This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "OWASP NYC AppSec 2008 Conference"
Line 26: | Line 26: | ||
<br> | <br> | ||
''OWASP Foundation: [[Contact | Jeff Williams]], [[Contact | Dinis Cruz]], [[Contact | Dave Wichers]], [[Contact | Tom Brennan]], [[Contact | Sebastien Deleersnyder]]'' <br> | ''OWASP Foundation: [[Contact | Jeff Williams]], [[Contact | Dinis Cruz]], [[Contact | Dave Wichers]], [[Contact | Tom Brennan]], [[Contact | Sebastien Deleersnyder]]'' <br> | ||
+ | [http://video.google.com/videoplay?docid=-228977859802026041&hl=en VIDEO] / | ||
[http://www.owasp.org/images/b/b7/AppSecNYC08-Delivering_AppSec_Info.ppt Dave Wichers's SLIDES] | [http://www.owasp.org/images/b/b7/AppSecNYC08-Delivering_AppSec_Info.ppt Dave Wichers's SLIDES] | ||
|- | |- | ||
| style="width:10%; background:#7B8ABD" | 10:00-10:45 || style="width:30%; background:#BC857A" align="center" | '''[[AppSecEU08_Trends_in_Web_Hacking_Incidents:_What%27s_hot_for_2008 | Analysis of the Web Hacking Incidents Database (WHID)]]''' <br> | | style="width:10%; background:#7B8ABD" | 10:00-10:45 || style="width:30%; background:#BC857A" align="center" | '''[[AppSecEU08_Trends_in_Web_Hacking_Incidents:_What%27s_hot_for_2008 | Analysis of the Web Hacking Incidents Database (WHID)]]''' <br> | ||
''[http://blog.shezaf.com Ofer Shezaf]''<br> | ''[http://blog.shezaf.com Ofer Shezaf]''<br> | ||
− | [http://video.google.com/videoplay?docid= | + | [http://video.google.com/videoplay?docid=1130960689238372157&hl=en VIDEO] / SLIDES |
| style="width:30%; background:#BCA57A" align="center" | | | style="width:30%; background:#BCA57A" align="center" | | ||
'''[http://www.webappsecroadmap.com Web Application Security Road Map]'''<br> | '''[http://www.webappsecroadmap.com Web Application Security Road Map]'''<br> | ||
''[http://joesecurity.blogspot.com Joe White]''<br> | ''[http://joesecurity.blogspot.com Joe White]''<br> | ||
− | [http://video.google.com/videoplay?docid=- | + | [http://video.google.com/videoplay?docid=-237406228011458703&hl=en VIDEO] / [https://sites.google.com/a/webappsecroadmap.com/main/announcements/owasp-appsec-2008-presentation-has-been-uploaded SLIDES] |
| style="width:30%; background:#99FF99" align="center" | | | style="width:30%; background:#99FF99" align="center" | | ||
'''[https://buildsecurityin.us-cert.gov/swa/acqwg.html DHS Software Assurance Initiatives]'''<br> | '''[https://buildsecurityin.us-cert.gov/swa/acqwg.html DHS Software Assurance Initiatives]'''<br> | ||
''[http://www.linkedin.com/pub/0/ab/3b7 Stan Wisseman] & [http://www.linkedin.com/pub/1/439/923 Joe Jarzombek]''<br> | ''[http://www.linkedin.com/pub/0/ab/3b7 Stan Wisseman] & [http://www.linkedin.com/pub/1/439/923 Joe Jarzombek]''<br> | ||
− | [http://video.google.com/videoplay?docid= | + | [http://video.google.com/videoplay?docid=-6505795148329572484&hl=en VIDEO] / SLIDES |
|- | |- | ||
| style="width:10%; background:#7B8ABD" | 11:00-11:45 || style="width:30%; background:#BC857A" align="center" | | | style="width:10%; background:#7B8ABD" | 11:00-11:45 || style="width:30%; background:#BC857A" align="center" | | ||
'''Http Bot Research'''<br> | '''Http Bot Research'''<br> | ||
