This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Template:OWASP IL 2011 Agenda"
Line 12: | Line 12: | ||
'''[[OWASP_Israel_2011_Presentations#Composite_Applications_Over_Hybrid_Clouds_.E2.80.93_Enterprise_Security_Challenges_of_the_IT_Supply_Chain|Composite Applications Over Hybrid Clouds –Enterprise Security Challenges of the IT Supply Chain]]''' | '''[[OWASP_Israel_2011_Presentations#Composite_Applications_Over_Hybrid_Clouds_.E2.80.93_Enterprise_Security_Challenges_of_the_IT_Supply_Chain|Composite Applications Over Hybrid Clouds –Enterprise Security Challenges of the IT Supply Chain]]''' | ||
− | ''Dr. Ethan Hadar | + | ''Dr. Ethan Hadar, Senior Vice President Corporate Technical Strategy, CA'' |
|- style="border-style: solid; border-width: 1px;font-size:12pt" | |- style="border-style: solid; border-width: 1px;font-size:12pt" | ||
|style="border-style: solid; border-width: 1px;color:#1F497D" height="30" align="right" valign="center" | | |style="border-style: solid; border-width: 1px;color:#1F497D" height="30" align="right" valign="center" | | ||
Line 21: | Line 21: | ||
|style="border-style: solid; border-width: 1px;color:#1F497D" height="25" align="center" valign="center" | 10:15-11:00 | |style="border-style: solid; border-width: 1px;color:#1F497D" height="25" align="center" valign="center" | 10:15-11:00 | ||
| align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" | '''[[OWASP_Israel_2011_Presentations#Finding_Security_in_Misery_of_Others|Finding Security in Misery of Others]]''' | | align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" | '''[[OWASP_Israel_2011_Presentations#Finding_Security_in_Misery_of_Others|Finding Security in Misery of Others]]''' | ||
− | ''Amichai Shulman | + | ''Amichai Shulman, CTO, Imperva'' |
| align="center" valign="top" style="font-size:11pt" | '''[[OWASP_Israel_2011_Presentations#Temporal_Session_Race_Conditions|Temporal Race Conditions]]''' | | align="center" valign="top" style="font-size:11pt" | '''[[OWASP_Israel_2011_Presentations#Temporal_Session_Race_Conditions|Temporal Race Conditions]]''' | ||
− | ''Shay Chen | + | ''Shay Chen, CTO, Hacktics Advanced Security Center, Ernst & Young'' |
|- style="border-style: solid; border-width: 1px;font-size:10pt" | |- style="border-style: solid; border-width: 1px;font-size:10pt" | ||
|style="border-style: solid; border-width: 1px;color:#1F497D" height="40" align="center" valign="center" | 11:00-11:15 | |style="border-style: solid; border-width: 1px;color:#1F497D" height="40" align="center" valign="center" | 11:00-11:15 | ||
Line 30: | Line 30: | ||
|style="border-style: solid; border-width: 1px;color:#1F497D" height="25" align="center" valign="center" | 11:15-12:00 | |style="border-style: solid; border-width: 1px;color:#1F497D" height="25" align="center" valign="center" | 11:15-12:00 | ||
| align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5 | '''[[OWASP_Israel_2011_Presentations#Building_an_Effective_SDLC_Program_-_Case_Study|Building an Effective SDLC Program - Case Study]]''' | | align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5 | '''[[OWASP_Israel_2011_Presentations#Building_an_Effective_SDLC_Program_-_Case_Study|Building an Effective SDLC Program - Case Study]]''' | ||
− | ''Guy Bejerano | + | ''Guy Bejerano, CSO, Liveperson'' |
− | ''Ofer Maor | + | ''Ofer Maor, CTO, Seeker Security'' |
| align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5 | '''[[OWASP_Israel_2011_Presentations#Space-Time_Tradeoffs_in_Software-Based_Deep_Packet_Inspection|Space-Time Tradeoffs in Software-Based Deep Packet Inspection]]''' | | align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5 | '''[[OWASP_Israel_2011_Presentations#Space-Time_Tradeoffs_in_Software-Based_Deep_Packet_Inspection|Space-Time Tradeoffs in Software-Based Deep Packet Inspection]]''' | ||
''Yotam Harchol, IDC'' | ''Yotam Harchol, IDC'' | ||
Line 38: | Line 38: | ||
|style="border-style: solid; border-width: 1px;color:#1F497D" height="25" align="center" valign="center" | 12:00-12:45 | |style="border-style: solid; border-width: 1px;color:#1F497D" height="25" align="center" valign="center" | 12:00-12:45 | ||
