This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "2018 BASC Agenda"

From OWASP
Jump to: navigation, search
(final edit?)
 
Line 108: Line 108:
 
<span style="font-size:130%">'''Social Time'''</span><br/>
 
<span style="font-size:130%">'''Social Time'''</span><br/>
 
provided by our Platinum Sponsor<br/>
 
provided by our Platinum Sponsor<br/>
<!-- <span style="font-size:140%">'''[http://veracode.com Veracode]'''</span><br/> -->
+
<span style="font-size:140%">'''[http://veracode.com Veracode]'''</span><br/>
 
|-
 
|-
 
| rowspan="2" style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 1px" align="center" | 5:30-6:30
 
| rowspan="2" style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 1px" align="center" | 5:30-6:30
Line 148: Line 148:
 
|-
 
|-
 
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 10:00-10:50  
 
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 10:00-10:50  
| rowspan="2" style="width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2018_BASC:Resume_Agenda_Template|Session 1<br/>CyberSN / brainbabe }}
+
| rowspan="2" style="width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2018_BASC:Resume_Agenda_Template|Session 1 }}
 
| rowspan="2" style="width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2018_BASC:Workshop_Agenda_Template|Presentation|Advanced XXE Exploitation|Philippe Arteau }}  
 
| rowspan="2" style="width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2018_BASC:Workshop_Agenda_Template|Presentation|Advanced XXE Exploitation|Philippe Arteau }}  
 
| rowspan="3" style="width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" |   
 
| rowspan="3" style="width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" |   
Line 163: Line 163:
 
|-
 
|-
 
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 1:00-1:50
 
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 1:00-1:50
| rowspan="4" style="width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2018_BASC:Resume_Agenda_Template|Session 2<br/>CyberSN / brainbabe }}
+
| rowspan="4" style="width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2018_BASC:Resume_Agenda_Template|Session 2 }}
 
| rowspan="5" style="width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 1px" align="center" | {{2018_BASC:Presentaton_Agenda_Template|Workshop|Threat Modeling Workshop|Robert Hurlbut  }}
 
| rowspan="5" style="width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 1px" align="center" | {{2018_BASC:Presentaton_Agenda_Template|Workshop|Threat Modeling Workshop|Robert Hurlbut  }}
 
| rowspan="3" style="width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2018_BASC:Presentaton_Agenda_Template|Workshop|Application Cartography and Defense|Erik Costlow }}
 
| rowspan="3" style="width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2018_BASC:Presentaton_Agenda_Template|Workshop|Application Cartography and Defense|Erik Costlow }}
Line 173: Line 173:
 
|-
 
|-
 
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 2:30-2:50
 
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 2:30-2:50
| rowspan="2" colspan="3" style="width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | <div style="margin:0px;"><span style="font-size: 120%">[[2018_BASC_Workshops#Penetration Testing &amp; Network Defender Training Workshop|Penetration Testing &amp; Network Defender Training Workshop]]</span><br/><span style="font-size: 110%">[[2018_BASC_Speakers#|Phil Barrows, John Hammond &amp; Vik Solem]]</span><br/>Participants can choose to occupy Jay Peak, Cranmore, or Bretton Woods.  Best Attacker & Best Defender to be announced at close of conference.</div>     
+
| rowspan="2" colspan="3" style="width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | <div style="margin:0px;"><span style="font-size: 120%">[[2018_BASC_Workshops#Penetration Testing &amp; Network Defender Challenge|Penetration Testing &amp; Network Defender Challenge]]</span><br/><span style="font-size: 110%">[[2018_BASC_Speakers#|Phil Barrows, John Hammond &amp; Vik Solem]]</span><br/>Participants can choose to occupy Jay Peak, Cranmore, or Bretton Woods.  Best Attacker & Best Defender to be announced at close of conference.</div>     
 
|-
 
|-
 
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 3:00-3:50
 
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 3:00-3:50

Latest revision as of 00:59, 25 October 2018

Boston-Banner-468x60.gif
Home | Agenda | Code of Conduct | Presentations | Workshops | Speakers | Twitter 32.png


Platinum Sponsors

HackerOne Black Duck Software Optiv Veracode


Gold Sponsors

Checkmarx Dell Qualys nVisium GoSecure

 

Silver Sponsor

TWM

Please help us keep BASC free by viewing and visiting all of our sponsors.




Presentations

OWASP Logo.gif

Presentations
OWASP Boston Application Security Conference · Saturday, October 27, 2018

8:30-9:30 Breakfast and Registration

provided by our Platinum Sponsor
Black Duck Software

09:00-09:50 Opening Keynote

Secure By Design
Chris Wysopal

Washington/Jefferson Room Adams Room
10:00-10:50
11:00-11:50
12:00-1:00

Lunch
provided by our Platinum Sponsor
Optiv

1:00-1:50
2:00-2:50
3:00-3:50
4:00-4:50
5:00-5:30

Social Time
provided by our Platinum Sponsor
Veracode

5:30-6:30 Closing Keynote

Security at the Intersection of Software, Biology, and Science Fiction
Chris Poulin

Raffle

Wrap Up


Workshops

OWASP Logo.gif

Workshops
OWASP Boston Application Security Conference · Saturday, October 27, 2018

Attitash Monroe Cannon Bretton Woods Jay Peak Cranmore
10:00-10:50
11:00-11:50
12:30-1:00
Penetration Testing & Network Defender Training Workshop
Phil Barrows, John Hammond & Vik Solem
Initial briefing in Cranmore. Then Red Team moves to Jay Peak, while Blue Team remains in Cranmore. Scoring in Bretton Woods.
1:00-1:50
2:00-2:30
2:30-2:50
Penetration Testing & Network Defender Challenge
Phil Barrows, John Hammond & Vik Solem
Participants can choose to occupy Jay Peak, Cranmore, or Bretton Woods. Best Attacker & Best Defender to be announced at close of conference.
3:00-3:50
4:00-4:50


You can find out more about this conference at the 2018 BASC Homepage
or by emailing [email protected]
Twitter 32.png