This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "LatamTour2013 BOG Agenda"

From OWASP
Jump to: navigation, search
Line 5: Line 5:
 
| align="center" height="30" style="background:#CCCCEE;" colspan="2"      | '''CURSO'''  
 
| align="center" height="30" style="background:#CCCCEE;" colspan="2"      | '''CURSO'''  
 
|-
 
|-
| align="center" style="background:#EEEEEE;" colspan="2"                  | '''OWASP Latam Tour Argentina 2012'''  
+
| align="center" style="background:#EEEEEE;" colspan="2"                  | '''OWASP Latam Tour Bogota 2013'''  
 
|-
 
|-
 
| valign="center" bgcolor="#CCCCEE" align="center" colspan="2"            | '''Descripcion y Objetivo'''
 
| valign="center" bgcolor="#CCCCEE" align="center" colspan="2"            | '''Descripcion y Objetivo'''
Line 18: Line 18:
 
| style="width:80%" valign="middle"  bgcolor="#CCCCEE" align="center" colspan="0" | '''Lugar'''
 
| style="width:80%" valign="middle"  bgcolor="#CCCCEE" align="center" colspan="0" | '''Lugar'''
 
|-
 
|-
| valign="middle" bgcolor="#EEEEEE" align="center" | 14 de Mayo de 2012
+
| valign="middle" bgcolor="#EEEEEE" align="center" | A definir
| valign="middle" bgcolor="#EEEEEE" align="left" | Aula Magna - [http://www.udemm.edu.ar Universidad de la Marina Mercante (UdeMM)] ubicado en Av. Rivadavia 2258, Ciudad Autónoma de Buenos Aires, Capital Federal, Argentina.
+
| valign="middle" bgcolor="#EEEEEE" align="left" | A definir
 
|-
 
|-
 
| align="center" style="background:#CCCCEE;" colspan="2" | '''Precio y Registracion'''
 
| align="center" style="background:#CCCCEE;" colspan="2" | '''Precio y Registracion'''
 
|-
 
|-
| align="center" style="background:#CCCCEE;" colspan="2" | GRATIS - [https://www.regonline.com/latamtourarg2012 Registrate AQUI]
+
| align="center" style="background:#CCCCEE;" colspan="2" | GRATIS - [https://www.regonline.com/latamtourarg2013 Registrate AQUI]
 
   
 
   
 
|}  
 
|}  
Line 37: Line 37:
 
|-
 
|-
 
| style="width:10%" valign="middle" height="30" bgcolor="#CCEEEE" align="center" colspan="0" | 09:00 - 09:15
 
| style="width:10%" valign="middle" height="30" bgcolor="#CCEEEE" align="center" colspan="0" | 09:00 - 09:15
| style="width:27%" valign="middle" height="30" bgcolor="#CCEEEE" align="center" colspan="0" | Inició y presentación del evento
+
| style="width:27%" valign="middle" height="30" bgcolor="#CCEEEE" align="center" colspan="0" |  
| style="width:23%" valign="middle" height="30" bgcolor="#CCEEEE" align="center" colspan="0" | Martín Tartarelli, Pablo Romanos
+
| style="width:23%" valign="middle" height="30" bgcolor="#CCEEEE" align="center" colspan="0" |  
 
| style="width:40%" valign="middle" height="30" bgcolor="#CCEEEE" align="center" colspan="0" |  
 
| style="width:40%" valign="middle" height="30" bgcolor="#CCEEEE" align="center" colspan="0" |  
 
|-
 
|-
 
| style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 09:15 - 10:00
 
| style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 09:15 - 10:00
| style="width:27%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Post Explotation: PHP Backdoor Introduction
+
| style="width:27%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" |  
| style="width:23%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Claudio Caracciolo
+
| style="width:23%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" |  
| style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | [[File:CCaracciolo_PHPBackdoor.pdf]]
+
| style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" |  
 
|-
 
|-
 
| style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 10:00 - 10:45
 
| style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 10:00 - 10:45
| style="width:27%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Consecuencias de un Administrador "perezoso"
+
| style="width:27%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" |  
| style="width:23%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Cristian Borghello
+
| style="width:23%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" |  
| style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | [[File:CBorghello_ConsecuenciasdeunAdmin.pdf]]
+
| style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" |  
 
