This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
OWASP & WASC AppSec 2008 Conference
From OWASP
OWASP NYC AppSec 2008 Conference October 7th - 10th 2008
- Call for papers READ FAQ , trainers and sponsors is now offically open. All submissions needs to be sent to tomb(at)owasp.org any questions, call 973-202-0122
Tuesday - October 7th
| Time | Build it! | Break it! | Bring it on! |
|---|---|---|---|
| 0800 | Registration Opens & TechExpo | ||
| 0930 | Keynote: OWASP Foundation | ||
| 1000 | TOPIC SPEAKERS |
TOPICS SPEAKERS |
TOPICS SPEAKERS |
| 1100 | TOPIC SPEAKERS |
TOPIC SPEAKERS |
TOPIC SPEAKERS |
| 1200 | TOPIC SPEAKERS |
TOPIC SPEAKERS |
TOPIC SPEAKERS |
| 1300 | Lunch | ||
| 1400 | TOPIC SPEAKERS |
TOPIC SPEAKERS |
TOPIC SPEAKERS |
| 1500 | Practical Hacker Crypto Simple Nomad |
VoIP Penetration Testing: Lessons Learned John Kindervag and Jason Ostrom |
I Will Be Your Eyes and Hands: Colossal Cave, Adventure and Reality Jason Scott |
| 1600 | Using Aspect Oriented Programming to Prevent Application Attacks Rohit Sethi and Nish Bhalla |
Got Citrix? Hack It! Shanit Gupta |
You Must Be This Tall to Ride the Security Ride Joel Wilbanks and Pete Caro |
| 1700 | Flash Drives & Solid State Drives Data Recovery Comparison to Hard Drives: Animated Scott Moulton |
Advanced Protocol Fuzzing - What We Learned when Bringing Layer2 Logic to "SPIKE Land" Enno Rey and Daniel Mende |
Legal Issues for Bot-net Researchers and Mitigators Alexander Muentz |
| 1830 | Hack or Halo | ||
| 2100 | Saturday Night Party @ TBD | ||
Wednesday - October 8th
| Time | Build it! | Break it! | Bring it on! |
|---|---|---|---|
| 0930 | Registration Opens | ||
| 0945 | Administrivia | ||
| 1000 | Hacking Windows Vista Security Dan Griffin |
Malware Software Armoring Circumvention Danny Quist |
When Lawyers Attack! Dealing with the New Rules of Electronic Discovery John Benson, Esq.<i></td></tr> |
| 1100 | Vulncatcher: Fun with Vtrace and Programmatic Debugging <i>atlas |
0wn the Con The Shmoo Group |
The Geek and the Gumshoe or Can Mathematics and Computers Really Solve Crimes? Michael Schearer and Frank Thornton |
| 1200 | Path X: Explosive Security Testing Tools using XPath Andre Gironda, Marcin Wielgoszewski and Tom Stracener |
PEAP: Pwned Extensible Authentication Protocol Josh Wright and Brad Antoniewicz |
How do I Pwn Thee? Let Me Count the Ways RenderMan |
| 1300 | Room Split | ||
| 1330 | Something Really Cool | ||
| 1430 | Closing Remarks | ||
Technology Expo - October 7th - 8th
Want to see the latest offerings from best of breed technology firms? For 2 days, Product/Service vendors worldwide will demonstrate their ability to conference attendees.
To be a vendor at this event please contact Tom Brennan at tomb (at) owasp.org or 973-202-0122
OWASP AppSec 2008 Training Courses - October 9th and 10th 2008
| T1. Building and Testing Secure Web Applications |
|---|
| This powerful two-day course focuses on the most common web application security problems, including the OWASP Top Ten. The course will introduce and demonstrate hacking techniques, illustrating how easily application vulnerabilities can be exploited so students really understand how to avoid introducing such vulnerabilities into their code. |
| T2. Application Security Forensics |
| How would you respond to a application security hack? This coure will provide insight into the world or forensics with a focus on Web Application Security |
| T3. TBD |
| tbd Read more here! |
| T4. TBD |
| tbd Read more here! |
| T5. TBD |
| TBD |
To be a trainer at this event please contact Tom Brennan at tomb (at) owasp.org or 973-202-0122