This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "AppSecLatam2012"

From OWASP
Jump to: navigation, search
(Added presentations (subject to approval from presenters))
m (2012 AppSec Latam Conference Volunteer Team)
 
(37 intermediate revisions by 4 users not shown)
Line 65: Line 65:
  
  
= Training =
+
= Trainings =
 
<font size=2pt>
 
<font size=2pt>
==Call for Training==
 
'''Submit your Training Proposal here: [https://docs.google.com/a/owasp.org/spreadsheet/viewform?formkey=dEYzOW1pRzFqelhBSElUdC01dzFGNEE6MQ Call for Training Submission Form]'''
 
  
  
Please carefully fill out the [https://docs.google.com/a/owasp.org/spreadsheet/viewform?formkey=dEYzOW1pRzFqelhBSElUdC01dzFGNEE6MQ CFT form] to submit your training proposal for consideration at OWASP AppSec Latam 2012 in Montevideo, Uruguay.  
+
The trainings will be held November 18th and 19th, 2012  (Sunday and Monday) and will run from 8:30 AM to 5:30 PM each day.  
  
  
The training will be held November 18th and 19th, 2012  (Sunday and Monday) at the ANTEL National Telco Company located in downtown Montevideo (conference talks are November 20th and 21st). Training courses will be one (8 hours) or two (16 hours) days. We will post your Display Name, Biography, Training Title, and Training Summary to the appseclatam.org site if your talk is selected. If you provide a URL or Twitter handle, we will post that if your training is selected, too.
+
AppSec Latam 2012 will be held in downtown Montevideo, Uruguay at the [http://www.antel.com.uy/antel/institucional/nuestra-empresa/complejo-torre Antel National Telco Company]. Directions are available through: [https://maps.google.com/maps?q=Auditorio+Torre+de+las+Telecomunicaciones,+Guatemala+1075,+Montevideo+11800,+Uruguay&hl=es-419&ll=-34.899448,-56.179104&spn=0.098412,0.181789&geocode=FaOW6_0dt4qm_A&hnear=Auditorio+Torre+de+las+Telecomunicaciones,+Guatemala+1075,+Montevideo+11800,+Uruguay&t=m&z=13 Google Maps]
 +
<br>
 +
<br>
  
 +
The conference training and talks will be held in the conference auditorium and interactive room, which are adjacent to the Antel Tower.
 +
<br><br>
  
'''The deadline for this Call for Training is August 24, 2012.''' If your training is selected, we will contact you to confirm, and need your completed Training Instructor Agreement before we open your class for registration.
 
  
 +
== Developing Secure Java Applications with ESAPI ==
 +
'''Instructor:''' Fabio Cerullo
 +
[[Image:Cerullof.jpg|150 px|right]]
  
Trainers get a 40% cut of the training revenue. Price for trainees will be $800 (USD) for a 2-day training course and $400 (USD) for a 1-day training course).
+
Fabio helps customers around the globe by assessing the security of applications developed in-house or by third parties, defining policies and standards, implementing risk management initiatives, as well as providing training on the subject to developers, auditors, executives and security professionals.
  
 +
As a member of the OWASP Fundation, Fabio is part of the Global Education Committee whose mission is to provide training and educational services to businesses, governments and educational institutions on application security, and has been appointed OWASP Ireland Chapter Leader since early 2010.
  
If you would like to submit multiple training proposals, please make multiple separate form submissions.
+
He holds a Msc in Computer Engineering from UCA and has been granted the CISSP & CSSLP certificates by (ISC)2.
  
 +
===Course Language===
 +
'''The course will be delivered in SPANISH (español)''' with simultaneous translation in English (if necessary).
  
Trainers will receive one free admission (nontransferable) to the conference in return for delivering a one or two day training course.
+
===Course Overview===
  
 +
Training Audience: Technical<br>
 +
Required Skill Level: Intermediate<br>
  
==Training Instructor Agreement==
+
This course aims to provide the knowledge and resources required to improve the security of Java applications using the OWASP Enterprise Security API (ESAPI) Libraries. These libraries are designed to make it easier for developers to retrofit security into existing applications, and also serve as a solid foundation for new development.
By submitting your training proposal through our CFT, you are consenting to stay within the guidelines of the Training Instructor Agreement. We will ask you to sign and complete the Agreement and email it back to us if your talk is selected and you accept.
 
  
 +
===Course Contents===
  
[https://www.owasp.org/images/5/50/Training_Instructor_Agreement_AppSecLatam2012.pdf Training Instuctor Agreement]
+
The participants, through theory and labs, will be able to identify critical vulnerabilities in web applications and implement the necessary corrective measures using the ESAPI libraries.
  
 +
Topics Include:<br>
 +
<br>
 +
- Introduction to ESAPI Architecture<br>
 +
- Security Controls Overview<br>
 +
- Authentication<br>
 +
- Session Management<br>
 +
- Access control<br>
 +
- Input validation<br>
 +
- Output encoding/escaping<br>
 +
- Cryptography<br>
 +
- Error handling and logging<br>
 +
- Data Protection<br>
 +
- HTTP security<br>
  
==Questions?==
+
The class is hands-on and will include labs. Attendees should have a laptop capable of running VMs. We will provide a VM at the beginning of the class.
Please contact us at [mailto:[email protected] appseclatam2012@owasp.org] with any questions!
 
  
 +
<br>
  
= Call for Papers  =
+
== Advanced Vulnerability Research and Exploit Development ==  
<font size=2pt>
+
<span style="color:red">UPDATE: THIS TRAINING HAS BEEN CANCELLED DUE TO LOW REGISTRATION NUMBERS </span>
==Call for Papers==
 
'''Submit your Talk Proposal here: [https://docs.google.com/a/owasp.org/spreadsheet/viewform?formkey=dHNFa3NyTV82VFNiVVh5VnllU2tfQnc6MA Call for Papers Submission Form]'''
 
  
 +
'''Instructor: '''Gianni Gnesa, [http://www.ptrace-security.com Ptrace Security]<br>
 +
[[Image:Owasp_training.jpg|frame|alt=Gianni Gnesa|right]]
 +
Gianni Gnesa, BCS, MSCS, CEH, OSCP, OSEE, Network+, Linux+, is a security researcher and professional trainer at Ptrace Security, a Swiss-based company that offers specialized IT security services to customers worldwide. With several years of experience in vulnerability research, exploit development, and penetration testing, Gianni is an expert in exposing the vulnerabilities of complex commercial products and modern network infrastructures. In his spare time, Gianni conducts independent security research on kernel exploitation and rootkit detection.
  
Please carefully fill out the [https://docs.google.com/a/owasp.org/spreadsheet/viewform?formkey=dHNFa3NyTV82VFNiVVh5VnllU2tfQnc6MA CFP form]  to submit your talk for consideration at OWASP AppSec Latam 2012 in Montevideo, Uruguay.
 
  
The talks will be held November 20th and 21st, 2012 at the ANTEL National Telco Company located in downtown Montevideo (training is November 18th and 19th). Talks will be 50 minutes each. We will post your Display Name, Biography, Talk Title, and Talk Abstract to the appseclatam.org site if your talk is selected. If you provide a URL or Twitter handle, we will post that if your talk is selected, too.
 
  
  
'''The deadline for this Call for Papers is September 7, 2012.''' If your talk is selected, we will contact you to confirm, and we will expect that your slides and other material will be sent to us no later than November 16, 2012 for our peer review. We peer review slides and other material for inclusion on the conference website (post-conference) and to verify general conformance to OWASP conference presentation guidelines.
+
==Hands on Web Application Testing: Assessing Web Apps the OWASP way==
 +
Instructor: Matt Tesauro
 +
[[Image:Matt-Tesauro.png|frame|alt=Matt Tesauro|right|Matt Tesauro]]
  
  
If you would like to submit multiple presentations, please make multiple separate form submissions.
+
Matt Tesauro has worked in web application development and security since 2000. He has worn many different hats, from developer to DBA to System Administrator to Penetration Tester.  Matt also taught graduate and undergraduate classes on web application development and XML at Texas A&M University. Currently, he's focused on application security risk assessments at Praetorian. Outside work, he is the project lead for the OWASP Live CD / WTE, a member of the OWASP Foundation board, and part of the Austin OWASP chapter leadership.  Matt Tesauro has a B.S. in Economics and a M.S in Management Information Systems from Texas A&M University.  He is also has the CISSP, CEH (Certified Ethical Hacker), RHCE (Red Hat Certified Engineer), and Linux+ certifications.
  
