This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Front Range OWASP Conference 2013/Schedule"

From OWASP
Jump to: navigation, search
(Updated speaker/presentation links to redirect to the speaker/presentation tabs)
Line 27: Line 27:
 
  |-
 
  |-
 
  | style="background:#024C68; color:white" align="center" | 08:00-08:15
 
  | style="background:#024C68; color:white" align="center" | 08:00-08:15
  | colspan="4" style="background:#E0E0E0" align="center"  | '''Welcome and Kick-off'''<br> ''[[User:Steve_Kosten|Steve Kosten]], [[User:Mark_Major|Mark Major]]'' <br> [http://www.owasp.org/ Slides]
+
  | colspan="4" style="background:#E0E0E0" align="center"  | '''Welcome and Kick-off'''<br> ''[[User:Brad_Carvalho|Brad Carvalho]], [[User:Mark_Major|Mark Major]]''
 
  |-
 
  |-
 
  | style="background:#024C68; color:white" align="center" | 08:15-08:30
 
  | style="background:#024C68; color:white" align="center" | 08:15-08:30
  | colspan="4" style="background:#E0E0E0" align="center"  | '''State of OWASP'''<br> ''[[Jim_Manico|Jim Manico]]'' <br> [http://www.owasp.org/ Slides]
+
  | colspan="4" style="background:#E0E0E0" align="center"  | '''State of OWASP'''<br> ''[[Jim_Manico|Jim Manico]]''
 
  |-
 
  |-
 
  | style="background:#024C68; color:white" align="center" | 08:30-09:30
 
  | style="background:#024C68; color:white" align="center" | 08:30-09:30
  | colspan="4" style="background:#E0E0E0" align="center"  | '''Keynote Address'''<br> ''Neal Ziring, Technical Director of Information Protection, NSA'' <br> [http://www.owasp.org/ Slides]
+
  | colspan="4" style="background:#E0E0E0" align="center"  | '''Keynote Address'''<br> ''Neal Ziring, Technical Director of Information Protection, NSA''
 
  |-
 
  |-
 
  | style="background:#024C68; color:white" align="center" | 09:30-10:00
 
  | style="background:#024C68; color:white" align="center" | 09:30-10:00
Line 40: Line 40:
 
  |-
 
  |-
 
  | style="background:#024C68; color:white" align="center" | 10:00-10:45
 
  | style="background:#024C68; color:white" align="center" | 10:00-10:45
  | style="background:#E8D0A9" align="center"              | '''[[Link to Preso Page | DevFu: The inner ninja in every application developer]]''' <br> ''[http://authorurl.com Danny Chrastil]''<br>  
+
  | style="background:#E8D0A9" align="center"              | '''[[Front_Range_OWASP_Conference_2013#Presentations|DevFu: The inner ninja in every application developer]]''' <br> ''[[Front_Range_OWASP_Conference_2013#Speakers|Danny Chrastil]]''<br>  
  | style="background:#DFC184" align="center"              | '''[[Link to Preso Page | SIP Based Cloud Instances]]''' <br> ''[http://authorurl.com Gregory Disney-Leugers]''<br>  
+
  | style="background:#DFC184" align="center"              | '''[[Front_Range_OWASP_Conference_2013#Presentations|SIP Based Cloud Instances]]''' <br> ''[[Front_Range_OWASP_Conference_2013#Speakers|Gregory Disney-Leugers]]''<br>  
  | style="background:#F2F2F2" align="center"              | '''[[Link to Preso Page | Measuring Best Security Practices With Open SAMM]]''' <br> ''[http://authorurl.com Alan Jex]''<br>  
+
  | style="background:#F2F2F2" align="center"              | '''[[Front_Range_OWASP_Conference_2013#Presentations|Measuring Best Security Practices With Open SAMM]]''' <br> ''[[Front_Range_OWASP_Conference_2013#Speakers|Alan Jex]]''<br>  
  | style="background:#B7AFA3" align="center"              | '''[[Link to Preso Page | Electronic Discovery for System Administrators]]''' <br> ''[http://authorurl.com Russell Shumway]''<br>  
+
  | style="background:#B7AFA3" align="center"              | '''[[Front_Range_OWASP_Conference_2013#Presentations|Electronic Discovery for System Administrators]]''' <br> ''[[Front_Range_OWASP_Conference_2013#Speakers|Russell Shumway]]''<br>  
 
