Difference between revisions of "Front Range OWASP Conference 2013"

From OWASP
Jump to: navigation, search
(One intermediate revision by one user not shown)
Line 1: Line 1:
__NOTOC__
+
[[Image:SnowFROC_2013_wide_white.png|1024px]]
  
<!-- [http://froc2011.eventbrite.com/ Registration is NOW OPEN] -->
 
<!-- FROC2010 was a major success!  The [http://www.surveymonkey.com/sr.aspx?sm=Fn2UBK3eyju0z2k3B8XpvHvs9s_2bdRO1BS428Of_2f9ZA0_3d survey results]are now posted.
 
-->
 
  
'''Looking for the 2012 presentations?  They are [[Front_Range_OWASP_Conference_2012#2012_Presentations|here]]'''
+
__NOTOC__
 +
<font size=2pt>
 +
= Introduction =
 +
{{:Front_Range_OWASP_Conference_2013/Introduction}}
  
<br>
+
=CFP=
<!-- Header -->
+
{{:Front_Range_OWASP_Conference_2013/CFP}}
<!--
+
====2012 Presentations ==== 
+
[[Media:CameronMorris_OwaspPassfault.pdf|OWASP Passfault]]<br>
+
[[Media:DougLandoll_PCI 2.0 Risk Management.pdf|PCI vs Risk Management]]<br>
+
[[Media:Laz_owasp_denver_FROC_032212.pdf|What the Cyber Criminals are Doing on Your Website Right Now]]<br>
+
[[Media:MikeFleckOWASP_Presentation.ppt|Securing Data from the Web Tier]]<br>
+
[[Media:RajivSharma_A_Scalable_Secure_Development_Program_OWASP.ppt|A Scalable Secure Development Program]]<br>
+
[[Media:RobertRowleyOWASPSNOWFROC2012.ppt|State of Web Security: Monitored Attacks]]<br>
+
-->
+
====Welcome to SnowFROC 2013 - the 5th Annual Front Range OWASP Security Conference==== 
+
<!-- *** Update image [[Image:Froc2010_sm.png|200px]]
+
-->
+
  
After successful FROC's in June of 2008, [http://www.owasp.org/index.php/Front_Range_OWASP_Conference_2009 March of 2009], [[Front_Range_OWASP_Conference_2010|2010]] and [[Front_Range_OWASP_Conference_2012|2012]] we are back in Denver, Colorado USA. The date is still TBD but will be in March 2013 on a Thursday. The conference will continue with informal "Birds of a Feather" sessions on Friday morning (half-day). We'll update the page with specific dates as soon as the venue confirms availability. We're also trying to arrange discounted skiing for those looking to break free on Friday for the weekend.
+
=Registration=
 +
{{:Front_Range_OWASP_Conference_2013/Registration}}
  
The conference is a full day, multi-track event, which will provide valuable information for managers and executives as well as developers and engineers. Tracks are still being finalized but will include:
+
=Venue=
*Cloud Security - focused on how cloud hosting changes the security model and implementation of security controls
+
{{:Front_Range_OWASP_Conference_2013/Venue}}
*Web App Security Management - focused on the manager's view of web application security with a special focus on scope, boundaries, responsibilities, and legal considerations
+
*Deep Dive Technical - focused on hard technical problems like encryption across an n-tiered web application stack, auditing web app mashups, and HTML 5 security concerns
+
*Web Application Security Testing - focused on testing web apps, especially large and complex enterprise apps
+
*Legal Aspects of Web App Security - focused on liability considerations and other concerns of particular interest to managers, executives, and counsel (will be awarded CLE credit)
+
  
While the tracks are ongoing we'll also have a capture the flag (CTF) competition underway featuring a brand new set of hacking challenges.
+
=Conference Schedule=
 +
{{:Front_Range_OWASP_Conference_2013/Schedule}}
  
In 2012, we attracted a packed venue with our great AppSec speakers, and we hope to achieve the same again in 2013.
+
=Event Sponsors=
 +
{{:Front_Range_OWASP_Conference_2013/Sponsors}}
  
