Difference between revisions of "AppSecLatam2012/Schedule Tuesday Nov 20, 2012"

From OWASP
Jump to: navigation, search
Line 30: Line 30:
 
| align="center" colspan="3" style="width: 80%; background: none repeat scroll 0% 0% rgb(246, 246, 246);" | Short Break - Coffee & Snacks
 
| align="center" colspan="3" style="width: 80%; background: none repeat scroll 0% 0% rgb(246, 246, 246);" | Short Break - Coffee & Snacks
 
|-
 
|-
| style="width: 20%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" |  ''11:00-11:50 AM''  
+
| align="center" style="width: 20%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" |  ''11:00-11:50 AM''  
 
<br>
 
<br>
 
| align="left" style="width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);" | &nbsp;'''Assessing Application Security Risk'''
 
| align="left" style="width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);" | &nbsp;'''Assessing Application Security Risk'''
Line 37: Line 37:
 
&nbsp;Speaker: Breno Silva
 
&nbsp;Speaker: Breno Silva
 
|-
 
|-
| style="width: 20%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | &nbsp;''11:50-12:00 PM''  
+
| align="center" style="width: 20%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | &nbsp;''11:50-12:00 PM''  
 
| align="center" colspan="3" style="width: 80%; background: none repeat scroll 0% 0% rgb(246, 246, 246);" | Short Break  
 
| align="center" colspan="3" style="width: 80%; background: none repeat scroll 0% 0% rgb(246, 246, 246);" | Short Break  
 
|-
 
|-
| style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | &nbsp;''12:00-12:50 PM''  
+
|align="center" style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | &nbsp;''12:00-12:50 PM''  
 
<br>
 
<br>
 
| align="left" style="width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);" | &nbsp;'''Your Website: a weapon for cybercrime'''
 
| align="left" style="width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);" | &nbsp;'''Your Website: a weapon for cybercrime'''
Line 47: Line 47:
 
&nbsp;Speaker: Nicolas Rodriguez
 
&nbsp;Speaker: Nicolas Rodriguez
 
|-
 
|-
| align="center" style="width: 20%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | &nbsp;''12:50-2:20 PM''
+
| align="center" style="width: 20%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | &nbsp;''12:50-13:50 PM''
 
<br>
 
<br>
 
| align="center" colspan="3" style="width: 80%; background: none repeat scroll 0% 0% rgb(194, 194, 194);" | '''Break - Lunch'''
 
| align="center" colspan="3" style="width: 80%; background: none repeat scroll 0% 0% rgb(194, 194, 194);" | '''Break - Lunch'''
 
|-
 
|-
| align="center" style="width: 20%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | &nbsp;''2:20-3:50 PM''  
+
| align="center" style="width: 20%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | &nbsp;''13:50-14:50 PM''  
 
<br>
 
<br>
 
| align="center" colspan="3" style="width: 80%; background: none repeat scroll 0% 0% rgb(188, 133, 122);" | '''KEYNOTE <br> Tainted variables to find Potentially Vulnerable Functions (PVF)'''
 
| align="center" colspan="3" style="width: 80%; background: none repeat scroll 0% 0% rgb(188, 133, 122);" | '''KEYNOTE <br> Tainted variables to find Potentially Vulnerable Functions (PVF)'''
 
&nbsp;Speaker: Cristian Borghello
 
&nbsp;Speaker: Cristian Borghello
 
|-
 
|-
| align="center" style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | &nbsp;''3:50-4:10 PM''
+
| align="center" style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | &nbsp;''14:50-15:10 PM''
 
| align="center" colspan="3" style="width: 80%; background: none repeat scroll 0% 0% rgb(246, 246, 246);" | Short Break - Coffee & Snacks
 
| align="center" colspan="3" style="width: 80%; background: none repeat scroll 0% 0% rgb(246, 246, 246);" | Short Break - Coffee & Snacks
 
|-
 
|-
| align="center" style="width: 20%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | &nbsp;''4:10-5:00 PM''
+
| align="center" style="width: 20%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | &nbsp;''15:10-16:00 PM''
 
<br>
 
<br>
 
| align="left" style="width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);" | &nbsp;'''Using PASTA as a core ingredient to web application threat modeling'''
 
| align="left" style="width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);" | &nbsp;'''Using PASTA as a core ingredient to web application threat modeling'''
Line 66: Line 66:
 
&nbsp;Speaker: Sebastian Bortnik
 
&nbsp;Speaker: Sebastian Bortnik
 
|-
 
|-
| align="center" style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | &nbsp;''5:00-5:10 PM''
+
| align="center" style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | &nbsp;''16:00-16:10 PM''
 
| align="center" colspan="3" style="width: 80%; background: none repeat scroll 0% 0% rgb(246, 246, 246);" | Short Break
 
| align="center" colspan="3" style="width: 80%; background: none repeat scroll 0% 0% rgb(246, 246, 246);" | Short Break
 
|-
 
|-
| align="center" style="width: 20%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | &nbsp;''5:10-6:00 PM''
+
| align="center" style="width: 20%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | &nbsp;''16:10-17:00 PM''
 
<br>
 
<br>
 
| align="left" style="width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);" | &nbsp;'''Password Security Policies - Lessons Learned from Recent Password Leaks'''
 
| align="left" style="width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);" | &nbsp;'''Password Security Policies - Lessons Learned from Recent Password Leaks'''

Revision as of 11:44, 1 November 2012

Conference Day 1 - Tuesday - November 20 ,2012


Track 1
Sponsored by:
DEL COL.jpg
Track 2
(Location TBA)
 8:00-9:00 AM


Conference Registration Open
 9:00-9:30 AM


Opening Remarks

Speakers: Carolina Cosse - President of ANTEL

 9:30-9:50 AM


OWASP Board Kickoff

Speaker: Matt Tesauro

 9:50-10:40 AM


KEYNOTE
Building Security Into Frameworks: Who is doing it right

Speaker: Jerry Hoff

 10:40-11:00 AM Short Break - Coffee & Snacks
 11:00-11:50 AM


 Assessing Application Security Risk

 Speaker: Alex Bauert

 Reducing Web Application Attack Surface with a HMAC based protocol

 Speaker: Breno Silva

 11:50-12:00 PM Short Break
 12:00-12:50 PM


 Your Website: a weapon for cybercrime

 Speaker: Sebastian Bortnik

 Don't try to block the out the sub with your fingers! Information harvesting with Test-driven development tools and understanding how to avoid it

 Speaker: Nicolas Rodriguez

 12:50-13:50 PM


Break - Lunch
 13:50-14:50 PM


KEYNOTE
Tainted variables to find Potentially Vulnerable Functions (PVF)

 Speaker: Cristian Borghello

 14:50-15:10 PM Short Break - Coffee & Snacks
 15:10-16:00 PM


 Using PASTA as a core ingredient to web application threat modeling

 Speaker: Tony Ucedavelez

 Malware on Mobile Devices

 Speaker: Sebastian Bortnik

 16:00-16:10 PM Short Break
 16:10-17:00 PM


 Password Security Policies - Lessons Learned from Recent Password Leaks

 Speaker: Flavio de Cristofaro

 How dynamic have been static checking?

 Speaker: Felipe Zipitria