This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Front Range OWASP Conference 2016/Schedule"
(Created page with "==Agenda and Presentations: 18 February 2016== The agenda follows the successful OWASP conference multi track format, with opening keynotes and presentations in the main room...") |
(Added schedule including some bogus titles, presenters, and a disclaimer.) |
||
| Line 1: | Line 1: | ||
| − | + | __NOTOC__ | |
The agenda follows the successful OWASP conference multi track format, with opening keynotes and presentations in the main room & broadcast throughout the facility, split tracks in the middle of the day, and closing panel discussions at the end of the day. | The agenda follows the successful OWASP conference multi track format, with opening keynotes and presentations in the main room & broadcast throughout the facility, split tracks in the middle of the day, and closing panel discussions at the end of the day. | ||
| + | '''NOTE: schedule is subject to change.''' | ||
{| style="width:86%" border="0" align="center" | {| style="width:86%" border="0" align="center" | ||
| Line 12: | Line 13: | ||
''OWASP Denver and OWASP Boulder Chapter Leaders'' | ''OWASP Denver and OWASP Boulder Chapter Leaders'' | ||
|- | |- | ||
| − | | style="width:10%; background:#7B8ABD" | 08:45-09: | + | | style="width:10%; background:#7B8ABD" | 08:45-09:00 || colspan="3" style="width:80%; background:#F2F2F2" align="center" | |
'''State of OWASP''' | '''State of OWASP''' | ||
''Tom Brennan'' | ''Tom Brennan'' | ||
|- | |- | ||
| − | | style="width:10%; background:#7B8ABD" | 09: | + | | style="width:10%; background:#7B8ABD" | 09:00-10:00 || colspan="3" style="width:80%; background:#F2F2F2" align="center" | '''Keynote: Red Dawn for AppSec - Where are the Wolverines?''' |
''[https://www.whitehatsec.com/about-me_jeremiah.html Jeremiah Grossman], CTO of WhiteHat Security'' | ''[https://www.whitehatsec.com/about-me_jeremiah.html Jeremiah Grossman], CTO of WhiteHat Security'' | ||
| Line 23: | Line 24: | ||
|- | |- | ||
| − | | style="width:10%; background:#7B8ABD" | 10: | + | | style="width:10%; background:#7B8ABD" | 10:00-10:30 || colspan="3" style="width:80%; background:#C2C2C2" align="left" | Break - Expo |
|- | |- | ||
| − | | style="width:10%; background:#7B8ABD" | || colspan="1" style="width:45%; background:#BC857A" | ''' | + | | style="width:10%; background:#7B8ABD" | || colspan="1" style="width:45%; background:#BC857A" | '''Track 1 - Upstairs''' |
| − | | colspan="1" style="width:45%; background:#BCA57A" | ''' | + | | colspan="1" style="width:45%; background:#BCA57A" | '''Track 2 - Downstairs''' |
<!-- | style="width:22%; background:#C6E2FF" | '''Management / Exec Track: Room 3''' --> | <!-- | style="width:22%; background:#C6E2FF" | '''Management / Exec Track: Room 3''' --> | ||
|- | |- | ||
| − | | style="width:10%; background:#7B8ABD" | 10:30-11:15 || style="width:45%; background:#BC857A" align="left" | | + | | style="width:10%; background:#7B8ABD" | 10:30-11:15 || style="width:45%; background:#BC857A" align="left" | Why Messy Code Matters (& What You Can Do About It) |
| − | '' | + | ''Mike Zussman'' |
| − | | style="width:45%; background:#BCA57A" align="left" | | + | | style="width:45%; background:#BCA57A" align="left" | What did we learn about private email servers? |
| − | '' | + | ''Somebody Else'' |
<!-- | style="width:22%; background:#C6E2FF" align="left" | TBD | <!-- | style="width:22%; background:#C6E2FF" align="left" | TBD | ||
| Line 43: | Line 44: | ||
| − | | style="width:10%; background:#7B8ABD" | 11:15-12:00 || style="width:45%; background:#BC857A" align="left" | | + | | style="width:10%; background:#7B8ABD" | 11:15-12:00 || style="width:45%; background:#BC857A" align="left" | Was my site hacked? Is my site hacking visitors? How would I know? |
| − | '' | + | ''Bob Stanley'' |
| style="width:45%; background:#BCA57A" align="left" | PCI vs Risk Management | | style="width:45%; background:#BCA57A" align="left" | PCI vs Risk Management | ||
| Line 108: | Line 109: | ||
|} | |} | ||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
Revision as of 23:29, 5 January 2016
The agenda follows the successful OWASP conference multi track format, with opening keynotes and presentations in the main room & broadcast throughout the facility, split tracks in the middle of the day, and closing panel discussions at the end of the day.
NOTE: schedule is subject to change.
| Thursday, February 18th, 2016 | |||
|---|---|---|---|
| 07:45-08:30 | Registration and Continental Breakfast in the lobby | ||
| 08:30-08:45 | Welcome to SnowFROC 2016 Conference
OWASP Denver and OWASP Boulder Chapter Leaders | ||
| 08:45-09:00 |
State of OWASP Tom Brennan | ||
| 09:00-10:00 | Keynote: Red Dawn for AppSec - Where are the Wolverines?
Jeremiah Grossman, CTO of WhiteHat Security | ||
| 10:00-10:30 | Break - Expo | ||
| Track 1 - Upstairs | Track 2 - Downstairs | ||
| 10:30-11:15 | Why Messy Code Matters (& What You Can Do About It)
Mike Zussman |
What did we learn about private email servers?
Somebody Else | |
| 11:15-12:00 | Was my site hacked? Is my site hacking visitors? How would I know?
Bob Stanley |
PCI vs Risk Management
Doug Landoll | |
| 12:00-13:00 | Lunch - Expo | ||
| 13:00-13:50 | WebGoat.NET
Jerry Hoff |
Securing Data from the Web Tier
Mike Fleck | |
| 13:50-14:40 | Gray, the new black: Gray box vulnerability testing
Adam Hills |
What the Cyber Criminals are Doing on Your Website Right Now.
LAZ | |
| 14:40-15:00 | BREAK | ||
| 15:00-15:50 | "The Mobile Top 10"
Mike Zussman |
A Scalable Secure Development Program
Rajiv Sharma | |
| 15:50-16:30 | End of Conference Panel Discussion:
Topic: The Crystal Ball and the 2-headed Calf - What's on the Horizon and Why Does It Seem So Unnatural? Moderator: Andy Lewis Panelists: Laz, Matt Tesauro, John Pirc, Tanner Coltrin, René Agüero, Steve Kosten, others | ||
| 16:30-17:30 | Wrap up, vendor raffles! | ||