  
Speakers will receive free admission (nontransferable) to the conference in return for delivering a 50 minute talk.
 
  
 +
===Course Abstract===
 +
The goal of the training session is to teach students how to identify, test, and exploit web application vulnerabilities.  The creator and project lead of the OWASP Live CD, now recoined OWASP  WTE, will be the instructor for this course and WTE will be a major component of the class. Through lecture, demonstrations, and hands on labs, the session will cover the critical areas of web application security testing using the OWASP Testing Guide v3 as the framework and a custom version of OWASP WTE as the platform.  Students will be introduced to a number of open source web security testing tools and provided with hands on labs to sharpen their skills and reinforce what they’ve learned.  Students will also receive a complementary DVD containing the custom WTE training lab, a copy of the OWASP Testing Guide, handouts and cheat-sheets to use while testing plus several additional OWASP references.  Demonstrations and labs will cover both common and esoteric web vulnerabilities and includes topics such as Cross-Site Scripting (XSS), SQL injection, CSRF and Ajax vulnerabilities.  Students are encouraged to continue to use and share the custom WTE lab after the class to further hone their testing skills.
  
==Speaker Agreement==
 
By submitting your proposal for a talk/paper through our CFP, you are consenting to stay within the guidelines of the speaker agreement: [https://www.owasp.org/index.php/Speaker_Agreement https://www.owasp.org/index.php/Speaker_Agreement]
 
  
 +
'''More details''' about this class including a detailed outline, are available '''[https://www.owasp.org/index.php/AppSecLatam2012/Training/Hands_On_Web_Application_Testing HERE]'''
 +
 +
= Conference Schedule =
 +
<font size=2pt>
 +
{{:AppSecLatam2012/Schedule_Tuesday_Nov_20,_2012}}
  
==Questions?==
 
Please contact us at [mailto:[email protected] [email protected]] with any questions!
 
  
 +
{{:AppSecLatam2012/Schedule_Wednesday_Nov_21,_2012}}
  
 
= Keynotes  =
 
= Keynotes  =
Line 138: Line 164:
 
|-
 
|-
 
| align="center" | [[Image:Jerry.png|100px]]
 
| align="center" | [[Image:Jerry.png|100px]]
| align="justify" |"Building Security Into Frameworks: Who is doing it right": In this talk, Jerry Hoff, VP of the Static Code Analysis Division at WhiteHat Security, will discuss the importance of security controls in mobile and web frameworks.  The talk features a tour through a spectrum of languages and frameworks.  A tip of the hat will be given to frameworks and security controls that demonstrably mitigate vulnerabilities, resulting in more secure code.  A wag of the finger will be given to frameworks that either lack essential security controls, or implement them improperly.   
+
| align="justify" | '''Building Security Into Frameworks: Who is doing it right'''. In this talk, Jerry Hoff, VP of the Static Code Analysis Division at WhiteHat Security, will discuss the importance of security controls in mobile and web frameworks.  The talk features a tour through a spectrum of languages and frameworks.  A tip of the hat will be given to frameworks and security controls that demonstrably mitigate vulnerabilities, resulting in more secure code.  A wag of the finger will be given to frameworks that either lack essential security controls, or implement them improperly.   
  
 
Many of the OWASP Top 10 vulnerabilities and their corresponding security controls will be discussed.  Participants will walk away with a better understanding of the security libraries available across a wide array of popular web technologies.
 
Many of the OWASP Top 10 vulnerabilities and their corresponding security controls will be discussed.  Participants will walk away with a better understanding of the security libraries available across a wide array of popular web technologies.
Line 147: Line 173:
 
<br>
 
<br>
  
== Pravir Chandra ==
+
 
 +
== Juliano Rizzo ==
  
 
{| style="background-color: transparent"
 
{| style="background-color: transparent"
Line 154: Line 181:
 
! width="1000" align="center" | <br>
 
! width="1000" align="center" | <br>
 
|-
 
|-
| align="center" | https://www.owasp.org/images/7/75/PravirChandra_Headshot.jpg
+
| align="center" |http://www.ekoparty.org//images/foto-juliano-rizzo.jpg
| align="justify" | '''Everything you know about Injection Attack is wrong''': This casual talk will take a look at several mundane vulnerabilities that we all know about and ask a few deeper questions. What are the underlying mechanisms? Does our advice on preventing them *actually* work? Is there a better way when you think of software design patterns? By the end, we’ll challenge the audience to think past the surface of these code vulnerabilities and hopefully learn a little about how the right abstraction model can save tons of security headaches.
+
| align="justify" | '''From FUN to CRIME'''. In this talk, Juliano Rizzo will share his experience researching and implementing new practical
 +
cryptographic attacks against web applications and protocols.
  
  
Pravir Chandra is a veteran in the security space and a long-time OWASP contributor, including his role as the creator and leader of the Open Software Assurance Maturity Model (OpenSAMM) project. Currently as security architect for the CTO of Bloomberg, he drives proactive security initiatives that demonstrate concrete value for the firm. Prior to this, Pravir was Director of Strategic Services at HP/Fortify where he lead software security assurance programs for Fortune 500 clients in a variety of verticals. He is responsible for standing up the most comprehensive and measurably effective programs in existence today. As a thought leader in the security field for over 10 years, Pravir has written many articles, whitepapers, and books and is routinely invited to speak at businesses and conferences world-wide.
+
Juliano Rizzo has been involved in computer security for more than 12 years, working on vulnerability research, reverse engineering, source code review and development of high quality exploits for bugs of all classes. As a researcher he has published papers, security advisories and tools. His recent work includes the ASP.NET padding oracle exploit and the BEAST and CRIME attacks against the SSL/TLS protocol. Twitter: @julianor
 +
 
 
|}
 
|}
 
<br>
 
<br>
Line 169: Line 198:
 
|-
 
|-
 
| align="center" | [[Image:Cristian-borghello-P.jpg|100px]]
 
| align="center" | [[Image:Cristian-borghello-P.jpg|100px]]
| align="justify" | Cristian F. Borghello, es Licenciado en Sistemas, desarrollador, Certified Information Systems Security Professional (CISSP) y Microsoft MVP Security (Most Valuable Professional).
+
| align="justify" | '''Tainted variables to find Potentially Vulnerable Functions (PVF)'''. We will study different ways to statically analyze the source code and
Actualmente es Director de Segu-Info y se desempeña como consultor independiente en Seguridad de la Información.
+
find vulnerabilities through input variables and functions that can
Escribe para diversos medios especializados e investiga en forma independiente sobre Seguridad Informática y de la Información.
+
add potential vulnerabilities in web applications. Cristian F. Borghello, holds a degree in Information System,
Ha disertado se congresos y seminarios nacionales e internacionales sobre la temática.
+
developer, Certified Information Systems Security Professional (CISSP)
El interés por la Seguridad Informática y su investigación lo ha llevado a mantener este sitio: [http://www.segu-info.com.ar/ http://www.segu-info.com.ar/]
+
and Microsoft Security MVP (Most Valuable Professional).
 +
 
 +
Currently Director of Segu-Info and independent consultant in
 +
Information Security. He writes for various specialized media and
 +
research independently on Computer Security and Information. Interest
 +
in Computer Security and its research has led him to keep this site:
 +
http://www.segu-info.com.ar/
 +
Cristian is member of OWASP (Open Web Application Security Project)
 +
Buenos Aires Chapter, ISSA (Information Systems Security Association),
 +
CSA (Cloud Security Alliance) Argentina Chapter and ISC2 Argentina
 +
Chapter.
 +
 
 
|}
 
|}
 
<br>
 
<br>
Line 184: Line 224:
 
|-
 
|-
 
| align="center" | [[Image:Photo_Hernan_Racciatti.jpg|100px]]
 
| align="center" | [[Image:Photo_Hernan_Racciatti.jpg|100px]]
| align="justify" |Hernan M. Racciatti has 20 years of experience in Information Technology, having dedicated most of his careers in areas related to Information Security.
+
| align="justify" | '''The security of your company will be compromised'''. Hernan M. Racciatti has 20 years of experience in Information Technology, having dedicated most of his careers in areas related to Information Security.
  
 
Currently serves as Director of Security at SIClabs, advising private companies and public agencies, leading Penetration Test, Security Application Assessment, Code Source Review, pursuing researches about information security, teaching and offering seminars and technical lectures at conferences of national and international level related to his field.
 
