This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

OWASP & WASC AppSec 2008 Conference

From OWASP
Revision as of 02:12, 1 February 2008 by Brennan (talk | contribs)

Jump to: navigation, search

OWASP NYC AppSec 2008 Conference October 7th - 10th 2008

  • Call for papers READ FAQ , trainers and sponsors is now offically open. All submissions needs to be sent to tomb(at)owasp.org any questions, call 973-202-0122

Tuesday - October 7th

Time Build it! Break it! Bring it on!
0800Registration Opens & TechExpo
0930 Keynote: OWASP Foundation
1000TOPIC
SPEAKERS
TOPICS
SPEAKERS
TOPICS
SPEAKERS
1100TOPIC
SPEAKERS
TOPIC
SPEAKERS
TOPIC
SPEAKERS
1200TOPIC
SPEAKERS
TOPIC
SPEAKERS
TOPIC
SPEAKERS
1300Lunch
1400TOPIC
SPEAKERS
TOPIC
SPEAKERS
TOPIC
SPEAKERS
1500Practical Hacker Crypto
Simple Nomad
VoIP Penetration Testing: Lessons Learned
John Kindervag and Jason Ostrom
I Will Be Your Eyes and Hands: Colossal Cave, Adventure and Reality
Jason Scott
1600Using Aspect Oriented Programming to Prevent Application Attacks
Rohit Sethi and Nish Bhalla
Got Citrix? Hack It!
Shanit Gupta
You Must Be This Tall to Ride the Security Ride
Joel Wilbanks and Pete Caro
1700Flash Drives & Solid State Drives Data Recovery Comparison to Hard Drives: Animated
Scott Moulton
Advanced Protocol Fuzzing - What We Learned when Bringing Layer2 Logic to "SPIKE Land"
Enno Rey and Daniel Mende
Legal Issues for Bot-net Researchers and Mitigators
Alexander Muentz
1830Hack or Halo
2100Saturday Night Party @ TBD


Wednesday - October 8th

Time Build it! Break it! Bring it on!
0930Registration Opens
0945Administrivia
1000Hacking Windows Vista Security
Dan Griffin
Malware Software Armoring Circumvention
Danny Quist
When Lawyers Attack! Dealing with the New Rules of Electronic Discovery
John Benson, Esq.<i></td></tr>
1100Vulncatcher: Fun with Vtrace and Programmatic Debugging
<i>atlas
0wn the Con
The Shmoo Group
The Geek and the Gumshoe or Can Mathematics and Computers Really Solve Crimes?
Michael Schearer and Frank Thornton
1200Path X: Explosive Security Testing Tools using XPath
Andre Gironda, Marcin Wielgoszewski and Tom Stracener
PEAP: Pwned Extensible Authentication Protocol
Josh Wright and Brad Antoniewicz
How do I Pwn Thee? Let Me Count the Ways
RenderMan
1300Room Split
1330Something Really Cool
1430Closing Remarks


Technology Expo - October 7th - 8th

Want to see the latest offerings from best of breed technology firms? For 2 days, Product/Service vendors worldwide will demonstrate their ability to conference attendees.

To be a vendor at this event please contact Tom Brennan at tomb (at) owasp.org or 973-202-0122

OWASP AppSec 2008 Training Courses - October 9th and 10th 2008

T1. Building and Testing Secure Web Applications
This powerful two-day course focuses on the most common web application security problems, including the OWASP Top Ten. The course will introduce and demonstrate hacking techniques, illustrating how easily application vulnerabilities can be exploited so students really understand how to avoid introducing such vulnerabilities into their code.
T2. Application Security Forensics
How would you respond to a application security hack? This coure will provide insight into the world or forensics with a focus on Web Application Security
T3. TBD
tbd Read more here!
T4. TBD
tbd Read more here!
T5. TBD
TBD

To be a trainer at this event please contact Tom Brennan at tomb (at) owasp.org or 973-202-0122