====Conference Committee====
+
=Continuing Education Credit=
Conference Lead: Micah Tapman
+
{{:Front_Range_OWASP_Conference_2013/Continuing_Education}}
Conference Lead (Alt): Kathy Thaxton - kathy.thaxton at owasp dot org
+
Sponsorship Coordinator: Micah Tapman (acting)
+
CTF Lead: Mark Major - mark dot major at owasp dot org
+
  
Presentation Selection Committee:
+
=Hotel and Travel=
TBD
+
{{:Front_Range_OWASP_Conference_2013/Travel}}
  
 +
=Presentation Materials=
 +
{{:Front_Range_OWASP_Conference_2013/Archive}}
  
Colorado Chapter Hosts:
+
</font>
* Andy Lewis - OWASP Denver - alewis at owasp dot org
+
* Mark Major - OWASP Boulder - mark dot major at owasp dot org
+
* Might have a CO Springs chapter in time for SnowFROC; stay tuned...
+
 
+
====Sponsors====
+
 
+
If you are interested in sponsoring the Front Range OWASP Conference, please contact Micah Tapman at micah at aerstone dot com.
+
<!-- [[File:Sponsors.PNG]]
+
-->
+
 
+
  <!-- This year we are organizing the conference with the support of our colleagues at the [http://www.cloudsecurityalliance.org/ Cloud Security Alliance], and will feature an AppSec track as well as a CloudSec/VirtSec track.
+
-->
+
===Historical Information for 2012===
+
====Registration====
+
<!--
+
[http://snowfroc2012.eventbrite.com Registration for SnowFROC is now open!]
+
 
+
$20 covers breakfast, lunch, and a WORLD-CLASS AppSec conference!
+
 
+
Click [http://snowfroc2012.eventbrite.com HERE] to register now for SnowFROC!
+
-->
+
 
+
<!-- FAIL - need to get our act together MUCH EARLIER if we're going to have OWASP training in conjunction w/SnowFROC! Click [[Denver,_Colorado|here]] to register for OWASP Deep Dives in Denver!
+
Specifically:
+
1. Include Kate/OWASP Ops in SnowFROC planning
+
2. AT A MINIMUM, GET THE SCHEDULE AND PUBLISH IT
+
3. NEED  a COUPLE of local chapter meetings to socialize/promote the ACTUAL CLASSES
+
-->
+
<!-- ====Agenda====
+
 
+
'''CFP has closed; '''the agenda is being formed NOW and the draft agenda should be published SOON!
+
-->
+
 
+
====Agenda and Presentations:====
+
 
+
The agenda follows the successful OWASP conference multi track format, with opening keynotes and presentations in the main room, split tracks in the middle of the day, and closing panel discussions back in the main room.
+
 
+
{| style="width:86%" border="0" align="center"
+
! colspan="4" align="center" style="background:#4058A0; color:white" | March 22nd, 2012
+
|-
+
| style="width:10%; background:#7B8ABD" | 07:45-08:30 || colspan="3" style="width:80%; background:#C2C2C2" align="left" | Registration and Continental Breakfast in the Adirondack Room
+
|-
+
| style="width:10%; background:#7B8ABD" | 08:30-08:45 || colspan="3" style="width:80%; background:#F2F2F2" align="center" | Welcome to SnowFROC 2013 Conference
+
 
+
''OWASP Denver and OWASP Boulder Chapter Leaders''
+
|-
+
| style="width:10%; background:#7B8ABD" | 08:45-09:10 || colspan="3" style="width:80%; background:#F2F2F2" align="center" |
+
'''State of OWASP'''
+
<!--
+
''[[Matt_Tesauro|Matt Tesauro]]''
+
-->
+
|-
+
| style="width:10%; background:#7B8ABD" | 09:10-10:10 || colspan="3" style="width:80%; background:#F2F2F2" align="center" | '''Keynote: tbd'''
+
 
+
''tbd'' 
+
 
+
|-
+
 
+
| style="width:10%; background:#7B8ABD" | 10:10-10:30 || colspan="3" style="width:80%; background:#C2C2C2" align="left" | Break - Expo
+
|-
+
 
+
| style="width:10%; background:#7B8ABD" | || colspan="1" style="width:45%; background:#BC857A" | '''Tech Track - Zenith Room 640'''
+
| colspan="1" style="width:45%; background:#BCA57A" | '''Management Track <!-- - Senate Chamber -->'''
+
|-
+
 
