This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "SnowFROC Tentative Schedule"

From OWASP
Jump to: navigation, search
m (Agenda and Presentations: 5 March 2009)
 
(5 intermediate revisions by the same user not shown)
Line 1: Line 1:
 +
#REDIRECT [[Front_Range_OWASP_Conference_2009#Agenda_and_Presentations:_5_March_2009]]
 +
 
==Agenda and Presentations: 5 March 2009==
 
==Agenda and Presentations: 5 March 2009==
  
Line 24: Line 26:
 
  | style="width:10%; background:#7B8ABD" | 10:30-11:15 || style="width:40%; background:#BC857A" align="left" | "Doing More with Less: Automate or Die"
 
  | style="width:10%; background:#7B8ABD" | 10:30-11:15 || style="width:40%; background:#BC857A" align="left" | "Doing More with Less: Automate or Die"
 
''Ed Bellis, CISO: Orbitz''
 
''Ed Bellis, CISO: Orbitz''
  | style="width:40%; background:#BCA57A" align="left" | "SQL injection exploitation internals: How do I exploit this web application injection point?"
+
  | style="width:40%; background:#BCA57A" align="left" | "Poor Man's Guide to Breaking PKI: Why You Don't Need 200 Playstations"
''Bernardo Damele, Portcullis''
+
''Mike Zusman, Intrepidus Group''
 
  |-
 
  |-
 
  | style="width:10%; background:#7B8ABD" | 11:15-12:00 || style="width:40%; background:#BC857A" align="left" | "Fixing FISMA: the CAG, AppSec and the SANS Top 25"
 
  | style="width:10%; background:#7B8ABD" | 11:15-12:00 || style="width:40%; background:#BC857A" align="left" | "Fixing FISMA: the CAG, AppSec and the SANS Top 25"
Line 44: Line 46:
 
  | style="width:10%; background:#7B8ABD" | 13:50-14:50 || style="width:40%; background:#BC857A" align="left" | "Vulnerability Management in an Application Security World"
 
  | style="width:10%; background:#7B8ABD" | 13:50-14:50 || style="width:40%; background:#BC857A" align="left" | "Vulnerability Management in an Application Security World"
 
''John Dickson & Dan Cornell, Denim Group''
 
''John Dickson & Dan Cornell, Denim Group''
  | style="width:40%; background:#BCA57A" align="left" | "Automated vs. Manual Security; You can't filter the stupid"
+
  | style="width:40%; background:#BCA57A" align="left" | "SQL injection exploitation internals: How do I exploit this web application injection point?"
''David Byrne, Trustwave''
+
''Bernardo Damele, Portcullis''
 
  |-
 
  |-
 
  | style="width:10%; background:#7B8ABD" | 14:50-15:00 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Break - Expo - CTF - Beatz by [http://www.dj-jackalope.com/ DJ Jackalope]  
 
  | style="width:10%; background:#7B8ABD" | 14:50-15:00 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Break - Expo - CTF - Beatz by [http://www.dj-jackalope.com/ DJ Jackalope]  
Line 51: Line 53:
 
  | style="width:10%; background:#7B8ABD" | 15:00-15:50 || style="width:40%; background:#BC857A" align="left" | "Security Policy Management: Best Practices for Web Services and Application Security"
 
  | style="width:10%; background:#7B8ABD" | 15:00-15:50 || style="width:40%; background:#BC857A" align="left" | "Security Policy Management: Best Practices for Web Services and Application Security"
 
''Ray Neucom, IBM''
 