Currently serves as Director of Security at SIClabs, advising private companies and public agencies, leading Penetration Test, Security Application Assessment, Code Source Review, pursuing researches about information security, teaching and offering seminars and technical lectures at conferences of national and international level related to his field.
Line 198: Line 238:
 
<br>
 
<br>
  
= Presentations =
+
= Speakers =
 +
<font size=2pt>
  
 
These are the selected presentations and are subject to confirmation from presenters.
 
These are the selected presentations and are subject to confirmation from presenters.
  
{|  
+
{| style="background-color: transparent"
 
|-  
 
|-  
| width="180" align="center" | '''Name'''
+
| width="300" align="center" | '''Name & Title'''
| width="600" align="justify" | '''Presentation'''
+
| width="1000" align="justify" | '''Bio'''
 
|-
 
|-
 
|- <br/> || <br/>
 
|- <br/> || <br/>
 
|-
 
|-
|'''Alex Bauert''' || Assessing Application Security Risk
+
|'''Assessing Application Security Risk''', ''Alex Bauert'' || Application Security Manager, Cargill. 20+ years in IT; localized software, sysadm, and app sec among some other roles. I have worked with application security at a software company, a large bank and currently Cargill. I am also active in the Minnesota OWASP chapter. In my free time I am a youth soccer coach.
 
|-
 
|-
|'''Sebastian Bortnik''' || Malware en dispositivos móviles.
+
|'''Malware en dispositivos móviles''', ''Sebastian Bortnik'' || Sebastián Bortnik es CISM y el Gerente de Educación y Servicios de ESET para Latinoamérica.
 
|-
 
|-
|'''Flavio de Cristofaro''' || Password Security Policies - Lessons learned from recent password leaks
+
|'''Password Security Policies - Lessons learned from recent password leaks''', ''Flavio de Cristofaro'' ||  Flavio is the VP of Engineering for Professional Products at Core Securiry. His primary focus is on building and evolving CORE Impact Pro as well as introducing new professional products into the marketplace.
 +
He has over 10 years of experience in penetration testing and IT security, having led onsite and remote penetration testing engagements for several clients worldwide. Prior to joining the Engineering team, he led the CORE Security Consulting Services practice where he coordinated leading-edge penetration testing services for multiple global organizations. Prior to joining CORE, he worked at Deloitte leading one of the global penetration testing centers located in Argentina. He also taught at ITBA University in Argentina until 2004.
 
|-
 
|-
|'''Mauro Flores''' || OWASP Mobile Top 10
+
|'''OWASP Mobile Top 10''', ''Mauro Flores'' || Mauro Flores tiene más de 15 años de experiencia en Seguridad de la Información. Ha participado en proyectos de diseño, especificación y desarrollo de aplicaciones de seguridad para diferentes empresas de Uruguay y el exterior, incluyendo trabajos de reserarch & Develop en seguridad para empresas de UK y USA. Ha realizado más de 30 test de penetración , diversos trabajos de análisis forense y apoyado a diferentes organizaciones privadas y públicas a la mejora de la seguridad de sus sistemas así como a la mejora de la gestión de la seguridad alineado a las normativas internacionales (SGSI, PCI, etc).
 +
 
 +
Actualmente se desempeña como Gerente de la línea de Seguridad de la Información de Deloitte Uruguay. Además, es el Chapter Leader del capitulo Uruguay del OWASP y miembro del Global Industry Committee de esta organización. También es miembro activo del Anti-Phishing Working Group (APWG).
 
|-
 
|-
|'''Dario Gomez''' || Resource Certification: "Implementation Challenges"
+
|'''Resource Certification: Implementation Challenges''', ''Dario Gomez'' || Dario Gomez was formed in 2010 in computer sciences at the University ORT Uruguay. Currently he's working for 4 years as a software developer at Internet Address Registry for Latin America and the Caribbean - LACNIC, where one of main responsibilities is the development of the resources certification system of organization (http://lacnic.net/en/rpki/).
 +
Previously, he worked at the help desk and maintenance of servers and networks in the British Hospital of Uruguay.
 
|-
 
|-
|'''Mennouchi Islam''' || Presentation Of The OWASP ODZ Multi CMS Scanner
+
|'''Presentation Of The OWASP ODZ Multi CMS Scanner''', ''Mennouchi Islam'' || Mennouchi Islam Azeddine CEO and security consultant at Way4Com Owasp Algeria chapter leader and OWASP ODZ Multi CMS Scanner project leader.
 
|-
 
|-
|'''Mateo Martínez''' || A real ZAP story
+
|'''A real ZAP story''', ''Mateo Martínez'' || With more than 10 years of experience in IT & Security strategy, Business Continuity Management,ISO 27001, CobIT and ITIL he has developed Security Projects based in Dubai, Chicago, Montevideo and Buenos Aires.
 +
Information Security Manager in global companies and currently working at McAfee Argentina in a presales role. CISSP, ITIL & MCP certified.
 +
 
 
|-
 
|-
|'''Francisco Nunes''' || Critérios para Institucionalizar Segurança em Processos de Desenvolvimento de Software
+
|'''Critérios para Institucionalizar Segurança em Processos de Desenvolvimento de Software''', ''Francisco Nunes'' || Graduated in Computer Science at Universidade Estadual do Ceará (2001), with a graduation study period in Informatique de Gestion at Université du Québec à Chicoutimi (1999). He has a Master's in Computer Science from Universidade de Fortaleza (2007). He has experience in Information Security and Software Engineering, acting on the following subjects: information and software security, business continuity, security engineering, and software life cycle process improvement. He is CISM and CSSLP certified.
 
|-
 
|-
|'''Andres Riancho''' || Web Application Scanning the Internet
+
|'''Understanding HTML5 security''', ''Andres Riancho'' || Andrés Riancho is an application security expert that currently leads the community driven, Open Source, w3af project and provides in-depth Web Application Penetration Testing services to companies around the world.
 +
 
 +
In the research field, he discovered critical vulnerabilities in IPS appliances from 3com and ISS; and contributed with SAP research performed at his former employer.
 +
 
 +
His main focus has always been the Web Application Security field, in which he developed w3af, a Web Application Attack and Audit Framework used extensively by penetration testers and security consultants. Andrés has spoken and hold trainings at many security conferences around the globe, like PHDays (Moscow), SecTor (Toronto), OWASP (Poland), CONFidence (Poland), OWASP World C0n (USA), CanSecWest (Canada), T2 (Finland) and ekoparty (Buenos Aires).
 +
 
 +
Andrés founded Bonsai in 2009 in order to further research into automated Web Application Vulnerability detection and exploitation.
 +
 
 +
Specialties: Web Application Security, Python, IPS device evasion, Networking, Information security research in general, Software development, Agile, Scrum, Product Owner.
 
|-
 
|-
|'''Andres Riancho''' || Understanding HTML5 security
+
|'''Don't try to block out the sun with your fingers!: Information harvesting with Test-driven development tools and understanding how to avoid it''', ''Nicolas Rodriguez'' || I'm a Senior Security Consultant at Core Security (http://www.coresecurity.com). I have 22 years of programming experience (C/C++, Assembler, Pascal, Clipper, Visual Basic, C#, Visual Basic.NET, Lisp, Python, Ruby and Perl among others), 10 years as a Network Administrator (Linux, Unix and Windows physical and virtual servers) and for the last 6 years I've been working as a Security Consultant doing mostly Network and Applications Penetration Tests, Source Code Audits and Client-Side Penetration Tests.
 
|-
 
|-
|'''Nicolas Rodriguez''' || Don't try to block out the sun with your fingers\!: Information harvesting with Test-driven development tools and understanding how to avoid it
+
|'''Templates to Derive Security Metric based on Attack Patterns''', ''Raja Sekhar'' || Professor Department of Computer Science & Engineering KL University Andhra Pradesh, India. Working in the Academic field for the past 17 years. Interested to contribute in the area of security metrics and cryptography. Developed a security metric program based on Attack Patterns.
 
|-
 
|-
|'''David Schekaiban''' || Lo doloroso de la era cibernética: ataque, crimen, espionaje, activismo y guerra.
+
|'''Reducing Web Application Attack Surface with a HMAC based protocol''', ''Breno Silva'' || Breno is a computer scientist with over 9 years experience in Information Security, experienced with a wide range of software development techniques and languages, security systems and network technologies. Breno brings a research history publishing articles in academic conferences like IEEE WIFS, IEEE ICMLC, IEEE INDIN, World Academy of Science, as well industry related conferences like OWASP AppSec Latam, OWASP AppSec Research and Ph-Neutral, involving areas as algorithm design for network anomaly detection mechanisms in high-speed networks, application security and malicious code detection. He was a member of Suricata IPS developer team (next-generation IPS funded by US-Homeland Security). Breno is currently a Security Researcher at Trustwave SpiderLabs Research team and maintainer of Apache ModSecurity.  
 
