Difference between revisions of "7th OWASP AppSec Conference - San Jose 2007/Agenda"

From OWASP
Jump to: navigation, search
(Tech Expo - November 13th-14th)
(OWASP & WASC AppSec 2007 Conference Schedule - Nov 14-15 (San Jose 2007))
Line 58: Line 58:
 
  | style="width:10%; background:#7B8ABD" | 10:00-10:30 || colspan="2" style="width:80%; background:#F2F2F2" align="left" | An Introduction to WASC and its projects – Jeremiah Grossman, CTO, WhiteHat Security
 
  | style="width:10%; background:#7B8ABD" | 10:00-10:30 || colspan="2" style="width:80%; background:#F2F2F2" align="left" | An Introduction to WASC and its projects – Jeremiah Grossman, CTO, WhiteHat Security
 
  |-
 
  |-
  | style="width:10%; background:#7B8ABD" | 10:30-11:10 || colspan="2" style="width:80%; background:#F2F2F2" align="left" | OWASP State of the Union, Dinis Cruz, Chief OWASP Evangelist
+
  | style="width:10%; background:#7B8ABD" | 10:30-11:00 || colspan="2" style="width:80%; background:#F2F2F2" align="left" | Using OWASP, Jeff Williams, OWASP Chair and CEO - Aspect Security
 
  |-
 
  |-
  | style="width:10%; background:#7B8ABD" | 11:10-11:30 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Break
+
  | style="width:10%; background:#7B8ABD" | 11:00-11:20 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Break
 
  |-
 
  |-
  | style="width:10%; background:#7B8ABD" | 11:30-12:30 || style="width:40%; background:#BC857A" align="left" | For my next trick... hacking Web 2.0 – Petko D. Petkov (AKA PDP Architect), Senior Security Researcher
+
  | style="width:10%; background:#7B8ABD" | 11:20-12:20 || style="width:40%; background:#BC857A" align="left" | For my next trick... hacking Web 2.0 – Petko D. Petkov (AKA PDP Architect), Senior Security Researcher
 
  | style="width:40%; background:#BCA57A" align="left" | Backdoors and other Developer Introduced 'Features', Chris Wysopal, CTO Veracode
 
  | style="width:40%; background:#BCA57A" align="left" | Backdoors and other Developer Introduced 'Features', Chris Wysopal, CTO Veracode
 
  |-
 
  |-
  | style="width:10%; background:#7B8ABD" | 12:30-13:45 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Lunch
+
  | style="width:10%; background:#7B8ABD" | 12:20-13:45 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Lunch
 
  |-
 
  |-
 
  | style="width:10%; background:#7B8ABD" | 13:45-14:30 || style="width:40%; background:#BC857A" align="left" | CSRF: Danger, Detection, and Defenses – Introducing two new OWASP CSRF Tools, Dave Wichers, COO Aspect Security and OWASP Conferences Chair
 
  | style="width:10%; background:#7B8ABD" | 13:45-14:30 || style="width:40%; background:#BC857A" align="left" | CSRF: Danger, Detection, and Defenses – Introducing two new OWASP CSRF Tools, Dave Wichers, COO Aspect Security and OWASP Conferences Chair
Line 98: Line 98:
 
  | style="width:10%; background:#7B8ABD" | 08:00-09:00 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Coffee
 
  | style="width:10%; background:#7B8ABD" | 08:00-09:00 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Coffee
 
  |-
 
  |-
  | style="width:10%; background:#7B8ABD" | 09:00-09:50 || colspan="2" style="width:80%; background:#F2F2F2" align="left" | Keynote:  DTCC Application Security Program, Jim Routh, CISO for the Depository Trust and Clearing Corporation (DTCC)
+
  | style="width:10%; background:#7B8ABD" | 09:00-9:50 || colspan="2" style="width:80%; background:#F2F2F2" align="left" | Keynote:  DTCC Application Security Program, Jim Routh, CISO for the Depository Trust and Clearing Corporation (DTCC)
 
  |-
 
  |-
  | style="width:10%; background:#7B8ABD" | 09:50-10:50 || colspan="2" style="width:80%; background:#F2F2F2" align="left" | Using OWASP, Jeff Williams, OWASP Chair and CEO - Aspect Security
+
  | style="width:10%; background:#7B8ABD" | 9:50-10:30 || colspan="2" style="width:80%; background:#F2F2F2" align="left" | OWASP State of the Union, Dinis Cruz, Chief OWASP Evangelist
 
  |-
 
  |-
  | style="width:10%; background:#7B8ABD" | 10:50-11:10 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Break
+
  | style="width:10%; background:#7B8ABD" | 10:30-10:50 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Break
 
  |-
 
  |-
  | style="width:10%; background:#7B8ABD" | 11:10-11:50 || style="width:40%; background:#BC857A" align="left" | Finding Vulnerabilities in Flash Applications, Stefano Di Paola, CTO Minded Security
+
  | style="width:10%; background:#7B8ABD" | 10:50-11:30 || style="width:40%; background:#BC857A" align="left" | Finding Vulnerabilities in Flash Applications, Stefano Di Paola, CTO Minded Security
 
  | style="width:40%; background:#BCA57A" align="left" | Start Rolling with Rails Security, Corey Benninger, Principal Consultant, Intrepidus Group, Inc.
 
