Difference between revisions of "AppSecEU2011"

From OWASP
Jump to: navigation, search
(Schedule)
 
(47 intermediate revisions by 5 users not shown)
Line 7: Line 7:
 
| align="center" | [[Image:Banner-trinity-web.jpg]]  
 
| align="center" | [[Image:Banner-trinity-web.jpg]]  
 
| align="center" |  
 
| align="center" |  
 +
*[http://www.appseceu.org AppSec EU Website]
 
*[http://www.owasp.org/images/1/19/AppSecEU_2011_Announcement.pdf Press Release]
 
*[http://www.owasp.org/images/1/19/AppSecEU_2011_Announcement.pdf Press Release]
 
*[[AppSecEU2011/Media Mentions|Media Mentions]]
 
*[[AppSecEU2011/Media Mentions|Media Mentions]]
Line 43: Line 44:
 
*Executives, Managers, and Staff Responsible for IT Security Governance  
 
*Executives, Managers, and Staff Responsible for IT Security Governance  
 
*IT Professionals Interested in Improving IT Security<br>
 
*IT Professionals Interested in Improving IT Security<br>
 +
<br>
 +
'''How to get to AppSec EU?'''
  
'''Location Map'''  
+
The OWASP AppSec EU Conference takes place in the Arts Building in the grounds of Trinity College, Dublin 2. You could find a copy of the Trinity College grounds and some directions on how to get to the Arts Building in the URL below.
 +
 
 +
[http://www.appseceu.org/?page_id=817 AppSec EU Venue Location]
 +
 
 +
 
 +
 
 +
'''Are you an exhibitor and need to load/offload materials at Trinity College?
 +
'''
 +
Below is the map to the Arts Building Loading Bay:
  
 
[https://www.owasp.org/images/c/ce/Campus_map_with_Arts_Building_Loading_Bay_vehicular_route.pdf Campus Map]
 
[https://www.owasp.org/images/c/ce/Campus_map_with_Arts_Building_Loading_Bay_vehicular_route.pdf Campus Map]
 +
<br><br>
  
'''Have you visited our website?''  
+
'''Have you visited our AppSec EU conference website?'''  
  
 
[http://www.appseceu.org AppSec EU Conference Website]
 
[http://www.appseceu.org AppSec EU Conference Website]
 +
<br><br>
 +
 +
 +
'''Sponsorship Options'''
 +
 +
To find out more about the different sponsorship opportunities please check the document below:
 +
 +
[http://www.appseceu.org/wp-content/uploads/2011/03/AppSecEU_Sponsorship_Packages.pdf AppSec EU Sponsorship Packages]
  
  
Line 218: Line 238:
 
|-
 
|-
 
| style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 09:00-10:00
 
| style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 09:00-10:00
| align="center" colspan="3" style="width: 80%; background: none repeat scroll 0% 0% rgb(252, 252, 150);" | Keynote: Brad Arkin, Adobe Corp.
+
| align="center" colspan="3" style="width: 80%; background: none repeat scroll 0% 0% rgb(252, 252, 150);" | Keynote: Brad Arkin, Adobe Corp | [http://www.appseceu.org/wp-content/presentations/Brad%20Arkin%20-%20Adobe%20Product%20Security%20Lifecycle.pdf SLIDES]
 
|-
 
|-
 
| style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 10:00-10:30
 
| style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 10:00-10:30
|align="center" colspan="3" style="width: 80%; background: none repeat scroll 0% 0% rgb(252, 252, 150);" | OWASP Global Board Update - Tom Brennan, Eoin Keary, Seba Deleersnyder
+
|align="center" colspan="3" style="width: 80%; background: none repeat scroll 0% 0% rgb(252, 252, 150);" | [https://www.owasp.org/images/8/8e/OWASP_Global_Board_Update_AppSecEU11_consolidated_-v3.pptx OWASP Global Board Update] - Tom Brennan, Eoin Keary, Seba Deleersnyder
 
|-
 
|-
 
| style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 10:30-10:45  
 
| style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 10:30-10:45  
Line 227: Line 247:
 
|-
 
|-
 
| style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 10:45-11:30  
 
| style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 10:45-11:30  
| align="left" style="width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);" | Practical Browser Sandboxing on Windows with Chromium, ''Tom Keetch, Verizon Business''<br>  
+
| align="left" style="width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);" | Practical Browser Sandboxing on Windows with Chromium, ''Tom Keetch, Verizon Business'' <br> [http://www.appseceu.org/wp-content/presentations/Tom%20Keetch%20-%20Practical%20Sandboxing%20with%20Chromium.pdf SLIDES]<br>  
| align="left" style="width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);" | Building a Robust Security Plan, ''Narainder Chandwani, Foundstone''<br>  
+
| align="left" style="width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);" | Building a Robust Security Plan, ''Narainder Chandwani, Foundstone'' <br> [http://www.appseceu.org/wp-content/presentations/Narainder%20Chandwani%20-%20Building%20a%20Robust%20Application%20Security%20Plan.pdf SLIDES]<br>  
| align="left" style="width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);" | APT in a Nutshell, "David Stubley, 7 Elements Ltd" <br>
+
| align="left" style="width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);" | APT in a Nutshell, "David Stubley, 7 Elements Ltd" <br> [http://www.appseceu.org/wp-content/presentations/David%20Stubley%20-%20APT%20in%20a%20Nutshell.pdf SLIDES]<br>
 
|-
 
|-
 
| style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 11:30-11:40  
 
| style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 11:30-11:40  
Line 235: Line 255:
 
|-
 
|-
 
| style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 11:40-12:25  
 
| style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 11:40-12:25  
| align="left" style="width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);" | How to become Twitter's admin:  An introduction to Modern Web Service Attacks, ''Andreas Falkenberg, RUB''<br>  
+
| align="left" style="width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);" | How to become Twitter's admin:  An introduction to Modern Web Service Attacks, ''Andreas Falkenberg, RUB''<br>[http://www.appseceu.org/wp-content/presentations/Andreas%20Falkenberg%20-%20How%20to%20become%20twitter%20admin.pdf SLIDES]<br>
 
