This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "2019 BASC Agenda"

From OWASP
Jump to: navigation, search
(Create Agenda)
 
(Add Steven Pelletier)
 
Line 149: Line 149:
 
| rowspan="2" style="width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2019_BASC:Resume_Agenda_Template|Session 1 }}
 
| rowspan="2" style="width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2019_BASC:Resume_Agenda_Template|Session 1 }}
 
| rowspan="6" style="width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2019_BASC:Workshop_Agenda_Template|Presentation|CMD+CTRL Cyber Range|Chad Holmes }}  
 
| rowspan="6" style="width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2019_BASC:Workshop_Agenda_Template|Presentation|CMD+CTRL Cyber Range|Chad Holmes }}  
| rowspan="2" style="width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2019_BASC:Workshop_Agenda_Template|Presentation|Capture Ever-Evolving Security Needs of Users with IKE & Proto-Research Persona Development|Prateek Jain & Ryan Lamarche }}   
+
| rowspan="2" style="width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2019_BASC:Workshop_Agenda_Template|Presentation|Capture Ever-Evolving Security Needs of Users with IKE & Proto-Research Persona Development|Prateek Jain & Ryan LaMarche }}   
| rowspan="2" style="width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2019_BASC:Workshop_Agenda_Template|Presentation|The Ultimate Secure Coding Showdown|Brad Giguere }}
+
| rowspan="2" style="width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2019_BASC:Workshop_Agenda_Template|Presentation|The Ultimate Secure Coding Showdown|Brad Giguere & Steven Pelletier }}
 
| rowspan="2" style="width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2019_BASC:Workshop_Agenda_Template|Presentation|How to Talk to Humans|Kitty Huang & Roy Wattanasin }}   
 
| rowspan="2" style="width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2019_BASC:Workshop_Agenda_Template|Presentation|How to Talk to Humans|Kitty Huang & Roy Wattanasin }}   
 
| rowspan="2" style="width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2019_BASC:Workshop_Agenda_Template|Presentation|Zero to Hero: Intro to Web App Pentesting|Carson Owlett & Gabrielle Hempel }}  
 
| rowspan="2" style="width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2019_BASC:Workshop_Agenda_Template|Presentation|Zero to Hero: Intro to Web App Pentesting|Carson Owlett & Gabrielle Hempel }}  

Latest revision as of 16:00, 15 October 2019

Boston-Banner-468x60.gif
Home | Agenda | Code of Conduct | Presentations | Workshops | Speakers | Twitter 32.png


Platinum Sponsors

NCC Group Ordr WhiteHat


Gold Sponsors

Auric Checkmarx HackerOne Netsparker Sonatype Tala


Silver Sponsor

Qualys

Individual Sponsor: Justin Olin


Please help us keep BASC free by viewing and visiting all of our sponsors.




Presentations

OWASP Logo.gif

Presentations
OWASP Boston Application Security Conference
Saturday, October 19, 2019

8:30-9:30 Breakfast and Registration

provided by our Platinum Sponsor
WhiteHat Security

09:00-09:50 Opening Keynote

The Internet Sucks. Should we replace it?
Andy Ellis

Washington/Jefferson Room Adams Room
10:00-10:50
11:00-11:50
12:00-1:00

Lunch
provided by our Platinum Sponsor
Ordr

1:00-1:50
2:00-2:50
3:00-3:50
4:00-4:50
5:00-5:30

Social Time
provided by our Platinum Sponsor
NCC Group

5:30-6:30 Closing Keynote

Sandcastles in a Storm: Application Vulnerabilities and how they weaken our organizations
Kevin Johnson

Raffle

Wrap Up


Workshops

OWASP Logo.gif

Workshops
OWASP Boston Application Security Conference
Saturday, October 19, 2019

Attitash Monroe Cannon Bretton Woods Jay Peak Cranmore
10:00-10:50
11:00-11:50
1:00-1:50
2:00-2:50
3:00-3:50
4:00-4:50


You can find out more about this conference at the 2019 BASC Homepage
or by emailing [email protected]
Twitter 32.png