This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "2012 BASC Agenda"
From OWASP
Tom Conner (talk | contribs) |
Tom Conner (talk | contribs) |
||
Line 62: | Line 62: | ||
|- | |- | ||
| style="width:10%; background:#7B8ABD" align="center" | 10:00-10:50 || style="width:30%; background:#BC857A" align="center" | | | style="width:10%; background:#7B8ABD" align="center" | 10:00-10:50 || style="width:30%; background:#BC857A" align="center" | | ||
− | + | {{2012_BASC:Presentaton_Agenda_Template|Presentation|Metasploit Hands On Presentation|Roy Wattanasin}} | |
| style="width:30%; background:#BCA57A" align="center" | | | style="width:30%; background:#BCA57A" align="center" | | ||
|- | |- | ||
| style="width:10%; background:#7B8ABD" align="center" | 11:00-11:50 || style="width:30%; background:#CFA49B" align="center" | | | style="width:10%; background:#7B8ABD" align="center" | 11:00-11:50 || style="width:30%; background:#CFA49B" align="center" | | ||
− | + | {{2012_BASC:Presentaton_Agenda_Template|Presentation|Metasploit Hands On Presentation|Roy Wattanasin}} | |
| style="width:30%; background:#DFC799" align="center" | | | style="width:30%; background:#DFC799" align="center" | | ||
− | + | {{2012_BASC:Presentaton_Agenda_Template|Presentation|NSA Configuration Guidelines for Baseline Security|Ray Cote}} | |
+ | {{2012_BASC:Presentaton_Agenda_Template|Presentation|Quick Response Mal-Codes|Jim Weiler}} | ||
|- | |- | ||
| style="width:10%; background:#7B8ABD" align="center" | 12:00-13:00 || colspan="2" style="width:80%; background:#D2D2D2" align="center" | | | style="width:10%; background:#7B8ABD" align="center" | 12:00-13:00 || colspan="2" style="width:80%; background:#D2D2D2" align="center" | | ||
Line 77: | Line 78: | ||
|- | |- | ||
| style="width:10%; background:#7B8ABD" align="center" | 13:00-13:50 || style="width:30%; background:#BC857A" align="center" | | | style="width:10%; background:#7B8ABD" align="center" | 13:00-13:50 || style="width:30%; background:#BC857A" align="center" | | ||
− | + | {{2012_BASC:Presentaton_Agenda_Template|Presentation|Fuzzing and You: How to Automate Whitebox Testing|Michael Anderson}} | |
| style="width:30%; background:#BCA57A" align="center" | | | style="width:30%; background:#BCA57A" align="center" | | ||
Line 83: | Line 84: | ||
|- | |- | ||
| style="width:10%; background:#7B8ABD" align="center" | 14:00-14:50 || style="width:30%; background:#CFA49B" align="center" | | | style="width:10%; background:#7B8ABD" align="center" | 14:00-14:50 || style="width:30%; background:#CFA49B" align="center" | | ||
− | + | {{2012_BASC:Presentaton_Agenda_Template|Presentation|Pitfalls of Secure SDLC and How to Succeed With Automation|Rohit Sethi & Ehsan Foroughi }} | |
| style="width:30%; background:#DFC799" align="center" | | | style="width:30%; background:#DFC799" align="center" | | ||
− | |||
|- | |- | ||
| style="width:10%; background:#7B8ABD" align="center" | 15:00-15:50 || style="width:30%; background:#BC857A" align="center" | | | style="width:10%; background:#7B8ABD" align="center" | 15:00-15:50 || style="width:30%; background:#BC857A" align="center" | | ||
+ | {{2012_BASC:Presentaton_Agenda_Template|Presentation|Streamlining Application Vulnerability Management: Communication Between Development and Security Teams|John Dickson}} | ||
| style="width:30%; background:#BCA57A" align="center" | | | style="width:30%; background:#BCA57A" align="center" | | ||
Line 93: | Line 94: | ||
|- | |- | ||
| style="width:10%; background:#7B8ABD" align="center" | 16:00-16:50 || style="width:30%; background:#CFA49B" align="center" | | | style="width:10%; background:#7B8ABD" align="center" | 16:00-16:50 || style="width:30%; background:#CFA49B" align="center" | | ||
− | + | {{2012_BASC:Presentaton_Agenda_Template|Presentation|Secure Password Storage: Increasing Resistance to Brute Force Attacks|John Steven, Chandu Ketkar, Scott Matsumoto}} | |
| style="width:30%; background:#DFC799" align="center" | | | style="width:30%; background:#DFC799" align="center" | | ||
Revision as of 02:26, 25 September 2012
2012 BASC: Home Agenda Presentations Speakers
Sponsorships Available
Platinum Sponsors (Listed Alphabetically)
|
Silver Sponsors (Listed Alphabetically)
|
|
|
|
We kindly thank our sponsors for their support. Please help us keep future BASCs free by viewing and visiting all of our sponsors.
Sponsorships are still available.
Agenda
Boston Application Security Conference, Saturday, October 13, 2012 | ||
---|---|---|
8:30-9:30 |
Breakfast and Registration | |
09:00-09:50 |
Keynote | |
Track 1 Horace Mann Room |
Track 2 Deborah Sampson / Paul Thomas Room | |
10:00-10:50 | ||
11:00-11:50 | ||
12:00-13:00 | ||
13:00-13:50 |
| |
14:00-14:50 | ||
15:00-15:50 | ||
16:00-16:50 | ||
17:00-17:30 | ||
17:30-18:30 |
| |
18:30-19:00 |
|