This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Template:OWASP IL 2011 Agenda"

From OWASP
Jump to: navigation, search
 
(18 intermediate revisions by 3 users not shown)
Line 1: Line 1:
 
{| style="border-collapse: collapse; border-width: 1px; border-style: solid; border-color: #000" cellpadding=2
 
{| style="border-collapse: collapse; border-width: 1px; border-style: solid; border-color: #000" cellpadding=2
 
|- style="border-style: solid; border-width: 1px;font-size:10pt"  
 
|- style="border-style: solid; border-width: 1px;font-size:10pt"  
|style="border-style: solid; border-width: 1px;color:#1F497D;white-space:nowrap" width="90" height="40" align="center" valign="center" | 08:30-09:15
+
|style="border-style: solid; border-width: 1px;color:#1F497D;white-space:nowrap" width="90" height="40" align="center" valign="center" | 08:30-09:00
 
| align=center valign="center" colspan=2 style="border-style: solid; border-width: 1px;font-size:12pt" | '''Registration, Gathering and Socializing'''
 
| align=center valign="center" colspan=2 style="border-style: solid; border-width: 1px;font-size:12pt" | '''Registration, Gathering and Socializing'''
 
|- style="font-size:10pt"
 
|- style="font-size:10pt"
|style="border-style: solid; border-width: 1px;color:#1F497D" align="center" valign="center" | 09:15-09:30
+
|style="border-style: solid; border-width: 1px;color:#1F497D" align="center" valign="center" | 09:00-09:30  
| align=center valign="center" colspan="2" style="border-style: solid; border-width: 1px;font-size:11pt" | '''Opening Words'''<br>
+
| align=center valign="center" colspan="2" style="border-style: solid; border-width: 1px;font-size:11pt" | '''Opening Words''' ''([[Media:OWASPIL2011-OferMaor-OpeningWords.ppt|Presentation]])''<br>
 
''Ofer Maor - Chairman, OWASP Israel; Global Membership Committee, OWASP''
 
''Ofer Maor - Chairman, OWASP Israel; Global Membership Committee, OWASP''
 
|- style="border-style: solid; border-width: 1px;font-size:10pt"
 
|- style="border-style: solid; border-width: 1px;font-size:10pt"
Line 19: Line 19:
 
|- style="border-style: solid; border-width: 1px;font-size:10pt"
 
|- style="border-style: solid; border-width: 1px;font-size:10pt"
 
|style="border-style: solid; border-width: 1px;color:#1F497D" height="25" align="center" valign="center" | 10:15-11:00
 
|style="border-style: solid; border-width: 1px;color:#1F497D" height="25" align="center" valign="center" | 10:15-11:00
|  align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" | '''[[OWASP_Israel_2011_Presentations#Finding_Security_in_Misery_of_Others|Finding Security in Misery of Others]]'''<br>
+
|  align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" | '''[[OWASP_Israel_2011_Presentations#Finding_Security_in_Misery_of_Others|Finding Security in Misery of Others]]'''  ''([[Media:OWASPIL2011-AmichaiShulman-FindingSecurityInMiseryOfOthers.pptx|Presentation]])''<br>
 
''Amichai Shulman, CTO, Imperva''
 
''Amichai Shulman, CTO, Imperva''
|  align="center" valign="top" style="font-size:11pt"  | '''[[OWASP_Israel_2011_Presentations#Temporal_Session_Race_Conditions|Temporal Session Race Conditions]]'''
+
|  align="center" valign="top" style="font-size:11pt"  | '''[[OWASP_Israel_2011_Presentations#Temporal_Session_Race_Conditions|Temporal Session Race Conditions]]''' ''([[Media:OWASPIL2011-ShayChen-TSRC.pptx‎|Presentation]])''
 
''Shay Chen, CTO, Hacktics Advanced Security Center, Ernst & Young''
 
