This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "OWASP AppSec DC 2012/Schedule/4-5-2012"

From OWASP
Jump to: navigation, search
(updated schedule w/ room numbers)
Line 50: Line 50:
 
Jeff Williams
 
Jeff Williams
 
|-  
 
|-  
|  width=72 valign=middle bgcolor=#7b8abd | 11:50 AM - 1:00 PM
+
|  width=72 valign=middle bgcolor=#7b8abd | 11:50 AM - 1:30 PM
 
|  valign=middle height=30 bgcolor=#e0e0e0 align=center colspan=4 | No-Host Lunch
 
|  valign=middle height=30 bgcolor=#e0e0e0 align=center colspan=4 | No-Host Lunch
 
|-  
 
|-  
|  width=72 valign=middle bgcolor=#7b8abd | 1:00 PM - 1:50 PM
+
|  width=72 valign=middle bgcolor=#7b8abd | 1:30 PM - 2:20 PM
 
|  align=center width=200 valign=middle height=60 bgcolor=#c0a0a0 align=center | [https://www.owasp.org/index.php/OWASP_AppSec_DC_2012/Project_Basecamp_News_from_Camp_4 Project Basecamp: News from Camp 4]<br><br>
 
|  align=center width=200 valign=middle height=60 bgcolor=#c0a0a0 align=center | [https://www.owasp.org/index.php/OWASP_AppSec_DC_2012/Project_Basecamp_News_from_Camp_4 Project Basecamp: News from Camp 4]<br><br>
 
Reid Wightman
 
Reid Wightman
Line 63: Line 63:
 
Michele Guel
 
Michele Guel
 
|-  
 
|-  
|  width=72 valign=middle bgcolor=#7b8abd | 1:50 PM - 2:00 PM
+
|  width=72 valign=middle bgcolor=#7b8abd | 2:20 PM - 2:30 PM
 
|  valign=middle height=30 bgcolor=#e0e0e0 align=center colspan=4 | Coffee Break
 
|  valign=middle height=30 bgcolor=#e0e0e0 align=center colspan=4 | Coffee Break
 
|-  
 
|-  
|  width=72 valign=middle bgcolor=#7b8abd | 2:00 PM - 2:50 PM
+
|  width=72 valign=middle bgcolor=#7b8abd | 2:30 PM - 3:20 PM
 
|  align=center width=200 valign=middle height=60 bgcolor=#c0a0a0 align=center | [https://www.owasp.org/index.php/OWASP_AppSec_DC_2012/Real_world_backdoors_on_industrial_devices Real world backdoors on industrial devices]<br><br>
 
|  align=center width=200 valign=middle height=60 bgcolor=#c0a0a0 align=center | [https://www.owasp.org/index.php/OWASP_AppSec_DC_2012/Real_world_backdoors_on_industrial_devices Real world backdoors on industrial devices]<br><br>
 
Ruben Santamarta
 
Ruben Santamarta
Line 76: Line 76:
 
Joe Hemler
 
Joe Hemler
 
|-  
 
|-  
|  width=72 valign=middle bgcolor=#7b8abd | 2:50 PM - 3:00 PM
+
|  width=72 valign=middle bgcolor=#7b8abd | 3:20 PM - 3:30 PM
 
|  valign=middle height=30 bgcolor=#e0e0e0 align=center colspan=4 | Coffee Break
 
|  valign=middle height=30 bgcolor=#e0e0e0 align=center colspan=4 | Coffee Break
 
|-  
 
|-  
|  width=72 valign=middle bgcolor=#7b8abd | 3:00 PM - 3:50 PM
+
|  width=72 valign=middle bgcolor=#7b8abd | 3:30 PM - 4:20 PM
 
|  align=center width=200 valign=middle height=60 bgcolor=#c0a0a0 align=center | [https://www.owasp.org/index.php/OWASP_AppSec_DC_2012/Denial_of_Surface Denial of Surface.]<br><br>
 
|  align=center width=200 valign=middle height=60 bgcolor=#c0a0a0 align=center | [https://www.owasp.org/index.php/OWASP_AppSec_DC_2012/Denial_of_Surface Denial of Surface.]<br><br>
 
Eireann Leverett
 
Eireann Leverett
Line 88: Line 88:
 