<br>  
 
<br>  
  
| align="left" style="width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);" | The missing link:  Turning Securable apps into secure installations using SCAP, ''Charles Schmidt, MITRE Corp.''<br>  
+
| align="left" style="width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);" | The missing link:  Turning Securable apps into secure installations using SCAP, ''Charles Schmidt, MITRE Corp.'' <br> [http://www.appseceu.org/wp-content/presentations/Charles%20Schmidt%20-%20The%20Missing%20Link.pdf SLIDES]<br>  
 
<br>  
 
<br>  
  
| align="left" style="width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);" | The Buzz about Fuzz:  An enhanced approach to finding vulnerabilities, ''Joe Basirico, Security Innovation''<br>
+
| align="left" style="width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);" | The Buzz about Fuzz:  An enhanced approach to finding vulnerabilities, ''Joe Basirico, Security Innovation'' <br> [http://www.appseceu.org/wp-content/presentations/Joe%20Basirico%20-%20Whats%20the%20Buzz%20About%20Fuzz.pdf SLIDES]<br>
 
|-
 
|-
 
| style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 12:25-13:25  
 
| style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 12:25-13:25  
Line 247: Line 267:
 
|-
 
|-
 
| style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 13:25-14:25  
 
| style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 13:25-14:25  
| align="center" colspan="3" style="width: 80%; background: none repeat scroll 0% 0% rgb(252, 252, 150);" | Keynote: Giles Hogben, ENISA
+
| align="center" colspan="3" style="width: 80%; background: none repeat scroll 0% 0% rgb(252, 252, 150);" | Keynote: Giles Hogben, ENISA | [https://www.owasp.org/index.php/File:Giles_Hogben_-_Smartphones,_App-stores_and_HTML_5.pdf SLIDES]<br>
 
|-
 
|-
 
| style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 14:25-14:40  
 
| style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 14:25-14:40  
Line 253: Line 273:
 
|-
 
|-
 
| style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 14:40-15:25  
 
| style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 14:40-15:25  
| align="left" style="width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);" | OWASP Secure Coding Practices Quick Reference Guide, ''Keith Turpin, The Boeing Company''<br>  
+
| align="left" style="width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);" | OWASP Secure Coding Practices Quick Reference Guide, ''Keith Turpin, The Boeing Company'' <br> [http://www.appseceu.org/wp-content/presentations/Keith%20Turpin%20-%20Secure%20Coding%20Practices%20Quick%20Ref%20Guide.pdf SLIDES]<br>  
| align="left" style="width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);" | Integrating security testing into a SDLC:  what we learned and have the scars to prove it, ''Mark Crosbie, IBM''<br>  
+
| align="left" style="width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);" | Integrating security testing into a SDLC:  what we learned and have the scars to prove it, ''Mark Crosbie, IBM'' <br> [http://www.appseceu.org/wp-content/presentations/Mark%20Crosbie%20-%20Integrating%20Security%20Testing%20into%20a%20SDLC.pdf SLIDES]<br>  
| align="left" style="width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);" | Intranet Footprinting:  Discovering Resources from outside, ''Javier Marcos de Prado & Juan Galiana Lara, IBM''
+
| align="left" style="width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);" | Intranet Footprinting:  Discovering Resources from outside, ''Javier Marcos de Prado & Juan Galiana Lara, IBM'' <br> [http://www.appseceu.org/wp-content/presentations/JM%20del%20Prado%20%26%20JG%20Lara%20-%20Intranet%20Footprinting.pdf SLIDES]
 
|-
 
|-
 
| style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 15:25-15:40  
 
| style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 15:25-15:40  
Line 261: Line 281:
 
|-
 
|-
 
| style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 15:40-16:25  
 
| style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 15:40-16:25  
| align="left" style="width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);" | Building Large Scale Detectors for Web-based Malware, ''Marco Balduzzi & Davide Canali, EURECOM''<br>  
+
| align="left" style="width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);" | Building Large Scale Detectors for Web-based Malware, ''Marco Balduzzi & Davide Canali, EURECOM''<br>[http://www.appseceu.org/wp-content/presentations/Marco%20Cova%20%26%20Davide%20Canali%20-%20Building%20Large%20Scale%20Detectors%20for%20Web%20Based%20Malware.pdf SLIDES]<br>
| align="left" style="width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);" | Infosec Stats:  Reading between the lines, ''Chris Eng, Veracode''<br>  
+
| align="left" style="width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);" | Infosec Stats:  Reading between the lines, ''Chris Eng, Veracode''<br> [http://www.appseceu.org/wp-content/presentations/Chris%20Eng%20-%20Reading%20Between%20the%20Lines.pdf SLIDES]<br>
| align="left" style="width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);" | Python Basics for Web App Pentesters, ''Justin Searle, InGuardians Inc''  
+
| align="left" style="width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);" | Python Basics for Web App Pentesters, ''Justin Searle, InGuardians Inc'' <br>[http://www.appseceu.org/wp-content/presentations/Justin%20Searle%20-%20Python%20Basics%20for%20Web%20App%20Pentesters.pdf SLIDES]<br>
 
|-
 
|-
 
| style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 16:25-16:35
 
| style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 16:25-16:35
Line 269: Line 289:
 
|-
 
|-
 
| style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 16:35-17:20  
 
| style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 16:35-17:20  
| align="left" style="width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);" | OWASP AppSensor Project, ''Colin Watson, Watson Hall Ltd''<br>  
+
| align="left" style="width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);" | OWASP AppSensor Project, ''Colin Watson, Watson Hall Ltd''<br> [http://www.appseceu.org/wp-content/presentations/Colin%20Watson%20-%20OWASP%20AppSensor%20Project.pdf SLIDES]<br>
| align="left" style="width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);" | A buffer overflow Story:  From Responsible Disclosure to Closure, ''Douglas Held, Fortify (HP)''<br>  
+
| align="left" style="width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);" | A buffer overflow Story:  From Responsible Disclosure to Closure, ''Douglas Held, Fortify (HP)''<br> [http://www.appseceu.org/wp-content/presentations/Doug%20Held%20-%20A%20Buffer%20Overflow%20Story.pdf SLIDES]<br>
| align="left" style="width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);" | CTF:  Bringing back more than sexy!, ''Mark Hillick, HackEire''  
+
| align="left" style="width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);" | CTF:  Bringing back more than sexy!, ''Mark Hillick, KTF'' <br>[http://www.appseceu.org/wp-content/presentations/Mark%20Hillick%20-%20CTF%20Bring%20back%20more%20than%20sexy.pdf SLIDES]
 