''Shay Chen, CTO, Hacktics Advanced Security Center, Ernst & Young''
 
|- style="border-style: solid; border-width: 1px;font-size:10pt"
 
|- style="border-style: solid; border-width: 1px;font-size:10pt"
Line 28: Line 28:
 
|- style="border-style: solid; border-width: 1px;font-size:10pt"
 
|- style="border-style: solid; border-width: 1px;font-size:10pt"
 
|style="border-style: solid; border-width: 1px;color:#1F497D" height="25" align="center" valign="center" | 11:15-12:00
 
|style="border-style: solid; border-width: 1px;color:#1F497D" height="25" align="center" valign="center" | 11:15-12:00
|  align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5  | '''[[OWASP_Israel_2011_Presentations#Building_an_Effective_SDLC_Program_-_Case_Study|Building an Effective SDLC Program - Case Study]]'''
+
|  align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5  | '''[[OWASP_Israel_2011_Presentations#Building_an_Effective_SDLC_Program_-_Case_Study|Building an Effective SDLC Program - Case Study]]''' ''([[Media:OWASPIL2011-Bejerano-Maor-BuildingSDLC.pptx|Presentation]])''
 
''Guy Bejerano, CSO, Liveperson''<br>
 
''Guy Bejerano, CSO, Liveperson''<br>
 
''Ofer Maor, CTO, Seeker Security''
 
''Ofer Maor, CTO, Seeker Security''
|  align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5  | '''[[OWASP_Israel_2011_Presentations#Space-Time_Tradeoffs_in_Software-Based_Deep_Packet_Inspection|Space-Time Tradeoffs in Software-Based Deep Packet Inspection]]'''
+
|  align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5  | '''[[OWASP_Israel_2011_Presentations#Space-Time_Tradeoffs_in_Software-Based_Deep_Packet_Inspection|Space-Time Tradeoffs in Software-Based Deep Packet Inspection]]''' ''([[Media:OWASPIL2011-YotamHarchol-SpaceTimeTradeoffDPI.pptx|Presentation]])''
 
''Yotam Harchol, IDC''
 
''Yotam Harchol, IDC''
 
|- style="border-style: solid; border-width: 1px;font-size:10pt"
 
|- style="border-style: solid; border-width: 1px;font-size:10pt"
 
|style="border-style: solid; border-width: 1px;color:#1F497D" height="25" align="center" valign="center" | 12:00-12:45
 
|style="border-style: solid; border-width: 1px;color:#1F497D" height="25" align="center" valign="center" | 12:00-12:45
|  align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5  | '''[[OWASP_Israel_2011_Presentations#All_Your_Mobile_Applications_Are_Belong_to_Us|All Your Mobile Applications Are Belong to Us]]'''
+
|  align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5  | '''[[OWASP_Israel_2011_Presentations#All_Your_Mobile_Applications_Are_Belong_to_Us|All Your Mobile Applications Are Belong to Us]]''' ''([http://www.ikotler.org/AllYourMobileAppsAreBelongToUs_OWASP2011IL.pdf Presentation])''
 
''Itzik Kotler, CTO, Security Art''
 
''Itzik Kotler, CTO, Security Art''
|  align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5  | '''[[OWASP_Israel_2011_Presentations#Glass_Box_Testing_-_Think_Inside_the_Box|Glass Box Testing - Thinking Inside the Box]]'''
+
|  align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5  | '''[[OWASP_Israel_2011_Presentations#Glass_Box_Testing_-_Think_Inside_the_Box|Glass Box Testing - Thinking Inside the Box]]''' ''([[Media:OWASPIL2011-OmriWeisman-GlassBoxTesting.ppt|Presentation]])''
 
''Omri Weisman, Manager, Security Research Group, IBM''
 
''Omri Weisman, Manager, Security Research Group, IBM''
 
|- style="border-style: solid; border-width: 1px;font-size:10pt"
 
|- style="border-style: solid; border-width: 1px;font-size:10pt"
Line 44: Line 44:
 
|- style="border-style: solid; border-width: 1px;font-size:10pt"
 
|- style="border-style: solid; border-width: 1px;font-size:10pt"
 
|style="border-style: solid; border-width: 1px;color:#1F497D" height="25" align="center" valign="center" | 13:45-14:30
 
|style="border-style: solid; border-width: 1px;color:#1F497D" height="25" align="center" valign="center" | 13:45-14:30
|  align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5  | '''[[OWASP_Israel_2011_Presentations#CMS_and_Other_Giants_.E2.80.93_The_Nightmare_of_AppSec_Testing|CMS And Other Giants - The Nightmare of AppSec Testing]]'''
+
|  align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5  | '''[[OWASP_Israel_2011_Presentations#CMS_and_Other_Giants_.E2.80.93_The_Nightmare_of_AppSec_Testing|CMS And Other Giants - The Nightmare of AppSec Testing]]''' ''([[Media:OWASPIL2011-IreneAbezgauz-CMSnOtherGiants.pptx|Presentation]])''
 
