Difference between revisions of "2012 BASC Agenda"

From OWASP
Jump to: navigation, search
(Created page with "{{2012_BASC:Header_Template | Agenda}} <!-- lighter blue: #9BA8CF --> {| style="width:80%" border="0" align="center" ! colspan="3" align="center" style="background:#7B8ABD; ...")
 
 
(21 intermediate revisions by the same user not shown)
Line 1: Line 1:
 
{{2012_BASC:Header_Template | Agenda}}
 
{{2012_BASC:Header_Template | Agenda}}
 +
<!-- --------------------------------------------------------------------
 +
INSTRUCTIONS FOR EDITORS:
 +
 +
Updating this agenda is a 3-step process. First you must convert the existing entries to the
 +
new format. You can do these one at a time or all at once. Whatever is easiest. Second, you need to
 +
fill in the data for the presentation. Third, miscellaneous details should be cleaned up.
 +
 +
1) To convert a presentation to the new format:
 +
  - Most importantly, look at the 10:00 time slot and use it as an example.
 +
  - Find the time slot you want to modify.
 +
  - If it already has the Presentation Agenda Template then you are done
 +
  - Copy: {{2010_BASC:Presentaton_Agenda_Template|TYPE|To Be Determined Presentation|To Be Determined}}
 +
  - Delete the text that is in the time slot already. This requires great care.
 +
      You probably want to delete the lines that do not begin with a
 +
      pipe (|) or an open curly ({).
 +
  - Paste the text you copied into that time slot.
 +
  - Replace the word "TYPE" with either "Presentation" or "Keynote"
 +
 +
2) To fill in the appropriate data:
 +
  - Go to http://www.owasp.org/index.php/2010_BASC_Presentations and add
 +
    the presentation's abstract. If you don't have an abstract,
 +
    insert "Presentation abstract will be available shortly."
 +
  - Go to http://www.owasp.org/index.php/2010_BASC_Speakers and add the speaker(s) bio.
 +
    If you don't have bio information, just put the speaker's name into the page and
 +
    and make their bio "Speaker information will be available shortly."
 +
    Until it presents a problem, list multiple speakers as one.
 +
    For example, "John Boy & Grandpa".
 +
  - Find the right slot in the table.
 +
  - Replace the "To Be Determined Presentation" text in the table
 +
    with the presentation name __EXACTLY__ as it is on the presentation page.
 +
  - Replace the "To Be Determined" text in the table
 +
    with the speaker(s) name(s) __EXACTLY__ as it is on the bio page.
 +
 
 +
3) Clean up whatever needs cleaning up.
 +
 +
-------------------------------------------------------------------- -->
 +
 +
  
 
<!-- lighter blue: #9BA8CF -->
 
<!-- lighter blue: #9BA8CF -->
 
{| style="width:80%" border="0" align="center"
 
