This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Template:OWASP IL 2013 Agenda"

From OWASP
Jump to: navigation, search
m (Fixed link)
m (formatting)
Line 1: Line 1:
{| class="wikitable" style="border-width: 1px; border-style: solid; border-color: #1F497D; font-size:11pt; height:25px;" cellpadding=5 align="center"  
+
{| class="wikitable" style="border-width: 1px; border-style: solid; border-color: #1F497D; background-color:white; font-size:11pt; height:25px;" cellpadding=5 align="center"  
| style="color:#1F497D; width:105px; height:40px;" | 8:30 - 9:00
+
| style="color:#1F497D; width:105px; font-size:10pt;" | 8:30 - 9:00
| colspan=2 style="font-size:12pt" | Registration, Gathering & Networking
+
| colspan="2" style="font-size:12pt;  height:40px;" | Registration, Gathering & Networking
 
|-
 
|-
| style="color:#1F497D; width:105px; height:40px;" | 9:00 - 9:30
+
| style="color:#1F497D; width:105px; font-size:10pt;" | 9:00 - 9:30
| colspan=2 | '''Opening Words'''
+
| colspan="2" | '''Opening Words'''
 
''Ofer Maor - Chairman, OWASP Israel; Global Membership Committee, OWASP'' <br> ''Dr. Anat Bremler-Barr, Efi Arazi School of Computer Science, IDC''
 
''Ofer Maor - Chairman, OWASP Israel; Global Membership Committee, OWASP'' <br> ''Dr. Anat Bremler-Barr, Efi Arazi School of Computer Science, IDC''
 
|-
 
|-
| style="color:#1F497D; width:105px; height:40px;" | 9:30 - 10:10
+
| style="color:#1F497D; width:105px; font-size:10pt;" | 9:30 - 10:10
| colspan=2 style="font-size:12pt" | '''Keynote'''
+
| colspan="2" style="font-size:12pt" | '''Keynote'''
 
|-
 
|-
| style="color:#1F497D; width:105px; height:40px;" | 10:15 - 11:00
+
| style="color:#1F497D; width:105px; font-size:10pt;" | 10:15 - 11:00
| colspan=2 | '''[[OWASP_Israel_2013_Presentations#Evolution of online banking attack techniques|Evolution of online banking attack techniques]]'''  
+
| colspan="2" | '''[[OWASP_Israel_2013_Presentations#Evolution of online banking attack techniques|Evolution of online banking attack techniques]]'''  
 
''Amit Klein, CTO, Imperva''
 
''Amit Klein, CTO, Imperva''
 
|-
 
|-
| style="color:#1F497D; width:105px; height:40px;" | 11:00 - 11:15
+
| style="color:#1F497D; width:105px; font-size:10pt;" | 11:00 - 11:15
| colspan=2 style="font-size:12pt" | Coffee Break
+
| colspan="2" style="font-size:12pt; height:40px;" | Coffee Break
 
|-
 
|-
 
| &nbsp;
 
| &nbsp;
| style="width:600px;" | <u>'''Track #1'''</u>
+
| style="width:600px; font-size:12pt; height:40px;"| <u>'''Track #1'''</u>
| style="width:600px;" | <u>'''Track #2'''</u>
+
| style="width:600px; font-size:12pt; height:40px;"| <u>'''Track #2'''</u>
 
|-
 
|-
| style="color:#1F497D; width:105px; height:40px;" | 11:15 - 12:00
+
| style="color:#1F497D; width:105px; font-size:10pt;" | 11:15 - 12:00
 
| style="vertical-align:top;" | '''[[OWASP_Israel_2013_Presentations#Get Ready for the Next Big Wave of Attacks: Hacking of Leading CMS Systems|Get Ready for the Next Big Wave of Attacks: <br>Hacking of Leading CMS Systems]]'''  
 
| style="vertical-align:top;" | '''[[OWASP_Israel_2013_Presentations#Get Ready for the Next Big Wave of Attacks: Hacking of Leading CMS Systems|Get Ready for the Next Big Wave of Attacks: <br>Hacking of Leading CMS Systems]]'''  
 
''Maty Siman, CTO, Checkmarx''
 
''Maty Siman, CTO, Checkmarx''
Line 28: Line 28:
 
''Lior Israel, Software Architect, Retalix''
 
''Lior Israel, Software Architect, Retalix''
 
|-
 
|-
| style="color:#1F497D; width:105px; height:40px;" | 12:00 - 12:30
+
| style="color:#1F497D; width:105px; font-size:10pt;" | 12:00 - 12:30
 
| style="vertical-align:top;" | '''[[OWASP_Israel_2013_Presentations#Utilizing Popular Websites for Malicious Purposes Using RDI|Utilizing Popular Websites for Malicious Purposes Using RDI]]'''  
 
| style="vertical-align:top;" | '''[[OWASP_Israel_2013_Presentations#Utilizing Popular Websites for Malicious Purposes Using RDI|Utilizing Popular Websites for Malicious Purposes Using RDI]]'''  
 
