This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "2014 BASC Agenda"

From OWASP
Jump to: navigation, search
 
(3 intermediate revisions by the same user not shown)
Line 53: Line 53:
 
</table>
 
</table>
 
  |-
 
  |-
  | style="width:10%; background:#7B8ABD" align="center" | 8:30-9:30 || colspan="2" style="width:80%; background:#D2D2D2" align="center" |  
+
  | style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 8:30-9:30 || colspan="2" style="width:80%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 1px; border-bottom-width: 0px" align="center" |  
<div>
 
 
<span style="font-size:130%">'''Breakfast and Registration'''</span><br/>
 
<span style="font-size:130%">'''Breakfast and Registration'''</span><br/>
<!--
 
 
provided by our Platinum Sponsor<br/>
 
provided by our Platinum Sponsor<br/>
[[File:Akamai logo.jpg|link=http://www.akamai.com|Akamai]]
+
<span style="padding: 20px">[[File:AkamaiFasterForward.png|link=http://www.akamai.com|190x69px|Akamai]]</span>
-->
 
</div>
 
 
|-
 
|-
  | style="width:10%; background:#7B8ABD" align="center" | 09:00-09:50 || colspan="2" style="width:80%; background:#B0B0B0;" align="center" |  
+
  | style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 09:00-09:50 || colspan="2" style="width:80%; margin:10px; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 1px; border-bottom-width: 0px" align="center" |  
<div style="margin:10px;">
+
<span style="font-size:130%">'''Keynote'''</span><br/>
'''Keynote'''
+
<span style="font-size: 150%">'''[[2014_BASC_Presentations#AppSec: How It Fits into Digital Security|AppSec: How It Fits into Digital Security]]'''</span><br/>
{{2014_BASC:Presentaton_Agenda_Template|Presentation|AppSec: how it fits into Digital Security|Jared DeMott }}
+
<span style="font-size:130%">'''[[2014_BASC_Speakers#Jared DeMott|Dr. Jared DeMott]]'''</span><br/>
</div>
 
 
  |-
 
  |-
  | style="width:10%; background:#7B8ABD" | || align="center" style="width:30%; background:#CFA49B" | '''Hawthorne'''<!--<br/>Horace Mann Room-->
+
  | style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" | || align="center" style="width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" | '''Hawthorne'''<!--<br/>Horace Mann Room-->
  | align="center" style="width:30%; background:#DFC799;" | '''Longfellow'''<!--<br/>Deborah Sampson / Paul Thomas Room-->
+
  | align="center" style="width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" | '''Longfellow'''<!--<br/>Deborah Sampson / Paul Thomas Room-->
 
|-
 
|-
| style="width:10%; background:#7B8ABD" align="center" | 10:00-10:50 || style="width:30%; background:#BC857A" align="center" |   
+
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 10:00-10:50 || style="width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" |   
 
{{2014_BASC:Presentaton_Agenda_Template|Presentation|Why Your AppSec Experts Are Killing You|Jeff Williams }}
 
{{2014_BASC:Presentaton_Agenda_Template|Presentation|Why Your AppSec Experts Are Killing You|Jeff Williams }}
  | style="width:30%; background:#BCA57A" align="center" |  
+
  | style="width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" |  
 
{{2014_BASC:Presentaton_Agenda_Template|Presentation|Finding and Exploiting Access Control Vulnerabilities in Graphical User Interfaces|Collin Mulliner }}
 
{{2014_BASC:Presentaton_Agenda_Template|Presentation|Finding and Exploiting Access Control Vulnerabilities in Graphical User Interfaces|Collin Mulliner }}
 
|-
 
|-
| style="width:10%; background:#7B8ABD" align="center" | 11:00-11:50 || style="width:30%; background:#CFA49B" align="center" |  
+
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 11:00-11:50 || style="width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" |  
 
{{2014_BASC:Presentaton_Agenda_Template|Presentation|The Intersection of Application Architecture and Security Architecture|Walt Williams}}
 
{{2014_BASC:Presentaton_Agenda_Template|Presentation|The Intersection of Application Architecture and Security Architecture|Walt Williams}}
  | style="width:30%; background:#DFC799" align="center" |  
+
  | style="width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" |  
 
{{2014_BASC:Presentaton_Agenda_Template|Presentation|Why is CSP Failing? Trends and Challenges in CSP Adoption|Michael Weissbacher}}
 