Michele Moss and Don Davidson
 
Michele Moss and Don Davidson
 
|-  
 
|-  
|  width=72 valign=middle bgcolor=#7b8abd | 3:50 PM - 4:00 PM
+
|  width=72 valign=middle bgcolor=#7b8abd | 4:20 PM - 4:30 PM
 
|  valign=middle height=30 bgcolor=#e0e0e0 align=center colspan=4 | Coffee Break
 
|  valign=middle height=30 bgcolor=#e0e0e0 align=center colspan=4 | Coffee Break
 
|-  
 
|-  
|  width=72 valign=middle bgcolor=#7b8abd | 4:00 PM - 4:50 PM
+
|  width=72 valign=middle bgcolor=#7b8abd | 4:30 PM - 5:20 PM
 
|  align=center width=200 valign=middle height=60 bgcolor=#c0a0a0 align=center | [https://www.owasp.org/index.php/OWASP_AppSec_DC_2012/Securing_Critical_Infrastructure Securing Critical Infrastructure]<br><br>
 
|  align=center width=200 valign=middle height=60 bgcolor=#c0a0a0 align=center | [https://www.owasp.org/index.php/OWASP_AppSec_DC_2012/Securing_Critical_Infrastructure Securing Critical Infrastructure]<br><br>
 
Francis Cianfrocca
 
Francis Cianfrocca
Line 101: Line 101:
 
Mikhail Utin and Daniil Utin
 
Mikhail Utin and Daniil Utin
 
|-  
 
|-  
|  width=72 valign=middle bgcolor=#7b8abd | 5:00 PM
+
|  width=72 valign=middle bgcolor=#7b8abd | 5:20 PM
 
|  valign=middle height=30 bgcolor=#e0e0e0 align=center colspan=4 | Closing Remarks<br>Room 202A
 
|  valign=middle height=30 bgcolor=#e0e0e0 align=center colspan=4 | Closing Remarks<br>Room 202A
 
|}
 
|}

Revision as of 17:32, 28 March 2012

Plenary Day 2 - 4/5/2012
Critical Infrastructure
Room 201
Defend!
Room 202A
On the Go
Room 202B
SDLC
Room 206
7:30 AM - 9:00 AM Registration
9:00 AM - 9:50 AM Pentesting Smart Grid Web Apps

Justin Searle

Friends don't let friends store passwords in source code

Neil Matatall

Smart Bombs: Mobile Vulnerability and Exploitation

Kevin Johnson, John Sawyer and Tom Eston

Overcoming the Quality vs. Quantity Problem in Software Security Testing

Rafal Los

Web Application Defense with Bayesian Attack Analysis

Ryan Barnett

9:50 AM - 10:00 AM Coffee Break
10:00 AM - 10:50 AM Vulnerabilities in Industrial Control Systems

ICS-CERT

Access Control

Jim Manico

Software Security Goes Mobile

Jacob West

Baking In Security, Sweet, Secure, Cupcakes

Ken Johnson and Matt Ahrens

10:50 AM - 11:00 AM Coffee Break
11:00 AM - 11:50 AM AMI Security

John Sawyer and Don Weber

SharePoint Security 101

Rob Rachwald

Behind Enemy Lines - Practical& Triage Approaches to Mobile Security Abroad - 2012 Edition

Justin Morehouse

Understanding IAST - More Context, Better Analysis

Jeff Williams

11:50 AM - 1:30 PM No-Host Lunch
1:30 PM - 2:20 PM Project Basecamp: News from Camp 4

Reid Wightman

Enterprise Security API (ESAPI) for C Plus Plus

Dan Amodio

Whack-a-Mobile II: Mobile App Pen Testing with the MobiSec Live Environment

Kevin Johnson and Tony Delagrange

Baking Security In - How to Get Every IT Architect to Become a Security Ambassador

Michele Guel

2:20 PM - 2:30 PM Coffee Break
2:30 PM - 3:20 PM Real world backdoors on industrial devices

Ruben Santamarta

Dynamic DAST/WAF Integration

Ryan Barnett

An In-Depth Introduction to the Android Permissions Model, and How to Secure Multi-Component Applications

Jeff Six

Teaching an Old Dog New Tricks: Securing Development with PMD

Joe Hemler

3:20 PM - 3:30 PM Coffee Break
3:30 PM - 4:20 PM Denial of Surface.

Eireann Leverett

Cloud-based dWAF: A Real World Deployment Case Study

Alexander Meisel

Android in the Healthcare Workplace A Case Study

Thomas Richards
What can an Acquirer do to prevent developers from make dangerous software errors?

Michele Moss and Don Davidson

4:20 PM - 4:30 PM Coffee Break
4:30 PM - 5:20 PM Securing Critical Infrastructure

Francis Cianfrocca

Using PHPIDS to Understand Attacks Trends

Salvador Grec

Mobile Application Security - Who, how and why

Mike Park and Charles Henderson

Private information Protection in Cloud Computing _ Laws, Compliance and Cloud Security Misconceptions

Mikhail Utin and Daniil Utin

5:20 PM Closing Remarks
Room 202A