This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "OWASP Germany 2008 Conference"

From OWASP
Jump to: navigation, search
Line 2: Line 2:
 
(The OWASP Germany 2008 conference will be held on November 25, 2008 in Frankfurt.)
 
(The OWASP Germany 2008 conference will be held on November 25, 2008 in Frankfurt.)
  
== Vortragsvorschläge ==
+
Veranstaltungsort: Steigenberger Airport Hotel (per Bahn und Flieger sehr gut zu erreichen)
  
 +
== Agenda ==
 
{| class="wikitable" <hiddentext>generated with [[:de:Wikipedia:Helferlein/VBA-Macro for EXCEL tableconversion]] V1.7<\hiddentext>
 
{| class="wikitable" <hiddentext>generated with [[:de:Wikipedia:Helferlein/VBA-Macro for EXCEL tableconversion]] V1.7<\hiddentext>
|- style="background-color:#99CCFF"  valign="bottom"
+
|- style="background-color:#C0C0C0;font-size:12pt"  valign="top"
| width="316" height="13" | Vorschlagsliste (in der Reihenfolge des Eingangs)
+
| width="96" height="16" | 9 00-9:30
| width="60" | &nbsp;
+
|style="font-weight:bold" width="231" colspan="2" | Registrierung
 
 
|-  valign="bottom"
 
| height="13" | &nbsp;
 
| Dauer
 
 
 
|-  valign="bottom"
 
|style="font-weight:bold" height="13" | Überblick über OWASP
 
  | &nbsp;
 
 
 
|-  valign="bottom"
 
| height="13" | _  Sebastien Deleersnyder
 
| &nbsp;
 
 
 
|-  valign="bottom"
 
| height="13" | &nbsp;
 
| &nbsp;
 
 
 
|-   valign="bottom"
 
|style="font-weight:bold" height="13" | Server-side Detection of XSS / Cross-Site Request Forgery (CSRF) / Evaluating Static Code Analysis
 
| &nbsp;
 
 
 
|-  valign="bottom"
 
| height="13" | _  Martin Johns
 
| &nbsp;
 
 
 
|-  valign="bottom"
 
| height="13" | &nbsp;
 
| &nbsp;
 
 
 
|-  valign="bottom"
 
|style="font-weight:bold" height="13" | Kickstart für sichere Webanwendungen
 
| &nbsp;
 
 
 
|-  valign="bottom"
 
| height="13" | _  Thomas Schreiber
 
| &nbsp;
 
 
 
|-  valign="bottom"
 
| height="13" | &nbsp;
 
| &nbsp;
 
 
 
|-  valign="bottom"
 
|style="font-weight:bold" height="13" | Vorstellung des OWASP Best Practices Guide zum Einsatz von Web Application Firewalls
 
| &nbsp;
 
 
 
|-  valign="bottom"
 
| height="13" | _  Alex Meisel
 
| &nbsp;
 
 
 
|-  valign="bottom"
 
| height="13" | &nbsp;
 
| &nbsp;
 
 
 
|-  valign="bottom"
 
|style="font-weight:bold" height="13" | Wirtschaftlichkeitsbetrachtungen von IT-Sicherheitsmaßnahmen
 
| &nbsp;
 
 
 
|-  valign="bottom"
 
| height="13" | _  Maximilian Dermann
 
| &nbsp;
 
 
 
|-  valign="bottom"
 
| height="13" | &nbsp;
 
| &nbsp;
 
 
 
|-  valign="bottom"
 
|style="font-weight:bold" height="13" | Cross-Site Scripting Filter Evasion
 
| &nbsp;
 
 
 
|-  valign="bottom"
 
| height="13" | _  Alexios Fakos
 
| &nbsp;
 
 
 
|-  valign="bottom"
 
| height="13" | &nbsp;
 
| &nbsp;
 
 
 
|-  valign="bottom"
 
|style="font-weight:bold" height="13" | Security-by-Design durch Einsatz von MVC
 
| &nbsp;
 
 
 
|-  valign="bottom"
 
| height="13" | _  Mirko Richter
 
| &nbsp;
 