''Irene Abezgauz, Product Manager, Seeker Security''
 
''Irene Abezgauz, Product Manager, Seeker Security''
|  align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5  | '''[[OWASP_Israel_2011_Presentations#SDL_for_Agile|SDL for Agile]]'''
+
|  align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5  | '''[[OWASP_Israel_2011_Presentations#Agile_.2B_SDL_.E2.80.93_Concepts_and_Misconceptions|Agile + SDL – Concepts and Misconceptions]]''' ''([[Media:OWASPIL2011-Douglen-Bregman-AgileSDL.ppt|Presentation]])''
''Avi Douglen, Independent Security Architect & Developer''<br>
+
''Avi Douglen, Security Architect, Aware Security''<br>
''Nir Bergman, Senior Project Manager, HP Software''
+
''Nir Bregman, Senior Project Manager, HP Software''
 
|- style="border-style: solid; border-width: 1px;font-size:10pt"
 
|- style="border-style: solid; border-width: 1px;font-size:10pt"
 
|style="border-style: solid; border-width: 1px;color:#1F497D" height="25" align="center" valign="center" | 14:30-15:15
 
|style="border-style: solid; border-width: 1px;color:#1F497D" height="25" align="center" valign="center" | 14:30-15:15
|  align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5  | '''[[OWASP_Israel_2011_Presentations#When_Crypto_Goes_Wrong|When Crypto Goes Wrong]]'''
+
|  align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5  | '''[[OWASP_Israel_2011_Presentations#When_Crypto_Goes_Wrong|When Crypto Goes Wrong]]''' ''([[Media:OWASPIL2011-ErezMetula-WhenCryptoGoesWrong.pdf|Presentation]])''
''Erez Metula, Founder, AppSec Labs''
+
''Erez Metula, Founder, AppSec Labs''  
|  align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5  | '''[[OWASP_Israel_2011_Presentations#Advanced_Techniques_.26_Tools_for_Testing_Binary_Protocols|Advanced Techniques & Tools for Testing Binary Protocols]]'''
+
|  align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5  | '''[[OWASP_Israel_2011_Presentations#Advanced_Techniques_.26_Tools_for_Testing_Binary_Protocols|Advanced Techniques & Tools for Testing Binary Protocols]]''' ''([[Media:OWSPIL2011_Tamir_Tampering101.pdf|Presentation]])''
 
''Chilik Tamir, Information Security Architect, AppSec Labs''
 
''Chilik Tamir, Information Security Architect, AppSec Labs''
 
|- style="border-style: solid; border-width: 1px;font-size:10pt"
 
|- style="border-style: solid; border-width: 1px;font-size:10pt"
Line 60: Line 60:
 
|- style="border-style: solid; border-width: 1px;font-size:10pt"
 
|- style="border-style: solid; border-width: 1px;font-size:10pt"
 
|style="border-style: solid; border-width: 1px;color:#1F497D" height="25" align="center" valign="center" | 15:30-16:15
 
|style="border-style: solid; border-width: 1px;color:#1F497D" height="25" align="center" valign="center" | 15:30-16:15
|  align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5  | '''[[OWASP_Israel_2011_Presentations#Security_Testing_of_RESTful_Services|Security Testing of RESTful Services]]'''
+
|  align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5  | '''[[OWASP_Israel_2011_Presentations#Security_Testing_of_RESTful_Services|Security Testing of RESTful Services]]''' ''([[Media:Security testing for REST applications.pdf|Presentation]])''
 
''Ofer Shezaf, Head of AppSec Research, HP''<br>
 
''Ofer Shezaf, Head of AppSec Research, HP''<br>
 
''Eyal Fingold, Senior Security Developer, HP''
 