|-
 
|-
|'''Raja Sekhar''' || Templates to Derive Security Metric based on Attack Patterns
+
|'''Using PASTA as a core ingredient to web application threat modeling''', ''Tony UcedaVelez'' || Tony UcedaVelez, CRISC, CISM, CISA, GIAC has more than 14 years of hands-on security and technology experience across government, healthcare, financial, education, and utility sectors. Tony founded VerSprite with the premise of redefining security services to a point that it reflects a hybrid and balanced approach in understanding client needs. Tony has consulted for numerous Fortune 500 organizations as well as large government entities within the areas of application security, security risk management, network security, and governance. Before VerSprite, Tony was the Sr. Director of Policy and Risk Management for a major Fortune 50 information service bureau. Tony's background in IT operations and software development, coupled with security operations, allows him to lead VerSprite with the mission of providing tailored, strategic solutions to its client base. Tony is a frequent speaker/ writer at ISACA, OWASP, and other information security forums around the world and is currently managing the Atlanta OWASP Chapter. He is also currently co-writing a book on application threat modeling via Wiley Life Sciences and has co-developed a patent pending methodology for risk based threat models. Tony is a graduate from Cornell University.
 
|-
 
|-
|'''Breno Silva''' || Reducing Web Application Attack Surface with a HMAC based protocol
+
|'''How dynamic have been static checking?''', ''Felipe Zipitria'' || Felipe Zipitria has a Master Degree in Computer Science from PEDECIBA Informática and his thesis was in the Computer Security field. He is working as a Senior System Administrator and teaching since 1998 at the Computer Science department of the Faculty of Engineering - University of the Republic. From 2006 he joined the Computer Security Group, and has been doing research and teaching Computer Security foundations for pre-graduate students, and Application Security for professionals and as a post-graduate course. He has been using OWASP tools and documentation for its courses since the first course for pre-graduates. As a Senior System Administrator he has specialized in Web Security, using Web Application Firewalls, Apache Web Server and Apache Tomcat, Virtualization, and Clustering. He has made Security Analysis for local enterprises, and several Penetration Tests and Source Code Analysis.
|-
 
|'''Tony UcedaVelez''' || Using PASTA as a core ingredient to web application threat modeling
 
|-
 
|'''Felipe Zipitria''' || How dynamic have been static checking?
 
  
 
|}
 
|}
 +
 +
  
 
= Venue  =
 
= Venue  =
Line 271: Line 324:
 
= Registration and Fees =
 
= Registration and Fees =
 
<font size=2pt>
 
<font size=2pt>
 +
== Online Registration ==
 +
 +
Registration is now closed.
 +
 +
 
== Conference Fees ==
 
== Conference Fees ==
 
'''Access to conference:'''
 
'''Access to conference:'''
  
* Before Sept 30th:  3200.00 UYU (approx. 150.00 USD)
+
* Before October 15th:  3200.00 UYU (approx. 150.00 USD)
* Before Oct 31st:  4250.00 UYU (approx. 200.00 USD)
+
* Before Nov 5th:  4250.00 UYU (approx. 200.00 USD)
* After Nov 1st:    5300.00 UYU (approx. 250.00 USD)
+
* After Nov 5st:    5300.00 UYU (approx. 250.00 USD)
  
  
'''Trainings'''
+
'''Training'''
  
* One day: 8500.00 UYU (approx. 400.00 USD)
 
 
* Two days: 17000.00 UYU (approx. 800.00 USD)
 
* Two days: 17000.00 UYU (approx. 800.00 USD)
  
Line 289: Line 346:
 
* OWASP Member:  50.00 USD (Note: This discount is equal to the cost of becoming an OWASP paid Member.)
 
* OWASP Member:  50.00 USD (Note: This discount is equal to the cost of becoming an OWASP paid Member.)
 
* Student: 1600.00 UYU (approx. 75.00 USD). Note: student ID or other proof of current student status is required.
 
* Student: 1600.00 UYU (approx. 75.00 USD). Note: student ID or other proof of current student status is required.
 +
* Students are eligible for 20% discount off training fees, making the total training cost for 2 days $640.00 USD. To take advantage of this offer, enter the discount code STUDENT_TRAINING at checkout.
 
* Special discounts available for groups registrations. Please send inquiries to [mailto:[email protected] [email protected]].
 
* Special discounts available for groups registrations. Please send inquiries to [mailto:[email protected] [email protected]].
 
   
 
   
  
== Online Registration ==
 
  
Registration is not yet available for this event.  Check back the beginning of September for registration details.
 
  
  
Line 307: Line 363:
 
To find out more about the different sponsorship opportunities please check the document below: <br> [https://www.owasp.org/images/3/37/AppSec_LATAM_2012_Sponsorship.pdf OWASP AppSec Latam 2012 Sponsorship Options - English]  
 
To find out more about the different sponsorship opportunities please check the document below: <br> [https://www.owasp.org/images/3/37/AppSec_LATAM_2012_Sponsorship.pdf OWASP AppSec Latam 2012 Sponsorship Options - English]  
  
<br>
 
<!--
 
== Diamond Sponsors ==
 
<br>
 
<center>
 
[[Image:elipse_logo3.png|link=http://www.elipse.com.br]]
 
</center>
 
<br>
 
  
== Gold Sponsors ==
 
<br>
 
<center>
 
[[Image:Logoglobo.png|link=http://www.globo.com]] &nbsp; [[Image:IT2S.png|link=http://www.it2s.com.br]] &nbsp;
 
</center>
 
<br>
 
  
== Silver Sponsors==
 
<br>
 
<center>
 
[[Image:SPL-LOGO-MED.png|link=https://www.trustwave.com/]]
 
  
</center>
 
<br>
 
-->
 
== Venue Sponsor  ==
 
<br>
 
<center>
 
[[Image:Logo_Antel.jpg|200px|link=http://www.antel.com.uy/]]
 
</center>
 
<br>
 
  
 +
= Travel and Accommodation =
 +
<font size=2pt>
 +
 +
== Accommodation  ==
 +
 +
We've been able to arrange for accommodation with the [http://fourpoints.com/MONTEVIDEO Four Points Sheraton Hotel] for attendees. These rooms have been allocated at a special rate, and available strictly for a limited time. To book these rooms at the special rate, you need to use the booking link shown below. These rooms are available one night either side of the event ensuring that if you are travelling interstate or international it's easy to find a room at a good rate. The room rate allocated for the event is $169/USD per night and includes breakfast.
 +
 +
 +
''Note: Conference events will primarily be held at the  [http://www.antel.com.uy/antel/institucional/nuestra-empresa/complejo-torre Antel National Telco Company]. We will have a few events held at this hotel and are arranging for transportation between the Sheraton and Antel building.''
 +
 +
 +
'''[http://fourpoints.com/MONTEVIDEO Four Points Sheraton Montevideo]'''<br>
 +
Ejido 1275<br>
 +
Montevideo 11100<br>
 +
Uruguay<br>
 +
Phone: (598)(2) 9017000<br>
 +
Fax: (598)(2) 9032247<br>
 +
 +
 +
 +
To make your reservation, visit:  https://www.starwoodmeeting.com/StarGroupsWeb/res?id=1209182075&key=76379
 +
 +
 +
[https://www.owasp.org/images/9/9e/OWASPTransfers_V2_en.pdf Directions to/from in English]
 +
 +
[https://www.owasp.org/images/f/f9/OWASPTransfers_V2_sp.pdf Directions to/from in English]
 +
 +
 +
== Need more assistance booking your travel?==
 +
For assistance with any of the items below, feel free to utilize OWASP's preferred travel agency:<br>
 +
Segale Travel Service contact information is:  +1-800-841-2276 <br>
 +
Sr. Travel Consultants:  <br>
 +
[mailto:[email protected] Maria Martinez]...ext 524 <br>
 +
[mailto:[email protected] Linn Vander Molen]...ext 520
 +
 +
 +
Additionally, the [mailto:[email protected] Conference Planning Team] is available to answer any questions!
  
