|
|
(23 intermediate revisions by 2 users not shown) |
Line 1: |
Line 1: |
− | == Planning Schedule for CO Chapters 2009 == | + | == CO Planning Schedule 2009 == |
| | | |
− | <h2>[http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference/speakeragreement OWASP Speaker Agreement]</h2> | + | |
− | {| style="width:80%" border="0" align="center"
| + | {| style="width:90%" border="2" align="center" |
− | ! colspan="4" align="center" style="background:#4058A0; color:white" | <h2>Day 1 – Sept 24th, 2008 </h2> | + | ! colspan="3" align="center" style="background:#4058A0; color:white" | CO Planning Schedule 2009 |
| + | |- |
| + | | style="width:4%; background:#C2aaC2" |<b>Month</b> || style="width:33%; background:#C2aaC2" | <b>Topic</b> |
| + | | style="width:33%; background:#C2aaC2" |<b> Details</b> |
| + | |- |
| + | | style="width:4%; background:#C2C2C2" |<B> Jan </B> || style="width:33%; background:#C2C2C2" | Hands-on (sponsored by [http://www.dirsec.com DirSec]) |
| + | | style="width:33%; background:#C2C2C2" |Missed out on APPSEC '08 in NYC? No problem! We are bringing the Capture the Flag (CTF) from the New York mega-conference to our local chapters! Bring your laptop to learn in a hands-on environment with as much hand-holding as needed. Experienced pen-testers welcome also, as there are more challenges than we can cover for the beginners in a single meeting. |
| + | |- |
| + | | style="width:4%; background:#C2C2C2" |<B> Feb </B> || style="width:33%; background:#C2C2C2" | Feb tbd (Probably more hands-on) |
| + | | style="width:33%; background:#C2C2C2" |Feb tbd |
| + | |- |
| + | | style="width:4%; background:#C2C2C2" |<B> Mar </B> || style="width:33%; background:#C2C2C2" | [http://www.snowfroc.com SNOW FROC!!!] |
| + | | style="width:33%; background:#C2C2C2" |MANY (we hope) |
| + | |- |
| + | | style="width:4%; background:#C2C2C2" |<B> Apr </B> || style="width:33%; background:#C2C2C2" | Apr tbd <b>(would like a hands-on topic)</b> |
| + | | style="width:33%; background:#C2C2C2" |Apr tbd |
| |- | | |- |
− | | style="width:10%; background:#7B8ABD" | || style="width:30%; background:#BC857A" | Track 1: BALLROOM | + | | style="width:4%; background:#C2C2C2" |<B> May </B> || style="width:33%; background:#C2C2C2" | May tbd |
− | | style="width:30%; background:#BCA57A" | Track 2: SKYLINE
| + | | style="width:33%; background:#C2C2C2" |May tbd |
− | | style="width:30%; background:#99FF99" | Track 3: TIMESQUARE | |
| |- | | |- |
− | | style="width:10%; background:#7B8ABD" | 07:30-08:50 || colspan="3" style="width:80%; background:#C2C2C2" align="center" | Doors Open for Attendee/Speaker Registration | + | | style="width:4%; background:#C2C2C2" |<B> June </B> || style="width:33%; background:#C2C2C2" | June tbd |
− | ''avoid lines come early get your caffeine fix and use free wifi''
| + | | style="width:33%; background:#C2C2C2" |June tbd |
− | |- | + | |- |
− | | style="width:10%; background:#7B8ABD" | 09:00-09:45 || colspan="3" style="width:80%; background:#F2F2F2" align="center" | OWASP Version 3.0 who we are, how we got here and where we are going? | + | | style="width:4%; background:#C2C2C2" |<B> July </B> || style="width:33%; background:#C2C2C2" | July tbd <b>(would like a hands-on topic)</b> |
− | ''OWASP Foundation: [http://www.owasp.org/index.php/Contact Jeff Williams], [http://www.owasp.org/index.php/Contact Dinis Cruz], [http://www.owasp.org/index.php/Contact Dave Wichers], [http://www.linkedin.com/in/tombrennan Tom Brennan], [http://www.owasp.org/index.php/Contact Sebastien Deleersnyder], [http://www.owasp.org/index.php/Contact Paulo Coimbra], [http://www.owasp.org/index.php/Contact Kate Hartmann], [http://www.owasp.org/index.php/Contact Alison Shrader] & [http://www.owasp.org/index.php/Category:OWASP_Chapter#Chapter_Support_Materials all local chapter leaders]
