This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "2010 BASC Agenda"

From OWASP
Jump to: navigation, search
Line 74: Line 74:
 
|-
 
|-
 
| style="width:10%; background:#7B8ABD" align="center" | 13:00-13:50 || style="width:30%; background:#BC857A" align="center" |  
 
| style="width:10%; background:#7B8ABD" align="center" | 13:00-13:50 || style="width:30%; background:#BC857A" align="center" |  
 
+
{{2010_BASC:Presentaton_Agenda_Template|Presentation|Hacking SAP BusinessObjects|Joshua Abraham and Will Vandevanter}}
'''[[Link to Preso Page | Track 1 Preso 3]]''' <br>
+
  | style="width:30%; background:#DFC799" align="center" |  
''[http://authorurl.com Author Name]''<br>
+
{{2010_BASC:Presentaton_Agenda_Template|Presentation|Coffee Shop Warefare:Protecting Yourself in Dark Territory|John Carmichael}}
[http://video.google.com/ VIDEO] / [http://owasp.org SLIDES]
 
 
 
  | style="width:30%; background:#BCA57A" align="center" |  
 
'''[[Link to Preso Page | Track 2 Preso 3]]''' <br>
 
''[http://authorurl.com Author Name]''<br>
 
[http://video.google.com/ VIDEO] / [http://owasp.org SLIDES]
 
 
 
 
|-
 
|-
 +
 
| style="width:10%; background:#7B8ABD" align="center" | 14:00-14:50 || style="width:30%; background:#CFA49B" align="center" |  
 
| style="width:10%; background:#7B8ABD" align="center" | 14:00-14:50 || style="width:30%; background:#CFA49B" align="center" |  
 
+
{{2010_BASC:Presentaton_Agenda_Template|Presentation|The Exploit Arms Race|Christien Rioux}}
'''[[Link to Preso Page | Track 1 Preso 4]]''' <br>
 
''[http://authorurl.com Author Name]''<br>
 
[http://video.google.com/ VIDEO] / [http://owasp.org SLIDES]
 
 
 
 
  | style="width:30%; background:#DFC799" align="center" |  
 
  | style="width:30%; background:#DFC799" align="center" |  
'''[[Link to Preso Page | Track 2 Preso 4]]''' <br>
+
{{2010_BASC:Presentaton_Agenda_Template|Presentation|Url Enlargement|Dan Crowley}}
''[http://authorurl.com Author Name]''<br>
 
[http://video.google.com/ VIDEO] / [http://owasp.org SLIDES]
 
 
 
 
 
 
|-
 
|-
 +
 
| style="width:10%; background:#7B8ABD" align="center" | 15:00-15:50 || style="width:30%; background:#BC857A" align="center" |  
 
| style="width:10%; background:#7B8ABD" align="center" | 15:00-15:50 || style="width:30%; background:#BC857A" align="center" |  
  
'''[[Link to Preso Page | Track 1 Preso 5]]''' <br>
+
{{2010_BASC:Presentaton_Agenda_Template|Presentation|Business Logic Attacks - BATs and BLBs|Paul Schofield}}
''[http://authorurl.com Author Name]''<br>
+
  | style="width:30%; background:#DFC799" align="center" |  
[http://video.google.com/ VIDEO] / [http://owasp.org SLIDES]
+
{{2010_BASC:Presentaton_Agenda_Template|Presentation|Coffee Shop Warefare:Protecting Yourself in Dark Territory|John Carmichael}}
 
 
  | style="width:30%; background:#BCA57A" align="center" |  
 
'''[[Link to Preso Page | Track 2 Preso 5]]''' <br>
 
''[http://authorurl.com Author Name]''<br>
 
[http://video.google.com/ VIDEO] / [http://owasp.org SLIDES]
 
 
 
 
|-
 
|-
 +
 
| style="width:10%; background:#7B8ABD" align="center" | 16:00-16:50 || style="width:30%; background:#CFA49B" align="center" |  
 
| style="width:10%; background:#7B8ABD" align="center" | 16:00-16:50 || style="width:30%; background:#CFA49B" align="center" |  
 
+
{{2010_BASC:Presentaton_Agenda_Template|Presentation|Business Logic Attacks - BATs and BLBs|Paul Schofield}}
'''[[Link to Preso Page | Track 1 Preso 6]]''' <br>
 
''[http://authorurl.com Author Name]''<br>
 
[http://video.google.com/ VIDEO] / [http://owasp.org SLIDES]
 
 
 
 
  | style="width:30%; background:#DFC799" align="center" |  
 
  | style="width:30%; background:#DFC799" align="center" |  
'''[[Link to Preso Page | Track 2 Preso 6]]''' <br>
+
{{2010_BASC:Presentaton_Agenda_Template|Presentation|Web Applications and Data Tokenization|Kenny Smith}}
''[http://authorurl.com Author Name]''<br>
+
|-
[http://video.google.com/ VIDEO] / [http://owasp.org SLIDES]
 
  
 
|-
 
|-

Revision as of 04:40, 14 November 2010

Platinum Sponsors (Listed Alphabetically)
  CORE Security Rapid7  
SafeLight Security
  Security Innovation SOURCE  


We kindly thank our sponsors for their support. Please help us keep future BASCs free by viewing and visiting all of our sponsors.

Agenda

--- Please bear with us while we work out the details of the 2010 BASC. ---

Saturday, November 20

8:00-9:00

Breakfast and Registration
provided by our Platinum Sponsor:

Rapid7
09:00-09:50
Track 1
Horace Mann Room
Track 2
Deborah Sampson / Paul Thomas Room
10:00-10:50
11:00-11:50
12:00-13:00

Lunch provided by our platinum sponsor

Security Innovation
13:00-13:50
14:00-14:50
15:00-15:50


16:00-16:50
17:00-17:30

Social Time provided by our platinum sponsor

SOURCE
17:30-18:30

Expert Panel:
Presenter Name Company & Title,
Presenter Name Company & Title,
Presenter Name Company & Title,
Presenter Name Company & Title,
Presenter Name Company & Title,
Presenter Name Company & Title,
Moderator: Moderator Name
VIDEO / SLIDES

18:30-19:00

Wrap Up

--- Please bear with us while we work out the details of the 2010 BASC. ---


We kindly thank our sponsors for their support.
Please help us keep future BASCs free by viewing and visiting all of our sponsors.

Gold Sponsors
Auric Systems International Fortify Palo Alto Networks WhiteHat Security

You can find out more about this conference at the BASC homepage: http://www.owasp.org/index.php/2010_BASC_Homepage.
Conference Organizer: Jim Weiler