  | style="background:#C1DAD6" align="center" rowspan="9" | '''CTF'''
 
  | style="background:#C1DAD6" align="center" rowspan="9" | '''CTF'''
 
  |-
 
  |-
 
  | style="background:#024C68; color:white" align="center" | 10:55-11:40
 
  | style="background:#024C68; color:white" align="center" | 10:55-11:40
  | style="background:#E8D0A9" align="center"              | '''[[Link to Preso Page | Adventures in Large Scale HTTP Header Abuse]]''' <br> ''[http://authorurl.com Zachary Wolff]''<br>  
+
  | style="background:#E8D0A9" align="center"              | '''[[Front_Range_OWASP_Conference_2013#Presentations|Adventures in Large Scale HTTP Header Abuse]]''' <br> ''[[Front_Range_OWASP_Conference_2013#Speakers|Zachary Wolff]]''<br>  
  | style="background:#DFC184" align="center"              | '''[[Link to Preso Page | How Malware Attacks Web Applications]]''' <br> ''[http://authorurl.com Casey Smith]''<br>  
+
  | style="background:#DFC184" align="center"              | '''[[Front_Range_OWASP_Conference_2013#Presentations|How Malware Attacks Web Applications]]''' <br> ''[[Front_Range_OWASP_Conference_2013#Speakers|Casey Smith]]''<br>  
  | style="background:#F2F2F2" align="center"              | '''[[Link to Preso Page | Software Assurance Improvements Through Innovation and Collaboration (Confirmation Pending)]]''' <br> ''[http://authorurl.com Kevin Greene]''<br>  
+
  | style="background:#F2F2F2" align="center"              | '''[[Front_Range_OWASP_Conference_2013#Presentations|Software Assurance Improvements Through Innovation and Collaboration (Confirmation Pending)]]''' <br> ''[[Front_Range_OWASP_Conference_2013#Speakers|Kevin Greene]]''<br>  
  | style="background:#B7AFA3" align="center"              | '''[[Link to Preso Page | CISPA: Why Privacy Advocates This Legislation]]''' <br> ''[http://authorurl.com Maureen Donohue Feinroth]''<br>  
+
  | style="background:#B7AFA3" align="center"              | '''[[Front_Range_OWASP_Conference_2013#Presentations|CISPA: Why Privacy Advocates This Legislation]]''' <br> ''[[Front_Range_OWASP_Conference_2013#Speakers|Maureen Donohue Feinroth]]''<br>  
 
  |-
 
  |-
 
  | style="background:#024C68; color:white" align="center" | 11:40-12:40
 
  | style="background:#024C68; color:white" align="center" | 11:40-12:40
Line 56: Line 56:
 
