This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "2018 BASC Agenda"

From OWASP
Jump to: navigation, search
Line 160: Line 160:
 
| rowspan="1" style="width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" |  
 
| rowspan="1" style="width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" |  
 
| rowspan="1" style="width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" |  
 
| rowspan="1" style="width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" |  
| rowspan="4" style="width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | <div style="margin:0px;"><span style="font-size: 120%">[[2018_BASC_Workshops#Pen Testing &amp; Network Defenders: Briefing &amp; Red Team|Pen Testing &amp; Network Defenders]]</span><br/><span style="font-size: 110%">[[2018_BASC_Speakers#|Vic Solem &amp; Phil Barrows]]</span><br/><br/>12:30-2:00: Scoring<br/>2:00-2:30: Break<br/>2:30-4:00: Challenge</div>   
+
| rowspan="2" colspan="3" style="width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | <div style="margin:0px;"><span style="font-size: 120%">[[2018_BASC_Workshops#Penetration Testing &amp; Network Defender Training Workshop|Penetration Testing &amp; Network Defender Training Workshop]]</span><br/><span style="font-size: 110%">[[2018_BASC_Speakers#|Phil Barrows, John Hammond &amp; Vik Solem]]</span><br/>Initial briefing in Cranmore. Then Red Team moves to Jay Peak, while Blue Team remains in Cranmore.  Scoring in Bretton Woods.</div>     
| rowspan="4" style="width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | <div style="margin:0px;"><span style="font-size: 120%">[[2018_BASC_Workshops#Pen Testing &amp; Network Defenders: Briefing &amp; Red Team|Pen Testing &amp; Network Defenders]]</span><br/><span style="font-size: 110%">[[2018_BASC_Speakers#|Vic Solem &amp; Phil Barrows]]</span><br/><br/>12:30-2:00: Blue Team<br/>2:00-2:30: Break<br/>2:30-4:00: Challenge</div>   
 
| rowspan="4" style="width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | <div style="margin:0px;"><span style="font-size: 120%">[[2018_BASC_Workshops#Pen Testing &amp; Network Defenders: Briefing &amp; Red Team|Pen Testing &amp; Network Defenders]]</span><br/><span style="font-size: 110%">[[2018_BASC_Speakers#|Vic Solem &amp; Phil Barrows]]</span><br/><br/>12:30-2:00: Briefing &amp; Red Team<br/>2:00-2:30: Break<br/>2:30-4:00: Challenge</div>     
 
 
|-
 
|-
 
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 1:00-1:50
 
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 1:00-1:50
| rowspan="3" style="width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2018_BASC:Resume_Agenda_Template|Session 2<br/>CyberSN / brainbabe }}
+
| rowspan="4" style="width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2018_BASC:Resume_Agenda_Template|Session 2<br/>CyberSN / brainbabe }}
| rowspan="4" style="width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 1px" align="center" | {{2018_BASC:Presentaton_Agenda_Template|Workshop|Threat Modeling Workshop|Robert Hurlbut  }}
+
| rowspan="5" style="width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 1px" align="center" | {{2018_BASC:Presentaton_Agenda_Template|Workshop|Threat Modeling Workshop|Robert Hurlbut  }}
| rowspan="2" style="width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2018_BASC:Presentaton_Agenda_Template|Workshop|Application Cartography and Defense|Erik Costlow }}
+
| rowspan="3" style="width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2018_BASC:Presentaton_Agenda_Template|Workshop|Application Cartography and Defense|Erik Costlow }}
 
|-
 
|-
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 2:00-2:50
+
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 2:00-2:30
 
| rowspan="1" style="width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" |  
 
| rowspan="1" style="width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" |  
 
| rowspan="1" style="width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" |  
 
| rowspan="1" style="width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" |  
 
| rowspan="1" style="width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" |  
 
| rowspan="1" style="width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" |  
 +
|-
 +
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 2:30-2:50
 +
| rowspan="2" colspan="3" style="width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | <div style="margin:0px;"><span style="font-size: 120%">[[2018_BASC_Workshops#Penetration Testing &amp; Network Defender Training Workshop|Penetration Testing &amp; Network Defender Training Workshop]]</span><br/><span style="font-size: 110%">[[2018_BASC_Speakers#|Phil Barrows, John Hammond &amp; Vik Solem]]</span><br/>Participants can choose to occupy Jay Peak, Cranmore, or Bretton Woods.  Best Attacker & Best Defender to be announced at close of conference.</div>   
 
|-
 
|-
 
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 3:00-3:50
 
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 3:00-3:50
| rowspan="2" style="width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" |  
+
| rowspan="2" style="width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" |  
| rowspan="1" style="width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" |
 
| rowspan="1" style="width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" |
 
| rowspan="1" style="width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" |
 
 
|-
 
|-
 
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 1px" align="center" | 4:00-4:50
 
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 1px" align="center" | 4:00-4:50

Revision as of 12:11, 24 October 2018

Boston-Banner-468x60.gif
Home | Agenda | Code of Conduct | Presentations | Workshops | Speakers | Twitter 32.png


Platinum Sponsors

HackerOne Black Duck Software Optiv Veracode


Gold Sponsors

Checkmarx Dell Qualys nVisium GoSecure

 

Silver Sponsor

TWM

Please help us keep BASC free by viewing and visiting all of our sponsors.




Presentations

OWASP Logo.gif

Presentations
OWASP Boston Application Security Conference · Saturday, October 27, 2018

8:30-9:30 Breakfast and Registration

provided by our Platinum Sponsor
Black Duck Software

09:00-09:50 Opening Keynote

Secure By Design
Chris Wysopal

Washington/Jefferson Room Adams Room
10:00-10:50
11:00-11:50
12:00-1:00

Lunch
provided by our Platinum Sponsor
Optiv

1:00-1:50
2:00-2:50
3:00-3:50
4:00-4:50
5:00-5:30

Social Time
provided by our Platinum Sponsor

5:30-6:30 Closing Keynote

Security at the Intersection of Software, Biology, and Science Fiction
Chris Poulin

Raffle

Wrap Up


Workshops

OWASP Logo.gif

Workshops
OWASP Boston Application Security Conference · Saturday, October 27, 2018

Attitash Monroe Cannon Bretton Woods Jay Peak Cranmore
10:00-10:50

CyberSN Career Center
Session 1
CyberSN / brainbabe

11:00-11:50
12:30-1:00
Penetration Testing & Network Defender Training Workshop
Phil Barrows, John Hammond & Vik Solem
Initial briefing in Cranmore. Then Red Team moves to Jay Peak, while Blue Team remains in Cranmore. Scoring in Bretton Woods.
1:00-1:50

CyberSN Career Center
Session 2
CyberSN / brainbabe

2:00-2:30
2:30-2:50
Penetration Testing & Network Defender Training Workshop
Phil Barrows, John Hammond & Vik Solem
Participants can choose to occupy Jay Peak, Cranmore, or Bretton Woods. Best Attacker & Best Defender to be announced at close of conference.
3:00-3:50
4:00-4:50


You can find out more about this conference at the 2018 BASC Homepage
or by emailing [email protected]
Twitter 32.png