OWASP IRELAND 2010
Welcome to the Irish OWASP Application Security Conference!
Its Ireland's turn again on September 17, 2010
September 17th 2010: OWASP will hold its second Irish Application Security conference in Dublin University, Trinity College, Dublin, Ireland.
The conference consists of an intensive day of talks/presentations and discussion with 2 different tracks focusing on the causes and trends in web application insecurity.
Training: (16th September 2010)
Secure Application Development: Writing secure code (and testing it) training is to be delivered on the 16 September, following the very successful model delivered in 2009 (see more details below)
For more details please contact: Eoin.Keary 'at' owasp.org
- 1 Conference Location
- 2 Event Sponsorship
- 3 Agenda and Presentations - September 17
- 4 Training
- 5 Venue
- 6 Transportation
- 7 Accommodation
- 8 Registration
- 9 Conference Committee
- 10 Call for Papers
OWASP is providing sponsors exclusive access to its audience in Dublin, Ireland through a limited number of Expo floor slots, providing a focused setting for potential customers. The conference is expected to draw 150 - 200 technologists who will be looking for ways to spend their remaining 2010 budget and planning for 2010/11. Financial Services, Media, Pharmaceuticals, Government, Healthcare, Technology, and many other verticals will be represented.
Sponsorship details are available here: Please review or sponsorship proposal: Click_here
CENZIC - Cenzic provides software and SaaS solutions for dynamic, black box testing of Web applications to protect Websites against hacker attacks.Built from the ground up on a completely different technology backbone than its competitors, Cenzic goes beyond signature-based tools to find more "real" vulnerabilities. To request a free demo please visit http://www.cenzic.com
Veracode is the world’s leader in cloud-based application risk management. With patented binary code analysis, dynamic Web assessments, and partner or Veracode-delivered manual penetration testing, combined with developer e-learning and access to open source security ratings, Veracode SecurityReview® allows customers to independently verify application security in both internally developed applications and third-party software without requiring source code or expensive tools. Veracode provides the most simple, complete and accurate way to implement security best practices, reduce operational cost and comply with internal security policies or external standards such as OWASP Top 10, CWE/SANS Top 25 and PCI. Veracode works with global organizations across multiple vertical industries including Barclays PLC, California Public Employees’ Retirement System (CalPERS), Computershare, and the Federal Aviation Administration (FAA). For more information, visit www.veracode.com http://www.veracode.com/
Fortify® Software is the leader in the emerging category of Software Security Assurance (SSA). Fortify's SSA products and services protect companies from the threats posed by security flaws in business-critical software applications and result in applications that are inherently more secure and impervious to attack. Our solutions help identify and resolve critical application vulnerabilities in less time and at lower cost. http://www.fortify.com
IBM Rational® offers Web site security, Web site compliance, and application security solutions for the most comprehensive approach to assessing vulnerabilities in networked applications and critical Web sites. IBM Rational AppScan® and IBM Rational Policy Tester®, Web site security, compliance, and application security solutions, can help you avoid these risks. Our solutions automate application and content analysis. They help you identify vulnerabilities, assess compliance requirements, and improve the accuracy and reliability of online systems.IBM home page: www.ibm.com/ie
Agenda and Presentations - September 17
The agenda follows the successful OWASP conference two tracks format, with opening keynotes and presentations in the main auditorium, split tracks in the middle of the day, and closing pannel discussions back in the main auditorium both days.
|Hamilton Building, TCD - September 17, 2010|
|Track 1: Synge Theatre||Track 2: Salmon Theatre|
|08:00-09:00||Registration and Coffee|
|09:00 - 09:10||Welcome to OWASP Ireland 2010 Conference|
|09:15 - 10:00|| Keynote: "Application Security in the Real World" - Considerations for AppSec in non-security companies.
John Viega Executive Vice President, Perimeter E-Security
Location: Joly Theatre
|10:10 - 10:30||
OWASP "State of the Nation"
OWASP Global board members
|10:30 - 10:50||Break - Expo|
|11:00 - 11:35||
"Testing the Enterprise E-mail Security - from Software to Cloud-based Services"
"Counter Intelligence as Defense: Integrating predictive and proactive attack knowledge as a wall of defense"
|11:40 - 12:15||
"The Evolution of Security Testing: Testing the Resiliency of Security"
David Stubley (GIAC)
|12:20 - 13:00||
"Smart Phones with Dumb Apps"
"Technology and Business Risk Management: How Application Security Fits In!
|13:00 - 13:45||Lunch - TCD Dining Hall, buffet Lunch|
|13:50 - 14:30|| Keynote: "The changing face of cryptography"
Professor Fred Piper, BSc, PhD (London), ARCS, DIC, CEng, CMath, FIEE, FIMA, BCS, CISSP, CISM.
