Difference between revisions of "FROC Schedule Draft"

From OWASP
Jump to: navigation, search
m (Notes)
(Agenda and Presentations: 22 March 2012: Final schedule as of March 1st)
 
(6 intermediate revisions by one user not shown)
Line 1: Line 1:
 
==Agenda and Presentations: 22 March 2012==
 
==Agenda and Presentations: 22 March 2012==
[[StevesFROCDraft|Steve's FROC draft]]
 
 
[[CraigsFROCDraft|Craig's FROC draft]]
 
===Notes===
 
* Can't serve breakfast at 7:30, or can we?  James' coffee idea?
 
 
* Need to change room names to real room names
 
  
 
The agenda follows the successful OWASP conference multi track format, with opening keynotes and presentations in the main room, split tracks in the middle of the day, and closing panel discussions back in the main room.
 
The agenda follows the successful OWASP conference multi track format, with opening keynotes and presentations in the main room, split tracks in the middle of the day, and closing panel discussions back in the main room.
  
{| style="width:80%" border="0" align="center"
+
{| style="width:96%" border="0" align="center"
 
  ! colspan="4" align="center" style="background:#4058A0; color:white" | March 22nd, 2012
 
  ! colspan="4" align="center" style="background:#4058A0; color:white" | March 22nd, 2012
 
  |-
 
  |-
  | style="width:10%; background:#7B8ABD" | 07:30-08:30 || colspan="3" style="width:80%; background:#C2C2C2" align="left" | Registration and Continental Breakfast in the Sponsor Expo Room
+
  | style="width:10%; background:#7B8ABD" | 07:45-08:30 || colspan="3" style="width:80%; background:#C2C2C2" align="left" | Registration and Continental Breakfast in the Adirondack Room
 
  |-
 
  |-
  | style="width:10%; background:#7B8ABD" | 08:30-08:35 || colspan="3" style="width:80%; background:#F2F2F2" align="center" | Welcome to SnowFROC 2012 Conference
+
  | style="width:10%; background:#7B8ABD" | 08:30-08:45 || colspan="3" style="width:80%; background:#F2F2F2" align="center" | Welcome to SnowFROC 2012 Conference
 
+
Probably need min 10 minutes just to explain layout, sched, and restroom locations :-)
+
  
 
''OWASP Denver and OWASP Boulder Chapter Leaders''
 
''OWASP Denver and OWASP Boulder Chapter Leaders''
 
  |-
 
  |-
  | style="width:10%; background:#7B8ABD" | 08:35-09:35 || colspan="3" style="width:80%; background:#F2F2F2" align="center" |  
+
  | style="width:10%; background:#7B8ABD" | 08:45-09:10 || colspan="3" style="width:80%; background:#F2F2F2" align="center" |  
'''Keynote:'''  
+
'''State of OWASP'''  
  
''John Pirc, Co-Author of [http://www.amazon.com/Cybercrime-Espionage-Analysis-Subversive-Multi-Vector/dp/1597496138/ref=sr_1_1?s=books&ie=UTF8&qid=1330542019&sr=1-1 "Cybercrime and Espionage: An Analysis of Subversive Multi-Vector Threats"]''
+
''Matt Tesauro''
 
  |-
 
  |-
  | style="width:10%; background:#7B8ABD" | 09:35-10:00 || colspan="3" style="width:80%; background:#F2F2F2" align="center" | '''State of OWASP'''  
+
  | style="width:10%; background:#7B8ABD" | 09:10-10:10 || colspan="3" style="width:80%; background:#F2F2F2" align="center" | '''Keynote:'''
 +
 
 +
''John Pirc, Co-Author of [http://www.amazon.com/Cybercrime-Espionage-Analysis-Subversive-Multi-Vector/dp/1597496138/ref=sr_1_1?s=books&ie=UTF8&qid=1330542019&sr=1-1 "Cybercrime and Espionage: An Analysis of Subversive Multi-Vector Threats"]''
  
