This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "OWASP AppSec DC 2012/Schedule/4-4-2012"

From OWASP
Jump to: navigation, search
(fixed date issue.)
Line 63: Line 63:
 
|  align=center width=200 valign=middle height=60 bgcolor=#c0a0a0 align=center |[https://www.owasp.org/index.php/OWASP_AppSec_DC_2012/OWASP_Broken_Web_Applications_OWASP_BWA_10_Release OWASP Broken Web Applications (OWASP BWA) 1.0 Release]<br><br>
 
|  align=center width=200 valign=middle height=60 bgcolor=#c0a0a0 align=center |[https://www.owasp.org/index.php/OWASP_AppSec_DC_2012/OWASP_Broken_Web_Applications_OWASP_BWA_10_Release OWASP Broken Web Applications (OWASP BWA) 1.0 Release]<br><br>
 
Chuck Willis
 
Chuck Willis
|  align=center width=200 valign=middle height=60 bgcolor=#ffdf80 align=center |[https://www.owasp.org/index.php/OWASP_AppSec_DC_2012/2012_Global_Security_Report 2012 Global Security Report]<br><br>
+
|  align=center width=200 valign=middle height=60 bgcolor=#ffdf80 align=center |
Tom Brennan and Nick Percoco
+
[https://www.owasp.org/index.php/OWASP_AppSec_DC_2012/Security_Is_Like_An_Onion_Thats_Why_It_Makes_You_Cry Security Is Like An Onion, That's Why It Makes You Cry]<br><br>
 +
Michele Chubirka
 
|  align=center width=200 valign=middle height=60 bgcolor=#a0c0e0 align=center |[https://www.owasp.org/index.php/OWASP_AppSec_DC_2012/Anatomy_of_a_Logic_Flaw Anatomy of a Logic Flaw]<br><br>
 
|  align=center width=200 valign=middle height=60 bgcolor=#a0c0e0 align=center |[https://www.owasp.org/index.php/OWASP_AppSec_DC_2012/Anatomy_of_a_Logic_Flaw Anatomy of a Logic Flaw]<br><br>
 
Charles Henderson and David Byrne
 
Charles Henderson and David Byrne
Line 87: Line 88:
 
|  align=center width=200 valign=middle height=60 bgcolor=#c0a0a0 align=center |[https://www.owasp.org/index.php/OWASP_AppSec_DC_2012/Unraveling_some_of_the_Mysteries_around_DOMbased_XSS Unraveling some of the Mysteries around DOM-based XSS]<br><br>
 
|  align=center width=200 valign=middle height=60 bgcolor=#c0a0a0 align=center |[https://www.owasp.org/index.php/OWASP_AppSec_DC_2012/Unraveling_some_of_the_Mysteries_around_DOMbased_XSS Unraveling some of the Mysteries around DOM-based XSS]<br><br>
 
Dave Wichers
 
Dave Wichers
|  align=center width=200 valign=middle height=60 bgcolor=#ffdf80 align=center |[https://www.owasp.org/index.php/OWASP_AppSec_DC_2012/Security_Is_Like_An_Onion_Thats_Why_It_Makes_You_Cry Security Is Like An Onion, That's Why It Makes You Cry]<br><br>
+
|  align=center width=200 valign=middle height=60 bgcolor=#ffdf80 align=center |[https://www.owasp.org/index.php/OWASP_AppSec_DC_2012/2012_Global_Security_Report 2012 Global Security Report]<br><br>
Michele Chubirka
+
Tom Brennan and Nick Percoco
 
|  align=center width=200 valign=middle height=60 bgcolor=#a0c0e0 align=center |[https://www.owasp.org/index.php/OWASP_AppSec_DC_2012/Survivable_Software_for_CyberPhysical_Systems Survivable Software for Cyber-Physical Systems]<br><br>
 
|  align=center width=200 valign=middle height=60 bgcolor=#a0c0e0 align=center |[https://www.owasp.org/index.php/OWASP_AppSec_DC_2012/Survivable_Software_for_CyberPhysical_Systems Survivable Software for Cyber-Physical Systems]<br><br>
 
Karen Mercedes Goertzel
 
Karen Mercedes Goertzel

Revision as of 01:18, 2 March 2012

Plenary Day 1 - 4/4/2012
Offense & Tools Case Studies IoMT Interrogate!
7:30 AM - 8:50 AM Registration
8:50 AM - 9:00 AM Welcome and Opening Remarks
9:00 AM - 10:00 AM Keynote: Dan Geer
10:00 AM - 10:45 AM OWASP Board
10:45 AM - 11:00 AM Coffee Break
11:00 AM - 11:50 AM DOMJacking - Attack, Exploit and Defense

Shreeraj Shah

The Unfortunate Reality of Insecure Libraries

Jeff Williams and Arshan Dabirsiaghi

Python Basics for Web App Pentesters - Part 2

Justin Searle

Integrating Application Security into your Lifecycle and Procurement

John Steven

11:50 AM - 12:00 PM Coffee Break
12:00 PM - 12:50 PM Attacking CAPTCHAs for Fun and Profit

Gursev Singh Kalra

Case Study: How New Software Assurance Policy Reduces Risk and Costs

Rob Roy and John Keane

Security is Dead. Long Live Rugged DevOps: IT at Ludicrous Speed

Joshua Corman

12:50 PM - 2:00 PM Lunch
2:00 PM - 2:50 PM Hacking .NET(C#) Applications: The Black Arts

Jon McCoy

Security at scale: Web application security in a continuous deployment environment

Zane Lackey

The "Easy" Button for Your Web Application Security Career

Salvador Grec

Risk Analysis and Measurement with CWRAF

Joe Jarzombek, Bob Martin, Walter Houser and Tom Brennan

2:50 PM - 3:00 PM Coffee Break
3:00 PM - 3:50 PM OWASP Broken Web Applications (OWASP BWA) 1.0 Release

Chuck Willis

Security Is Like An Onion, That's Why It Makes You Cry

Michele Chubirka

Anatomy of a Logic Flaw

Charles Henderson and David Byrne

3:50 PM - 4:00 PM Coffee Break
4:00 PM - 4:50 PM New and Improved Hacking Oracle from Web

Sumit Siddharth

State of Web Security

Robert Rowley

Old Webshells, New Tricks -- How Persistent Threats have revived an old idea, and how you can detect them.

Ryan Kazanciyan

Fed Panel

TBA

4:50 PM - 5:00 PM Coffee Break
5:00 PM - 5:50 PM Unraveling some of the Mysteries around DOM-based XSS

Dave Wichers

2012 Global Security Report

Tom Brennan and Nick Percoco

Survivable Software for Cyber-Physical Systems

Karen Mercedes Goertzel

6:00 PM Networking Oppertunity