  
= Practical Info =
+
= Social Events =
 
<font size=2pt>
 
<font size=2pt>
  
== Accommodation  ==
+
== Tuesday 20 - After Office ==
 +
 
 +
{| style="background-color: transparent"
 +
|-
 +
! width="200" align="center" | <br>
 +
! width="1000" align="center" | <br>
 +
|-
 +
| align="center" | [[Image:After Office OWASP.jpg|320x240px]]
 +
|
 +
'''After the first day of conference, let´s go for some beers out there! (and of course Mojitos and Daikiris also available :D )'''
 +
 
 +
'''Walrus''' is located at Cr. Luis E. Lecueder 3536, Montevideo, Uruguay. This is the WTC Plaza, near Montevideo Shopping Center. Check its website: [http://www.walrus.com.uy/ http://www.walrus.com.uy/]
 +
 
 +
 
 +
[https://www.owasp.org/images/7/71/OWASPTransferAfterHour_V2_en.pdf Directions to/from in English]
  
  '''We are currently in the process of negotiating a group rate with one or two local hotels. Please check back for details on those group rates.'''
+
[https://www.owasp.org/images/d/db/OWASPTransferAfterHour_V2_sp.pdf Directions to/from in Spanish]
  
  
 +
|}
  
= Social Events  =
+
== Wednesday 21 - Closure Diner ==
 
<font size=2pt>
 
<font size=2pt>
TBA
 
  
 +
{| style="background-color: transparent"
 +
|-
 +
! width="200" align="center" | <br>
 +
! width="1000" align="center" | <br>
 +
|-
 +
| align="center" | [[Image:BodegaCastilloViejo.jpg|320x240px]]
 +
|
 +
After the closing ceremony, for the last dinner of the event we will travel to Bodega Castillo Viejo, a winery located 40 minutes from Montevideo.
 +
The fee is about 1400.00 UYU (approx. 70.00 USD) including:
 +
 +
- Dinner with appetizer, main course (barbecue) with wine and dessert
 +
- A guided tour of the winery, the wine cellars and the winery surroundings
 +
- Transport to the winery from the conferences venue and back to the [http://fourpoints.com/MONTEVIDEO Four Points Sheraton Montevideo hotel].
 +
 +
To confirm you are coming, please pay by adding this to your registration in cvent (payment via credit card) or stopping by the registration desk at the conference to pay via cash.
 +
 +
'''[https://www.cvent.com/Events/Register/RegNumConfirmation.aspx?e=6e6cac65-3617-499a-a150-72e5c21b1ecf Click here to modify your registration].'''
 +
 +
 +
If you have questions - please send an email to: [mailto:[email protected] Conference Planning Team]
 +
 +
 +
In case you want to [http://www.castilloviejo.com/en check out the winery]:  http://www.castilloviejo.com/en
 +
 +
"Castillo Viejo is today a winery recognized both in Uruguay and the whole world for making an excellent experience of fine wines. With awarded wines around the world and a great restaurant, Castillo Viejo is not only an excellent winery but also a beautiful place to visit.”
 +
 +
|}
  
 
= Chapter Leader Workshop =
 
= Chapter Leader Workshop =
 
<font size=2pt>
 
<font size=2pt>
 +
 +
 +
<span style="color:red">'''UPDATED INFORMATION:'''<br> Date & Time of Workshop: 6:00 PM, Monday November 19<br> Location: Meeting Room on the 2nd Floor at the 4 Points Sheraton Hotel</span>
 +
 +
 +
[http://fourpoints.com/MONTEVIDEO Four Points Sheraton Montevideo]<br>
 +
Ejido 1275<br>
 +
Montevideo 11100<br>
 +
Uruguay<br>
 +
Phone: (598)(2) 9017000
 +
 +
 +
 +
  
 
==About the Workshop==
 
==About the Workshop==
Line 397: Line 518:
 
* Mateo Martinez
 
* Mateo Martinez
 
* Mauro Flores
 
* Mauro Flores
 +
* Felipe Zipitria
 +
* Mauricio Papaleo
 +
* [[user:Alberto_Daniel_Hill|Hill,Alberto Daniel]]
 +
* Maximiliano Alonzo
 +
* Rodrigo Martinez
 +
* Mario Pereyra
 
* Martin Tartarelli
 
* Martin Tartarelli
 
* Fabio Cerullo
 
* Fabio Cerullo
 
  
 
==OWASP Staff Support==
 
==OWASP Staff Support==
Line 409: Line 535:
 
Contact us at [mailto:[email protected] [email protected]]
 
Contact us at [mailto:[email protected] [email protected]]
 
</font>
 
</font>
 +
 +
 +
=Archives=
 +
 +
==Training Instructor Agreement==
 +
By submitting your training proposal through our CFT, you are consenting to stay within the guidelines of the Training Instructor Agreement. We will ask you to sign and complete the Agreement and email it back to us if your talk is selected and you accept.
 +
 +
 +
[https://www.owasp.org/images/5/50/Training_Instructor_Agreement_AppSecLatam2012.pdf Training Instuctor Agreement]
 +
 +
 +
==Speaker Agreement==
 +
By submitting your proposal for a talk/paper through our CFP, you are consenting to stay within the guidelines of the speaker agreement: [https://www.owasp.org/index.php/Speaker_Agreement https://www.owasp.org/index.php/Speaker_Agreement]
 +
 +
  
 
<headertabs />
 
<headertabs />

Latest revision as of 06:39, 6 July 2017



OWASPLatam Banner Screenshot.JPG

We are pleased to announce that the OWASP Uruguay chapter will host the OWASP AppSec Latam 2012 conference in Montevideo, Uruguay at ANTEL National Telco Company. The event will be composed of 2 days of training (November 18-19), followed by 2 days of conference talks (November 20-21).


The Global AppSec Latin America 2012 Conference will be a reunion of Information Security latin american leaders, and will present cutting-edge ideas. OWASP events attract a worldwide audience interested in “what’s next”. The conference is expected to draw 200-250 technologists from Government, Financial Services, Media, Pharmaceuticals, Healthcare, Technology, and many other verticals.


If you have any questions, please email the conference committee: [email protected]


Who Should Attend Global AppSec Latin América 2012:

  • Application Developers
  • Application Testers and Quality Assurance
  • Application Project Management and Staff
  • Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff
  • Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance
  • Security Managers and Staff
  • Executives, Managers, and Staff Responsible for IT Security Governance
  • IT Professionals Interested in Improving IT Security




                                                                                                                              OWASPL Latam2012 Logo.JPG

Use the #AppSecLatam hashtag for your tweets for AppSec Latin America 2012 (What are hashtags?)

@AppSecLatAm Twitter Feed (follow us on Twitter!) <twitter>262394051</twitter>



The trainings will be held November 18th and 19th, 2012 (Sunday and Monday) and will run from 8:30 AM to 5:30 PM each day.


AppSec Latam 2012 will be held in downtown Montevideo, Uruguay at the Antel National Telco Company. Directions are available through: Google Maps

The conference training and talks will be held in the conference auditorium and interactive room, which are adjacent to the Antel Tower.


Developing Secure Java Applications with ESAPI

Instructor: Fabio Cerullo

Cerullof.jpg

Fabio helps customers around the globe by assessing the security of applications developed in-house or by third parties, defining policies and standards, implementing risk management initiatives, as well as providing training on the subject to developers, auditors, executives and security professionals.

As a member of the OWASP Fundation, Fabio is part of the Global Education Committee whose mission is to provide training and educational services to businesses, governments and educational institutions on application security, and has been appointed OWASP Ireland Chapter Leader since early 2010.

He holds a Msc in Computer Engineering from UCA and has been granted the CISSP & CSSLP certificates by (ISC)2.

Course Language

The course will be delivered in SPANISH (español) with simultaneous translation in English (if necessary).

Course Overview

Training Audience: Technical
Required Skill Level: Intermediate

This course aims to provide the knowledge and resources required to improve the security of Java applications using the OWASP Enterprise Security API (ESAPI) Libraries. These libraries are designed to make it easier for developers to retrofit security into existing applications, and also serve as a solid foundation for new development.

Course Contents

The participants, through theory and labs, will be able to identify critical vulnerabilities in web applications and implement the necessary corrective measures using the ESAPI libraries.

Topics Include:

- Introduction to ESAPI Architecture
- Security Controls Overview
- Authentication
- Session Management
- Access control
- Input validation
- Output encoding/escaping
- Cryptography
- Error handling and logging
- Data Protection
- HTTP security

The class is hands-on and will include labs. Attendees should have a laptop capable of running VMs. We will provide a VM at the beginning of the class.