''Daniel Chechik, Security Researcher, Trustwave SpiderLabs'' <br>
 
''Daniel Chechik, Security Researcher, Trustwave SpiderLabs'' <br>
Line 35: Line 35:
 
''Avi Douglen, Security Architect, Independent''
 
''Avi Douglen, Security Architect, Independent''
 
|-
 
|-
| style="color:#1F497D; width:105px; height:40px;" | 12:30 - 13:30
+
| style="color:#1F497D; width:105px; font-size:10pt;" | 12:30 - 13:30
| colspan=2 style="font-size:12pt" | Lunch Break
+
| colspan="2" style="font-size:12pt; height:40px;" | Lunch Break
 
|-
 
|-
| style="color:#1F497D; width:105px; height:40px;" | 13:30 - 14:15
+
| style="color:#1F497D; width:105px; font-size:10pt;" | 13:30 - 14:15
 
| style="vertical-align:top;" | '''[[OWASP_Israel_2013_Presentations#Invisibility Purge - Manipulating Properties Of Invisible & Dormant Asp.Net Controls|Invisibility Purge -<br>Manipulating Properties Of Invisible & Dormant Asp.Net Controls]]'''  
 
| style="vertical-align:top;" | '''[[OWASP_Israel_2013_Presentations#Invisibility Purge - Manipulating Properties Of Invisible & Dormant Asp.Net Controls|Invisibility Purge -<br>Manipulating Properties Of Invisible & Dormant Asp.Net Controls]]'''  
 
''Shay Chen, CTO, Ernst & Young (Hacktics) ''
 
''Shay Chen, CTO, Ernst & Young (Hacktics) ''
Line 44: Line 44:
 
'' Yaniv Simsolo, Senior Consultant, Comsec Consulting ''
 
'' Yaniv Simsolo, Senior Consultant, Comsec Consulting ''
 
|-
 
|-
| style="color:#1F497D; width:105px; height:40px;" | 14:15 - 15:00
+
| style="color:#1F497D; width:105px; font-size:10pt;" | 14:15 - 15:00
 
| style="vertical-align:top;" | '''[[OWASP_Israel_2013_Presentations#The ReFrameworker Android runtime manipulator – Pentesting Android apps like a king|The ReFrameworker Android runtime manipulator –<br> Pentesting Android apps like a king]]'''  
 
| style="vertical-align:top;" | '''[[OWASP_Israel_2013_Presentations#The ReFrameworker Android runtime manipulator – Pentesting Android apps like a king|The ReFrameworker Android runtime manipulator –<br> Pentesting Android apps like a king]]'''  
 
''Erez Metula, AppSec Labs ''
 
''Erez Metula, AppSec Labs ''
Line 50: Line 50:
 
''Mirit Kagarlitsky, Head of System Analysis, Israeli National Cyber Bureau ''
 
''Mirit Kagarlitsky, Head of System Analysis, Israeli National Cyber Bureau ''
 
|-
 
|-
| style="color:#1F497D; width:105px; height:40px;" | 15:00 - 15:15
+
| style="color:#1F497D; width:105px; font-size:10pt;" | 15:00 - 15:15
| colspan=2 style="font-size:12pt" | Coffee Break
+
| colspan="2" style="font-size:12pt; height:40px;" | Coffee Break
 
|-
 
|-
| style="color:#1F497D; width:105px; height:40px;" | 15:15 - 16:00
+
| style="color:#1F497D; width:105px; font-size:10pt;" | 15:15 - 16:00
 
| style="vertical-align:top;" | '''[[OWASP_Israel_2013_Presentations#A Game of Pwns: Pwning iPhone application security assessment using the iNalyzer framework|A Game of Pwns: <br>Pwning iPhone application security assessment using the iNalyzer framework]]'''  
 
| style="vertical-align:top;" | '''[[OWASP_Israel_2013_Presentations#A Game of Pwns: Pwning iPhone application security assessment using the iNalyzer framework|A Game of Pwns: <br>Pwning iPhone application security assessment using the iNalyzer framework]]'''  
 
''Chilik Tamir, Chief Scientist, AppSec Labs ''
 
''Chilik Tamir, Chief Scientist, AppSec Labs ''
Line 59: Line 59:
 
''Or Katz, Principal Security Researcher, Akamai Technologies ''
 
