This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "SnowFROC Tentative Schedule"

From OWASP
Jump to: navigation, search
m (New page: ==Agenda and Presentations: 5 March 2009== The agenda follows the successful OWASP conference two tracks format, with opening keynotes and presentations in the main auditorium, split trac...)
 
 
(9 intermediate revisions by the same user not shown)
Line 1: Line 1:
 +
#REDIRECT [[Front_Range_OWASP_Conference_2009#Agenda_and_Presentations:_5_March_2009]]
 +
 
==Agenda and Presentations: 5 March 2009==
 
==Agenda and Presentations: 5 March 2009==
  
Line 25: Line 27:
 
''Ed Bellis, CISO: Orbitz''
 
''Ed Bellis, CISO: Orbitz''
 
  | style="width:40%; background:#BCA57A" align="left" | "Poor Man's Guide to Breaking PKI: Why You Don't Need 200 Playstations"
 
  | style="width:40%; background:#BCA57A" align="left" | "Poor Man's Guide to Breaking PKI: Why You Don't Need 200 Playstations"
''Mike Zusman, Intrepidusgroup''
+
''Mike Zusman, Intrepidus Group''
 
  |-
 
  |-
 
  | style="width:10%; background:#7B8ABD" | 11:15-12:00 || style="width:40%; background:#BC857A" align="left" | "Fixing FISMA: the CAG, AppSec and the SANS Top 25"
 
  | style="width:10%; background:#7B8ABD" | 11:15-12:00 || style="width:40%; background:#BC857A" align="left" | "Fixing FISMA: the CAG, AppSec and the SANS Top 25"
Line 39: Line 41:
 
  | style="width:10%; background:#7B8ABD" | 13:00-13:50 || style="width:40%; background:#BC857A" align="left" | "Building an Effective Application Security Program"
 
  | style="width:10%; background:#7B8ABD" | 13:00-13:50 || style="width:40%; background:#BC857A" align="left" | "Building an Effective Application Security Program"
 
''Joey Peloquin, Fishnet Security''
 
''Joey Peloquin, Fishnet Security''
  | style="width:40%; background:#BCA57A" align="left" | "Security in the Clouds"
+
  | style="width:40%; background:#BCA57A" align="left" | "Bad Cocktail: Spear Phishing + Application Hacks"
''Jon Rose, Trustwave''
+
''Rohyt Belani, Intrepidus Group''
 
  |-
 
  |-
 
  | style="width:10%; background:#7B8ABD" | 13:50-14:50 || style="width:40%; background:#BC857A" align="left" | "Vulnerability Management in an Application Security World"
 
  | style="width:10%; background:#7B8ABD" | 13:50-14:50 || style="width:40%; background:#BC857A" align="left" | "Vulnerability Management in an Application Security World"
 
''John Dickson & Dan Cornell, Denim Group''
 
''John Dickson & Dan Cornell, Denim Group''
  | style="width:40%; background:#BCA57A" align="left" | "Automated vs. Manual Security; You can't filter the stupid"
+
  | style="width:40%; background:#BCA57A" align="left" | "SQL injection exploitation internals: How do I exploit this web application injection point?"
''David Byrne, Trustwave''
+
''Bernardo Damele, Portcullis''
 
  |-
 
  |-
 
  | style="width:10%; background:#7B8ABD" | 14:50-15:00 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Break - Expo - CTF - Beatz by [http://www.dj-jackalope.com/ DJ Jackalope]  
 
  | style="width:10%; background:#7B8ABD" | 14:50-15:00 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Break - Expo - CTF - Beatz by [http://www.dj-jackalope.com/ DJ Jackalope]  
Line 51: Line 53:
 
  | style="width:10%; background:#7B8ABD" | 15:00-15:50 || style="width:40%; background:#BC857A" align="left" | "Security Policy Management: Best Practices for Web Services and Application Security"
 
  | style="width:10%; background:#7B8ABD" | 15:00-15:50 || style="width:40%; background:#BC857A" align="left" | "Security Policy Management: Best Practices for Web Services and Application Security"
 
''Ray Neucom, IBM''
 
