This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "2019 BASC Agenda"
From OWASP
(Create Agenda) |
(Add Steven Pelletier) |
||
Line 149: | Line 149: | ||
| rowspan="2" style="width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2019_BASC:Resume_Agenda_Template|Session 1 }} | | rowspan="2" style="width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2019_BASC:Resume_Agenda_Template|Session 1 }} | ||
| rowspan="6" style="width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2019_BASC:Workshop_Agenda_Template|Presentation|CMD+CTRL Cyber Range|Chad Holmes }} | | rowspan="6" style="width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2019_BASC:Workshop_Agenda_Template|Presentation|CMD+CTRL Cyber Range|Chad Holmes }} | ||
− | | rowspan="2" style="width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2019_BASC:Workshop_Agenda_Template|Presentation|Capture Ever-Evolving Security Needs of Users with IKE & Proto-Research Persona Development|Prateek Jain & Ryan | + | | rowspan="2" style="width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2019_BASC:Workshop_Agenda_Template|Presentation|Capture Ever-Evolving Security Needs of Users with IKE & Proto-Research Persona Development|Prateek Jain & Ryan LaMarche }} |
− | | rowspan="2" style="width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2019_BASC:Workshop_Agenda_Template|Presentation|The Ultimate Secure Coding Showdown|Brad Giguere }} | + | | rowspan="2" style="width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2019_BASC:Workshop_Agenda_Template|Presentation|The Ultimate Secure Coding Showdown|Brad Giguere & Steven Pelletier }} |
| rowspan="2" style="width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2019_BASC:Workshop_Agenda_Template|Presentation|How to Talk to Humans|Kitty Huang & Roy Wattanasin }} | | rowspan="2" style="width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2019_BASC:Workshop_Agenda_Template|Presentation|How to Talk to Humans|Kitty Huang & Roy Wattanasin }} | ||
| rowspan="2" style="width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2019_BASC:Workshop_Agenda_Template|Presentation|Zero to Hero: Intro to Web App Pentesting|Carson Owlett & Gabrielle Hempel }} | | rowspan="2" style="width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2019_BASC:Workshop_Agenda_Template|Presentation|Zero to Hero: Intro to Web App Pentesting|Carson Owlett & Gabrielle Hempel }} |
Latest revision as of 16:00, 15 October 2019
Presentations
| |||||||
---|---|---|---|---|---|---|---|
8:30-9:30 | Breakfast and Registration provided by our Platinum Sponsor | ||||||
09:00-09:50 | Opening Keynote | ||||||
Washington/Jefferson Room | Adams Room | ||||||
10:00-10:50 | |||||||
11:00-11:50 | |||||||
12:00-1:00 |
Lunch | ||||||
1:00-1:50 | |||||||
2:00-2:50 | |||||||
3:00-3:50 | |||||||
4:00-4:50 | |||||||
5:00-5:30 |
Social Time | ||||||
5:30-6:30 | Closing Keynote Sandcastles in a Storm: Application Vulnerabilities and how they weaken our organizations | ||||||
Raffle Wrap Up
|
Workshops
| ||||||||
---|---|---|---|---|---|---|---|---|
Attitash | Monroe | Cannon | Bretton Woods | Jay Peak | Cranmore | |||
10:00-10:50 |
CyberSN Career Center |
|||||||
11:00-11:50 | ||||||||
1:00-1:50 |
CyberSN Career Center |
|||||||
2:00-2:50 | ||||||||
3:00-3:50 | ||||||||
4:00-4:50 |