This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "OWASP AppSec Europe 2008 - Belgium/Agenda"

From OWASP
Jump to: navigation, search
Line 45: Line 45:
 
  | style="width:10%; background:#7B8ABD" | 08:00-09:00 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Registration and Coffee
 
  | style="width:10%; background:#7B8ABD" | 08:00-09:00 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Registration and Coffee
 
  |-
 
  |-
  | style="width:10%; background:#7B8ABD" | 09:00-09:05 || colspan="2" style="width:80%; background:#F2F2F2" align="left" | Welcome to OWASP AppSec 2008 Conference: Dave Wichers, OWASP Conferences Chair and COO Aspect Security
+
  | style="width:10%; background:#7B8ABD" | 09:00-09:05 || colspan="2" style="width:80%; background:#F2F2F2" align="center" | Welcome to OWASP AppSec 2008 Conference  
 +
''Dave Wichers''
 
  |-
 
  |-
  | style="width:10%; background:#7B8ABD" | 09:05-09:45 || colspan="2" style="width:80%; background:#F2F2F2" align="left" | Keynote: Mark Curphey - Microsoft
+
  | style="width:10%; background:#7B8ABD" | 09:05-09:45 || colspan="2" style="width:80%; background:#F2F2F2" align="center" | Keynote: The Great Information Security Scrap Yard Challenge
 +
''Mark Curphey''
 
  |-
 
  |-
  | style="width:10%; background:#7B8ABD" | 09:45-10:20 || colspan="2" style="width:80%; background:#F2F2F2" align="left" | Owasp State of the Union - Dinis Cruz
+
  | style="width:10%; background:#7B8ABD" | 09:45-10:20 || colspan="2" style="width:80%; background:#F2F2F2" align="center" | Owasp State of the Union
 +
''Dinis Cruz''
 
  |-
 
  |-
 
  | style="width:10%; background:#7B8ABD" | 10:20-10:40 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Break
 
  | style="width:10%; background:#7B8ABD" | 10:20-10:40 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Break
 
  |-
 
  |-
  | style="width:10%; background:#7B8ABD" | 10:40-11:20 || style="width:40%; background:#BC857A" align="left" | tbd
+
  | style="width:10%; background:#7B8ABD" | 10:40-11:20 || style="width:40%; background:#BC857A" align="left" | The OWASP ESAPI project
  | style="width:40%; background:#BCA57A" align="left" | tbd
+
''Dave Wichers''
 +
  | style="width:40%; background:#BCA57A" align="left" | The Web Hacking Incidents Database Project
 +
''Ofer Shezaf''
 
  |-
 
  |-
  | style="width:10%; background:#7B8ABD" | 11:20-12:00 || style="width:40%; background:#BC857A" align="left" | tbd
+
  | style="width:10%; background:#7B8ABD" | 11:20-12:00 || style="width:40%; background:#BC857A" align="left" | WAFs and WAFEC2
  | style="width:40%; background:#BCA57A" align="left" | tbd
+
''Ivan Ristic''
 +
  | style="width:40%; background:#BCA57A" align="left" | HTML5 security
 +
''Thomas Rössler''
 
  |-
 
  |-
  | style="width:10%; background:#7B8ABD" | 12:00-12:30 || style="width:40%; background:#BC857A" align="left" | tbd
+
  | style="width:10%; background:#7B8ABD" | 12:00-12:30 || style="width:40%; background:#BC857A" align="left" | The OWASP Orizon Project internals
  | style="width:40%; background:#BCA57A" align="left" | tbd
+
''Paolo Perego''
 +
  | style="width:40%; background:#BCA57A" align="left" | Remo presentation (Input Validation)
 +
''Christian Folini''
 
  |-
 
  |-
 
  | style="width:10%; background:#7B8ABD" | 12:30-14:00 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Lunch
 
  | style="width:10%; background:#7B8ABD" | 12:30-14:00 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Lunch
 
  |-
 
  |-
  | style="width:10%; background:#7B8ABD" | 14:00-14:40 || style="width:40%; background:#BC857A" align="left" | tbd
+
  | style="width:10%; background:#7B8ABD" | 14:00-14:40 || style="width:40%; background:#BC857A" align="left" | How Data Privacy affects Applications and Databases
  | style="width:40%; background:#BCA57A" align="left" | tbd
+
''Dirk De Maeyer''
 +
  | style="width:40%; background:#BCA57A" align="left" | refereed papers track
 