  |-
 
  |-
 
  | style="background:#024C68; color:white" align="center" | 12:40-13:25
 
  | style="background:#024C68; color:white" align="center" | 12:40-13:25
  | style="background:#E8D0A9" align="center"              | '''[[Link to Preso Page | Angry Cars: Hacking the "Car as Platform"]]''' <br> ''[http://authorurl.com Aaron Weaver]''<br>  
+
  | style="background:#E8D0A9" align="center"              | '''[[Front_Range_OWASP_Conference_2013#Presentations|Angry Cars: Hacking the "Car as Platform"]]''' <br> ''[[Front_Range_OWASP_Conference_2013#Speakers|Aaron Weaver]]''<br>  
  | style="background:#DFC184" align="center"              | '''[[Link to Preso Page | Top Ten Web Application Defenses]]''' <br> ''[http://authorurl.com Jim Manico]''<br>  
+
  | style="background:#DFC184" align="center"              | '''[[Front_Range_OWASP_Conference_2013#Presentations|Top Ten Web Application Defenses]]''' <br> ''[[Front_Range_OWASP_Conference_2013#Speakers|Jim Manico]]''<br>  
  | style="background:#F2F2F2" align="center"              | '''[[Link to Preso Page | Using SaaS and the Cloud to Secure the SDLC]]''' <br> ''[http://authorurl.com Andrew Earle]''<br>  
+
  | style="background:#F2F2F2" align="center"              | '''[[Front_Range_OWASP_Conference_2013#Presentations|Using SaaS and the Cloud to Secure the SDLC]]''' <br> ''[[Front_Range_OWASP_Conference_2013#Speakers|Andrew Earle]]''<br>  
  | style="background:#B7AFA3" align="center"              | '''[[Link to Preso Page | Digital Bounty Hunters - Decoding Bug Bounty Programs]]''' <br> ''[http://authorurl.com Jon Rose]''<br>  
+
  | style="background:#B7AFA3" align="center"              | '''[[Front_Range_OWASP_Conference_2013#Presentations|Digital Bounty Hunters - Decoding Bug Bounty Programs]]''' <br> ''[[Front_Range_OWASP_Conference_2013#Speakers|Jon Rose]]''<br>  
 
  |-
 
  |-
 
  | style="background:#024C68; color:white" align="center" | 13:35-14:20
 
  | style="background:#024C68; color:white" align="center" | 13:35-14:20
  | style="background:#E8D0A9" align="center"              | '''[[Link to Preso Page | Real World Cloud Application Security]]''' <br> ''[http://authorurl.com Jason Chan]''<br>  
+
  | style="background:#E8D0A9" align="center"              | '''[[Front_Range_OWASP_Conference_2013#Presentations|Real World Cloud Application Security]]''' <br> ''[[Front_Range_OWASP_Conference_2013#Speakers|Jason Chan]]''<br>  
  | style="background:#DFC184" align="center"              | '''[[Link to Preso Page | A Demo of and Preventing XSS in .NET Applications]]''' <br> ''[http://authorurl.com Larry Conklin]''<br>  
+
  | style="background:#DFC184" align="center"              | '''[[Front_Range_OWASP_Conference_2013#Presentations|A Demo of and Preventing XSS in .NET Applications]]''' <br> ''[[Front_Range_OWASP_Conference_2013#Speakers|Larry Conklin]]''<br>  
  | style="background:#F2F2F2" align="center"              | '''[[Link to Preso Page | Defending Desktop (.NET/C#) Applications: Mitigating in the Dark (A Case Study Remix)]]''' <br> ''[http://authorurl.com Jon McCoy]''<br>  
+
  | style="background:#F2F2F2" align="center"              | '''[[Front_Range_OWASP_Conference_2013#Presentations|Defending Desktop (.NET/C#) Applications: Mitigating in the Dark (A Case Study Remix)]]''' <br> ''[[Front_Range_OWASP_Conference_2013#Speakers|Jon McCoy]]''<br>  
  | style="background:#B7AFA3" align="center"              | '''[[Link to Preso Page | Crafting a Plan for When Security Fails]]''' <br> ''[http://authorurl.com Robert Lelewski]''<br>  
+
  | style="background:#B7AFA3" align="center"              | '''[[Front_Range_OWASP_Conference_2013#Presentations|Crafting a Plan for When Security Fails]]''' <br> ''[[Front_Range_OWASP_Conference_2013#Speakers|Robert Lelewski]]''<br>  
 
