Difference between revisions of "OWASP Israel 2010"

From OWASP
Jump to: navigation, search
(Created page with '== Location and Time == The 2010 annual OWASP Israel conference will be held at the Interdisciplinary Center Herzliya (IDC) on September 6th between in the Efi Arazi school of…')
 
Line 19: Line 19:
 
|- style="font-size:11pt"
 
|- style="font-size:11pt"
 
|style="color:#1F497D" width="68" height="30" align="right" valign="center" | 13:30-14:15
 
|style="color:#1F497D" width="68" height="30" align="right" valign="center" | 13:30-14:15
| valign="center" colspan=2 style="font-size:12pt" |    '''Gathering and Socializing'''
+
| valign="center" colspan=2 style="font-size:12pt" |   '''Gathering and Socializing'''
  
 
|- style="font-size:12pt"
 
|- style="font-size:12pt"
Line 28: Line 28:
 
|- style="font-size:11pt"
 
|- style="font-size:11pt"
 
|style="color:#1F497D" height="25" align="right" valign="center" | 14:15-14:30
 
|style="color:#1F497D" height="25" align="right" valign="center" | 14:15-14:30
|  valign="center" |  '''Opening Words'''   ''Ofer Maor, OWASP Israel Chairman''
+
|  valign="center" |  '''Opening Words'''    ''Ofer Maor, OWASP Israel Chairman''
 
|  valign="center" |  
 
|  valign="center" |  
  
 
|- style="font-size:11pt"
 
|- style="font-size:11pt"
 
|style="color:#1F497D" height="25" align="right" valign="center" | 14:30-15:10
 
|style="color:#1F497D" height="25" align="right" valign="center" | 14:30-15:10
|  valign="center" |  Hacker Intelligence: 6 Months of Attack Vector Research   ''Tal Be'ery, Imperva''
+
|  valign="center" |  Hacker Intelligence: 6 Months of Attack Vector Research    ''Tal Be'ery, Imperva''
 
|  valign="center" |  
 
|  valign="center" |  
  
 
|- style="font-size:11pt"
 
|- style="font-size:11pt"
 
|style="color:#1F497D" height="25" align="right" valign="center" | 15:10-15:50
 
|style="color:#1F497D" height="25" align="right" valign="center" | 15:10-15:50
|  valign="center" |  CSA Israel & The Challenges of Cloud Security   ''Guy Alfassi''
+
|  valign="center" |  CSA Israel & The Challenges of Cloud Security    ''Guy Alfassi''
 
|  valign="center" |  
 
|  valign="center" |  
  
 
|- style="font-size:11pt"
 
|- style="font-size:11pt"
 
|style="color:#1F497D" height="25" align="right" valign="center" | 15:50-16:30
 
|style="color:#1F497D" height="25" align="right" valign="center" | 15:50-16:30
|  valign="center" |  Beyond Negative Security: Protecting Web Applications using Positive Security   ''Or Katz, Trustwave''
+
|  valign="center" |  Beyond Negative Security: Protecting Web Applications using Positive Security    ''Or Katz, Trustwave''
 
|  valign="center" |  
 
|  valign="center" |  
  
 
|- style="font-size:11pt"
 
|- style="font-size:11pt"
 
|style="color:#1F497D" height="50" align="right" valign="center" | 16:30-17:00
 
|style="color:#1F497D" height="50" align="right" valign="center" | 16:30-17:00
|  valign="center"  style="font-size:12pt" colspan="2" |    '''Break'''
+
|  valign="center"  style="font-size:12pt" colspan="2" |   '''Break'''
  
 
|- style="font-size:11pt"
 
|- style="font-size:11pt"
 
|style="color:#1F497D" height="25" align="right" valign="center" | 17:00-17:40
 
|style="color:#1F497D" height="25" align="right" valign="center" | 17:00-17:40
|  valign="center" |  Practical Mod Security: Beyond the Core Rule Set    ''Josh Amishav-Zlatin, Pure Hacking''
+
|  valign="center" |  Practical Mod Security: Beyond the Core Rule Set     ''Josh Amishav-Zlatin, Pure Hacking''
 
|  valign="center" |  PCI:DSS and the New PA:DSS Standards: Myths, Trends and Pragmatic Methods for Building Secure Software that Complies
 
|  valign="center" |  PCI:DSS and the New PA:DSS Standards: Myths, Trends and Pragmatic Methods for Building Secure Software that Complies
  
