Difference between revisions of "AppSec Europe 2006/Agenda"

From OWASP
Jump to: navigation, search
(OWASP Europe 2006 Conference Schedule)
m (Protected "AppSec Europe 2006/Agenda" [edit=sysop:move=sysop])
 
(4 intermediate revisions by one user not shown)
Line 29: Line 29:
 
  | style="width:10%; background:#7B8ABD" | 09:10 - 10:00 || colspan="2" style="width:80%; background:#F2F2F2" align="left" | [http://www.owasp.org/index.php/Image:OWASPAppSecEU2006_Day1Keynote-OWASP2.0.ppt Keynote: OWASP 2.0 - A new vision for OWASP: Enabling organizations to develop, maintain, and acquire applications they can trust] - Dinis Cruz - OWASP .Net Project Lead
 
  | style="width:10%; background:#7B8ABD" | 09:10 - 10:00 || colspan="2" style="width:80%; background:#F2F2F2" align="left" | [http://www.owasp.org/index.php/Image:OWASPAppSecEU2006_Day1Keynote-OWASP2.0.ppt Keynote: OWASP 2.0 - A new vision for OWASP: Enabling organizations to develop, maintain, and acquire applications they can trust] - Dinis Cruz - OWASP .Net Project Lead
 
  |-
 
  |-
  | style="width:10%; background:#7B8ABD" | 10:00 - 11:10 || colspan="2" style="width:80%; background:#F2F2F2" align="left" | Panel: "Should companies be emulating Microsoft’s Security Development Lifecycle (SDL)?”
+
  | style="width:10%; background:#7B8ABD" | 10:00 - 11:10 || colspan="2" style="width:80%; background:#F2F2F2" align="left" | Panel: [http://www.artima.com/weblogs/viewpost.jsp?thread=162577 "Should companies be emulating Microsoft’s Security Development Lifecycle (SDL)?”]
 
Moderator: Johan Peeters, Program Director secappdev.org
 
Moderator: Johan Peeters, Program Director secappdev.org
 
Panelists: Dinis Cruz, Andrew Van Der Stock, Pravir Chandra - Chief Security Architect - Secure Software, Alex Lucas - Security Engineer - Microsoft
 
Panelists: Dinis Cruz, Andrew Van Der Stock, Pravir Chandra - Chief Security Architect - Secure Software, Alex Lucas - Security Engineer - Microsoft
Line 41: Line 41:
 
  |-
 
  |-
 
  | style="width:10%; background:#7B8ABD" | 13:45 - 15:00 || style="width:40%; background:#BC857A" align="left" | [http://www.owasp.org/index.php/Image:OWASPAppSecEU2006_Bootstrapping_the_Application_Assurance_Process.ppt Bootstrapping a Software Security Assurance Process] – Sebastien Deleersnyder, OWASP Belgium Chapter Lead  
 
  | style="width:10%; background:#7B8ABD" | 13:45 - 15:00 || style="width:40%; background:#BC857A" align="left" | [http://www.owasp.org/index.php/Image:OWASPAppSecEU2006_Bootstrapping_the_Application_Assurance_Process.ppt Bootstrapping a Software Security Assurance Process] – Sebastien Deleersnyder, OWASP Belgium Chapter Lead  
  | style="width:40%; background:#BCA57A" align="left" | AJAX Security – Andrew Van Der Stock, Security Engineer - NAB and OWASP Guide Project Lead
+
  | style="width:40%; background:#BCA57A" align="left" | [http://www.owasp.org/index.php/Image:OWASPAppSecEU2006_AJAX_Security.ppt AJAX Security] – Andrew Van Der Stock, Security Engineer - NAB and OWASP Guide Project Lead
 
  |-
 
  |-
 
  | style="width:10%; background:#7B8ABD" | 15:00 - 15:20 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Break
 
  | style="width:10%; background:#7B8ABD" | 15:00 - 15:20 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Break
Line 68: Line 68:
 
  | style="width:10%; background:#7B8ABD" | 08:00 - 09:00 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Coffee
 
  | style="width:10%; background:#7B8ABD" | 08:00 - 09:00 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Coffee
 
