This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Template:OWASP IL 2012 Agenda"
| Line 30: | Line 30: | ||
| align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5 | '''FYI: You've Got LFI''' | | align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5 | '''FYI: You've Got LFI''' | ||
''Tal Beery, Web Security Research Team Leader, Imperva'' | ''Tal Beery, Web Security Research Team Leader, Imperva'' | ||
| − | | align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5 | '''I>S+D! – Integrated Application Security Testing (IAST), Beyond SAST/DAST ''' | + | | align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5 | '''I>S+D! – Integrated Application Security Testing (IAST),<br> Beyond SAST/DAST ''' |
''Ofer Maor, CTO, Quotium'' | ''Ofer Maor, CTO, Quotium'' | ||
|- style="border-style: solid; border-width: 1px;font-size:10pt" | |- style="border-style: solid; border-width: 1px;font-size:10pt" | ||
| − | |style="border-style: solid; border-width: 1px;color:#1F497D" height="25" align="center" valign="center" | 12:00-12: | + | |style="border-style: solid; border-width: 1px;color:#1F497D" height="25" align="center" valign="center" | 12:00-12:30 |
| − | | align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5 | ''' | + | | align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5 | '''Zip It! – Owning Archived File Uploads ''' |
| − | '' | + | ''Alex Landa, Security Researcher, IBM'' |
| − | | align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5 | ''' | + | | align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5 | '''Secure Development Lifecycle – Lessons Learned ''' |
| − | '' | + | ''Boaz Shunami, Founder, Komodo Consulting'' |
|- style="border-style: solid; border-width: 1px;font-size:10pt" | |- style="border-style: solid; border-width: 1px;font-size:10pt" | ||
| − | |style="border-style: solid; border-width: 1px;color:#1F497D" height="40" align="center" valign="center" | 12: | + | |style="border-style: solid; border-width: 1px;color:#1F497D" height="40" align="center" valign="center" | 12:30-13:30 |
| valign="center" align="center" style="border-style: solid; border-width: 1px;font-size:12pt" colspan="2" | '''Lunch Break''' | | valign="center" align="center" style="border-style: solid; border-width: 1px;font-size:12pt" colspan="2" | '''Lunch Break''' | ||
|- style="border-style: solid; border-width: 1px;font-size:10pt" | |- style="border-style: solid; border-width: 1px;font-size:10pt" | ||
| − | |style="border-style: solid; border-width: 1px;color:#1F497D" height="25" align="center" valign="center" | 13: | + | |style="border-style: solid; border-width: 1px;color:#1F497D" height="25" align="center" valign="center" | 13:30-14:15 |
| align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5 | '''[[OWASP_Israel_2011_Presentations#CMS_and_Other_Giants_.E2.80.93_The_Nightmare_of_AppSec_Testing|CMS And Other Giants - The Nightmare of AppSec Testing]]''' ''([[Media:OWASPIL2011-IreneAbezgauz-CMSnOtherGiants.pptx|Presentation]])'' | | align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5 | '''[[OWASP_Israel_2011_Presentations#CMS_and_Other_Giants_.E2.80.93_The_Nightmare_of_AppSec_Testing|CMS And Other Giants - The Nightmare of AppSec Testing]]''' ''([[Media:OWASPIL2011-IreneAbezgauz-CMSnOtherGiants.pptx|Presentation]])'' | ||
''Irene Abezgauz, Product Manager, Seeker Security'' | ''Irene Abezgauz, Product Manager, Seeker Security'' | ||
Revision as of 18:46, 27 August 2012
| 08:45-09:15 | Registration, Gathering, Socializing & Networking | |
| 09:15-09:45 | Opening Words Ofer Maor - Chairman, OWASP Israel; Global Membership Committee, OWASP | |
| 09:45-10:10 | OWASP Top 10 Hebrew Edition
Or Katz, OWASP Israel Board | |
| Breakers (Track #1) | Defenders (Track #2) | |
| 10:15-11:00 | The Diviner – Digital Clairvoyance: Getting an Insight Into Server Code & Memory Using Blackbox Techniques Shay Chen, CTO, Hacktics ASC, Ernst & Young |
Case Study - Providing Secure SDLC in an Agile Environment Using ESAPI
Yair Rovek, Security Specialist, Liveperson |
| 11:00-11:15 | Coffee Break | |
| 11:15-12:00 | FYI: You've Got LFI
Tal Beery, Web Security Research Team Leader, Imperva |
I>S+D! – Integrated Application Security Testing (IAST), Beyond SAST/DAST Ofer Maor, CTO, Quotium |
| 12:00-12:30 | Zip It! – Owning Archived File Uploads
Alex Landa, Security Researcher, IBM |
Secure Development Lifecycle – Lessons Learned
Boaz Shunami, Founder, Komodo Consulting |
| 12:30-13:30 | Lunch Break | |
| 13:30-14:15 | CMS And Other Giants - The Nightmare of AppSec Testing (Presentation)
Irene Abezgauz, Product Manager, Seeker Security |
Agile + SDL – Concepts and Misconceptions (Presentation)
Avi Douglen, Security Architect, Aware Security |
| 14:30-15:15 | When Crypto Goes Wrong (Presentation)
Erez Metula, Founder, AppSec Labs |
Advanced Techniques & Tools for Testing Binary Protocols (Presentation)
Chilik Tamir, Information Security Architect, AppSec Labs |
| 15:15-15:30 | Coffee Break | |
| 15:30-16:15 | Security Testing of RESTful Services (Presentation)
Ofer Shezaf, Head of AppSec Research, HP |
Hey, What’s your App doing on my (Smart)Phone? (Presentation)
Shay Zalalichin, CTO, Comsec Consulting |
| 16:15-17:00 | The Bank Job II (Presentation)
Adi Sharabani, Cross-Rational Security Strategy and Architecture, IBM | |
| 17:00-17:05 | End Notes
Ofer Maor - Chairman, OWASP Israel; Global Membership Committee, OWASP | |