 
 
|-  valign="bottom"
 
| height="13" | &nbsp;
 
| &nbsp;
 
 
 
|-  valign="bottom"
 
|style="font-weight:bold" height="13" | Best Practices zur Inputvalidierung
 
| &nbsp;
 
 
 
|-  valign="bottom"
 
| height="13" | _  Boris Hemkemeier
 
| &nbsp;
 
 
 
|-  valign="bottom"
 
| height="13" | &nbsp;
 
| &nbsp;
 
 
 
|-  valign="bottom"
 
|style="font-weight:bold" height="13" | Sicherheit von Rich Internet Applications
 
| &nbsp;
 
 
 
|-  valign="bottom"
 
| height="13" | _ Fukami
 
| &nbsp;
 
 
 
|-  valign="bottom"
 
| height="13" | &nbsp;
 
| &nbsp;
 
 
 
|-  valign="bottom"
 
|style="font-weight:bold" height="13" | Measuring the Security of Web Applications
 
| &nbsp;
 
 
 
|-  valign="bottom"
 
| height="13" | _  Sebastian Schinzel
 
| &nbsp;
 
 
 
|-  valign="bottom"
 
| height="13" | &nbsp;
 
| &nbsp;
 
 
 
|-  valign="bottom"
 
|style="font-weight:bold" height="13" | Learning of Positive Security Models for Web-Applications
 
| &nbsp;
 
 
 
|-  valign="bottom"
 
| height="13" | _  Christian Bockermann
 
| &nbsp;
 
  
|-   valign="bottom"
+
|- style="background-color:#99CCFF;font-size:12pt"  valign="top"
| height="13" | &nbsp;
+
| height="16" | 9:30-9:45
| &nbsp;
+
|style="font-weight:bold" colspan="2" | Begrüßung
  
|-   valign="bottom"
+
|- style="background-color:#CCFFFF;font-size:12pt"  valign="top"
| height="13" | &nbsp;
+
| rowspan="2" height="16" | 9:45-10:30
| &nbsp;
+
|style="font-weight:bold" colspan="2" | OWASP Overview (in Englisch)
 
 
|-  valign="bottom"
 
| height="13" | &nbsp;
 
| &nbsp;
 
  
|}
+
|- style="background-color:#CCFFFF;font-size:12pt"  valign="top"
 +
| colspan="2" | Sebastien Deleersnyder, OWASP Foundation Board Member
  
 +
|- style="background-color:#99CCFF;font-size:12pt"  valign="top"
 +
| height="16" | 10:30-11:15
 +
|style="font-weight:bold" colspan="2" | Wirtschaftlichkeitsbetrachtungen von IT-Sicherheitsmaßnahmen
  
== Agenda ==
+
|- style="background-color:#99CCFF;font-size:12pt"
(vorläufiges Template)
+
| height="15"  valign="top" | &nbsp;
 +
| colspan="2" valign="top" | Max Dermann, Lufthansa Technik AG
  
 +
|- style="background-color:#C0C0C0;font-size:12pt"  valign="top"
 +
| height="15" | 11:15-11:30
 +
| colspan="2" | Kaffeepause
  
{| class="wikitable" <hiddentext>generated with [[:de:Wikipedia:Helferlein/VBA-Macro for EXCEL tableconversion]] V1.7<\hiddentext>
+
|- style="background-color:#CCFFFF;font-size:12pt"  valign="top"
|- style="background-color:#99CCFF"  valign="bottom"
+
| rowspan="2" height="16" | 11:30-12:15
|style="font-weight:bold" width="65" height="13" | Vorabendveranstaltung 24.11.08
+
|style="font-weight:bold" colspan="2" | Kickstart für sichere Webanwendungen
| width="177" | &nbsp;
 
  
|- style="background-color:#99CCFF"  valign="bottom"
+
|- style="background-color:#CCFFFF;font-size:12pt"  valign="top"
| height="14" | 19:30 - 00:00
+
| colspan="2" | Thomas Schreiber, SecureNet
|style="font-style:Italic" | tobedone
 
  
|-   valign="bottom"
+
|- style="background-color:#99CCFF;font-size:12pt"  valign="top"
| height="13" | &nbsp;
+
| height="15" | 12:15-13:00
| &nbsp;
+
| colspan="2" | NN
  