''[http://www.shadowserver.org/wiki/pmwiki.php?n=Shadowserver.Mission Andre M. DiMino - ShadowServer Foundation]''<br> | ''[http://www.shadowserver.org/wiki/pmwiki.php?n=Shadowserver.Mission Andre M. DiMino - ShadowServer Foundation]''<br> | ||
− | [http://video.google.com/videoplay?docid= | + | [http://video.google.com/videoplay?docid=1400503643786264015&hl=en VIDEO] / SLIDES |
| style="width:30%; background:#BCA57A" align="center" | | | style="width:30%; background:#BCA57A" align="center" | | ||
'''OWASP "Google Hacking" Project'''<br> | '''OWASP "Google Hacking" Project'''<br> | ||
''[http://www.linkedin.com/in/ChristianHeinrich Christian Heinrich]''<br> | ''[http://www.linkedin.com/in/ChristianHeinrich Christian Heinrich]''<br> | ||
− | [http://video.google.com/videoplay?docid= | + | [http://video.google.com/videoplay?docid=5419982525671711780&hl=en VIDEO] / SLIDES |
| style="width:30%; background:#99FF99" align="center" | | | style="width:30%; background:#99FF99" align="center" | | ||
'''MalSpam Research'''<br> | '''MalSpam Research'''<br> | ||
'' [http://www.knujon.com/bios.html Garth Bruen]''<br> | '' [http://www.knujon.com/bios.html Garth Bruen]''<br> | ||
− | [http://video.google.com/videoplay?docid=- | + | [http://video.google.com/videoplay?docid=-8813268235790993111&hl=en VIDEO] / SLIDES |
|- | |- | ||
| style="width:10%; background:#7B8ABD" | 12:00-13:00 || colspan="3" style="width:80%; background:#F2F2F2" align="center" | [[OWASP_NYC_AppSec_2008_Conference/ctf | Capture the Flag]] Sign-Up | | style="width:10%; background:#7B8ABD" | 12:00-13:00 || colspan="3" style="width:80%; background:#F2F2F2" align="center" | [[OWASP_NYC_AppSec_2008_Conference/ctf | Capture the Flag]] Sign-Up | ||
Line 59: | Line 60: | ||
'''Get Rich or Die Trying - Making Money on The Web, The Black Hat Way'''<br> | '''Get Rich or Die Trying - Making Money on The Web, The Black Hat Way'''<br> | ||
''[http://www.linkedin.com/in/treyford Trey Ford], [http://www.linkedin.com/in/tombrennan Tom Brennan], [http://www.linkedin.com/pub/0/205/77a Jeremiah Grossman]''<br> | ''[http://www.linkedin.com/in/treyford Trey Ford], [http://www.linkedin.com/in/tombrennan Tom Brennan], [http://www.linkedin.com/pub/0/205/77a Jeremiah Grossman]''<br> | ||
− | [http://video.google.com/videoplay?docid=- | + | [http://video.google.com/videoplay?docid=-7209323310151363553&hl=en VIDEO] / SLIDES |
| style="width:30%; background:#BCA57A" align="center" | | | style="width:30%; background:#BCA57A" align="center" | | ||
'''Framework-level Threat Analysis: Adding Science to the Art of Source-code review'''<br> | '''Framework-level Threat Analysis: Adding Science to the Art of Source-code review'''<br> | ||
''[[OWASP_NYC_AppSec_2008_Conference-rohit-sethi | Rohit Sethi]] & [[OWASP_NYC_AppSec_2008_Conference-sahba-kazerooni | Sahba Kazerooni]]''<br> | ''[[OWASP_NYC_AppSec_2008_Conference-rohit-sethi | Rohit Sethi]] & [[OWASP_NYC_AppSec_2008_Conference-sahba-kazerooni | Sahba Kazerooni]]''<br> | ||
− | [http://video.google.com/videoplay?docid= | + | [http://video.google.com/videoplay?docid=8935251380629216945&hl=en VIDEO] / SLIDES |
| style="width:30%; background:#99FF99" align="center" | | | style="width:30%; background:#99FF99" align="center" | | ||
