This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "2019 BASC Agenda"
From OWASP
(Create Agenda) |
(Add Steven Pelletier) |
||
| Line 149: | Line 149: | ||
| rowspan="2" style="width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2019_BASC:Resume_Agenda_Template|Session 1 }} | | rowspan="2" style="width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2019_BASC:Resume_Agenda_Template|Session 1 }} | ||
| rowspan="6" style="width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2019_BASC:Workshop_Agenda_Template|Presentation|CMD+CTRL Cyber Range|Chad Holmes }} | | rowspan="6" style="width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2019_BASC:Workshop_Agenda_Template|Presentation|CMD+CTRL Cyber Range|Chad Holmes }} | ||
| − | | rowspan="2" style="width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2019_BASC:Workshop_Agenda_Template|Presentation|Capture Ever-Evolving Security Needs of Users with IKE & Proto-Research Persona Development|Prateek Jain & Ryan | + | | rowspan="2" style="width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2019_BASC:Workshop_Agenda_Template|Presentation|Capture Ever-Evolving Security Needs of Users with IKE & Proto-Research Persona Development|Prateek Jain & Ryan LaMarche }} |
| − | | rowspan="2" style="width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2019_BASC:Workshop_Agenda_Template|Presentation|The Ultimate Secure Coding Showdown|Brad Giguere }} | + | | rowspan="2" style="width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2019_BASC:Workshop_Agenda_Template|Presentation|The Ultimate Secure Coding Showdown|Brad Giguere & Steven Pelletier }} |
| rowspan="2" style="width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2019_BASC:Workshop_Agenda_Template|Presentation|How to Talk to Humans|Kitty Huang & Roy Wattanasin }} | | rowspan="2" style="width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2019_BASC:Workshop_Agenda_Template|Presentation|How to Talk to Humans|Kitty Huang & Roy Wattanasin }} | ||
| rowspan="2" style="width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2019_BASC:Workshop_Agenda_Template|Presentation|Zero to Hero: Intro to Web App Pentesting|Carson Owlett & Gabrielle Hempel }} | | rowspan="2" style="width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2019_BASC:Workshop_Agenda_Template|Presentation|Zero to Hero: Intro to Web App Pentesting|Carson Owlett & Gabrielle Hempel }} | ||
Latest revision as of 16:00, 15 October 2019

Presentations
| |||||||
|---|---|---|---|---|---|---|---|
| 8:30-9:30 | Breakfast and Registration provided by our Platinum Sponsor | ||||||
| 09:00-09:50 | Opening Keynote | ||||||
| Washington/Jefferson Room | Adams Room | ||||||
| 10:00-10:50 | |||||||
| 11:00-11:50 | |||||||
| 12:00-1:00 |
Lunch | ||||||
| 1:00-1:50 | |||||||
| 2:00-2:50 | |||||||
| 3:00-3:50 | |||||||
| 4:00-4:50 | |||||||
| 5:00-5:30 |
Social Time | ||||||
| 5:30-6:30 | Closing Keynote Sandcastles in a Storm: Application Vulnerabilities and how they weaken our organizations | ||||||
| Raffle Wrap Up
| |||||||
Workshops
| ||||||||
|---|---|---|---|---|---|---|---|---|
| Attitash | Monroe | Cannon | Bretton Woods | Jay Peak | Cranmore | |||
| 10:00-10:50 |
CyberSN Career Center |
|||||||
| 11:00-11:50 | ||||||||
| 1:00-1:50 |
CyberSN Career Center |
|||||||
| 2:00-2:50 | ||||||||
| 3:00-3:50 | ||||||||
| 4:00-4:50 | ||||||||

