This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Template:OWASP IL 2011 Agenda"
Line 28: | Line 28: | ||
|- style="border-style: solid; border-width: 1px;font-size:10pt" | |- style="border-style: solid; border-width: 1px;font-size:10pt" | ||
|style="border-style: solid; border-width: 1px;color:#1F497D" height="25" align="center" valign="center" | 11:15-12:00 | |style="border-style: solid; border-width: 1px;color:#1F497D" height="25" align="center" valign="center" | 11:15-12:00 | ||
− | | align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5 | '''[[OWASP_Israel_2011_Presentations#Building_an_Effective_SDLC_Program_-_Case_Study|Building an Effective SDLC Program - Case Study]]''' | + | | align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5 | '''[[OWASP_Israel_2011_Presentations#Building_an_Effective_SDLC_Program_-_Case_Study|Building an Effective SDLC Program - Case Study]]''' ''([[Media:OWASPIL2011-Bejerano-Maor-BuildingSDLC.pptx|Presentation]])'' |
''Guy Bejerano, CSO, Liveperson''<br> | ''Guy Bejerano, CSO, Liveperson''<br> | ||
''Ofer Maor, CTO, Seeker Security'' | ''Ofer Maor, CTO, Seeker Security'' | ||
Line 37: | Line 37: | ||
| align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5 | '''[[OWASP_Israel_2011_Presentations#All_Your_Mobile_Applications_Are_Belong_to_Us|All Your Mobile Applications Are Belong to Us]]''' | | align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5 | '''[[OWASP_Israel_2011_Presentations#All_Your_Mobile_Applications_Are_Belong_to_Us|All Your Mobile Applications Are Belong to Us]]''' | ||
''Itzik Kotler, CTO, Security Art'' | ''Itzik Kotler, CTO, Security Art'' | ||
− | | align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5 | '''[[OWASP_Israel_2011_Presentations#Glass_Box_Testing_-_Think_Inside_the_Box|Glass Box Testing - Thinking Inside the Box]]''' | + | | align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5 | '''[[OWASP_Israel_2011_Presentations#Glass_Box_Testing_-_Think_Inside_the_Box|Glass Box Testing - Thinking Inside the Box]]''' ''([[Media:OWASPIL2011-OmriWeisman-GlassBoxTesting.ppt|Presentation]])'' |
''Omri Weisman, Manager, Security Research Group, IBM'' | ''Omri Weisman, Manager, Security Research Group, IBM'' | ||
|- style="border-style: solid; border-width: 1px;font-size:10pt" | |- style="border-style: solid; border-width: 1px;font-size:10pt" | ||
Line 44: | Line 44: | ||
|- style="border-style: solid; border-width: 1px;font-size:10pt" | |- style="border-style: solid; border-width: 1px;font-size:10pt" | ||
|style="border-style: solid; border-width: 1px;color:#1F497D" height="25" align="center" valign="center" | 13:45-14:30 | |style="border-style: solid; border-width: 1px;color:#1F497D" height="25" align="center" valign="center" | 13:45-14:30 | ||
− | | align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5 | '''[[OWASP_Israel_2011_Presentations#CMS_and_Other_Giants_.E2.80.93_The_Nightmare_of_AppSec_Testing|CMS And Other Giants - The Nightmare of AppSec Testing]]''' | + | | align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5 | '''[[OWASP_Israel_2011_Presentations#CMS_and_Other_Giants_.E2.80.93_The_Nightmare_of_AppSec_Testing|CMS And Other Giants - The Nightmare of AppSec Testing]]''' ''([[Media:OWASPIL2011-IreneAbezgauz-CMSnOtherGiants.pptx|Presentation]])'' |
''Irene Abezgauz, Product Manager, Seeker Security'' | ''Irene Abezgauz, Product Manager, Seeker Security'' | ||
