This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "OWASP AppSec DC 2009 Schedule"
From OWASP
Mark.bristow (talk | contribs) (→Back to Conference Page) |
Mark.bristow (talk | contribs) (→Back to Conference Page) |
||
Line 117: | Line 117: | ||
| width="200" valign="middle" height="120" bgcolor="#b3ff99" align="center" rowspan="4" | [[SDLC Panel AppSecDC|SDLC Panel]]<br> <br>Pravir Chandra<br>Dan Cornell<br>Michael Craigue<br>Dennis Hurst<br>Joey Peloquin<br>David Rook<br>Keith Turpin | | width="200" valign="middle" height="120" bgcolor="#b3ff99" align="center" rowspan="4" | [[SDLC Panel AppSecDC|SDLC Panel]]<br> <br>Pravir Chandra<br>Dan Cornell<br>Michael Craigue<br>Dennis Hurst<br>Joey Peloquin<br>David Rook<br>Keith Turpin | ||
|- valign="bottom" | |- valign="bottom" | ||
− | | width="67" valign="middle" height=" | + | | width="67" valign="middle" height="15" bgcolor="#7b8abd" rowspan="1"| 2:55-3:10 |
− | | valign="middle" height="5" bgcolor="#e0e0e0" align="center" colspan="3" | Break | + | | valign="middle" height="5" bgcolor="#e0e0e0" align="center" colspan="3" | Coffee Break sponsored by [[Image:AppSecDC2009-Sponsor-denim.gif|link=http://www.denimgroup.com/]] |
|- valign="bottom" | |- valign="bottom" | ||
− | | width="67" valign="middle" height="120" bgcolor="#7b8abd" rowspan="2" | 3: | + | | width="67" valign="middle" height="120" bgcolor="#7b8abd" rowspan="2" | 3:10-3:55 |
| width="200" valign="middle" height="120" bgcolor="#c0a0a0" align="center" rowspan="2" | [[The ESAPI Web Application Firewall (ESAPI WAF)|The ESAPI Web Application Firewall]]<br>Arshan Dabirsiaghi | | width="200" valign="middle" height="120" bgcolor="#c0a0a0" align="center" rowspan="2" | [[The ESAPI Web Application Firewall (ESAPI WAF)|The ESAPI Web Application Firewall]]<br>Arshan Dabirsiaghi | ||
| width="200" valign="middle" height="60" bgcolor="#ffdf80" align="center" | [[One Click Ownage]]<br>Ferruh Mavituna | | width="200" valign="middle" height="60" bgcolor="#ffdf80" align="center" | [[One Click Ownage]]<br>Ferruh Mavituna | ||
Line 127: | Line 127: | ||
| width="200" valign="middle" height="60" bgcolor="#ffdf80" align="center" | [[Web Application Security Scanner Evaluation Criteria]]<br>Brian Shura | | width="200" valign="middle" height="60" bgcolor="#ffdf80" align="center" | [[Web Application Security Scanner Evaluation Criteria]]<br>Brian Shura | ||
|- valign="bottom" | |- valign="bottom" | ||
− | | width="67" valign="middle" height="5" bgcolor="#7b8abd" rowspan="1"| 3: | + | | width="67" valign="middle" height="5" bgcolor="#7b8abd" rowspan="1"| 3:55-4:00 |
| valign="middle" height="5" bgcolor="#e0e0e0" align="center" colspan="5" | Break | | valign="middle" height="5" bgcolor="#e0e0e0" align="center" colspan="5" | Break | ||
|- valign="bottom" | |- valign="bottom" | ||
− | | width="67" valign="middle" height="120" bgcolor="#7b8abd" rowspan="2" | | + | | width="67" valign="middle" height="120" bgcolor="#7b8abd" rowspan="2" | 4:00-4:45 |
| width="200" valign="middle" height="120" bgcolor="#c0a0a0" align="center" rowspan="2" | [[OWASP Live CD: An open environment for Web Application Security]]<br>Matt Tesauro / Brad Causey | | width="200" valign="middle" height="120" bgcolor="#c0a0a0" align="center" rowspan="2" | [[OWASP Live CD: An open environment for Web Application Security]]<br>Matt Tesauro / Brad Causey | ||
| width="200" valign="middle" height="60" bgcolor="#ffdf80" align="center" | [[Learning by Breaking: A New Project Insecure Web Apps]]<br>Chuck Willis | | width="200" valign="middle" height="60" bgcolor="#ffdf80" align="center" | [[Learning by Breaking: A New Project Insecure Web Apps]]<br>Chuck Willis | ||