''Ray Neucom, IBM''
  | style="width:40%; background:#BCA57A" align="left" | TBD
+
  | style="width:40%; background:#BCA57A" align="left" | "Automated vs. Manual Security; You can't filter the stupid"
''Speaker, Organisation''
+
''David Byrne, Trustwave''
 
  |-
 
  |-
  | style="width:10%; background:#7B8ABD" | 15:50-16:30 || colspan="2" style="width:40%; background:#F2F2F2" align="left" | Panel: TBD
+
  | style="width:10%; background:#7B8ABD" | 15:50-16:30 || colspan="2" style="width:40%; background:#F2F2F2" align="left" | Panel: Emerging Threats and Enterprise Countermeasures
Moderator: TBD<br/>
+
Moderator: John Dickson<br/>
Panelists: Alan Paller, Ed Bellis, TBD, TBD
+
Panelists: Alan Paller, Joey Peloquin, Rohyt Belani, Ed Bellis, Jeremiah Grossman
 
  |-
 
  |-
 
  | style="width:10%; background:#7B8ABD" | 16:30-17:30 || colspan="2" style="width:40%; background:#F2F2F2" align="left" | Conference Wrap Up, CTF Awards & Sponsor Raffles - CTF - Beatz by [http://www.dj-jackalope.com/ DJ Jackalope]  
 
  | style="width:10%; background:#7B8ABD" | 16:30-17:30 || colspan="2" style="width:40%; background:#F2F2F2" align="left" | Conference Wrap Up, CTF Awards & Sponsor Raffles - CTF - Beatz by [http://www.dj-jackalope.com/ DJ Jackalope]  

Latest revision as of 21:33, 12 February 2009

Agenda and Presentations: 5 March 2009

The agenda follows the successful OWASP conference two tracks format, with opening keynotes and presentations in the main auditorium, split tracks in the middle of the day, and closing panel discussions back in the main auditorium.

March 5, 2009
07:30-08:30 Registration and Continental Breakfast in the Sponsor Expo Room
08:30-08:35 Welcome to SnowFROC AppSec 2009 Conference

David Campbell, OWASP Denver

08:35-09:45 Keynote: The Top Ten Hacks of 2009

Jeremiah Grossman, CTO: Whitehat Security

09:45-10:15 OWASP State of the Union

Tom Brennan, OWASP Board

10:15-10:30 Break - Expo - CTF - Beatz by DJ Jackalope
Management / Executive Track: Room 1 Deep Technical Track: Room 2
10:30-11:15 "Doing More with Less: Automate or Die"

Ed Bellis, CISO: Orbitz

"Poor Man's Guide to Breaking PKI: Why You Don't Need 200 Playstations"

Mike Zusman, Intrepidus Group

11:15-12:00 "Fixing FISMA: the CAG, AppSec and the SANS Top 25"

Alan Paller, SANS

"Adobe Flex, AMF 3 and BlazeDS: An Assessment" (Tool Release!)

Kevin Stadmeyer, Trustwave

12:00-13:00 Lunch - Expo - CTF - Beatz by DJ Jackalope
Management / Executive Track: Room 1 Deep Technical Track: Room 2
13:00-13:50 "Building an Effective Application Security Program"

Joey Peloquin, Fishnet Security

"Bad Cocktail: Spear Phishing + Application Hacks"

Rohyt Belani, Intrepidus Group

13:50-14:50 "Vulnerability Management in an Application Security World"

John Dickson & Dan Cornell, Denim Group

"SQL injection exploitation internals: How do I exploit this web application injection point?"

Bernardo Damele, Portcullis

14:50-15:00 Break - Expo - CTF - Beatz by DJ Jackalope
15:00-15:50 "Security Policy Management: Best Practices for Web Services and Application Security"

Ray Neucom, IBM

"Automated vs. Manual Security; You can't filter the stupid"

David Byrne, Trustwave

15:50-16:30 Panel: Emerging Threats and Enterprise Countermeasures

Moderator: John Dickson
Panelists: Alan Paller, Joey Peloquin, Rohyt Belani, Ed Bellis, Jeremiah Grossman

16:30-17:30 Conference Wrap Up, CTF Awards & Sponsor Raffles - CTF - Beatz by DJ Jackalope
17:30-21:00 OWASP Social Gathering: Dinner and Drinks @ TBD

Back to SnowFROC Home