This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "2011 BASC Agenda"
From OWASP
Tom Conner (talk | contribs) |
Tom Conner (talk | contribs) |
||
Line 65: | Line 65: | ||
{{2011_BASC:Presentaton_Agenda_Template|Presentation|Reversing Web Applications|Andrew Wilson}} | {{2011_BASC:Presentaton_Agenda_Template|Presentation|Reversing Web Applications|Andrew Wilson}} | ||
| style="width:30%; background:#BCA57A" align="center" | | | style="width:30%; background:#BCA57A" align="center" | | ||
− | {{2011_BASC:Presentaton_Agenda_Template|Presentation| | + | {{2011_BASC:Presentaton_Agenda_Template|Presentation|Secure Mobile Application Architecture|John Carmichel}} |
|- | |- | ||
| style="width:10%; background:#9BA8CF" align="center" | 11:00-11:50 || style="width:30%; background:#CFA49B" align="center" | | | style="width:10%; background:#9BA8CF" align="center" | 11:00-11:50 || style="width:30%; background:#CFA49B" align="center" | | ||
Line 90: | Line 90: | ||
|- | |- | ||
| style="width:10%; background:#7B8ABD" align="center" | 14:00-14:50 || style="width:30%; background:#CFA49B" align="center" | | | style="width:10%; background:#7B8ABD" align="center" | 14:00-14:50 || style="width:30%; background:#CFA49B" align="center" | | ||
− | + | {{2011_BASC:Presentaton_Agenda_Template|Presentation|Secrets Of Static Binary Analysis|Christien Rioux}} | |
| style="width:30%; background:#DFC799" align="center" | | | style="width:30%; background:#DFC799" align="center" | | ||
[[2011_BASC_Presentations|Presentation]] | [[2011_BASC_Presentations|Presentation]] | ||
|- | |- | ||
| style="width:10%; background:#7B8ABD" align="center" | 15:00-15:50 || style="width:30%; background:#BC857A" align="center" | | | style="width:10%; background:#7B8ABD" align="center" | 15:00-15:50 || style="width:30%; background:#BC857A" align="center" | | ||
− | + | {{2011_BASC:Presentaton_Agenda_Template|Presentation|Binary Instrumentation of Programs|Robert Cohn}} | |
| style="width:30%; background:#DFC799" align="center" | | | style="width:30%; background:#DFC799" align="center" | | ||
− | + | {{2011_BASC:Presentaton_Agenda_Template|Presentation|Preventing Data Breaches from Vulnerable Web Applications using Data Provenance|Anirudh Ramachandran}} | |
|- | |- | ||
| style="width:10%; background:#7B8ABD" align="center" | 16:00-16:50 || style="width:30%; background:#CFA49B" align="center" | | | style="width:10%; background:#7B8ABD" align="center" | 16:00-16:50 || style="width:30%; background:#CFA49B" align="center" | | ||
[[2011_BASC_Presentations|Presentation]] | [[2011_BASC_Presentations|Presentation]] | ||
| style="width:30%; background:#DFC799" align="center" | | | style="width:30%; background:#DFC799" align="center" | | ||
− | + | {{2011_BASC:Presentaton_Agenda_Template|Presentation|There’s an App for That|Michael Anderson}} | |
|- | |- | ||
Revision as of 19:00, 3 October 2011
2011 BASC: Home Agenda Presentations Speakers
Platinum Sponsors (Listed Alphabetically)
|
Gold Sponsors (Listed Alphabetically)
Silver Sponsors (Listed Alphabetically)
|
We kindly thank our sponsors for their support. Please help us keep future BASCs free by viewing and visiting all of our sponsors.
Sponsorships are still available.
Agenda
Saturday, October 8 | |||
---|---|---|---|
8:30-9:30 |
Breakfast and Registration
| ||
09:00-09:50 | |||
Track 1 Horace Mann Room |
Track 2 Deborah Sampson / Paul Thomas Room | ||
10:00-10:50 | |||
11:00-11:50 | |||
12:00-13:00 |
Lunch | ||
13:00-13:50 | |||
| |||
14:00-14:50 | |||
15:00-15:50 | |||
16:00-16:50 | |||
17:00-17:30 |
Social Time | ||
17:30-18:30 |
Expert Panel
| ||
18:30-19:00 |
Wrap Up
|