  |-
 
  |-
  | style="width:10%; background:#7B8ABD" | 09:00 - 09:50 || colspan="2" style="width:80%; background:#F2F2F2" align="left" | Keynote: Taking OWASP to the next level, Andrew Van Der Stock, Security Engineer - NAB and OWASP Guide Project Lead
+
  | style="width:10%; background:#7B8ABD" | 09:00 - 09:50 || colspan="2" style="width:80%; background:#F2F2F2" align="left" | [http://www.owasp.org/index.php/Image:OWASPAppSecEU2006_Day2Keynote-OWASP_TNG.ppt Keynote: Taking OWASP to the next level], Andrew Van Der Stock, Security Engineer - NAB and OWASP Guide Project Lead
 
  |-
 
  |-
 
  | style="width:10%; background:#7B8ABD" | 09:50 - 10:50 || colspan="2" style="width:80%; background:#F2F2F2" align="left" | [http://www.owasp.org/index.php/Image:OWASPAppSecEU2006_WAFs_WhenAreTheyUseful.ppt Web Application Firewalls: When are they useful?] - Ivan Ristic, Founder Thinking Stone
 
  | style="width:10%; background:#7B8ABD" | 09:50 - 10:50 || colspan="2" style="width:80%; background:#F2F2F2" align="left" | [http://www.owasp.org/index.php/Image:OWASPAppSecEU2006_WAFs_WhenAreTheyUseful.ppt Web Application Firewalls: When are they useful?] - Ivan Ristic, Founder Thinking Stone
Line 74: Line 74:
 
  | style="width:10%; background:#7B8ABD" | 10:50 - 11:10 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Break
 
  | style="width:10%; background:#7B8ABD" | 10:50 - 11:10 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Break
 
  |-
 
  |-
  | style="width:10%; background:#7B8ABD" | 11:10 - 12:30 || style="width:40%; background:#BC857A" align="left" | Exposing cryptography for software developers: common pitfalls & countermeasures that every developer should follow when writing crypto-aware applications, Shay Zalalichin, Application Security Unit Manager, Comsec Security Consulting B.V.
+
  | style="width:10%; background:#7B8ABD" | 11:10 - 12:30 || style="width:40%; background:#BC857A" align="left" | [http://www.owasp.org/index.php/OWASPAppSecEU2006_ExposingCryptographyforSoftwareDevelopers.ppt Exposing cryptography for software developers: common pitfalls & countermeasures that every developer should follow when writing crypto-aware applications], Shay Zalalichin, Application Security Unit Manager, Comsec Security Consulting B.V.
 
  | style="width:40%; background:#BCA57A" align="left" | Refereed Papers Track – Slot 1: Research Papers
 
  | style="width:40%; background:#BCA57A" align="left" | Refereed Papers Track – Slot 1: Research Papers
 
   
 
   

Latest revision as of 16:18, 4 December 2007

OWASP Training Courses

The tutorials and the conference itself were held at KU in the College De Valk. The specific rooms are specified below.


T1. Foundations of Web Application Security - One Day Course - May 29th, 2006
This powerful one day course focuses on the most common web application security problems, including the OWASP Top Ten. The course will introduce and demonstrate hacking techniques, illustrating how application vulnerabilities can be exploited so students really understand how to avoid introducing such vulnerabilities into their code. Read more here! This class will be held in room DV3 01.08
T2. WebServices and XML Security - One Day Course - May 29th, 2006
Many enterprises are currently developing new Web Services and/or adding and acquiring Web Services functionality into existing applications -- now is the time to build security into the system! Read more here! This class will be held in room DV3 01.10


OWASP Europe 2006 Conference Schedule

Day 1 - May 30, 2006
Track 1: Auditorium Zeger Van Hee (Room DV1 91.56) Track 2: Auditorium 2 (Room DV1 91.54)
08:00 - 09:00 Registration and Coffee
09:00 - 09:10 Welcome to AppSec Europe 2006: Dave Wichers, OWASP Conferences Chair
09:10 - 10:00 Keynote: OWASP 2.0 - A new vision for OWASP: Enabling organizations to develop, maintain, and acquire applications they can trust - Dinis Cruz - OWASP .Net Project Lead
10:00 - 11:10 Panel: "Should companies be emulating Microsoft’s Security Development Lifecycle (SDL)?”

