This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "FROC Schedule Draft"
m (→Notes) |
(→Notes: Pretty much fully populated...) |
||
Line 14: | Line 14: | ||
|- | |- | ||
| style="width:10%; background:#7B8ABD" | 08:30-08:35 || colspan="3" style="width:80%; background:#F2F2F2" align="center" | Welcome to SnowFROC 2012 Conference | | style="width:10%; background:#7B8ABD" | 08:30-08:35 || colspan="3" style="width:80%; background:#F2F2F2" align="center" | Welcome to SnowFROC 2012 Conference | ||
+ | |||
+ | Probably need min 10 minutes just to explain layout, sched, and restroom locations :-) | ||
+ | |||
''OWASP Denver and OWASP Boulder Chapter Leaders'' | ''OWASP Denver and OWASP Boulder Chapter Leaders'' | ||
|- | |- | ||
Line 26: | Line 29: | ||
<!-- *** above --> | <!-- *** above --> | ||
|- | |- | ||
− | | style="width:10%; background:#7B8ABD" | 10:00-10:20 || colspan="3" style="width:80%; background:#F2F2F2" align="center" | | + | | style="width:10%; background:#7B8ABD" | 10:00-10:20 || colspan="3" style="width:80%; background:#F2F2F2" align="center" | Nuke this unless Matt needs more time. Distribute the time for lunch? |
− | |||
|- | |- | ||
Line 33: | Line 35: | ||
|- | |- | ||
− | | style="width:10%; background:#7B8ABD" | || colspan="1" style="width:45%; background:#BC857A" | '''Track | + | | style="width:10%; background:#7B8ABD" | || colspan="1" style="width:45%; background:#BC857A" | '''Tech Track - Magumba Room''' |
− | | colspan="1" style="width:45%; background:#BCA57A" | '''Track | + | | colspan="1" style="width:45%; background:#BCA57A" | '''Management Track - Silawesi Room''' |
<!-- | style="width:22%; background:#C6E2FF" | '''Management / Exec Track: Room 3''' --> | <!-- | style="width:22%; background:#C6E2FF" | '''Management / Exec Track: Room 3''' --> | ||
|- | |- | ||
− | | style="width:10%; background:#7B8ABD" | 10:30-11:15 || style="width:45%; background:#BC857A" align="left" | | + | | style="width:10%; background:#7B8ABD" | 10:30-11:15 || style="width:45%; background:#BC857A" align="left" | OWASP Passfault |
− | '' | + | ''Cameron Morris'' |
− | | style="width:45%; background:#BCA57A" align="left" | | + | | style="width:45%; background:#BCA57A" align="left" | PCI vs Risk Management |
− | '' | + | ''Doug Landoll'' |
<!-- | style="width:22%; background:#C6E2FF" align="left" | TBD | <!-- | style="width:22%; background:#C6E2FF" align="left" | TBD | ||
Line 50: | Line 52: | ||
− | | style="width:10%; background:#7B8ABD" | 11:15-12:00 || style="width:45%; background:#BC857A" align="left" | | + | | style="width:10%; background:#7B8ABD" | 11:15-12:00 || style="width:45%; background:#BC857A" align="left" | State of Web Security: Monitored Attacks |
− | '' | + | |
+ | ''Robert Rowley'' | ||
− | | style="width:45%; background:#BCA57A" align="left" | | + | | style="width:45%; background:#BCA57A" align="left" | Securing Data from the Web Tier |
− | '' | + | ''Mike Fleck'' |
− | <!-- | style="width:22%; background:#C6E2FF" align="left" | | + | <!-- | style="width:22%; background:#C6E2FF" align="left" | Securing Data from the Web Tier ''Mike Fleck'' --> |
|- | |- | ||
Line 62: | Line 65: | ||
|- | |- | ||
− | | style="width:10%; background:#7B8ABD" | 13:00-13:50 || style="width:45%; background:#BC857A" align="left" | | + | | style="width:10%; background:#7B8ABD" | 13:00-13:50 || style="width:45%; background:#BC857A" align="left" | Panel Discussion |
− | '' | + | ''Favorite tools and techniques - pen-testing, static analysis, code reviews'' |
− | | style="width:45%; background:#BCA57A" align="left" | | + | | style="width:45%; background:#BCA57A" align="left" | Panel Discussion |
− | '' | + | ''Making it work - getting buyin to get security baked in'' |
<!-- | style="width:22%; background:#C6E2FF" align="left" | TBD | <!-- | style="width:22%; background:#C6E2FF" align="left" | TBD | ||
Line 74: | Line 77: | ||
