This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Front Range OWASP Conference 2016/Schedule"
(Created page with "==Agenda and Presentations: 18 February 2016== The agenda follows the successful OWASP conference multi track format, with opening keynotes and presentations in the main room...") |
(Added schedule including some bogus titles, presenters, and a disclaimer.) |
||
Line 1: | Line 1: | ||
− | + | __NOTOC__ | |
The agenda follows the successful OWASP conference multi track format, with opening keynotes and presentations in the main room & broadcast throughout the facility, split tracks in the middle of the day, and closing panel discussions at the end of the day. | The agenda follows the successful OWASP conference multi track format, with opening keynotes and presentations in the main room & broadcast throughout the facility, split tracks in the middle of the day, and closing panel discussions at the end of the day. | ||
+ | '''NOTE: schedule is subject to change.''' | ||
{| style="width:86%" border="0" align="center" | {| style="width:86%" border="0" align="center" | ||
Line 12: | Line 13: | ||
''OWASP Denver and OWASP Boulder Chapter Leaders'' | ''OWASP Denver and OWASP Boulder Chapter Leaders'' | ||
|- | |- | ||
− | | style="width:10%; background:#7B8ABD" | 08:45-09: | + | | style="width:10%; background:#7B8ABD" | 08:45-09:00 || colspan="3" style="width:80%; background:#F2F2F2" align="center" | |
'''State of OWASP''' | '''State of OWASP''' | ||
''Tom Brennan'' | ''Tom Brennan'' | ||
|- | |- | ||
− | | style="width:10%; background:#7B8ABD" | 09: | + | | style="width:10%; background:#7B8ABD" | 09:00-10:00 || colspan="3" style="width:80%; background:#F2F2F2" align="center" | '''Keynote: Red Dawn for AppSec - Where are the Wolverines?''' |
''[https://www.whitehatsec.com/about-me_jeremiah.html Jeremiah Grossman], CTO of WhiteHat Security'' | ''[https://www.whitehatsec.com/about-me_jeremiah.html Jeremiah Grossman], CTO of WhiteHat Security'' | ||
Line 23: | Line 24: | ||
|- | |- | ||
− | | style="width:10%; background:#7B8ABD" | 10: | + | | style="width:10%; background:#7B8ABD" | 10:00-10:30 || colspan="3" style="width:80%; background:#C2C2C2" align="left" | Break - Expo |
|- | |- | ||
− | | style="width:10%; background:#7B8ABD" | || colspan="1" style="width:45%; background:#BC857A" | ''' | + | | style="width:10%; background:#7B8ABD" | || colspan="1" style="width:45%; background:#BC857A" | '''Track 1 - Upstairs''' |
− | | colspan="1" style="width:45%; background:#BCA57A" | ''' | + | | colspan="1" style="width:45%; background:#BCA57A" | '''Track 2 - Downstairs''' |
<!-- | style="width:22%; background:#C6E2FF" | '''Management / Exec Track: Room 3''' --> | <!-- | style="width:22%; background:#C6E2FF" | '''Management / Exec Track: Room 3''' --> | ||
|- | |- | ||
− | | style="width:10%; background:#7B8ABD" | 10:30-11:15 || style="width:45%; background:#BC857A" align="left" | | + | | style="width:10%; background:#7B8ABD" | 10:30-11:15 || style="width:45%; background:#BC857A" align="left" | Why Messy Code Matters (& What You Can Do About It) |
− | '' | + | ''Mike Zussman'' |
− | | style="width:45%; background:#BCA57A" align="left" | | + | | style="width:45%; background:#BCA57A" align="left" | What did we learn about private email servers? |
− | '' | + | ''Somebody Else'' |
<!-- | style="width:22%; background:#C6E2FF" align="left" | TBD | <!-- | style="width:22%; background:#C6E2FF" align="left" | TBD | ||
Line 43: | Line 44: | ||
− | | style="width:10%; background:#7B8ABD" | 11:15-12:00 || style="width:45%; background:#BC857A" align="left" | | + | | style="width:10%; background:#7B8ABD" | 11:15-12:00 || style="width:45%; background:#BC857A" align="left" | Was my site hacked? Is my site hacking visitors? How would I know? |
− | '' | + | ''Bob Stanley'' |
| style="width:45%; background:#BCA57A" align="left" | PCI vs Risk Management | | style="width:45%; background:#BCA57A" align="left" | PCI vs Risk Management | ||
Line 108: | Line 109: | ||
|} | |} | ||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− |
Revision as of 23:29, 5 January 2016
The agenda follows the successful OWASP conference multi track format, with opening keynotes and presentations in the main room & broadcast throughout the facility, split tracks in the middle of the day, and closing panel discussions at the end of the day.
NOTE: schedule is subject to change.
Thursday, February 18th, 2016 | |||
---|---|---|---|
07:45-08:30 | Registration and Continental Breakfast in the lobby | ||
08:30-08:45 | Welcome to SnowFROC 2016 Conference
OWASP Denver and OWASP Boulder Chapter Leaders | ||
08:45-09:00 |
State of OWASP Tom Brennan | ||
09:00-10:00 | Keynote: Red Dawn for AppSec - Where are the Wolverines?
Jeremiah Grossman, CTO of WhiteHat Security | ||
10:00-10:30 | Break - Expo | ||
Track 1 - Upstairs | Track 2 - Downstairs | ||
10:30-11:15 | Why Messy Code Matters (& What You Can Do About It)
Mike Zussman |
What did we learn about private email servers?
Somebody Else | |
11:15-12:00 | Was my site hacked? Is my site hacking visitors? How would I know?
Bob Stanley |
PCI vs Risk Management
Doug Landoll | |
12:00-13:00 | Lunch - Expo | ||
13:00-13:50 | WebGoat.NET
Jerry Hoff |
Securing Data from the Web Tier
Mike Fleck | |
13:50-14:40 | Gray, the new black: Gray box vulnerability testing
Adam Hills |
What the Cyber Criminals are Doing on Your Website Right Now.
LAZ | |
14:40-15:00 | BREAK | ||
15:00-15:50 | "The Mobile Top 10"
Mike Zussman |
A Scalable Secure Development Program
Rajiv Sharma | |
15:50-16:30 | End of Conference Panel Discussion:
Topic: The Crystal Ball and the 2-headed Calf - What's on the Horizon and Why Does It Seem So Unnatural? Moderator: Andy Lewis Panelists: Laz, Matt Tesauro, John Pirc, Tanner Coltrin, René Agüero, Steve Kosten, others | ||
16:30-17:30 | Wrap up, vendor raffles! |