This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Template:OWASP IL 2011 Agenda"

From OWASP
Jump to: navigation, search
Line 12: Line 12:
 
'''[[OWASP_Israel_2011_Presentations#Composite_Applications_Over_Hybrid_Clouds_.E2.80.93_Enterprise_Security_Challenges_of_the_IT_Supply_Chain|Composite Applications Over Hybrid Clouds –Enterprise Security Challenges of the IT Supply Chain]]'''
 
'''[[OWASP_Israel_2011_Presentations#Composite_Applications_Over_Hybrid_Clouds_.E2.80.93_Enterprise_Security_Challenges_of_the_IT_Supply_Chain|Composite Applications Over Hybrid Clouds –Enterprise Security Challenges of the IT Supply Chain]]'''
  
''Dr. Ethan Hadar - Senior Vice President Corporate Technical Strategy, CA''
+
''Dr. Ethan Hadar, Senior Vice President Corporate Technical Strategy, CA''
 
|- style="border-style: solid; border-width: 1px;font-size:12pt"
 
|- style="border-style: solid; border-width: 1px;font-size:12pt"
 
|style="border-style: solid; border-width: 1px;color:#1F497D" height="30" align="right" valign="center" |  
 
|style="border-style: solid; border-width: 1px;color:#1F497D" height="30" align="right" valign="center" |  
Line 21: Line 21:
 
|style="border-style: solid; border-width: 1px;color:#1F497D" height="25" align="center" valign="center" | 10:15-11:00
 
|style="border-style: solid; border-width: 1px;color:#1F497D" height="25" align="center" valign="center" | 10:15-11:00
 
|  align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" | '''[[OWASP_Israel_2011_Presentations#Finding_Security_in_Misery_of_Others|Finding Security in Misery of Others]]'''
 
|  align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" | '''[[OWASP_Israel_2011_Presentations#Finding_Security_in_Misery_of_Others|Finding Security in Misery of Others]]'''
''Amichai Shulman - CTO, Imperva''
+
''Amichai Shulman, CTO, Imperva''
 
|  align="center" valign="top" style="font-size:11pt"  | '''[[OWASP_Israel_2011_Presentations#Temporal_Session_Race_Conditions|Temporal Race Conditions]]'''
 
|  align="center" valign="top" style="font-size:11pt"  | '''[[OWASP_Israel_2011_Presentations#Temporal_Session_Race_Conditions|Temporal Race Conditions]]'''
''Shay Chen - CTO, Hacktics Advanced Security Center, Ernst & Young''
+
''Shay Chen, CTO, Hacktics Advanced Security Center, Ernst & Young''
 
|- style="border-style: solid; border-width: 1px;font-size:10pt"
 
|- style="border-style: solid; border-width: 1px;font-size:10pt"
 
|style="border-style: solid; border-width: 1px;color:#1F497D" height="40" align="center" valign="center" | 11:00-11:15
 
|style="border-style: solid; border-width: 1px;color:#1F497D" height="40" align="center" valign="center" | 11:00-11:15
Line 30: Line 30:
 
|style="border-style: solid; border-width: 1px;color:#1F497D" height="25" align="center" valign="center" | 11:15-12:00
 
|style="border-style: solid; border-width: 1px;color:#1F497D" height="25" align="center" valign="center" | 11:15-12:00
 
|  align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5  | '''[[OWASP_Israel_2011_Presentations#Building_an_Effective_SDLC_Program_-_Case_Study|Building an Effective SDLC Program - Case Study]]'''
 
|  align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5  | '''[[OWASP_Israel_2011_Presentations#Building_an_Effective_SDLC_Program_-_Case_Study|Building an Effective SDLC Program - Case Study]]'''
''Guy Bejerano - CSO, Liveperson''
+
''Guy Bejerano, CSO, Liveperson''
  
''Ofer Maor - CTO, Seeker Security''
+
''Ofer Maor, CTO, Seeker Security''
 
|  align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5  | '''[[OWASP_Israel_2011_Presentations#Space-Time_Tradeoffs_in_Software-Based_Deep_Packet_Inspection|Space-Time Tradeoffs in Software-Based Deep Packet Inspection]]'''
 
|  align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5  | '''[[OWASP_Israel_2011_Presentations#Space-Time_Tradeoffs_in_Software-Based_Deep_Packet_Inspection|Space-Time Tradeoffs in Software-Based Deep Packet Inspection]]'''
 
''Yotam Harchol, IDC''
 
