This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
OWASP Bucharest AppSec Conference 2017 Talks
Conference agenda | |||||
| Time | Title | Speaker | Description | ||
| 8:30 - 9:00 (30 mins) |
Registration and coffee break | ||||
| 9:15 - 10:00 (45 mins) |
Testing for cyber resilience: tools & techniques for adversary attack/defense simulation | Teodor Cimpoesu and Adrian Ifrim | We know that testing selected points around large infrastructures, combined with testing a subset of the enterprise applications (the critical ones) is no longer enough to match what is going on in the wild in terms of cyber risk.
Nowadays real attacks often go undetected for months, use modern tools & techniques, and the responders many times get overwhelmed by the complexity of analysis, time pressure, and the need to understand adversary tactics. | ||
| 10:00 - 10:45 (45 mins) |
Securing the code and waiting for skilled hackers | Sergiu Zaharia | When code is analyzed and secured early in the development phase, the developers are really curious about the remaining channels that can be exploited by hackers.
Via this presentation we try to provide hints on the following topics:
| ||
| 11:00 - 11:40 (40 mins) |
Less Known Web Application Vulnerabilities | Ionut Popescu | Many application programs (including their testing strategies) rely on rather simple standards, sometimes even as simple as OWASP Top Ten. This often leads to a false sense of security – developers tend to believe that if they have worked their way through ready-made checklists and took proper care of the well-known topics like authentication, authorization or using parameterized queries, there should be no big surprises ahead. Nevertheless, the real world of application security is way more complicated than this. New attack vectors are being found on a regular basis and security standards and vulnerability libraries tend to get obsolete pretty fast. It’s nearly impossible to keep on track regarding all vulnerabilities which an application can be vulnerable to. | ||
| 11:50 - 12:30 (40 mins) |
Students in Security Panel | ||||
| 12:30 - 13:30 (60 mins) |
Lunch/Coffee Break | ||||
| 13:30 - 14:15 (45 mins) |
|||||
| 14:15 - 15:00 (45 mins) |
|||||
| 15:00 - 15:15 (15 mins) |
Coffee break | ||||
| 15:15 - 16:00 (45 mins) |
|||||
| 16:00 - 16:45 (45 mins) |
|||||
| 16:45 - 17:00 (15 mins) |
Closing ceremony | OWASP Bucharest team | CTF Prizes | ||