Difference between revisions of "FROC Schedule Draft"
m (→Notes) |
(→Notes) |
||
| Line 37: | Line 37: | ||
|- | |- | ||
| − | | style="width:10%; background:#7B8ABD" | || colspan="1" style="width:45%; background:#BC857A" | '''Tech Track - | + | | style="width:10%; background:#7B8ABD" | || colspan="1" style="width:45%; background:#BC857A" | '''Tech Track - Zenith Room 640''' |
| − | | colspan="1" style="width:45%; background:#BCA57A" | '''Management Track - | + | | colspan="1" style="width:45%; background:#BCA57A" | '''Management Track - Senate Chamber''' |
<!-- | style="width:22%; background:#C6E2FF" | '''Management / Exec Track: Room 3''' --> | <!-- | style="width:22%; background:#C6E2FF" | '''Management / Exec Track: Room 3''' --> | ||
|- | |- | ||
| Line 45: | Line 45: | ||
''Cameron Morris'' | ''Cameron Morris'' | ||
| − | | style="width:45%; background:#BCA57A" align="left" | | + | | style="width:45%; background:#BCA57A" align="left" | Managing IT Risk in a Cloud Environment |
| − | '' | + | ''Karl Steinkamp'' |
<!-- | style="width:22%; background:#C6E2FF" align="left" | TBD | <!-- | style="width:22%; background:#C6E2FF" align="left" | TBD | ||
| Line 58: | Line 58: | ||
''Robert Rowley'' | ''Robert Rowley'' | ||
| − | | style="width:45%; background:#BCA57A" align="left" | | + | | style="width:45%; background:#BCA57A" align="left" | PCI vs Risk Management |
| − | '' | + | ''Doug Landoll'' |
<!-- | style="width:22%; background:#C6E2FF" align="left" | Securing Data from the Web Tier ''Mike Fleck'' --> | <!-- | style="width:22%; background:#C6E2FF" align="left" | Securing Data from the Web Tier ''Mike Fleck'' --> | ||
| Line 70: | Line 70: | ||
''Favorite tools and techniques - pen-testing, static analysis, code reviews'' | ''Favorite tools and techniques - pen-testing, static analysis, code reviews'' | ||
| − | | style="width:45%; background:#BCA57A" align="left" | | + | | style="width:45%; background:#BCA57A" align="left" | Securing Data from the Web Tier |
| − | '' | + | ''Mike Fleck'' |
<!-- | style="width:22%; background:#C6E2FF" align="left" | TBD | <!-- | style="width:22%; background:#C6E2FF" align="left" | TBD | ||
| Line 82: | Line 82: | ||
''Adam Hills'' | ''Adam Hills'' | ||
| − | | style="width:45%; background:#BCA57A" align="left" | | + | | style="width:45%; background:#BCA57A" align="left" | Web Session Intelligence |
| − | '' | + | |
| + | ''LAZ'' | ||
<!-- | style="width:22%; background:#C6E2FF" align="left" | TBD | <!-- | style="width:22%; background:#C6E2FF" align="left" | TBD | ||
| Line 97: | Line 98: | ||
| − | | style="width:45%; background:#BCA57A" align="left" | | + | | style="width:45%; background:#BCA57A" align="left" | A Scalable Secure Development Program |
| − | '' | + | ''Rajiv Sharma'' |
<!-- | <!-- | ||
Revision as of 19:37, 1 March 2012
Agenda and Presentations: 22 March 2012
Notes
- Can't serve breakfast at 7:30, or can we? James' coffee idea?
- Need to change room names to real room names
The agenda follows the successful OWASP conference multi track format, with opening keynotes and presentations in the main room, split tracks in the middle of the day, and closing panel discussions back in the main room.
| March 22nd, 2012 | |||
|---|---|---|---|
| 07:30-08:30 | Registration and Continental Breakfast in the Sponsor Expo Room | ||
| 08:30-08:35 | Welcome to SnowFROC 2012 Conference
Probably need min 10 minutes just to explain layout, sched, and restroom locations :-) OWASP Denver and OWASP Boulder Chapter Leaders | ||
| 08:35-09:35 |
Keynote: John Pirc, Co-Author of "Cybercrime and Espionage: An Analysis of Subversive Multi-Vector Threats" | ||
| 09:35-10:00 | State of OWASP
Matt Tesauro | ||
| 10:00-10:20 | Nuke this unless Matt needs more time. Distribute the time for lunch? | ||
| 10:20-10:30 | Break - Expo | ||
| Tech Track - Zenith Room 640 | Management Track - Senate Chamber | ||
| 10:30-11:15 | OWASP Passfault
Cameron Morris |
Managing IT Risk in a Cloud Environment
Karl Steinkamp | |
| 11:15-12:00 | State of Web Security: Monitored Attacks
Robert Rowley |
PCI vs Risk Management
Doug Landoll | |
| 12:00-13:00 | Lunch - Expo | ||
| 13:00-13:50 | Panel Discussion
Favorite tools and techniques - pen-testing, static analysis, code reviews |
Securing Data from the Web Tier
Mike Fleck
| |
| 13:50-14:40 | Gray, the new black: Gray box vulnerability testing
Adam Hills |
Web Session Intelligence
LAZ | |
| 14:40-15:00 | BREAK | ||
| 15:00-15:50 | "The Mobile Top 10"
Mike Zussman
|
A Scalable Secure Development Program
Rajiv Sharma
| |
| 15:50-16:30 | End of Conference Panel Discussion:
Topic: The Crystal Ball and the 2-headed Calf - What's on the Horizon and Why Does It Seem So Unnatural? Moderator: Steve Kosten or Andy Lewis Panelists: Laz, Matt Tesauro, John Pirc, Tanner Coltrin, Steve Kosten, others
| ||
| 16:30-17:30 | Wrap up, vendor raffles! | ||
On Deck
- Oh heck lightning talks to be invoked if a speaker gets hit by a bus - Andy, Steve, James, Craig have both mngmnt & tech 10 min spews prepared
- Bruce Nordquist and Dan Weiske - OWASP Top 10 vs. NIST 800-53A rev1 controls (Bruce & Dan on panels?)
- Rajiv Sharma - A Scalable Secure Environment (panelist?)
- Rapid 7?
- Bleeding-edge wild-card?