Moderator: Johan Peeters, Program Director secappdev.org Panelists: Dinis Cruz, Andrew Van Der Stock, Pravir Chandra - Chief Security Architect - Secure Software, Alex Lucas - Security Engineer - Microsoft

11:10 - 11:30 Break
11:30 - 12:30 OWASP CLASP Project – Pravir Chandra, Chief Security Architect, Secure Software Can (Automated) Testing Tools Really Find the OWASP Top 10?, Erwin Geirnaert, Partner ZION Security
12:30 - 13:45 Lunch
13:45 - 15:00 Bootstrapping a Software Security Assurance Process – Sebastien Deleersnyder, OWASP Belgium Chapter Lead AJAX Security – Andrew Van Der Stock, Security Engineer - NAB and OWASP Guide Project Lead
15:00 - 15:20 Break
15:20-16:30 From Theory to Reality: Seven Practical Steps to Delivering More Secure Software – Roger Thornton, CTO Fortify HTTP Message Splitting, Smuggling and Other Animals [1]- Amit Klein, Internationally Recognized Web Application Security Researcher and OWASP Israel Chapter Leader
16:30-16:50 Break
16:50 - 18:00 Panel: "The role of Sandboxing in creating secure .Net and Java applications.”

Organizer: Dinis Cruz

Panelists: Stephen de Vries - Corsaire, Roger Thornton - CTO Fortify

18:00 - 19:00 Walking Tour of Leuven on the way to the Faculty Club
18:40 - 19:20 Chapter Leads Meeting at the Faculty Club: Led by Sebastien Deleersnyder
19:00 - 21:00 Social Gathering: Dinner and Drinks at the Faculty Club
Day 2 - May 31, 2006
Track 1: Auditorium Zeger Van Hee (Room DV1 91.56) Track 2: Auditorium 2 (Room DV1 91.54)
08:00 - 09:00 Coffee
09:00 - 09:50 Keynote: Taking OWASP to the next level, Andrew Van Der Stock, Security Engineer - NAB and OWASP Guide Project Lead
09:50 - 10:50 Web Application Firewalls: When are they useful? - Ivan Ristic, Founder Thinking Stone
10:50 - 11:10 Break
11:10 - 12:30 Exposing cryptography for software developers: common pitfalls & countermeasures that every developer should follow when writing crypto-aware applications, Shay Zalalichin, Application Security Unit Manager, Comsec Security Consulting B.V. Refereed Papers Track – Slot 1: Research Papers

1) RequestRodeo: Client Side Protection against Session Riding, Martin Johns and Justus Winter (paper)

2) An Inline Approach for Secure SOAP Requests and Early Validation, Mohammad Ashiqur Rahaman, Maarten Rits and Andreas Schaad (paper)

12:30 - 13:45 Lunch
13:45 - 15:10 SiteGenerator, VulnReport and the other OWASP .Net tools, Dinis Cruz, OWASP .Net Projects Lead Refereed Papers Track – Slot 2: Experience Papers

3) Security Testing Web Applications through Unit Tests, Stephen de Vries (paper)

4) Protecting Web Services against Security Threats, Rix Groenboom (paper)

15:10 - 15:30 Break
15:30 - 16:30 Panel: “Are we winning the war?” - Are we actually getting a handle on application security issues and making things better, or are things still getting worse?

Moderator: Gunnar Peterson Panelists: Roger Thornton - CTO Fortify; Dave Wichers - COO Aspect Security; André Mariën - Consulting Director - CyberTrust EMEA; Charlie Cano - F5

16:30 - 16:50 Break
16:50 - 17:30 Conference Wrap Up - Dave Wichers, OWASP Conferences Chair

References

All four papers from the Refereed Papers Track can be downloaded as one document here.

  • Papers that Amit Klein's "HTTP Message Splitting, Smuggling and Other Animals" presentation is based on:
  1. “Meanwhile, on the other side of the web server” (Amit Klein, June 2005)
  2. “Divide and Conquer - HTTP Response Splitting, Web Cache Poisoning Attacks, and Other Topics” (Amit Klein, March 2004)
  3. “HTTP Request Smuggling” (Chaim Linhart, Amit Klein, Ronen Heled, Steve Orrin, June 2005)