{| style="width:80%" border="0" align="center"
  ! colspan="3" align="center" style="background:#7B8ABD; color:white" |
+
  ! colspan="3" align="center" |
 +
<table>
 +
<tr>
 +
<td>
 +
[[File:OWASP Logo.gif]]<br/>
 +
</td>
 +
<td>
 +
<span style="font-size:150%">'''OWASP Boston Application Security Conference<br/>Saturday, October 13, 2012'''</span>
 +
</td>
 +
</tr>
 +
</table>
 +
|-
 +
| style="width:10%; background:#7B8ABD" align="center" | 8:30-9:30 || colspan="2" style="width:80%; background:#D2D2D2" align="center" |
 +
<div>
 +
<span style="font-size:130%">'''Breakfast and Registration'''</span><br/>
 +
provided by our Platinum Sponsor<br/>
 +
[[File:Akamai logo.jpg|link=http://www.akamai.com|Akamai]]
 +
</div>
 +
|-
 +
| style="width:10%; background:#7B8ABD" align="center" | 09:00-09:50 || colspan="2" style="width:80%; background:#B0B0B0;" align="center" |
 +
<div style="margin:10px;">
 +
<span style="font-size:130%">'''Keynote'''</span><br>
 +
<span style="font-size: 120%">[[2012_BASC_Speakers#Josh Corman|Josh Corman]]</span><br/>
 +
</div>
 +
|-
 +
| style="width:10%; background:#7B8ABD" | || align="center" style="width:30%; background:#CFA49B" | '''Track 1'''<br/>Horace Mann Room
 +
| align="center" style="width:30%; background:#DFC799;" | '''Track 2'''<br/>Deborah Sampson / Paul Thomas Room
 +
|-
 +
| style="width:10%; background:#7B8ABD" align="center" | 10:00-10:50 || style="width:30%; background:#BC857A" align="center" | 
 +
{{2012_BASC:Presentaton_Agenda_Template|Presentation|Metasploit Fundamental Elements - Course 1|Roy Wattanasin}}
 +
| style="width:30%; background:#BCA57A" align="center" |
 +
{{2012_BASC:Presentaton_Agenda_Template|Presentation|An Insider's Look: WAF and Identity and Access Management Integration|Barracuda Networks}}
 +
|-
 +
| style="width:10%; background:#7B8ABD" align="center" | 11:00-11:50 || style="width:30%; background:#CFA49B" align="center" |
 +
{{2012_BASC:Presentaton_Agenda_Template|Presentation|Metasploit Continued - Course 2|Roy Wattanasin}}
 +
| style="width:30%; background:#DFC799" align="center" |
 +
{{2012_BASC:Presentaton_Agenda_Template|Presentation|Worst practices: How to waste 100% of your security budget|Rob Cheyne}}
 +
|-
 +
| style="width:10%; background:#7B8ABD" align="center" | 12:00-13:00 || colspan="2" style="background:#D2D2D2" align="center" |
 +
<table>
 +
<tr>
 +
<td style="width:70%">
 +
<center>
 +
<span style="font-size:130%">'''Lunch'''</span><br/>
 +
provided by our Platinum Sponsor<br/>
 +
[[File:Imperva 250x34.jpg|300px|link=http://www.imperva.com|Imperva]]
 +
</center>
 +
</td>
 +
<td style="width:30%; background:#D2D2D2" align="center">
 +
<span style="font-size:100%">20-Minute Lightning Talk</span><br/>
 +
<span style="font-size: 130%">'''[[2012_BASC_Presentations#NSA Configuration Guidelines for Baseline Security|NSA Configuration Guidelines for Baseline Security]]'''</span><br/>
 +
<span style="font-size: 120%">[[2012_BASC_Speakers#Ray Cote|Ray Cote]]</span><br/>
 +
</td>
 +
</tr>
 +
</table>
 +
|-
 +
| style="width:10%; background:#7B8ABD" align="center" | 13:00-13:50 || style="width:30%; background:#BC857A" align="center" |
 +
{{2012_BASC:Presentaton_Agenda_Template|Presentation|Fuzzing and You:  How to Automate Whitebox Testing|Michael Anderson}}
 +
| style="width:30%; background:#BCA57A" align="center" |
 +
{{2012_BASC:Presentaton_Agenda_Template|Presentation|Securing Mobile Apps - Threat Modeling, Whitebox, Blackbox testing|Greg Wolford }}
 +
 
 +
|-
 +
| style="width:10%; background:#7B8ABD" align="center" | 14:00-14:50 || style="width:30%; background:#CFA49B" align="center" |
 +
{{2012_BASC:Presentaton_Agenda_Template|Presentation|Pitfalls of Secure SDLC and How to Succeed With Automation|Rohit Sethi & Ehsan Foroughi }}
 +
| style="width:30%; background:#DFC799" align="center" |
 +
{{2012_BASC:Presentaton_Agenda_Template|Presentation|Hiding Inside the "Real-Time Web" (to Take-Over the DMZ)|Matt Wood }}
 +
|-
 +
| style="width:10%; background:#7B8ABD" align="center" | 15:00-15:50 || style="width:30%; background:#BC857A" align="center" |
 +
{{2012_BASC:Presentaton_Agenda_Template|Presentation|Streamlining Application Vulnerability Management: Communication Between Development and Security Teams|Brian Mather}}
 +
 