''Ray Neucom, IBM''
  | style="width:40%; background:#BCA57A" align="left" | "Poor Man's Guide to Breaking PKI: Why You Don't Need 200 Playstations"
+
  | style="width:40%; background:#BCA57A" align="left" | "Automated vs. Manual Security; You can't filter the stupid"
''Mike Zusman, Intrepidus Group''
+
''David Byrne, Trustwave''
 
  |-
 
  |-
  | style="width:10%; background:#7B8ABD" | 15:50-16:30 || colspan="2" style="width:40%; background:#F2F2F2" align="left" | Panel: TBD
+
  | style="width:10%; background:#7B8ABD" | 15:50-16:30 || colspan="2" style="width:40%; background:#F2F2F2" align="left" | Panel: Emerging Threats and Enterprise Countermeasures
Moderator: TBD<br/>
+
Moderator: John Dickson<br/>
Panelists: Alan Paller, Ed Bellis, TBD, TBD
+
Panelists: Alan Paller, Joey Peloquin, Rohyt Belani, Ed Bellis, Jeremiah Grossman
 
  |-
 
  |-
 
  | style="width:10%; background:#7B8ABD" | 16:30-17:30 || colspan="2" style="width:40%; background:#F2F2F2" align="left" | Conference Wrap Up, CTF Awards & Sponsor Raffles - CTF - Beatz by [http://www.dj-jackalope.com/ DJ Jackalope]  
 
  | style="width:10%; background:#7B8ABD" | 16:30-17:30 || colspan="2" style="width:40%; background:#F2F2F2" align="left" | Conference Wrap Up, CTF Awards & Sponsor Raffles - CTF - Beatz by [http://www.dj-jackalope.com/ DJ Jackalope]  

Latest revision as of 21:33, 12 February 2009

Agenda and Presentations: 5 March 2009

The agenda follows the successful OWASP conference two tracks format, with opening keynotes and presentations in the main auditorium, split tracks in the middle of the day, and closing panel discussions back in the main auditorium.

March 5, 2009
07:30-08:30 Registration and Continental Breakfast in the Sponsor Expo Room
08:30-08:35 Welcome to SnowFROC AppSec 2009 Conference

David Campbell, OWASP Denver

08:35-09:45 Keynote: The Top Ten Hacks of 2009

Jeremiah Grossman, CTO: Whitehat Security

09:45-10:15 OWASP State of the Union

Tom Brennan, OWASP Board

10:15-10:30 Break - Expo - CTF - Beatz by DJ Jackalope
Management / Executive Track: Room 1 Deep Technical Track: Room 2
10:30-11:15 "Doing More with Less: Automate or Die"

Ed Bellis, CISO: Orbitz

"Poor Man's Guide to Breaking PKI: Why You Don't Need 200 Playstations"

Mike Zusman, Intrepidus Group

11:15-12:00 "Fixing FISMA: the CAG, AppSec and the SANS Top 25"

Alan Paller, SANS

"Adobe Flex, AMF 3 and BlazeDS: An Assessment" (Tool Release!)

Kevin Stadmeyer, Trustwave

12:00-13:00 Lunch - Expo - CTF - Beatz by DJ Jackalope
Management / Executive Track: Room 1 Deep Technical Track: Room 2
13:00-13:50 "Building an Effective Application Security Program"

Joey Peloquin, Fishnet Security

"Bad Cocktail: Spear Phishing + Application Hacks"

Rohyt Belani, Intrepidus Group

13:50-14:50 "Vulnerability Management in an Application Security World"

John Dickson & Dan Cornell, Denim Group

"SQL injection exploitation internals: How do I exploit this web application injection point?"

Bernardo Damele, Portcullis

14:50-15:00 Break - Expo - CTF - Beatz by DJ Jackalope
15:00-15:50 "Security Policy Management: Best Practices for Web Services and Application Security"

Ray Neucom, IBM

"Automated vs. Manual Security; You can't filter the stupid"

David Byrne, Trustwave

15:50-16:30 Panel: Emerging Threats and Enterprise Countermeasures

Moderator: John Dickson
Panelists: Alan Paller, Joey Peloquin, Rohyt Belani, Ed Bellis, Jeremiah Grossman

16:30-17:30 Conference Wrap Up, CTF Awards & Sponsor Raffles - CTF - Beatz by DJ Jackalope
17:30-21:00 OWASP Social Gathering: Dinner and Drinks @ TBD

Back to SnowFROC Home