  |-
 
  |-
  | style="width:10%; background:#7B8ABD" | 14:40-15:20 || style="width:40%; background:#BC857A" align="left" | tbd
+
  | style="width:10%; background:#7B8ABD" | 14:40-15:20 || style="width:40%; background:#BC857A" align="left" | NTLM Relay Attacks
  | style="width:40%; background:#BCA57A" align="left" | tbd
+
''Eric Rachner''
 +
  | style="width:40%; background:#BCA57A" align="left" | refereed papers track
 
  |-
 
  |-
  | style="width:10%; background:#7B8ABD" | 15:20-15:50 || style="width:40%; background:#BC857A" align="left" | tbd
+
  | style="width:10%; background:#7B8ABD" | 15:20-15:50 || style="width:40%; background:#BC857A" align="left" | Security in Agile Development
  | style="width:40%; background:#BCA57A" align="left" | tbd
+
''Dave Wichers''
 +
  | style="width:40%; background:#BCA57A" align="left" | refereed papers track
 
  |-
 
  |-
 
  | style="width:10%; background:#7B8ABD" | 15:50-16:10 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Break
 
  | style="width:10%; background:#7B8ABD" | 15:50-16:10 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Break
 
  |-
 
  |-
  | style="width:10%; background:#7B8ABD" | 16:10-17:00 || style="width:40%; background:#BC857A" align="left" | tbd
+
  | style="width:10%; background:#7B8ABD" | 16:10-17:00 || style="width:40%; background:#BC857A" align="left" | Client-side security
  | style="width:40%; background:#BCA57A" align="left" | tbd
+
''pdp''
 +
  | style="width:40%; background:#BCA57A" align="left" | refereed papers track
 
  |-
 
  |-
 
  | style="width:10%; background:#7B8ABD" | 17:00-18:00 || colspan="2" style="width:40%; background:#F2F2F2" align="left" | Panel: “tbd”
 
  | style="width:10%; background:#7B8ABD" | 17:00-18:00 || colspan="2" style="width:40%; background:#F2F2F2" align="left" | Panel: “tbd”
 
Moderator:tbd
 
Moderator:tbd
 
 
Panelists: tbd
 
Panelists: tbd
 
  |-
 
  |-
Line 94: Line 106:
 
  | style="width:10%; background:#7B8ABD" | 08:00-09:00 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Coffee
 
  | style="width:10%; background:#7B8ABD" | 08:00-09:00 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Coffee
 
  |-
 
  |-
  | style="width:10%; background:#7B8ABD" | 09:00-9:40 || colspan="2" style="width:80%; background:#F2F2F2" align="left" | Keynote: Gary McGraw - Cigital
+
  | style="width:10%; background:#7B8ABD" | 09:00-9:40 || colspan="2" style="width:80%; background:#F2F2F2" align="center" | Keynote: Software Security
 +
''Gary McGraw''
 
  |-
 
  |-
  | style="width:10%; background:#7B8ABD" | 9:40-10:20 || colspan="2" style="width:80%; background:#F2F2F2" align="left" | Tour of OWASP projects - Dinis Cruz and Dave Wichers
+
  | style="width:10%; background:#7B8ABD" | 9:40-10:20 || colspan="2" style="width:80%; background:#F2F2F2" align="center" | Tour of OWASP projects
 +
''Dinis Cruz and Dave Wichers''
 
  |-
 
  |-
 
  | style="width:10%; background:#7B8ABD" | 10:20-10:40 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Break
 
  | style="width:10%; background:#7B8ABD" | 10:20-10:40 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Break
 
  |-
 
  |-
  | style="width:10%; background:#7B8ABD" | 10:40-11:20 || style="width:40%; background:#BC857A" align="left" | tbd
+
  | style="width:10%; background:#7B8ABD" | 10:40-11:20 || style="width:40%; background:#BC857A" align="left" | Graph Analysis for WebApps: From Nodes to Edges
  | style="width:40%; background:#BCA57A" align="left" | tbd
+
''Simon Roses Femerling''
 +
  | style="width:40%; background:#BCA57A" align="left" | The OWASP Education Project
 +
''Martin Knobloch''
 
  |-
 
  |-
  | style="width:10%; background:#7B8ABD" | 11:20-12:00 || style="width:40%; background:#BC857A" align="left" | tbd
+
  | style="width:10%; background:#7B8ABD" | 11:20-12:00 || style="width:40%; background:#BC857A" align="left" | Dynamic Taint Propagation: Finding Vulnerabilities Without Attacking
  | style="width:40%; background:#BCA57A" align="left" | tbd
+
''Brian Chess''
 +
  | style="width:40%; background:#BCA57A" align="left" | Threat Modeling for Application Designers & Architects
 +
''Shay Zalalichin''
 