 +
| style="width:30%; background:#BCA57A" align="center" |
 +
{{2012_BASC:Presentaton_Agenda_Template|Presentation|Top Ten Web Defenses|Jim Manico }}
 +
 
 +
|-
 +
| style="width:10%; background:#7B8ABD" align="center" | 16:00-16:50 || style="width:30%; background:#CFA49B" align="center" |
 +
{{2012_BASC:Presentaton_Agenda_Template|Presentation|Secure Password Storage: Increasing Resistance to Brute Force Attacks|John Steven, Chandu Ketkar, Scott Matsumoto}}
 +
| style="width:30%; background:#DFC799" align="center" |
 +
{{2012_BASC:Presentaton_Agenda_Template|Presentation|Offensive Mobile Forensics|Joey Peloquin }}
 +
|-
 +
 
 +
|-
 +
| style="width:10%; background:#7B8ABD" align="center" | 17:00-17:30 || colspan="2" style="width:30%; background:#D2D2D2" align="center" |
 +
<span style="font-size:130%">'''Social Time'''</span><br/>
 +
provided by our Platinum Sponsor<br/>
 +
[[File:Rapid7LogoSmall.png|300px|link=http://www.rapid7.com|Rapid7]]
 +
|-
 +
| style="width:10%; background:#7B8ABD" align="center" | 17:30-18:30 || colspan="2" style="width:30%; background:#B0B0B0" align="center" |
 +
<br/>
 +
 
 +
<div style="margin:10px;">
 +
<span style="font-size: 130%">'''[[2012_BASC_Presentations#CTF|Capture The Flag]] Results and Analysis'''</span><br/>
 +
</div>
 +
 
  
<h2>Saturday, October 13 </h2>  
+
<span style="font-size:130%">'''Prize Raffle'''</span><br>
 +
<br/>
 +
<span style="font-size:130%">'''Wrap Up'''</span><br>
  
<h3>Details TBD</h3>
 
  
 
|}
 
|}
  
 
{{2012_BASC:Footer_Template | Agenda}}
 
{{2012_BASC:Footer_Template | Agenda}}

Latest revision as of 16:05, 11 October 2012

2012 BASC: Home Agenda Presentations Speakers

Sponsorships Available

Platinum Sponsors (Listed Alphabetically)
Silver Sponsors (Listed Alphabetically)

Akamai




Imperva




Rapid7

Cigital

Denim Group

GlobalSign

NetSPI

Praetorian

Security Management Partners

We kindly thank our sponsors for their support. Please help us keep future BASCs free by viewing and visiting all of our sponsors.
Sponsorships are still available.

Agenda

OWASP Logo.gif

OWASP Boston Application Security Conference
Saturday, October 13, 2012

8:30-9:30

Breakfast and Registration
provided by our Platinum Sponsor
Akamai

09:00-09:50

Keynote
Josh Corman

Track 1
Horace Mann Room
Track 2
Deborah Sampson / Paul Thomas Room
10:00-10:50
11:00-11:50
12:00-13:00

Lunch
provided by our Platinum Sponsor
Imperva

20-Minute Lightning Talk
NSA Configuration Guidelines for Baseline Security
Ray Cote

13:00-13:50
14:00-14:50
15:00-15:50
16:00-16:50
17:00-17:30

Social Time
provided by our Platinum Sponsor
Rapid7

17:30-18:30


Capture The Flag Results and Analysis


Prize Raffle

Wrap Up


You can find out more about this conference at basc2012.org
Conference Organizer: Jim Weiler