| align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5 | '''[[OWASP_Israel_2011_Presentations#All_Your_Mobile_Applications_Are_Belong_to_Us|All Your Mobile Applications Are Belong to Us]]''' | | align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5 | '''[[OWASP_Israel_2011_Presentations#All_Your_Mobile_Applications_Are_Belong_to_Us|All Your Mobile Applications Are Belong to Us]]''' | ||
− | ''Itzik Kotler | + | ''Itzik Kotler, CTO, Security Art'' |
| align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5 | '''[[OWASP_Israel_2011_Presentations#Glass_Box_Testing_-_Think_Inside_the_Box|Glass Box Testing - Thinking Inside the Box]]''' | | align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5 | '''[[OWASP_Israel_2011_Presentations#Glass_Box_Testing_-_Think_Inside_the_Box|Glass Box Testing - Thinking Inside the Box]]''' | ||
− | ''Omri Weisman | + | ''Omri Weisman, Manager, Security Research Group, IBM'' |
|- style="border-style: solid; border-width: 1px;font-size:10pt" | |- style="border-style: solid; border-width: 1px;font-size:10pt" | ||
|style="border-style: solid; border-width: 1px;color:#1F497D" height="40" align="center" valign="center" | 12:45-13:45 | |style="border-style: solid; border-width: 1px;color:#1F497D" height="40" align="center" valign="center" | 12:45-13:45 | ||
Line 46: | Line 46: | ||
|- style="border-style: solid; border-width: 1px;font-size:10pt" | |- style="border-style: solid; border-width: 1px;font-size:10pt" | ||
|style="border-style: solid; border-width: 1px;color:#1F497D" height="25" align="center" valign="center" | 13:45-14:30 | |style="border-style: solid; border-width: 1px;color:#1F497D" height="25" align="center" valign="center" | 13:45-14:30 | ||
− | | align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5 | '''[[OWASP_Israel_2011_Presentations# | + | | align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5 | '''[[OWASP_Israel_2011_Presentations#CMS_and_Other_Giants_.E2.80.93_The_Nightmare_of_AppSec_Testing|CMS And Other Giants - The Nightmare of AppSec Testing]]''' |
− | '' | + | ''Irene Abezgauz, Product Manager, Seeker Security'' |
| align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5 | '''[[OWASP_Israel_2011_Presentations#LECTURELINK|LECTURENAME]]''' | | align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5 | '''[[OWASP_Israel_2011_Presentations#LECTURELINK|LECTURENAME]]''' | ||
''SPEAKERNAME'' | ''SPEAKERNAME'' |
Revision as of 21:25, 16 August 2011
08:30-09:15 | Registration, Gathering and Socializing | |
09:15-09:30 | Opening Words
Ofer Maor - Chairman, OWASP Israel; Global Membership Committee, OWASP | |
09:30-10:10 | Keynote
Composite Applications Over Hybrid Clouds –Enterprise Security Challenges of the IT Supply Chain Dr. Ethan Hadar, Senior Vice President Corporate Technical Strategy, CA | |
Track #1 | Track #2 | |
10:15-11:00 | Finding Security in Misery of Others
Amichai Shulman, CTO, Imperva |
Temporal Race Conditions
Shay Chen, CTO, Hacktics Advanced Security Center, Ernst & Young |
11:00-11:15 | Coffee Break | |
11:15-12:00 | Building an Effective SDLC Program - Case Study
Guy Bejerano, CSO, Liveperson Ofer Maor, CTO, Seeker Security |
Space-Time Tradeoffs in Software-Based Deep Packet Inspection
Yotam Harchol, IDC |
12:00-12:45 | All Your Mobile Applications Are Belong to Us
Itzik Kotler, CTO, Security Art |
Glass Box Testing - Thinking Inside the Box
Omri Weisman, Manager, Security Research Group, IBM |
12:45-13:45 | Lunch Break | |
13:45-14:30 | CMS And Other Giants - The Nightmare of AppSec Testing
Irene Abezgauz, Product Manager, Seeker Security |
LECTURENAME
SPEAKERNAME |
14:30-15:15 | LECTURENAME
SPEAKERNAME |
LECTURENAME
SPEAKERNAME |
15:15-15:30 | Coffee Break | |
15:30-16:15 | LECTURENAME
SPEAKERNAME |
LECTURENAME
SPEAKERNAME |
16:15-17:00 | Opening Words
Ofer Maor - Chairman, OWASP Israel; Global Membership Committee, OWASP | |
17:00-17:05 | End Notes
Ofer Maor - Chairman, OWASP Israel; Global Membership Committee, OWASP |