Line 139: | Line 139: | ||
Josh Abraham | Josh Abraham | ||
|- valign="bottom" | |- valign="bottom" | ||
− | | width="67" valign="middle" height="5" bgcolor="#7b8abd" rowspan="1"| 4: | + | | width="67" valign="middle" height="5" bgcolor="#7b8abd" rowspan="1"| 4:45-4:50 |
| valign="middle" height="5" bgcolor="#e0e0e0" align="center" colspan="5" | Break | | valign="middle" height="5" bgcolor="#e0e0e0" align="center" colspan="5" | Break | ||
|- valign="bottom" | |- valign="bottom" | ||
− | | width="67" valign="middle" height="120" bgcolor="#7b8abd" rowspan="2" | 4: | + | | width="67" valign="middle" height="120" bgcolor="#7b8abd" rowspan="2" | 4:50-5:55 |
| width="200" valign="middle" height="120" bgcolor="#c0a0a0" align="center" rowspan="2" | [[The Entrepreneur's Guide to Career Management]]<br>Lee Kushner | | width="200" valign="middle" height="120" bgcolor="#c0a0a0" align="center" rowspan="2" | [[The Entrepreneur's Guide to Career Management]]<br>Lee Kushner | ||
| width="200" valign="middle" height="60" bgcolor="#ffdf80" align="center" | [[Advanced SSL: The good, the bad, and the ugly]]<br>Michael Coates | | width="200" valign="middle" height="60" bgcolor="#ffdf80" align="center" | [[Advanced SSL: The good, the bad, and the ugly]]<br>Michael Coates | ||
Line 150: | Line 150: | ||
| width="200" valign="middle" height="60" bgcolor="#ffdf80" align="center" | [[User input piercing for Cross Site Scripting Attacks]]<br>Matias Blanco | | width="200" valign="middle" height="60" bgcolor="#ffdf80" align="center" | [[User input piercing for Cross Site Scripting Attacks]]<br>Matias Blanco | ||
|- valign="bottom" | |- valign="bottom" | ||
− | | width="67" valign="middle" height="60" bgcolor="#7b8abd" | | + | | width="67" valign="middle" height="60" bgcolor="#7b8abd" | 6:00-8:00 |
| valign="middle" height="60" bgcolor="#e0e0e0" align="center" colspan="4" | Cocktails and hors d'oeuvres in the EXPO Room (151)<br>Sponsored by [[Image:AppSecDC2009-Sponsor-cenzic.gif|link=http://www.cenzic.com/]]<!-- Day 2 --> | | valign="middle" height="60" bgcolor="#e0e0e0" align="center" colspan="4" | Cocktails and hors d'oeuvres in the EXPO Room (151)<br>Sponsored by [[Image:AppSecDC2009-Sponsor-cenzic.gif|link=http://www.cenzic.com/]]<!-- Day 2 --> | ||
|} | |} | ||
Line 217: | Line 217: | ||
| width="200" valign="middle" height="120" bgcolor="#b3ff99" align="center" | [[Promoting Application Security within Federal Government]]<br>Sarbari Gupta | | width="200" valign="middle" height="120" bgcolor="#b3ff99" align="center" | [[Promoting Application Security within Federal Government]]<br>Sarbari Gupta | ||
|- valign="bottom" | |- valign="bottom" | ||
− | | width="67" valign="middle" height=" | + | | width="67" valign="middle" height="15" bgcolor="#7b8abd" rowspan="1"| 2:55-3:10 |
− | | valign="middle" height="5" bgcolor="#e0e0e0" align="center" colspan="5" | | + | | valign="middle" height="5" bgcolor="#e0e0e0" align="center" colspan="5" | Coffee sponsored by [[Image:AppSecDC2009-Sponsor-fyrm.gif|link=http://www.fyrmassociates.com/]] |
|- valign="bottom" | |- valign="bottom" | ||
− | | width="67" valign="middle" height="120" bgcolor="#7b8abd" rowspan="1" | 3: | + | | width="67" valign="middle" height="120" bgcolor="#7b8abd" rowspan="1" | 3:10-3:55 |
| width="200" valign="middle" height="120" bgcolor="#c0a0a0" align="center" rowspan="1" | [[Deploying Secure Web Applications with OWASP Resources]]<br>Kuai Hinojosa | | width="200" valign="middle" height="120" bgcolor="#c0a0a0" align="center" rowspan="1" | [[Deploying Secure Web Applications with OWASP Resources]]<br>Kuai Hinojosa | ||