+
| style="width:10%; background:#7B8ABD" | 10:30-11:15 || style="width:45%; background:#BC857A" align="left" | tbd
+
''tbd''
+
 
+
| style="width:45%; background:#BCA57A" align="left" | tbd Mngmnt
+
''tbd''
+
|-
+
 
+
| style="width:10%; background:#7B8ABD" | 11:15-12:00 || style="width:45%; background:#BC857A" align="left" | tbd tech
+
+
''tbd''
+
 
+
| style="width:45%; background:#BCA57A" align="left" | tbd tech 
+
''tbd'' 
+
 
+
|-
+
 
+
 
+
| style="width:10%; background:#7B8ABD" | 12:00-13:00 || colspan="3" style="width:80%; background:#C2C2C2" align="left" | Lunch - Expo
+
  |-
+
 
+
 
+
| style="width:10%; background:#7B8ABD" | 13:00-13:50 || style="width:45%; background:#BC857A" align="left" | tbd tech
+
+
''tbd''
+
 
+
| style="width:45%; background:#BCA57A" align="left" | tbd mngmnt 
+
''tbd'' 
+
 
+
 
+
|-
+
 
+
 
+
| style="width:10%; background:#7B8ABD" | 13:50-14:40 || style="width:45%; background:#BC857A" align="left" | tbd tech
+
''tbd''
+
 
+
| style="width:45%; background:#BCA57A" align="left" | tbd mngmnt
+
''tbd''
+
 
+
 
+
|-
+
 
+
| style="width:10%; background:#7B8ABD" | 14:40-15:00 || colspan="3" style="width:80%; background:#C2C2C2" align="left" | BREAK
+
|-
+
 
+
| style="width:10%; background:#7B8ABD" | 15:00-15:50 || style="width:45%; background:#BC857A" align="left" | tbd tech
+
''tbd''
+
 
+
| style="width:45%; background:#BCA57A" align="left" | tbd Mngmnt
+
''tbd''
+
 
+
|-
+
| style="width:10%; background:#7B8ABD" | 15:50-16:30 || colspan="3" style="width:80%; background:#F2F2F2" align="center" | End of Conference Panel Discussion:
+
 
+
Topic: ''Attendees' choice(s)?'' 
+
 
+
'''Moderator:''' ''tbd''
+
'''Panelists:''' ''tbd, others''
+
|-
+
 
+
|-
+
| style="width:10%; background:#7B8ABD" | 16:30-17:30 || colspan="3" style="width:80%; background:#C2C2C2" align="left" | Wrap up, vendor raffles!
+
|-
+
 
+
|}
+
 
+
 
+
====Logistics====
+
[[Image:Denver_mountains.JPG]]
+
<!--
+
This year, the conference will again be held at University of Colorado, Denver at the [http://maps.google.com/maps?hl=en&ie=UTF8&cid=0,0,17887458453474608109&fb=1&split=1&gl=us&dq=Tivoli+Student+Union+in+downtown+Denver,+CO&daddr=900+Auraria+Pkwy+%23+325E,+Denver,+CO+80204&geocode=2315206160437382962,39.746366,-105.007463&ei=jKOsSeKrM5O5twfLh4GDBg&z=16 Tivoli Student Union]  (900 Auraria Pkwy # 325E Denver, CO 80204).
+
-->
+
<!--  *** need image, lat-long, directions [[File:Froc map.GIF|thumb|left]]
+
 
+
[http://maps.google.com/maps?f=q&source=s_q&hl=en&geocode=&q=1200+Larimer+Street,+Denver,+CO&sll=37.0625,-95.677068&sspn=37.188995,62.226563&ie=UTF8&hq=&hnear=1200+Larimer+St,+Denver,+Colorado+80204&z=16&iwloc=A Google Map of the Venue: 1200 Larimer St., Denver CO 80204]
+
-->
+
 
+
=====Accomodation=====
+
OWASP is in the process of negotiating discounted rates with the uber-pimpin [http://www.hotelteatro.com/ Hotel Teatro].  Rooms under the FROC rate will be competitively priced and include courtesy Cadillac Escalade transportation to and from Auraria Campus. <!-- Currently a "petite queen" room will be reduced from $279/night to $149 by mentioning SnowFROC. -->
+
 
