This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Front Range OWASP Conference 2013/Schedule"

From OWASP
Jump to: navigation, search
Line 21: Line 21:
 
  ! style="width:19%; border-bottom: 1px solid black; background:#F2F2F2" align="center" | Management Track
 
  ! style="width:19%; border-bottom: 1px solid black; background:#F2F2F2" align="center" | Management Track
 
  ! style="width:19%; border-bottom: 1px solid black; background:#B7AFA3" align="center" | Legal Track
 
  ! style="width:19%; border-bottom: 1px solid black; background:#B7AFA3" align="center" | Legal Track
 +
| style="border-right: 1px solid white; border-top: 1px solid white;" align="center" rowspan="5" |
 
  |-
 
  |-
 
  | style="background:#024C68; color:white" align="center" | 07:00-08:30
 
  | style="background:#024C68; color:white" align="center" | 07:00-08:30
Line 92: Line 93:
 
  | style="background:#024C68; color:white" align="center" | 18:30-21:00+
 
  | style="background:#024C68; color:white" align="center" | 18:30-21:00+
 
  | colspan="4" style="background:#AEBEC3; color:#024C68" align="center"  | '''[https://www.appliedtrust.com AppliedTrust] after-party at TBD''' <br> '''CTF awards ceremony''' ''(19:30)''
 
  | colspan="4" style="background:#AEBEC3; color:#024C68" align="center"  | '''[https://www.appliedtrust.com AppliedTrust] after-party at TBD''' <br> '''CTF awards ceremony''' ''(19:30)''
 +
| style="border-right: 1px solid white; border-bottom: 1px solid white;" |
 
  |-
 
  |-
  | style="background:white; color:white; border-left: 1px solid white; border-right: 1px solid white;" | <br><br>
+
  | style="border-left: 1px solid white; border-right: 1px solid white; border-bottom: 1px solid white; border-top: 1px solid black;" | <br><br>
 +
| style="border-left: 1px solid white; border-right: 1px solid white;" colspan="4" |
 +
| style="border-left: 1px solid white; border-right: 1px solid white; border-bottom: 1px solid white" |
 
  |-
 
  |-
 
  ! style="border-left: 1px solid white; border-top: 1px solid white;" | '''Fri, Mar 29'''
 
  ! style="border-left: 1px solid white; border-top: 1px solid white;" | '''Fri, Mar 29'''
Line 100: Line 104:
 
  ! style="border-bottom: 1px solid black; background:#F2F2F2" align="center" | Birds of a Feather: B
 
  ! style="border-bottom: 1px solid black; background:#F2F2F2" align="center" | Birds of a Feather: B
 
  ! style="border-bottom: 1px solid black; background:#B7AFA3" align="center" | Capture the Flag
 
  ! style="border-bottom: 1px solid black; background:#B7AFA3" align="center" | Capture the Flag
 +
| style="border-right: 1px solid white; border-bottom: 1px solid white;" rowspan="6" |
 
  |-
 
  |-
 
  | style="width:10%; background:#024C68; color:white" align="center" | 09:00-9:45
 
  | style="width:10%; background:#024C68; color:white" align="center" | 09:00-9:45
 
  | style="width:20%; background:#E8D0A9" align="center" rowspan="5" | Secure Coding
 
  | style="width:20%; background:#E8D0A9" align="center" rowspan="5" | Secure Coding
  | style="width:20%; background:#DFC184" align="center" | BoaF 1A
+
  | style="width:20%; background:#DFC184" align="center" | {{:Front_Range_OWASP_Conference_2013/boaf1a}} ''([[Front_Range_OWASP_Conference_2013/boaf1a|edit]])''
  | style="width:20%; background:#F2F2F2" align="center" | BoaF 1B
+
  | style="width:20%; background:#F2F2F2" align="center" | {{:Front_Range_OWASP_Conference_2013/boaf1b}} ''([[Front_Range_OWASP_Conference_2013/boaf1b|edit]])''
 
  | style="width:20%; background:#B7AFA3" align="center" rowspan="2" | FLOSSHack: CTF VM
 
  | style="width:20%; background:#B7AFA3" align="center" rowspan="2" | FLOSSHack: CTF VM
 
  |-
 
  |-
 
  | style="width:10%; background:#024C68; color:white" align="center" | 10:00-10:45
 
  | style="width:10%; background:#024C68; color:white" align="center" | 10:00-10:45
  | style="width:20%; background:#DFC184" align="center" | BoaF 2A
+
  | style="width:20%; background:#DFC184" align="center" | {{:Front_Range_OWASP_Conference_2013/boaf2a}} ''([[Front_Range_OWASP_Conference_2013/boaf2a|edit]])''
  | style="width:20%; background:#F2F2F2" align="center" | BoaF 2B
+
  | style="width:20%; background:#F2F2F2" align="center" | {{:Front_Range_OWASP_Conference_2013/boaf2b}} ''([[Front_Range_OWASP_Conference_2013/boaf2b|edit]])''
 
  |-
 
  |-
 
  | style="width:10%; background:#024C68; color:white" align="center" | 10:45-11:15
 
  | style="width:10%; background:#024C68; color:white" align="center" | 10:45-11:15
Line 115: Line 120:
 
  |-
 
  |-
 
  | style="width:10%; background:#024C68; color:white" align="center" | 11:15-12:00
 
