This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "OWASP AppSec Europe 2009 - Poland ag"

From OWASP
Jump to: navigation, search
(New page: {| style="width:80%" border="0" align="center" ! colspan="4" align="center" style="background:#4058A0; color:white" | Day 1 - May 13, 2009 |- | style="width:10%; background:#7B8ABD" | |...)
 
 
Line 65: Line 65:
 
  ! colspan="4" align="center" style="background:#4058A0; color:white" | Day 2 - May 14, 2009
 
  ! colspan="4" align="center" style="background:#4058A0; color:white" | Day 2 - May 14, 2009
 
  |-
 
  |-
  | style="width:10%; background:#7B8ABD" | || style="width:30%; background:#BC857A" | Track 1: Room 1
+
  | style="width:10%; background:#7B8ABD" | || style="width:30%; background:#BC857A" | Track 1: Alfa 1
  | style="width:30%; background:#BCA57A" | Track 2: Room 2
+
  | style="width:30%; background:#BCA57A" | Track 2: Alfa 2
 
  | style="width:30%; background:#99FF99" | Track 3: Room 3
 
  | style="width:30%; background:#99FF99" | Track 3: Room 3
 
  |-
 
  |-
 
  | style="width:10%; background:#7B8ABD" | 08:00-09:00 || colspan="3" style="width:80%; background:#C2C2C2" align="left" | Registration and Coffee
 
  | style="width:10%; background:#7B8ABD" | 08:00-09:00 || colspan="3" style="width:80%; background:#C2C2C2" align="left" | Registration and Coffee
 
  |-
 
  |-
  | style="width:10%; background:#7B8ABD" | 09:00-09:45 || colspan="3" style="width:80%; background:#F2F2F2" align="center" | Fixing Internet Security by Hacking the Business Climate  
+
  | style="width:10%; background:#7B8ABD" | 09:00-09:00 || colspan="3" style="width:80%; background:#F2F2F2" align="center" | Fixing Internet Security by Hacking the Business Climate  
 
''Bruce Schneier, Chief Security Technology Officer, BT''
 
''Bruce Schneier, Chief Security Technology Officer, BT''
 
  |-
 
  |-
  | style="width:10%; background:#7B8ABD" | 09:45-10:30|| colspan="3" style="width:80%; background:#F2F2F2" align="center" | OWASP Projects
+
  | style="width:10%; background:#7B8ABD" | 10:00-10:45|| colspan="3" style="width:80%; background:#F2F2F2" align="center" | OWASP Projects
 
''Dave Wichers, OWASP Foundation''
 
''Dave Wichers, OWASP Foundation''
 
  |-
 
  |-
  | style="width:10%; background:#7B8ABD" | 10:30-10:45 || colspan="3" style="width:80%; background:#C2C2C2" align="left" | Break - Expo - CTF
+
  | style="width:10%; background:#7B8ABD" | 10:45-11:05 || colspan="3" style="width:80%; background:#C2C2C2" align="left" | Break - Expo - CTF
 
  |-
 
  |-
  | style="width:10%; background:#7B8ABD" | 10:45-11:25 || style="width:30%; background:#BC857A" align="left" | OWASP "Google Hacking" Project
+
  | style="width:10%; background:#7B8ABD" | 11:05-11:50 || style="width:30%; background:#BC857A" align="left" | OWASP "Google Hacking" Project
 
''Christian Heinrich, OWASP "Google Hacking" Project Lead''
 
''Christian Heinrich, OWASP "Google Hacking" Project Lead''
 
  | style="width:30%; background:#BCA57A" align="left" | Deploying Secure Web Applications with OWASP Resources
 
  | style="width:30%; background:#BCA57A" align="left" | Deploying Secure Web Applications with OWASP Resources
Line 86: Line 86:
 
''Bart De Win, Ascure''
 
''Bart De Win, Ascure''
 
  |-
 
  |-
  | style="width:10%; background:#7B8ABD" | 11:30-12:10 || style="width:30%; background:#BC857A" align="left" | OWASP Enterprise Security API (ESAPI) Project
+
  | style="width:10%; background:#7B8ABD" | 11:55-12:40 || style="width:30%; background:#BC857A" align="left" | OWASP Enterprise Security API (ESAPI) Project
 
''Dave Wichers, Aspect Security''
 
''Dave Wichers, Aspect Security''
 
  | style="width:30%; background:#BCA57A" align="left" | ''[http://w3af.sf.net/ w3af]'', A framework to 0wn the web
 
  | style="width:30%; background:#BCA57A" align="left" | ''[http://w3af.sf.net/ w3af]'', A framework to 0wn the web
Line 93: Line 93:
 
''Alexandru Bolboaca & Maria Diaconu, Mosaic Works''
 
