This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Template:OWASP IL 2013 Agenda"
Avi Douglen (talk | contribs) m (formatting) |
Avi Douglen (talk | contribs) m (more formatting) |
||
Line 1: | Line 1: | ||
{| class="wikitable" style="border-width: 1px; border-style: solid; border-color: #1F497D; background-color:white; font-size:11pt; height:25px;" cellpadding=5 align="center" | {| class="wikitable" style="border-width: 1px; border-style: solid; border-color: #1F497D; background-color:white; font-size:11pt; height:25px;" cellpadding=5 align="center" | ||
| style="color:#1F497D; width:105px; font-size:10pt;" | 8:30 - 9:00 | | style="color:#1F497D; width:105px; font-size:10pt;" | 8:30 - 9:00 | ||
− | | colspan="2" style="font-size:12pt; height:40px;" | Registration, Gathering & Networking | + | | colspan="2" style="font-size:12pt; height:40px;" | '''Registration, Gathering & Networking''' |
|- | |- | ||
| style="color:#1F497D; width:105px; font-size:10pt;" | 9:00 - 9:30 | | style="color:#1F497D; width:105px; font-size:10pt;" | 9:00 - 9:30 | ||
Line 15: | Line 15: | ||
|- | |- | ||
| style="color:#1F497D; width:105px; font-size:10pt;" | 11:00 - 11:15 | | style="color:#1F497D; width:105px; font-size:10pt;" | 11:00 - 11:15 | ||
− | | colspan="2" style="font-size:12pt; height:40px;" | Coffee Break | + | | colspan="2" style="font-size:12pt; height:40px;" | '''Coffee Break''' |
|- | |- | ||
| | | | ||
Line 36: | Line 36: | ||
|- | |- | ||
| style="color:#1F497D; width:105px; font-size:10pt;" | 12:30 - 13:30 | | style="color:#1F497D; width:105px; font-size:10pt;" | 12:30 - 13:30 | ||
− | | colspan="2" style="font-size:12pt; height:40px;" | Lunch Break | + | | colspan="2" style="font-size:12pt; height:40px;" | '''Lunch Break''' |
|- | |- | ||
| style="color:#1F497D; width:105px; font-size:10pt;" | 13:30 - 14:15 | | style="color:#1F497D; width:105px; font-size:10pt;" | 13:30 - 14:15 | ||
Line 51: | Line 51: | ||
|- | |- | ||
| style="color:#1F497D; width:105px; font-size:10pt;" | 15:00 - 15:15 | | style="color:#1F497D; width:105px; font-size:10pt;" | 15:00 - 15:15 | ||
− | | colspan="2" style="font-size:12pt; height:40px;" | Coffee Break | + | | colspan="2" style="font-size:12pt; height:40px;" | '''Coffee Break''' |
|- | |- | ||
| style="color:#1F497D; width:105px; font-size:10pt;" | 15:15 - 16:00 | | style="color:#1F497D; width:105px; font-size:10pt;" | 15:15 - 16:00 |
Revision as of 23:30, 23 September 2013
8:30 - 9:00 | Registration, Gathering & Networking | |
9:00 - 9:30 | Opening Words
Ofer Maor - Chairman, OWASP Israel; Global Membership Committee, OWASP | |
9:30 - 10:10 | Keynote | |
10:15 - 11:00 | Evolution of online banking attack techniques
Amit Klein, CTO, Imperva | |
11:00 - 11:15 | Coffee Break | |
Track #1 | Track #2 | |
11:15 - 12:00 | Get Ready for the Next Big Wave of Attacks: Hacking of Leading CMS Systems Maty Siman, CTO, Checkmarx |
STDD - The protection you REALLY need
Nir Valtman, R&D CSO, Retalix |
12:00 - 12:30 | Utilizing Popular Websites for Malicious Purposes Using RDI
Daniel Chechik, Security Researcher, Trustwave SpiderLabs |
Spam, Death Threats, and Other Abuses of Online Communities
Avi Douglen, Security Architect, Independent |
12:30 - 13:30 | Lunch Break | |
13:30 - 14:15 | Invisibility Purge - Manipulating Properties Of Invisible & Dormant Asp.Net Controls Shay Chen, CTO, Ernst & Young (Hacktics) |
Delivering Security in Continuous Delivery Environment
Yaniv Simsolo, Senior Consultant, Comsec Consulting |
14:15 - 15:00 | The ReFrameworker Android runtime manipulator – Pentesting Android apps like a king Erez Metula, AppSec Labs |
Designing a national defense strategy for DDoS applications and volume attacks Mirit Kagarlitsky, Head of System Analysis, Israeli National Cyber Bureau |
15:00 - 15:15 | Coffee Break | |
15:15 - 16:00 | A Game of Pwns: Pwning iPhone application security assessment using the iNalyzer framework Chilik Tamir, Chief Scientist, AppSec Labs |
Enhancing Web Application Defense Using Big Data
Or Katz, Principal Security Researcher, Akamai Technologies |
16:00 - 16:30 | Automatic trust based segregation for content providers on mobile devices
Oren Poleg, IDC |
From Obscurity to Pop Culture - Evolution of Application Security
Irene Abezgauz, Product Manager, Quotium |
16:30 - 17:00 | Your mobile device in the service of the malicious hacker (Live Demo)
Adi Sharabani, CEO, Skycure | |
17:00 - 17:05 | End Notes
Ofer Maor - Chairman, OWASP Israel; Global Membership Committee, OWASP |