OWASP AppSec DC 2012/OWASP Broken Web Applications OWASP BWA 10 Release

From OWASP
Revision as of 19:52, 11 March 2012 by Mark.bristow (Talk | contribs)

Jump to: navigation, search

AppSecDC-468x60-banner-2012.jpg

Registration Now OPEN! | Hotel | Schedule | Convention Center | AppSecDC.org

The Presentation

The OWASP Broken Web Applications (OWASP BWA) Project produces a free and open source virtual machine (VM) containing more than twenty web applications with a variety of security vulnerabilities. The project VM is well suited for use as a learning environment and as a standard target for testing tools and techniques. After two years of betas, the project is proud to announce its first major release. This talk will provide an overview of the project, the features in the 1.0 release, and the vision for the projects future.

The Speakers

Chuck Willis

AppSecDC12-willis.jpg
Chuck Willis is a Technical Director with MANDIANT, a full spectrum information security company in Alexandria, Virginia. At MANDIANT, Mr. Willis concentrates in several areas including application security, where he assesses the security of sensitive software applications through external testing and static analysis. He also studies static analysis tools and techniques and strives to identify better ways to evaluate and secure software. Mr. Willis is the leader of the OWASP Broken Web Applications project, which distributes a virtual machine with known vulnerable web applications for testing and training.

Gold Sponsors

Aspect logo owasp.jpg AppSecDC2009-Sponsor-securicon.gif AppSecDC2009-Sponsor-mandiant.gif AppSecDC2012-ISC2.gif

Silver Sponsors

SPL-LOGO-MED.png

Small Business

AppSecDC2012-Sponsor-sideas.gif BayShoreNetworks.png

Exhibitors

link=http://www.codenomicon.com/ Codenomicon WhiteHat Logo.png AppSecDC2012-HP.jpg WSI - Logo.jpg