This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Front Range OWASP Conference 2013/Presentations"

From OWASP
Jump to: navigation, search
(Created page with "Presentation details coming soon.")
 
Line 1: Line 1:
Presentation details coming soon.
+
=='''10:00-10:45'''==
 +
'''Title: '''DevFu: The inner ninja in every application developer
 +
 
 +
'''Speaker: '''Danny Chrastil
 +
 
 +
'''Track: '''Technical
 +
 
 +
'''Abstract: '''
 +
 
 +
 
 +
'''Title: '''SIP Based Cloud Instances
 +
 
 +
'''Speaker: '''Gregory Disney-Leugers
 +
 
 +
'''Track: '''Deep Dive
 +
 
 +
'''Abstract: '''
 +
 
 +
 
 +
'''Title: '''Measuring Best Security Practices With Open SAMM
 +
 
 +
'''Speaker: '''Alan Jex
 +
 
 +
'''Track: '''Management
 +
 
 +
'''Abstract: '''
 +
 
 +
 
 +
'''Title: '''Electronic Discovery for System Administrators
 +
 
 +
'''Speaker: '''Russell Shumway
 +
 
 +
'''Track: '''Executive/Legal
 +
 
 +
'''Abstract: '''
 +
 
 +
 
 +
 
 +
=='''10:55-11:40'''==
 +
'''Title: '''Adventures in Large Scale HTTP Header Abuse
 +
 
 +
'''Speaker: '''Zachary Wolff
 +
 
 +
'''Track: '''Technical
 +
 
 +
'''Abstract: '''
 +
 
 +
 
 +
'''Title: '''How Malware Attacks Web Applications
 +
 
 +
'''Speaker: '''Casey Smith
 +
 
 +
'''Track: '''Deep Dive
 +
 
 +
'''Abstract: '''
 +
 
 +
 
 +
'''Title: '''Software Assurance Improvements Through Innovation and Collaboration
 +
 
 +
'''Speaker: '''Kevin Greene
 +
 
 +
'''Track: '''Management
 +
 
 +
'''Abstract: '''
 +
 
 +
 
 +
'''Title: '''CISPA Why Privacy Advocates This Legislation
 +
 
 +
'''Speaker: '''Maureen Donohue Feinroth
 +
 
 +
'''Track: '''Executive/Legal
 +
 
 +
'''Abstract: '''
 +
 
 +
 
 +
 
 +
 
 +
=='''12:40-13:25'''==
 +
'''Title:'''Angry Cars: Hack the "Car as Platform"
 +
 
 +
'''Speaker:'''Aaron Weaver
 +
 
 +
'''Room/Track:'''Technical
 +
 
 +
'''Abstract:'''
 +
 
 +
 
 +
'''Title: '''Top Ten Web Application Defenses
 +
 
 +
'''Speaker: '''Jim Manico
 +
 
 +
'''Track: '''Deep Dive
 +
 
 +
'''Abstract: '''
 +
 
 +
 
 +
'''Title: '''Using SaaS and the Cloud to Secure the SDLC
 +
 
 +
'''Speaker: '''Andrew Earle
 +
 
 +
'''Track: '''Management
 +
 
 +
'''Abstract: '''
 +
 
 +
 
 +
'''Title: '''Digital Bounty Hunters - Decoding Bug Bounty Programs
 +
 
 +
'''Speaker: '''Jon Rose
 +
 
 +
'''Track: '''Executive/Legal
 +
 
 +
'''Abstract: '''
 +
 
 +
 
 +
 
 +
=='''13:35-14:20'''==
 +
'''Title: '''Real World Cloud Application Security
 +
 
 +
'''Speaker: '''Jason Chan
 +
 
 +
'''Track: '''Technical
 +
 
 +
'''Abstract: '''
 +
 
 +
 
 +
'''Title: '''A Demo of and Preventing XSS in .NET Applications
 +
 
 +
'''Speaker: '''Larry Conklin
 +
 
 +
'''Track: '''Deep Dive
 +
 
 +
'''Abstract: '''
 +
 
 +
 
 +
'''Title: '''Defending Desktop (.NET/C#) Applications: Mitigating in the Dark
 +
 