 
|- style="font-size:11pt"
 
|- style="font-size:11pt"
 
|style="color:#1F497D" height="25" align="right" valign="center" | 17:40-18:20
 
|style="color:#1F497D" height="25" align="right" valign="center" | 17:40-18:20
|  valign="center" |  Accelerating Multi-Pattern Matching on Compressed HTTP Traffic    ''Yaron Koral, IDC''
+
|  valign="center" |  Accelerating Multi-Pattern Matching on Compressed HTTP Traffic     ''Yaron Koral, IDC''
|  valign="center" |  Cloud Computing Security: Mapping Concepts to Practical Techniques    ''Gilad Parann-Nissany, Porticor''
+
|  valign="center" |  Cloud Computing Security: Mapping Concepts to Practical Techniques     ''Gilad Parann-Nissany, Porticor''
  
 
|- style="font-size:11pt"
 
|- style="font-size:11pt"
 
|style="color:#1F497D" height="25" align="right" valign="center" | 18:20-19:00
 
|style="color:#1F497D" height="25" align="right" valign="center" | 18:20-19:00
|  valign="center" |  Runtime Hardening    ''Erez Metula, AppSec''
+
|  valign="center" |  Runtime Hardening     ''Erez Metula, AppSec''
|  valign="center" |  Real Life Application DoS Attacks    ''Ziv Gadot, Radware''
+
|  valign="center" |  Real Life Application DoS Attacks     ''Ziv Gadot, Radware''
  
 
|- style="font-size:11pt"
 
|- style="font-size:11pt"
 
|style="color:#1F497D" height="25" align="right" valign="center" | 19:00-19:05
 
|style="color:#1F497D" height="25" align="right" valign="center" | 19:00-19:05
|  valign="center" colspan="2"|  '''Closing Words'''   ''Ofer Maor, OWASP Israel Chairman''
+
|  valign="center" colspan="2"|  '''Closing Words'''    ''Ofer Maor, OWASP Israel Chairman''
 
|}
 
|}
  

Revision as of 18:58, 31 August 2010

Contents

Location and Time

The 2010 annual OWASP Israel conference will be held at the Interdisciplinary Center Herzliya (IDC) on September 6th between in the Efi Arazi school of computer science. You can find information on how to get to the IDC and a map of the campus here.

All presentations are in Hebrew.

The conference was sponsored by:

OWASP IL Sponsors IDC New.JPG    OWASP_IL_Sponsor_Hacktics.jpg     [1]

Contact

For further details contact Ofer Maor at ofer.maor at owasp.org


Agenda

13:30-14:15   Gathering and Socializing
  Room #1 Room #2

14:15-14:30  Opening Words    Ofer Maor, OWASP Israel Chairman  
14:30-15:10  Hacker Intelligence: 6 Months of Attack Vector Research    Tal Be'ery, Imperva  
15:10-15:50  CSA Israel & The Challenges of Cloud Security    Guy Alfassi  
15:50-16:30  Beyond Negative Security: Protecting Web Applications using Positive Security    Or Katz, Trustwave  
16:30-17:00   Break
17:00-17:40  Practical Mod Security: Beyond the Core Rule Set    Josh Amishav-Zlatin, Pure Hacking  PCI:DSS and the New PA:DSS Standards: Myths, Trends and Pragmatic Methods for Building Secure Software that Complies
17:40-18:20  Accelerating Multi-Pattern Matching on Compressed HTTP Traffic    Yaron Koral, IDC  Cloud Computing Security: Mapping Concepts to Practical Techniques    Gilad Parann-Nissany, Porticor
18:20-19:00  Runtime Hardening    Erez Metula, AppSec  Real Life Application DoS Attacks    Ziv Gadot, Radware
19:00-19:05  Closing Words    Ofer Maor, OWASP Israel Chairman

The people behind the conference

OWASP Israel is made by the people who contribute their time and brain to its success. The following people are working to ensure that OWASP Israel 2010 is a success.

If you feel that you also can contribute or have interesting ideas regarding the conference, don't hesitate to contact me.

Contributors

  • Adi Sharabani (IBM)
  • Dr. Anat Bremler-Barr (Interdisciplinary Center Herzliya)
  • Avi Douglen
  • Ofer Maor (Hacktics)
  • Ofer Shezaf (Better Place)
  • Or Katz (Trustwave)