This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "2012 BASC Agenda"
From OWASP
Tom Conner (talk | contribs) |
Tom Conner (talk | contribs) |
||
| Line 62: | Line 62: | ||
|- | |- | ||
| style="width:10%; background:#7B8ABD" align="center" | 10:00-10:50 || style="width:30%; background:#BC857A" align="center" | | | style="width:10%; background:#7B8ABD" align="center" | 10:00-10:50 || style="width:30%; background:#BC857A" align="center" | | ||
| − | + | {{2012_BASC:Presentaton_Agenda_Template|Presentation|Metasploit Hands On Presentation|Roy Wattanasin}} | |
| style="width:30%; background:#BCA57A" align="center" | | | style="width:30%; background:#BCA57A" align="center" | | ||
|- | |- | ||
| style="width:10%; background:#7B8ABD" align="center" | 11:00-11:50 || style="width:30%; background:#CFA49B" align="center" | | | style="width:10%; background:#7B8ABD" align="center" | 11:00-11:50 || style="width:30%; background:#CFA49B" align="center" | | ||
| − | + | {{2012_BASC:Presentaton_Agenda_Template|Presentation|Metasploit Hands On Presentation|Roy Wattanasin}} | |
| style="width:30%; background:#DFC799" align="center" | | | style="width:30%; background:#DFC799" align="center" | | ||
| − | + | {{2012_BASC:Presentaton_Agenda_Template|Presentation|NSA Configuration Guidelines for Baseline Security|Ray Cote}} | |
| + | {{2012_BASC:Presentaton_Agenda_Template|Presentation|Quick Response Mal-Codes|Jim Weiler}} | ||
|- | |- | ||
| style="width:10%; background:#7B8ABD" align="center" | 12:00-13:00 || colspan="2" style="width:80%; background:#D2D2D2" align="center" | | | style="width:10%; background:#7B8ABD" align="center" | 12:00-13:00 || colspan="2" style="width:80%; background:#D2D2D2" align="center" | | ||
| Line 77: | Line 78: | ||
|- | |- | ||
| style="width:10%; background:#7B8ABD" align="center" | 13:00-13:50 || style="width:30%; background:#BC857A" align="center" | | | style="width:10%; background:#7B8ABD" align="center" | 13:00-13:50 || style="width:30%; background:#BC857A" align="center" | | ||
| − | + | {{2012_BASC:Presentaton_Agenda_Template|Presentation|Fuzzing and You: How to Automate Whitebox Testing|Michael Anderson}} | |
| style="width:30%; background:#BCA57A" align="center" | | | style="width:30%; background:#BCA57A" align="center" | | ||
| Line 83: | Line 84: | ||
|- | |- | ||
| style="width:10%; background:#7B8ABD" align="center" | 14:00-14:50 || style="width:30%; background:#CFA49B" align="center" | | | style="width:10%; background:#7B8ABD" align="center" | 14:00-14:50 || style="width:30%; background:#CFA49B" align="center" | | ||
| − | + | {{2012_BASC:Presentaton_Agenda_Template|Presentation|Pitfalls of Secure SDLC and How to Succeed With Automation|Rohit Sethi & Ehsan Foroughi }} | |
| style="width:30%; background:#DFC799" align="center" | | | style="width:30%; background:#DFC799" align="center" | | ||
| − | |||
|- | |- | ||
| style="width:10%; background:#7B8ABD" align="center" | 15:00-15:50 || style="width:30%; background:#BC857A" align="center" | | | style="width:10%; background:#7B8ABD" align="center" | 15:00-15:50 || style="width:30%; background:#BC857A" align="center" | | ||
| + | {{2012_BASC:Presentaton_Agenda_Template|Presentation|Streamlining Application Vulnerability Management: Communication Between Development and Security Teams|John Dickson}} | ||
| style="width:30%; background:#BCA57A" align="center" | | | style="width:30%; background:#BCA57A" align="center" | | ||
| Line 93: | Line 94: | ||
|- | |- | ||
| style="width:10%; background:#7B8ABD" align="center" | 16:00-16:50 || style="width:30%; background:#CFA49B" align="center" | | | style="width:10%; background:#7B8ABD" align="center" | 16:00-16:50 || style="width:30%; background:#CFA49B" align="center" | | ||
| − | + | {{2012_BASC:Presentaton_Agenda_Template|Presentation|Secure Password Storage: Increasing Resistance to Brute Force Attacks|John Steven, Chandu Ketkar, Scott Matsumoto}} | |
| style="width:30%; background:#DFC799" align="center" | | | style="width:30%; background:#DFC799" align="center" | | ||
Revision as of 02:26, 25 September 2012
2012 BASC: Home Agenda Presentations Speakers
Sponsorships Available
|
Platinum Sponsors (Listed Alphabetically)
|
Silver Sponsors (Listed Alphabetically)
|
|
|
|
|
|
We kindly thank our sponsors for their support. Please help us keep future BASCs free by viewing and visiting all of our sponsors.
Sponsorships are still available.
Agenda
|
Boston Application Security Conference, Saturday, October 13, 2012 | ||
|---|---|---|
| 8:30-9:30 |
Breakfast and Registration | |
| 09:00-09:50 |
Keynote | |
| Track 1 Horace Mann Room |
Track 2 Deborah Sampson / Paul Thomas Room | |
| 10:00-10:50 | ||
| 11:00-11:50 | ||
| 12:00-13:00 | ||
| 13:00-13:50 |
| |
| 14:00-14:50 | ||
| 15:00-15:50 | ||
| 16:00-16:50 | ||
| 17:00-17:30 | ||
| 17:30-18:30 |
| |
| 18:30-19:00 |
| |