|-
 
|-
 
| style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" |  
 
| style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" |  
Line 303: Line 323:
 
|-
 
|-
 
| style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 09:00-10:00
 
| style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 09:00-10:00
| align="center" colspan="3" style="width: 80%; background: none repeat scroll 0% 0% rgb(252, 252, 150);" | Keynote: Janne Uusilehto, Nokia.
+
| align="center" colspan="3" style="width: 80%; background: none repeat scroll 0% 0% rgb(252, 252, 150);" | Keynote: Janne Uusilehto, Nokia | [http://www.appseceu.org/wp-content/presentations/Janne%20Uusilehto%20-%20Is%20SW%20Security%20just%20coding%3f.pdf SLIDES]
 
|-
 
|-
| style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 10:00-10:15
+
| style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 10:00-10:10
|align="center" colspan="3" style="width: 80%; background: none repeat scroll 0% 0% rgb(194, 194, 194);" | Coffee Break
+
|align="center" colspan="3" style="width: 80%; background: none repeat scroll 0% 0% rgb(194, 194, 194);" | Break
 
|-
 
|-
| style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 10:15-11:00
+
| style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 10:10-10:55
| align="left" style="width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);" | Software Security:  Is OK Good Enough?, ''John Dickson, Denim Group Ltd.''<br>  
+
| align="left" style="width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);" | Software Security:  Is OK Good Enough?, ''John Dickson, Denim Group Ltd.''<br> [http://www.appseceu.org/wp-content/presentations/John%20Dickson%20-%20Software%20Security%20Is%20OK%20Good%20Enough.pdf SLIDES] <br>
| align="left" style="width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);" | An Overview of Threat Modeling, ''Paco Hope, Cigital Inc.''<br>  
+
| align="left" style="width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);" | An Overview of Threat Modeling, ''Paco Hope, Cigital Inc.''<br> [http://www.appseceu.org/wp-content/presentations/Paco%20Hope%20-%20Threat%20Modeling%20Overview.pdf SLIDES]<br>
| align="left" style="width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);" | An Introduction to the OWASP Zed Attack Proxy, "Simon Bennetts, OWASP" <br>
+
| align="left" style="width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);" | An Introduction to the OWASP Zed Attack Proxy, "Simon Bennetts, OWASP" <br>[http://www.appseceu.org/wp-content/presentations/Simon%20Bennetts%20-%20OWASP%20Zed%20Attack%20Proxy.pdf SLIDES]<br>
 
|-
 
|-
| style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 11:00-11:10  
+
| style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 10:55-11:10  
| align="center" colspan="3" style="width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);" | Break  
+
| align="center" colspan="3" style="width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);" | Coffee Break  
 
|-
 
|-
 
| style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 11:10-11:55  
 
| style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 11:10-11:55  
| align="left" style="width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);" | New standards and upcoming technologies in browser security, ''Tobias Gondrom, IETF WG''<br>  
+
| align="left" style="width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);" | New standards and upcoming technologies in browser security, ''Tobias Gondrom, IETF WG''<br> [http://www.appseceu.org/wp-content/presentations/Tobias%20Gondrom%20-%20New%20standards%20and%20upcoming%20technologies%20in%20browser%20security.pdf SLIDES]<br>
 
<br>  
 
<br>  
  
| align="left" style="width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);" | Simple Approach to Sepcifying Security Requirements for Online Developments, ''Alexis Fitzgerald, RITS''<br>  
+
| align="left" style="width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);" | Simple Approach to Sepcifying Security Requirements for Online Developments, ''Alexis Fitzgerald, RITS''<br>[http://www.appseceu.org/wp-content/presentations/Alexis%20FitzGerald%20-%20Simple%20Approach%20to%20Specifying%20Security%20Requirements.pdf SLIDES]<br>
 
<br>  
 
<br>  
  
| align="left" style="width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);" | A Case Study on Enterprise E-mail (in) Security Solutions, ''Marian Ventuneac, Genworth Financial''<br>
+
| align="left" style="width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);" | A Case Study on Enterprise E-mail (in) Security Solutions, ''Marian Ventuneac, Genworth Financial''<br>[http://www.appseceu.org/wp-content/presentations/Marian%20Ventuneac%20-%20Case%20Study%20on%20Enterprise%20E-mail%20(in)Security%20Solutions.pdf SLIDES]<br>
 
|-
 
|-
 
| style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 11:55-12:05
 
| style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 11:55-12:05
Line 329: Line 349:
 
|-
 
|-
 
| style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 12:05-12:50  
 
| style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 12:05-12:50  
| align="left" style="width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);" | Six Key Application Security Program Metrics, ''Arian Evans, Whitehat Security''<br>  
+
| align="left" style="width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);" | Empty Slot<br>
 
<br>  
 
<br>  
  
| align="left" style="width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);" | A Critical Look at the Classification Schemes for Privacy Risks, ''Elke Roth-Mandutz and Georg Simon, Ohm University''<br>  
+
| align="left" style="width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);" | A Critical Look at the Classification Schemes for Privacy Risks, ''Elke Roth-Mandutz and Georg Simon, Ohm University''<br> [http://www.appseceu.org/wp-content/presentations/Elke%20Roth-Mandutz%20-%20A%20Critical%20Look%20at%20Classification%20Schemes%20for%20Privacy%20Risks.pdf SLIDES]<br>
 
