This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "2012 BASC Agenda"
From OWASP
Tom Conner (talk | contribs) (Created page with "{{2012_BASC:Header_Template | Agenda}} <!-- lighter blue: #9BA8CF --> {| style="width:80%" border="0" align="center" ! colspan="3" align="center" style="background:#7B8ABD; ...") |
Tom Conner (talk | contribs) |
||
(21 intermediate revisions by the same user not shown) | |||
Line 1: | Line 1: | ||
{{2012_BASC:Header_Template | Agenda}} | {{2012_BASC:Header_Template | Agenda}} | ||
+ | <!-- -------------------------------------------------------------------- | ||
+ | INSTRUCTIONS FOR EDITORS: | ||
+ | |||
+ | Updating this agenda is a 3-step process. First you must convert the existing entries to the | ||
+ | new format. You can do these one at a time or all at once. Whatever is easiest. Second, you need to | ||
+ | fill in the data for the presentation. Third, miscellaneous details should be cleaned up. | ||
+ | |||
+ | 1) To convert a presentation to the new format: | ||
+ | - Most importantly, look at the 10:00 time slot and use it as an example. | ||
+ | - Find the time slot you want to modify. | ||
+ | - If it already has the Presentation Agenda Template then you are done | ||
+ | - Copy: {{2010_BASC:Presentaton_Agenda_Template|TYPE|To Be Determined Presentation|To Be Determined}} | ||
+ | - Delete the text that is in the time slot already. This requires great care. | ||
+ | You probably want to delete the lines that do not begin with a | ||
+ | pipe (|) or an open curly ({). | ||
+ | - Paste the text you copied into that time slot. | ||
+ | - Replace the word "TYPE" with either "Presentation" or "Keynote" | ||
+ | |||
+ | 2) To fill in the appropriate data: | ||
+ | - Go to http://www.owasp.org/index.php/2010_BASC_Presentations and add | ||
+ | the presentation's abstract. If you don't have an abstract, | ||
+ | insert "Presentation abstract will be available shortly." | ||
+ | - Go to http://www.owasp.org/index.php/2010_BASC_Speakers and add the speaker(s) bio. | ||
+ | If you don't have bio information, just put the speaker's name into the page and | ||
+ | and make their bio "Speaker information will be available shortly." | ||
+ | Until it presents a problem, list multiple speakers as one. | ||
+ | For example, "John Boy & Grandpa". | ||
+ | - Find the right slot in the table. | ||
+ | - Replace the "To Be Determined Presentation" text in the table | ||
+ | with the presentation name __EXACTLY__ as it is on the presentation page. | ||
+ | - Replace the "To Be Determined" text in the table | ||
+ | with the speaker(s) name(s) __EXACTLY__ as it is on the bio page. | ||
+ | |||
+ | 3) Clean up whatever needs cleaning up. | ||
+ | |||
+ | -------------------------------------------------------------------- --> | ||
+ | |||
+ | |||
<!-- lighter blue: #9BA8CF --> | <!-- lighter blue: #9BA8CF --> | ||
{| style="width:80%" border="0" align="center" | {| style="width:80%" border="0" align="center" | ||
− | ! colspan="3" align="center" style="background:#7B8ABD; | + | ! colspan="3" align="center" | |
+ | <table> | ||
+ | <tr> | ||
+ | <td> | ||
+ | [[File:OWASP Logo.gif]]<br/> | ||
+ | </td> | ||
+ | <td> | ||
+ | <span style="font-size:150%">'''OWASP Boston Application Security Conference<br/>Saturday, October 13, 2012'''</span> | ||
+ | </td> | ||