− | | style="width:10%; background:#7B8ABD" | 13:50-14:40 || style="width:45%; background:#BC857A" align="left" | | + | | style="width:10%; background:#7B8ABD" | 13:50-14:40 || style="width:45%; background:#BC857A" align="left" | Gray, the new black: Gray box vulnerability testing |
− | '' | + | ''Adam Hills'' |
− | | style="width:45%; background:#BCA57A" align="left" | | + | | style="width:45%; background:#BCA57A" align="left" | Managing IT Risk in a Cloud Environment |
− | '' | + | ''Karl Steinkamp'' |
<!-- | style="width:22%; background:#C6E2FF" align="left" | TBD | <!-- | style="width:22%; background:#C6E2FF" align="left" | TBD | ||
Line 88: | Line 91: | ||
|- | |- | ||
− | | style="width:10%; background:#7B8ABD" | 15:00-15:50 || style="width:45%; background:#BC857A" align="left" | " | + | | style="width:10%; background:#7B8ABD" | 15:00-15:50 || style="width:45%; background:#BC857A" align="left" | "The Mobile Top 10" |
− | '' | + | ''Mike Zussman'' |
− | | style="width:45%; background:#BCA57A" align="left" | | + | | style="width:45%; background:#BCA57A" align="left" | Web Session Intelligence |
− | '' | + | ''Laz'' |
<!-- | <!-- | ||
Line 116: | Line 119: | ||
|} | |} | ||
+ | |||
+ | === On Deck === | ||
+ | * Oh heck lightning talks to be invoked if a speaker gets hit by a bus - Andy, Steve, James, Craig have both mngmnt & tech 10 min spews prepared | ||
+ | |||
+ | * Bruce Nordquist and Dan Weiske - OWASP Top 10 vs. NIST 800-53A rev1 controls (Bruce & Dan on panels?) | ||
+ | |||
+ | * Rajiv Sharma - A Scalable Secure Environment (panelist?) | ||
+ | |||
+ | * Rapid 7? | ||
+ | |||
+ | * Bleeding-edge wild-card? |
Revision as of 21:46, 29 February 2012
Agenda and Presentations: 22 March 2012
Notes
- Can't serve breakfast at 7:30, or can we? James' coffee idea?
The agenda follows the successful OWASP conference multi track format, with opening keynotes and presentations in the main room, split tracks in the middle of the day, and closing panel discussions back in the main room.
March 22nd, 2012 | |||
---|---|---|---|
07:30-08:30 | Registration and Continental Breakfast in the Sponsor Expo Room | ||
08:30-08:35 | Welcome to SnowFROC 2012 Conference
Probably need min 10 minutes just to explain layout, sched, and restroom locations :-) OWASP Denver and OWASP Boulder Chapter Leaders | ||
08:35-09:35 |
Keynote: John Pirc, Co-Author of "Cybercrime and Espionage: An Analysis of Subversive Multi-Vector Threats" | ||
09:35-10:00 | State of OWASP
Matt Tesauro | ||
10:00-10:20 | Nuke this unless Matt needs more time. Distribute the time for lunch? | ||
10:20-10:30 | Break - Expo | ||
Tech Track - Magumba Room | Management Track - Silawesi Room | ||
10:30-11:15 | OWASP Passfault
Cameron Morris |
PCI vs Risk Management
Doug Landoll | |
11:15-12:00 | State of Web Security: Monitored Attacks
Robert Rowley |
Securing Data from the Web Tier
Mike Fleck | |
12:00-13:00 | Lunch - Expo | ||
13:00-13:50 | Panel Discussion
Favorite tools and techniques - pen-testing, static analysis, code reviews |
Panel Discussion
Making it work - getting buyin to get security baked in
| |
13:50-14:40 | Gray, the new black: Gray box vulnerability testing
Adam Hills |
Managing IT Risk in a Cloud Environment
Karl Steinkamp | |
14:40-15:00 | BREAK | ||
15:00-15:50 | "The Mobile Top 10"
Mike Zussman
|
Web Session Intelligence
Laz
| |
15:50-16:30 | End of Conference Panel Discussion:
Topic: The Crystal Ball and the 2-headed Calf - What's on the Horizon and Why Does It Seem So Unnatural? Moderator: Steve Kosten or Andy Lewis Panelists: Laz, Matt Tesauro, John Pirc, Tanner Coltrin, Steve Kosten, others
| ||
16:30-17:30 | Wrap up, vendor raffles! |
On Deck
- Oh heck lightning talks to be invoked if a speaker gets hit by a bus - Andy, Steve, James, Craig have both mngmnt & tech 10 min spews prepared
- Bruce Nordquist and Dan Weiske - OWASP Top 10 vs. NIST 800-53A rev1 controls (Bruce & Dan on panels?)
- Rajiv Sharma - A Scalable Secure Environment (panelist?)
- Rapid 7?
- Bleeding-edge wild-card?