This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "SecurityByte OWASP Conference Tracks"
From OWASP
Line 18: | Line 18: | ||
*'''[http://www.owasp.org/index.php/Microsoft_SDLC Microsoft SDLC]''' - Adam Shawstack, Microsoft Corp.<br> | *'''[http://www.owasp.org/index.php/Microsoft_SDLC Microsoft SDLC]''' - Adam Shawstack, Microsoft Corp.<br> | ||
*'''[http://www.owasp.org/index.php/Reconsidering_Network_Defense Reconsidering Network Defense]''' - Cedric Blancher, EADS Innovation Works<br> | *'''[http://www.owasp.org/index.php/Reconsidering_Network_Defense Reconsidering Network Defense]''' - Cedric Blancher, EADS Innovation Works<br> | ||
− | Source code review vs. Penetration testing - K. K. Mookhey, Founder & Principal Consultant, NII Consulting<br><br> | + | *'''Source code review vs. Penetration testing''' - K. K. Mookhey, Founder & Principal Consultant, NII Consulting<br><br> |
[http://www.owasp.org/index.php/SecurityByte_and_OWASP_Asia_AppSec_Conference_2009 Category: SecurityByte And OWASP Asia AppSec Conference 2009]<br> | [http://www.owasp.org/index.php/SecurityByte_and_OWASP_Asia_AppSec_Conference_2009 Category: SecurityByte And OWASP Asia AppSec Conference 2009]<br> |
Revision as of 08:25, 24 July 2009
- Xprobe3 - What's New? Going Application Level - Fyodor Yarochkin, Guard-info
- Client Side Hacks - Dino Covotsos, Telspace Systems
- Critical Infrastructure Security “Danger Without borders” - John Bumgarner, US Cyber Consequence Unit (USCCU)
- Exploiting Firefox Extensions - Roberto Suggi Liverani, Security-Assessment.com
- Cloud Hacking – Distributed Attack & Exploit Platform - Shreeraj Shah, Blueinfy Solutions
- SQL Server Forensics 2.0 - Kevvie Fowler, TELUS & Ringzero
- Sectors Vbootkit 2.0: Attacking Windows 7 Via Boot Sectors - Nitin Kumar/Vipin Kumar, Independent Security Researchers, NVlabs
- Testing JSON Applications For Security Holes - Aviram Jenik, Beyond Security
- How To Blackbox Test Almost Anything - Aviram Jenik, Beyond Security
- Topical Issues Affecting The Threat Landscape - Prevalence Of Web Threats - Joshua Talbot, Symantec Corp.
- “Do You Want To Play A Game?”: Game Theory And Simulated Cyber War - Bryan K. Fite, Symantec Corp.
- Hacking Oracle From Web - Sumit Siddharth (Sid), Independent Security Researcher
- TBD - Mano Paul, Software Assurance Advisor (ISC)2
- TBD - Howard A. Schmidt, Former Cyber Security Advisor to the White house; Former Strategic Advisor – President’s Critical Infrastructure Protection Program
- Based Attacks) Hacking Mobile Wallet/Mobile Banking Systems, OR Anti Forensics (OSX Based Attacks) - The Grugq, Independent Security Researcher
- Advanced Web Hacking - Saumil Udayan Shah, Net Square
- Data Loss Protection - Enno Rey, Independent Security Researcher
- Microsoft SDLC - Adam Shawstack, Microsoft Corp.
- Reconsidering Network Defense - Cedric Blancher, EADS Innovation Works
- Source code review vs. Penetration testing - K. K. Mookhey, Founder & Principal Consultant, NII Consulting
Category: SecurityByte And OWASP Asia AppSec Conference 2009