'''Automated Web-based Malware Behavioral Analysis'''<br> | '''Automated Web-based Malware Behavioral Analysis'''<br> | ||
''[http://www.linkedin.com/pub/3/359/b1a Tyler Hudak]''<br> | ''[http://www.linkedin.com/pub/3/359/b1a Tyler Hudak]''<br> | ||
− | [http://video.google.com/videoplay?docid= | + | [http://video.google.com/videoplay?docid=4204600308807371535&hl=en VIDEO] / SLIDES |
|- | |- | ||
| style="width:10%; background:#7B8ABD" | 13:00-13:45 || style="width:30%; background:#BC857A" align="center" | | | style="width:10%; background:#7B8ABD" | 13:00-13:45 || style="width:30%; background:#BC857A" align="center" | | ||
'''[http://blogs.adobe.com/psirt/2008/09/thanks_to_jeremiah_grossman_an.html New 0-Day Browser Exploits: Clickjacking - yea, this is bad...]'''<br> | '''[http://blogs.adobe.com/psirt/2008/09/thanks_to_jeremiah_grossman_an.html New 0-Day Browser Exploits: Clickjacking - yea, this is bad...]'''<br> | ||
''[http://jeremiahgrossman.blogspot.com Jeremiah Grossman] & [http://ha.ckers.org/blog/about Robert "RSnake" Hansen]''<br> | ''[http://jeremiahgrossman.blogspot.com Jeremiah Grossman] & [http://ha.ckers.org/blog/about Robert "RSnake" Hansen]''<br> | ||
− | [http://video.google.com/videoplay?docid=- | + | [http://video.google.com/videoplay?docid=-5747622209791380934&hl=en VIDEO] / SLIDES |
| style="width:30%; background:#BCA57A" align="center" | | | style="width:30%; background:#BCA57A" align="center" | | ||
'''Web Intrusion Detection with ModSecurity'''<br> | '''Web Intrusion Detection with ModSecurity'''<br> | ||
''[http://www.breach.com/company/executive-team/ Ivan Ristic]''<br> | ''[http://www.breach.com/company/executive-team/ Ivan Ristic]''<br> | ||
− | VIDEO / [[Media:OWASP_NYC_2008-Web_Intrusion_Detection_with_ModSecurity.pdf|SLIDES]] | + | [http://video.google.com/videoplay?docid=-7391448618249578180&hl=en VIDEO] / [[Media:OWASP_NYC_2008-Web_Intrusion_Detection_with_ModSecurity.pdf|SLIDES]] |
| style="width:30%; background:#99FF99" align="center" | | | style="width:30%; background:#99FF99" align="center" | | ||
'''Using Layer 8 and OWASP to Secure Web Applications'''<br> | '''Using Layer 8 and OWASP to Secure Web Applications'''<br> | ||
''[http://www.linkedin.com/in/davidstern2000 David Stern] & [http://www.linkedin.com/in/romangarber Roman Garber]''<br> | ''[http://www.linkedin.com/in/davidstern2000 David Stern] & [http://www.linkedin.com/in/romangarber Roman Garber]''<br> | ||
− | [http://video.google.com/videoplay?docid= | + | [http://video.google.com/videoplay?docid=-3883297889781954509&hl=en VIDEO] / SLIDES |
|- | |- | ||
| style="width:10%; background:#7B8ABD" | 14:00-14:45 || style="width:30%; background:#BC857A" align="center" | '''Industry Outlook Panel:'''<br> | | style="width:10%; background:#7B8ABD" | 14:00-14:45 || style="width:30%; background:#BC857A" align="center" | '''Industry Outlook Panel:'''<br> | ||
Line 93: | Line 94: | ||
[http://www.linkedin.com/pub/5/658/872 Tom King] CISO, Barclays Capital <br> | [http://www.linkedin.com/pub/5/658/872 Tom King] CISO, Barclays Capital <br> | ||