+
To reserve a room, contact Hotel Teatro at +1.303.228.1100 and mention SnowFROC or use the [https://reservations.ihotelier.com/crs/g_reservation.cfm?groupID=464765&hotelID=14708 iHotelier.com link here].
+
 
+
=====How to get to the venue?=====
+
 
+
*By taxi: taxi from the airport to venue is about $50 USD
+
 
+
*From hotel: transport from the conference hotel (Hotel Teatro) by limo is free
+
 
+
*By car: there is plenty of parking at the Tivoli.  Attendees should park at the Tivoli lot (as in past years).  Parking validation will be provided for registered FROC participants.
+
 
+
====Call for Presentations====
+
<!-- The [[Front_Range_OWASP_Conference_2012_CFP|call for presentations]] is open until February 23rd 2012. -->
+
 
+
<!-- The [[Front_Range_OWASP_Conference_2012_CFP|call for presentations]] closed February 23rd.  If you've got a compelling presentation involving bleeding-edge research please contact steve dot kosten /\+ owasp d0+ org for consideration.
+
-->
+
 
+
<!-- ===[[SnowFROC Tentative Schedule]]=== -->
+
 
+
<!-- Back to [https://www.owasp.org/index.php/Front_Range_OWASP_Conference_2009 SnowFROC Home] -->
+
 
+
<!-- ====Capture the Flag (CTF)====
+
 
+
A capture the flag contest may be held if we can find space and someone to set it up and lead it.
+
-->
+
 
+
 
+
 
+
We were proud to have the following sponsors for 2012's conference and hope to see them again:
+
<!--
+
*Accuvant
+
*Breach
+
*Business Partner Solutions
+
*Denim Group
+
*Fishnet Security
+
*IBM
+
*Imperva
+
*Laz
+
*Lares
+
*Trustwave
+
*WhiteHat Security
+
*Hosting.com
+
-->
+
<!--
+
 
+
*[http://www.denimgroup.com/ Denim Group]
+
*[http://www.fortify.com/ Fortify Software]
+
-->
+
 
+
*[http://www.accuvant.com/ Accuvant]
+
*[http://www.hosting.com/ Hosting.com]
+
*[http://www.whitehatsec.com/home/index.html Whitehat Security]
+
*[http://www.hpenterprisesecurity.com/register/esp-grand-slam-camp-hpesp-homepage HP ESP]
+
*[http://www.coalfire.com/Home Coalfire Systems]
+
*[http://www.rapid7.com/ Rapid7]
+
*[http://www.silvertailsystems.com/ Silvertail Systems]
+
*[http://www.southseascorp.com/ South Seas Corporation]
+
 
+
 
+
<!--  *** Logistics information for sponsors is available [[FROC2010 Sponsor Info|here]]
+
 
+
More information about conference sponsorship is available [[OWASP AppSec Conference Sponsors | here]].
+
-->
+
 
+
[[Category:OWASP AppSec Conference]]
+
 
+
 
+
<!--
+
====Twitter Feed====
+
{|
+
|-
+
| style="border: 1px solid rgb(204, 204, 204); width: 100%; font-size: 95%; color: rgb(0, 0, 0); background-color: rgb(236, 236, 236);" |
+
Use the '''[http://search.twitter.com/search?q=%23FROC #FROC]''' hashtag for your tweets (What are [http://hashtags.org/ hashtags]?)
+
 
+
'''@OWASP303 Twitter Feed ([http://twitter.com/OWASP303 follow us on Twitter!])'''
+
<twitter>55021150</twitter>
+
 
+
| style="width: 110px; font-size: 95%; color: rgb(0, 0, 0);" |
+
|}
+
-->
+
 
+
 
+
 
+
 
+
<!-- <hr>
+
<paypal>Denver</paypal> -->
+
 
+
 
<headertabs />
 
<headertabs />
 +
[[Category:OWASP_AppSec_Conference]]

Revision as of 19:34, 12 January 2013

SnowFROC 2013 wide white.png


[edit]

Welcome to SnowFROC 2013 - the 5th Annual Front Range OWASP Security Conference

Click here to register

The Colorado OWASP chapters are proud to present the 5th annual SnowFROC. Join 300 other developers, business owners, and security professionals for a day-and-a-half of presentations, training, and Birds-of-a-Feather (BoaF) sessions. The SnowFROC 2013 keynote speaker is Neal Ziring, Technical Director of InfoProtection at NSA.