<br>  
 
<br>  
  
| align="left" style="width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);" | Testing Security Testing:  Evaluating Quality of Security Testing, ''Ofer Maor, Seeker Security''<br>
+
| align="left" style="width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);" | Testing Security Testing:  Evaluating Quality of Security Testing, ''Ofer Maor, Seeker Security''<br>[http://www.appseceu.org/wp-content/presentations/Ofer%20Maor%20-%20Testing%20Security%20Testing.pdf SLIDES]<br>
 
|-
 
|-
 
| style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 12:50-13:50
 
| style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 12:50-13:50
Line 342: Line 362:
 
|-
 
|-
 
| style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 13:50-14:50  
 
| style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 13:50-14:50  
| align="center" colspan="3" style="width: 80%; background: none repeat scroll 0% 0% rgb(252, 252, 150);" | Keynote: Alex Lucas, Microsoft
+
| align="center" colspan="3" style="width: 80%; background: none repeat scroll 0% 0% rgb(252, 252, 150);" | Keynote: Alex Lucas, Microsoft | [http://www.appseceu.org/wp-content/presentations/Alex%20Lucas%20-%20Security%20Science,%20The%20SDL%20and%20Openness.pdf SLIDES]
 
|-
 
|-
 
| style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 14:50-15:00  
 
| style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 14:50-15:00  
Line 348: Line 368:
 
|-
 
|-
 
| style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 15:00-15:45  
 
| style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 15:00-15:45  
| align="left" style="width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);" | Putting the Smart into Smartphones:  Security Testing Mobile Applications, ''Dan Cornell, Denim Group''<br>  
+
| align="left" style="width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);" | Putting the Smart into Smartphones:  Security Testing Mobile Applications, ''Dan Cornell, Denim Group''<br> [http://www.appseceu.org/wp-content/presentations/Dan%20Cornell%20-%20Putting%20the%20Smart%20in%20Smartphones-Security%20Testing%20Mobile%20Applications.pdf SLIDES]<br>
| align="left" style="width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);" | Security Design and Coding Reviews for Java Applications using AOP Techniques and Open Source Tools, ''Srini Penchikala, InfoQ''<br>  
+
| align="left" style="width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);" | Wordpress Security, ''Steve Lord, Mandalorian Security Ltd.''<br>  
| align="left" style="width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);" | The Dark Side:  Measuring and Analyzing Malicious Activity On Twitter, ''Daniel Peck, Barracuda Networks''
+
| align="left" style="width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);" | The Dark Side:  Measuring and Analyzing Malicious Activity On Twitter, ''Daniel Peck, Barracuda Networks''<br>[http://www.appseceu.org/wp-content/presentations/Daniel%20Peck%20-%20The%20Dark%20Side%20of%20Social%20Networking.pdf SLIDES]<br>
 
|-
 
|-
 
| style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 15:45-16:00  
 
| style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 15:45-16:00  
Line 356: Line 376:
 
|-
 
|-
 
| style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 16:00-16:45  
 
| style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 16:00-16:45  
| align="left" style="width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);" | Threat modeling of banking malware-based attacks using the P.A.S.T.A. framework, ''Marco Morana, Cincinnati Chapter Lead & Tony UcedaVelez, VerSprite''<br>  
+
| align="left" style="width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);" | Threat modeling of banking malware-based attacks using the P.A.S.T.A. framework, ''Marco Morana, Cincinnati Chapter Lead & Tony UcedaVelez, VerSprite''<br> [https://www.owasp.org/index.php/File:Marco_Morana_and_Tony_UV_-_Threat_Modeling_of_Banking_Malware.pdf SLIDES]<br>
 
| align="left" style="width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);" | PCI DSS v2.0:  a new challenge for web application security testing?, ''Laurent Benameur Sauvaire, Espion, Ltd.''<br>  
 
| align="left" style="width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);" | PCI DSS v2.0:  a new challenge for web application security testing?, ''Laurent Benameur Sauvaire, Espion, Ltd.''<br>  
| align="left" style="width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);" | Practical Crypto Attacks Against Web Applications, ''Justin Clarke, Gotham Digital Science''  
+
| align="left" style="width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);" | Practical Crypto Attacks Against Web Applications, ''Justin Clarke, Gotham Digital Science'' <br>[http://www.appseceu.org/wp-content/presentations/Justin%20Clarke%20-%20Practical%20Crypto%20Attacks%20against%20Web%20Apps.pdf SLIDES]<br>
 
|-
 
|-
 
| style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 16:45-16:55
 
| style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 16:45-16:55
Line 365: Line 385:
 
| style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 16:55-17:40  
 
| style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 16:55-17:40  
  
| align="center" colspan="3" style="width: 80%; background: none repeat scroll 0% 0% rgb(252, 252, 150);" | Keynote: Ivan Ristic, Qualys
+
| align="center" colspan="3" style="width: 80%; background: none repeat scroll 0% 0% rgb(252, 252, 150);" | Keynote: Arian Evans, Whitehat Security
  
 
|-
 
|-
Line 448: Line 468:
 
==== Team  ====
 
==== Team  ====
  
'''Eoin Keary''' - eoin.keary 'at' owasp.org<br>
+
'''AppSec EU Conference Team'''
'''Fabio Cerullo'''  - fcerullo 'at' owasp.org<br>
+
 
'''Fiona Walsh''' - fiona.walsh 'at' owasp.org<br>
+
'''Chairs'''
'''Rahim Jina''' - rahim.jina 'at' owasp.org<br>
+
 
'''Kate Hartmann''' - kate.hartmann 'at' owasp.org<br>
+
Eoin Keary<br>
 +
Fabio Cerullo<br>
 +
Fiona Walsh<br>
 +
 
 +
'''Operations'''
 +
 
 +
Kate Hartmann<br>
 +
Lorna Alamri<br>
 +
Sarah Baso<br>
 +
Ana Loza<br>
 +
Ralph Durkee<br>
 +
 
 +
'''Volunteers'''
 +
 
 +
Owen Pendlebury<br>
 +
Niall Jordan<br>
 +
Ronan O'Mullane<br>
 +
Federico Feraboli<br>
 +
 
  
 
==== Chapters Workshop ====
 
==== Chapters Workshop ====
On June 9, 14h30-18h we organize a chapter leader workshop for all the chapter leaders that attend the conference.
+
On June 9, 14h30-18h in Trinity College - Arts Building room 3126,  we organize a chapter leader workshop for all the chapter leaders that attend the conference.
  