  | style="width:10%; background:#024C68; color:white" align="center" | 11:15-12:00
  | style="width:20%; background:#DFC184" align="center" | BoaF 3A
+
  | style="width:20%; background:#DFC184" align="center" | {{:Front_Range_OWASP_Conference_2013/boaf3a}} ''([[Front_Range_OWASP_Conference_2013/boaf3a|edit]])''
  | style="width:20%; background:#F2F2F2" align="center" | BoaF 3B
+
  | style="width:20%; background:#F2F2F2" align="center" | {{:Front_Range_OWASP_Conference_2013/boaf3b}} ''([[Front_Range_OWASP_Conference_2013/boaf3b|edit]])''
 
  | style="width:20%; background:#B7AFA3" align="center" rowspan="2" | FLOSSHack: CTF Scoreboard
 
  | style="width:20%; background:#B7AFA3" align="center" rowspan="2" | FLOSSHack: CTF Scoreboard
 
  |-
 
  |-
 
  | style="width:10%; background:#024C68; color:white" align="center" | 12:15-13:00
 
  | style="width:10%; background:#024C68; color:white" align="center" | 12:15-13:00
  | style="width:20%; background:#DFC184" align="center" | BoaF 4A
+
  | style="width:20%; background:#DFC184" align="center" | {{:Front_Range_OWASP_Conference_2013/boaf4a}} ''([[Front_Range_OWASP_Conference_2013/boaf4a|edit]])''
  | style="width:20%; background:#F2F2F2" align="center" | BoaF 4B
+
  | style="width:20%; background:#F2F2F2" align="center" | {{:Front_Range_OWASP_Conference_2013/boaf4b}} ''([[Front_Range_OWASP_Conference_2013/boaf4b|edit]])''
 
|}
 
|}

Revision as of 19:52, 20 February 2013

SnowFROC 2013 schedule

This schedule is subject to frequently changes as the conference draws nearer.


CFP Schedule

Abstract collection will begin January 14th and continue until all speaking slots are filled. Rolling evaluations will occur and selected papers will be announced each Monday beginning on February 11th.

Final presentations of accepted abstracts must be submitted for review by March 17th. Presentations will be delivered during the conference on March 28th.

(See the CFP section for additional dates and details.)


Day of Event Schedule


Thu, Mar 28 Technical Track Deep-Dive Track Management Track Legal Track
07:00-08:30 Registration and Morning Snacks
Food provided by [SPONSORSHIP AVAILABLE] (07:00 - 08:30)
08:00-08:15 Welcome and Kick-off
Steve Kosten, Mark Major
Slides
08:15-08:30 State of OWASP
Jim Manico
Slides
08:30-09:30 Keynote Address
Neal Ziring, Technical Director of Information Protection, NSA
Slides
09:30-10:00 Coffee Break and Sponsor Expo
Coffee provided by [SPONSORSHIP AVAILABLE]
CTF Kick-off
Chris Rossi, Mark Major
10:00-10:45 Technical 1
Author Name
VIDEO / SLIDES
Deep-dive 1
Author Name
VIDEO / SLIDES
Management 1
Author Name
VIDEO / SLIDES
Legal 1
Author Name
VIDEO / SLIDES
CTF
10:55-11:40 Technical 2
Author Name
VIDEO / SLIDES
Deep-dive 2
Author Name
VIDEO / SLIDES
Management 2
Author Name
VIDEO / SLIDES
Legal 2
Author Name
VIDEO / SLIDES
11:40-12:40 Lunch and Sponsor Expo
Lunch provided by [SPONSORSHIP AVAILABLE]
12:40-13:25 Technical 3
Author Name
VIDEO / SLIDES
Deep-dive 3
Author Name
VIDEO / SLIDES
Management 3
Author Name
VIDEO / SLIDES
Legal 3
Author Name
VIDEO / SLIDES
13:35-14:20 Technical 4
Author Name
VIDEO / SLIDES
Deep-dive 4
Author Name
VIDEO / SLIDES
Management 4
Author Name
VIDEO / SLIDES
Legal 4
Author Name
VIDEO / SLIDES
14:30-15:15 Technical 5
Author Name
VIDEO / SLIDES
Deep-dive 5
Author Name
VIDEO / SLIDES
Management 5
Author Name
VIDEO / SLIDES
Legal 5
Author Name
VIDEO / SLIDES
15:15-15:45 Coffee Break and Sponsor Expo
Coffee provided by [SPONSORSHIP AVAILABLE]
15:45-16:45 Moderated Panel Discussion
   Panelist Name, Company & Title
   Panelist Name, Company & Title
   Panelist Name, Company & Title
   Moderator: Jim Manico
   VIDEO / SLIDES
16:45-17:00 Closing Statements
Steve Kosten, Mark Major
17:00- Sponsor Raffles, Drawings, and Contests
Steve Kosten, Mark Major
CTF Wrap-Up
Chris Rossi, Mark Major
18:30-21:00+ AppliedTrust after-party at TBD
CTF awards ceremony (19:30)


Fri, Mar 29 Training Birds of a Feather: A Birds of a Feather: B Capture the Flag
09:00-9:45 Secure Coding DevOps in Cloud environments (edit) BoaF 1b (edit) FLOSSHack: CTF VM
10:00-10:45 The modern threatscape: what have you seen? (edit) BoaF 2b (edit)
10:45-11:15 Coffee Break
Provided by [SPONSORSHIP AVAILABLE]
11:15-12:00 Access Control (edit) BoaF 3b (edit) FLOSSHack: CTF Scoreboard
12:15-13:00 COTS solutions for secure enterprise architectures (edit) BoaF 4b (edit)