This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Colorado Planning 2009"
Line 1: | Line 1: | ||
== CO Planning Schedule 2009 == | == CO Planning Schedule 2009 == | ||
− | {| style="width: | + | {| style="width:80%" border="2" align="center" |
! colspan="3" align="center" style="background:#4058A0; color:white" | CO Planning Schedule 2009 | ! colspan="3" align="center" style="background:#4058A0; color:white" | CO Planning Schedule 2009 | ||
|- | |- | ||
Line 9: | Line 9: | ||
| style="width:10%; background:#C2C2C2" | [Data Row 3 Column1] || colspan="2" style="width:80%; background:#C2C2C2" align="center" | '''[Data Row 3 Column2]''' | | style="width:10%; background:#C2C2C2" | [Data Row 3 Column1] || colspan="2" style="width:80%; background:#C2C2C2" align="center" | '''[Data Row 3 Column2]''' | ||
|- | |- | ||
− | | style="width:10%; background:#C2C2C2" | 09:00-9:30 || colspan="2" style="width:80%; background:#C2C2C2" align="center" | '''Opening Keynote' | + | | style="width:10%; background:#C2C2C2" | 09:00-9:30 || colspan="2" style="width:80%; background:#C2C2C2" align="center" | '''Opening Keynote''' |
|- | |- | ||
− | | style="width:10%; background:#C2C2C2" | 9:40-10:40 || colspan="2" style="width:80%; background:#C2C2C2" align="center" | | + | | style="width:10%; background:#C2C2C2" | 9:40-10:40 || colspan="2" style="width:80%; background:#C2C2C2" align="center" | stuff |
|- | |- | ||
− | | style="width:10%; background:#C2C2C2" | 10:50-11:50 || colspan="2" style="width:80%; background:#C2C2C2" align="center" | | + | | style="width:10%; background:#C2C2C2" | 10:50-11:50 || colspan="2" style="width:80%; background:#C2C2C2" align="center" | More stuff |
|- | |- | ||
− | | style="width:10%; background:#C2C2C2" | 11:50-13:00 || colspan="2" style="width:80%; background:#C2C2C2" align="center" | | + | | style="width:10%; background:#C2C2C2" | 11:50-13:00 || colspan="2" style="width:80%; background:#C2C2C2" align="center" | More Stuff 2 |
|- | |- | ||
− | | style="width:10%; background:#C2C2C2" | 13:00-14:15 || style="width:30%; background:#C2C2C2" align="left" | | + | | style="width:10%; background:#C2C2C2" | 13:00-14:15 || style="width:30%; background:#C2C2C2" align="left" | More stuff 3 |
| style="width:30%; background:#C2C2C2" align="left" | Application Security Kung Fu: Threat Modeling your way to competitive advantage | | style="width:30%; background:#C2C2C2" align="left" | Application Security Kung Fu: Threat Modeling your way to competitive advantage | ||
''Akshay Aggarwal - MicroSoft ACE Team'' | ''Akshay Aggarwal - MicroSoft ACE Team'' |
Revision as of 23:17, 19 September 2008
CO Planning Schedule 2009
CO Planning Schedule 2009 | |||
---|---|---|---|
Month | Topic | Sponsor Notes | |
[Data Row 3 Column1] | [Data Row 3 Column2] | ||
09:00-9:30 | Opening Keynote | ||
9:40-10:40 | stuff | ||
10:50-11:50 | More stuff | ||
11:50-13:00 | More Stuff 2 | ||
13:00-14:15 | More stuff 3 | Application Security Kung Fu: Threat Modeling your way to competitive advantage
Akshay Aggarwal - MicroSoft ACE Team | |
14:30-15:30 | "Abusing SSL VPNs & Open Reverse Proxies" Mike Zusman | Panel Discussion "Best-practices and lessons learned from integrating security into the SDLC"
Speaker list: Melissa Tondi, Ed Bellis, Akshay Aggarwal, Laz, Mike Walter | |
15:40-16:00 | Raffles & Awards | ||
16:00-16:45 | After-conference refreshments (at Tivoli) | ||
17:00+ | (tbd) Reception/after-conference mixer |
The purpose of this page is to provide a workspace for Denver/Boulder OWASP members to collaborate and plan the upcoming Front Range Web Application Security Summit. It is official, and we have the meeting space reservation to prove it! Date: June 10, 2008 Location: Tivoli Baerresen Conference Rooms (located on the Auraria Campus in Downtown Denver) 900 Auraria Parkway Denver, CO 80204
Call For Papers
We are seeking presentations for both the Technical and Management tracks at the June 10th conference. A Call For Papers has been issued. The deadline for submissions is March 28th, and speakers who are selected will be notified the week of March 31st. Please download the Call for Papers here