Items that need discussion are:
+
Items that will be discussed are:
 
* How to improve the current Chapter Leader Handbook?
 
* How to improve the current Chapter Leader Handbook?
* How to start new chapters within Europe?
+
* How to start and support new chapters within Europe?
 
* How to support inactive chapters within Europe?
 
* How to support inactive chapters within Europe?
 
* What Governance model is required for OWASP chapters?
 
* What Governance model is required for OWASP chapters?
Line 465: Line 503:
 
* ...
 
* ...
  
Agenda and room to be detailed soon.
+
Agenda and room details are online at [[AppSecEU 2011 chapters workshop agenda]].
 
+
If you plan to attend, please fill in your name and chapter below:
+
* Tom Brennan, New York / New Jersey Chapter
+
* Seba Deleersnyder, Belgium chapter
+
* Fabio Cerullo, Ireland chapter
+
* Justin Clarke, London chapter
+
* Sebastien Gioria, France chapter  - Only 9th June
+
* Ferdinand Vroom, Netherlands chapter
+
* Ofer Maor, Israel chapter
+
* Antonio Fontes, Geneva chapter (Western Switzerland)
+
* Boris Hemkemeier, German Chapter
+
* Marco Morana, Cincinnati U.S.A. Chapter
+
* Sven Vetsch, Switzerland Chapter
+
* Konstantinos Papapanagiotou, Greek Chapter
+
* Lieven Desmet, Belgium Chapter - tentative
+
* Rory McCune, Scotland Chapter
+
*...
+
  
 
Contact [mailto:seba@owasp.org Seba] for more details.
 
Contact [mailto:seba@owasp.org Seba] for more details.
 +
 +
'''[https://docs.google.com/a/owasp.org/document/d/1PrGmwy1pxs2cb4LyewXS4TonbzAY7nORWvj-NJYaEnk/edit?hl=en_US Minutes from Workshop]'''
  
  
Line 491: Line 514:
 
{{:AppSecEU2011/Industry_Outreach}}
 
{{:AppSecEU2011/Industry_Outreach}}
  
 +
==== Sponsorship Options ====
 +
 +
OWASP is providing sponsors exclusive access to its audience in Trinity College Dublin, Ireland through a limited number of Expo floor slots, providing a focused setting for potential customers.Attendees will be pushed through the Expo floor for breakfast, lunch and coffee breaks giving them direct access to sponsors’ booths and technology.
 +
 +
The conference is expected to draw over 400 international attendees; all with budgets dedicated to web application security initiatives. Financial Services, Media, Pharmaceuticals, Government, Healthcare, Technology, and many other verticals will be represented.
 +
 +
Sponsorship opportunities are filling up rapidly. All proceeds from sponsorship support the conference and the mission of the OWASP Foundation (501c3 Not-For-Profit), driving funding for research grants, tools and documents, local chapters, and more.
 +
 +
All sponsorship opportunities feature significant discounts to OWASP members, allowing you year-round access the web application security’s top thinkers as well as use of OWASP materials in product and service delivery.
 +
 +
To find out more about the different sponsorship opportunities please check the document below:
 +
 +
http://www.appseceu.org/wp-content/uploads/2011/03/AppSecEU_Sponsorship_Packages.pdf
 +
 +
==== SoccerCon EU ====
 +
 +
We are organizing a Futbol (Soccer) friendly in Ireland for AppSec EU.  For those that partook in the friendly in Portugal, the event was a big success
 +
despite the fact we played at 8am, inebriated, with a semi-deflated ball, on a slick concrete court - all of such conditions which allow me to continue my personal denial for the loss we experienced against the Portuguese/ Brazilian Chapter leads.  All that aside, I would like to know if there are
 +
any members interest to relive this in much better fashion while in Dublin.
 +
 +
Date: 10th June at 7:00PM - Trinity College Sports Centre
 +
 +
Proud Soccer Field Sponsor:
 +
 +
[[File:Trustwave.png]]
 +
 +
Bring your shorts and show us your Messi skills. ;-)
 +
 +
If you plan to attend, please fill in your name below:
 +
 +
* Tony UcedaVelez
 +
* Tom Brennan
 +
* Fabio Cerullo
 +
* Dan Cornell
 +
* Frederick Donovan
 +
* ...
 +
 +
Contact [mailto:tonyuv@owasp.org Tony] for more details.
  
  
 
  <headertabs />
 
  <headertabs />
 +
[[Category:OWASP AppSec Conference]]

Latest revision as of 15:36, 2 October 2011

Banner-trinity-web.jpg


Follow us on:
Twitter.png
Facebook.png Linkedin.png


Welcome

We are pleased to announce that the Ireland chapter will host the OWASP AppSec Europe 2011 global conference in beautiful Dublin, Ireland.

The AppSec Europe conference will be a premier gathering of Information Security leaders. Executives from Fortune 500 firms along with technical thought leaders such as security architects and lead developers will be traveling to hear the cutting-edge ideas presented by Information Security’s top talent. OWASP events attract a worldwide audience interested in “what’s next”. The conference is expected to draw 400-500 technologists from Government, Financial Services, Media, Pharmaceuticals, Healthcare, Technology, and many other verticals.

AppSec Europe 2011 will be held at Trinity College Dublin (map) on June 7th through 10th 2011. There will be training courses on June 7th and 8th followed by plenary sessions on the 9th and 10th with each day having at least three tracks. AppSec Europe may also have BOF (informal adhoc meetings), break out, or speed talks in addition to the standard schedule depending on the submissions received.
If you have any questions, please email the conference chair: appseceu at owasp.org


Who Should Attend AppSec Europe 2011:

  • Application Developers
  • Application Testers and Quality Assurance
  • Application Project Management and Staff
  • Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff
  • Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance
  • Security Managers and Staff
  • Executives, Managers, and Staff Responsible for IT Security Governance
  • IT Professionals Interested in Improving IT Security


How to get to AppSec EU?