  |-
 
  |-
 
  | style="background:#024C68; color:white" align="center" | 14:30-15:15
 
  | style="background:#024C68; color:white" align="center" | 14:30-15:15
  | style="background:#E8D0A9" align="center"              | '''[[Link to Preso Page | DevOps and Security: It's Happening. Right Now. (Confirmation Pending)]]''' <br> ''[http://authorurl.com Helen Bravo]''<br>  
+
  | style="background:#E8D0A9" align="center"              | '''[[Front_Range_OWASP_Conference_2013#Presentations|DevOps and Security: It's Happening. Right Now. (Confirmation Pending)]]''' <br> ''[[Front_Range_OWASP_Conference_2013#Speakers|Helen Bravo]]''<br>  
  | style="background:#DFC184" align="center"              | '''[[Link to Preso Page | Data Mining a Mountain of Zero Day Vulnerabilities]]''' <br> ''[http://authorurl.com Joe Brady]''<br>  
+
  | style="background:#DFC184" align="center"              | '''[[Front_Range_OWASP_Conference_2013#Presentations|Data Mining a Mountain of Zero Day Vulnerabilities]]''' <br> ''[[Front_Range_OWASP_Conference_2013#Speakers|Joe Brady]]''<br>  
  | style="background:#F2F2F2" align="center"              | '''[[Link to Preso Page | Linking Security to Business Value in the Customer Service Industry]]''' <br> ''[http://authorurl.com Dan Rojas]''<br>  
+
  | style="background:#F2F2F2" align="center"              | '''[[Front_Range_OWASP_Conference_2013#Presentations|Linking Security to Business Value in the Customer Service Industry]]''' <br> ''[[Front_Range_OWASP_Conference_2013#Speakers|Dan Rojas]]''<br>  
  | style="background:#B7AFA3" align="center"              | '''[[Link to Preso Page | Information Control: The Critical Need for a Defensible Position - Securing the Information Ecosystem]]''' <br> ''[http://authorurl.com Tom Glanville]''<br>  
+
  | style="background:#B7AFA3" align="center"              | '''[[Front_Range_OWASP_Conference_2013#Presentations|Information Control: The Critical Need for a Defensible Position - Securing the Information Ecosystem]]''' <br> ''[[Front_Range_OWASP_Conference_2013#Speakers|Tom Glanville]]''<br>  
 
  |-
 
  |-
 
  | style="background:#024C68; color:white" align="center" | 15:15-15:45
 
  | style="background:#024C68; color:white" align="center" | 15:15-15:45
Line 82: Line 82:
 
     Panelist Name, Company & Title
 
     Panelist Name, Company & Title
 
     Moderator: [[Jim_Manico|Jim Manico]]''
 
     Moderator: [[Jim_Manico|Jim Manico]]''
    [http://video.google.com/ VIDEO] / [http://owasp.org SLIDES]
 
 
  |-
 
  |-
 
  | style="background:#024C68; color:white" align="center" | 16:45-17:00
 
  | style="background:#024C68; color:white" align="center" | 16:45-17:00
  | colspan="4" style="background:#E0E0E0" align="center"  | '''Closing Statements'''<br>''[[User:Steve_Kosten|Steve Kosten]], [[User:Mark_Major|Mark Major]]''
+
  | colspan="4" style="background:#E0E0E0" align="center"  | '''Closing Statements'''<br>''[[User:Brad_Carvalho|Brad Carvalho]], [[User:Mark_Major|Mark Major]]''
 
  |-
 
  |-
 
  | style="background:#024C68; color:white" align="center" | 17:00-
 
  | style="background:#024C68; color:white" align="center" | 17:00-
  | colspan="4" style="background:#E0E0E0" align="center"  | '''Sponsor Raffles, Drawings, and Contests'''<br>''[[User:Steve_Kosten|Steve Kosten]], [[User:Mark_Major|Mark Major]]''
+
  | colspan="4" style="background:#E0E0E0" align="center"  | '''Sponsor Raffles, Drawings, and Contests'''
 
  | style="background:#C1DAD6" align="center" | '''CTF Wrap-Up'''<br>''[[User:Chris_Rossi|Chris Rossi]], [[User:Mark_Major|Mark Major]]''
 
  | style="background:#C1DAD6" align="center" | '''CTF Wrap-Up'''<br>''[[User:Chris_Rossi|Chris Rossi]], [[User:Mark_Major|Mark Major]]''
 
  |-
 
  |-

Revision as of 17:08, 8 March 2013

SnowFROC 2013 schedule

This schedule is subject to frequently changes as the conference draws nearer.