''Yotam Harchol, IDC''
Line 38: Line 38:
 
|style="border-style: solid; border-width: 1px;color:#1F497D" height="25" align="center" valign="center" | 12:00-12:45
 
|style="border-style: solid; border-width: 1px;color:#1F497D" height="25" align="center" valign="center" | 12:00-12:45
 
|  align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5  | '''[[OWASP_Israel_2011_Presentations#All_Your_Mobile_Applications_Are_Belong_to_Us|All Your Mobile Applications Are Belong to Us]]'''
 
|  align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5  | '''[[OWASP_Israel_2011_Presentations#All_Your_Mobile_Applications_Are_Belong_to_Us|All Your Mobile Applications Are Belong to Us]]'''
''Itzik Kotler - CTO, Security Art''
+
''Itzik Kotler, CTO, Security Art''
 
|  align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5  | '''[[OWASP_Israel_2011_Presentations#Glass_Box_Testing_-_Think_Inside_the_Box|Glass Box Testing - Thinking Inside the Box]]'''
 
|  align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5  | '''[[OWASP_Israel_2011_Presentations#Glass_Box_Testing_-_Think_Inside_the_Box|Glass Box Testing - Thinking Inside the Box]]'''
''Omri Weisman - Manager, Security Research Group, IBM''
+
''Omri Weisman, Manager, Security Research Group, IBM''
 
|- style="border-style: solid; border-width: 1px;font-size:10pt"
 
|- style="border-style: solid; border-width: 1px;font-size:10pt"
 
|style="border-style: solid; border-width: 1px;color:#1F497D" height="40" align="center" valign="center" | 12:45-13:45
 
|style="border-style: solid; border-width: 1px;color:#1F497D" height="40" align="center" valign="center" | 12:45-13:45
Line 46: Line 46:
 
|- style="border-style: solid; border-width: 1px;font-size:10pt"
 
|- style="border-style: solid; border-width: 1px;font-size:10pt"
 
|style="border-style: solid; border-width: 1px;color:#1F497D" height="25" align="center" valign="center" | 13:45-14:30
 
|style="border-style: solid; border-width: 1px;color:#1F497D" height="25" align="center" valign="center" | 13:45-14:30
|  align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5  | '''[[OWASP_Israel_2011_Presentations#LECTURELINK|LECTURENAME]]'''
+
|  align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5  | '''[[OWASP_Israel_2011_Presentations#CMS_and_Other_Giants_.E2.80.93_The_Nightmare_of_AppSec_Testing|CMS And Other Giants - The Nightmare of AppSec Testing]]'''
''SPEAKERNAME''
+
''Irene Abezgauz, Product Manager, Seeker Security''
 
|  align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5  | '''[[OWASP_Israel_2011_Presentations#LECTURELINK|LECTURENAME]]'''
 
|  align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5  | '''[[OWASP_Israel_2011_Presentations#LECTURELINK|LECTURENAME]]'''
 
''SPEAKERNAME''
 
''SPEAKERNAME''

Revision as of 21:25, 16 August 2011

08:30-09:15 Registration, Gathering and Socializing
09:15-09:30 Opening Words  

Ofer Maor - Chairman, OWASP Israel; Global Membership Committee, OWASP   

09:30-10:10 Keynote

Composite Applications Over Hybrid Clouds –Enterprise Security Challenges of the IT Supply Chain

Dr. Ethan Hadar, Senior Vice President Corporate Technical Strategy, CA

  Track #1 Track #2
10:15-11:00 Finding Security in Misery of Others

Amichai Shulman, CTO, Imperva

Temporal Race Conditions

Shay Chen, CTO, Hacktics Advanced Security Center, Ernst & Young

11:00-11:15 Coffee Break
11:15-12:00 Building an Effective SDLC Program - Case Study

Guy Bejerano, CSO, Liveperson

Ofer Maor, CTO, Seeker Security

Space-Time Tradeoffs in Software-Based Deep Packet Inspection

Yotam Harchol, IDC

12:00-12:45 All Your Mobile Applications Are Belong to Us

Itzik Kotler, CTO, Security Art

Glass Box Testing - Thinking Inside the Box

Omri Weisman, Manager, Security Research Group, IBM

12:45-13:45 Lunch Break
13:45-14:30 CMS And Other Giants - The Nightmare of AppSec Testing

Irene Abezgauz, Product Manager, Seeker Security

LECTURENAME

SPEAKERNAME

14:30-15:15 LECTURENAME

SPEAKERNAME

LECTURENAME

SPEAKERNAME

15:15-15:30 Coffee Break
15:30-16:15 LECTURENAME

SPEAKERNAME

LECTURENAME

SPEAKERNAME

16:15-17:00 Opening Words  

Ofer Maor - Chairman, OWASP Israel; Global Membership Committee, OWASP   

17:00-17:05 End Notes  

Ofer Maor - Chairman, OWASP Israel; Global Membership Committee, OWASP