This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "AppSecLatam2012/Schedule Wednesday Nov 21, 2012"
From OWASP
Sarah Baso (talk | contribs) |
Sarah Baso (talk | contribs) |
||
Line 1: | Line 1: | ||
− | {| border="0" align=" | + | {| border="0" align="center" class="FCK__ShowTableBorders" style="width: 50%;" |
|- | |- | ||
| align="center" colspan="4" style="background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;" | <font size=3pt>'''Conference Day 2 - Wednesday - November 21 ,2012''' </font> | | align="center" colspan="4" style="background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;" | <font size=3pt>'''Conference Day 2 - Wednesday - November 21 ,2012''' </font> |
Revision as of 02:23, 9 October 2012
Conference Day 2 - Wednesday - November 21 ,2012
| |||
(Time Allocated) | Track 1 (Location TBA) |
Track 2 (Location TBA) | |
8:00-9:00 AM
|
Conference Registration Open | ||
9:00-10:30 AM
|
KEYNOTE Everything you know about Injection Attack is wrong Speakers: Pravir Chandra | ||
10:30-11:00 AM | Short Break - Coffee & Snacks | ||
11:00-11:50 AM
|
Criteria for Institutionalizing Security in Software Development Processes
Speaker: Francisco Nunes |
Understanding HTML5 Security
Speaker: Andres Riancho | |
11:50-12:00 PM | Short Break | ||
12:00-12:50 PM
|
A real ZAP Story
Speaker: Mateo Martinez |
Resource Certification: "Implementation Challenges"
Speaker: Dario Gomez | |
12:50-2:20 PM
|
Break - Lunch | ||
2:20-3:50 PM
|
KEYNOTE The security of your company will be compromised Speaker: Hernán M. Racciatti | ||
3:50-4:10 PM | Short Break - Coffee & Snacks | ||
4:10-5:00 PM
|
OWASP Mobile Top 10
Speaker: Mauro Flores |
DNSSEC - Securing the Web Starting with the Foundations
Speaker: Carlos Martinez - Cagnazzo | |
5:00-5:10 PM | Short Break | ||
5:10-6:00 PM
|
OWASP ODZ Multi CMS Scanner
Speaker: Mennouchi Islam Azzedine |
Templates to Derive Security Metrics based on Attack Patterns
Speaker: Raja Sekhar |