This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "BeNeLux OWASP Day 2009 draft agenda"
From OWASP
Line 1: | Line 1: | ||
− | {| | + | {| border="0" align="center" style="width: 80%;" |
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
|- | |- | ||
− | + | ! align="center" colspan="3" | '''College De Valck''' - December 2, 2009 | |
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | ''' | ||
− | |||
− | |||
− | |||
− | |||
− | |||
|- | |- | ||
− | + | | style="background: rgb(123, 138, 189) none repeat scroll 0% 0%; width: 15%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;" | 12:00 - 12:30 | |
− | + | | align="left" colspan="2" style="background: rgb(194, 194, 194) none repeat scroll 0% 0%; width: 75%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;" | Registration and sandwiches | |
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
|- | |- | ||
− | | style="width:15%; background: | + | | style="background: rgb(123, 138, 189) none repeat scroll 0% 0%; width: 15%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;" | 12:30 - 15:45 |
− | ''' | + | | align="center" colspan="2" style="background: rgb(242, 242, 242) none repeat scroll 0% 0%; width: 75%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;" | OWASP Live CD - WebGoat workshop |
+ | '''Erwin Geirnaert & Martin Knobloch''' | ||
+ | |||
|- | |- | ||
− | + | | style="background: rgb(123, 138, 189) none repeat scroll 0% 0%; width: 15%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;" | 15:45 - 16:00 | |
+ | | align="left" colspan="2" style="background: rgb(194, 194, 194) none repeat scroll 0% 0%; width: 75%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;" | Break | ||
+ | |- | ||
+ | | style="background: rgb(123, 138, 189) none repeat scroll 0% 0%; width: 15%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;" | 16:00 - 16:40 | ||
+ | | align="center" colspan="2" style="background: rgb(242, 242, 242) none repeat scroll 0% 0%; width: 75%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;" | [[BeNeLux09 - Secure development (for a secure planet).|Secure development (for a secure planet).]] | ||
+ | '''Eoin Keary''' | ||
+ | |||
+ | |- | ||
+ | | style="background: rgb(123, 138, 189) none repeat scroll 0% 0%; width: 15%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;" | 16:40 - 17:20 | ||
+ | | align="center" colspan="2" style="background: rgb(242, 242, 242) none repeat scroll 0% 0%; width: 75%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;" | [[WAF and Business Logic Attacks]] | ||
+ | '''Noa Bar-Yosef''' | ||
+ | |||
+ | |- | ||
+ | | style="background: rgb(123, 138, 189) none repeat scroll 0% 0%; width: 15%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;" | 17:20 - 18:00 | ||
+ | | align="center" colspan="2" style="background: rgb(242, 242, 242) none repeat scroll 0% 0%; width: 75%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;" | [[Compliance driven vulnerabilities]] | ||
+ | '''Colin Watson''' | ||
+ | |||
+ | |- | ||
+ | | style="background: rgb(123, 138, 189) none repeat scroll 0% 0%; width: 15%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;" | 18:30 - 19:40 | ||
+ | | align="center" colspan="2" style="background: rgb(242, 242, 242) none repeat scroll 0% 0%; width: 75%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;" | [[SHA-3 Competition: The Quest for Long-Term Security in Cryptographic Hashing]] | ||
+ | '''Bart Preneel''' | ||
+ | |||
+ | |- | ||
+ | | style="background: rgb(123, 138, 189) none repeat scroll 0% 0%; width: 15%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;" | 18:00 - 18:30 | ||
+ | | align="left" colspan="2" style="background: rgb(194, 194, 194) none repeat scroll 0% 0%; width: 75%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;" | Dinner | ||
+ | |- | ||
+ | | style="background: rgb(123, 138, 189) none repeat scroll 0% 0%; width: 15%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;" | 18:40 - 19:20 | ||
+ | | align="center" colspan="2" style="background: rgb(242, 242, 242) none repeat scroll 0% 0%; width: 75%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;" | [[BeNeLux09 - Web Application Firewalls: Detection, Bypassing and Exploitation|Web Application Firewalls: Detection, Bypassing and Exploitation]] | ||
+ | '''Sandro Gauci''' | ||
+ | |||
+ | |- | ||
+ | | style="background: rgb(123, 138, 189) none repeat scroll 0% 0%; width: 15%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;" | 19:20 - 20:00 | ||
+ | | align="center" colspan="2" style="background: rgb(242, 242, 242) none repeat scroll 0% 0%; width: 75%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;" | [[The OWASP Top 10 is dead, long live the OWASP Top 10 !]] | ||
+ | '''Sebastien Deleersnyder''' | ||
+ | |||
+ | |- | ||
+ | | style="background: rgb(123, 138, 189) none repeat scroll 0% 0%; width: 15%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;" | 20:00 - 20:15 | ||
+ | | align="left" colspan="2" style="background: rgb(194, 194, 194) none repeat scroll 0% 0%; width: 75%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;" | Break | ||
+ | |- | ||
+ | | style="background: rgb(123, 138, 189) none repeat scroll 0% 0%; width: 15%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;" | 20:15 - 20:55 | ||
+ | | align="center" colspan="2" style="background: rgb(242, 242, 242) none repeat scroll 0% 0%; width: 75%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;" | [[BeNeLux09 - Hybrid Analysis 2.0 - A demonstration of precision results correlation for improved software security testing|Hybrid Analysis 2.0 - A demonstration of precision results correlation for improved software security testing]] | ||
+ | '''Roger Thornton''' | ||
+ | |||
+ | |- | ||
+ | | style="background: rgb(123, 138, 189) none repeat scroll 0% 0%; width: 15%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;" | 20:55 - 21:35 | ||
+ | | align="center" colspan="2" style="background: rgb(242, 242, 242) none repeat scroll 0% 0%; width: 75%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;" | SDLC pannel | ||
+ | '''Migchiel de Jong (Fortify) Bart De Win (Ascure) Florence Mottay (Cigital) + tbd''' | ||
+ | |||
+ | |} | ||
[[Category:OWASP_AppSec_Conference]] [[Category:OWASP_BeNeLux_09]] | [[Category:OWASP_AppSec_Conference]] [[Category:OWASP_BeNeLux_09]] |
Revision as of 20:34, 16 November 2009
College De Valck - December 2, 2009 | ||
---|---|---|
12:00 - 12:30 | Registration and sandwiches | |
12:30 - 15:45 | OWASP Live CD - WebGoat workshop
Erwin Geirnaert & Martin Knobloch | |
15:45 - 16:00 | Break | |
16:00 - 16:40 | Secure development (for a secure planet).
Eoin Keary | |
16:40 - 17:20 | WAF and Business Logic Attacks
Noa Bar-Yosef | |
17:20 - 18:00 | Compliance driven vulnerabilities
Colin Watson | |
18:30 - 19:40 | SHA-3 Competition: The Quest for Long-Term Security in Cryptographic Hashing
Bart Preneel | |
18:00 - 18:30 | Dinner | |
18:40 - 19:20 | Web Application Firewalls: Detection, Bypassing and Exploitation
Sandro Gauci | |
19:20 - 20:00 | The OWASP Top 10 is dead, long live the OWASP Top 10 !
Sebastien Deleersnyder | |
20:00 - 20:15 | Break | |
20:15 - 20:55 | Hybrid Analysis 2.0 - A demonstration of precision results correlation for improved software security testing
Roger Thornton | |
20:55 - 21:35 | SDLC pannel
Migchiel de Jong (Fortify) Bart De Win (Ascure) Florence Mottay (Cigital) + tbd |