''Alexandru Bolboaca & Maria Diaconu, Mosaic Works''
 
  |-
 
  |-
  | style="width:10%; background:#7B8ABD" | 12:10-13:30 || colspan="3" style="width:80%; background:#C2C2C2" align="left" | Lunch - Expo - CTF
+
  | style="width:10%; background:#7B8ABD" | 12:40-14:00 || colspan="3" style="width:80%; background:#C2C2C2" align="left" | Lunch - Expo - CTF
 
  |-
 
  |-
  | style="width:10%; background:#7B8ABD" | 13:30-14:10 || style="width:30%; background:#BC857A" align="left" | OWASP ROI: Optimize Security Spending using OWASP
+
  | style="width:10%; background:#7B8ABD" | 14:00-14:45 || style="width:30%; background:#BC857A" align="left" | OWASP ROI: Optimize Security Spending using OWASP
 
''Matt Tesauro, Texas Education Agency''
 
''Matt Tesauro, Texas Education Agency''
 
  | style="width:30%; background:#BCA57A" align="left" | CSRF: the nightmare becomes reality?
 
  | style="width:30%; background:#BCA57A" align="left" | CSRF: the nightmare becomes reality?
Line 102: Line 102:
 
''Giorgio Fedon, Minded Security''
 
''Giorgio Fedon, Minded Security''
 
  |-
 
  |-
  | style="width:10%; background:#7B8ABD" | 14:15-14:45 || style="width:30%; background:#BC857A" align="left" | HTTP Parameter Pollution
+
  | style="width:10%; background:#7B8ABD" | 14:50-15:35 || style="width:30%; background:#BC857A" align="left" | HTTP Parameter Pollution
 
''Luca Carettoni, Independent Researcher & Stefano Di Paola, MindedSecurity''
 
''Luca Carettoni, Independent Researcher & Stefano Di Paola, MindedSecurity''
 
  | style="width:30%; background:#BCA57A" align="left" | OWASP Source Code Flaws Top 10 Project
 
  | style="width:30%; background:#BCA57A" align="left" | OWASP Source Code Flaws Top 10 Project
 
''Paolo Perego, Spike Reply''
 
''Paolo Perego, Spike Reply''
   | style="width:30%; background:#99FF99" align="left" | -
+
   | style="width:30%; background:#99FF99" align="left" | Business Logic Attacks: Bots and Bats
|-
 
| style="width:10%; background:#7B8ABD" | 14:50-15:30 || style="width:30%; background:#BC857A" align="left" | Business Logic Attacks: Bots and Bats
 
 
''Eldad Chai, Imperva''
 
''Eldad Chai, Imperva''
| style="width:30%; background:#BCA57A" align="left" | [http://michael-coates.blogspot.com/2009/05/application-worms-at-owasp-europe.html Real Time Defenses against Application Worms and Malicious Attackers],  [http://www.linkedin.com/in/mcoates ''Michael Coates''], ''Aspect Security''
 
  | style="width:30%; background:#99FF99" align="left" | -
 
 
  |-
 
  |-
  | style="width:10%; background:#7B8ABD" | 15:30-15:45 || colspan="3" style="width:80%; background:#C2C2C2" align="left" | Break - Expo - CTF
+
  | style="width:10%; background:#7B8ABD" | 15:35-15:55 || colspan="3" style="width:80%; background:#C2C2C2" align="left" | Break - Expo - CTF
 
  |-
 
  |-
  | style="width:10%; background:#7B8ABD" | 15:45-16:25 || style="width:30%; background:#BC857A" align="left" | Factoring malware and organized crime in to Web application security
+
  | style="width:10%; background:#7B8ABD" | 15:55-16:40 || style="width:30%; background:#BC857A" align="left" | Factoring malware and organized crime in to Web application security
 
''Gunter Ollmann, Damballa''
 
''Gunter Ollmann, Damballa''
  | style="width:30%; background:#BCA57A" align="left" | Can an accessible web application be secure? Assessment issues for security testers, developers and auditors
+
  | style="width:30%; background:#BCA57A" align="left" | [http://michael-coates.blogspot.com/2009/05/application-worms-at-owasp-europe.html Real Time Defenses against Application Worms and Malicious Attackers],  [http://www.linkedin.com/in/mcoates ''Michael Coates''], ''Aspect Security''
 +
  | style="width:30%; background:#99FF99" align="left" | Can an accessible web application be secure? Assessment issues for security testers, developers and auditors
 
''Colin Watson, Watson Hall Ltd''
 
''Colin Watson, Watson Hall Ltd''
  | style="width:30%; background:#99FF99" align="left" | -
 
 
  |-
 
  |-
  | style="width:10%; background:#7B8ABD" | 16:30-17:30 || colspan="3" style="width:90%; background:#F2F2F2" align="center" | Panel discussion
+
  | style="width:10%; background:#7B8ABD" | 16:45-17:45 || colspan="3" style="width:90%; background:#F2F2F2" align="center" | Panel discussion
 
''Moderator: tbd, Panelists: tbd''
 