Advanced Vulnerability Research and Exploit Development

UPDATE: THIS TRAINING HAS BEEN CANCELLED DUE TO LOW REGISTRATION NUMBERS

Instructor: Gianni Gnesa, Ptrace Security

Gianni Gnesa

Gianni Gnesa, BCS, MSCS, CEH, OSCP, OSEE, Network+, Linux+, is a security researcher and professional trainer at Ptrace Security, a Swiss-based company that offers specialized IT security services to customers worldwide. With several years of experience in vulnerability research, exploit development, and penetration testing, Gianni is an expert in exposing the vulnerabilities of complex commercial products and modern network infrastructures. In his spare time, Gianni conducts independent security research on kernel exploitation and rootkit detection.



Hands on Web Application Testing: Assessing Web Apps the OWASP way

Instructor: Matt Tesauro

Matt Tesauro
Matt Tesauro


Matt Tesauro has worked in web application development and security since 2000. He has worn many different hats, from developer to DBA to System Administrator to Penetration Tester. Matt also taught graduate and undergraduate classes on web application development and XML at Texas A&M University. Currently, he's focused on application security risk assessments at Praetorian. Outside work, he is the project lead for the OWASP Live CD / WTE, a member of the OWASP Foundation board, and part of the Austin OWASP chapter leadership. Matt Tesauro has a B.S. in Economics and a M.S in Management Information Systems from Texas A&M University. He is also has the CISSP, CEH (Certified Ethical Hacker), RHCE (Red Hat Certified Engineer), and Linux+ certifications.


Course Abstract

The goal of the training session is to teach students how to identify, test, and exploit web application vulnerabilities. The creator and project lead of the OWASP Live CD, now recoined OWASP WTE, will be the instructor for this course and WTE will be a major component of the class. Through lecture, demonstrations, and hands on labs, the session will cover the critical areas of web application security testing using the OWASP Testing Guide v3 as the framework and a custom version of OWASP WTE as the platform. Students will be introduced to a number of open source web security testing tools and provided with hands on labs to sharpen their skills and reinforce what they’ve learned. Students will also receive a complementary DVD containing the custom WTE training lab, a copy of the OWASP Testing Guide, handouts and cheat-sheets to use while testing plus several additional OWASP references. Demonstrations and labs will cover both common and esoteric web vulnerabilities and includes topics such as Cross-Site Scripting (XSS), SQL injection, CSRF and Ajax vulnerabilities. Students are encouraged to continue to use and share the custom WTE lab after the class to further hone their testing skills.


More details about this class including a detailed outline, are available HERE

Conference Day 1 - Tuesday - November 20 ,2012


Track 1
Sponsored by:
DEL COL.jpg
Track 2
(Location TBA)
 8:00-9:00 AM


Conference Registration Open
 9:00-9:20 AM


Opening Remarks

Speakers: Carolina Cosse - President of ANTEL
and José Klastornik - CEO of AGESIC

 9:20-9:50 AM


OWASP Board Kickoff

Speaker: Matt Tesauro

 9:50-10:40 AM


KEYNOTE
Building Security Into Frameworks: Who is doing it right

Speaker: Jerry Hoff

 10:40-11:00 AM Short Break - Coffee & Snacks
 11:00-11:50 AM


 Assessing Application Security Risk

 Speaker: Alex Bauert

 Reducing Web Application Attack Surface with a HMAC based protocol

 Speaker: Breno Silva

 11:50-12:00 PM Short Break
 12:00-12:50 PM


 Your Website: a weapon for cybercrime

 Speaker: Sebastian Bortnik

 Don't try to block the out the sub with your fingers! Information harvesting with Test-driven development tools and understanding how to avoid it

 Speaker: Nicolas Rodriguez

 12:50-14:20 PM


Break - Lunch
 14:20-15:20 PM


KEYNOTE
Tainted variables to find Potentially Vulnerable Functions (PVF)

 Speaker: Cristian Borghello

 15:20-15:40 PM Short Break - Coffee & Snacks
 15:40-16:30 PM


 Using PASTA as a core ingredient to web application threat modeling

 Speaker: Tony Ucedavelez

 Malware on Mobile Devices

 Speaker: Sebastian Bortnik

 16:30-16:40 PM Short Break
 16:40-17:30 PM


 Password Security Policies - Lessons Learned from Recent Password Leaks

 Speaker: Flavio de Cristofaro & Brian Sutton

 How dynamic have been static checking?

 Speaker: Felipe Zipitria


Conference Day 2 - Wednesday - November 21 ,2012


Track 1
Sponsored by:
DEL COL.jpg
Track 2
(Location TBA)
 8:00-9:00 AM


Conference Registration Open
 9:00-10:00 AM


KEYNOTE
From FUN to CRIME

 Speaker: Juliano Rizzo

 10:00-10:20 AM Short Break - Coffee & Snacks
 10:20-11:10 AM


 Criteria for Institutionalizing Security in Software Development Processes

 Speaker: Francisco Nunes

 Understanding HTML5 Security

 Speaker: Andres Riancho

 11:10-11:20 PM Short Break
 11:20-12:10 PM


 A real ZAP Story

 Speaker: Mateo Martinez

 Resource Certification: "Implementation Challenges"

 Speaker: Gerardo Rada

 12:10-13:40 PM


Break - Lunch
 13:40-14:40 PM


KEYNOTE
The security of your company will be compromised

 Speaker: Hernán M. Racciatti

 14:40-15:00 PM Short Break - Coffee & Snacks
 15:00-15:50 PM


 OWASP Mobile Top 10

 Speaker: Mauro Flores

 DNSSEC - Securing the Web Starting with the Foundations

 Speaker: Carlos Martinez - Cagnazzo

 15:50-16:00 PM Short Break
 16:00-16:50 PM


 Topic: Developing Secure Apps with ESAPI

 Speaker: Fabio Cerullo

  OWASP O2 Case Study

 Speaker: Michael Hidalgo

 16:50-17:10 PM


Conference Wrap Up & Closing Ceremony

Jerry Hoff



Jerry.png Building Security Into Frameworks: Who is doing it right. In this talk, Jerry Hoff, VP of the Static Code Analysis Division at WhiteHat Security, will discuss the importance of security controls in mobile and web frameworks. The talk features a tour through a spectrum of languages and frameworks. A tip of the hat will be given to frameworks and security controls that demonstrably mitigate vulnerabilities, resulting in more secure code. A wag of the finger will be given to frameworks that either lack essential security controls, or implement them improperly.

Many of the OWASP Top 10 vulnerabilities and their corresponding security controls will be discussed. Participants will walk away with a better understanding of the security libraries available across a wide array of popular web technologies.


Jerry Hoff is the VP of the Static Code Analysis Division at WhiteHat Security. Prior to joining WhiteHat, he was a co-founder and managing partner at Infrared Security. Jerry has worked at a number of fortune ten financial firms, along with years of hands-on security consulting, where he specialized in manual code review, web application penetration testing, and architecture reviews. Jerry also has years of development and teaching experience. He taught for over seven years at Washington University's CAIT program, and the microcomputer program at University of Missouri in St. Louis. Jerry is the writer/producer of the popular OWASP Appsec Tutorial Series and the lead developer for the WebGoat.NET project.



Juliano Rizzo



foto-juliano-rizzo.jpg From FUN to CRIME. In this talk, Juliano Rizzo will share his experience researching and implementing new practical

cryptographic attacks against web applications and protocols.


Juliano Rizzo has been involved in computer security for more than 12 years, working on vulnerability research, reverse engineering, source code review and development of high quality exploits for bugs of all classes. As a researcher he has published papers, security advisories and tools. His recent work includes the ASP.NET padding oracle exploit and the BEAST and CRIME attacks against the SSL/TLS protocol. Twitter: @julianor


Cristian Borghello



Cristian-borghello-P.jpg Tainted variables to find Potentially Vulnerable Functions (PVF). We will study different ways to statically analyze the source code and

find vulnerabilities through input variables and functions that can add potential vulnerabilities in web applications. Cristian F. Borghello, holds a degree in Information System, developer, Certified Information Systems Security Professional (CISSP) and Microsoft Security MVP (Most Valuable Professional).

Currently Director of Segu-Info and independent consultant in Information Security. He writes for various specialized media and research independently on Computer Security and Information. Interest in Computer Security and its research has led him to keep this site: http://www.segu-info.com.ar/ Cristian is member of OWASP (Open Web Application Security Project) Buenos Aires Chapter, ISSA (Information Systems Security Association), CSA (Cloud Security Alliance) Argentina Chapter and ISC2 Argentina Chapter.


Hernán M. Racciatti



Photo Hernan Racciatti.jpg The security of your company will be compromised. Hernan M. Racciatti has 20 years of experience in Information Technology, having dedicated most of his careers in areas related to Information Security.