| + | | style="width:33%; background:#C2C2C2" |July tbd |
− | ''
| + | |- |
− | |- | + | | style="width:4%; background:#C2C2C2" |<B> Aug </B> || style="width:33%; background:#C2C2C2" | Aug tbd |
− | | style="width:10%; background:#7B8ABD" | 10:00-10:45 || style="width:30%; background:#BC857A" align="left" | [http://www.owasp.org/index.php/AppSecEU08_Trends_in_Web_Hacking_Incidents:_What%27s_hot_for_2008 Analysis of the Web Hacking Incidents Database (WHID)] | + | | style="width:33%; background:#C2C2C2" |Aug tbd |
− | ''[http://blog.shezaf.com Ofer Shezaf]''
| + | |- |
− | | style="width:30%; background:#BCA57A" align="left" | [http://www.webappsecroadmap.com Web Application Security Road Map] <br> | + | | style="width:4%; background:#C2C2C2" |<B> Sept </B> || style="width:33%; background:#C2C2C2" | Sept tbd |
− | ''[http://joesecurity.blogspot.com Joe White]''
| + | | style="width:33%; background:#C2C2C2" |Sept tbd |
− | | style="width:30%; background:#99FF99" align="left" |[https://buildsecurityin.us-cert.gov/swa/acqwg.html DHS Software Assurance Initiatives] | + | |- |
− | ''[http://www.linkedin.com/pub/0/ab/3b7 Stan Wisseman] & [http://www.linkedin.com/pub/1/439/923 Joe Jarzombek]''
| + | | style="width:4%; background:#C2C2C2" |<B> Oct </B> || style="width:33%; background:#C2C2C2" | Oct tbd <b>(would like a hands-on topic)</b> |
− | |- | + | | style="width:33%; background:#C2C2C2" |Oct tbd |
− | | style="width:10%; background:#7B8ABD" | 11:00-11:45 || style="width:30%; background:#BC857A" align="left" | Http Bot Research | + | |- |
− | ''[http://www.shadowserver.org/wiki/pmwiki.php?n=Shadowserver.Mission Andre M. DiMino - ShadowServer Foundation]''
| + | | style="width:4%; background:#C2C2C2" |<B> Nov </B> || style="width:33%; background:#C2C2C2" | Nov tbd <b>Closed for Holidays unless there's a topic so compelling that people would cancel their vacation plans :-0) </b> |
− | | style="width:30%; background:#BCA57A" align="left" | OWASP "Google Hacking" Project | + | | style="width:33%; background:#C2C2C2" |Nov tbd |
− | ''[http://www.linkedin.com/in/ChristianHeinrich Christian Heinrich]''
| + | |- |
− | | style="width:30%; background:#99FF99" align="left" | MalSpam Research | + | | style="width:4%; background:#C2C2C2" |<B> Dec </B> || style="width:33%; background:#C2C2C2" | Dec tbd <b>Closed for Holidays unless there's a topic so compelling that people would cancel their vacation plans :-0) </b> |
− | '' [http://www.knujon.com/bios.html Garth Bruen]''
| + | | style="width:33%; background:#C2C2C2" |Dec tbd |
− | |- | + | |- |
− | | style="width:10%; background:#7B8ABD" | 12:00-13:00 || colspan="3" style="width:80%; background:#F2F2F2" align="center" | [http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference/ctf Capture the Flag] Sign-Up
| + | | style="width:4%; background:#C2C2C2" |<B> Jan 2010 </B> || style="width:33%; background:#C2C2C2" | Jan 2010 tbd <b>(would like a hands-on topic)</b> |
− | ''LUNCH - Provided by event sponsors @ TechExpo''
| + | | style="width:33%; background:#C2C2C2" |Jan 2010 tbd |
− | |- | + | |- |
− | | style="width:10%; background:#7B8ABD" | 12:00-12:45 || style="width:30%; background:#BC857A" align="left" | Get Rich or Die Trying - Making Money on The Web, The Black Hat Way | + | | style="width:4%; background:#C2C2C2" |<B> Feb 2010 </B> || style="width:33%; background:#C2C2C2" | Feb 2010 tbd |