Matt Tesauro
 
<!-- *** above -->
 
|-
 
| style="width:10%; background:#7B8ABD" | 10:00-10:20 || colspan="3" style="width:80%; background:#F2F2F2" align="center" | Nuke this unless Matt needs more time.  Distribute the time for lunch?
 
 
  |-
 
  |-
  
  | style="width:10%; background:#7B8ABD" | 10:20-10:30 || colspan="3" style="width:80%; background:#C2C2C2" align="left" | Break - Expo
+
  | style="width:10%; background:#7B8ABD" | 10:10-10:30 || colspan="3" style="width:80%; background:#C2C2C2" align="left" | Break - Expo
 
  |-
 
  |-
  
  | style="width:10%; background:#7B8ABD" | || colspan="1" style="width:45%; background:#BC857A" | '''Tech Track - Magumba Room'''
+
  | style="width:10%; background:#7B8ABD" | || colspan="1" style="width:45%; background:#BC857A" | '''Tech Track - Zenith Room 640'''
  | colspan="1" style="width:45%; background:#BCA57A" | '''Management Track - Silawesi Room'''  
+
  | colspan="1" style="width:45%; background:#BCA57A" | '''Management Track - Senate Chamber'''  
 
<!-- | style="width:22%; background:#C6E2FF" | '''Management / Exec Track: Room 3''' -->
 
<!-- | style="width:22%; background:#C6E2FF" | '''Management / Exec Track: Room 3''' -->
 
  |-
 
  |-
Line 45: Line 34:
 
''Cameron Morris''
 
''Cameron Morris''
  
  | style="width:45%; background:#BCA57A" align="left" | PCI vs Risk Management
+
  | style="width:45%; background:#BCA57A" align="left" | Managing IT Risk in a Cloud Environment
''Doug Landoll''
+
''Karl Steinkamp''
  
 
<!--  | style="width:22%; background:#C6E2FF" align="left" | TBD
 
<!--  | style="width:22%; background:#C6E2FF" align="left" | TBD
Line 58: Line 47:
 
''Robert Rowley''
 
''Robert Rowley''
  
| style="width:45%; background:#BCA57A" align="left" | Securing Data from the Web Tier
+
| style="width:45%; background:#BCA57A" align="left" | PCI vs Risk Management 
''Mike Fleck''   
+
''Doug Landoll''   
 
<!-- | style="width:22%; background:#C6E2FF" align="left" | Securing Data from the Web Tier ''Mike Fleck'' -->
 
<!-- | style="width:22%; background:#C6E2FF" align="left" | Securing Data from the Web Tier ''Mike Fleck'' -->
  
Line 67: Line 56:
 
  |-
 
  |-
  
  | style="width:10%; background:#7B8ABD" | 13:00-13:50 || style="width:45%; background:#BC857A" align="left" | Panel Discussion
+
  | style="width:10%; background:#7B8ABD" | 13:00-13:50 || style="width:45%; background:#BC857A" align="left" | Panel Discussion - Favorite tools and techniques - pen-testing, static analysis, code reviews
''Favorite tools and techniques - pen-testing, static analysis, code reviews''
+
''Panelists''
  
  | style="width:45%; background:#BCA57A" align="left" | Panel Discussion
+
  | style="width:45%; background:#BCA57A" align="left" | Securing Data from the Web Tier
''Making it work - getting buyin to get security baked in''
+
''Mike Fleck''
  
 
<!-- | style="width:22%; background:#C6E2FF" align="left" | TBD
 
<!-- | style="width:22%; background:#C6E2FF" align="left" | TBD
Line 82: Line 71:
 
''Adam Hills''
 
''Adam Hills''
  
  | style="width:45%; background:#BCA57A" align="left" | Managing IT Risk in a Cloud Environment
+
  | style="width:45%; background:#BCA57A" align="left" | Web Session Intelligence
''Karl Steinkamp''
+
 
 +
''LAZ''
  
 
<!-- | style="width:22%; background:#C6E2FF" align="left" | TBD
 
<!-- | style="width:22%; background:#C6E2FF" align="left" | TBD
Line 96: Line 86:
 