''Or Katz, Principal Security Researcher, Akamai Technologies ''
 
|-
 
|-
| style="color:#1F497D; width:105px; height:40px;" | 16:00 - 16:30
+
| style="color:#1F497D; width:105px; font-size:10pt;" | 16:00 - 16:30
 
| style="vertical-align:top;" | '''[[OWASP_Israel_2013_Presentations#Automatic trust based segregation for content providers on mobile devices|Automatic trust based segregation for content providers on mobile devices]]'''  
 
| style="vertical-align:top;" | '''[[OWASP_Israel_2013_Presentations#Automatic trust based segregation for content providers on mobile devices|Automatic trust based segregation for content providers on mobile devices]]'''  
 
''Oren Poleg, IDC ''
 
''Oren Poleg, IDC ''
Line 65: Line 65:
 
'' Irene Abezgauz, Product Manager, Quotium ''
 
'' Irene Abezgauz, Product Manager, Quotium ''
 
|-
 
|-
| style="color:#1F497D; width:105px; height:40px;" | 16:30 - 17:00
+
| style="color:#1F497D; width:105px; font-size:10pt;" | 16:30 - 17:00
| colspan=2 | '''[[OWASP_Israel_2013_Presentations#Your mobile device in the service of the malicious hacker (Live Demo)|Your mobile device in the service of the malicious hacker (Live Demo)]]'''  
+
| colspan="2" | '''[[OWASP_Israel_2013_Presentations#Your mobile device in the service of the malicious hacker (Live Demo)|Your mobile device in the service of the malicious hacker (Live Demo)]]'''  
 
'' Adi Sharabani, CEO, Skycure ''
 
'' Adi Sharabani, CEO, Skycure ''
 
|-
 
|-
| style="color:#1F497D; width:105px; height:40px;" | 17:00 - 17:05   
+
| style="color:#1F497D; width:105px; font-size:10pt;" | 17:00 - 17:05   
| colspan=2 | '''End Notes'''
+
| colspan="2" | '''End Notes'''
 
''Ofer Maor - Chairman, OWASP Israel; Global Membership Committee, OWASP ''
 
''Ofer Maor - Chairman, OWASP Israel; Global Membership Committee, OWASP ''
 
|-
 
|-
 
|}
 
|}

Revision as of 23:28, 23 September 2013

8:30 - 9:00 Registration, Gathering & Networking
9:00 - 9:30 Opening Words

Ofer Maor - Chairman, OWASP Israel; Global Membership Committee, OWASP
Dr. Anat Bremler-Barr, Efi Arazi School of Computer Science, IDC

9:30 - 10:10 Keynote
10:15 - 11:00 Evolution of online banking attack techniques

Amit Klein, CTO, Imperva

11:00 - 11:15 Coffee Break
  Track #1 Track #2
11:15 - 12:00 Get Ready for the Next Big Wave of Attacks:
Hacking of Leading CMS Systems

Maty Siman, CTO, Checkmarx

STDD - The protection you REALLY need

Nir Valtman, R&D CSO, Retalix
Lior Israel, Software Architect, Retalix

12:00 - 12:30 Utilizing Popular Websites for Malicious Purposes Using RDI

Daniel Chechik, Security Researcher, Trustwave SpiderLabs
Anat Davidi, Security Researcher, Trustwave SpiderLabs

Spam, Death Threats, and Other Abuses of Online Communities

Avi Douglen, Security Architect, Independent

12:30 - 13:30 Lunch Break
13:30 - 14:15 Invisibility Purge -
Manipulating Properties Of Invisible & Dormant Asp.Net Controls

Shay Chen, CTO, Ernst & Young (Hacktics)

Delivering Security in Continuous Delivery Environment

Yaniv Simsolo, Senior Consultant, Comsec Consulting

14:15 - 15:00 The ReFrameworker Android runtime manipulator –
Pentesting Android apps like a king

Erez Metula, AppSec Labs

Designing a national defense strategy
for DDoS applications and volume attacks

Mirit Kagarlitsky, Head of System Analysis, Israeli National Cyber Bureau

15:00 - 15:15 Coffee Break
15:15 - 16:00 A Game of Pwns:
Pwning iPhone application security assessment using the iNalyzer framework

Chilik Tamir, Chief Scientist, AppSec Labs

Enhancing Web Application Defense Using Big Data

Or Katz, Principal Security Researcher, Akamai Technologies

16:00 - 16:30 Automatic trust based segregation for content providers on mobile devices

Oren Poleg, IDC

From Obscurity to Pop Culture - Evolution of Application Security

Irene Abezgauz, Product Manager, Quotium

16:30 - 17:00 Your mobile device in the service of the malicious hacker (Live Demo)

Adi Sharabani, CEO, Skycure

17:00 - 17:05 End Notes

Ofer Maor - Chairman, OWASP Israel; Global Membership Committee, OWASP