|-   valign="bottom"
+
|- style="background-color:#99CCFF;font-size:12pt"  valign="top"
| height="13" | &nbsp;
+
| height="15" | &nbsp;
 
  | &nbsp;
 
  | &nbsp;
 
|- style="background-color:#C0C0C0;font-weight:bold"  valign="bottom"
 
| height="13" | Vormittagssession
 
 
  | &nbsp;
 
  | &nbsp;
  
|-   valign="bottom"
+
|- style="background-color:#C0C0C0;font-size:12pt"  valign="top"
| height="13" | 9:00 - 9:10
+
| height="16" | 13:00-14:00
| Begrüßung
+
|style="font-weight:bold" colspan="2" | Mittagspause / Essen
 
 
|-  valign="bottom"
 
| height="13" | 9:10 - 10:00
 
| Überblick über die OWASP
 
  
|-   valign="bottom"
+
|- style="background-color:#CCFFFF;font-size:12pt"  valign="top"
| height="13" | 10:00 - 00:00
+
| rowspan="2" height="16" | 14:00-14:45
| Vortrag V1
+
|style="font-weight:bold" colspan="2" | Vorstellung des OWASP Best Practices Guide zum Einsatz von Web Application Firewalls
  
|-   valign="bottom"
+
|- style="background-color:#CCFFFF;font-size:12pt"  valign="top"
| height="13" | 00:00 - 00:00
+
| colspan="2" | Alex Meisel, Art of Defence
| Vortrag V2
 
  
|- style="font-style:Italic;text-decoration:underline"  valign="bottom"
+
|- style="background-color:#C0C0C0;font-size:12pt"  valign="top"
|style="font-style:Italic" height="13" | 00:00 - 00:00
+
| height="15" | 5 min
|style="font-style:Italic" | Vortrag V3 (opt.)
+
| colspan="2" | Raumsuche
  
|-   valign="bottom"
+
|- style="font-size:12pt"  valign="top"
|style="text-decoration:none" height="13" | &nbsp;
+
| height="15" | &nbsp;
| &nbsp;
+
| colspan="2" | Tracks: 30 Min Präsentation , 10 Min Diskussion + Raumsuche
  
|- style="background-color:#FFFFCC"  valign="bottom"
+
|- style="font-size:12pt"  valign="top"
| height="13" | 12:00 - 13:30
+
| height="16" | &nbsp;
| Mittagspause
+
|style="font-weight:bold" | Track 1
 +
|style="font-weight:bold" | Track 2
  
|-   valign="bottom"
+
|- style="background-color:#99CCFF;font-size:12pt"  valign="top"
| height="13" | &nbsp;
+
| height="32" | 14.50-15:30
| &nbsp;
+
|style="font-weight:bold" | Sicherheit von Rich Internet Applications
 +
|style="font-weight:bold" | Server-side Detection of XSS
  
|- style="background-color:#C0C0C0;font-weight:bold" valign="bottom"
+
|- style="background-color:#99CCFF;font-size:12pt" valign="top"
| colspan="2" height="13" | Nachmittagssession 1
+
| height="15" | &nbsp;
 +
| Fukami
 +
| Martin Johns, Uni Hamburg
  
|-   valign="bottom"
+
|- style="background-color:#CCFFFF;font-size:12pt"  valign="top"
| height="13" | 13:30 - 00:00
+
| height="32" | 15:30-16:10
| Vortrag N11
+
|style="font-weight:bold" | Measuring the Security of Web Applications
 +
|style="font-weight:bold" | Cross-Site Scripting Filter Evasion
  
|-   valign="bottom"
+
|- style="background-color:#CCFFFF;font-size:12pt"  valign="top"
| height="13" | 00:00 - 00:00
+
| height="15" | &nbsp;
  | Vortrag N12
+
| Sebastian Schinzel, Virtual Forge
 +
  | Alexios Fakos, n.runs
  
|-   valign="bottom"
+
|- style="background-color:#C0C0C0;font-size:12pt"  valign="top"
| height="13" | &nbsp;
+
| height="15" | 16:10-16:30
| &nbsp;
+
| colspan="2" | Kaffeepause
  
|- style="background-color:#FFFFCC"  valign="bottom"
+
|- style="background-color:#99CCFF;font-size:12pt"  valign="top"
| height="13" | 15:30 - 16:00
+
| height="32" | 16:30-17:10
| Kaffeepause
+
|style="font-weight:bold" | Security-by-Design durch Einsatz von MVC
 
