This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "OWASP AU Conference 2009 Training"

From OWASP
Jump to: navigation, search
(New page: == OWASP Australia 2008 Training Schedule - February 25th, 2008 == There are two training sessions held in seperate rooms at this year's conference. During the registration process select...)
 
(OWASP Australia 2008 Training Schedule - February 25th, 2008)
Line 4: Line 4:
  
 
{| style="width:80%" border="0" align="center"
 
{| style="width:80%" border="0" align="center"
  ! colspan="2" align="center" style="background:#4058A0; color:white" | Training Day Wednesday Feb 25, 2008
+
  ! colspan="3" align="center" style="background:#4058A0; color:white" | Day 1 - Wednesday Feb 25, 2009
 
  |-
 
  |-
  | style="width:10%; background:#7B8ABD" | || style="width:40%; background:#BC857A" | Facility/Description  
+
  | style="width:10%; background:#7B8ABD" | || style="width:40%; background:#BC857A" | '''Application Secure Architecture/Coding Course'''
 +
  | style="width:40%; background:#BCA57A" | '''In-depth Assessment Techniques: Design, Code, and Runtime'''
 
  |-
 
  |-
  | style="width:10%; background:#7B8ABD" | 08:00-09:00 || style="width:80%; background:#C2C2C2" align="left" | Registration and Coffee
+
  | style="width:10%; background:#7B8ABD" | 08:00-09:00 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Registration and Coffee - ''Espresso Coffee (Sponsored by IBM) provided.''
 
  |-
 
  |-
  | style="width:10%; background:#7B8ABD" | 09:00-10:45 || style="width:80%; background:#BC857A" align="left" | Training Session (1) - Rooms 1 & 2
+
  | style="width:10%; background:#7B8ABD" | 09:00-09:15 || colspan="2" style="width:80%; background:#F2F2F2" align="left" | '''Welcome to OWASP AU 2009''' - Justin Derry (OWASP Conference Chair AU2009 & Fortify Practice Director Asia Pacific)
 
  |-
 
  |-
  | style="width:10%; background:#7B8ABD" | 10:45-11:00 || style="width:80%; background:#C2C2C2" align="left" | Morning Tea/Coffee
+
  | style="width:10%; background:#7B8ABD" | 09:15-10:45 || colspan="2" style="width:80%; background:#F2F2F2" align="left" | '''Keynote:''' Roger Thorton, CTO Fortify Inc
 
  |-
 
  |-
  | style="width:10%; background:#7B8ABD" | 11:00-12:30 || style="width:40%; background:#BC857A" align="left" | Training Sesison (2) - Rooms 1 & 2
+
  | style="width:10%; background:#7B8ABD" | 10:45-11:15 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | ''Morning Tea/Coffee, Vendor Technology Expo'' - ''Espresso Coffee (Sponsored by IBM) provided.''
 
  |-
 
  |-
  | style="width:10%; background:#7B8ABD" | 12:30-13:30 || style="width:80%; background:#C2C2C2" align="left" | Lunch, Vendor Technology Expo
+
  | style="width:10%; background:#7B8ABD" | 11:15-12:15 || style="width:40%; background:#BC857A" align="left" | Christian Heinrich & Darren Skidmore - ''PCI-DSS Application Security''
 +
| style="width:40%; background:#BCA57A" align="left" | Peter Freiberg - ''Determining attack surface and creating security test cases through observing business testing''
 
  |-
 
  |-
  | style="width:10%; background:#7B8ABD" | 13:30-15:30 || style="width:40%; background:#BC857A" align="left" | Training Sesison (3) - Rooms 1 & 2
+
  | style="width:10%; background:#7B8ABD" | 12:15-13:30 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | ''Lunch, Vendor Technology Expo''
 
  |-
 
  |-
  | style="width:10%; background:#7B8ABD" | 15:30-15:45 || style="width:80%; background:#C2C2C2" align="left" | Afternoon Tea/Coffee, Vendor Technology Expo (Setup)
+
  | style="width:10%; background:#7B8ABD" | 13:30-14:30 || style="width:40%; background:#BC857A" align="left" | Andrew Vanderstock - ''The future (and past) of web application security how to detect and protect against value attacks''
 +
| style="width:40%; background:#BCA57A" align="left" | Siddharth Anbalahan - ''Advanced Techniques in Code Reviews''
 
  |-
 
  |-
  | style="width:10%; background:#7B8ABD" | 15:45-17:30 || style="width:40%; background:#BC857A" align="left" | Training Sesison (4) - Rooms 1 & 2
+
  | style="width:10%; background:#7B8ABD" | 14:45-15:45 || style="width:40%; background:#BC857A" align="left" | Ranjita Shankar Iyer - ''A Prescriptive approach to Secure SDLC''
 +
| style="width:40%; background:#BCA57A" align="left" | Brett Moore - ''Vulnerabilities In Action''
 
