This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "2016 BASC Agenda"

From OWASP
Jump to: navigation, search
(Created page with "{{2016_BASC:Header_Template | Agenda}} <!-- -------------------------------------------------------------------- INSTRUCTIONS FOR EDITORS: Updating this agenda is a 3-step pr...")
 
 
(18 intermediate revisions by the same user not shown)
Line 37: Line 37:
 
-------------------------------------------------------------------- -->
 
-------------------------------------------------------------------- -->
  
 +
__FORCETOC__
  
 +
<br/>
 +
<br/>
 +
 +
= Presentations =
  
 
<!-- lighter blue: #9BA8CF -->
 
<!-- lighter blue: #9BA8CF -->
Line 48: Line 53:
 
</td>
 
</td>
 
<td>
 
<td>
<span style="font-size:150%">'''OWASP Boston Application Security Conference<br/>Saturday, October 1, 2016'''</span>
+
<span style="font-size:150%">'''Presentations<br/>OWASP Boston Application Security Conference · Saturday, October 1, 2016'''</span>
 
</td>
 
</td>
 
</tr>
 
</tr>
Line 54: Line 59:
 
  |-
 
  |-
 
  | style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 8:30-9:30 || colspan="2" style="width:80%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 1px; border-bottom-width: 0px" align="center" |  
 
  | style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 8:30-9:30 || colspan="2" style="width:80%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 1px; border-bottom-width: 0px" align="center" |  
<span style="font-size:130%">'''Breakfast and Registration'''</span><!--<br/>
+
<span style="font-size:130%">'''Breakfast and Registration'''</span><br/>
 
provided by our Platinum Sponsor<br/>
 
provided by our Platinum Sponsor<br/>
<span style="padding: 20px">[[File:AkamaiFasterForward.png|link=http://www.akamai.com|190x69px|Akamai]]</span>-->
+
<span style="font-size:140%">'''[http://hpe.com Hewlett Packard Enterprise]'''</span><br/>
 
|-
 
|-
 
  | style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 09:00-09:50 || colspan="2" style="width:80%; margin:10px; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 1px; border-bottom-width: 0px" align="center" |  
 
  | style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 09:00-09:50 || colspan="2" style="width:80%; margin:10px; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 1px; border-bottom-width: 0px" align="center" |  
<span style="font-size:130%">'''Keynote'''</span><br/>
+
<span style="font-size:130%">'''Opening Keynote'''</span><br/>
<span style="font-size: 150%">'''[[2016_BASC_Homepage#Keynote|Analyzing NextGen Security Practices and Security Tools]]'''</span><br/>
+
<span style="font-size: 150%">'''[[2016_BASC_Homepage#Keynotes|AppSec and DevOps]]'''</span><br/>
<span style="font-size:130%">'''[[2016_BASC_Homepage#Keynote|Jared DeMott]]'''</span><br/>
+
<span style="font-size:130%">'''[[2016_BASC_Homepage#Keynotes|Dennis Hurst]]'''</span><br/>
 
  |-
 
  |-
 
  | style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" | || align="center" style="width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" | '''Washington/Jefferson Room'''
 
  | style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" | || align="center" style="width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" | '''Washington/Jefferson Room'''
Line 69: Line 74:
 
{{2016_BASC:Presentaton_Agenda_Template|Presentation|Continuous Application Security at Scale with IAST and RASP|Jeff Williams }}
 
{{2016_BASC:Presentaton_Agenda_Template|Presentation|Continuous Application Security at Scale with IAST and RASP|Jeff Williams }}
 
  | style="width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" |  
 
  | style="width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" |  
{{2016_BASC:Presentaton_Agenda_Template|Presentation|Hacking with the Gibson, A Hacker Musical|Matt Morency }}
+
{{2016_BASC:Presentaton_Agenda_Template|Presentation|The Code You Never See - Vulnerabilities From 3rd party Marketing Javascript|Jim Weiler }}
 
|-
 
|-
 
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 11:00-11:50 || style="width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" |  
 
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 11:00-11:50 || style="width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" |  
{{2016_BASC:Presentaton_Agenda_Template|Presentation| | }}
+
{{2016_BASC:Presentaton_Agenda_Template|Presentation|Future of Information Security and IoT Panel|Rob Cheyne, Tom Conner, Pedro Marcano, Roy Wattanasin }}
 
  | style="width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" |  
 
  | style="width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" |  
{{2016_BASC:Presentaton_Agenda_Template|Presentation| | }}
+
{{2016_BASC:Presentaton_Agenda_Template|Presentation|Software Product Security: A Way Forward|Bill Campbell }}
 
|-
 
|-
 
  | style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 12:00-13:00 || colspan="2" style="background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 1px; border-bottom-width: 0px" align="center" |  
 
  | style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 12:00-13:00 || colspan="2" style="background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 1px; border-bottom-width: 0px" align="center" |  
 