The conference will occur on Thursday, March 28th at the Denver Marriott City Center and will feature four primary tracks:

  • High-Level Technical
  • Deep-Dive / Hands-on Technical
  • Management
  • Legal

Running in parallel to the conference proceedings will be a capture the flag (CTF) hacking competition developed exclusively for SnowFROC by Boulder OWASP chapter members. The day will conclude with a moderated panel discussion featuring top industry leaders.

On Friday, March 29, Aaron Weaver will teach a course in secure coding. This training is free to SnowFROC attendees!

Friday will also offer BoaF sessions. Join like-minded industry leaders and discuss pressing issues facing the industry and you. BoaF sessions are self-lead and may address and issue you would like. Pitch your idea and get the ball rolling!

Finally, Friday will feature a postmortem of the CTF tournament. In addition to discussing solutions, techniques, and tools, we will encourage participants to attack the previously out-of-bounds CTF framework. Itching to break into the scoreboard and rack up the points? The gloves come off Friday morning.

Conference Committee

Mark Major: Director

Brad Carvalho: Sponsorship, Executive events
Craig Klosterman: Merchandise
Steve Kosten: Sponsorship, Executive events
Glen Matthes: Planning
Chris Rossi: CTF, Networking events
Greg Foss: CTF

Colorado Chapter Hosts

OWASP Boulder chapter: Mark Major
OWASP Denver chapter: Steve Kosten, Brad Carvalho (acting)

Call for Presentations

Please direct all interested practitioners and colleagues to this site.

Submission process

Potential speakers may submit abstracts of proposed presentations here.

Abstracts will be formatted automatically during the submission process. However, all uploaded materials must adhere to the following requirements:

  • Only Microsoft Word documents, PDFs, rich-text format documents, and text files will be reviewed.
  • Author names, affiliations, email addresses, and other personally-identifiable information must be stripped from the uploaded document.
  • All presentations must be titled. Titles should appear at the top of the page.
  • The overview of the proposed presentation should not exceed 300 words.

Presenters will be allotted 45-minute time slots. One abstract must be submitted for each presentation considered. All abstracts must be written in English.


Evaluation process

The following criteria will determine abstract rankings:

  • Applicability to the requested topics (see below)
  • Relevance to web application development and operations
  • Relevance to the cyber security industry at large
  • Relevance to the OWASP Foundation
  • Strength of presentation (as determined by the review committee)
  • Timeliness of submission

Submitted abstracts will be assessed by selected members of the Colorado OWASP chapters. All reviews will be blind and author information will not be visible to reviewers.


Dates and deadlines

Abstract collection will begin January 14th and continue until all speaking slots are filled. Evaluations will occur on a rolling schedule with selected papers announced each Monday, beginning on February 11th. Although the rolling format extends the submission period significantly, potential speakers are advised to submit as early as possible in order to maximize chances for selection.

Final presentations of accepted abstracts must be submitted for review by March 17th. Templates and other presentation formatting constraints will be made available to selected speakers directly.

Phase 1: Jan 14 - Feb 11
Jan 14 - Feb 03: Submission period
Feb 04 - Feb 10: Evaluation period
Feb 11: Selected papers announcement

Phase 2: Feb 04 - Feb 18 (as needed)
Feb 04 - Feb 10: Submission period
Feb 11 - Feb 17: Evaluation period
Feb 18: Selected papers announcement

Phase 3: Feb 11 - Feb 25 (as needed)
Jan 11 - Feb 17: Submission period
Feb 18 - Feb 24: Evaluation period
Feb 25: Selected papers announcement

Phase 4: Feb 18 - Mar 04 (as needed)
Feb 18 - Feb 24: Submission period
Feb 25 - Mar 03: Evaluation period
Mar 04: Selected papers announcement

Presentation evaluation
Mar 17: Final draft presentations due
Mar 18 - Mar 25: Committee final review
Mar 28, 2013: SnowFROC proceedings


Legalities

All speakers must agree with and abide by the OWASP Speaker Agreement v2.0.