+ | </tr> | ||
+ | </table> | ||
+ | |- | ||
+ | | style="width:10%; background:#7B8ABD" align="center" | 8:30-9:30 || colspan="2" style="width:80%; background:#D2D2D2" align="center" | | ||
+ | <div> | ||
+ | <span style="font-size:130%">'''Breakfast and Registration'''</span><br/> | ||
+ | provided by our Platinum Sponsor<br/> | ||
+ | [[File:Akamai logo.jpg|link=http://www.akamai.com|Akamai]] | ||
+ | </div> | ||
+ | |- | ||
+ | | style="width:10%; background:#7B8ABD" align="center" | 09:00-09:50 || colspan="2" style="width:80%; background:#B0B0B0;" align="center" | | ||
+ | <div style="margin:10px;"> | ||
+ | <span style="font-size:130%">'''Keynote'''</span><br> | ||
+ | <span style="font-size: 120%">[[2012_BASC_Speakers#Josh Corman|Josh Corman]]</span><br/> | ||
+ | </div> | ||
+ | |- | ||
+ | | style="width:10%; background:#7B8ABD" | || align="center" style="width:30%; background:#CFA49B" | '''Track 1'''<br/>Horace Mann Room | ||
+ | | align="center" style="width:30%; background:#DFC799;" | '''Track 2'''<br/>Deborah Sampson / Paul Thomas Room | ||
+ | |- | ||
+ | | style="width:10%; background:#7B8ABD" align="center" | 10:00-10:50 || style="width:30%; background:#BC857A" align="center" | | ||
+ | {{2012_BASC:Presentaton_Agenda_Template|Presentation|Metasploit Fundamental Elements - Course 1|Roy Wattanasin}} | ||
+ | | style="width:30%; background:#BCA57A" align="center" | | ||
+ | {{2012_BASC:Presentaton_Agenda_Template|Presentation|An Insider's Look: WAF and Identity and Access Management Integration|Barracuda Networks}} | ||
+ | |- | ||
+ | | style="width:10%; background:#7B8ABD" align="center" | 11:00-11:50 || style="width:30%; background:#CFA49B" align="center" | | ||
+ | {{2012_BASC:Presentaton_Agenda_Template|Presentation|Metasploit Continued - Course 2|Roy Wattanasin}} | ||
+ | | style="width:30%; background:#DFC799" align="center" | | ||
+ | {{2012_BASC:Presentaton_Agenda_Template|Presentation|Worst practices: How to waste 100% of your security budget|Rob Cheyne}} | ||
+ | |- | ||
+ | | style="width:10%; background:#7B8ABD" align="center" | 12:00-13:00 || colspan="2" style="background:#D2D2D2" align="center" | | ||
+ | <table> | ||
+ | <tr> | ||
+ | <td style="width:70%"> | ||
+ | <center> | ||
+ | <span style="font-size:130%">'''Lunch'''</span><br/> | ||
+ | provided by our Platinum Sponsor<br/> | ||
+ | [[File:Imperva 250x34.jpg|300px|link=http://www.imperva.com|Imperva]] | ||
+ | </center> | ||
+ | </td> | ||
+ | <td style="width:30%; background:#D2D2D2" align="center"> | ||
+ | <span style="font-size:100%">20-Minute Lightning Talk</span><br/> | ||
+ | <span style="font-size: 130%">'''[[2012_BASC_Presentations#NSA Configuration Guidelines for Baseline Security|NSA Configuration Guidelines for Baseline Security]]'''</span><br/> | ||
+ | <span style="font-size: 120%">[[2012_BASC_Speakers#Ray Cote|Ray Cote]]</span><br/> | ||
+ | </td> | ||
+ | </tr> | ||
+ | </table> | ||
+ | |- | ||
+ | | style="width:10%; background:#7B8ABD" align="center" | 13:00-13:50 || style="width:30%; background:#BC857A" align="center" | | ||
+ | {{2012_BASC:Presentaton_Agenda_Template|Presentation|Fuzzing and You: How to Automate Whitebox Testing|Michael Anderson}} | ||
+ | | style="width:30%; background:#BCA57A" align="center" | | ||
