This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "OWASP AU Conference 2009 Training"
From OWASP
(New page: == OWASP Australia 2008 Training Schedule - February 25th, 2008 == There are two training sessions held in seperate rooms at this year's conference. During the registration process select...) |
(→OWASP Australia 2008 Training Schedule - February 25th, 2008) |
||
| Line 4: | Line 4: | ||
{| style="width:80%" border="0" align="center" | {| style="width:80%" border="0" align="center" | ||
| − | ! colspan=" | + | ! colspan="3" align="center" style="background:#4058A0; color:white" | Day 1 - Wednesday Feb 25, 2009 |
|- | |- | ||
| − | | style="width:10%; background:#7B8ABD" | || style="width:40%; background:#BC857A" | | + | | style="width:10%; background:#7B8ABD" | || style="width:40%; background:#BC857A" | '''Application Secure Architecture/Coding Course''' |
| + | | style="width:40%; background:#BCA57A" | '''In-depth Assessment Techniques: Design, Code, and Runtime''' | ||
|- | |- | ||
| − | | style="width:10%; background:#7B8ABD" | 08:00-09:00 || style="width:80%; background:#C2C2C2" align="left" | Registration and Coffee | + | | style="width:10%; background:#7B8ABD" | 08:00-09:00 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Registration and Coffee - ''Espresso Coffee (Sponsored by IBM) provided.'' |
|- | |- | ||
| − | | style="width:10%; background:#7B8ABD" | 09:00- | + | | style="width:10%; background:#7B8ABD" | 09:00-09:15 || colspan="2" style="width:80%; background:#F2F2F2" align="left" | '''Welcome to OWASP AU 2009''' - Justin Derry (OWASP Conference Chair AU2009 & Fortify Practice Director Asia Pacific) |
|- | |- | ||
| − | | style="width:10%; background:#7B8ABD" | 10:45 | + | | style="width:10%; background:#7B8ABD" | 09:15-10:45 || colspan="2" style="width:80%; background:#F2F2F2" align="left" | '''Keynote:''' Roger Thorton, CTO Fortify Inc |
|- | |- | ||
| − | | style="width:10%; background:#7B8ABD" | | + | | style="width:10%; background:#7B8ABD" | 10:45-11:15 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | ''Morning Tea/Coffee, Vendor Technology Expo'' - ''Espresso Coffee (Sponsored by IBM) provided.'' |
|- | |- | ||
| − | | style="width:10%; background:#7B8ABD" | 12: | + | | style="width:10%; background:#7B8ABD" | 11:15-12:15 || style="width:40%; background:#BC857A" align="left" | Christian Heinrich & Darren Skidmore - ''PCI-DSS Application Security'' |
| + | | style="width:40%; background:#BCA57A" align="left" | Peter Freiberg - ''Determining attack surface and creating security test cases through observing business testing'' | ||
|- | |- | ||
| − | | style="width:10%; background:#7B8ABD" | | + | | style="width:10%; background:#7B8ABD" | 12:15-13:30 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | ''Lunch, Vendor Technology Expo'' |
|- | |- | ||
| − | | style="width:10%; background:#7B8ABD" | | + | | style="width:10%; background:#7B8ABD" | 13:30-14:30 || style="width:40%; background:#BC857A" align="left" | Andrew Vanderstock - ''The future (and past) of web application security how to detect and protect against value attacks'' |
| + | | style="width:40%; background:#BCA57A" align="left" | Siddharth Anbalahan - ''Advanced Techniques in Code Reviews'' | ||
|- | |- | ||
| − | | style="width:10%; background:#7B8ABD" | | + | | style="width:10%; background:#7B8ABD" | 14:45-15:45 || style="width:40%; background:#BC857A" align="left" | Ranjita Shankar Iyer - ''A Prescriptive approach to Secure SDLC'' |
| + | | style="width:40%; background:#BCA57A" align="left" | Brett Moore - ''Vulnerabilities In Action'' | ||
|- | |- | ||
| − | | style="width:10%; background:#7B8ABD" | 17:30-19: | + | | style="width:10%; background:#7B8ABD" | 15:45-16:15 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | ''Afternoon Tea/Coffee, Vendor Technology Expo'' - ''Espresso Coffee (Sponsored by IBM) provided.'' |