− | ''[http://www.linkedin.com/in/treyford Trey Ford], [http://www.linkedin.com/in/tombrennan Tom Brennan], [http://www.linkedin.com/pub/0/205/77a Jeremiah Grossman]''
| + | | style="width:33%; background:#C2C2C2" |Feb 2010 tbd |
− | | style="width:30%; background:#BCA57A" align="left" | Framework-level Threat Analysis: Adding Science to the Art of Source-code review | + | |-} |
− | ''[http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference-rohit-sethi Rohit Sethi] & [http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference-sahba-kazerooni Sahba Kazerooni]''
| + | |} |
− | | style="width:30%; background:#99FF99" align="left" | Automated Web-based Malware Behavioral Analysis | |
− | ''[http://www.linkedin.com/pub/3/359/b1a Tyler Hudak]''
| |
− | |- | |
− | | style="width:10%; background:#7B8ABD" | 13:00-13:45 || style="width:30%; background:#BC857A" align="left" | [http://blogs.adobe.com/psirt/2008/09/thanks_to_jeremiah_grossman_an.html New 0-Day Browser Exploits: Clickjacking - yea, this is bad...] | |
− | ''[http://jeremiahgrossman.blogspot.com Jeremiah Grossman] & [http://ha.ckers.org/blog/about Robert "RSnake" Hansen]''
| |
− | | style="width:30%; background:#BCA57A" align="left" | WAF ModSecurity | |
− | ''[http://www.breach.com/company/executive-team/ Ivan Ristic]''
| |
− | | style="width:30%; background:#99FF99" align="left" | Using Layer 8 and OWASP to Secure Web Applications | |
− | ''[http://www.linkedin.com/in/davidstern2000 David Stern] & [http://www.linkedin.com/in/romangarber Roman Garber]''
| |
| | | |
− | |-
| + | ---- |
− | | style="width:10%; background:#7B8ABD" | 14:00-14:45 || style="width:30%; background:#BC857A" align="left" | Industry Outlook Panel: ''[http://www.linkedin.com/in/markclancy Mark Clancy] EVP CitiGroup, [http://www.linkedin.com/pub/0/497/86a Jim Routh] CISO DTCC, [http://www.linkedin.com/pub/0/bb1/68a Sunil Seshadri] CISO NYSE-Euronet, [http://www.linkedin.com/pub/0/1ba/4a9 Warren Axelrod] SVP Bank of America, [http://www.linkedin.com/in/bernik Joe Bernik] SVP, RBS,[http://www.linkedin.com/pub/8/878/240 Jennifer Bayuk] Infosec Consultant & [http://www.linkedin.com/in/philvenables Philip Venables] CISO, Goldman Sachs, [http://www.linkedin.com/in/crecalde Carlos Recalde] SVP, Lehman Brothers, [http://www.linkedin.com/pub/5/658/872 Tom King] CISO, Barclays Capital, <br> [http://www.linkedin.com/in/mahidontamsetti Mahi Dontamsetti] Moderator''
| |
− | | style="width:30%; background:#BCA57A" align="left" | [http://www.owasp.org/index.php/Security_Assessing_Java_RMI Security Assessing Java RMI]
| |
− | ''[http://www.linkedin.com/in/adamboulton Adam Boulton]''
| |
− | | style="width:30%; background:#99FF99" align="left" | JBroFuzz 0.1 - 1.1: Building a Java Fuzzer for the Web
| |
− | ''[http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference-SPEAKER-Yiannis_Pavlosoglou Yiannis Pavlosoglou]''
| |
− | |-
| |
− | | style="width:10%; background:#7B8ABD" | 15:00-15:45 || style="width:30%; background:#BC857A" align="left" |OWASP Testing Guide - Offensive Assessing Financial Applications
| |
− | '' [http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference-daniel-cuthbert Daniel Cuthbert]''
| |
− | | style="width:30%; background:#BCA57A" align="left" | Flash Parameter Injection (FPI)
| |
− | ''Ayal Yogev & Adi Sharabani''
| |
− | | style="width:30%; background:#99FF99" align="left" |[http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference-SPEAKER-Andres_Riancho w3af - A Framework to own the web]