|-
 
|-
 
| style="width:10%" valign="middle" height="30" bgcolor="#CCCCEE" align="center" colspan="0" | 10:45 - 11:15
 
| style="width:10%" valign="middle" height="30" bgcolor="#CCCCEE" align="center" colspan="0" | 10:45 - 11:15
| style="width:27%" valign="middle" height="30" bgcolor="#CCCCEE" align="center" colspan="0" | Break
+
| style="width:27%" valign="middle" height="30" bgcolor="#CCCCEE" align="center" colspan="0" |
 
| style="width:23%" valign="middle" height="30" bgcolor="#CCCCEE" align="center" colspan="0" |  
 
| style="width:23%" valign="middle" height="30" bgcolor="#CCCCEE" align="center" colspan="0" |  
 
| style="width:40%" valign="middle" height="30" bgcolor="#CCCCEE" align="center" colspan="0" |  
 
| style="width:40%" valign="middle" height="30" bgcolor="#CCCCEE" align="center" colspan="0" |  
 
|-
 
|-
 
| style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 11:15 - 11:45
 
| style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 11:15 - 11:45
| style="width:27%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Datos Personales en el Ciclo de Vida de Desarrollo Seguro
+
| style="width:27%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" |  
| style="width:23%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Pablo Romanos
+
| style="width:23%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" |  
| style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | [[File:PRomanos_DatosPersonales.pdf]]
+
| style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" |  
 
|-
 
|-
 
|-
 
|-
 
| style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 11:45 - 12:15
 
| style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 11:45 - 12:15
| style="width:27%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | HTExploit - Bypassing htaccess and beyond
+
| style="width:27%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" |  
| style="width:23%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Maximiliano Soler, Matias Katz
+
| style="width:23%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" |  
| style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | [[File:MSoler_MKatz_HTExploit.pdf]]
+
| style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" |  
 
|-
 
|-
 
|-
 
|-
 
| style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 12:15 - 12:45
 
| style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 12:15 - 12:45
| style="width:27%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Intro a HTML5
+
| style="width:27%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" |  
| style="width:23%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Andres Riancho
+
| style="width:23%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" |  
| style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | [[File:OWASP_Latam_2012_-_HTML5_-_Andres_Riancho.pdf]]
+
| style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" |  
 
|-
 
|-
 
|-
 
|-
 
| style="width:10%" valign="middle" height="30" bgcolor="#CCCCEE" align="center" colspan="0" | 12:45 - 14:00
 
| style="width:10%" valign="middle" height="30" bgcolor="#CCCCEE" align="center" colspan="0" | 12:45 - 14:00
| style="width:27%" valign="middle" height="30" bgcolor="#CCCCEE" align="center" colspan="0" | Almuerzo
+
| style="width:27%" valign="middle" height="30" bgcolor="#CCCCEE" align="center" colspan="0" |
 
| style="width:23%" valign="middle" height="30" bgcolor="#CCCCEE" align="center" colspan="0" |  
 
| style="width:23%" valign="middle" height="30" bgcolor="#CCCCEE" align="center" colspan="0" |  
 
| style="width:40%" valign="middle" height="30" bgcolor="#CCCCEE" align="center" colspan="0" |  
 
| style="width:40%" valign="middle" height="30" bgcolor="#CCCCEE" align="center" colspan="0" |  
Line 81: Line 81:
 
|-
 
|-
 
| style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 14:00 - 14:45
 
| style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 14:00 - 14:45
| style="width:27%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Tu sitio web: un arma para el cibercrimen
+
| style="width:27%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" |  
| style="width:23%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Sebastian Bortnik
+
| style="width:23%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" |  
| style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | TBD
+
| style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" |
 
|-
 
|-
 
|-
 
|-
 
|-
 
|-
 
| style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 14:45 - 15:30
 
| style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 14:45 - 15:30
| style="width:27%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Modelado de Amenazas: Una Introducción
+
| style="width:27%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" |  
| style="width:23%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Hernan Racciatti
+
| style="width:23%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" |  
| style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | [[File:HRacciatti_ModeladodeAmenazas.pdf]]
+
| style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" |  
 