<span style="font-size:130%">'''Lunch'''</span><br/>
 
<span style="font-size:130%">'''Lunch'''</span><br/>
 
provided by our Platinum Sponsor<br/>
 
provided by our Platinum Sponsor<br/>
<!--<span style="padding: 20px">[[File:Cigital.320x105.png|link=http://www.cigital.com|144x48px|Cigital]]</span>-->
+
<span style="font-size:140%">'''[http://checkmarx.com Checkmarx]'''</span><br/>
 
|-
 
|-
 
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 13:00-13:50 || style="width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" |  
 
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 13:00-13:50 || style="width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" |  
{{2016_BASC:Presentaton_Agenda_Template|Presentation|The Code You Never See - Vulnerabilities From 3rd party Marketing Javascript|Jim Weiler }}
+
{{2016_BASC:Presentaton_Agenda_Template|Presentation|Hacking with the Gibson, A Hacker Musical|Matt Morency }}
 
  | style="width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" |  
 
  | style="width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" |  
{{2016_BASC:Presentaton_Agenda_Template|Presentation| | }}
+
{{2016_BASC:Presentaton_Agenda_Template|Presentation|Practical Threat Modeling|Dennis Hurst }}
  
 
|-
 
|-
Line 107: Line 112:
 
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 17:00-17:30 || colspan="2" style="width:30%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width: 1px; border-right-width: 1px; border-left-width: 1px; border-bottom-width: 0px" align="center" |  
 
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 17:00-17:30 || colspan="2" style="width:30%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width: 1px; border-right-width: 1px; border-left-width: 1px; border-bottom-width: 0px" align="center" |  
 
<span style="font-size:130%">'''Social Time'''</span><br/>
 
<span style="font-size:130%">'''Social Time'''</span><br/>
provided by our Platinum Sponsor<br/>
+
provided by our Platinum Sponsors<br/>
<!--<span style="padding: 20px">[[File:EMC-no-tag blue RGB.jpg|link=http://www.emc.com|111x36px|EMC]]</span>-->
+
<span style="font-size:140%">'''[http://veracode.com Veracode]''' &nbsp;&nbsp;&nbsp; '''[http://rapid7.com Rapid7]'''</span><br/>
 
|-
 
|-
 
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 1px" align="center" | 17:30-18:30 || colspan="2" style="width:30%; background:#background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 1px; border-bottom-width: 1px" align="center" |  
 
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 1px" align="center" | 17:30-18:30 || colspan="2" style="width:30%; background:#background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 1px; border-bottom-width: 1px" align="center" |  
 
<br/>
 
<br/>
<span style="font-size:130%">'''Closing Event'''</span><br/>
+
 
 +
<span style="font-size:130%">'''Closing Keynote'''</span><br/>
 +
<span style="font-size: 150%">'''[[2016_BASC_Homepage#Keynotes|Soft Skills Matter - How to speak XSS]]'''</span><br/>
 +
<span style="font-size:130%">'''[[2016_BASC_Homepage#Keynotes|Deidre Diamond]]'''</span><br/>
 +
 
 
<!--<span style="font-size:140%">'''[[2016_BASC_Speakers#Josh Corman|Josh Corman]]'''</span><br/>
 
<!--<span style="font-size:140%">'''[[2016_BASC_Speakers#Josh Corman|Josh Corman]]'''</span><br/>
 
<span style="font-size: 110%">Paul Roberts</span><br/>-->
 
<span style="font-size: 110%">Paul Roberts</span><br/>-->
Line 122: Line 131:
  
  
<center>
+
= Workshops & Resume Sessions =
<table style="border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-width:1px"><tr><td>&nbsp;</td><td style="background:#FFFBDF; font-size:140%">
+
 
<center>
 
'''Training Workshops in the Cranmore Room'''
 