Location: Joly Theatre
|14:35 - 15:10||
"Application Security Scoreboard in the Sky"
"Using the OWASP O2 Platform to consume OWASP projects"
|15:15 - 15:50||
"Microsoft's Security Development Lifecycle for Agile Development"
Nick Coblentz AT&T Consulting
|16:00 - 16:40||
"How to Defend Fragile Web Applications"
Vinay Bansal, Martin Nystrom Cisco systems
|16:50 - 17:50||
Keynote: "Hackers and Hollywood: The Implications of the Popular
Damian Gordon Phd, School of Computing Dublin Institute of Technology.
Location: Joly Theatre
|17:50 - 18:00||Wrap-Up|
|18:00-21:00||OWASP Social Gathering|
We intend to hold some application security training on the 16/09/2010 the day prior to the event.
This can be booked when booking a ticket to the event.
Secure Application Development: Writing secure code (and testing it)
Eoin Keary Senior Manager, Ernst & Young, OWASP Board Member
Rahim Jina Senior Consultant, Ernst & Young, OWASP Ireland chapter board.
Writing Secure code is the most effective method to securing your web applications. Writing secure code takes skill and know-how but results in a more stable and robust application and assists in protecting an organisations brand.
Application security is not commonly a part of many computer science curricula today and most organizations have not focused on instituting a culture that includes application security as a core part of their software development training efforts. This intensive one-day course focuses on the most common web application security problems, including aspects of both the OWASP Top Ten (2010) and the MITRE Top 25. The course will introduce and demonstrate application assessment techniques, illustrating how application vulnerabilities can be exploited so students really understand how to avoid introducing such vulnerabilities in their code.
This course includes coverage of the following areas:
- Unvalidated Input
- Injection Flaws
- Cross-Site Scriping
- Authentication & Session Management
- Access control & Authorisation
- Broken Caching
- Error Handling
- Resource Management
- Rich Internet Applications & Webservices
- The Secure SDLC
To cement the principles discussed, students can participate in a number of hands-on security testing exercises where they attack a live web application (i.e., WebGoat etc) that has been seeded with common web application vulnerabilities. The students will use proxy tools commonly used by the hacker community to complete the exercises. Students need to bring their own windows based laptop to participate in the exercises.
Developers who want to understand the most common web application security flaws, and how to avoid them and code in a secure manner
Basic knowledge of a web programming language like Java or .NET recommended but not required.
Bringing your own windows based laptop is recommended so you can participate in the hands on exercises.
Full day - 8 Hours
Trinity College, Dublin
Map of hamilton Building Location
Fly to Dublin Airport: http://www.dublinairport.com/
A taxi or bus can take you into Dublin city. (€30 - Taxi) (€10 - Bus)
Please see here if you wish to stay within the grounds of Trinity College:
Hotels Surrounding Trinity College:
Conference fees (17th September):
Standard: €150 Euro
OWASP Members: €100 Euro
Training fees (16th September): €495 Euro
Membership of OWASP is not required to attend the event or the training.
Note: To save on processing expenses, all fees paid for the OWASP conference are non-refundable. OWASP can accommodate transfers of registrations from one person to another, if such an adjustment becomes necessary.
Cvent Registration Link: Click-Here
2010 Ireland Planning Committee Chair:
Eoin Keary - eoin.keary 'at' owasp.org
Fabio Cerullo - fcerullo 'at' owasp.org
Rahim Jina - rahim.jina 'at' owasp.org
Call for Papers
The Conference will consist of two tracks covering both technical and risk management topics.
We are seeking presentations on any of the following topics:
- Web Services and Application Security
- Common Application related Threats and Risks
- Business Risks with Application Security
- Vulnerability Research in Application Security
- Web Application Penetration Testing
- OWASP Tools and Projects
- Secure Coding/Development Practices
- Technology specific presentations on security such as AJAX, XML, etc.
- Anything else relating to OWASP and Application Security.
The call for papers/presentations is out. The official closing date for receiving a synopsis of the presentation is June 10th, 2010. Announcements on selected candidates will be provided the first week of July 2010. Complete presentations will need to be submitted by the 2nd of August 2010.
All presenters will receive free invitation to the conference, food and refreshments.
For some speakers, OWASP will cover some of the travel costs associated with coming to the conference.
Please submit your presentation topics and an abstract of up to 500 words to Eoin Keary <mailto: [email protected]>