Difference between revisions of "2010 BASC Agenda"

From OWASP
Jump to: navigation, search
 
(22 intermediate revisions by 3 users not shown)
Line 1: Line 1:
 
{{2010_BASC:Header_Template | Agenda}}
 
{{2010_BASC:Header_Template | Agenda}}
{{2010_BASC:WIP_Template}}
 
 
<!-- --------------------------------------------------------------------
 
<!-- --------------------------------------------------------------------
 
INSTRUCTIONS FOR EDITORS:
 
INSTRUCTIONS FOR EDITORS:
Line 43: Line 42:
 
  |-
 
  |-
 
  | style="width:10%; background:#9BA8CF" align="center" | 8:00-9:00 || colspan="2" style="width:80%; background:#D2D2D2" align="center" |  
 
  | style="width:10%; background:#9BA8CF" align="center" | 8:00-9:00 || colspan="2" style="width:80%; background:#D2D2D2" align="center" |  
<div style="font-size: 120%;">
+
<div>
'''Breakfast and Registration'''<br/>
+
<span style="font-size:130%">'''Breakfast and Registration'''</span><br/>
provided by our Platinum Sponsor:
+
provided by our Platinum Sponsor
 
</div>
 
</div>
 
{| border="1"
 
{| border="1"
Line 52: Line 51:
 
|-
 
|-
 
  | style="width:10%; background:#7B8ABD" align="center" | 09:00-09:50 || colspan="2" style="width:80%; background:#B0B0B0;" align="center" |  
 
  | style="width:10%; background:#7B8ABD" align="center" | 09:00-09:50 || colspan="2" style="width:80%; background:#B0B0B0;" align="center" |  
{{2010_BASC:Presentaton_Agenda_Template|Keynote|To Be Determined Presentation|Josh Corman}}
+
<div style="margin:10px;">
 +
<span style="font-size: 130%">'''[[2010_BASC_Presentations#Keynote|Keynote: From the Era of Vulnerabiquity to the Rugged Age]]'''</span><br/>
 +
<span style="font-size: 120%">[[2010_BASC_Speakers#Josh Corman|Josh Corman]]</span><br/>
 +
</div>
 
  |-
 
  |-
 
  | style="width:10%; background:#9BA8CF" | || align="center" style="width:30%; background:#CFA49B" | '''Track 1'''<br/>Horace Mann Room
 
  | style="width:10%; background:#9BA8CF" | || align="center" style="width:30%; background:#CFA49B" | '''Track 1'''<br/>Horace Mann Room
Line 59: Line 61:
 
| style="width:10%; background:#7B8ABD" align="center" | 10:00-10:50 || style="width:30%; background:#BC857A" align="center" |   
 
| style="width:10%; background:#7B8ABD" align="center" | 10:00-10:50 || style="width:30%; background:#BC857A" align="center" |   
 
{{2010_BASC:Presentaton_Agenda_Template|Presentation|HTML5 Security|Ming Chow}}
 
{{2010_BASC:Presentaton_Agenda_Template|Presentation|HTML5 Security|Ming Chow}}
  | style="width:30%; background:#BCA57A" align="center" |  
+
  | style="width:30%; background:#BCA57A" align="center" rowspan="2" |  
 
{{2010_BASC:Presentaton_Agenda_Template|Presentation|OWASP Basics 1 and 2|Robert Cheyne}}
 
{{2010_BASC:Presentaton_Agenda_Template|Presentation|OWASP Basics 1 and 2|Robert Cheyne}}
 
|-
 
|-
 
| style="width:10%; background:#9BA8CF" align="center" | 11:00-11:50 || style="width:30%; background:#CFA49B" align="center" |  
 
| style="width:10%; background:#9BA8CF" align="center" | 11:00-11:50 || style="width:30%; background:#CFA49B" align="center" |  
 
{{2010_BASC:Presentaton_Agenda_Template|Presentation|A Crumple Zone for Service Oriented Architectures|Andrew Gronosky}}
 
{{2010_BASC:Presentaton_Agenda_Template|Presentation|A Crumple Zone for Service Oriented Architectures|Andrew Gronosky}}
| style="width:30%; background:#DFC799" align="center" |
 
{{2010_BASC:Presentaton_Agenda_Template|Presentation|OWASP Basics 1 and 2|Robert Cheyne}}
 
 
|-
 
|-
 
  | style="width:10%; background:#7B8ABD" align="center" | 12:00-13:00 || colspan="2" style="width:80%; background:#F2F2F2" align="center" |  
 
  | style="width:10%; background:#7B8ABD" align="center" | 12:00-13:00 || colspan="2" style="width:80%; background:#F2F2F2" align="center" |  
'''Lunch provided by our platinum sponsor'''
+
<span style="font-size:130%">'''Lunch'''</span><br/>
 +
provided by our platinum sponsor
 