  |-
 
  |-
  | style="width:10%; background:#7B8ABD" | 17:30-19:30 || style="width:80%; background:#C2C2C2" align="left" | OWASP Social Gathering: Drinks & Cocktails - Fortify Cocktail Party - Welcome to OWASP 2009 AU Conference |-
+
  | style="width:10%; background:#7B8ABD" | 15:45-16:15 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | ''Afternoon Tea/Coffee, Vendor Technology Expo'' - ''Espresso Coffee (Sponsored by IBM) provided.''
 +
|-
 +
| style="width:10%; background:#7B8ABD" | 16:15-17:15 || style="width:40%; background:#BC857A" align="left" | Sumit Siddharth - ''Recent Advancements in SQL Injection Exploitation Techniques''
 +
| style="width:40%; background:#BCA57A" align="left" | Karmendra Kohli - ''Wooden Swords and Plastic Guns - Insecure Security Defenses''
 +
|-
 +
| style="width:10%; background:#7B8ABD" | 17:15-18:00 || colspan="2" style="width:40%; background:#F2F2F2" align="left" | Panel - Industry Experts, Talking about real Application Security Threats. ''(You ask the questions, in this informative 45 minutes of panel discussion on relevant industry issues.)''
 +
|-
 +
| style="width:10%; background:#7B8ABD" | 18:30-19:00 || colspan="2" style="width:80%; background:#669966" align="left" | '''OWASP Social Gathering:''' Pre-Dinner Drinks & Cocktails
 +
 
 +
Location: Conference Facility Foyer @ Gold Coast Convention Center (Level 1 FOYER)
 +
|-
 +
| style="width:10%; background:#7B8ABD" | 19:00-22:00 || colspan="2" style="width:80%; background:#669966" align="left" | '''OWASP Social Gathering:''' Gala Dinner, Entertainment and Networking Opportunity. ''This is Free to all attendees and will be a great night.''
 +
 
 +
Location: Conference Facility Foyer @ Gold Coast Convention Center (Level 1 FOYER)
 +
|-
 
|}
 
|}

Revision as of 09:46, 18 February 2009

OWASP Australia 2008 Training Schedule - February 25th, 2008

There are two training sessions held in seperate rooms at this year's conference. During the registration process select which training session you will join. Also all meals and a cocktail party are provided for everyone during the training day.

Day 1 - Wednesday Feb 25, 2009
Application Secure Architecture/Coding Course In-depth Assessment Techniques: Design, Code, and Runtime
08:00-09:00 Registration and Coffee - Espresso Coffee (Sponsored by IBM) provided.
09:00-09:15 Welcome to OWASP AU 2009 - Justin Derry (OWASP Conference Chair AU2009 & Fortify Practice Director Asia Pacific)
09:15-10:45 Keynote: Roger Thorton, CTO Fortify Inc
10:45-11:15 Morning Tea/Coffee, Vendor Technology Expo - Espresso Coffee (Sponsored by IBM) provided.
11:15-12:15 Christian Heinrich & Darren Skidmore - PCI-DSS Application Security Peter Freiberg - Determining attack surface and creating security test cases through observing business testing
12:15-13:30 Lunch, Vendor Technology Expo
13:30-14:30 Andrew Vanderstock - The future (and past) of web application security how to detect and protect against value attacks Siddharth Anbalahan - Advanced Techniques in Code Reviews
14:45-15:45 Ranjita Shankar Iyer - A Prescriptive approach to Secure SDLC Brett Moore - Vulnerabilities In Action
15:45-16:15 Afternoon Tea/Coffee, Vendor Technology Expo - Espresso Coffee (Sponsored by IBM) provided.
16:15-17:15 Sumit Siddharth - Recent Advancements in SQL Injection Exploitation Techniques Karmendra Kohli - Wooden Swords and Plastic Guns - Insecure Security Defenses
17:15-18:00 Panel - Industry Experts, Talking about real Application Security Threats. (You ask the questions, in this informative 45 minutes of panel discussion on relevant industry issues.)
18:30-19:00 OWASP Social Gathering: Pre-Dinner Drinks & Cocktails

Location: Conference Facility Foyer @ Gold Coast Convention Center (Level 1 FOYER)

19:00-22:00 OWASP Social Gathering: Gala Dinner, Entertainment and Networking Opportunity. This is Free to all attendees and will be a great night.

Location: Conference Facility Foyer @ Gold Coast Convention Center (Level 1 FOYER)