| + | |- | ||
| + | | style="width:10%; background:#7B8ABD" | 16:15-17:15 || style="width:40%; background:#BC857A" align="left" | Sumit Siddharth - ''Recent Advancements in SQL Injection Exploitation Techniques'' | ||
| + | | style="width:40%; background:#BCA57A" align="left" | Karmendra Kohli - ''Wooden Swords and Plastic Guns - Insecure Security Defenses'' | ||
| + | |- | ||
| + | | style="width:10%; background:#7B8ABD" | 17:15-18:00 || colspan="2" style="width:40%; background:#F2F2F2" align="left" | Panel - Industry Experts, Talking about real Application Security Threats. ''(You ask the questions, in this informative 45 minutes of panel discussion on relevant industry issues.)'' | ||
| + | |- | ||
| + | | style="width:10%; background:#7B8ABD" | 18:30-19:00 || colspan="2" style="width:80%; background:#669966" align="left" | '''OWASP Social Gathering:''' Pre-Dinner Drinks & Cocktails | ||
| + | |||
| + | Location: Conference Facility Foyer @ Gold Coast Convention Center (Level 1 FOYER) | ||
| + | |- | ||
| + | | style="width:10%; background:#7B8ABD" | 19:00-22:00 || colspan="2" style="width:80%; background:#669966" align="left" | '''OWASP Social Gathering:''' Gala Dinner, Entertainment and Networking Opportunity. ''This is Free to all attendees and will be a great night.'' | ||
| + | |||
| + | Location: Conference Facility Foyer @ Gold Coast Convention Center (Level 1 FOYER) | ||
| + | |- | ||
|} | |} | ||
Revision as of 09:46, 18 February 2009
OWASP Australia 2008 Training Schedule - February 25th, 2008
There are two training sessions held in seperate rooms at this year's conference. During the registration process select which training session you will join. Also all meals and a cocktail party are provided for everyone during the training day.
| Day 1 - Wednesday Feb 25, 2009 | ||
|---|---|---|
| Application Secure Architecture/Coding Course | In-depth Assessment Techniques: Design, Code, and Runtime | |
| 08:00-09:00 | Registration and Coffee - Espresso Coffee (Sponsored by IBM) provided. | |
| 09:00-09:15 | Welcome to OWASP AU 2009 - Justin Derry (OWASP Conference Chair AU2009 & Fortify Practice Director Asia Pacific) | |
| 09:15-10:45 | Keynote: Roger Thorton, CTO Fortify Inc | |
| 10:45-11:15 | Morning Tea/Coffee, Vendor Technology Expo - Espresso Coffee (Sponsored by IBM) provided. | |
| 11:15-12:15 | Christian Heinrich & Darren Skidmore - PCI-DSS Application Security | Peter Freiberg - Determining attack surface and creating security test cases through observing business testing |
| 12:15-13:30 | Lunch, Vendor Technology Expo | |
| 13:30-14:30 | Andrew Vanderstock - The future (and past) of web application security how to detect and protect against value attacks | Siddharth Anbalahan - Advanced Techniques in Code Reviews |
| 14:45-15:45 | Ranjita Shankar Iyer - A Prescriptive approach to Secure SDLC | Brett Moore - Vulnerabilities In Action |
| 15:45-16:15 | Afternoon Tea/Coffee, Vendor Technology Expo - Espresso Coffee (Sponsored by IBM) provided. | |
| 16:15-17:15 | Sumit Siddharth - Recent Advancements in SQL Injection Exploitation Techniques | Karmendra Kohli - Wooden Swords and Plastic Guns - Insecure Security Defenses |
| 17:15-18:00 | Panel - Industry Experts, Talking about real Application Security Threats. (You ask the questions, in this informative 45 minutes of panel discussion on relevant industry issues.) | |
| 18:30-19:00 | OWASP Social Gathering: Pre-Dinner Drinks & Cocktails
Location: Conference Facility Foyer @ Gold Coast Convention Center (Level 1 FOYER) | |
| 19:00-22:00 | OWASP Social Gathering: Gala Dinner, Entertainment and Networking Opportunity. This is Free to all attendees and will be a great night.
Location: Conference Facility Foyer @ Gold Coast Convention Center (Level 1 FOYER) | |