{| border="1"
 
{| border="1"
 
|[[File:SI-Banner-238x57.jpg|link=http://www.securityinnovation.com|Security Innovation]]
 
|[[File:SI-Banner-238x57.jpg|link=http://www.securityinnovation.com|Security Innovation]]
Line 76: Line 77:
 
{{2010_BASC:Presentaton_Agenda_Template|Presentation|Hacking SAP BusinessObjects|Joshua Abraham and Will Vandevanter}}
 
{{2010_BASC:Presentaton_Agenda_Template|Presentation|Hacking SAP BusinessObjects|Joshua Abraham and Will Vandevanter}}
 
  | style="width:30%; background:#DFC799" align="center" |  
 
  | style="width:30%; background:#DFC799" align="center" |  
{{2010_BASC:Presentaton_Agenda_Template|Presentation|Coffee Shop Warefare:Protecting Yourself in Dark Territory|John Carmichael}}
+
{{2010_BASC:Presentaton_Agenda_Template|Presentation|Coffee Shop Warfare:Protecting Yourself in Dark Territory|John Carmichael}}
 
|-
 
|-
 
 
| style="width:10%; background:#7B8ABD" align="center" | 14:00-14:50 || style="width:30%; background:#CFA49B" align="center" |  
 
| style="width:10%; background:#7B8ABD" align="center" | 14:00-14:50 || style="width:30%; background:#CFA49B" align="center" |  
{{2010_BASC:Presentaton_Agenda_Template|Presentation|The Exploit Arms Race|Christien Rioux}}
+
{{2010_BASC:Presentaton_Agenda_Template|Presentation|What's Old Is New Again: An Overview of Mobile Application Security|Zach Lanier}}
 
  | style="width:30%; background:#DFC799" align="center" |  
 
  | style="width:30%; background:#DFC799" align="center" |  
 
{{2010_BASC:Presentaton_Agenda_Template|Presentation|Url Enlargement|Dan Crowley}}
 
{{2010_BASC:Presentaton_Agenda_Template|Presentation|Url Enlargement|Dan Crowley}}
 
|-
 
|-
 
 
| style="width:10%; background:#7B8ABD" align="center" | 15:00-15:50 || style="width:30%; background:#BC857A" align="center" |  
 
| style="width:10%; background:#7B8ABD" align="center" | 15:00-15:50 || style="width:30%; background:#BC857A" align="center" |  
 
 
{{2010_BASC:Presentaton_Agenda_Template|Presentation|Business Logic Attacks - BATs and BLBs|Paul Schofield}}
 
{{2010_BASC:Presentaton_Agenda_Template|Presentation|Business Logic Attacks - BATs and BLBs|Paul Schofield}}
 
  | style="width:30%; background:#DFC799" align="center" |  
 
  | style="width:30%; background:#DFC799" align="center" |  
{{2010_BASC:Presentaton_Agenda_Template|Presentation|Coffee Shop Warefare:Protecting Yourself in Dark Territory|John Carmichael}}
+
{{2010_BASC:Presentaton_Agenda_Template|Presentation|Web Applications and Data Tokenization|Kenny Smith}}
 
|-
 
|-
 
 
| style="width:10%; background:#7B8ABD" align="center" | 16:00-16:50 || style="width:30%; background:#CFA49B" align="center" |  
 
| style="width:10%; background:#7B8ABD" align="center" | 16:00-16:50 || style="width:30%; background:#CFA49B" align="center" |  
{{2010_BASC:Presentaton_Agenda_Template|Presentation|Business Logic Attacks - BATs and BLBs|Paul Schofield}}
+
{{2010_BASC:Presentaton_Agenda_Template|Presentation|The Exploit Arms Race|Christien Rioux}}
 
  | style="width:30%; background:#DFC799" align="center" |  
 
  | style="width:30%; background:#DFC799" align="center" |  
{{2010_BASC:Presentaton_Agenda_Template|Presentation|Web Applications and Data Tokenization|Kenny Smith}}
+
{{2010_BASC:Presentaton_Agenda_Template|Presentation|Open SAMM|Shakeel Tufail}}
 
|-
 
|-
  
 
|-
 
|-
 
| style="width:10%; background:#7B8ABD" align="center" | 17:00-17:30 || colspan="2" style="width:30%; background:#C2C2C2" align="center" |  
 
| style="width:10%; background:#7B8ABD" align="center" | 17:00-17:30 || colspan="2" style="width:30%; background:#C2C2C2" align="center" |  
'''Social Time provided by our platinum sponsor'''
+
<span style="font-size:130%">'''Social Time'''</span><br/>
 +
provided by our platinum sponsor
 
