This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "2016 BASC Agenda"

From OWASP
Jump to: navigation, search
Line 69: Line 69:
 
{{2016_BASC:Presentaton_Agenda_Template|Presentation|Continuous Application Security at Scale with IAST and RASP|Jeff Williams }}
 
{{2016_BASC:Presentaton_Agenda_Template|Presentation|Continuous Application Security at Scale with IAST and RASP|Jeff Williams }}
 
  | style="width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" |  
 
  | style="width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" |  
{{2016_BASC:Presentaton_Agenda_Template|Presentation|Hacking with the Gibson, A Hacker Musical|Matt Morency }}
+
{{2016_BASC:Presentaton_Agenda_Template|Presentation|The Code You Never See - Vulnerabilities From 3rd party Marketing Javascript|Jim Weiler }}
 
|-
 
|-
 
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 11:00-11:50 || style="width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" |  
 
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 11:00-11:50 || style="width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" |  
Line 82: Line 82:
 
|-
 
|-
 
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 13:00-13:50 || style="width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" |  
 
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 13:00-13:50 || style="width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" |  
{{2016_BASC:Presentaton_Agenda_Template|Presentation|The Code You Never See - Vulnerabilities From 3rd party Marketing Javascript|Jim Weiler }}
+
{{2016_BASC:Presentaton_Agenda_Template|Presentation|Hacking with the Gibson, A Hacker Musical|Matt Morency }}
 
  | style="width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" |  
 
  | style="width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" |  
 
{{2016_BASC:Presentaton_Agenda_Template|Presentation| |  }}
 
{{2016_BASC:Presentaton_Agenda_Template|Presentation| |  }}

Revision as of 03:54, 25 September 2016

Boston-Banner-468x60.gif
Home | Agenda | Presentations | Workshops | Speakers | Resume Room | Registration | Twitter 32.png
Platinum Sponsors

Checkmarx HPE Rapid7 Veracode


Gold Sponsors

Contrast Security CyberSN

Silver Sponsors

StormpathQualys


Sponsorships are available: See Sponsorship Kit
Please help us keep BASC free by viewing and visiting all of our sponsors.


OWASP Logo.gif

OWASP Boston Application Security Conference
Saturday, October 1, 2016

8:30-9:30

Breakfast and Registration

09:00-09:50

Keynote
Analyzing NextGen Security Practices and Security Tools
Jared DeMott

Washington/Jefferson Room Adams Room
10:00-10:50
11:00-11:50
12:00-13:00

Lunch
provided by our Platinum Sponsor

13:00-13:50
14:00-14:50
15:00-15:50
16:00-16:50
17:00-17:30

Social Time
provided by our Platinum Sponsor

17:30-18:30


Closing Event: The Future of Information Security and IoT Panel
Bring your Q&A and come to hear panelists talk about their thoughts about the future of information security and the Internet Of Things (IoT).


Raffle
Wrap Up


 

Training Workshops

Resume Session

 


You can find out more about this conference at the 2016 BASC Homepage
or by emailing [email protected]
Twitter 32.png