This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "OWASP AppSec DC 2012/Schedule/4-4-2012"

From OWASP
Jump to: navigation, search
(changed out John for Jim Manico)
Line 31: Line 31:
 
Justin Searle
 
Justin Searle
 
|  align=center rowspan=3 width=200 valign=middle height=60 bgcolor=#b3ff99 align=center |[https://www.owasp.org/index.php/OWASP_AppSec_DC_2012/Integrating_Application_Security_into_your_Lifecycle_andProcurement Integrating Application Security into your Lifecycle and Procurement]<br><br>
 
|  align=center rowspan=3 width=200 valign=middle height=60 bgcolor=#b3ff99 align=center |[https://www.owasp.org/index.php/OWASP_AppSec_DC_2012/Integrating_Application_Security_into_your_Lifecycle_andProcurement Integrating Application Security into your Lifecycle and Procurement]<br><br>
John Steven
+
Jim Manico
 
|-  
 
|-  
 
|  width=72 valign=middle bgcolor=#7b8abd | 11:50 AM - 12:00 PM
 
|  width=72 valign=middle bgcolor=#7b8abd | 11:50 AM - 12:00 PM

Revision as of 19:08, 26 March 2012

Plenary Day 1 - 4/4/2012
Offense & Tools Case Studies IoMT Interrogate!
7:30 AM - 8:50 AM Registration
8:50 AM - 9:00 AM Welcome and Opening Remarks
9:00 AM - 10:00 AM Keynote: Dan Geer
10:00 AM - 10:45 AM OWASP Board
10:45 AM - 11:00 AM Coffee Break
11:00 AM - 11:50 AM DOMJacking - Attack, Exploit and Defense

Shreeraj Shah

The Unfortunate Reality of Insecure Libraries

Jeff Williams and Arshan Dabirsiaghi

Python Basics for Web App Pentesters - Part 2

Justin Searle

Integrating Application Security into your Lifecycle and Procurement

Jim Manico

11:50 AM - 12:00 PM Coffee Break
12:00 PM - 12:50 PM Attacking CAPTCHAs for Fun and Profit

Gursev Singh Kalra

Case Study: How New Software Assurance Policy Reduces Risk and Costs

Rob Roy

Security is Dead. Long Live Rugged DevOps: IT at Ludicrous Speed

Joshua Corman

12:50 PM - 2:00 PM No-Host Lunch
2:00 PM - 2:50 PM Hacking .NET(C#) Applications: The Black Arts

Jon McCoy

Security at scale: Web application security in a continuous deployment environment

Zane Lackey

The "Easy" Button for Your Web Application Security Career

Salvador Grec

Risk Analysis and Measurement with CWRAF

Joe Jarzombek, Bob Martin, Walter Houser and Tom Brennan

2:50 PM - 3:00 PM Coffee Break
3:00 PM - 3:50 PM OWASP Broken Web Applications (OWASP BWA) 1.0 Release

Chuck Willis

Security Is Like An Onion, That's Why It Makes You Cry

Michele Chubirka

Anatomy of a Logic Flaw

Charles Henderson and David Byrne

3:50 PM - 4:00 PM Coffee Break
4:00 PM - 4:50 PM New and Improved Hacking Oracle from Web

Sumit Siddharth

State of Web Security

Robert Rowley

Old Webshells, New Tricks -- How Persistent Threats have revived an old idea, and how you can detect them.

Ryan Kazanciyan

Fed Panel

TBA

4:50 PM - 5:00 PM Coffee Break
5:00 PM - 5:50 PM Unraveling some of the Mysteries around DOM-based XSS

Dave Wichers

2012 Global Security Report

Tom Brennan and Nick Percoco

Survivable Software for Cyber-Physical Systems

Karen Mercedes Goertzel

6:00 PM Networking Opportunity sponsored by: SPL-LOGO-MED.png