This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "2018 BASC Agenda"

From OWASP
Jump to: navigation, search
m
Line 61: Line 61:
 
  | colspan="7" style="width:80%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px" align="center" | <span style="font-size:130%">'''Breakfast and Registration'''</span><br/>
 
  | colspan="7" style="width:80%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px" align="center" | <span style="font-size:130%">'''Breakfast and Registration'''</span><br/>
 
provided by our Platinum Sponsor<br/>
 
provided by our Platinum Sponsor<br/>
<!-- <span style="font-size:140%">'''[https://www.blackducksoftware.com/ Black Duck Software]'''</span><br/>  -->
+
<span style="font-size:140%">'''[https://www.blackducksoftware.com/ Black Duck Software]'''</span><br/>
 
|-
 
|-
 
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 09:00-09:50  
 
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 09:00-09:50  
Line 83: Line 83:
 
| style="width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2018_BASC:Presentaton_Agenda_Template|Presentation|Website Security – AppSec’s partial solution to a complex problem|Chris Olson }}
 
| style="width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2018_BASC:Presentaton_Agenda_Template|Presentation|Website Security – AppSec’s partial solution to a complex problem|Chris Olson }}
 
|-
 
|-
  | style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 12:00-13:00 || colspan="2" style="background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" |  
+
  | style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 12:00-1:00 || colspan="2" style="background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" |  
 
<span style="font-size:130%">'''Lunch'''</span><br/>
 
<span style="font-size:130%">'''Lunch'''</span><br/>
 
provided by our Platinum Sponsor<br/>
 
provided by our Platinum Sponsor<br/>
<!-- <span style="font-size:140%">'''[https://ll.mit.edu/ MIT Lincoln Laboratory]'''</span><br/> -->
+
<span style="font-size:140%">'''[https://www.optiv.com/ Optiv]'''</span><br/>
 
|-
 
|-
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 13:00-13:50
+
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 1:00-1:50
 
| style="width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2018_BASC:Presentaton_Agenda_Template|Presentation|A How Not to Fail Your DevSecOps Transformation|Eitan Worcel }}
 
| style="width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2018_BASC:Presentaton_Agenda_Template|Presentation|A How Not to Fail Your DevSecOps Transformation|Eitan Worcel }}
 
| style="width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2018_BASC:Presentaton_Agenda_Template|Presentation|Navigating the Bug Bounty Marketplace|Bryan Brannigan }}
 
| style="width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2018_BASC:Presentaton_Agenda_Template|Presentation|Navigating the Bug Bounty Marketplace|Bryan Brannigan }}
 
|-
 
|-
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 14:00-14:50
+
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 2:00-2:50
 
| style="width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2018_BASC:Presentaton_Agenda_Template|Presentation|API Security Challenges|Angelo Castigliola }}
 
| style="width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2018_BASC:Presentaton_Agenda_Template|Presentation|API Security Challenges|Angelo Castigliola }}
 
| style="width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2018_BASC:Presentaton_Agenda_Template|Presentation|Voyages of the Security-Driven Enterprise|Katie Knowles }}
 
| style="width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2018_BASC:Presentaton_Agenda_Template|Presentation|Voyages of the Security-Driven Enterprise|Katie Knowles }}
 
|-
 
|-
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 15:00-15:50
+
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 3:00-3:50
 
| style="width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2018_BASC:Presentaton_Agenda_Template|Presentation|Modern Security Architecture with OpenID Connect|Brock Allen  }}
 
| style="width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2018_BASC:Presentaton_Agenda_Template|Presentation|Modern Security Architecture with OpenID Connect|Brock Allen  }}
| style="width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2018_BASC:Presentaton_Agenda_Template|Presentation|Introduction to Android Security|Dzung Pham }}
+
| style="width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2018_BASC:Presentaton_Agenda_Template|Presentation|It depends on....|Tania Ward &amp; Kristen Pascale }}
 
|-
 
|-
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 16:00-16:50
+
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 4:00-4:50
 
| style="width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2018_BASC:Presentaton_Agenda_Template|Presentation|Acquiring and Retaining Cybersecurity Talent: A Proven Model|Deidre Diamond }}
 
| style="width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2018_BASC:Presentaton_Agenda_Template|Presentation|Acquiring and Retaining Cybersecurity Talent: A Proven Model|Deidre Diamond }}
| style="width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2018_BASC:Presentaton_Agenda_Template|Presentation|It depends on....|Tania Ward &amp; Kristen Pascale }}
+
| style="width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2018_BASC:Presentaton_Agenda_Template|Presentation|Introduction to Android Security|Dzung Pham }}
 
|-
 
|-
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 17:00-17:30
+
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 5:00-5:30
 
| colspan="2" style="width:30%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width: 1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" |  
 
| colspan="2" style="width:30%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width: 1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" |  
 
<span style="font-size:130%">'''Social Time'''</span><br/>
 
<span style="font-size:130%">'''Social Time'''</span><br/>
Line 110: Line 110:
 
<!-- <span style="font-size:140%">'''[http://veracode.com Veracode]'''</span><br/> -->
 