Anyone who cannot or will not abide by these terms will not be permitted to present at the conference.

In addition, presenters must agree to allow use of abstract titles, text, speaker names, and bios for conference promotion. With speaker consent, presentation materials will be distributed to conference attendees and will be recorded and archived for future reference.


Preferred topics

The following topics will be prioritized during the selection process.

High-level technical track

  • Web application security testing, especially targeting large and complex enterprise applications
  • Mobile device security
  • Cloud security
    • Impacts on the security model
    • Implementation of security controls
  • OWASP tools and projects
    • New and proposed projects
    • Development and status of existing projects

Deep-dive technical track

  • Technology-specific presentations (HTML5, AJAX, etc.)
  • Secure coding for web applications
  • Static code analysis
  • Hands-on countermeasures
  • Encryption across an n-tiered web application stack
  • Auditing web application mash-ups

Management track

  • Web application security management (scope, boundaries, responsibilities, legal considerations, etc.)
  • Emerging threats
  • Planning and managing secure software development life cycles
  • Metrics for managing application security
  • Business risks associated with application security

Legal track

  • Liability related to web application security
  • Data ownership and privacy laws within the cloud
  • Cyber security and privacy legislation and regulation
  • Electronic discovery considerations, both traditional and in the cloud
  • Cyber security considerations related to law enforcement
  • Data disclosure liability

SnowFROC 2013 registration

Click here to register

Pricing

$115 Non-Members Includes 1 year OWASP membership
$65 OWASP Members Register with the email address used to obtain OWASP membership to receive member pricing
$35 Students Proof of current enrollment is required at check-in (no exceptions)

Conference Location

SnowFROC 2013 will take place at Denver Marriott City Center located in the heart of downtown Denver, Colorado.

Conference proceedings will occur in the Denver Ballroom, Pre-Function area, and Colorado Ballrooms A-D. Out-of-town guest are encouraged to take advantage of group room rates.

Marriott dendt phototour44.jpg




                                                                                                                              Marriott Map.png

SnowFROC 2013 Schedule


Thu, Mar 28 Technical Track Deep-Dive Track Management Track Legal Track
07:00-08:30 Registration and Morning Snacks
Sponsored by HP
08:00-08:15 Welcome and Kick-off
Brad Carvalho, Mark Major
08:15-08:30 State of OWASP
Jim Manico
08:30-09:30 Keynote Address: Data Protection for the 21st Century
Neal Ziring, Technical Director for the National Security Agency’s Information Assurance Directorate (IAD)
Video
09:30-10:00 Coffee Break and Sponsor Expo
Sponsored by Aerstone
CTF Kick-off
Chris Rossi, Mark Major
10:00-10:45 DevFu: The inner ninja in every application developer
Danny Chrastil

Slides
Video
SIP Based Cloud Instances
Gregory Disney-Leugers

Slides
Video
Digital Bounty Hunters - Decoding Bug Bounty Programs
Jon Rose

Slides
Video
Electronic Discovery for System Administrators
Russell Shumway

Slides
Video
CTF
Sponsored by Aerstone
10:55-11:40 Adventures in Large Scale HTTP Header Abuse
Zachary Wolff

Slides
Video
How Malware Attacks Web Applications
Casey Smith

Slides
Video
Linking Security to Business Value in the Customer Service Industry
Dan Rojas

Slides
Video
Legal Issues of Forensics in the Cloud
David Willson

Slides
Video
11:40-12:40 Lunch and Sponsor Expo
Sponsored by Aerstone
12:40-13:25 Angry Cars: Hacking the "Car as Platform"
Aaron Weaver

Slides
Video
Top Ten Web Application Defenses
Jim Manico

Slides
Video
Using SaaS and the Cloud to Secure the SDLC
Andrew Earle

Slides
Video
CISPA: Why Privacy Advocates Hate This Legislation
Maureen Donohue Feinroth

Slides
Video
13:35-14:20 DevOps and Security: It's Happening. Right Now.
Helen Bravo

Slides
Video
A Demo of and Preventing XSS in .NET Applications
Larry Conklin

Slides
Video
Measuring Security Best Practices With OpenSAMM
Alan Jex

Slides
Video
Crafting a Plan for When Security Fails
Robert Lelewski

Slides
Video
14:30-15:15 Real World Cloud Application Security
Jason Chan

Slides
Video
Data Mining a Mountain of Zero Day Vulnerabilities
Joe Brady

Slides
Video
Defending Desktop (.NET/C#) Applications: Mitigating in the Dark (A Case Study Remix)
Jon McCoy

