This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Template:OWASP IL 2011 Agenda"

From OWASP
Jump to: navigation, search
(Created page with "{| class="wikitable" <hiddentext>generated with de:Wikipedia:Helferlein/VBA-Macro for EXCEL tableconversion V1.7<\hiddentext> |- style="font-size:11pt" |style="color:#1F497D...")
 
 
(44 intermediate revisions by 3 users not shown)
Line 1: Line 1:
{| class="wikitable" <hiddentext>generated with [[:de:Wikipedia:Helferlein/VBA-Macro for EXCEL tableconversion]] V1.7<\hiddentext>
+
{| style="border-collapse: collapse; border-width: 1px; border-style: solid; border-color: #000" cellpadding=2
|- style="font-size:11pt"
+
|- style="border-style: solid; border-width: 1px;font-size:10pt"  
|style="color:#1F497D" width="80" height="30" align="right" valign="center" | 08:00-09:15
+
|style="border-style: solid; border-width: 1px;color:#1F497D;white-space:nowrap" width="90" height="40" align="center" valign="center" | 08:30-09:00
| valign="center" colspan=2 style="font-size:12pt" | &nbsp; '''Registration, Gathering and Socializing'''
+
| align=center valign="center" colspan=2 style="border-style: solid; border-width: 1px;font-size:12pt" | '''Registration, Gathering and Socializing'''
 +
|- style="font-size:10pt"
 +
|style="border-style: solid; border-width: 1px;color:#1F497D" align="center" valign="center" | 09:00-09:30
 +
| align=center valign="center" colspan="2" style="border-style: solid; border-width: 1px;font-size:11pt" | '''Opening Words''' ''([[Media:OWASPIL2011-OferMaor-OpeningWords.ppt|Presentation]])''<br>
 +
''Ofer Maor - Chairman, OWASP Israel; Global Membership Committee, OWASP''
 +
|- style="border-style: solid; border-width: 1px;font-size:10pt"
 +
|style="border-style: solid; border-width: 1px;color:#1F497D" height="25" align="center" valign="center" | 09:30-10:10
 +
|  align=center valign="center" colspan="2" style="border-style: solid; border-width: 1px;font-size:11pt"| '''Keynote'''
 +
'''[[OWASP_Israel_2011_Presentations#Composite_Applications_Over_Hybrid_Clouds_.E2.80.93_Enterprise_Security_Challenges_of_the_IT_Supply_Chain|Composite Applications Over Hybrid Clouds – Enterprise Security Challenges of the IT Supply Chain]]'''
 +
<br>''Dr. Ethan Hadar, Senior Vice President Corporate Technical Strategy, CA''
 +
|- style="border-style: solid; border-width: 1px;font-size:12pt"
 +
|style="border-style: solid; border-width: 1px;color:#1F497D" height="30" align="right" valign="center" | &nbsp;
 +
|  style="border-style: solid; border-width: 1px;" valign="center" align="center" width=500 | <u>'''Track #1'''</u>
 +
|  style="border-style: solid; border-width: 1px;" valign="center" align="center" width=500 | <u>'''Track #2'''</u>
  
|- style="font-size:11pt"
+
|- style="border-style: solid; border-width: 1px;font-size:10pt"
|style="color:#1F497D" height="25" align="right" valign="center" | 14:15-14:30
+
|style="border-style: solid; border-width: 1px;color:#1F497D" height="25" align="center" valign="center" | 10:15-11:00
|  valign="center" colspan="2" | &nbsp;'''Opening Words''' &nbsp;&nbsp; ''Ofer Maor, Hacktics - OWASP Israel Chairman'' &nbsp;&nbsp; ([[Media:OWASPIL2010-OpeningWords-OferMaor.ppt‎|Download Presentation]])
+
align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" | '''[[OWASP_Israel_2011_Presentations#Finding_Security_in_Misery_of_Others|Finding Security in Misery of Others]]''' ''([[Media:OWASPIL2011-AmichaiShulman-FindingSecurityInMiseryOfOthers.pptx|Presentation]])''<br>
 
+
''Amichai Shulman, CTO, Imperva''
|- style="font-size:11pt"
+
|  align="center" valign="top" style="font-size:11pt"  | '''[[OWASP_Israel_2011_Presentations#Temporal_Session_Race_Conditions|Temporal Session Race Conditions]]''' ''([[Media:OWASPIL2011-ShayChen-TSRC.pptx‎|Presentation]])''
|style="color:#1F497D" height="25" align="right" valign="center" | 14:30-15:10
+
''Shay Chen, CTO, Hacktics Advanced Security Center, Ernst & Young''
|  valign="center" colspan="2" | &nbsp;Hacker Intelligence: 6 Months of Attack Vector Research &nbsp;&nbsp; ''Tal Be'ery, Imperva'' &nbsp;&nbsp; ([[Media:OWASPIL2010-HackerIntelligence-TalBeery.pptx|Download Presentation]])
+
|- style="border-style: solid; border-width: 1px;font-size:10pt"
 