Currently serves as Director of Security at SIClabs, advising private companies and public agencies, leading Penetration Test, Security Application Assessment, Code Source Review, pursuing researches about information security, teaching and offering seminars and technical lectures at conferences of national and international level related to his field.

Among his contributions to the community, should be noted: active participation as a collaborator in some ISECOM´s project (OSSTMM-Open Source Security Testing Methodology Manual and Hacker High School), OISSG (ISSAF – Information Systems Security Assessment Framework), the development of small tools designed to secure information systems and several papers, articles and technical documents written for digital and print publications whit national and international circulation.

During last year, he found and reported vulnerability in major commercial products.

Hernan Marcelo Racciatti is member of the Core Team at ISECOM (Institute for Security and Open Methodologies), ISSAF Key Contributor at OISSG (Open Information System Security Group), President of CSA (Cloud Security Alliance) Argentina Chapter, Executive Committee Member of the ONG Argentina Cibersegura, ISSA (Information Systems Security Association) and OWASP (Open Web Application Security Project) Buenos Aires Chapter Member.

Learn more about Hernan at http://www.hernanracciatti.com.ar/


These are the selected presentations and are subject to confirmation from presenters.

Name & Title Bio
Assessing Application Security Risk, Alex Bauert Application Security Manager, Cargill. 20+ years in IT; localized software, sysadm, and app sec among some other roles. I have worked with application security at a software company, a large bank and currently Cargill. I am also active in the Minnesota OWASP chapter. In my free time I am a youth soccer coach.
Malware en dispositivos móviles, Sebastian Bortnik Sebastián Bortnik es CISM y el Gerente de Educación y Servicios de ESET para Latinoamérica.
Password Security Policies - Lessons learned from recent password leaks, Flavio de Cristofaro Flavio is the VP of Engineering for Professional Products at Core Securiry. His primary focus is on building and evolving CORE Impact Pro as well as introducing new professional products into the marketplace.

He has over 10 years of experience in penetration testing and IT security, having led onsite and remote penetration testing engagements for several clients worldwide. Prior to joining the Engineering team, he led the CORE Security Consulting Services practice where he coordinated leading-edge penetration testing services for multiple global organizations. Prior to joining CORE, he worked at Deloitte leading one of the global penetration testing centers located in Argentina. He also taught at ITBA University in Argentina until 2004.

OWASP Mobile Top 10, Mauro Flores Mauro Flores tiene más de 15 años de experiencia en Seguridad de la Información. Ha participado en proyectos de diseño, especificación y desarrollo de aplicaciones de seguridad para diferentes empresas de Uruguay y el exterior, incluyendo trabajos de reserarch & Develop en seguridad para empresas de UK y USA. Ha realizado más de 30 test de penetración , diversos trabajos de análisis forense y apoyado a diferentes organizaciones privadas y públicas a la mejora de la seguridad de sus sistemas así como a la mejora de la gestión de la seguridad alineado a las normativas internacionales (SGSI, PCI, etc).

Actualmente se desempeña como Gerente de la línea de Seguridad de la Información de Deloitte Uruguay. Además, es el Chapter Leader del capitulo Uruguay del OWASP y miembro del Global Industry Committee de esta organización. También es miembro activo del Anti-Phishing Working Group (APWG).

Resource Certification: Implementation Challenges, Dario Gomez Dario Gomez was formed in 2010 in computer sciences at the University ORT Uruguay. Currently he's working for 4 years as a software developer at Internet Address Registry for Latin America and the Caribbean - LACNIC, where one of main responsibilities is the development of the resources certification system of organization (http://lacnic.net/en/rpki/).

Previously, he worked at the help desk and maintenance of servers and networks in the British Hospital of Uruguay.

Presentation Of The OWASP ODZ Multi CMS Scanner, Mennouchi Islam Mennouchi Islam Azeddine CEO and security consultant at Way4Com Owasp Algeria chapter leader and OWASP ODZ Multi CMS Scanner project leader.
A real ZAP story, Mateo Martínez With more than 10 years of experience in IT & Security strategy, Business Continuity Management,ISO 27001, CobIT and ITIL he has developed Security Projects based in Dubai, Chicago, Montevideo and Buenos Aires.

Information Security Manager in global companies and currently working at McAfee Argentina in a presales role. CISSP, ITIL & MCP certified.

Critérios para Institucionalizar Segurança em Processos de Desenvolvimento de Software, Francisco Nunes Graduated in Computer Science at Universidade Estadual do Ceará (2001), with a graduation study period in Informatique de Gestion at Université du Québec à Chicoutimi (1999). He has a Master's in Computer Science from Universidade de Fortaleza (2007). He has experience in Information Security and Software Engineering, acting on the following subjects: information and software security, business continuity, security engineering, and software life cycle process improvement. He is CISM and CSSLP certified.
Understanding HTML5 security, Andres Riancho Andrés Riancho is an application security expert that currently leads the community driven, Open Source, w3af project and provides in-depth Web Application Penetration Testing services to companies around the world.

In the research field, he discovered critical vulnerabilities in IPS appliances from 3com and ISS; and contributed with SAP research performed at his former employer.

His main focus has always been the Web Application Security field, in which he developed w3af, a Web Application Attack and Audit Framework used extensively by penetration testers and security consultants. Andrés has spoken and hold trainings at many security conferences around the globe, like PHDays (Moscow), SecTor (Toronto), OWASP (Poland), CONFidence (Poland), OWASP World C0n (USA), CanSecWest (Canada), T2 (Finland) and ekoparty (Buenos Aires).

Andrés founded Bonsai in 2009 in order to further research into automated Web Application Vulnerability detection and exploitation.

Specialties: Web Application Security, Python, IPS device evasion, Networking, Information security research in general, Software development, Agile, Scrum, Product Owner.

Don't try to block out the sun with your fingers!: Information harvesting with Test-driven development tools and understanding how to avoid it, Nicolas Rodriguez I'm a Senior Security Consultant at Core Security (http://www.coresecurity.com). I have 22 years of programming experience (C/C++, Assembler, Pascal, Clipper, Visual Basic, C#, Visual Basic.NET, Lisp, Python, Ruby and Perl among others), 10 years as a Network Administrator (Linux, Unix and Windows physical and virtual servers) and for the last 6 years I've been working as a Security Consultant doing mostly Network and Applications Penetration Tests, Source Code Audits and Client-Side Penetration Tests.
Templates to Derive Security Metric based on Attack Patterns, Raja Sekhar Professor Department of Computer Science & Engineering KL University Andhra Pradesh, India. Working in the Academic field for the past 17 years. Interested to contribute in the area of security metrics and cryptography. Developed a security metric program based on Attack Patterns.
Reducing Web Application Attack Surface with a HMAC based protocol, Breno Silva Breno is a computer scientist with over 9 years experience in Information Security, experienced with a wide range of software development techniques and languages, security systems and network technologies. Breno brings a research history publishing articles in academic conferences like IEEE WIFS, IEEE ICMLC, IEEE INDIN, World Academy of Science, as well industry related conferences like OWASP AppSec Latam, OWASP AppSec Research and Ph-Neutral, involving areas as algorithm design for network anomaly detection mechanisms in high-speed networks, application security and malicious code detection. He was a member of Suricata IPS developer team (next-generation IPS funded by US-Homeland Security). Breno is currently a Security Researcher at Trustwave SpiderLabs Research team and maintainer of Apache ModSecurity.
Using PASTA as a core ingredient to web application threat modeling, Tony UcedaVelez Tony UcedaVelez, CRISC, CISM, CISA, GIAC has more than 14 years of hands-on security and technology experience across government, healthcare, financial, education, and utility sectors. Tony founded VerSprite with the premise of redefining security services to a point that it reflects a hybrid and balanced approach in understanding client needs. Tony has consulted for numerous Fortune 500 organizations as well as large government entities within the areas of application security, security risk management, network security, and governance. Before VerSprite, Tony was the Sr. Director of Policy and Risk Management for a major Fortune 50 information service bureau. Tony's background in IT operations and software development, coupled with security operations, allows him to lead VerSprite with the mission of providing tailored, strategic solutions to its client base. Tony is a frequent speaker/ writer at ISACA, OWASP, and other information security forums around the world and is currently managing the Atlanta OWASP Chapter. He is also currently co-writing a book on application threat modeling via Wiley Life Sciences and has co-developed a patent pending methodology for risk based threat models. Tony is a graduate from Cornell University.
How dynamic have been static checking?, Felipe Zipitria Felipe Zipitria has a Master Degree in Computer Science from PEDECIBA Informática and his thesis was in the Computer Security field. He is working as a Senior System Administrator and teaching since 1998 at the Computer Science department of the Faculty of Engineering - University of the Republic. From 2006 he joined the Computer Security Group, and has been doing research and teaching Computer Security foundations for pre-graduate students, and Application Security for professionals and as a post-graduate course. He has been using OWASP tools and documentation for its courses since the first course for pre-graduates. As a Senior System Administrator he has specialized in Web Security, using Web Application Firewalls, Apache Web Server and Apache Tomcat, Virtualization, and Clustering. He has made Security Analysis for local enterprises, and several Penetration Tests and Source Code Analysis.


