This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Colorado Planning 2009"

From OWASP
Jump to: navigation, search
Line 1: Line 1:
 
== CO Planning Schedule 2009 ==
 
== CO Planning Schedule 2009 ==
  
{| style="width:80%" border="2" align="center"
+
{| style="width:100%" border="2" align="center"
 
  ! colspan="3" align="center" style="background:#4058A0; color:white" | CO Planning Schedule 2009
 
  ! colspan="3" align="center" style="background:#4058A0; color:white" | CO Planning Schedule 2009
 
  |-
 
  |-
  | style="width:10%; background:#C2C2C2" |<b>Month || style="width:30%; background:#C2C2C2" | Topic  
+
  | style="width:10%; background:#C2C2C2" |<b>Month</b> || style="width:30%; background:#C2C2C2" | <b>Topic</b>
  | style="width:30%; background:#C2C2C2" | Sponsor Notes</b>  
+
  | style="width:30%; background:#C2C2C2" |<b> Sponsor Notes</b>  
 
  |-
 
  |-
 
  | style="width:10%; background:#C2C2C2" | [Data Row 3 Column1] || colspan="2" style="width:80%; background:#C2C2C2" align="center" | '''[Data Row 3 Column2]'''
 
  | style="width:10%; background:#C2C2C2" | [Data Row 3 Column1] || colspan="2" style="width:80%; background:#C2C2C2" align="center" | '''[Data Row 3 Column2]'''
Line 18: Line 18:
 
|-
 
|-
 
| style="width:10%; background:#C2C2C2" | 13:00-14:15 || style="width:30%; background:#C2C2C2" align="left" | More stuff 3
 
| style="width:10%; background:#C2C2C2" | 13:00-14:15 || style="width:30%; background:#C2C2C2" align="left" | More stuff 3
  | style="width:30%; background:#C2C2C2" align="left" | Application Security Kung Fu: Threat Modeling your way to competitive advantage
+
  | style="width:30%; background:#C2C2C2" align="left" | Applic
''Akshay Aggarwal - MicroSoft ACE Team''
 
 
|-
 
|-
| style="width:10%; background:#C2C2C2" | 14:30-15:30 || style="width:30%; background:#C2C2C2" align="left" | "Abusing SSL VPNs & Open Reverse Proxies"  ''Mike Zusman''
+
| style="width:10%; background:#C2C2C2" | 14:30-15:30 || style="width:30%; background:#C2C2C2" align="left" | Abusing SSL
  | style="width:30%; background:#C2C2C2" align="left" | '''Panel Discussion''' "Best-practices and lessons learned from integrating security into the SDLC"
+
  | style="width:30%; background:#C2C2C2" align="left" | '''Panel Discussion''' "Best-practices "
''Speaker list: Melissa Tondi, Ed Bellis, Akshay Aggarwal, Laz, Mike Walter''
+
''Speaker list:r''
 
|-
 
|-
 
|-
 
|-
 
  | style="width:10%; background:#C2C2C2" | 15:40-16:00 || colspan="3" style="width:80%; background:#C2C2C2" align="center" | '''Raffles & Awards'''
 
  | style="width:10%; background:#C2C2C2" | 15:40-16:00 || colspan="3" style="width:80%; background:#C2C2C2" align="center" | '''Raffles & Awards'''
 
|-
 
|-
  | style="width:10%; background:#C2C2C2" | 16:00-16:45 || colspan="3" style="width:80%; background:#C2C2C2" align="center" | '''After-conference refreshments (at Tivoli)'''
+
  | style="width:10%; background:#C2C2C2" | 16:00-16:45 || colspan="3" style="width:80%; background:#C2C2C2" align="center" | '''After'''
 
|-
 
|-
  | style="width:10%; background:#C2C2C2" | 17:00+ || colspan="3" style="width:80%; background:#C2C2C2" align="center" | '''(tbd) Reception/after-conference mixer'''
+
  | style="width:10%; background:#C2C2C2" | 17:00+ || colspan="3" style="width:80%; background:#C2C2C2" align="center" | '''(tbd) '''
 
|}
 
|}
 
----
 
----
Line 36: Line 35:
  
  
The purpose of this page is to provide a workspace for Denver/Boulder OWASP members to collaborate and plan the upcoming Front Range Web Application Security Summit.
+
The purpose of this page.
 
It is official, and we have the meeting space reservation to prove it!
 
It is official, and we have the meeting space reservation to prove it!
 
Date:  June 10, 2008
 
Date:  June 10, 2008
Line 44: Line 43:
  
 
===Call For Papers===
 
===Call For Papers===
We are seeking presentations for both the Technical and Management tracks at the June 10th conference.  A Call For Papers has been issued.  The deadline for submissions is March 28th, and speakers who are selected will be notified the week of March 31st.  [http://www.owasp.org/images/b/b1/FrontRangeOWASPConferenceCallForPapers2008_final.doc Please download the Call for Papers here]
+
We are seeking presentations

Revision as of 23:19, 19 September 2008

CO Planning Schedule 2009

CO Planning Schedule 2009
Month Topic Sponsor Notes
[Data Row 3 Column1] [Data Row 3 Column2]
09:00-9:30 Opening Keynote
9:40-10:40 stuff
10:50-11:50 More stuff
11:50-13:00 More Stuff 2
13:00-14:15 More stuff 3 Applic
14:30-15:30 Abusing SSL Panel Discussion "Best-practices "

Speaker list:r

15:40-16:00 Raffles & Awards
16:00-16:45 After
17:00+ (tbd)


The purpose of this page. It is official, and we have the meeting space reservation to prove it! Date: June 10, 2008 Location: Tivoli Baerresen Conference Rooms (located on the Auraria Campus in Downtown Denver) 900 Auraria Parkway Denver, CO 80204

Call For Papers

We are seeking presentations