CFP Schedule

Abstract collection will begin January 14th and continue until all speaking slots are filled. Rolling evaluations will occur and selected papers will be announced each Monday beginning on February 11th.

Final presentations of accepted abstracts must be submitted for review by March 17th. Presentations will be delivered during the conference on March 28th.

(See the CFP section for additional dates and details.)


Day of Event Schedule


Thu, Mar 28 Technical Track Deep-Dive Track Management Track Legal Track
07:00-08:30 Registration and Morning Snacks
Food provided by [SPONSORSHIP AVAILABLE] (07:00 - 08:30)
08:00-08:15 Welcome and Kick-off
Brad Carvalho, Mark Major
08:15-08:30 State of OWASP
Jim Manico
08:30-09:30 Keynote Address
Neal Ziring, Technical Director of Information Protection, NSA
09:30-10:00 Coffee Break and Sponsor Expo
Coffee provided by [SPONSORSHIP AVAILABLE]
CTF Kick-off
Chris Rossi, Mark Major
10:00-10:45 DevFu: The inner ninja in every application developer
Danny Chrastil
SIP Based Cloud Instances
Gregory Disney-Leugers
Measuring Best Security Practices With Open SAMM
Alan Jex
Electronic Discovery for System Administrators
Russell Shumway
CTF
10:55-11:40 Adventures in Large Scale HTTP Header Abuse
Zachary Wolff
How Malware Attacks Web Applications
Casey Smith
Software Assurance Improvements Through Innovation and Collaboration (Confirmation Pending)
Kevin Greene
CISPA: Why Privacy Advocates This Legislation
Maureen Donohue Feinroth
11:40-12:40 Lunch and Sponsor Expo
Lunch provided by [SPONSORSHIP AVAILABLE]
12:40-13:25 Angry Cars: Hacking the "Car as Platform"
Aaron Weaver
Top Ten Web Application Defenses
Jim Manico
Using SaaS and the Cloud to Secure the SDLC
Andrew Earle
Digital Bounty Hunters - Decoding Bug Bounty Programs
Jon Rose
13:35-14:20 Real World Cloud Application Security
Jason Chan
A Demo of and Preventing XSS in .NET Applications
Larry Conklin
Defending Desktop (.NET/C#) Applications: Mitigating in the Dark (A Case Study Remix)
Jon McCoy
Crafting a Plan for When Security Fails
Robert Lelewski
14:30-15:15 DevOps and Security: It's Happening. Right Now. (Confirmation Pending)
Helen Bravo
Data Mining a Mountain of Zero Day Vulnerabilities
Joe Brady
Linking Security to Business Value in the Customer Service Industry
Dan Rojas
Information Control: The Critical Need for a Defensible Position - Securing the Information Ecosystem
Tom Glanville
15:15-15:45 Coffee Break and Sponsor Expo
Coffee provided by [SPONSORSHIP AVAILABLE]
15:45-16:45 Moderated Panel Discussion
   Panelist Name, Company & Title
   Panelist Name, Company & Title
   Panelist Name, Company & Title
   Moderator: Jim Manico
16:45-17:00 Closing Statements
Brad Carvalho, Mark Major
17:00- Sponsor Raffles, Drawings, and Contests CTF Wrap-Up
Chris Rossi, Mark Major
18:30-21:00+ AppliedTrust after-party at TBD
CTF awards ceremony (19:30)


Fri, Mar 29 Training Birds of a Feather: A Birds of a Feather: B Capture the Flag
09:00-9:45 Secure Coding DevOps in Cloud environments (edit) BoaF 1b (edit) FLOSSHack: CTF VM
10:00-10:45 The modern threatscape: what have you seen? (edit) BoaF 2b (edit)
10:45-11:15 Coffee Break
Provided by [SPONSORSHIP AVAILABLE]
11:15-12:00 Access Control (edit) BoaF 3b (edit) FLOSSHack: CTF Scoreboard
12:15-13:00 COTS solutions for secure enterprise architectures (edit) BoaF 4b (edit)