  
'''Resume Session in Bretton Woods'''
+
<!-- lighter blue: #9BA8CF -->
 +
{| style="width:80%" border="0" align="center"
 +
! colspan="4" align="center"  |
 +
<table>
 +
<tr>
 +
<td>
 +
[[File:OWASP Logo.gif]]<br/>
 +
</td>
 +
<td>
 +
<span style="font-size:150%">'''Workshops & Resume Sessions<br/>OWASP Boston Application Security Conference · Saturday, October 1, 2016'''</span>
 +
</td>
 +
</tr>
 +
</table>
 +
|-
 +
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" | || align="center" style="width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" | '''Cranmore'''
 +
| align="center" style="width:30%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" | '''Monroe'''
 +
| align="center" style="width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" | '''Bretton Woods'''
 +
|-
 +
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 10:00-10:50 || style="width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2016_BASC:Workshop_Agenda_Template|Presentation|Painless Web and Mobile Hacking 101|Apoorv Munshi }}
 +
| rowspan="2" style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 
 +
{{2016_BASC:Workshop_Agenda_Template|Presentation|Highlights from the Matasano Challenges|Matt Cheung| }}
 +
| style="width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" |
 +
{{2016_BASC:Resume_Agenda_Template|CyberSN }}
 +
|-
 +
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 11:00-11:50 || style="width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2016_BASC:Workshop_Agenda_Template|Presentation|Painless Web and Mobile Hacking 101|Apoorv Munshi }}
 +
| style="width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" |
 +
{{2016_BASC:Resume_Agenda_Template|Millennium Consulting }}
 +
|-
 +
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 13:00-13:50 || style="width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2016_BASC:Workshop_Agenda_Template|Presentation| |  }}
 +
| rowspan="2" style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 
 +
{{2016_BASC:Workshop_Agenda_Template|Presentation|Highlights from the Matasano Challenges|Matt Cheung| }}
 +
| rowspan="4" style="width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" |
 +
{{2016_BASC:Presentaton_Agenda_Template|Presentation|ThreatModeling|Robert Hurlbut  }}
 +
|-
 +
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 14:00-14:50 || style="width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 
 +
{{2016_BASC:Workshop_Agenda_Template|Presentation|Painless Web and Mobile Hacking 101|Apoorv Munshi }}
 +
|-
 +
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 15:00-15:50 || style="width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" |
 +
{{2016_BASC:Resume_Agenda_Template|Wayfair  }}
 +
| rowspan="2" style="width:30%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" |
 +
{{2016_BASC:Workshop_Agenda_Template|Presentation|Highlights from the Matasano Challenges|Matt Cheung| }}
 +
|-
 +
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 16:00-16:50 || style="width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2016_BASC:Resume_Agenda_Template|CyberSN  }}
 +
|}
  
</center>
 
</td><td>&nbsp;</td></tr>
 
</table></center>
 
  
  
 
{{2016_BASC:Footer_Template | Agenda}}
 
{{2016_BASC:Footer_Template | Agenda}}

Latest revision as of 18:28, 30 September 2016

Boston-Banner-468x60.gif
Home | Agenda | Presentations | Workshops | Speakers | Resume Room | Registration | Twitter 32.png
Platinum Sponsors

Checkmarx HPE Rapid7 Veracode


Gold Sponsors

Contrast Security CyberSN

Silver Sponsors

StormpathQualys


Sponsorships are available: See Sponsorship Kit
Please help us keep BASC free by viewing and visiting all of our sponsors.




Presentations

OWASP Logo.gif

Presentations
OWASP Boston Application Security Conference · Saturday, October 1, 2016

8:30-9:30

Breakfast and Registration
provided by our Platinum Sponsor
Hewlett Packard Enterprise

09:00-09:50

Opening Keynote
AppSec and DevOps
Dennis Hurst

Washington/Jefferson Room Adams Room
10:00-10:50
11:00-11:50
12:00-13:00

Lunch
provided by our Platinum Sponsor
Checkmarx

13:00-13:50
14:00-14:50
15:00-15:50
16:00-16:50
17:00-17:30

Social Time
provided by our Platinum Sponsors
Veracode     Rapid7

17:30-18:30


Closing Keynote
Soft Skills Matter - How to speak XSS
Deidre Diamond


Raffle
Wrap Up


Workshops & Resume Sessions

OWASP Logo.gif

Workshops & Resume Sessions
OWASP Boston Application Security Conference · Saturday, October 1, 2016

Cranmore Monroe Bretton Woods
10:00-10:50

Resume Session
CyberSN

11:00-11:50

Resume Session
Millennium Consulting

13:00-13:50
14:00-14:50
15:00-15:50

Resume Session
Wayfair

16:00-16:50

Resume Session
CyberSN


You can find out more about this conference at the 2016 BASC Homepage
or by emailing [email protected]
Twitter 32.png