  | style="width:40%; background:#BCA57A" align="left" | Start Rolling with Rails Security, Corey Benninger, Principal Consultant, Intrepidus Group, Inc.
 
  |-
 
  |-
  | style="width:10%; background:#7B8ABD" | 11:50-12:30 || style="width:40%; background:#BC857A" align="left" | OWASP Enterprise Security API (ESAPI) – Jeff Williams, CEO Aspect Security and OWASP Chair
+
  | style="width:10%; background:#7B8ABD" | 11:30-12:30 || style="width:40%; background:#BC857A" align="left" | OWASP Enterprise Security API (ESAPI) – Jeff Williams, CEO Aspect Security and OWASP Chair
 
  | style="width:40%; background:#BCA57A" align="left" | Securing Java Server Faces against the OWASP Top 10, David Chandler, Web Architect, Digital Insight
 
  | style="width:40%; background:#BCA57A" align="left" | Securing Java Server Faces against the OWASP Top 10, David Chandler, Web Architect, Digital Insight
 
  |-
 
  |-

Revision as of 13:06, 4 October 2007

The agenda for the conference is still under development and is subject to change.

The Web Services Security Track, which is the 3rd track on Day 1, is at the bottom of this page.

Contents

OWASP & WASC AppSec 2007 Training Courses - Nov 12th-13th 2007

The tutorials and the conference itself will be held at eBay in San Jose.


T1. Building and Testing Secure Web Applications
This powerful two-day course focuses on the most common web application security problems, including the OWASP Top Ten. The course will introduce and demonstrate hacking techniques, illustrating how easily application vulnerabilities can be exploited so students really understand how to avoid introducing such vulnerabilities into their code. Read more here!
T2. Secure Coding for Java EE
This Java focused course covers the most common Java EE web application security problems, including the OWASP Top Ten. It teaches Java EE best practices, so developers can really understand how to avoid introducing such vulnerabilities into their Java EE applications. This course includes hands on coding exercises that allows the students to fix real flaws in a Java EE application using the best practices recommended in class!! Read more here!
T3. Secure Coding .NET Web Applications
This .NET focused course covers the most common .NET web application security problems, including the OWASP Top Ten. It teaches .NET best practices, so developers can really understand how to avoid introducing such vulnerabilities into their .NET web applications. This course includes hands on coding exercises that allows the students to fix real flaws in a .NET application using the best practices recommended in class!! Read more here!
T4. Web Services and XML Security
Many enterprises are currently developing new Web Services and/or adding and acquiring Web Services functionality into existing applications -- now is the time to build security into the system! Read more here!
T5. Leveraging OWASP Tools and Documents to Secure Your Enterprise
Apart from OWASP's Top 10, most OWASP projects are not widely used and understood. In most cases this is not due to lack of quality and usefulness of these Document & Tool projects, but due to a lack of understanding of where they fit in an Enterprise's security ecosystem or in the Web Application Development Lifecycle (WADL). This course aims to change that by providing detailed presentations of the most mature and enterprise ready OWASP projects together with practical examples of how to use them. Read more here!

Tech Expo - Nov 13th-14th

Product vendors will be demonstrating their application security products to conference attendees for the first time at this OWASP Conference. The intended focus of this expo is on the technical details of the technologies they are offering in the market to help organizations deal with their application security issues.

The technology expo will be held:

  • November 13th: From 12-2, with lunch included for all the OWASP tutorial attendees who will be invited to attend the expo.
  • November 14th: From 11-5 during the first day of the OWASP conference.

Breach Cocktail Party - Nov 13

To close out the training event and the first day of the tech expo, Breach has kindly agreed to arrange a cocktail party on Tuesday evening. They sponsored a similar event at Black Hat for a joint OWASP / WASC get together and it was a roaring success with over 300 attendees. These have always been great events at previous conferences. Hope to see you there. More details will be posted when available.