Slides
Video
Information Control: The Critical Need for a Defensible Position - Securing the Information Ecosystem
Tom Glanville

Slides
Video
15:15-15:45 Coffee Break and Sponsor Expo
Sponsored by Aerstone
15:45-16:45 Moderated Panel Discussion
   Aaron Weaver
   David Willson
   Dan Wilson
   Neal Ziring
   Moderator: Jim Manico
   Video
16:45-17:00 Closing Statements
Brad Carvalho, Mark Major
17:00- Sponsor Raffles, Drawings, and Contests CTF Wrap-Up
Chris Rossi, Mark Major
19:00-22:00+ After-party at Tarantula Billiards
Sponsored by AppliedTrust
Tarantula is located 3 blocks from the Marriott at the corner of 15th and Stout (1520 Stout Street, Denver)
Awards Ceremony at Tarantula (20:00)


Fri, Mar 29 Training Birds of a Feather: A Birds of a Feather: B Capture the Flag
09:00-9:45 Training: Secure Coding
Aaron Weaver
DevOps in Cloud environments (edit) BoaF 1b (edit) FLOSSHack: CTF VM
10:00-10:45 The modern threatscape: what have you seen? (edit) BoaF 2b (edit)
10:45-11:15 Coffee Break
Sponsored by Aerstone
11:15-12:00 Access Control (edit) BoaF 3b (edit) FLOSSHack: CTF Scoreboard
12:15-13:00 COTS solutions for secure enterprise architectures (edit) BoaF 4b (edit)

Current Sponsors

Aerstone

Aerstone provides strategic and technical cyber security consulting services including assessments, planning, architecture designed incident response, regulatory compliance, and computer forensics. We provide services and products for medium to large healthcare providers, financial services organizations and legal firms, and law enforcement.  Clients range from local businesses to government agencies.
Aerstone


Applied Trust

AppliedTrust provides IT infrastructure, security, and opensource consulting services. Our clients are organizations where effective IT is critical to the reputation and growth of their business, and hail from a variety of industries including healthcare, financial services, hospitality, recreation, and government. Our specialty areas include:


  • Web Application Security
  • Drupal and Linux
  • Security
  • Technology Selection and Implementation
  • Operations
  • Performance and High Availability
  • Assessment and Audit
  • System, Network, and Security Architecture
  • Strategy and Governance
Applied Trust


Checkmarx

Checkmarx - Source Code Analysis Made Easy

Checkmarx is the developer of next generation Static Code Analysis (SCA) solutions. The company pioneered the concept of a query language-based solution for identifying technical and logical code vulnerabilities. Checkmarx provides the best way for organizations to introduce security into their Software Development Lifecycle (SDLC) which systematically eliminates software risk. The product enables developers and auditors to easily scan un-compiled / un-built code in all major coding languages anywhere, anytime. CxSuite's application security testing is available in both "On Premise" and "On Demand" configurations. The security testing scans for the most prevalent security vulnerabilities as determined by OWASP Top 10, SANS, and other major standards. Checkmarx was recognized by Gartner as sole visionary in their latest SAST magic quadrant and as Cool vendor in application security. Customers include Fortune 500, government organizations and SMBs in over 30 countries.

Checkmarx


HP

HP is a leading provider of security and compliance solutions for the modern enterprise that wants to mitigate risk in its hybrid environment and defend against advanced threats. Based on market leading products from HP ArcSight, HP Fortify, and HP TippingPoint, the HP Security Intelligence Platform uniquely delivers the advanced correlation, application protection, and network defenses to protect today’s hybrid IT infrastructure from sophisticated cyber threats.
HP