''Mike Zussman''
 
''Mike Zussman''
  
 
+
  | style="width:45%; background:#BCA57A" align="left" | A Scalable Secure Development Program
  | style="width:45%; background:#BCA57A" align="left" | Web Session Intelligence
+
''Rajiv Sharma''
''Laz''
+
  
 
<!--  
 
<!--  
Line 104: Line 93:
 
''TBD''
 
''TBD''
 
  -->
 
  -->
 
 
  |-
 
  |-
  | style="width:10%; background:#7B8ABD" | 15:50-16:30 || colspan="3" style="width:80%; background:#C2C2C2" align="left" | End of Conference Panel Discussion:  
+
  | style="width:10%; background:#7B8ABD" | 15:50-16:30 || colspan="3" style="width:80%; background:#F2F2F2" align="left" | End of Conference Panel Discussion:  
  
 
Topic: ''The Crystal Ball and the 2-headed Calf - What's on the Horizon and Why Does It Seem So Unnatural?''   
 
Topic: ''The Crystal Ball and the 2-headed Calf - What's on the Horizon and Why Does It Seem So Unnatural?''   
Line 112: Line 100:
 
Moderator: Steve Kosten or Andy Lewis
 
Moderator: Steve Kosten or Andy Lewis
 
Panelists: Laz, Matt Tesauro, John Pirc, Tanner Coltrin, Steve Kosten, others
 
Panelists: Laz, Matt Tesauro, John Pirc, Tanner Coltrin, Steve Kosten, others
 
 
 
  |-
 
  |-
  

Latest revision as of 22:47, 1 March 2012

Agenda and Presentations: 22 March 2012

The agenda follows the successful OWASP conference multi track format, with opening keynotes and presentations in the main room, split tracks in the middle of the day, and closing panel discussions back in the main room.

March 22nd, 2012
07:45-08:30 Registration and Continental Breakfast in the Adirondack Room
08:30-08:45 Welcome to SnowFROC 2012 Conference

OWASP Denver and OWASP Boulder Chapter Leaders

08:45-09:10

State of OWASP

Matt Tesauro

09:10-10:10 Keynote:

John Pirc, Co-Author of "Cybercrime and Espionage: An Analysis of Subversive Multi-Vector Threats"

10:10-10:30 Break - Expo
Tech Track - Zenith Room 640 Management Track - Senate Chamber
10:30-11:15 OWASP Passfault

Cameron Morris

Managing IT Risk in a Cloud Environment

Karl Steinkamp

11:15-12:00 State of Web Security: Monitored Attacks

Robert Rowley

PCI vs Risk Management

Doug Landoll

12:00-13:00 Lunch - Expo
13:00-13:50 Panel Discussion - Favorite tools and techniques - pen-testing, static analysis, code reviews

Panelists

Securing Data from the Web Tier

Mike Fleck


13:50-14:40 Gray, the new black: Gray box vulnerability testing

Adam Hills

Web Session Intelligence

LAZ

14:40-15:00 BREAK
15:00-15:50 "The Mobile Top 10"

Mike Zussman

A Scalable Secure Development Program

Rajiv Sharma

15:50-16:30 End of Conference Panel Discussion:

Topic: The Crystal Ball and the 2-headed Calf - What's on the Horizon and Why Does It Seem So Unnatural?

Moderator: Steve Kosten or Andy Lewis Panelists: Laz, Matt Tesauro, John Pirc, Tanner Coltrin, Steve Kosten, others

16:30-17:30 Wrap up, vendor raffles!

On Deck

  • Oh heck lightning talks to be invoked if a speaker gets hit by a bus - Andy, Steve, James, Craig have both mngmnt & tech 10 min spews prepared
  • Bruce Nordquist and Dan Weiske - OWASP Top 10 vs. NIST 800-53A rev1 controls (Bruce & Dan on panels?)
  • Rajiv Sharma - A Scalable Secure Environment (panelist?)
  • Rapid 7?
  • Bleeding-edge wild-card?