| |
− | ''Andres Riancho''
| |
− | |-
| |
− | | style="width:10%; background:#7B8ABD" | 16:00-16:45 || style="width:30%; background:#BC857A" align="left" | OWASP Enterprise Security API [http://www.owasp.org/index.php/ESAPI (ESAPI) Project]
| |
− | '' [http://www.aspectsecurity.com/management.htm Jeff Williams]''
| |
− | | style="width:30%; background:#BCA57A" align="left" | Cross-Site Scripting Filter Evasion
| |
− | ''Alexios Fakos''
| |
− | | style="width:30%; background:#99FF99" align="left" | Case Studies: Exploiting application testing tool deficiencies via "out of band" injection
| |
− | ''[http://www.linkedin.com/pub/0/a91/aa2 Vijay Akasapu] & [http://www.linkedin.com/pub/9/279/381 Marshall Heilman]''
| |
− | |-
| |
− | | style="width:10%; background:#7B8ABD" | 17:00-17:45 || style="width:30%; background:#BC857A" align="left" | Threading the Needle:
| |
− | Bypassing web application/service security controls using Encoding, Transcoding, Filter Evasion, and other Canonicalization Attacks
| |
− | '' [http://www.linkedin.com/in/arianevans Arian Evans]''
| |
− | | style="width:30%; background:#BCA57A" align="left" | Mastering PCI Section 6.6
| |
− | ''[http://www.linkedin.com/pub/1/228/6a5 Taylor McKinley] and [http://www.linkedin.com/in/jacobwest Jacob West]''
| |
− | | style="width:30%; background:#99FF99" align="left" | [http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference-SPEAKER-GunterOllmann Multidisciplinary Bank Attacks]
| |
− | ''Gunter Ollmann''
| |
− | |-
| |
− | | style="width:10%; background:#7B8ABD" | 18:00-18:45 || style="width:30%; background:#BC857A" align="left" | [http://www.owasp.org/index.php/Category:OWASP_Live_CD_Project OWASP Live CD]
| |
− | '' [http://www.linkedin.com/in/packetfocus Joshua Perrymon]''
| |
− | | style="width:30%; background:#BCA57A" align="left" | Coding Secure w/PHP
| |
− | ''[http://www.linkedin.com/in/zaunere Hans Zaunere]''
| |
− | | style="width:30%; background:#99FF99" align="left" | [http://www.owasp.org/index.php/Payment_Card_Data_Security_and_the_new_Enterprise_Java Payment Card Data Security and the new Enterprise Java]
| |
− | ''[https://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference-SPEAKER-Dr._B._V._Kumar Dr. B. V. Kumar] & [https://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference-SPEAKER-Abhay_Bhargav Mr. Abhay Bhargav]''
| |
− | |-
| |
− | | style="width:10%; background:#7B8ABD" | 19:00-20:00 || style="width:30%; background:#BC857A" align="left" | OWASP Chapter Leader / Project Leader working session ''OWSAP Board/Chapter Leaders''
| |
− | | style="width:30%; background:#BCA57A" align="left" | <b>(ISC)2 Cocktail Hour</b> all welcome to attend for special announcement <br> presented by: [https://www.isc2.org/cgi-bin/content.cgi?page=351 W. Hord Tipton, Executive Director of (ISC)2]
| |
− | | style="width:30%; background:#99FF99" align="left" | Technology Movie Night ''[http://www.youtube.com/watch?v=LlKDkTbUFhU&feature=related Sneakers], [http://www.youtube.com/watch?v=tAcEzhQ7oqA WarGames], [http://hackersarepeopletoo.com HackersArePeopleToo], [http://www.youtube.com/watch?v=4Be-ZzcXVLw TigerTeam]'' from 19:00 - 23:00
| |
| | | |
− | |-
| + | == Questions? == |
− | | style="width:10%; background:#7B8ABD" | 20:00-23:00+ || colspan="3" style="width:80%; background:#C2C2C2" align="center" | OWASP Event Party/Reception <br>Event badge required for admission <br>[http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference/ctf Food, Drinks w/ New & Old Friends - break out the laptop and play capture the flag for fun and prizes.] <br>''Location: HOTEL BALLROOM''</b>