<!-- <span style="font-size:140%">'''[http://veracode.com Veracode]'''</span><br/> -->
 
|-
 
|-
| rowspan="2" style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 1px" align="center" | 17:30-18:30
+
| rowspan="2" style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 1px" align="center" | 5:30-6:30
 
| colspan="2" style="width:30%; background:#background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | <span style="font-size:130%">'''Closing Keynote'''</span><br/>
 
| colspan="2" style="width:30%; background:#background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | <span style="font-size:130%">'''Closing Keynote'''</span><br/>
 
<span style="font-size: 150%">'''[[2018_BASC_Homepage#Keynotes|Security at the Intersection of Software, Biology, and Science Fiction]]'''</span><br/>
 
<span style="font-size: 150%">'''[[2018_BASC_Homepage#Keynotes|Security at the Intersection of Software, Biology, and Science Fiction]]'''</span><br/>
Line 165: Line 165:
 
| rowspan="1" style="width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2018_BASC:Workshop_Agenda_Template|Presentation|PenTesting &amp; Net Defense Workshop Briefing|  }}
 
| rowspan="1" style="width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2018_BASC:Workshop_Agenda_Template|Presentation|PenTesting &amp; Net Defense Workshop Briefing|  }}
 
|-
 
|-
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 13:00-13:50
+
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 1:00-1:50
 
| rowspan="3" style="width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2018_BASC:Resume_Agenda_Template|CyberSN / brainbabe }}
 
| rowspan="3" style="width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2018_BASC:Resume_Agenda_Template|CyberSN / brainbabe }}
 
| rowspan="4" style="width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 1px" align="center" | {{2018_BASC:Presentaton_Agenda_Template|Workshop|Threat Modeling Workshop|Robert Hurlbut  }}
 
| rowspan="4" style="width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 1px" align="center" | {{2018_BASC:Presentaton_Agenda_Template|Workshop|Threat Modeling Workshop|Robert Hurlbut  }}
Line 173: Line 173:
 
| style="width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" |
 
| style="width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" |
 
|-
 
|-
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 14:00-14:50
+
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 2:00-2:50
 
| rowspan="1" style="width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" |  
 
| rowspan="1" style="width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" |  
 
| rowspan="1" style="width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" |  
 
| rowspan="1" style="width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" |  
Line 181: Line 181:
 
| rowspan="1" style="width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" |  
 
| rowspan="1" style="width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" |  
 
|-
 
|-
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 15:00-15:50
+
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 3:00-3:50
 
| rowspan="2" style="width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" |  
 
| rowspan="2" style="width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" |  
 
| rowspan="1" style="width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" |  
 
| rowspan="1" style="width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" |  
Line 187: Line 187:
 
| rowspan="1" style="width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" |  
 
| rowspan="1" style="width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" |  
 
|-
 
|-
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 1px" align="center" | 16:00-16:50
+
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 1px" align="center" | 4:00-4:50
 
| style="width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 1px" align="center" |  
 
| style="width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 1px" align="center" |  
 
|}
 
|}

Revision as of 02:43, 23 October 2018

Boston-Banner-468x60.gif
Home | Agenda | Code of Conduct | Presentations | Workshops | Speakers | Twitter 32.png


Platinum Sponsors

HackerOne Black Duck Software Optiv Veracode


Gold Sponsors

Checkmarx Dell Qualys nVisium GoSecure

 

Silver Sponsor

TWM

Please help us keep BASC free by viewing and visiting all of our sponsors.




Presentations

OWASP Logo.gif

Presentations
OWASP Boston Application Security Conference · Saturday, October 27, 2018

8:30-9:30 Breakfast and Registration

provided by our Platinum Sponsor
Black Duck Software

09:00-09:50 Opening Keynote

Secure By Design
Chris Wysopal

Capture the Flag
Arena


Vic Solem &
Phil Barrows

MEI Security


DEFENDERS
Jay Peak Room

ATTACKERS
Bretton Woods Room

Command & Control
Cranmore Room

Washington/Jefferson Room Adams Room
10:00-10:50
11:00-11:50
12:00-1:00

Lunch
provided by our Platinum Sponsor
Optiv

1:00-1:50
2:00-2:50
3:00-3:50
4:00-4:50
5:00-5:30

Social Time
provided by our Platinum Sponsor

5:30-6:30 Closing Keynote

Security at the Intersection of Software, Biology, and Science Fiction
Chris Poulin

Raffle

Wrap Up


Workshops

OWASP Logo.gif

Workshops
OWASP Boston Application Security Conference · Saturday, October 27, 2018

Attitash Monroe Cannon Bretton Woods Jay Peak Cranmore
10:00-10:50

CyberSN Career Center
CyberSN / brainbabe

11:00-11:50
12:30-1:00
1:00-1:50

CyberSN Career Center
CyberSN / brainbabe

2:00-2:50
3:00-3:50
4:00-4:50


You can find out more about this conference at the 2018 BASC Homepage
or by emailing [email protected]
Twitter 32.png