This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Template:OWASP IL 2013 Agenda"

From OWASP
Jump to: navigation, search
m
m (fixed title)
Line 63: Line 63:
 
''Oren Poleg, IDC ''
 
''Oren Poleg, IDC ''
 
| style="vertical-align:top;" | '''[[OWASP_Israel_2013_Presentations#From Obscurity to Pop Culture - Evolution of Application Security|From Obscurity to Pop Culture - Evolution of Application Security]]'''  
 
| style="vertical-align:top;" | '''[[OWASP_Israel_2013_Presentations#From Obscurity to Pop Culture - Evolution of Application Security|From Obscurity to Pop Culture - Evolution of Application Security]]'''  
'' Irene Abezgauz, Product Manager, Quotium ''
+
'' Irene Abezgauz, VP Product Management, Quotium ''
 
|-
 
|-
 
| style="color:#1F497D; width:105px; font-size:10pt;" | 16:30 - 17:00
 
| style="color:#1F497D; width:105px; font-size:10pt;" | 16:30 - 17:00

Revision as of 07:10, 24 September 2013

8:30 - 9:00 Registration, Gathering & Networking
9:00 - 9:30 Opening Words

Ofer Maor - Chairman, OWASP Israel; Global Membership Committee, OWASP
Dr. Anat Bremler-Barr, Efi Arazi School of Computer Science, IDC

9:30 - 10:10 Keynote
10:15 - 11:00 Evolution of online banking attack techniques

Amit Klein, CTO, Trusteer

11:00 - 11:15 Coffee Break
  Track #1 Track #2
11:15 - 12:00 Get Ready for the Next Big Wave of Attacks:
Hacking of Leading CMS Systems

Maty Siman, CTO, Checkmarx

STDD - The protection you REALLY need

Nir Valtman, R&D CSO, Retalix
Lior Israel, Software Architect, Retalix

12:00 - 12:30 Utilizing Popular Websites for Malicious Purposes Using RDI

Daniel Chechik, Security Researcher, Trustwave SpiderLabs
Anat Davidi, Security Researcher, Trustwave SpiderLabs

Spam, Death Threats, and Other Abuses of Online Communities

Avi Douglen, Security Architect, Independent

12:30 - 13:30 Lunch Break
13:30 - 14:15 Invisibility Purge -
Manipulating Properties Of Invisible & Dormant Asp.Net Controls

Shay Chen, CTO, Ernst & Young (Hacktics)

Delivering Security in Continuous Delivery Environment

Yaniv Simsolo, Senior Consultant, Comsec Consulting

14:15 - 15:00 The ReFrameworker Android runtime manipulator –
Pentesting Android apps like a king

Erez Metula, AppSec Labs

Designing a national defense strategy
for DDoS applications and volume attacks

Mirit Kagarlitsky, Head of System Analysis, Israeli National Cyber Bureau

15:00 - 15:15 Coffee Break
15:15 - 16:00 A Game of Pwns:
Pwning iPhone application security assessment using the iNalyzer framework

Chilik Tamir, Chief Scientist, AppSec Labs

Enhancing Web Application Defense Using Big Data

Or Katz, Principal Security Researcher, Akamai Technologies

16:00 - 16:30 Automatic trust based segregation for content providers on mobile devices

Oren Poleg, IDC

From Obscurity to Pop Culture - Evolution of Application Security

Irene Abezgauz, VP Product Management, Quotium

16:30 - 17:00 Your mobile device in the service of the malicious hacker (Live Demo)

Adi Sharabani, CEO, Skycure

17:00 - 17:05 End Notes

Ofer Maor - Chairman, OWASP Israel; Global Membership Committee, OWASP