{{2014_BASC:Presentaton_Agenda_Template|Presentation|Why is CSP Failing? Trends and Challenges in CSP Adoption|Michael Weissbacher}}
 
|-
 
|-
  | style="width:10%; background:#7B8ABD" align="center" | 12:00-13:00 || colspan="2" style="background:#D2D2D2" align="center" |  
+
  | style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 12:00-13:00 || colspan="2" style="background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 1px; border-bottom-width: 0px" align="center" |  
<table>
 
<tr>
 
<td style="width:70%">
 
<center>
 
 
<span style="font-size:130%">'''Lunch'''</span><br/>
 
<span style="font-size:130%">'''Lunch'''</span><br/>
<!--
 
 
provided by our Platinum Sponsor<br/>
 
provided by our Platinum Sponsor<br/>
[[File:Imperva 250x34.jpg|300px|link=http://www.imperva.com|Imperva]]
+
<span style="padding: 20px">[[File:Cigital.320x105.png|link=http://www.cigital.com|144x48px|Cigital]]</span>
-->
 
</center>
 
</td>
 
<td style="width:30%; background:#D2D2D2" align="center">
 
<!--
 
<span style="font-size:100%">20-Minute Lightning Talk</span><br/>
 
<span style="font-size: 130%">'''[[2014_BASC_Presentations#NSA Configuration Guidelines for Baseline Security|NSA Configuration Guidelines for Baseline Security]]'''</span><br/>
 
<span style="font-size: 120%">[[2014_BASC_Speakers#Ray Cote|Ray Cote]]</span><br/>
 
-->
 
</td>
 
</tr>
 
</table>
 
 
|-
 
|-
| style="width:10%; background:#7B8ABD" align="center" | 13:00-13:50 || style="width:30%; background:#BC857A" align="center" |  
+
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 13:00-13:50 || style="width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" |  
 
{{2014_BASC:Presentaton_Agenda_Template|Presentation|Mobile First AppSec: Evolving AppSec for Mobile Applications|Sagar Dongre}}
 
{{2014_BASC:Presentaton_Agenda_Template|Presentation|Mobile First AppSec: Evolving AppSec for Mobile Applications|Sagar Dongre}}
  | style="width:30%; background:#BCA57A" align="center" |  
+
  | style="width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" |  
 
{{2014_BASC:Presentaton_Agenda_Template|Presentation|Lean Security for Small or Medium Sized Business|Anson Gomes and Jeremy Spencer }}
 
{{2014_BASC:Presentaton_Agenda_Template|Presentation|Lean Security for Small or Medium Sized Business|Anson Gomes and Jeremy Spencer }}
  
 
|-
 
|-
| style="width:10%; background:#7B8ABD" align="center" | 14:00-14:50 || style="width:30%; background:#CFA49B" align="center" |  
+
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 14:00-14:50 || style="width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" |  
 
{{2014_BASC:Presentaton_Agenda_Template|Presentation|Open Source Vulnerability Response|EMC Product Security Response Center }}
 
{{2014_BASC:Presentaton_Agenda_Template|Presentation|Open Source Vulnerability Response|EMC Product Security Response Center }}
  | style="width:30%; background:#DFC799" align="center" |  
+
  | style="width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" |  
 
{{2014_BASC:Presentaton_Agenda_Template|Presentation|Code Assisted PenTest for Mobile Applications|Dinesh Shetty }}
 
{{2014_BASC:Presentaton_Agenda_Template|Presentation|Code Assisted PenTest for Mobile Applications|Dinesh Shetty }}
 
|-
 
|-
| style="width:10%; background:#7B8ABD" align="center" | 15:00-15:50 || style="width:30%; background:#BC857A" align="center" |  
+
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 15:00-15:50 || style="width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" |  
 
{{2014_BASC:Presentaton_Agenda_Template|Presentation|Securing The Android Apps On Your Wrist and Face|Jack Mannino and Geller Bedoya }}
 
{{2014_BASC:Presentaton_Agenda_Template|Presentation|Securing The Android Apps On Your Wrist and Face|Jack Mannino and Geller Bedoya }}
 
+
  | style="width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" |  
  | style="width:30%; background:#BCA57A" align="center" |  
 
