This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "HackDub 2012 Day 2"

From OWASP
Jump to: navigation, search
Line 56: Line 56:
 
| style="width:40%" valign="middle" height="30" bgcolor="#CCCCEE" align="center" colspan="0" |  
 
| style="width:40%" valign="middle" height="30" bgcolor="#CCCCEE" align="center" colspan="0" |  
 
|-
 
|-
| style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 13:00 - 14:00
+
| style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 13:00 - 14:30
 
| style="width:27%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Facebook Secure Coding Practices
 
| style="width:27%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Facebook Secure Coding Practices
 
| style="width:23%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Ryan Patterson, Facebook Engineer
 
| style="width:23%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Ryan Patterson, Facebook Engineer
 
| style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | The talk is for programmers who want to write secure code. We'll go over 12 examples of security vulnerabilities and play spot-the-vulnerability with real examples that have been found in Facebook's source code.
 
| style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | The talk is for programmers who want to write secure code. We'll go over 12 examples of security vulnerabilities and play spot-the-vulnerability with real examples that have been found in Facebook's source code.
 
|-
 
|-
 +
| style="width:10%" valign="middle" height="30" bgcolor="#CCCCEE" align="center" colspan="0" | 14:30 - 14:45
 +
| style="width:27%" valign="middle" height="30" bgcolor="#CCCCEE" align="center" colspan="0" | Coffee Break
 +
| style="width:23%" valign="middle" height="30" bgcolor="#CCCCEE" align="center" colspan="0" |
 +
| style="width:40%" valign="middle" height="30" bgcolor="#CCCCEE" align="center" colspan="0" |
 
|-
 
|-
| style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 13:00 - 16:45
+
| style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 14:45 - 16:45
| style="width:27%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Round 2
+
| style="width:27%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Reviewing Code with Agnitio
| style="width:23%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" |  
+
| style="width:23%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Dave Rook, Realex Payments
| style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" |  
+
| style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | A tool to help developers and security professionals conduct manual security code reviews in a consistent and repeatable way. Agnitio aims to replace the adhoc nature of manual security code review documentation, create an audit trail and reporting.
 
|-
 
|-
 +
| style="width:10%" valign="middle" height="30" bgcolor="#CCCCEE" align="center" colspan="0" | 16:45 - 17:00
 +
| style="width:27%" valign="middle" height="30" bgcolor="#CCCCEE" align="center" colspan="0" | Coffee Break
 +
| style="width:23%" valign="middle" height="30" bgcolor="#CCCCEE" align="center" colspan="0" |
 +
| style="width:40%" valign="middle" height="30" bgcolor="#CCCCEE" align="center" colspan="0" |
 
|-
 
|-
| style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 16:45 - 17:00
+
| style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 17:00 - 18:45
| style="width:27%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Winners Announcement
+
| style="width:27%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Testing the Security of your Apps
| style="width:23%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | OWASP + GTUG Team
+
| style="width:23%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Eoin Keary, BCC Risk Advisory
| style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" |  
+
| style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | This talk will cover different methodologies to test the security of your web applications using open source methodologies.
 +
|-
 +
| style="width:10%" valign="middle" height="30" bgcolor="#CCCCEE" align="center" colspan="0" | 18:45 - 19:00
 +
| style="width:27%" valign="middle" height="30" bgcolor="#CCCCEE" align="center" colspan="0" | Wrap Up & Closure
 +
| style="width:23%" valign="middle" height="30" bgcolor="#CCCCEE" align="center" colspan="0" |
 +
| style="width:40%" valign="middle" height="30" bgcolor="#CCCCEE" align="center" colspan="0" |  
 
|}
 
|}

Revision as of 10:44, 30 June 2012

Hackdub2012-logo.png
ACTIVITY
SECURITY WORKSHOPS
Description
  • During the entire day, attendees will be able to participate in interactive workshops delivered by experts in the field on how to develop, review and test applications securely.
  • IMPORTANT: Attendees need to bring their own laptops in order to participate during the event!
  • Minimum Hardware Requirements are as follows:

- Windows/Macintosh/Linux computer with Java installed
- 1 Ghz or higher processor;
- 1 GB RAM minimum;
- Keyboard & Mouse;
- 1024x768 or higher display; and,
- Wireless Network connectivity

Time Venue
8th July 2012 Google Ireland Engineering offices - 1 Upper Grand Canal Street

Placemark on this map : http://goo.gl/ZGASA


Schedule
Time Activity Speaker Details
09:30 - 10:00 Registration & Welcome OWASP+GTUG Team
10:00 - 12:00 Ruby on Rails Secure Development Thomas Pomfret, CTO MintDigital
12:00 - 13:00 Lunch Break
13:00 - 14:30 Facebook Secure Coding Practices Ryan Patterson, Facebook Engineer The talk is for programmers who want to write secure code. We'll go over 12 examples of security vulnerabilities and play spot-the-vulnerability with real examples that have been found in Facebook's source code.
14:30 - 14:45 Coffee Break
14:45 - 16:45 Reviewing Code with Agnitio Dave Rook, Realex Payments A tool to help developers and security professionals conduct manual security code reviews in a consistent and repeatable way. Agnitio aims to replace the adhoc nature of manual security code review documentation, create an audit trail and reporting.
16:45 - 17:00 Coffee Break
17:00 - 18:45 Testing the Security of your Apps Eoin Keary, BCC Risk Advisory This talk will cover different methodologies to test the security of your web applications using open source methodologies.
18:45 - 19:00 Wrap Up & Closure