+
|style="border-style: solid; border-width: 1px;color:#1F497D" height="40" align="center" valign="center" | 11:00-11:15
|- style="font-size:11pt"
+
|  valign="center" align="center" style="border-style: solid; border-width: 1px;font-size:12pt" colspan="2" | '''Coffee Break'''
|style="color:#1F497D" height="25" align="right" valign="center" | 15:10-15:50
+
|- style="border-style: solid; border-width: 1px;font-size:10pt"
valign="center" colspan="2" | &nbsp;CSA Israel & The Challenges of Cloud Security &nbsp;&nbsp; ''Guy Alfassi'' &nbsp;&nbsp; ([[Media:OWASPIL2010-CSAIsraelCloudSec-GuyAlfassi.pdf‎|Download Presentation]])
+
|style="border-style: solid; border-width: 1px;color:#1F497D" height="25" align="center" valign="center" | 11:15-12:00
 
+
align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5  | '''[[OWASP_Israel_2011_Presentations#Building_an_Effective_SDLC_Program_-_Case_Study|Building an Effective SDLC Program - Case Study]]''' ''([[Media:OWASPIL2011-Bejerano-Maor-BuildingSDLC.pptx|Presentation]])''
|- style="font-size:11pt"
+
''Guy Bejerano, CSO, Liveperson''<br>
|style="color:#1F497D" height="25" align="right" valign="center" | 15:50-16:30
+
''Ofer Maor, CTO, Seeker Security''
valign="center" colspan="2" | &nbsp;Beyond Negative Security: Signatures Are Not Always Enough &nbsp;&nbsp; ''Or Katz, Trustwave'' &nbsp;&nbsp; ([[Media:OWASPIL2010-BeyondNegativeSec-OrKatz.ppt|Download Presentation]])
+
|  align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5  | '''[[OWASP_Israel_2011_Presentations#Space-Time_Tradeoffs_in_Software-Based_Deep_Packet_Inspection|Space-Time Tradeoffs in Software-Based Deep Packet Inspection]]''' ''([[Media:OWASPIL2011-YotamHarchol-SpaceTimeTradeoffDPI.pptx|Presentation]])''
+
''Yotam Harchol, IDC''
|- style="font-size:11pt"
+
|- style="border-style: solid; border-width: 1px;font-size:10pt"
|style="color:#1F497D" height="50" align="right" valign="center" | 16:30-17:00
+
|style="border-style: solid; border-width: 1px;color:#1F497D" height="25" align="center" valign="center" | 12:00-12:45
|  valign="center" style="font-size:12pt" colspan="2" | &nbsp; '''Break'''
+
align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5  | '''[[OWASP_Israel_2011_Presentations#All_Your_Mobile_Applications_Are_Belong_to_Us|All Your Mobile Applications Are Belong to Us]]''' ''([http://www.ikotler.org/AllYourMobileAppsAreBelongToUs_OWASP2011IL.pdf Presentation])''
 
+
''Itzik Kotler, CTO, Security Art''
|- style="font-size:12pt"
+
|  align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5  | '''[[OWASP_Israel_2011_Presentations#Glass_Box_Testing_-_Think_Inside_the_Box|Glass Box Testing - Thinking Inside the Box]]''' ''([[Media:OWASPIL2011-OmriWeisman-GlassBoxTesting.ppt|Presentation]])''
|style="color:#1F497D" height="30" align="right" valign="center" | &nbsp;
+
''Omri Weisman, Manager, Security Research Group, IBM''
width="291" valign="center" align="center" | '''Room #1'''
+
|- style="border-style: solid; border-width: 1px;font-size:10pt"
width="296" valign="center" align="center" | '''Room #2'''
+
|style="border-style: solid; border-width: 1px;color:#1F497D" height="40" align="center" valign="center" | 12:45-13:45
 