''Eyal Fingold, Senior Security Developer, HP''
|  align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5  | '''[[OWASP_Israel_2011_Presentations#Hey.2C_What.E2.80.99s_your_App_is_doing_on_my_.28Smart.29Phone.3F|Hey, What’s your App is doing on my (Smart)Phone?]]'''
+
|  align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5  | '''[[OWASP_Israel_2011_Presentations#Hey.2C_What.E2.80.99s_your_App_doing_on_my_.28Smart.29Phone.3F|Hey, What’s your App doing on my (Smart)Phone?]]''' ''([[Media:OWASPIL2011_Zalalichin_Mobile_Security.pdf|Presentation]])''
 
''Shay Zalalichin, CTO, Comsec Consulting''
 
''Shay Zalalichin, CTO, Comsec Consulting''
 
|- style="font-size:10pt"
 
|- style="font-size:10pt"
 
|style="border-style: solid; border-width: 1px;color:#1F497D" align="center" valign="center" | 16:15-17:00
 
|style="border-style: solid; border-width: 1px;color:#1F497D" align="center" valign="center" | 16:15-17:00
| align=center valign="center" colspan="2" style="border-style: solid; border-width: 1px;font-size:11pt" | '''[[OWASP_Israel_2011_Presentations#The_Bank_Job_II|The Bank Job II]]'''  
+
| align=center valign="center" colspan="2" style="border-style: solid; border-width: 1px;font-size:11pt" | '''[[OWASP_Israel_2011_Presentations#The_Bank_Job_II|The Bank Job II]]''' ''([http://prezi.com/wipzu1bkfwnd/the-bank-job-ii-owasp-2011-final/ Presentation])''
 
''Adi Sharabani, Cross-Rational Security Strategy and Architecture, IBM''
 
''Adi Sharabani, Cross-Rational Security Strategy and Architecture, IBM''
 
|- style="font-size:10pt"
 
|- style="font-size:10pt"

Latest revision as of 04:48, 26 September 2011

08:30-09:00 Registration, Gathering and Socializing
09:00-09:30 Opening Words (Presentation)

Ofer Maor - Chairman, OWASP Israel; Global Membership Committee, OWASP

09:30-10:10 Keynote

Composite Applications Over Hybrid Clouds – Enterprise Security Challenges of the IT Supply Chain
Dr. Ethan Hadar, Senior Vice President Corporate Technical Strategy, CA

  Track #1 Track #2
10:15-11:00 Finding Security in Misery of Others (Presentation)

Amichai Shulman, CTO, Imperva

Temporal Session Race Conditions (Presentation)

Shay Chen, CTO, Hacktics Advanced Security Center, Ernst & Young

11:00-11:15 Coffee Break
11:15-12:00 Building an Effective SDLC Program - Case Study (Presentation)

Guy Bejerano, CSO, Liveperson
Ofer Maor, CTO, Seeker Security

Space-Time Tradeoffs in Software-Based Deep Packet Inspection (Presentation)

Yotam Harchol, IDC

12:00-12:45 All Your Mobile Applications Are Belong to Us (Presentation)

Itzik Kotler, CTO, Security Art

Glass Box Testing - Thinking Inside the Box (Presentation)

Omri Weisman, Manager, Security Research Group, IBM

12:45-13:45 Lunch Break
13:45-14:30 CMS And Other Giants - The Nightmare of AppSec Testing (Presentation)

Irene Abezgauz, Product Manager, Seeker Security

Agile + SDL – Concepts and Misconceptions (Presentation)

Avi Douglen, Security Architect, Aware Security
Nir Bregman, Senior Project Manager, HP Software

14:30-15:15 When Crypto Goes Wrong (Presentation)

Erez Metula, Founder, AppSec Labs

Advanced Techniques & Tools for Testing Binary Protocols (Presentation)

Chilik Tamir, Information Security Architect, AppSec Labs

15:15-15:30 Coffee Break
15:30-16:15 Security Testing of RESTful Services (Presentation)

Ofer Shezaf, Head of AppSec Research, HP
Eyal Fingold, Senior Security Developer, HP

Hey, What’s your App doing on my (Smart)Phone? (Presentation)

Shay Zalalichin, CTO, Comsec Consulting

16:15-17:00 The Bank Job II (Presentation)

Adi Sharabani, Cross-Rational Security Strategy and Architecture, IBM

17:00-17:05 End Notes  

Ofer Maor - Chairman, OWASP Israel; Global Membership Committee, OWASP