  |-
 
  |-
  | style="width:10%; background:#7B8ABD" | 12:00-12:30 || style="width:40%; background:#BC857A" align="left" | tbd
+
  | style="width:10%; background:#7B8ABD" | 12:00-12:30 || style="width:40%; background:#BC857A" align="left" | Scanstud: Evaluating static analysis tools
 +
''Martin Johns''
 
  | style="width:40%; background:#BCA57A" align="left" | tbd
 
  | style="width:40%; background:#BCA57A" align="left" | tbd
 
  |-
 
  |-
 
  | style="width:10%; background:#7B8ABD" | 12:30-14:00 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Lunch
 
  | style="width:10%; background:#7B8ABD" | 12:30-14:00 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Lunch
 
  |-
 
  |-
  | style="width:10%; background:#7B8ABD" | 14:00-14:40 || style="width:40%; background:#BC857A" align="left" | tbd
+
  | style="width:10%; background:#7B8ABD" | 14:00-14:40 || style="width:40%; background:#BC857A" align="left" | Best Practices Using Web Application Firewalls
  | style="width:40%; background:#BCA57A" align="left" | refereed papers track
+
''Alexander Meisel''
 +
  | style="width:40%; background:#BCA57A" align="left" | Google-Hacking and Google-Shielding
 +
''Amichai Shulman''
 
  |-
 
  |-
  | style="width:10%; background:#7B8ABD" | 14:40-15:20 || style="width:40%; background:#BC857A" align="left" | tbd
+
  | style="width:10%; background:#7B8ABD" | 14:40-15:20 || style="width:40%; background:#BC857A" align="left" | The OWASP Anti-Samy project
  | style="width:40%; background:#BCA57A" align="left" | refereed papers track
+
''Jason Li''
 +
  | style="width:40%; background:#BCA57A" align="left" | The Law of Conservation of Bugs
 +
''Gunnar Peterson''
 
  |-
 
  |-
  | style="width:10%; background:#7B8ABD" | 15:20-15:50 || style="width:40%; background:#BC857A" align="left" | tbd
+
  | style="width:10%; background:#7B8ABD" | 15:20-15:50 || style="width:40%; background:#BC857A" align="left" | Input validation: the Good, the Bad and the Ugly
  | style="width:40%; background:#BCA57A" align="left" | refereed papers track
+
''Johan Peeters''
 +
  | style="width:40%; background:#BCA57A" align="left" | Security framework is not in the code
 +
''Sam Reghenzi''
 
  |-
 
  |-
 
  | style="width:10%; background:#7B8ABD" | 15:50-16:10 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Break
 
  | style="width:10%; background:#7B8ABD" | 15:50-16:10 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Break
 
  |-
 
  |-
  | style="width:10%; background:#7B8ABD" | 16:10-17:00 || style="width:40%; background:#BC857A" align="left" | tbd
+
  | style="width:10%; background:#7B8ABD" | 16:10-17:00 || style="width:40%; background:#BC857A" align="left" | Exploiting Online Games
  | style="width:40%; background:#BCA57A" align="left" | refereed papers track
+
''Gary McGraw''
 +
  | style="width:40%; background:#BCA57A" align="left" | SHIELDS: metrics, tools and Internet services to improve security in application developments
 +
''Eva Coscia''
 
  |-
 
  |-
 
  | style="width:10%; background:#7B8ABD" | 17:00-18:00 || style="width:40%; background:#F2F2F2" align="left" | Panel: Responsible "tbd"
 
  | style="width:10%; background:#7B8ABD" | 17:00-18:00 || style="width:40%; background:#F2F2F2" align="left" | Panel: Responsible "tbd"
Line 131: Line 158:
 
  | style="width:40%; background:#F2F2F2" align="left" | Panel: "tbd"
 
  | style="width:40%; background:#F2F2F2" align="left" | Panel: "tbd"
 
Moderator: tbd
 
Moderator: tbd
 
 
Panelists: tbd
 
Panelists: tbd
 
  |-
 
  |-

Revision as of 09:19, 30 March 2008

The agenda for the conference is still under development and is subject to change.

OWASP AppSec 2008 Tutorials - May 19-20 2008

The tutorials and the conference itself wil be held in tbd.