+
|  valign="center" align="center" style="border-style: solid; border-width: 1px;font-size:12pt" colspan="2" | '''Lunch Break'''
|- style="font-size:11pt"
+
|- style="border-style: solid; border-width: 1px;font-size:10pt"
|style="color:#1F497D" height="25" align="right" valign="center" | 17:00-17:40
+
|style="border-style: solid; border-width: 1px;color:#1F497D" height="25" align="center" valign="center" | 13:45-14:30
|  valign="center" | &nbsp;Practical Mod Security: Beyond the Core Rule Set &nbsp;&nbsp;  ''Josh Amishav-Zlatin, Pure Hacking'' &nbsp;&nbsp; ([[Media:OWASPIL2010-PracticalModSe-JoshAmishavZlatin.pdf|Download Presentation]])
+
align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5  | '''[[OWASP_Israel_2011_Presentations#CMS_and_Other_Giants_.E2.80.93_The_Nightmare_of_AppSec_Testing|CMS And Other Giants - The Nightmare of AppSec Testing]]''' ''([[Media:OWASPIL2011-IreneAbezgauz-CMSnOtherGiants.pptx|Presentation]])''
|  valign="center" | &nbsp;PCI:DSS and the New PA:DSS Standards: Myths, Trends and Pragmatic Methods for Building Secure Software that Complies &nbsp;&nbsp; ''Shay Zalalichin, Comsec'' &nbsp;&nbsp; ([[Media:OWASPIL2010-PCIAppSec-ShayZalalichin.pdf‎|Download Presentation]])
+
''Irene Abezgauz, Product Manager, Seeker Security''
 
+
align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5  | '''[[OWASP_Israel_2011_Presentations#Agile_.2B_SDL_.E2.80.93_Concepts_and_Misconceptions|Agile + SDL – Concepts and Misconceptions]]''' ''([[Media:OWASPIL2011-Douglen-Bregman-AgileSDL.ppt|Presentation]])''
|- style="font-size:11pt"
+
''Avi Douglen, Security Architect, Aware Security''<br>
|style="color:#1F497D" height="25" align="right" valign="center" | 17:40-18:20
+
''Nir Bregman, Senior Project Manager, HP Software''
|  valign="center" | &nbsp;Accelerating Multi-Pattern Matching on Compressed HTTP Traffic &nbsp;&nbsp;  ''Yaron Koral, IDC'' &nbsp;&nbsp; ([[Media:OWASPIL2010-CompressedHTTPMatching-YaronKoral.pptx|Download Presentation]])
+
|- style="border-style: solid; border-width: 1px;font-size:10pt"
|  valign="center" | &nbsp;Real Life Application DoS Attacks &nbsp;&nbsp;  ''Ziv Gadot, Radware'' &nbsp;&nbsp; ([[Media:OWASPIL2010-RealLifeDoS-ZivGadot.ppt|Download Presentation]])
+
|style="border-style: solid; border-width: 1px;color:#1F497D" height="25" align="center" valign="center" | 14:30-15:15
 
+
align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5 | '''[[OWASP_Israel_2011_Presentations#When_Crypto_Goes_Wrong|When Crypto Goes Wrong]]''' ''([[Media:OWASPIL2011-ErezMetula-WhenCryptoGoesWrong.pdf|Presentation]])''
|- style="font-size:11pt"
+
''Erez Metula, Founder, AppSec Labs''
|style="color:#1F497D" height="25" align="right" valign="center" | 18:20-19:00
+
align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5  | '''[[OWASP_Israel_2011_Presentations#Advanced_Techniques_.26_Tools_for_Testing_Binary_Protocols|Advanced Techniques & Tools for Testing Binary Protocols]]''' ''([[Media:OWSPIL2011_Tamir_Tampering101.pdf|Presentation]])''
| valign="center" | &nbsp;Runtime Hardening &nbsp;&nbsp;  ''Erez Metula, AppSec'' &nbsp;&nbsp; ([[Media:OWASPIL2010-RuntimeHardening-ErezMetula.pdf|Download Presentation]])
+
''Chilik Tamir, Information Security Architect, AppSec Labs''
|  valign="center" | &nbsp;Cloud Computing Security: Mapping Concepts to Practical Techniques &nbsp;&nbsp;  ''Gilad Parann-Nissany, Porticor'' &nbsp;&nbsp; ([[Media:OWASPIL2010-PracticalCloudSec-GiladParannNissany.pptx‎|Download Presentation]])
+
|- style="border-style: solid; border-width: 1px;font-size:10pt"
 