 +
'''Speaker: '''Jon McCoy
 +
 
 +
'''Track: '''Management
 +
 
 +
'''Abstract: '''
 +
 
 +
 
 +
'''Title: '''Crafting a Plan for When Security Fails
 +
 
 +
'''Speaker: '''Robert Lelewski
 +
 
 +
'''Track: '''Executive/Legal
 +
 
 +
'''Abstract: '''
 +
 
 +
 
 +
 
 +
=='''14:30-15:15'''==
 +
'''Title: '''DevOps and Security: It's Happening. Right Now.
 +
 
 +
'''Speaker: '''Helen Bravo
 +
 
 +
'''Track: '''Technical
 +
 
 +
'''Abstract: '''
 +
 
 +
 
 +
'''Title: '''Data Mining a Mountain of Zero Day Vulnerabilities
 +
 
 +
'''Speaker: '''Joe Brady
 +
 
 +
'''Track: '''Deep Dive
 +
 
 +
'''Abstract: '''
 +
 
 +
 
 +
'''Title: '''Linking Security to Business Value in the Customer Service Industry
 +
 
 +
'''Speaker: '''Dan Rojas
 +
 
 +
'''Track: '''Management
 +
 
 +
'''Abstract: '''
 +
 
 +
 
 +
'''Title: '''Information Control: The Critical Need for a Defensible Position - Securing the Information Ecosystem
 +
 
 +
'''Speaker: '''Tom Glanville
 +
 
 +
'''Track: '''Executive/Legal
 +
 
 +
'''Abstract: '''

Revision as of 21:35, 7 March 2013

10:00-10:45

Title: DevFu: The inner ninja in every application developer

Speaker: Danny Chrastil

Track: Technical

Abstract:


Title: SIP Based Cloud Instances

Speaker: Gregory Disney-Leugers

Track: Deep Dive

Abstract:


Title: Measuring Best Security Practices With Open SAMM

Speaker: Alan Jex

Track: Management

Abstract:


Title: Electronic Discovery for System Administrators

Speaker: Russell Shumway

Track: Executive/Legal

Abstract:


10:55-11:40

Title: Adventures in Large Scale HTTP Header Abuse

Speaker: Zachary Wolff

Track: Technical

Abstract:


Title: How Malware Attacks Web Applications

Speaker: Casey Smith

Track: Deep Dive

Abstract:


Title: Software Assurance Improvements Through Innovation and Collaboration

Speaker: Kevin Greene

Track: Management

Abstract:


Title: CISPA Why Privacy Advocates This Legislation

Speaker: Maureen Donohue Feinroth

Track: Executive/Legal

Abstract:



12:40-13:25

Title:Angry Cars: Hack the "Car as Platform"

Speaker:Aaron Weaver

Room/Track:Technical

Abstract:


Title: Top Ten Web Application Defenses

Speaker: Jim Manico

Track: Deep Dive

Abstract:


Title: Using SaaS and the Cloud to Secure the SDLC

Speaker: Andrew Earle

Track: Management

Abstract:


Title: Digital Bounty Hunters - Decoding Bug Bounty Programs

Speaker: Jon Rose

Track: Executive/Legal

Abstract:


13:35-14:20

Title: Real World Cloud Application Security

Speaker: Jason Chan

Track: Technical

Abstract:


Title: A Demo of and Preventing XSS in .NET Applications

Speaker: Larry Conklin

Track: Deep Dive

Abstract:


Title: Defending Desktop (.NET/C#) Applications: Mitigating in the Dark

Speaker: Jon McCoy

Track: Management

Abstract:


Title: Crafting a Plan for When Security Fails

Speaker: Robert Lelewski

Track: Executive/Legal

Abstract:


14:30-15:15

Title: DevOps and Security: It's Happening. Right Now.

Speaker: Helen Bravo

Track: Technical

Abstract:


Title: Data Mining a Mountain of Zero Day Vulnerabilities

Speaker: Joe Brady

Track: Deep Dive

Abstract:


Title: Linking Security to Business Value in the Customer Service Industry

Speaker: Dan Rojas

Track: Management

Abstract:


Title: Information Control: The Critical Need for a Defensible Position - Securing the Information Ecosystem

Speaker: Tom Glanville

Track: Executive/Legal

Abstract: