This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "2014 BASC Agenda"
From OWASP
Tom Conner (talk | contribs) |
Tom Conner (talk | contribs) |
||
Line 53: | Line 53: | ||
</table> | </table> | ||
|- | |- | ||
− | | style="width:10%; background:# | + | | style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 8:30-9:30 || colspan="2" style="width:80%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 1px; border-bottom-width: 0px" align="center" | |
<span style="font-size:130%">'''Breakfast and Registration'''</span><br/> | <span style="font-size:130%">'''Breakfast and Registration'''</span><br/> | ||
provided by our Platinum Sponsor<br/> | provided by our Platinum Sponsor<br/> | ||
<span style="padding: 20px">[[File:AkamaiFasterForward.png|link=http://www.akamai.com|190x69px|Akamai]]</span> | <span style="padding: 20px">[[File:AkamaiFasterForward.png|link=http://www.akamai.com|190x69px|Akamai]]</span> | ||
|- | |- | ||
− | | style="width:10%; background:# | + | | style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 09:00-09:50 || colspan="2" style="width:80%; margin:10px; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 1px; border-bottom-width: 0px" align="center" | |
− | < | + | <span style="font-size:130%">'''Keynote'''</span><br/> |
− | '''Keynote''' | + | <span style="font-size: 150%">'''[[2014_BASC_Presentations#AppSec: How It Fits into Digital Security|AppSec: How It Fits into Digital Security]]'''</span><br/> |
− | + | <span style="font-size:130%">'''[[2014_BASC_Speakers#Jared DeMott|Dr. Jared DeMott]]'''</span><br/> | |
− | </ | ||
|- | |- | ||
− | | style="width:10%; background:# | + | | style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" | || align="center" style="width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" | '''Hawthorne'''<!--<br/>Horace Mann Room--> |
− | | align="center" style="width:30%; background:# | + | | align="center" style="width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" | '''Longfellow'''<!--<br/>Deborah Sampson / Paul Thomas Room--> |
|- | |- | ||
− | | style="width:10%; background:# | + | | style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 10:00-10:50 || style="width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | |
{{2014_BASC:Presentaton_Agenda_Template|Presentation|Why Your AppSec Experts Are Killing You|Jeff Williams }} | {{2014_BASC:Presentaton_Agenda_Template|Presentation|Why Your AppSec Experts Are Killing You|Jeff Williams }} | ||
− | | style="width:30%; background:# | + | | style="width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | |
{{2014_BASC:Presentaton_Agenda_Template|Presentation|Finding and Exploiting Access Control Vulnerabilities in Graphical User Interfaces|Collin Mulliner }} | {{2014_BASC:Presentaton_Agenda_Template|Presentation|Finding and Exploiting Access Control Vulnerabilities in Graphical User Interfaces|Collin Mulliner }} | ||
|- | |- | ||
− | | style="width:10%; background:# | + | | style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 11:00-11:50 || style="width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | |
{{2014_BASC:Presentaton_Agenda_Template|Presentation|The Intersection of Application Architecture and Security Architecture|Walt Williams}} | {{2014_BASC:Presentaton_Agenda_Template|Presentation|The Intersection of Application Architecture and Security Architecture|Walt Williams}} | ||
− | | style="width:30%; background:# | + | | style="width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | |
{{2014_BASC:Presentaton_Agenda_Template|Presentation|Why is CSP Failing? Trends and Challenges in CSP Adoption|Michael Weissbacher}} | {{2014_BASC:Presentaton_Agenda_Template|Presentation|Why is CSP Failing? Trends and Challenges in CSP Adoption|Michael Weissbacher}} | ||
|- | |- | ||
− | | style="width:10%; background:# | + | | style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 12:00-13:00 || colspan="2" style="background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 1px; border-bottom-width: 0px" align="center" | |
<span style="font-size:130%">'''Lunch'''</span><br/> | <span style="font-size:130%">'''Lunch'''</span><br/> | ||
provided by our Platinum Sponsor<br/> | provided by our Platinum Sponsor<br/> | ||
<span style="padding: 20px">[[File:Cigital.320x105.png|link=http://www.cigital.com|144x48px|Cigital]]</span> | <span style="padding: 20px">[[File:Cigital.320x105.png|link=http://www.cigital.com|144x48px|Cigital]]</span> | ||
|- | |- | ||
− | | style="width:10%; background:# | + | | style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 13:00-13:50 || style="width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | |
{{2014_BASC:Presentaton_Agenda_Template|Presentation|Mobile First AppSec: Evolving AppSec for Mobile Applications|Sagar Dongre}} | {{2014_BASC:Presentaton_Agenda_Template|Presentation|Mobile First AppSec: Evolving AppSec for Mobile Applications|Sagar Dongre}} | ||
− | | style="width:30%; background:# | + | | style="width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | |
{{2014_BASC:Presentaton_Agenda_Template|Presentation|Lean Security for Small or Medium Sized Business|Anson Gomes and Jeremy Spencer }} | {{2014_BASC:Presentaton_Agenda_Template|Presentation|Lean Security for Small or Medium Sized Business|Anson Gomes and Jeremy Spencer }} | ||
|- | |- | ||
− | | style="width:10%; background:# | + | | style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 14:00-14:50 || style="width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | |
{{2014_BASC:Presentaton_Agenda_Template|Presentation|Open Source Vulnerability Response|EMC Product Security Response Center }} | {{2014_BASC:Presentaton_Agenda_Template|Presentation|Open Source Vulnerability Response|EMC Product Security Response Center }} | ||
− | | style="width:30%; background:# | + | | style="width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | |
{{2014_BASC:Presentaton_Agenda_Template|Presentation|Code Assisted PenTest for Mobile Applications|Dinesh Shetty }} | {{2014_BASC:Presentaton_Agenda_Template|Presentation|Code Assisted PenTest for Mobile Applications|Dinesh Shetty }} | ||
|- | |- | ||
− | | style="width:10%; background:# | + | | style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 15:00-15:50 || style="width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | |
{{2014_BASC:Presentaton_Agenda_Template|Presentation|Securing The Android Apps On Your Wrist and Face|Jack Mannino and Geller Bedoya }} | {{2014_BASC:Presentaton_Agenda_Template|Presentation|Securing The Android Apps On Your Wrist and Face|Jack Mannino and Geller Bedoya }} | ||
− | + | | style="width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | | |
− | | style="width:30%; background:# | ||
{{2014_BASC:Presentaton_Agenda_Template|Presentation|Securing Native Big Data Deployments|Steve Markey }} | {{2014_BASC:Presentaton_Agenda_Template|Presentation|Securing Native Big Data Deployments|Steve Markey }} | ||
|- | |- | ||
− | | style="width:10%; background:# | + | | style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 16:00-16:50 || style="width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | |
{{2014_BASC:Presentaton_Agenda_Template|Presentation|Using the OCTAVE Allegro Framework to Model Application Risks and Countermeasures|George Ehrhorn }} | {{2014_BASC:Presentaton_Agenda_Template|Presentation|Using the OCTAVE Allegro Framework to Model Application Risks and Countermeasures|George Ehrhorn }} | ||
− | | style="width:30%; background:# | + | | style="width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | |
{{2014_BASC:Presentaton_Agenda_Template|Presentation|How a Hacker Views Your Web Site|Patrick Laverty}} | {{2014_BASC:Presentaton_Agenda_Template|Presentation|How a Hacker Views Your Web Site|Patrick Laverty}} | ||
|- | |- | ||
|- | |- | ||
− | | style="width:10%; background:# | + | | style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 17:00-17:30 || colspan="2" style="width:30%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width: 1px; border-right-width: 1px; border-left-width: 1px; border-bottom-width: 0px" align="center" | |
<span style="font-size:130%">'''Social Time'''</span><br/> | <span style="font-size:130%">'''Social Time'''</span><br/> | ||
provided by our Platinum Sponsor<br/> | provided by our Platinum Sponsor<br/> | ||
<span style="padding: 20px">[[File:EMC-no-tag blue RGB.jpg|link=http://www.emc.com|111x36px|EMC]]</span> | <span style="padding: 20px">[[File:EMC-no-tag blue RGB.jpg|link=http://www.emc.com|111x36px|EMC]]</span> | ||
|- | |- | ||
− | | style="width:10%; background:# | + | | style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 1px" align="center" | 17:30-18:30 || colspan="2" style="width:30%; background:#background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 1px; border-bottom-width: 1px" align="center" | |
<br/> | <br/> | ||
− | '''Closing'''<br/> | + | <span style="font-size:130%">'''Closing'''</span><br/> |
− | <span style="font-size: | + | <span style="font-size:140%">'''[[2014_BASC_Speakers#Josh Corman|Josh Corman]]'''</span><br/> |
<br/> | <br/> | ||
<span style="font-size:130%">'''Raffle'''</span><br/> | <span style="font-size:130%">'''Raffle'''</span><br/> |
Latest revision as of 01:59, 14 October 2014
2014 BASC: Home Agenda Presentations Speakers
We kindly thank our sponsors for their support. All slots are full.
Please help us keep BASC free by viewing and visiting all of our sponsors.
| ||||
---|---|---|---|---|
8:30-9:30 | ||||
09:00-09:50 |
Keynote | |||
Hawthorne | Longfellow | |||
10:00-10:50 | ||||
11:00-11:50 | ||||
12:00-13:00 | ||||
13:00-13:50 | ||||
14:00-14:50 | ||||
15:00-15:50 | ||||
16:00-16:50 | ||||
17:00-17:30 | ||||
17:30-18:30 |
|