style="color:#1F497D" height="40" align="center" valign="center" | 11:00-11:15 | ||
+ | | valign="center" align="center" style="font-size:12pt" colspan="2" | '''Coffee Break''' | ||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
|} | |} |
Revision as of 20:27, 16 August 2011
08:30-09:15 | Registration, Gathering and Socializing | |
09:15-09:30 | Opening Words
Ofer Maor - Chairman, OWASP Israel; Global Membership Committee, OWASP | |
09:30-10:10 | Keynote
Composite Applications Over Hybrid Clouds –Enterprise Security Challenges of the IT Supply Chain Dr. Ethan Hadar - Senior Vice President Corporate Technical Strategy, CA | |
Track #1 | Track #2 | |
10:15-11:00 | Finding Security in Misery of Others
Amichai Shulman - CTO, Imperva |
Temporal Race Conditions
Shay Chen - CTO, Hacktics Advanced Security Center, Ernst & Young |
11:00-11:15 | Coffee Break | |
10:15-11:00 | Building an Effective SDLC Program - Case Study
Guy Bejerano - CSO, Liveperson Ofer Maor - CTO, Seeker Security |
Space-Time Tradeoffs in Software-Based Deep Packet Inspection
Yotam Harchol, IDC |
11:00-11:15 | Coffee Break
|