Moderator: [http://www.linkedin.com/in/mahidontamsetti Mahi Dontamsetti]'' | Moderator: [http://www.linkedin.com/in/mahidontamsetti Mahi Dontamsetti]'' | ||
+ | [http://video.google.com/videoplay?docid=-7051719323294878516&hl=en VIDEO] / SLIDES | ||
| style="width:30%; background:#BCA57A" align="center" | | | style="width:30%; background:#BCA57A" align="center" | | ||
'''[http://www.owasp.org/index.php/Security_Assessing_Java_RMI Security Assessing Java RMI] '''<br> | '''[http://www.owasp.org/index.php/Security_Assessing_Java_RMI Security Assessing Java RMI] '''<br> | ||
''[http://www.linkedin.com/in/adamboulton Adam Boulton]''<br> | ''[http://www.linkedin.com/in/adamboulton Adam Boulton]''<br> | ||
− | [http://video.google.com/videoplay?docid= | + | [http://video.google.com/videoplay?docid=1673714450539106400&hl=en VIDEO] / SLIDES |
| style="width:30%; background:#99FF99" align="center" | | | style="width:30%; background:#99FF99" align="center" | | ||
'''JBroFuzz 0.1 - 1.1: Building a Java Fuzzer for the Web'''<br> | '''JBroFuzz 0.1 - 1.1: Building a Java Fuzzer for the Web'''<br> | ||
''[[OWASP_NYC_AppSec_2008_Conference-SPEAKER-Yiannis_Pavlosoglou | Yiannis Pavlosoglou]]''<br> | ''[[OWASP_NYC_AppSec_2008_Conference-SPEAKER-Yiannis_Pavlosoglou | Yiannis Pavlosoglou]]''<br> | ||
− | [http://video.google.com/videoplay?docid= | + | [http://video.google.com/videoplay?docid=-1551704659206071145&hl=en VIDEO] / SLIDES |
|- | |- | ||
| style="width:10%; background:#7B8ABD" | 15:00-15:45 || style="width:30%; background:#BC857A" align="center" | | | style="width:10%; background:#7B8ABD" | 15:00-15:45 || style="width:30%; background:#BC857A" align="center" | | ||
'''OWASP Testing Guide - Offensive Assessing Financial Applications'''<br> | '''OWASP Testing Guide - Offensive Assessing Financial Applications'''<br> | ||
'' [[OWASP_NYC_AppSec_2008_Conference-daniel-cuthbert | Daniel Cuthbert]]''<br> | '' [[OWASP_NYC_AppSec_2008_Conference-daniel-cuthbert | Daniel Cuthbert]]''<br> | ||
− | [http://video.google.com/videoplay?docid= | + | [http://video.google.com/videoplay?docid=-3228312539505217121&hl=en VIDEO] / SLIDES |
| style="width:30%; background:#BCA57A" align="center" | | | style="width:30%; background:#BCA57A" align="center" | | ||
'''Flash Parameter Injection (FPI)'''<br> | '''Flash Parameter Injection (FPI)'''<br> | ||
''Ayal Yogev & Adi Sharabani''<br> | ''Ayal Yogev & Adi Sharabani''<br> | ||
− | [http://video.google.com/videoplay?docid= | + | [http://video.google.com/videoplay?docid=7818654218575619118&hl=en VIDEO] / SLIDES |
| style="width:30%; background:#99FF99" align="center" | | | style="width:30%; background:#99FF99" align="center" | | ||
'''[[OWASP_NYC_AppSec_2008_Conference-SPEAKER-Andres_Riancho | w3af - A Framework to own the web]]'''<br> | '''[[OWASP_NYC_AppSec_2008_Conference-SPEAKER-Andres_Riancho | w3af - A Framework to own the web]]'''<br> | ||
''Andres Riancho''<br> | ''Andres Riancho''<br> | ||
− | [http://video.google.com/videoplay?docid= | + | [http://video.google.com/videoplay?docid=4354579888802327250&hl=en VIDEO] / VIDEO |
|- | |- | ||
| style="width:10%; background:#7B8ABD" | 16:00-16:45 || style="width:30%; background:#BC857A" align="center" | | | style="width:10%; background:#7B8ABD" | 16:00-16:45 || style="width:30%; background:#BC857A" align="center" | | ||