− | | align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5 | '''[[OWASP_Israel_2011_Presentations#Agile_.2B_SDL_.E2.80.93_Concepts_and_Misconceptions|Agile + SDL – Concepts and Misconceptions]]''' | + | | align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5 | '''[[OWASP_Israel_2011_Presentations#Agile_.2B_SDL_.E2.80.93_Concepts_and_Misconceptions|Agile + SDL – Concepts and Misconceptions]]''' ''([[Media:OWASPIL2011-Douglen-Bregman-AgileSDL.ppt|Presentation]])'' |
''Avi Douglen, Security Architect, Aware Security''<br> | ''Avi Douglen, Security Architect, Aware Security''<br> | ||
''Nir Bregman, Senior Project Manager, HP Software'' | ''Nir Bregman, Senior Project Manager, HP Software'' | ||
Line 67: | Line 67: | ||
|- style="font-size:10pt" | |- style="font-size:10pt" | ||
|style="border-style: solid; border-width: 1px;color:#1F497D" align="center" valign="center" | 16:15-17:00 | |style="border-style: solid; border-width: 1px;color:#1F497D" align="center" valign="center" | 16:15-17:00 | ||
− | | align=center valign="center" colspan="2" style="border-style: solid; border-width: 1px;font-size:11pt" | '''[[OWASP_Israel_2011_Presentations#The_Bank_Job_II|The Bank Job II]]''' | + | | align=center valign="center" colspan="2" style="border-style: solid; border-width: 1px;font-size:11pt" | '''[[OWASP_Israel_2011_Presentations#The_Bank_Job_II|The Bank Job II]]''' ''([http://prezi.com/wipzu1bkfwnd/the-bank-job-ii-owasp-2011-final/ Presentation])'' |
''Adi Sharabani, Cross-Rational Security Strategy and Architecture, IBM'' | ''Adi Sharabani, Cross-Rational Security Strategy and Architecture, IBM'' | ||
|- style="font-size:10pt" | |- style="font-size:10pt" |
Revision as of 21:41, 20 September 2011
08:30-09:00 | Registration, Gathering and Socializing | |
09:00-09:30 | Opening Words (Presentation) Ofer Maor - Chairman, OWASP Israel; Global Membership Committee, OWASP | |
09:30-10:10 | Keynote
Composite Applications Over Hybrid Clouds – Enterprise Security Challenges of the IT Supply Chain
| |
Track #1 | Track #2 | |
10:15-11:00 | Finding Security in Misery of Others Amichai Shulman, CTO, Imperva |
Temporal Session Race Conditions (Presentation)
Shay Chen, CTO, Hacktics Advanced Security Center, Ernst & Young |
11:00-11:15 | Coffee Break | |
11:15-12:00 | Building an Effective SDLC Program - Case Study (Presentation)
Guy Bejerano, CSO, Liveperson |
Space-Time Tradeoffs in Software-Based Deep Packet Inspection
Yotam Harchol, IDC |
12:00-12:45 | All Your Mobile Applications Are Belong to Us
Itzik Kotler, CTO, Security Art |
Glass Box Testing - Thinking Inside the Box (Presentation)
Omri Weisman, Manager, Security Research Group, IBM |
12:45-13:45 | Lunch Break | |
13:45-14:30 | CMS And Other Giants - The Nightmare of AppSec Testing (Presentation)
Irene Abezgauz, Product Manager, Seeker Security |
Agile + SDL – Concepts and Misconceptions (Presentation)
Avi Douglen, Security Architect, Aware Security |
14:30-15:15 | When Crypto Goes Wrong
Erez Metula, Founder, AppSec Labs |
Advanced Techniques & Tools for Testing Binary Protocols
Chilik Tamir, Information Security Architect, AppSec Labs |
15:15-15:30 | Coffee Break | |
15:30-16:15 | Security Testing of RESTful Services
Ofer Shezaf, Head of AppSec Research, HP |
Hey, What’s your App doing on my (Smart)Phone?
Shay Zalalichin, CTO, Comsec Consulting |
16:15-17:00 | The Bank Job II (Presentation)
Adi Sharabani, Cross-Rational Security Strategy and Architecture, IBM | |
17:00-17:05 | End Notes
Ofer Maor - Chairman, OWASP Israel; Global Membership Committee, OWASP |