OWASP & WASC AppSec 2007 Conference Schedule - Nov 14-15 (San Jose 2007)

Day 1 - Nov 14, 2007
Track 1: Track 2:
08:00-09:00 Registration and Coffee
09:00-09:10 Welcome to OWASP & WASC AppSec 2007 Conference: Dave Wichers, OWASP Conferences Chair and COO Aspect Security
09:10-10:00 Keynote: eBay Application Security Program – Dave Cullinane, CISO - eBay and Michael Barrett, CISO - PayPal
10:00-10:30 An Introduction to WASC and its projects – Jeremiah Grossman, CTO, WhiteHat Security
10:30-11:00 Using OWASP, Jeff Williams, OWASP Chair and CEO - Aspect Security
11:00-11:20 Break
11:20-12:20 For my next trick... hacking Web 2.0 – Petko D. Petkov (AKA PDP Architect), Senior Security Researcher Backdoors and other Developer Introduced 'Features', Chris Wysopal, CTO Veracode
12:20-13:45 Lunch
13:45-14:30 CSRF: Danger, Detection, and Defenses – Introducing two new OWASP CSRF Tools, Dave Wichers, COO Aspect Security and OWASP Conferences Chair WASC Distributed Open Proxy Honeypot Project, Ryan Barnett, WASC Open Proxy Honeypot Project Lead, Breach Security
14:30-15:10 Defeating Web 2.0 Attacks without Recoding Applications, Amichai Shulman, CTO, Imperva Dangers of Third Party Content, Tom Stripling, Senior Security Consultant - Security PS
15:10-15:30 Break
15:30-16:40 OWASP Projects Overview, Dinis Cruz, Chief OWASP Evangelist Web Browser (In)-Security - "Past, Present, and Future", Robert "RSnake" Hansen, CEO SecTheory
16:40-17:00 Break
17:00-18:00 Panel: “Building an Effective Application Security Assurance Program”

Moderator: Brian Bertacini, Sr. Manager, AppSec Consulting

Panelists: Jeff Williams - CEO Aspect Security, Andy Steingruebl - Principal Security Engineer PayPal, Gary Terrell, Adobe Systems, Scott Stender, iSEC Partners, Neil Daswani, Google

18:00-19:00 Chapter Leads Meeting - With Dinis Cruz
19:00-21:00 OWASP Social Gathering: Dinner and Drinks at Nearby Restaurant (TBD)
~01:00-??:?? OWASP Band ???
Day 2 - Nov 15, 2007
Track 1: Track 2:
08:00-09:00 Coffee
09:00-9:50 Keynote: DTCC Application Security Program, Jim Routh, CISO for the Depository Trust and Clearing Corporation (DTCC)
9:50-10:30 OWASP State of the Union, Dinis Cruz, Chief OWASP Evangelist
10:30-10:50 Break
10:50-11:30 Finding Vulnerabilities in Flash Applications, Stefano Di Paola, CTO Minded Security Start Rolling with Rails Security, Corey Benninger, Principal Consultant, Intrepidus Group, Inc.
11:30-12:30 OWASP Enterprise Security API (ESAPI) – Jeff Williams, CEO Aspect Security and OWASP Chair Securing Java Server Faces against the OWASP Top 10, David Chandler, Web Architect, Digital Insight
12:30-13:45 Lunch
13:45-14:30 The MySpace Worm, by its author: Samy Kamkar .Net Web Services Hacking - Scan, Attacks and Defense, Sheeraj Shah, Blueinfy
14:30-15:20 OWASP SpoC Project: Anti Samy - Picking a Fight with XSS, Arshan Dabirsiaghi, Application Security Engineer, Aspect Security Website Vulnerability Statistics, Arian Evans (Director of Operations, WhiteHat Security)
15:20-15:40 Break
15:40-16:30 The PKI Lie – Attacking Certificate-Based Authentication , Ofer Maor, CTO Hacktics TBD
16:30-17:30 Panel: Responsible "Website" Vulnerability Disclosure

Moderator: TBD

Panelists: TBD

Panel: Outsourcing: Financial Dream or Security Nightmare?

Moderator: Rohyt Belani, Managing Partner, Intrepidus Group

Panelists: Warren Axelrod – Chief Privacy Officer & Business Information Security Office for US Trust, Renato Delatorre – Director of Network Security & Risk Management for Verizon Wireless, and others TBD

17:30-17:45 Conference Wrap Up - Dave Wichers, OWASP Conferences Chair
19:00-21:00 Microsoft Sponsored Cocktail Party: Drinks at Nearby Location (to be announced)

Nov 14: Track 3: Web Services Security

Day 1 - Nov 14, 2007
Track 3: Web Services Security
11:10-11:30 Break
11:30-12:30 Web Services Security: Challenges and Techniques, Anoop Singhal, NIST
12:30-13:45 Lunch
13:45-14:30 Centralized, Dynamic Web Services Security and Policy Management, Richard Salz, IBM
14:30-15:10 Covert CDATA Channels, XML Bombs, and Unexpected Attachments: Case Notes from a real-life XML Web Services Vulnerability Assessment, Mark O'Neill, CTO Vordel
15:10-15:30 Break
15:30-16:40 Attacking XML Security, Brad Hill, Principal Security Consultant, iSEC Partners