+ | {{2012_BASC:Presentaton_Agenda_Template|Presentation|Securing Mobile Apps - Threat Modeling, Whitebox, Blackbox testing|Greg Wolford }} | ||
+ | |||
+ | |- | ||
+ | | style="width:10%; background:#7B8ABD" align="center" | 14:00-14:50 || style="width:30%; background:#CFA49B" align="center" | | ||
+ | {{2012_BASC:Presentaton_Agenda_Template|Presentation|Pitfalls of Secure SDLC and How to Succeed With Automation|Rohit Sethi & Ehsan Foroughi }} | ||
+ | | style="width:30%; background:#DFC799" align="center" | | ||
+ | {{2012_BASC:Presentaton_Agenda_Template|Presentation|Hiding Inside the "Real-Time Web" (to Take-Over the DMZ)|Matt Wood }} | ||
+ | |- | ||
+ | | style="width:10%; background:#7B8ABD" align="center" | 15:00-15:50 || style="width:30%; background:#BC857A" align="center" | | ||
+ | {{2012_BASC:Presentaton_Agenda_Template|Presentation|Streamlining Application Vulnerability Management: Communication Between Development and Security Teams|Brian Mather}} | ||
+ | |||
+ | | style="width:30%; background:#BCA57A" align="center" | | ||
+ | {{2012_BASC:Presentaton_Agenda_Template|Presentation|Top Ten Web Defenses|Jim Manico }} | ||
+ | |||
+ | |- | ||
+ | | style="width:10%; background:#7B8ABD" align="center" | 16:00-16:50 || style="width:30%; background:#CFA49B" align="center" | | ||
+ | {{2012_BASC:Presentaton_Agenda_Template|Presentation|Secure Password Storage: Increasing Resistance to Brute Force Attacks|John Steven, Chandu Ketkar, Scott Matsumoto}} | ||
+ | | style="width:30%; background:#DFC799" align="center" | | ||
+ | {{2012_BASC:Presentaton_Agenda_Template|Presentation|Offensive Mobile Forensics|Joey Peloquin }} | ||
+ | |- | ||
+ | |||
+ | |- | ||
+ | | style="width:10%; background:#7B8ABD" align="center" | 17:00-17:30 || colspan="2" style="width:30%; background:#D2D2D2" align="center" | | ||
+ | <span style="font-size:130%">'''Social Time'''</span><br/> | ||
+ | provided by our Platinum Sponsor<br/> | ||
+ | [[File:Rapid7LogoSmall.png|300px|link=http://www.rapid7.com|Rapid7]] | ||
+ | |- | ||
+ | | style="width:10%; background:#7B8ABD" align="center" | 17:30-18:30 || colspan="2" style="width:30%; background:#B0B0B0" align="center" | | ||
+ | <br/> | ||
+ | |||
+ | <div style="margin:10px;"> | ||
+ | <span style="font-size: 130%">'''[[2012_BASC_Presentations#CTF|Capture The Flag]] Results and Analysis'''</span><br/> | ||
+ | </div> | ||
+ | |||
− | < | + | <span style="font-size:130%">'''Prize Raffle'''</span><br> |
+ | <br/> | ||
+ | <span style="font-size:130%">'''Wrap Up'''</span><br> | ||
− | |||
|} | |} | ||
{{2012_BASC:Footer_Template | Agenda}} | {{2012_BASC:Footer_Template | Agenda}} |
Latest revision as of 22:05, 11 October 2012
2012 BASC: Home Agenda Presentations Speakers
Sponsorships Available
Platinum Sponsors (Listed Alphabetically)
|
Silver Sponsors (Listed Alphabetically)
|
|
|
|
We kindly thank our sponsors for their support. Please help us keep future BASCs free by viewing and visiting all of our sponsors.
Sponsorships are still available.
Agenda
| ||||
---|---|---|---|---|
8:30-9:30 | ||||
09:00-09:50 |
Keynote | |||
Track 1 Horace Mann Room |
Track 2 Deborah Sampson / Paul Thomas Room | |||
10:00-10:50 | ||||
11:00-11:50 | ||||
12:00-13:00 |
| |||
13:00-13:50 | ||||
14:00-14:50 | ||||
15:00-15:50 | ||||
16:00-16:50 | ||||
17:00-17:30 | ||||
17:30-18:30 |
Capture The Flag Results and Analysis
|