T1. Building and Testing Secure Web Applications
This powerful two-day course focuses on the most common web application security problems, including the OWASP Top Ten. The course will introduce and demonstrate hacking techniques, illustrating how easily application vulnerabilities can be exploited so students really understand how to avoid introducing such vulnerabilities into their code. Read more here!
T2. tbd
tbd Read more here!
T3. tbd
tbd Read more here!
T4. Web Services and XML Security (to be confirmed)
Many enterprises are currently developing new Web Services and/or adding and acquiring Web Services functionality into existing applications -- now is the time to build security into the system! Read more here!
T5. Open Source ModSecurity Training
ModSecurity is currently the most widely deployed web application firewall (WAF) product. This two-day class is for those people who want to learn how to build, deploy, and use ModSecurity in the most effective manner. The course will cover the open source ModSecurity Console, which helps manage alerts on suspicious web activity targeting your web servers. The course also provides an in-depth look at the extremely powerful ModSecurity Rules Language. Read more here!

Technology Expo - May 21-22

Product vendors will demonstrate their application security products to conference attendees for the first time in Europe at this OWASP Conference. The focus of this expo will be on the technical details of the technologies they are offering in the market to help organizations deal with their application security issues.


Breach Security Cocktail Party - May 20, evening (location to be announced)

OWASP AppSec 2008 Conference Schedule - May 21-23 (Belgium 2008)

Day 1 - May 21, 2008
Track 1: Track 2:
08:00-09:00 Registration and Coffee
09:00-09:05 Welcome to OWASP AppSec 2008 Conference

Dave Wichers

09:05-09:45 Keynote: The Great Information Security Scrap Yard Challenge

Mark Curphey

09:45-10:20 Owasp State of the Union

Dinis Cruz

10:20-10:40 Break
10:40-11:20 The OWASP ESAPI project

Dave Wichers

The Web Hacking Incidents Database Project

Ofer Shezaf

11:20-12:00 WAFs and WAFEC2

Ivan Ristic

HTML5 security

Thomas Rössler

12:00-12:30 The OWASP Orizon Project internals

Paolo Perego

Remo presentation (Input Validation)

Christian Folini

12:30-14:00 Lunch
14:00-14:40 How Data Privacy affects Applications and Databases

Dirk De Maeyer

refereed papers track
14:40-15:20 NTLM Relay Attacks

Eric Rachner

refereed papers track
15:20-15:50 Security in Agile Development

Dave Wichers

refereed papers track
15:50-16:10 Break
16:10-17:00 Client-side security

pdp

refereed papers track
17:00-18:00 Panel: “tbd”

Moderator:tbd Panelists: tbd

18:00-19:00 OWASP Leader Meeting - Organized by Matteo Meucci
19:00-21:00 OWASP Social Gathering: Dinner and Drinks at tbd
Day 2 - May 22, 2008
Track 1: Track 2:
08:00-09:00 Coffee
09:00-9:40 Keynote: Software Security

Gary McGraw

9:40-10:20 Tour of OWASP projects

Dinis Cruz and Dave Wichers

10:20-10:40 Break
10:40-11:20 Graph Analysis for WebApps: From Nodes to Edges

Simon Roses Femerling

The OWASP Education Project

Martin Knobloch

11:20-12:00 Dynamic Taint Propagation: Finding Vulnerabilities Without Attacking

Brian Chess

Threat Modeling for Application Designers & Architects

Shay Zalalichin

12:00-12:30 Scanstud: Evaluating static analysis tools

Martin Johns

tbd
12:30-14:00 Lunch
14:00-14:40 Best Practices Using Web Application Firewalls

Alexander Meisel

Google-Hacking and Google-Shielding

Amichai Shulman

14:40-15:20 The OWASP Anti-Samy project

Jason Li

The Law of Conservation of Bugs

Gunnar Peterson

15:20-15:50 Input validation: the Good, the Bad and the Ugly

Johan Peeters

Security framework is not in the code

Sam Reghenzi

15:50-16:10 Break
16:10-17:00 Exploiting Online Games

Gary McGraw

SHIELDS: metrics, tools and Internet services to improve security in application developments

Eva Coscia

17:00-18:00 Panel: Responsible "tbd"

Moderator: tbd

Panelists: tbd

Panel: "tbd"

Moderator: tbd Panelists: tbd

18:00-18:10 Conference Wrap Up - Dave Wichers, OWASP Conferences Chair
18:30-20:30 Cocktail Party (tbd?)