This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "SnowFROC Tentative Schedule"

From OWASP
Jump to: navigation, search
m (Agenda and Presentations: 5 March 2009)
m (Agenda and Presentations: 5 March 2009)
Line 24: Line 24:
 
  | style="width:10%; background:#7B8ABD" | 10:30-11:15 || style="width:40%; background:#BC857A" align="left" | "Doing More with Less: Automate or Die"
 
  | style="width:10%; background:#7B8ABD" | 10:30-11:15 || style="width:40%; background:#BC857A" align="left" | "Doing More with Less: Automate or Die"
 
''Ed Bellis, CISO: Orbitz''
 
''Ed Bellis, CISO: Orbitz''
  | style="width:40%; background:#BCA57A" align="left" | "SQL injection exploitation internals: How do I exploit this web application injection point?"
+
  | style="width:40%; background:#BCA57A" align="left" | "Automated vs. Manual Security; You can't filter the stupid"
''Bernardo Damele, Portcullis''
+
''David Byrne, Trustwave''
 
  |-
 
  |-
 
  | style="width:10%; background:#7B8ABD" | 11:15-12:00 || style="width:40%; background:#BC857A" align="left" | "Fixing FISMA: the CAG, AppSec and the SANS Top 25"
 
  | style="width:10%; background:#7B8ABD" | 11:15-12:00 || style="width:40%; background:#BC857A" align="left" | "Fixing FISMA: the CAG, AppSec and the SANS Top 25"
Line 44: Line 44:
 
  | style="width:10%; background:#7B8ABD" | 13:50-14:50 || style="width:40%; background:#BC857A" align="left" | "Vulnerability Management in an Application Security World"
 
  | style="width:10%; background:#7B8ABD" | 13:50-14:50 || style="width:40%; background:#BC857A" align="left" | "Vulnerability Management in an Application Security World"
 
''John Dickson & Dan Cornell, Denim Group''
 
''John Dickson & Dan Cornell, Denim Group''
  | style="width:40%; background:#BCA57A" align="left" | "Automated vs. Manual Security; You can't filter the stupid"
+
  | style="width:40%; background:#BCA57A" align="left" | "SQL injection exploitation internals: How do I exploit this web application injection point?"
''David Byrne, Trustwave''
+
''Bernardo Damele, Portcullis''
 
  |-
 
  |-
 
  | style="width:10%; background:#7B8ABD" | 14:50-15:00 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Break - Expo - CTF - Beatz by [http://www.dj-jackalope.com/ DJ Jackalope]  
 
  | style="width:10%; background:#7B8ABD" | 14:50-15:00 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Break - Expo - CTF - Beatz by [http://www.dj-jackalope.com/ DJ Jackalope]  

Revision as of 04:10, 11 February 2009

Agenda and Presentations: 5 March 2009

The agenda follows the successful OWASP conference two tracks format, with opening keynotes and presentations in the main auditorium, split tracks in the middle of the day, and closing panel discussions back in the main auditorium.

March 5, 2009
07:30-08:30 Registration and Continental Breakfast in the Sponsor Expo Room
08:30-08:35 Welcome to SnowFROC AppSec 2009 Conference

David Campbell, OWASP Denver

08:35-09:45 Keynote: The Top Ten Hacks of 2009

Jeremiah Grossman, CTO: Whitehat Security

09:45-10:15 OWASP State of the Union

Tom Brennan, OWASP Board

10:15-10:30 Break - Expo - CTF - Beatz by DJ Jackalope
Management / Executive Track: Room 1 Deep Technical Track: Room 2
10:30-11:15 "Doing More with Less: Automate or Die"

Ed Bellis, CISO: Orbitz

"Automated vs. Manual Security; You can't filter the stupid"

David Byrne, Trustwave

11:15-12:00 "Fixing FISMA: the CAG, AppSec and the SANS Top 25"

Alan Paller, SANS

"Adobe Flex, AMF 3 and BlazeDS: An Assessment" (Tool Release!)

Kevin Stadmeyer, Trustwave

12:00-13:00 Lunch - Expo - CTF - Beatz by DJ Jackalope
Management / Executive Track: Room 1 Deep Technical Track: Room 2
13:00-13:50 "Building an Effective Application Security Program"

Joey Peloquin, Fishnet Security

"Bad Cocktail: Spear Phishing + Application Hacks"

Rohyt Belani, Intrepidus Group

13:50-14:50 "Vulnerability Management in an Application Security World"

John Dickson & Dan Cornell, Denim Group

"SQL injection exploitation internals: How do I exploit this web application injection point?"

Bernardo Damele, Portcullis

14:50-15:00 Break - Expo - CTF - Beatz by DJ Jackalope
15:00-15:50 "Security Policy Management: Best Practices for Web Services and Application Security"

Ray Neucom, IBM

"Poor Man's Guide to Breaking PKI: Why You Don't Need 200 Playstations"

Mike Zusman, Intrepidus Group

15:50-16:30 Panel: TBD

Moderator: TBD
Panelists: Alan Paller, Ed Bellis, TBD, TBD

16:30-17:30 Conference Wrap Up, CTF Awards & Sponsor Raffles - CTF - Beatz by DJ Jackalope
17:30-21:00 OWASP Social Gathering: Dinner and Drinks @ TBD

Back to SnowFROC Home