| width="200" valign="middle" height="60" bgcolor="#ffdf80" align="center" | [[Manipulating Web Application Interfaces, a new approach to input validation]]<br>Felipe Moreno-Strauch | | width="200" valign="middle" height="60" bgcolor="#ffdf80" align="center" | [[Manipulating Web Application Interfaces, a new approach to input validation]]<br>Felipe Moreno-Strauch | ||
Line 226: | Line 226: | ||
| width="200" valign="middle" height="120" bgcolor="#b3ff99" align="center" rowspan="1" | [[Techniques in Attacking and Defending XML/Web Services]]<br>Mamoon Yunus/Jason Macy | | width="200" valign="middle" height="120" bgcolor="#b3ff99" align="center" rowspan="1" | [[Techniques in Attacking and Defending XML/Web Services]]<br>Mamoon Yunus/Jason Macy | ||
|- valign="bottom" | |- valign="bottom" | ||
− | | width="67" valign="middle" height="5" bgcolor="#7b8abd" rowspan="1"| 3: | + | | width="67" valign="middle" height="5" bgcolor="#7b8abd" rowspan="1"| 3:55-4:00 |
| valign="middle" height="5" bgcolor="#e0e0e0" align="center" colspan="5" | Break | | valign="middle" height="5" bgcolor="#e0e0e0" align="center" colspan="5" | Break | ||
|- valign="bottom" | |- valign="bottom" | ||
− | | width="67" valign="middle" height="60" bgcolor="#7b8abd" | | + | | width="67" valign="middle" height="60" bgcolor="#7b8abd" | 4:00-4:15 |
| valign="middle" height="60" bgcolor="#e0e0e0" align="center" colspan="4" | Closing Remarks (146C) <br> Mark Bristow, Rex Booth, Doug Wilson | | valign="middle" height="60" bgcolor="#e0e0e0" align="center" colspan="4" | Closing Remarks (146C) <br> Mark Bristow, Rex Booth, Doug Wilson | ||
|} | |} |
Revision as of 15:44, 4 November 2009
Back to Conference Page
Please note, speaking times are not final, check back regularly for updates.
Training 11/10
Day 1 - Nov 10th 2009 | |||||
Room 154A | Room 149B | Room 149A | Room 154B | Room 155 | |
09:00-12:00 | Day 1: Assessing and Exploiting Web Applications with the open source Samurai Web Testing Framework Justin Searle |
Day 1: Java EE Secure Code Review Sahba Kazerooni Security Compass |
Threat Modeling Express Krishna Raja Security Compass |
Foundations of Web Services and XML Security Dave Wichers Aspect Security |
Live CD Matt Tesauro |
12:00-13:00 | Lunch | ||||
13:00-17:00 | Assessing and Exploiting Web Applications with the open source Samurai Web Testing Framework Justin Searle |
Java EE Secure Code Review Sahba Kazerooni Security Compass |
Threat Modeling Express Krishna Raja Security Compass |
Foundations of Web Services and XML Security Dave Wichers Aspect Security |
Live CD Matt Tesauro |
Training 11/11
Day 2 - Nov 11th 2009 | |||||
Room 154A | Room 149B | Room 149A | Room 154B | ||
09:00-12:00 | Day 2: Assessing and Exploiting Web Applications with the open source Samurai Web Testing Framework Justin Searle |
Day 2: Java EE Secure Code Review Sahba Kazerooni Security Compass |
WebAppSec.php: Developing Secure Web Applications Robert Zakon |
Leader and Manager Training - Leading the Development of Secure Applications John Pavone Aspect Security | |
12:00-13:00 | Lunch | ||||
13:00-17:00 | Assessing and Exploiting Web Applications with the open source Samurai Web Testing Framework Justin Searle |
Java EE Secure Code Review Sahba Kazerooni Security Compass |
WebAppSec.php: Developing Secure Web Applications Robert Zakon |
Leader and Manager Training - Leading the Development of Secure Applications John Pavone Aspect Security |