+
|style="border-style: solid; border-width: 1px;color:#1F497D" height="40" align="center" valign="center" | 15:15-15:30
|- style="font-size:11pt"
+
|  valign="center" align="center" style="border-style: solid; border-width: 1px;font-size:12pt" colspan="2" | '''Coffee Break'''
|style="color:#1F497D" height="25" align="right" valign="center" | 19:00-19:05
+
|- style="border-style: solid; border-width: 1px;font-size:10pt"
| valign="center" colspan="2"| &nbsp;'''Closing Words''' &nbsp;&nbsp; ''Ofer Maor, Hacktics - OWASP Israel Chairman''
+
|style="border-style: solid; border-width: 1px;color:#1F497D" height="25" align="center" valign="center" | 15:30-16:15
 +
|  align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5 | '''[[OWASP_Israel_2011_Presentations#Security_Testing_of_RESTful_Services|Security Testing of RESTful Services]]''' ''([[Media:Security testing for REST applications.pdf|Presentation]])''
 +
''Ofer Shezaf, Head of AppSec Research, HP''<br>
 +
''Eyal Fingold, Senior Security Developer, HP''
 +
align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5 | '''[[OWASP_Israel_2011_Presentations#Hey.2C_What.E2.80.99s_your_App_doing_on_my_.28Smart.29Phone.3F|Hey, What’s your App doing on my (Smart)Phone?]]''' ''([[Media:OWASPIL2011_Zalalichin_Mobile_Security.pdf|Presentation]])''
 +
''Shay Zalalichin, CTO, Comsec Consulting''
 +
|- style="font-size:10pt"
 +
|style="border-style: solid; border-width: 1px;color:#1F497D" align="center" valign="center" | 16:15-17:00
 +
| align=center valign="center" colspan="2" style="border-style: solid; border-width: 1px;font-size:11pt" | '''[[OWASP_Israel_2011_Presentations#The_Bank_Job_II|The Bank Job II]]''' ''([http://prezi.com/wipzu1bkfwnd/the-bank-job-ii-owasp-2011-final/ Presentation])''
 +
''Adi Sharabani, Cross-Rational Security Strategy and Architecture, IBM''
 +
|- style="font-size:10pt"
 +
|style="border-style: solid; border-width: 1px;color:#1F497D" align="center" valign="center" | 17:00-17:05
 +
| align=center valign="center" colspan="2" style="border-style: solid; border-width: 1px;font-size:11pt" | '''End Notes''' &nbsp;
 +
''Ofer Maor - Chairman, OWASP Israel; Global Membership Committee, OWASP''
 
|}
 
|}

Latest revision as of 04:48, 26 September 2011

08:30-09:00 Registration, Gathering and Socializing
09:00-09:30 Opening Words (Presentation)

Ofer Maor - Chairman, OWASP Israel; Global Membership Committee, OWASP

09:30-10:10 Keynote

Composite Applications Over Hybrid Clouds – Enterprise Security Challenges of the IT Supply Chain
Dr. Ethan Hadar, Senior Vice President Corporate Technical Strategy, CA

  Track #1 Track #2
10:15-11:00 Finding Security in Misery of Others (Presentation)

Amichai Shulman, CTO, Imperva

Temporal Session Race Conditions (Presentation)

Shay Chen, CTO, Hacktics Advanced Security Center, Ernst & Young

11:00-11:15 Coffee Break
11:15-12:00 Building an Effective SDLC Program - Case Study (Presentation)

Guy Bejerano, CSO, Liveperson
Ofer Maor, CTO, Seeker Security

Space-Time Tradeoffs in Software-Based Deep Packet Inspection (Presentation)

Yotam Harchol, IDC

12:00-12:45 All Your Mobile Applications Are Belong to Us (Presentation)

Itzik Kotler, CTO, Security Art

Glass Box Testing - Thinking Inside the Box (Presentation)

Omri Weisman, Manager, Security Research Group, IBM

12:45-13:45 Lunch Break
13:45-14:30 CMS And Other Giants - The Nightmare of AppSec Testing (Presentation)

Irene Abezgauz, Product Manager, Seeker Security

Agile + SDL – Concepts and Misconceptions (Presentation)

Avi Douglen, Security Architect, Aware Security
Nir Bregman, Senior Project Manager, HP Software

14:30-15:15 When Crypto Goes Wrong (Presentation)

Erez Metula, Founder, AppSec Labs

Advanced Techniques & Tools for Testing Binary Protocols (Presentation)

Chilik Tamir, Information Security Architect, AppSec Labs

15:15-15:30 Coffee Break
15:30-16:15 Security Testing of RESTful Services (Presentation)

Ofer Shezaf, Head of AppSec Research, HP
Eyal Fingold, Senior Security Developer, HP

Hey, What’s your App doing on my (Smart)Phone? (Presentation)

Shay Zalalichin, CTO, Comsec Consulting

16:15-17:00 The Bank Job II (Presentation)

Adi Sharabani, Cross-Rational Security Strategy and Architecture, IBM

17:00-17:05 End Notes  

Ofer Maor - Chairman, OWASP Israel; Global Membership Committee, OWASP