The OWASP AppSec EU Conference takes place in the Arts Building in the grounds of Trinity College, Dublin 2. You could find a copy of the Trinity College grounds and some directions on how to get to the Arts Building in the URL below.

AppSec EU Venue Location


Are you an exhibitor and need to load/offload materials at Trinity College? Below is the map to the Arts Building Loading Bay:

Campus Map

Have you visited our AppSec EU conference website?

AppSec EU Conference Website


Sponsorship Options

To find out more about the different sponsorship opportunities please check the document below:

AppSec EU Sponsorship Packages



Appseceurope3.png

Use the #AppSecEU hashtag for your tweets for AppSec Europe 2011 (What are hashtags?)

@AppSecEU Twitter Feed (follow us on Twitter!)

Registration

Registration is now open!

RegisterNow.jpg


Registration Fees

Ticket Type Before 6th April After 6th April After 6th May
Non-Member €250 €300 €350
Active OWASP Member €200 €250 €300
Student €150 €200 €250
Course Fee
1 Day Training €495
2 Day Training €990

Note: To save on processing expenses, all fees paid for the OWASP conference are non-refundable. OWASP can accommodate transfers of registrations from one person to another, if such an adjustment becomes necessary.

* We need some kind of proof of your full-time student status. Either ask your local OWASP chapter leader to vouch for you by email to Kate.Hartmann@owasp.org, or email Kate a scanned image of your student ID (please compress the file size :).


June 7th-8th (Training)

Schedule

T1. Threat Modeling and Architecture Review - 2-Days (June 7-8) - 990 Euro
Threat Modeling and Architecture Review are the cornerstones of a preventative approach to Application Security. By combining these topics into single comprehensive course attendees can get a complete understanding of how to understand the threat an application faces and how the application will handle those potential threats. This enables the risk to be accurately assessed and appropriate changes or mitigating controls recommended.
Instructor: Pravir Chandra, Fortify
Learn More About the Threat Modeling and Architecture Review Class
Click here to register
T2. Assessing and Exploiting Web Applications with Samurai - WTF - 2-Days (June 7-8) - 990 Euros

Come take the official Samurai-WTF training course given by one of the founders and lead developers of the project! You will learn how to use the latest Samurai-WTF open source tools and the be shown the latest techniques to perform web application assessments. After a quick overview of pen testing methodology, the instructor will lead you through the penetration and exploitation of three different web applications, and the browsers connecting to them. Different sets of open source tools will be used on each web application, allow you to learn first hand the pros and cons of each tool. After you have gained experience with the Samurai-WTF tools, you will be challenged with a fourth web application that contains keys you must find and collect. This final challenge will give you time to practice your new skills at your own pace and experiment with your favorite new tools. This experience will help you gain the confidence necessary to perform web application assessments and expose you to the wealth of freely available open source tools.

Instructor: Justin Searle: InGuardians InGuardians.png

Learn More About the Assessing and Exploiting Web Applications with Samurai - WTF
Click here to register
T3. Tactical Defense with ModSecurity - 2-Days - 990 Euros
While application flaws should ideally be fixed in the source code, this is often not a feasible task for various reasons. Web application firewalls are often deployed as an additional layer of security that can monitor, detect and prevent attacks before they reach the web application. ModSecurity, an extremely popular open source web application firewall, is often used to help protect web applications against known and unknown vulnerabilities alike.

This two-day boot-camp training is designed for people who want to quickly learn how to configure and deploy ModSecurity in the most effective manner possible. The course will cover topics such as the powerful ModSecurity rules language, extending functionality via the embedded Lua engine and managing suspicious events via AuditConsole. Documented hands-on labs help students understand the inner workings of ModSecurity and how to deploy ModSecurity securely. By leveraging the flexibility within ModSecurity, attendees will be able to write effective rules to mitigate complex web vulnerabilities

Instructor: Christian Bockermann, PhD University of Dortmund
Learn More about the Tactical Defense With Mod Security Class
Click here to register
T4. Secure Application Development: Writing secure code (and testing it) 1-Day - June 7th- 495 Euros
Writing Secure code is the most effective method to securing your web applications. Writing secure code takes skill and know-how but results in a more stable and robust application and assists in protecting an organisations brand.

Application security is not commonly a part of many computer science curricula today and most organizations have not focused on instituting a culture that includes application security as a core part of their software development training efforts. This intensive one-day course focuses on the most common web application security problems, including aspects of both the OWASP Top Ten (2010) and the MITRE Top 25. The course will introduce and demonstrate application assessment techniques, illustrating how application vulnerabilities can be exploited so students really understand how to avoid introducing such vulnerabilities in their code

Instructor: Eoin Keary, OWASP

Learn More About the Secure Application Development Class
Click here to register
T5. Designing, Building and Testing Secure Application on Mobile Devices 1-Day - June 8th- 495 Euros
This course provides an introduction to security for mobile and smartphone applications. It walks through a basic threat model for a smartphone application. This threat model is then used as a framework for making good decisions about designing and building applications as well as for testing the security of existing applications. Examples are provided for both iOS (iPhone and iPad) and Android platforms and sample code is provided to demonstrate mobile security assessment techniques. Particular emphasis will be on the unique security challenges that developing software for mobile devices represent, comparing mobile software security concepts to those in the web application world


Instructors: Dan Cornell, Denim Group

Learn More About the Designing, Building and Testing Secure Application on Mobile Devices Class
Click here to register