| + | For questions about Colorado OWASP events please email '''OWASP AT justplainpix DOT com''' and/or '''dcampbell AT owasp DOT org''' |
− | <br>
| |
− | |-
| |
− | ! colspan="10" align="center" style="background:#4058A0; color:white" |
| |
| | | |
− | <h2>Day 2 – Sept 25th, 2008 </h2>
| + | [https://www.owasp.org/index.php/Denver Back to OWASP Denver] |
− | |-
| |
− | | style="width:10%; background:#99FF99" | 08:00-10:00 || colspan="3" style="width:80%; background:#F2F2F2" align="center" | BREAKFAST - Provided by event sponsors @ TechExpo
| |
| | | |
− | |-
| + | [https://www.owasp.org/index.php/Boulder Back to OWASP Boulder] |
− | | style="width:10%; background:#7B8ABD" | 08:00-08:45 || style="width:30%; background:#BC857A" align="left" | Software Development: The Last Security Frontier
| |
− | ''[http://blog.isc2.org/isc2_blog/tipton/index.html W. Hord Tipton], CISSP-ISSEP, CAP, CISA, CNSS and former Chief Information Officer for the U.S. Department of the Interior
| |
− | Executive Director and member of the Board of Directors, (ISC)²''
| |
− | | style="width:30%; background:#BCA57A" align="left" | [http://www.owasp.org/index.php/AppSecEU08_Best_Practices_Guide_Web_Application_Firewalls Best Practices Guide: Web Application Firewalls]
| |
− | ''Alexander Meisel''
| |
− | | style="width:30%; background:#99FF99" align="left" | The Good The Bad and The Ugly - Pen Testing VS. Source Code Analysis
| |
− | ''[http://www.linkedin.com/in/tommyryan Thomas Ryan]'' & ''[http://www.linkedin.com/in/steveantoniewicz Steve Antoniewicz]''
| |
| | | |
− | |-
| + | ---- |
− | | style="width:10%; background:#7B8ABD" | 09:00-09:45 || style="width:30%; background:#BC857A" align="left" | OWASP Web Services Top Ten
| |
− | ''[http://1raindrop.typepad.com Gunnar Peterson]''
| |
− | | style="width:30%; background:#BCA57A" align="left" | [http://www.trutv.com/video/tiger-team/tiger-team-101-1-of-4.html Tiger Team - APPSEC Projects]
| |
− | ''[http://www.linkedin.com/pub/1/373/994 Chris Nickerson]''
| |
− | | style="width:30%; background:#99FF99" align="left" | OpenSource Tools ''Prof. Li-Chiou Chen & Chienitng Lin, [http://www.pace.edu/page.cfm?doc_id=16399 Pace Univ]''
| |
− | |-
| |
− | | style="width:10%; background:#7B8ABD" | 10:00-10:45 || style="width:30%; background:#BC857A" align="left" | Building a tool for Security consultants: A story of a customized source code scanner
| |
− | ''Dinis Cruz''
| |
− | | style="width:30%; background:#BCA57A" align="left" | "Help Wanted" [http://www.infosecleaders.com/survey 7 Things You Need to Know APPSEC/INFOSEC Employment]
| |
− | ''[http://www.linkedin.com/pub/0/29/685 Lee Kushner]''
| |
− | | style="width:30%; background:#99FF99" align="left" | Industry Analyst with Forrester Research
| |
− | ''[http://www.forrester.com/rb/analyst/chenxi_wang Chenxi Wang]''
| |
− | |-
| |
− | | style="width:10%; background:#7B8ABD" | 11:00-11:45 || style="width:30%; background:#BC857A" align="left" | [http://www.owasp.org/index.php/Category:OWASP_CLASP_Project CLASP (Comprehensive, Lightweight Application Security Process)]
| |
− | ''Pravir Chandra''
| |
− | | style="width:30%; background:#BCA57A" align="left" | Security in Agile Development
| |
− | ''[http://www.owasp.org/index.php/User:Wichers Dave Wichers]''
| |
− | | style="width:30%; background:#99FF99" align="left" | Secure Software Impact
| |
− | ''[http://ouncelabs.com/company/team.asp Jack Danahy]''
| |
− | |-
| |
