Difference between revisions of "BeNeLux OWASP Day 2009 draft agenda"

From OWASP
Jump to: navigation, search
Line 4: Line 4:
 
  | style="width:15%; background:#7B8ABD" | 11:30 - 12:00 || colspan="2" style="width:75%; background:#C2C2C2" align="left" | Registration and sandwiches
 
  | style="width:15%; background:#7B8ABD" | 11:30 - 12:00 || colspan="2" style="width:75%; background:#C2C2C2" align="left" | Registration and sandwiches
 
  |-
 
  |-
  | style="width:15%; background:#7B8ABD" | 12:00 - 13:30 || colspan="2" style="width:75%; background:#F2F2F2" align="center" | OWASP Live CD - WebGoat workshop Part#1
+
  | style="width:15%; background:#7B8ABD" | 12:00 - 15:15 || colspan="2" style="width:75%; background:#F2F2F2" align="center" | OWASP Live CD - WebGoat workshop
'''Erwin Geirnaert & Martin Knobloch'''
+
|-
+
| style="width:15%; background:#7B8ABD" | 13:30 - 13:45 || colspan="2" style="width:75%; background:#C2C2C2" align="left" | Break
+
|-
+
| style="width:15%; background:#7B8ABD" | 13:45 - 15:15 || colspan="2" style="width:75%; background:#F2F2F2" align="center" | OWASP Live CD - WebGoat workshop Part#2
+
 
'''Erwin Geirnaert & Martin Knobloch'''
 
'''Erwin Geirnaert & Martin Knobloch'''
 
  |-
 
  |-
Line 20: Line 15:
 
'''Noa Bar-Yosef'''
 
'''Noa Bar-Yosef'''
 
  |-
 
  |-
| style="width:15%; background:#7B8ABD" | 16:50 - 17:00 || colspan="2" style="width:75%; background:#C2C2C2" align="left" | Break
+
| style="width:15%; background:#7B8ABD" | 16:50 - 17:30 || colspan="2" style="width:75%; background:#F2F2F2" align="center" | [[Compliance driven vulnerabilities]]
|-
+
'''Colin Watson'''
  | style="width:15%; background:#7B8ABD" | 17:00 - 17:40 || colspan="2" style="width:75%; background:#F2F2F2" align="center" | [[SHA-3 Competition: The Quest for Long-Term Security in Cryptographic Hashing]]
+
|-
 +
  | style="width:15%; background:#7B8ABD" | 17:30 - 18:10 || colspan="2" style="width:75%; background:#F2F2F2" align="center" | [[SHA-3 Competition: The Quest for Long-Term Security in Cryptographic Hashing]]
 
'''Bart Preneel'''
 
'''Bart Preneel'''
|-
 
| style="width:15%; background:#7B8ABD" | 17:40 - 18:20 || colspan="2" style="width:75%; background:#F2F2F2" align="center" | [[Compliance driven vulnerabilities]]
 
'''Colin Watson'''
 
 
  |-
 
  |-
 
| style="width:15%; background:#7B8ABD" | 18:20 - 18:50 || colspan="2" style="width:75%; background:#C2C2C2" align="left" | Dinner  
 
| style="width:15%; background:#7B8ABD" | 18:20 - 18:50 || colspan="2" style="width:75%; background:#C2C2C2" align="left" | Dinner  

Revision as of 15:30, 16 November 2009

College De Valck - December 2, 2009
11:30 - 12:00 Registration and sandwiches
12:00 - 15:15 OWASP Live CD - WebGoat workshop

Erwin Geirnaert & Martin Knobloch

15:15 - 15:30 Break
15:30 - 16:10 Secure development (for a secure planet).

Eoin Keary

16:10 - 16:50 WAF and Business Logic Attacks

Noa Bar-Yosef

16:50 - 17:30 Compliance driven vulnerabilities

Colin Watson

17:30 - 18:10 SHA-3 Competition: The Quest for Long-Term Security in Cryptographic Hashing

Bart Preneel

18:20 - 18:50 Dinner
18:50 - 19:30 Web Application Firewalls: Detection, Bypassing and Exploitation

Sandro Gauci

19:30 - 20:10 The OWASP Top 10 is dead, long live the OWASP Top 10 !

Sebastien Deleersnyder

20:10 - 20:20 Break
20:25 - 21:05 Hybrid Analysis 2.0 - A demonstration of precision results correlation for improved software security testing

Roger Thornton

21:05 - 21:45 SDLC pannel

Migchiel de Jong (Fortify) Bart De Win (Ascure) Florence Mottay (Cigital) + tbd