'''OWASP Enterprise Security API [[ESAPI | (ESAPI) Project]]'''<br> | '''OWASP Enterprise Security API [[ESAPI | (ESAPI) Project]]'''<br> | ||
'' [http://www.aspectsecurity.com/management.htm Jeff Williams]''<br> | '' [http://www.aspectsecurity.com/management.htm Jeff Williams]''<br> | ||
− | [http://video.google.com/videoplay?docid= | + | [http://video.google.com/videoplay?docid=-2912157383449643073&hl=en VIDEO] / SLIDES |
| style="width:30%; background:#BCA57A" align="center" | | | style="width:30%; background:#BCA57A" align="center" | | ||
'''Cross-Site Scripting Filter Evasion'''<br> | '''Cross-Site Scripting Filter Evasion'''<br> | ||
''Alexios Fakos''<br> | ''Alexios Fakos''<br> | ||
− | [http://video.google.com/videoplay?docid=- | + | [http://video.google.com/videoplay?docid=-6974576754943514571&hl=en VIDEO] / SLIDES |
| style="width:30%; background:#99FF99" align="center" | | | style="width:30%; background:#99FF99" align="center" | | ||
− | ''' | + | '''[[OWASP_NYC_AppSec_2008_Conference-SPEAKER-GunterOllmann | Multidisciplinary Bank Attacks]]'''<br> |
− | '' | + | ''Gunter Ollmann''<br> |
− | [http://video.google.com/videoplay?docid= | + | [http://video.google.com/videoplay?docid=3041861094296331549&hl=en VIDEO] / SLIDES |
|- | |- | ||
| style="width:10%; background:#7B8ABD" | 17:00-17:45 || style="width:30%; background:#BC857A" align="center" | | | style="width:10%; background:#7B8ABD" | 17:00-17:45 || style="width:30%; background:#BC857A" align="center" | | ||
'''Open Discussion On Application Security'''<br> | '''Open Discussion On Application Security'''<br> | ||
''Joe Bernik & Steve Anton''<br> | ''Joe Bernik & Steve Anton''<br> | ||
− | [http://video.google.com/videoplay?docid= | + | [http://video.google.com/videoplay?docid=6718671647859572098&hl=en VIDEO] / SLIDES |
| style="width:30%; background:#BCA57A" align="center" | | | style="width:30%; background:#BCA57A" align="center" | | ||
'''Mastering PCI Section 6.6'''<br> | '''Mastering PCI Section 6.6'''<br> | ||
''[http://www.linkedin.com/pub/1/228/6a5 Taylor McKinley] and [http://www.linkedin.com/in/jacobwest Jacob West]''<br> | ''[http://www.linkedin.com/pub/1/228/6a5 Taylor McKinley] and [http://www.linkedin.com/in/jacobwest Jacob West]''<br> | ||
− | [http://video.google.com/videoplay?docid=- | + | [http://video.google.com/videoplay?docid=-2544477786674220116&hl=en VIDEO] / SLIDES |
| style="width:30%; background:#99FF99" align="center" | | | style="width:30%; background:#99FF99" align="center" | | ||
− | ''' | + | '''Case Studies: Exploiting application testing tool deficiencies via "out of band" injection'''<br> |
− | '' | + | ''[http://www.linkedin.com/pub/0/a91/aa2 Vijay Akasapu] & [http://www.linkedin.com/pub/9/279/381 Marshall Heilman]''<br> |
− | VIDEO / SLIDES | + | [http://video.google.com/videoplay?docid=7623989457736720764&hl=en VIDEO] / SLIDES |
|- | |- | ||
| style="width:10%; background:#7B8ABD" | 18:00-18:45 || style="width:30%; background:#BC857A" align="center" | | | style="width:10%; background:#7B8ABD" | 18:00-18:45 || style="width:30%; background:#BC857A" align="center" | | ||