{| border="1"
 
{| border="1"
 
| [[File:boston-2010-source-277x70.jpg|link=http://www.sourceconference.com|SOURCE]]
 
| [[File:boston-2010-source-277x70.jpg|link=http://www.sourceconference.com|SOURCE]]
Line 106: Line 104:
 
|-
 
|-
 
| style="width:10%; background:#7B8ABD" align="center" | 17:30-18:30 || colspan="2" style="width:30%; background:#D2D2D2" align="center" |  
 
| style="width:10%; background:#7B8ABD" align="center" | 17:30-18:30 || colspan="2" style="width:30%; background:#D2D2D2" align="center" |  
'''Expert Panel:'''<br>
+
<span style="font-size:130%">'''Expert Panel: Will we ''EVER'' be Secure?'''</span><br>
''[http://authorurl.com Presenter Name] Company & Title, <br>
+
''
[http://authorurl.com Presenter Name] Company & Title, <br>
+
Moderator:[http://authorurl.com   Rob Cheyne], CEO, Safelight Security Advisors<br>
[http://authorurl.com Presenter Name] Company & Title, <br>
+
Panelist:[http://authorurl.com Josh Corman], Security Analyst, The 451 Group  <br>
[http://authorurl.com Presenter Name] Company & Title, <br>
+
Panelist:[http://authorurl.com Justin Peavey], CISO, Omgeo <br>
[http://authorurl.com Presenter Name] Company & Title, <br>
+
Panelist:[http://authorurl.com Brian Weekes], Linux Infrastructure Lead, GMO<br>
[http://authorurl.com Presenter Name] Company & Title, <br>
+
Panelist:[http://authorurl.com Adriel DeSautels], CTO, NetRagard<br>
Moderator: [http://authorurl.com   Moderator Name]''<br>
+
Panelist:[http://authorurl.com Shakeel Tufail], Security Analyst, Fortify<br>
[http://video.google.com/ VIDEO] / [http://owasp.org SLIDES]
+
  
 +
''<br>
 
|-
 
|-
 
| style="width:10%; background:#7B8ABD" align="center" | 18:30-19:00 || colspan="2" style="width:30%; background:#99FF99" align="center" |  
 
| style="width:10%; background:#7B8ABD" align="center" | 18:30-19:00 || colspan="2" style="width:30%; background:#99FF99" align="center" |  
'''Wrap Up'''<br>
+
<span style="font-size:130%">'''Wrap Up'''</span><br>
 
|}
 
|}
{{2010_BASC:WIP_Template}}
 
 
{{2010_BASC:Footer_Template | Agenda}}
 
{{2010_BASC:Footer_Template | Agenda}}

Latest revision as of 17:36, 18 November 2010

Platinum Sponsors (Listed Alphabetically)
  CORE Security Rapid7  
SafeLight Security
  Security Innovation SOURCE  


We kindly thank our sponsors for their support. Please help us keep future BASCs free by viewing and visiting all of our sponsors.

Agenda

Saturday, November 20

8:00-9:00

Breakfast and Registration
provided by our Platinum Sponsor

Rapid7
09:00-09:50
Track 1
Horace Mann Room
Track 2
Deborah Sampson / Paul Thomas Room
10:00-10:50
11:00-11:50
12:00-13:00

Lunch
provided by our platinum sponsor

Security Innovation
13:00-13:50
14:00-14:50
15:00-15:50
16:00-16:50
17:00-17:30

Social Time
provided by our platinum sponsor

SOURCE
17:30-18:30

Expert Panel: Will we EVER be Secure?
Moderator:Rob Cheyne, CEO, Safelight Security Advisors
Panelist:Josh Corman, Security Analyst, The 451 Group
Panelist:Justin Peavey, CISO, Omgeo
Panelist:Brian Weekes, Linux Infrastructure Lead, GMO
Panelist:Adriel DeSautels, CTO, NetRagard
Panelist:Shakeel Tufail, Security Analyst, Fortify


18:30-19:00

Wrap Up



We kindly thank our sponsors for their support.
Please help us keep future BASCs free by viewing and visiting all of our sponsors.

Gold Sponsors
Auric Systems International Fortify Palo Alto Networks WhiteHat Security

You can find out more about this conference at the BASC homepage: http://www.owasp.org/index.php/2010_BASC_Homepage.
Conference Organizer: Jim Weiler