+
|style="font-weight:bold" | Learning of Positive Security Models for Web-Applications
|-  valign="bottom"
 
| height="13" | &nbsp;
 
| &nbsp;
 
  
|- style="background-color:#C0C0C0;font-weight:bold" valign="bottom"
+
|- style="background-color:#99CCFF;font-size:12pt" valign="top"
| colspan="2" height="13" | Nachmittagssession 2
+
| height="15" | &nbsp;
 +
| Mirko Richter, SecureNet GmbH
 +
| Christian Bockermann
  
|-   valign="bottom"
+
|- style="background-color:#CCFFFF;font-size:12pt"  valign="top"
| height="13" | 16:00 - 00:00
+
| rowspan="2" height="16" | 17:10-17:50
| Vortrag N21
+
|style="font-weight:bold" colspan="2" | Goldene Regeln der IT-Sicherheit bei der Beauftragung und Erstellung von Software
  
|-   valign="bottom"
+
|- style="background-color:#CCFFFF;font-size:12pt"  valign="top"
| height="13" | 00:00 - 00:00
+
| colspan="2" | Tom Schröer, SAP AG (angefragt), Dr. Boris Hemkemeier, Commerzbank
| Vortrag N22
 
  
|-   valign="bottom"
+
|- style="background-color:#99CCFF;font-size:12pt"  valign="top"
| height="13" | 00:00 - 18:00
+
| height="16" | 17:50-18:00
| Schlussworte
+
|style="font-weight:bold" colspan="2" | Schlußwort
  
 
|}
 
|}

Revision as of 03:54, 15 October 2008

Die OWASP Germany 2008 Konferenz wird am 25.11.08 mit einer Vorabendveranstalung am 24.11.08 in Frankfurt stattfinden. (The OWASP Germany 2008 conference will be held on November 25, 2008 in Frankfurt.)

Veranstaltungsort: Steigenberger Airport Hotel (per Bahn und Flieger sehr gut zu erreichen)

Agenda

9 00-9:30 Registrierung
9:30-9:45 Begrüßung
9:45-10:30 OWASP Overview (in Englisch)
Sebastien Deleersnyder, OWASP Foundation Board Member
10:30-11:15 Wirtschaftlichkeitsbetrachtungen von IT-Sicherheitsmaßnahmen
  Max Dermann, Lufthansa Technik AG
11:15-11:30 Kaffeepause
11:30-12:15 Kickstart für sichere Webanwendungen
Thomas Schreiber, SecureNet
12:15-13:00 NN
     
13:00-14:00 Mittagspause / Essen
14:00-14:45 Vorstellung des OWASP Best Practices Guide zum Einsatz von Web Application Firewalls
Alex Meisel, Art of Defence
5 min Raumsuche
  Tracks: 30 Min Präsentation , 10 Min Diskussion + Raumsuche
  Track 1 Track 2
14.50-15:30 Sicherheit von Rich Internet Applications Server-side Detection of XSS
  Fukami Martin Johns, Uni Hamburg
15:30-16:10 Measuring the Security of Web Applications Cross-Site Scripting Filter Evasion
  Sebastian Schinzel, Virtual Forge Alexios Fakos, n.runs
16:10-16:30 Kaffeepause
16:30-17:10 Security-by-Design durch Einsatz von MVC Learning of Positive Security Models for Web-Applications
  Mirko Richter, SecureNet GmbH Christian Bockermann
17:10-17:50 Goldene Regeln der IT-Sicherheit bei der Beauftragung und Erstellung von Software
Tom Schröer, SAP AG (angefragt), Dr. Boris Hemkemeier, Commerzbank
17:50-18:00 Schlußwort