AppSec Latam 2012 will be held in downtown Montevideo, Uruguay at the Antel National Telco Company. Directions are available through: Google Maps

The conference training and talks will be held in the conference auditorium and interactive room, which are adjacent to the Antel Tower.

Antel Tower:

Antel National Telco Building.jpg


Antel Telco Auditorium (left) and Auditorium main entrance (right):

Antel Telco Venue Auditorium.jpg Antel Telco Main Entrance to Auditorium.jpg


Inside the Auditorium (left) and Interactive Room (right):

Antel Telco Auditorium 02.jpg Antel Telco Interactive Room 02.jpg]

Online Registration

Registration is now closed.


Conference Fees

Access to conference:

  • Before October 15th: 3200.00 UYU (approx. 150.00 USD)
  • Before Nov 5th: 4250.00 UYU (approx. 200.00 USD)
  • After Nov 5st: 5300.00 UYU (approx. 250.00 USD)


Training

  • Two days: 17000.00 UYU (approx. 800.00 USD)


Discounts

  • OWASP Member: 50.00 USD (Note: This discount is equal to the cost of becoming an OWASP paid Member.)
  • Student: 1600.00 UYU (approx. 75.00 USD). Note: student ID or other proof of current student status is required.
  • Students are eligible for 20% discount off training fees, making the total training cost for 2 days $640.00 USD. To take advantage of this offer, enter the discount code STUDENT_TRAINING at checkout.
  • Special discounts available for groups registrations. Please send inquiries to [email protected].



We are looking for sponsors for 2012 edition of Global AppSec Latin America.


If you are interested to sponsor Global AppSec Latin America 2012, please contact the conference team: [email protected]


To find out more about the different sponsorship opportunities please check the document below:
OWASP AppSec Latam 2012 Sponsorship Options - English



Accommodation

We've been able to arrange for accommodation with the Four Points Sheraton Hotel for attendees. These rooms have been allocated at a special rate, and available strictly for a limited time. To book these rooms at the special rate, you need to use the booking link shown below. These rooms are available one night either side of the event ensuring that if you are travelling interstate or international it's easy to find a room at a good rate. The room rate allocated for the event is $169/USD per night and includes breakfast.


Note: Conference events will primarily be held at the Antel National Telco Company. We will have a few events held at this hotel and are arranging for transportation between the Sheraton and Antel building.


Four Points Sheraton Montevideo
Ejido 1275
Montevideo 11100
Uruguay
Phone: (598)(2) 9017000
Fax: (598)(2) 9032247
Email: [email protected]


To make your reservation, visit: https://www.starwoodmeeting.com/StarGroupsWeb/res?id=1209182075&key=76379


Directions to/from in English

Directions to/from in English


Need more assistance booking your travel?

For assistance with any of the items below, feel free to utilize OWASP's preferred travel agency:
Segale Travel Service contact information is: +1-800-841-2276
Sr. Travel Consultants:
Maria Martinez...ext 524
Linn Vander Molen...ext 520


Additionally, the Conference Planning Team is available to answer any questions!


Tuesday 20 - After Office



After Office OWASP.jpg

After the first day of conference, let´s go for some beers out there! (and of course Mojitos and Daikiris also available :D )

Walrus is located at Cr. Luis E. Lecueder 3536, Montevideo, Uruguay. This is the WTC Plaza, near Montevideo Shopping Center. Check its website: http://www.walrus.com.uy/


Directions to/from in English

Directions to/from in Spanish


Wednesday 21 - Closure Diner



BodegaCastilloViejo.jpg

After the closing ceremony, for the last dinner of the event we will travel to Bodega Castillo Viejo, a winery located 40 minutes from Montevideo. The fee is about 1400.00 UYU (approx. 70.00 USD) including:

- Dinner with appetizer, main course (barbecue) with wine and dessert - A guided tour of the winery, the wine cellars and the winery surroundings - Transport to the winery from the conferences venue and back to the Four Points Sheraton Montevideo hotel.

To confirm you are coming, please pay by adding this to your registration in cvent (payment via credit card) or stopping by the registration desk at the conference to pay via cash.

Click here to modify your registration.


If you have questions - please send an email to: Conference Planning Team


In case you want to check out the winery: http://www.castilloviejo.com/en

"Castillo Viejo is today a winery recognized both in Uruguay and the whole world for making an excellent experience of fine wines. With awarded wines around the world and a great restaurant, Castillo Viejo is not only an excellent winery but also a beautiful place to visit.”


UPDATED INFORMATION:
Date & Time of Workshop: 6:00 PM, Monday November 19
Location: Meeting Room on the 2nd Floor at the 4 Points Sheraton Hotel


Four Points Sheraton Montevideo
Ejido 1275
Montevideo 11100
Uruguay
Phone: (598)(2) 9017000


Questions? [email protected]


About the Workshop

2012 Chapters Workshop to be held at the Conference Venue on the afternoon of November 19th, 2012 (the day before the conference)

  • September 17th - AppSec Latam Chapters workshop sponsorship applications due
  • September 21 - Applicants notified of status


We plan to start with a 1.5 hour session including an overview of the chapter handbook. This session will be video taped and available for chapter leaders to use in their local chapters (or to be viewed by those unable to attend). The second part of the workshop will be a roundtable discussion on regional issues and challenges, with a goal of working together to create solutions. If you are interested in participating in either of these workshops, please register for the conference and select this workshop, please register for the Conference and select the optional session "chapter leaders workshop" as part of the registration process. Remember that conference attendance is free for current chapter and project leaders.


Info about last year's workshop: Meeting Minutes from Latin America Chapters Workshop 2011


Sponsorship to Attend the Chapters Workshop

If you need financial assistance to attend the Chapter Leader Workshops please submit a request to via the Contact Us Form http://owasp4.owasp.org/contactus.html by the application deadline for each of the events.

  • September 17th - AppSec Latam Chapters workshop sponsorship applications due
  • September 21 - Applicants notified of status


Additional Information for Applicants:

  • Priority of sponsorships will be given to those not covered by a sponsorship to attend a previous workshop. Additionally, we are looking for new or struggling chapter leaders who need assistance kick starting their chapter.
  • When you apply for funding, please let us know *why we should sponsor you*. While we prefer that chapter leaders use their own chapter's funds before requesting a sponsorship, this is not a requirement for application.
  • If your chapter has fund but will not be using them to sponsor your attendance, please include why you will not be using the funds for this purpose (i.e. what are the other plans for those funds?).


Questions?

If any questions, please contact us at: http://owasp4.owasp.org/contactus.html


2012 AppSec Latam Conference Volunteer Team

  • Mateo Martinez
  • Mauro Flores
  • Felipe Zipitria
  • Mauricio Papaleo
  • Hill,Alberto Daniel
  • Maximiliano Alonzo
  • Rodrigo Martinez
  • Mario Pereyra
  • Martin Tartarelli
  • Fabio Cerullo

OWASP Staff Support

  • Sarah Baso
  • Kate Hartmann


Contact us at [email protected]


Training Instructor Agreement

By submitting your training proposal through our CFT, you are consenting to stay within the guidelines of the Training Instructor Agreement. We will ask you to sign and complete the Agreement and email it back to us if your talk is selected and you accept.


Training Instuctor Agreement


Speaker Agreement

By submitting your proposal for a talk/paper through our CFP, you are consenting to stay within the guidelines of the speaker agreement: https://www.owasp.org/index.php/Speaker_Agreement




Gold Sponsor

Logo Agesic color.jpg

Silver Sponsors

Core TM wtag.png PwC logo 4colourprint (2) Resized good one.jpg

Conference Room Sponsor

DEL COL.jpg

Venue Sponsor

Logo Antel.jpg

Academic Supporters

Ort bord1.JPG Logo-fing.png

Organizational Supporters

AppSecDC2012-ISC2.png