''Moderator: tbd, Panelists: tbd''
 
  |-
 
  |-
  | style="width:10%; background:#7B8ABD" | 17:30-17:45 || colspan="3" style="width:80%; background:#F2F2F2" align="center" | Conference Wrap-Up & CTF Awards  
+
  | style="width:10%; background:#7B8ABD" | 17:45-18:00 || colspan="3" style="width:80%; background:#F2F2F2" align="center" | Conference Wrap-Up & CTF Awards  
 
''Dave Wichers, OWASP Foundation''
 
''Dave Wichers, OWASP Foundation''
 
  |-
 
  |-
 
  |}
 
  |}

Latest revision as of 09:14, 11 May 2009

Day 1 - May 13, 2009
Track 1: Alfa 1 Track 2: Alfa 2 Track 3: Room 3
08:00-08:50 Registration and Coffee
08:50-09:00 Welcome to OWASP AppSec 2009 Conference

Sebastien Deleersnyder, OWASP Foundation

09:00-10:00 Keynote

Ross Anderson, Professor in Security Engineering, University of Cambridge

10:00-10:45 OWASP State of the Union

Dinis Cruz & Sebastien Deleersnyder, OWASP Foundation

10:45-11:05 Break - Expo CTF Kick-Off

Andrzej

11:05-11:50 OWASP Live CD: An open environment for Web Application Security

Matt Tesauro, Texas Education Agency

Advanced SQL injection exploitation to operating system full control

Bernardo Damele Assumpcao Guimaraes, lead developer of sqlmap

Mirage: building an application model made easy (OWASP Orizon v 1.2)

Paolo Perego, Spike Reply

11:55-12:40 OWASP Application Security Verification Standard (ASVS) Project

Dave Wichers, Aspect Security

Tracking the effectiveness of an SDL program: lessons from the gym

Cassio Goldschmidt, Symantec Corporation

I thought you were my friend Evil Markup, browser issues and other obscurities

Mario Heiderich, Business-IN

12:40-14:00 Lunch - Expo - CTF
14:00-14:45 Threat Modeling

John Steven, Cigital

Web Application Harvesting

Esteban Ribičić, tbd

Maturing Beyond Application Security Puberty

Roger Thornton, Fortify

14:50-15:35 Exploiting Web 2.0 – Next Generation Vulnerabilities

Shreeraj Shah, Blueinfy

xx When Security Isn’t Free: The Myth of Open Source Security

Rob Rachwald, Fortify

15:35-15:55 Break - Expo - CTF
15:55-16:40 The Software Assurance Maturity Model (SAMM)

Pravir Chandra, Cognosticus

O2 - Advanced Source Code Analysis Toolkit

Dinis Cruz, Ounce Labs

The Truth about Web Application Firewalls: What the vendors do not want you to know

Wendel Guglielmetti Henrique, Trustwave & Sandro Gauci, EnableSecurity

16:45-17:45 Panel: tbd

tbd Moderator: tbd - Panelists: tbd

Day 2 - May 14, 2009
Track 1: Alfa 1 Track 2: Alfa 2 Track 3: Room 3
08:00-09:00 Registration and Coffee
09:00-09:00 Fixing Internet Security by Hacking the Business Climate

Bruce Schneier, Chief Security Technology Officer, BT

10:00-10:45 OWASP Projects

Dave Wichers, OWASP Foundation

10:45-11:05 Break - Expo - CTF
11:05-11:50 OWASP "Google Hacking" Project

Christian Heinrich, OWASP "Google Hacking" Project Lead

Deploying Secure Web Applications with OWASP Resources

Kuai Hinojosa, New York University

Beyond security principles approximation in software architectures

Bart De Win, Ascure

11:55-12:40 OWASP Enterprise Security API (ESAPI) Project

Dave Wichers, Aspect Security

w3af, A framework to 0wn the web

Andrés Riancho, Bonsai Information Security

Brain's hardwiring and its impact on software development and secure software

Alexandru Bolboaca & Maria Diaconu, Mosaic Works

12:40-14:00 Lunch - Expo - CTF
14:00-14:45 OWASP ROI: Optimize Security Spending using OWASP

Matt Tesauro, Texas Education Agency

CSRF: the nightmare becomes reality?

Lieven Desmet, University Leuven

The Bank in the Browser - Defending web infrastructures from banking malware

Giorgio Fedon, Minded Security

14:50-15:35 HTTP Parameter Pollution

Luca Carettoni, Independent Researcher & Stefano Di Paola, MindedSecurity

OWASP Source Code Flaws Top 10 Project

Paolo Perego, Spike Reply

Business Logic Attacks: Bots and Bats

Eldad Chai, Imperva

15:35-15:55 Break - Expo - CTF
15:55-16:40 Factoring malware and organized crime in to Web application security

Gunter Ollmann, Damballa

Real Time Defenses against Application Worms and Malicious Attackers, Michael Coates, Aspect Security Can an accessible web application be secure? Assessment issues for security testers, developers and auditors

Colin Watson, Watson Hall Ltd

16:45-17:45 Panel discussion

Moderator: tbd, Panelists: tbd

17:45-18:00 Conference Wrap-Up & CTF Awards

Dave Wichers, OWASP Foundation