'''[http://www.owasp.org/index.php/Category:OWASP_Live_CD_Project Spearfishing and the OWASP Live CD Project]'''<br> | '''[http://www.owasp.org/index.php/Category:OWASP_Live_CD_Project Spearfishing and the OWASP Live CD Project]'''<br> | ||
''[http://www.linkedin.com/in/packetfocus Joshua Perrymon]''<br> | ''[http://www.linkedin.com/in/packetfocus Joshua Perrymon]''<br> | ||
− | [http://video.google.com/videoplay?docid=- | + | [http://video.google.com/videoplay?docid=-4419524791864555496&hl=en VIDEO] / SLIDES |
| style="width:30%; background:#BCA57A" align="center" | | | style="width:30%; background:#BCA57A" align="center" | | ||
'''Coding Secure w/PHP'''<br> | '''Coding Secure w/PHP'''<br> | ||
''[http://www.linkedin.com/in/zaunere Hans Zaunere]''<br> | ''[http://www.linkedin.com/in/zaunere Hans Zaunere]''<br> | ||
− | [http://video.google.com/videoplay?docid= | + | [http://video.google.com/videoplay?docid=3477751371038020741&hl=en VIDEO] / SLIDES |
| style="width:30%; background:#99FF99" align="center" | | | style="width:30%; background:#99FF99" align="center" | | ||
'''[[Payment_Card_Data_Security_and_the_new_Enterprise_Java | Payment Card Data Security and the new Enterprise Java]]'''<br> | '''[[Payment_Card_Data_Security_and_the_new_Enterprise_Java | Payment Card Data Security and the new Enterprise Java]]'''<br> | ||
''[[OWASP_NYC_AppSec_2008_Conference-SPEAKER-Dr._B._V._Kumar | Dr. B. V. Kumar]] & [[OWASP_NYC_AppSec_2008_Conference-SPEAKER-Abhay_Bhargav | Mr. Abhay Bhargav]]''<br> | ''[[OWASP_NYC_AppSec_2008_Conference-SPEAKER-Dr._B._V._Kumar | Dr. B. V. Kumar]] & [[OWASP_NYC_AppSec_2008_Conference-SPEAKER-Abhay_Bhargav | Mr. Abhay Bhargav]]''<br> | ||
− | [http://video.google.com/videoplay?docid= | + | [http://video.google.com/videoplay?docid=4488848043144792234&hl=en VIDEO] / SLIDES |
|- | |- | ||
| style="width:10%; background:#7B8ABD" | 19:00-20:00 || style="width:30%; background:#BC857A" align="center" | | | style="width:10%; background:#7B8ABD" | 19:00-20:00 || style="width:30%; background:#BC857A" align="center" | |
Revision as of 22:02, 17 October 2008
2008 OWASP USA, NYC
Last Update: 10/17/2008
Our mission is to make application security "visible," so that people and organizations can make informed decisions about application security risks. Everyone is free to participate in OWASP and all of our materials are available under a free and open software license. The OWASP Foundation is a 501c3 not-for-profit charitable organization that ensures the ongoing availability and support for our work. OWASP is like "public radio" so support our efforts join today as a corporate or individual member learn more CLICK HERE
SEE BELOW FOR VIDEO AND SLIDES - CLICK HERE FOR PHOTOS
2008 OWASP USA, NYC Conference Schedule – Sept 24th - Sept 25th VIDEOS
Day 1 – Sept 24th, 2008 | |||||||||
---|---|---|---|---|---|---|---|---|---|
Track 1: BALLROOM | Track 2: SKYLINE | Track 3: TIMESQUARE | |||||||
07:30-08:50 | Doors Open for Attendee/Speaker Registration
avoid lines come early get your caffeine fix and use free wifi | ||||||||
09:00-09:45 | OWASP Version 3.0 who we are, how we got here and where we are going?