− | | style="width:10%; background:#7B8ABD" | 12:00-12:45 || style="width:30%; background:#BC857A" align="left" | Next Generation Cross Site Scripting Worms
| |
− | ''[http://i8jesus.com/?page_id=5 Arshan Dabirsiaghi]''
| |
− | | style="width:30%; background:#BCA57A" align="left" | Security of Software-as-a-Service (SaaS)
| |
− | ''[http://www.linkedin.com/pub/6/372/45a James Landis]''
| |
− | | style="width:30%; background:#99FF99" align="left" | [http://reversebenchmarking.com/About.html Open Reverse Benchmarking Project]
| |
− | ''Marce Luck & [http://www.linkedin.com/pub/1/507/616 Tom Stracener]''
| |
− | |-
| |
− | | style="width:10%; background:#7B8ABD" | 12:00-13:00 || colspan="3" style="width:80%; background:#F2F2F2" align="center" | [http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference/ctf Capture the Flag] Status
| |
− | ''LUNCH - Provided @ TechExpo''
| |
− | | |
− | |-
| |
− | | style="width:10%; background:#7B8ABD" | 13:00-13:45 || style="width:30%; background:#BC857A" align="left" | [[NIST SAMATE Static Analysis Tool Exposition (SATE)]]
| |
− | ''[http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference-vadim-okun Vadim Okun]''
| |
− | | style="width:30%; background:#BCA57A" align="left" | [https://www.owasp.org/index.php/User_talk:Jian Lotus Notes/Domino Web Application Security]
| |
− | ''[https://www.owasp.org/index.php/User_talk:Jian Jian Hui Wang]''
| |
− | | style="width:30%; background:#99FF99" align="left" | Shootout @ Blackbox Corral
| |
− | ''Larry Suto ''
| |
− | | |
− | |-
| |
− | | style="width:10%; background:#7B8ABD" | 14:00-14:45 || style="width:30%; background:#BC857A" align="left" | Practical Advanced Threat Modeling
| |
− | ''John Steven''
| |
− | | style="width:30%; background:#BCA57A" align="left" | [http://www.owasp.org/index.php/Category:OWASP_Orizon_Project The Owasp Orizon Project: towards version 1.0]
| |
− | [https://www.owasp.org/index.php/User:Thesp0nge Paolo Perego]
| |
− | | style="width:30%; background:#99FF99" align="left" | [http://www.owasp.org/index.php/Building_Usable_Security Building Usable Security]
| |
− | [http://www.owasp.org/index.php/Zed_Abbadi Zed Abbadi]
| |
− | |-
| |
− | | style="width:10%; background:#7B8ABD" | 15:00-15:45 || style="width:30%; background:#BC857A" align="left" | Off-shoring Application Development? Security is Still Your Problem
| |
− | ''Rohyt Belani''
| |
− | | style="width:30%; background:#BCA57A" align="left" | [http://www.owasp.org/index.php/OWASP_EU_Summit_2008 OWASP EU Summit Portugal]
| |
− | ''Dinis Cruz''
| |
− | | style="width:30%; background:#99FF99" align="left" | Code Secrets
| |
− | ''[http://johanpeeters.com Johan Peeters]''
| |
− | |-
| |
− | | style="width:10%; background:#7B8ABD" | 16:00-16:45 || style="width:30%; background:#BC857A" align="left" | Vulnerabilities in application interpreters and runtimes
| |
− | ''Erik Cabetas''
| |
− | | style="width:30%; background:#BCA57A" align="left" | Detecting User Disposition - Polar Bears in a Whiteout [http://ha.ckers.org/blog/about Robert "RSnake" Hansen]''
| |
− | | |
− | | style="width:30%; background:#99FF99" align="left" | Corruption '''[http://www.immunitysec.com Dave Aitel]'''
| |
− | |-
| |
− | | style="width:10%; background:#7B8ABD" | 17:00-17:45 || colspan="3" style="width:80%; background:#C2C2C2" align="center" | '''Event Wrap-Up / Speaker & CTF Awards and Sponsor Raffles'''
| |
− | |-
| |
− | | style="width:10%; background:#7B8ABD" | 18:30-19:30 || colspan="3" style="width:80%; background:#C2C2C2" align="center" | OWASP Foundation, Chapter Leader Meeting - to collect ideas to make OWASP better!
| |
− | |}
| |