Security Pursuit

Security Pursuit provides computer security services to help organizations protect their critical information systems. Based in Denver, Colorado, Security Pursuit's services include: IT Security Risk Analysis, Data Breach Incident Response, Network Penetration Testing and Vulnerability Assessments, Website Penetration Testing and Vulnerability Assessments, Wireless Network Security, Social Engineering Prevention, Security Awareness Training, Employee Termination Assistance and Virtual CISO consulting. We have conducted hundreds of security assessments for financial institutions, healthcare providers, retailers, utilities, airports, and municipal governments; many in support of PCI, GLBA, NCUA, and HIPAA compliance requirements. Security Pursuit’s computer security services provide you with a higher level of awareness about the security posture of your organization.
Security Pursuit


SouthSeas

Escaping network insecurity means identifying and eliminating vulnerability at each and every level. At South Seas Corporation, we consider the big picture and the finest details of your information technology, from computers to routers to servers and the cabling between, from intranets to the internet, from mobile devices to web applications to remote networks across the globe. We also address administrative issues, including security policy and federal compliance. Of course, your budget is top of mind from the beginning. The end result is a tailored solution designed to secure every byte of information traveling through, to and around your organization at every point, installed by certified experts trained to work hand in hand with your IT department. Take a load off your mind with South Seas Corporation.
SouthSeas


Veracode

Today most global enterprises live under the constant threat of being hacked, which begs this critical question – how do they innovate and rapidly release new and improved applications required to be an industry leader while still securing their organizations critical IP and data assets? Before Veracode, application security was widely thought to slow innovation, but not anymore. With the Veracode Platform, application security and innovation can go hand-in-hand. Whether applications are built, brought or outsourced, Veracode’s patented testing technology provides the intelligence needed to quickly secure them from the most common forms of attack.
Veracode




CPE and CLE credits

Much of the SnowFROC content is eligible for continuing professional education (CPE) or continuing legal education (CLE) credits. Please check with your institution regarding specific requirements.


CPE credits

The CISM CPE policy (www.isaca.org/cismcpepolicy) states:

One continuing professional education hour is earned for each fifty minutes of active participation (excluding lunches and breaks) in a professional educational activity. Continuing professional education hours are only earned in full-hour increments and rounding must be down. For example, a CISA who attends an eight-hour presentation (480 minutes) with 90 minutes of breaks will earn seven (7) continuing professional education hours.

Activities that qualify for CPE must be directly applicable to the management, design or assessment of an enterprise's information security as per the CISM job practice"


CLE credits

Conference organizers are actively pursuing certified seminar accreditation from the Colorado Board of Continuing Legal and Judicial Education. For additional information regarding CPEs and Rule 260 please visit the Colorado Supreme Court's CLE page.

Denver Marriott City Center

The Denver Marriott City Center is extending a discounted room rate to conference attendees. This rate applies between March 25th through April 1st, 2013. Please reference SnowFROC when reserving your room.

  • Group rate standard guest room: $159
  • Complimentary in-room Internet service


                                                                                                                              Marriott dendt phototour36.jpg


Denver Attractions


Colorado Attractions

Out-of-town visitors may be interested in staying for the weekend to enjoy all Colorado has to offer, including:


Skiing

The SnowFROC staff is pursuing a chartered bus and negotiated discounts for premier ski resorts and lift tickets. Check back soon for details!

2013 presentations

Keynote Address: Data Protection for the 21st Century
Panel Discussion

Technical Track
DevFu: The inner ninja in every application developer

Adventures in Large Scale HTTP Header Abuse

Angry Cars: Hacking the "Car as Platform"

DevOps and Security: It's Happening. Right Now.

Real World Cloud Application Security


Deep-Dive Track
SIP Based Cloud Instances

How Malware Attacks Web Applications

Top Ten Web Application Defenses

A Demo of and Preventing XSS in .NET Applications

Data Mining a Mountain of Zero-Day Vulnerabilities


Management Track
Digital Bounty Hunters - Decoding Bug Bounty Programs

Linking Security to Business Value in the Customer Service Industry

Using SaaS and the Cloud to Secure the SDLC

Measuring Security Best Practices With Open SAMM

Defending Desktop (.NET/C#) Applications: Mitigating in the Dark (A Case Study Remix)


Legal Track
Electronic Discovery for System Administrators

Legal Issues of Forensics in the Cloud

CISPA: Why Privacy Advocates Hate This Legislation

Crafting a Plan for When Security Fails

Information Control: The Critical Need for a Defensible Position - Securing the Information Ecosystem


Previous conferences

2012 presentations are available here.