| ||||||||
10:00-10:45 | Analysis of the Web Hacking Incidents Database (WHID) Ofer Shezaf |
DHS Software Assurance Initiatives | |||||||
11:00-11:45 |
Http Bot Research |
OWASP "Google Hacking" Project |
MalSpam Research | ||||||
12:00-13:00 | Capture the Flag Sign-Up
LUNCH - Provided by event sponsors @ TechExpo | ||||||||
12:00-12:45 |
Get Rich or Die Trying - Making Money on The Web, The Black Hat Way |
Framework-level Threat Analysis: Adding Science to the Art of Source-code review |
Automated Web-based Malware Behavioral Analysis | ||||||
13:00-13:45 |
New 0-Day Browser Exploits: Clickjacking - yea, this is bad... |
Web Intrusion Detection with ModSecurity |
Using Layer 8 and OWASP to Secure Web Applications | ||||||
14:00-14:45 | Industry Outlook Panel: Mark Clancy EVP CitiGroup, |
Security Assessing Java RMI |
JBroFuzz 0.1 - 1.1: Building a Java Fuzzer for the Web | ||||||
15:00-15:45 |
OWASP Testing Guide - Offensive Assessing Financial Applications |
Flash Parameter Injection (FPI) |
w3af - A Framework to own the web | ||||||
16:00-16:45 |
OWASP Enterprise Security API (ESAPI) Project |
Cross-Site Scripting Filter Evasion |
Multidisciplinary Bank Attacks | ||||||
17:00-17:45 |
Open Discussion On Application Security |
Mastering PCI Section 6.6 |
Case Studies: Exploiting application testing tool deficiencies via "out of band" injection | ||||||
18:00-18:45 |
Spearfishing and the OWASP Live CD Project |
Coding Secure w/PHP |
Payment Card Data Security and the new Enterprise Java | ||||||
19:00-20:00 |
OWASP Chapter Leader / Project Leader working session |
(ISC)2 Cocktail Hour |
Technology Movie Night | ||||||
20:00-23:00+ | OWASP Event Party/Reception Event badge required for admission Food, Drinks w/ New & Old Friends - break out the laptop and play capture the flag for fun and prizes. Location: HOTEL BALLROOM
| ||||||||
Day 2 – Sept 25th, 2008 | |||||||||
08:00-10:00 | BREAKFAST - Provided by event sponsors @ TechExpo | ||||||||
08:00-08:45 |
Software Development: The Last Security Frontier |
Best Practices Guide: Web Application Firewalls |
The Good The Bad and The Ugly - Pen Testing VS. Source Code Analysis
| ||||||
09:00-09:45 |
OWASP Web Services Top Ten |
Tiger Team - APPSEC Projects |
OpenSource Tools | ||||||
10:00-10:45 |
Building a tool for Security consultants: A story of a customized source code scanner |
"Help Wanted" 7 Things You Need to Know APPSEC/INFOSEC Employment |
Industry Analyst with Forrester Research | ||||||
11:00-11:45 |
CLASP (Comprehensive, Lightweight Application Security Process) |
Security in Agile Development |
Secure Software Impact | ||||||
12:00-12:45 |
Next Generation Cross Site Scripting Worms |
Security of Software-as-a-Service (SaaS) |
Open Reverse Benchmarking Project | ||||||
12:00-13:00 | Capture the Flag Status
LUNCH - Provided @ TechExpo | ||||||||
13:00-13:45 |
NIST SAMATE Static Analysis Tool Exposition (SATE) |
Lotus Notes/Domino Web Application Security |
Shootout @ Blackbox Corral | ||||||
14:00-14:45 |
Practical Advanced Threat Modeling |
The OWASP Orizon Project: towards version 1.0 |
Building Usable Security | ||||||
15:00-15:45 |
Off-shoring Application Development? Security is Still Your Problem |
OWASP EU Summit Portugal |
Code Secrets | ||||||
16:00-16:45 |
Vulnerabilities in application interpreters and runtimes |
Cryptography For Penetration Testers |
Corruption | ||||||
17:00-17:45 | Event Wrap-Up / Speaker & CTF Awards and Sponsor Raffles | ||||||||
18:30-19:30 | OWASP Foundation, Chapter Leader Meeting - to collect ideas to make OWASP better! |
If you could not find it above... check CLICK HERE FOR VIDEOS