This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Template:OWASP IL 2011 Agenda"

From OWASP
Jump to: navigation, search
Line 1: Line 1:
 
{| class="wikitable"  
 
{| class="wikitable"  
 
|- style="font-size:10pt"
 
|- style="font-size:10pt"
|style="color:#1F497D" width="90" height="30" align="center" valign="center" | 08:30-09:15
+
|style="color:#1F497D" width="90" height="40" align="center" valign="center" | 08:30-09:15
 
| align=center valign="center" colspan=2 style="font-size:12pt" | '''Registration, Gathering and Socializing'''
 
| align=center valign="center" colspan=2 style="font-size:12pt" | '''Registration, Gathering and Socializing'''
  
Line 16: Line 16:
 
|- style="font-size:12pt"
 
|- style="font-size:12pt"
 
|style="color:#1F497D" height="30" align="right" valign="center" |  
 
|style="color:#1F497D" height="30" align="right" valign="center" |  
| width="300" valign="center" align="center" | <u>'''Track #1'''</u>
+
|   valign="center" align="center" | <u>'''Track #1'''</u>
| width="300" valign="center" align="center" | <u>'''Track #2'''</u>
+
|   valign="center" align="center" | <u>'''Track #2'''</u>
  
 
|- style="font-size:10pt"
 
|- style="font-size:10pt"
 
|style="color:#1F497D" height="25" align="center" valign="center" | 10:15-11:00
 
|style="color:#1F497D" height="25" align="center" valign="center" | 10:15-11:00
|  valign="center" | '''[[OWASP_Israel_2011_Presentations#Finding_Security_in_Misery_of_Others|Finding Security in Misery of Others]]'''
+
align="center" valign="center" style="font-size:11pt" | '''[[OWASP_Israel_2011_Presentations#Finding_Security_in_Misery_of_Others|Finding Security in Misery of Others]]'''
 
''Amichai Shulman - CTO, Imperva''
 
''Amichai Shulman - CTO, Imperva''
|  valign="center" | '''[[OWASP_Israel_2011_Presentations#Temporal_Session_Race_Conditions|Temporal Race Conditions]]'''
+
align="center" valign="center" style="font-size:11pt"  | '''[[OWASP_Israel_2011_Presentations#Temporal_Session_Race_Conditions|Temporal Race Conditions]]'''
 
''Shay Chen - CTO, Hacktics Advanced Security Center, Ernst & Young''
 
''Shay Chen - CTO, Hacktics Advanced Security Center, Ernst & Young''
 +
|- style="font-size:10pt"
 +
|style="color:#1F497D" height="50" align="center" valign="center" | 11:00-11:15
 +
|  valign="center" align="center" style="font-size:12pt" colspan="2" | &nbsp; '''Coffee Break'''
  
 +
|- style="font-size:10pt"
 +
|style="color:#1F497D" height="25" align="center" valign="center" | 10:15-11:00
 +
|  align="center" valign="center" style="font-size:11pt" | '''[[OWASP_Israel_2011_Presentations#Building_an_Effective_SDLC_Program_-_Case_Study|Building an Effective SDLC Program - Case Study]]'''
 +
''Guy Bejerano - CSO, Liveperson''
  
 +
''Ofer Maor - CTO, Seeker Security''
 +
|  align="center" valign="center" style="font-size:11pt"  | '''[[OWASP_Israel_2011_Presentations#Space-Time_Tradeoffs_in_Software-Based_Deep_Packet_Inspection|Space-Time Tradeoffs in Software-Based Deep Packet Inspection]]'''
 +
''Yotam Harchol, IDC''
 +
|- style="font-size:10pt"
 +
|style="color:#1F497D" height="40" align="center" valign="center" | 11:00-11:15
 +
|  valign="center" align="center" style="font-size:12pt" colspan="2" | &nbsp; '''Coffee Break'''
  
  
|- style="font-size:11pt"
 
|style="color:#1F497D" height="50" align="right" valign="center" | 16:30-17:00
 
|  valign="center"  style="font-size:12pt" colspan="2" | &nbsp; '''Break'''
 
 
|- style="font-size:11pt"
 
|style="color:#1F497D" height="25" align="center" valign="center" | 17:40-18:20
 
|  valign="center" | &nbsp;Accelerating Multi-Pattern Matching on Compressed HTTP Traffic &nbsp;&nbsp;  ''Yaron Koral, IDC'' &nbsp;&nbsp; ([[Media:OWASPIL2010-CompressedHTTPMatching-YaronKoral.pptx|Download Presentation]])
 
|  valign="center" | &nbsp;Real Life Application DoS Attacks &nbsp;&nbsp;  ''Ziv Gadot, Radware'' &nbsp;&nbsp; ([[Media:OWASPIL2010-RealLifeDoS-ZivGadot.ppt|Download Presentation]])
 
 
|- style="font-size:11pt"
 
|style="color:#1F497D" height="25" align="right" valign="center" | 18:20-19:00
 
|  valign="center" | &nbsp;Runtime Hardening &nbsp;&nbsp;  ''Erez Metula, AppSec'' &nbsp;&nbsp; ([[Media:OWASPIL2010-RuntimeHardening-ErezMetula.pdf|Download Presentation]])
 
|  valign="center" | &nbsp;Cloud Computing Security: Mapping Concepts to Practical Techniques &nbsp;&nbsp;  ''Gilad Parann-Nissany, Porticor'' &nbsp;&nbsp; ([[Media:OWASPIL2010-PracticalCloudSec-GiladParannNissany.pptx‎|Download Presentation]])
 
  
|- style="font-size:11pt"
 
|style="color:#1F497D" height="25" align="right" valign="center" | 19:00-19:05
 
|  valign="center" colspan="2"| &nbsp;'''Closing Words''' &nbsp;&nbsp; ''Ofer Maor, Hacktics - OWASP Israel Chairman''
 
 
|}
 
|}

Revision as of 20:27, 16 August 2011

08:30-09:15 Registration, Gathering and Socializing
09:15-09:30 Opening Words  

Ofer Maor - Chairman, OWASP Israel; Global Membership Committee, OWASP   

09:30-10:10 Keynote

Composite Applications Over Hybrid Clouds –Enterprise Security Challenges of the IT Supply Chain

Dr. Ethan Hadar - Senior Vice President Corporate Technical Strategy, CA

  Track #1 Track #2
10:15-11:00 Finding Security in Misery of Others

Amichai Shulman - CTO, Imperva

Temporal Race Conditions

Shay Chen - CTO, Hacktics Advanced Security Center, Ernst & Young

11:00-11:15   Coffee Break
10:15-11:00 Building an Effective SDLC Program - Case Study

Guy Bejerano - CSO, Liveperson

Ofer Maor - CTO, Seeker Security

Space-Time Tradeoffs in Software-Based Deep Packet Inspection

Yotam Harchol, IDC

11:00-11:15   Coffee Break