June 9th

Schedule

Conference Day 1 - June 9, 2011



Track 1 - Defend Track 2 - Prevent Track 3 - Attack
0800-08:50 Registration and Breakfast + Coffee
08:50-09:00 Welcome by AppSec EU Board
09:00-10:00 Keynote: Brad Arkin, Adobe Corp | SLIDES
10:00-10:30 OWASP Global Board Update - Tom Brennan, Eoin Keary, Seba Deleersnyder
10:30-10:45 Coffee Break
10:45-11:30 Practical Browser Sandboxing on Windows with Chromium, Tom Keetch, Verizon Business
SLIDES
Building a Robust Security Plan, Narainder Chandwani, Foundstone
SLIDES
APT in a Nutshell, "David Stubley, 7 Elements Ltd"
SLIDES
11:30-11:40 Break
11:40-12:25 How to become Twitter's admin: An introduction to Modern Web Service Attacks, Andreas Falkenberg, RUB
SLIDES


The missing link: Turning Securable apps into secure installations using SCAP, Charles Schmidt, MITRE Corp.
SLIDES


The Buzz about Fuzz: An enhanced approach to finding vulnerabilities, Joe Basirico, Security Innovation
SLIDES
12:25-13:25 Lunch
13:25-14:25 Keynote: Giles Hogben, ENISA | SLIDES
14:25-14:40 Break
14:40-15:25 OWASP Secure Coding Practices Quick Reference Guide, Keith Turpin, The Boeing Company
SLIDES
Integrating security testing into a SDLC: what we learned and have the scars to prove it, Mark Crosbie, IBM
SLIDES
Intranet Footprinting: Discovering Resources from outside, Javier Marcos de Prado & Juan Galiana Lara, IBM
SLIDES
15:25-15:40 Coffee Break
15:40-16:25 Building Large Scale Detectors for Web-based Malware, Marco Balduzzi & Davide Canali, EURECOM
SLIDES
Infosec Stats: Reading between the lines, Chris Eng, Veracode
SLIDES
Python Basics for Web App Pentesters, Justin Searle, InGuardians Inc
SLIDES
16:25-16:35 Break
16:35-17:20 OWASP AppSensor Project, Colin Watson, Watson Hall Ltd
SLIDES
A buffer overflow Story: From Responsible Disclosure to Closure, Douglas Held, Fortify (HP)
SLIDES
CTF: Bringing back more than sexy!, Mark Hillick, KTF
SLIDES
19:00-23:00 Networking Event - Drinks at the Church Bar


June 10th

Schedule

Conference Day 2 - June 10, 2011



Track 1 - Defend Track 2 - Prevent Track 3 - Attack
08:00-08:50 Registration
08:50-09:00 Day 2 Opening Remarks
09:00-10:00 Keynote: Janne Uusilehto, Nokia | SLIDES
10:00-10:10 Break
10:10-10:55 Software Security: Is OK Good Enough?, John Dickson, Denim Group Ltd.
SLIDES
An Overview of Threat Modeling, Paco Hope, Cigital Inc.
SLIDES
An Introduction to the OWASP Zed Attack Proxy, "Simon Bennetts, OWASP"
SLIDES
10:55-11:10 Coffee Break
11:10-11:55 New standards and upcoming technologies in browser security, Tobias Gondrom, IETF WG
SLIDES


Simple Approach to Sepcifying Security Requirements for Online Developments, Alexis Fitzgerald, RITS
SLIDES


A Case Study on Enterprise E-mail (in) Security Solutions, Marian Ventuneac, Genworth Financial
SLIDES
11:55-12:05 Break
12:05-12:50 Empty Slot


A Critical Look at the Classification Schemes for Privacy Risks, Elke Roth-Mandutz and Georg Simon, Ohm University
SLIDES


Testing Security Testing: Evaluating Quality of Security Testing, Ofer Maor, Seeker Security
SLIDES
12:50-13:50 Lunch
13:50-14:50 Keynote: Alex Lucas, Microsoft | SLIDES
14:50-15:00 Break
15:00-15:45 Putting the Smart into Smartphones: Security Testing Mobile Applications, Dan Cornell, Denim Group
SLIDES
Wordpress Security, Steve Lord, Mandalorian Security Ltd.
The Dark Side: Measuring and Analyzing Malicious Activity On Twitter, Daniel Peck, Barracuda Networks
SLIDES
15:45-16:00 Coffee Break
16:00-16:45 Threat modeling of banking malware-based attacks using the P.A.S.T.A. framework, Marco Morana, Cincinnati Chapter Lead & Tony UcedaVelez, VerSprite
SLIDES
PCI DSS v2.0: a new challenge for web application security testing?, Laurent Benameur Sauvaire, Espion, Ltd.
Practical Crypto Attacks Against Web Applications, Justin Clarke, Gotham Digital Science
SLIDES
16:45-16:55 Break
16:55-17:40 Keynote: Arian Evans, Whitehat Security
17:40-18:00 Conference Closure and Raffle


Accommodation

The Morgan Hotel:

Stay in one of the best luxury hotels in Dublin, The Morgan, Design hotel is located in Temple Bar. This 4 star Hotel Dublin offers an oasis of calm in a central location. The hotel’s cool modern interiors, chic design and boutique luxury hotel rooms are all part of an experience designed to pamper guests and breathe new life and style into hotel living.

This city centre Dublin hotel is just a few blocks away from Trinity College, Grafton Street, the main shopping thoroughfare, theatres, shopping, music and nightlife along with proximity to the IFSC, Dublin’s main business district. There is no other 4 star hotel Dublin quite like it!


Stay in the heart of the conference action at a hotel specially discounted for its attendees.

Rooms can be booked by emailing reservations@themorgan.com and quoting OWASP.

The contact in reservations is Bernadette Doyle and you could contact her for special requests at the following number: +353 1 643 7000

Special Rates: €130 Bed & Full Irish Breakfast – Single Occupancy €140 Bed & Full Irish Breakfast – Double Occupancy

Special rate deadline: 6 May 2011

The Morgan Hotel 10 Fleet st, Temple Bar, Dublin 2 Phone: +353 1 6437000 Fax: +353 1 6437060 http://www.themorgan.ie


Trinity College:
Accommodation is also available on the historic campus at Trinity College Dublin, located right in the centre of the city. The bedrooms, many of which have been recently renovated, are excellent value with prices ranging from Euro 55.00 to Euro 100.00 per night. Rooms are serviced daily and continental breakfast is included in room rates.