|-
 
|-
 
|-
 
|-
 
| style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 15:30 - 16:15
 
| style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 15:30 - 16:15
| style="width:27%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Desarrollo seguro con herramientas y procesos OWASP
+
| style="width:27%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" |  
| style="width:23%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Fabio Cerullo
+
| style="width:23%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" |  
| style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | TBD
+
| style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" |
 
|-
 
|-
 
|-
 
|-
 
| style="width:10%" valign="middle" height="30" bgcolor="#CCCCEE" align="center" colspan="0" | 16:15 - 16:45
 
| style="width:10%" valign="middle" height="30" bgcolor="#CCCCEE" align="center" colspan="0" | 16:15 - 16:45
| style="width:27%" valign="middle" height="30" bgcolor="#CCCCEE" align="center" colspan="0" | Break
+
| style="width:27%" valign="middle" height="30" bgcolor="#CCCCEE" align="center" colspan="0" |
 
| style="width:23%" valign="middle" height="30" bgcolor="#CCCCEE" align="center" colspan="0" |  
 
| style="width:23%" valign="middle" height="30" bgcolor="#CCCCEE" align="center" colspan="0" |  
 
| style="width:40%" valign="middle" height="30" bgcolor="#CCCCEE" align="center" colspan="0" |  
 
| style="width:40%" valign="middle" height="30" bgcolor="#CCCCEE" align="center" colspan="0" |  
Line 106: Line 106:
 
|-
 
|-
 
| style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 16:45 - 17:45
 
| style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 16:45 - 17:45
| style="width:27%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Panel de Hacktivismo
+
| style="width:27%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" |  
| style="width:23%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Hernan Racciatti, Ricardo Saenz, Daniel Monastersky, Mariano del Rio
+
| style="width:23%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" |  
| style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | TBD
+
| style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" |
 
|-
 
|-
 
|-
 
|-
 
| style="width:10%" valign="middle" height="30" bgcolor="#CCEEEE" align="center" colspan="0" | 17:45 - 18:00
 
| style="width:10%" valign="middle" height="30" bgcolor="#CCEEEE" align="center" colspan="0" | 17:45 - 18:00
| style="width:27%" valign="middle" height="30" bgcolor="#CCEEEE" align="center" colspan="0" | Entrega de premios y cierre del evento
+
| style="width:27%" valign="middle" height="30" bgcolor="#CCEEEE" align="center" colspan="0" |  
| style="width:23%" valign="middle" height="30" bgcolor="#CCEEEE" align="center" colspan="0" | Martín Tartarelli
+
| style="width:23%" valign="middle" height="30" bgcolor="#CCEEEE" align="center" colspan="0" |  
 
| style="width:40%" valign="middle" height="30" bgcolor="#CCEEEE" align="center" colspan="0" |  
 
| style="width:40%" valign="middle" height="30" bgcolor="#CCEEEE" align="center" colspan="0" |  
 
|-
 
|-
 
|}
 
|}

Revision as of 19:48, 30 January 2013

Logo latam131.png
CURSO
OWASP Latam Tour Bogota 2013
Descripcion y Objetivo
  • Aparte del OWASP Top 10, la mayoría de los Proyectos OWASP no son ampliamente utilizados en los ambientes corporativos. En la mayoría de los casos esto no es debido a una falta de calidad en los proyectos o la documentación disponible, sino mas bien por desconocer donde se ubicaran en un Ecosistema de Seguridad de Aplicaciones empresarial.
  • Este curso tiene como objetivo cambiar esta situación proporcionando una explicación sobre los proyectos OWASP mas maduros y listos para ser utilizados en el ambito empresarial.
Fecha Lugar
A definir A definir
Precio y Registracion
GRATIS - Registrate AQUI


DETALLES DE LA JORNADA
Horario Modulo Ponente Detalles
09:00 - 09:15
09:15 - 10:00
10:00 - 10:45
10:45 - 11:15
11:15 - 11:45
11:45 - 12:15
12:15 - 12:45
12:45 - 14:00
14:00 - 14:45
14:45 - 15:30
15:30 - 16:15
16:15 - 16:45
16:45 - 17:45
17:45 - 18:00