Summit 2011 Schedule Dynamic

Click to return to Summit 2011's main page

Work Model
The Dynamic Working Sessions Model

Welcome to the Dynamic Working Sessions world! These will be fluid, informal, exciting and vibrant Working Sessions that will happen throughout the day in different locations and at different times – you can have them as nice discussions over breakfast, round table presentations or heated debates after dinner around a couple of beers!

How will this Model work?

You have here


 * The list of Dynamic sessions
 * The list of Dynamic time slots and locations for Tuesday, Wednesday and Friday
 * The list of Attendees

To organize your Dynamic WS you just have to:


 * Check the list of available time slots and available locations;
 * Check the list of Attendees and identify the ones you would like to have on your session;

Having into account the availability of both time slots and locations and the schedules of your potential attendees, you can make a decision as to when and where your WS will happen.

Once you have that decision, you just have to email [mailto:name.tbd@owasp.org Name] and they will put your WS and respective information online. Please make sure to include all the following information on the email:


 * WS name
 * Time slot & Location

Please note that this is a very dynamic process – if, on one hand, we need to make it easy for you to organize WS in a very fluid way, we also need some time to make sure that you will have all the equipment needed.

That is to say that the Dynamic WS will be organized according to this flow:

Working Sessions List

 * O2 Platform
 * Development Guide
 * ASVS Project
 * OWASP Java Project
 * Government Outreach
 * Building the OWASP Brazilian Leaders Group
 * OWASP .NET Project
 * OWASP Projects Infrastructure
 * OWASP Projects Security Bulletins
 * How to report known security vulnerabilities (for websites)
 * OWASP TOP 10 online training in Hacking-Lab
 * Developer's Security Training Package
 * OWASP Appsec Tutorial Series
 * Connections
 * Computer Crime Laws
 * Conferences - Improving Conference Planner Support
 * Education
 * Membership
 * Developer Outreach
 * How can OWASP reach/talk/engage with auditors
 * Scaling Web Application Security Testing
 * The Future of the OWASP Secure Coding Workshop
 * How to present worldwide David Rice's Pollution keynote
 * Global Conferences Committee Monthly Meeting
 * Creating a unified "finding"
 * S is for Safety (as well as Security)
 * Privacy - Personal Data/PII, Legislation and OWASP
 * Replicating Samy's EU Tour across OWASP
 * OWASP Quotes
 * Managing the OWASP Brand
 * Defining AppSensor Detection Points
 * Protecting Against CSRF
 * Creating an Application Security Career - For the Average IT/Network Security Practitioner
 * Should OWASP work directly with PCI-DSS?
 * Investment justification for Web Application Security
 * Less preaching to the choir, engage more with the outsiders
 * Did OWASP Failed to achieve its full potential? (and lessons learned)
 * OWASP Around the World
 * Measuring SDLC process performance

Tuesday, Feb 8

 * }


 * }


 * }

Wednesday, Feb 9

 * }


 * }


 * }

Thursday, Feb 10

 * }


 * }


 * }