 
{{2014_BASC:Presentaton_Agenda_Template|Presentation|Securing Native Big Data Deployments|Steve Markey }}
 
{{2014_BASC:Presentaton_Agenda_Template|Presentation|Securing Native Big Data Deployments|Steve Markey }}
  
 
|-
 
|-
| style="width:10%; background:#7B8ABD" align="center" | 16:00-16:50 || style="width:30%; background:#CFA49B" align="center" |  
+
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 16:00-16:50 || style="width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" |
 +
{{2014_BASC:Presentaton_Agenda_Template|Presentation|Using the OCTAVE Allegro Framework to Model Application Risks and Countermeasures|George Ehrhorn }}
 +
| style="width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" |  
 
{{2014_BASC:Presentaton_Agenda_Template|Presentation|How a Hacker Views Your Web Site|Patrick Laverty}}
 
{{2014_BASC:Presentaton_Agenda_Template|Presentation|How a Hacker Views Your Web Site|Patrick Laverty}}
| style="width:30%; background:#DFC799" align="center" |
 
{{2014_BASC:Presentaton_Agenda_Template|Presentation|Using the OCTAVE Allegro Framework to Model Application Risks and Countermeasures|George Ehrhorn }}
 
 
|-
 
|-
  
 
|-
 
|-
| style="width:10%; background:#7B8ABD" align="center" | 17:00-17:30 || colspan="2" style="width:30%; background:#D2D2D2" align="center" |  
+
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 17:00-17:30 || colspan="2" style="width:30%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width: 1px; border-right-width: 1px; border-left-width: 1px; border-bottom-width: 0px" align="center" |  
 
<span style="font-size:130%">'''Social Time'''</span><br/>
 
<span style="font-size:130%">'''Social Time'''</span><br/>
<!--
 
 
provided by our Platinum Sponsor<br/>
 
provided by our Platinum Sponsor<br/>
[[File:Rapid7LogoSmall.png|300px|link=http://www.rapid7.com|Rapid7]]
+
<span style="padding: 20px">[[File:EMC-no-tag blue RGB.jpg|link=http://www.emc.com|111x36px|EMC]]</span>
-->
 
 
|-
 
|-
| style="width:10%; background:#7B8ABD" align="center" | 17:30-18:30 || colspan="2" style="width:30%; background:#B0B0B0" align="center" |  
+
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 1px" align="center" | 17:30-18:30 || colspan="2" style="width:30%; background:#background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 1px; border-bottom-width: 1px" align="center" |  
 
<br/>
 
<br/>
'''Closing'''<br/>
+
<span style="font-size:130%">'''Closing'''</span><br/>
<span style="font-size:130%">'''[[2014_BASC_Speakers#Josh Corman|Josh Corman]]'''</span><br/>
+
<span style="font-size:140%">'''[[2014_BASC_Speakers#Josh Corman|Josh Corman]]'''</span><br/>
 
<br/>
 
<br/>
 
<span style="font-size:130%">'''Raffle'''</span><br/>
 
<span style="font-size:130%">'''Raffle'''</span><br/>

Latest revision as of 01:59, 14 October 2014

Boston-Banner-468x60.gif 2014 BASC: Home Agenda Presentations Speakers

Platinum Sponsors

Akamai Cigital EMC Rapid7 Sonatype


Gold Sponsors

Accuvant bugcrowdContrast Security   NetSPI nVisium Veracode

Silver Sponsor

SWAMP - Software Assurance Marketplace


We kindly thank our sponsors for their support. All slots are full.
Please help us keep BASC free by viewing and visiting all of our sponsors.


OWASP Logo.gif

OWASP Boston Application Security Conference
Saturday, October 18, 2014

8:30-9:30

Breakfast and Registration
provided by our Platinum Sponsor
Akamai

09:00-09:50

Keynote
AppSec: How It Fits into Digital Security
Dr. Jared DeMott

Hawthorne Longfellow
10:00-10:50
11:00-11:50
12:00-13:00

Lunch
provided by our Platinum Sponsor
Cigital

13:00-13:50
14:00-14:50
15:00-15:50
16:00-16:50
17:00-17:30

Social Time
provided by our Platinum Sponsor
EMC

17:30-18:30


Closing
Josh Corman

Raffle
Wrap Up

You can find out more about this conference at basc2014.org
Conference Organizer: Jim Weiler