For more information visite: https://accommodation.tcd.ie/kxHotel/


KartCon EU

It was about time for Europe to host this adrenaline fueled event!

Kylemore Karting, Ireland’s largest indoor Karting arena, has a choice of three 360 mtr tracks with flyovers, underpasses, hills and banked corners waiting for you.

Race for best time – Race for best crash – Race for fun


This is your chance to sit down, strap in and race for the finish line to “Rev Up” for APPSEC EU 2011.

The doors open Wednesday 8th June at 7:30pm and there will be transportation available from Dublin city centre.

More info could be found here:

Kylemore Karting Unit 1A, Kylemore Industrial Estate, Killeen Road, Kylemore, Dublin 10 http://www.kylemore-karting.com

REGISTRATION IS OPEN. Please visit URL below to register:

http://www.regonline.com/owasp_appsec_eu_2011

Challenges

Countdown Challenges -- Free Tickets to Win!

You could check all challenges here: http://www.appseceu.org/?page_id=197


Team

AppSec EU Conference Team

Chairs

Eoin Keary
Fabio Cerullo
Fiona Walsh

Operations

Kate Hartmann
Lorna Alamri
Sarah Baso
Ana Loza
Ralph Durkee

Volunteers

Owen Pendlebury
Niall Jordan
Ronan O'Mullane
Federico Feraboli


Chapters Workshop

On June 9, 14h30-18h in Trinity College - Arts Building room 3126, we organize a chapter leader workshop for all the chapter leaders that attend the conference.

Items that will be discussed are:

  • How to improve the current Chapter Leader Handbook?
  • How to start and support new chapters within Europe?
  • How to support inactive chapters within Europe?
  • What Governance model is required for OWASP chapters?
  • How can the global chapters committee facilitate the European chapters?
  • ...

Agenda and room details are online at AppSecEU 2011 chapters workshop agenda.

Contact Seba for more details.

Minutes from Workshop


Industry Outreach Sessions

For more information about any of the sessions or to R.S.V.P. contact Sarah Baso


Security for Managers and Executives

10:15-11:00 AM, Conference Day 2, 10 June 2011
Location: Arts Building room 3106


The purpose for this session is to help organizations understand why application security is important and how OWASP can help in making their applications more secure. It will give them an opportunity to learn what documentation, training, architecture, tools and infrastructure is available. The best part is all these materials are free. OWSAP provides the solution for their application security needs. We are also looking to improve collaboration by helping get more organization participating in OWASP projects. This will help us ensure that we account for the various needs of industry and develop well vetted best practices.

Security For Managers and Executives - Industry Outreach Presentation  


Presented by: Nishi Kumar, IT Architect Specialist, FIS
View Presenter's Bio


CISO Survey

12:05-12:50 PM, Conference Day 2, 10 June 2011
Location: Arts Building room 3106

The objective of this session is to solicit feedback from industry leaders to help inform the content of the upcoming OWASP CISO survey. Specifically, we are interested in what they would like to see in a survey of their peers and leaders and how they think such a survey should be executed. The session will provide participants an opportunity to meet with peers in a vendor-free environment and discuss their problems with and solutions to information security. It will also allow them to shape the focus of the upcoming survey to maximize the return value to them.


Presented by: Rex Booth, Senior Manager, Grant Thornton
View Presenter's Bio


Global Industry Roundtable

15:00-15:45 PM, Conference Day 2, 10 June 2011
Location: Arts Building room 3106

This roundtable session will involve a series of questions aimed at driving discussion to determine: How can the OWASP Global Industry Committee become more relevant and work to achieve a better working relationship with industry verticals? What would types of OWASP resources (if none are currently available) would your company find value in? If you are not currently an OWASP member or corporate supporter, why not?

The outcomes of this session, as well as similar sessions that we hope to host at the other OWASP global appsec conferences this year, will be used determine whether a new membership model (esp. for corporate supporters) is needed within OWASP as well as where committee resources should be focused in the upcoming year(s).


Facilitated by: Sarah Baso, Operations Manager for the OWASP Global Industry Committee
With remote participation from: Joe Bernik, Chief Information Security Officer for Fifth Third Bank and OWASP GIC Committee Chair
View Presenters' Bios


Sponsorship Options

OWASP is providing sponsors exclusive access to its audience in Trinity College Dublin, Ireland through a limited number of Expo floor slots, providing a focused setting for potential customers.Attendees will be pushed through the Expo floor for breakfast, lunch and coffee breaks giving them direct access to sponsors’ booths and technology.

The conference is expected to draw over 400 international attendees; all with budgets dedicated to web application security initiatives. Financial Services, Media, Pharmaceuticals, Government, Healthcare, Technology, and many other verticals will be represented.

Sponsorship opportunities are filling up rapidly. All proceeds from sponsorship support the conference and the mission of the OWASP Foundation (501c3 Not-For-Profit), driving funding for research grants, tools and documents, local chapters, and more.

All sponsorship opportunities feature significant discounts to OWASP members, allowing you year-round access the web application security’s top thinkers as well as use of OWASP materials in product and service delivery.

To find out more about the different sponsorship opportunities please check the document below:

http://www.appseceu.org/wp-content/uploads/2011/03/AppSecEU_Sponsorship_Packages.pdf

SoccerCon EU

We are organizing a Futbol (Soccer) friendly in Ireland for AppSec EU. For those that partook in the friendly in Portugal, the event was a big success despite the fact we played at 8am, inebriated, with a semi-deflated ball, on a slick concrete court - all of such conditions which allow me to continue my personal denial for the loss we experienced against the Portuguese/ Brazilian Chapter leads. All that aside, I would like to know if there are any members interest to relive this in much better fashion while in Dublin.

Date: 10th June at 7:00PM - Trinity College Sports Centre

Proud Soccer Field Sponsor:

Trustwave.png

Bring your shorts and show us your Messi skills. ;-)

If you plan to attend, please fill in your name below:

  • Tony UcedaVelez
  • Tom Brennan
  • Fabio Cerullo
  • Dan Cornell
  • Frederick Donovan
  • ...

Contact Tony for more details.