Difference between revisions of "OWASP Israel 2010"

From OWASP
Jump to: navigation, search
m
Line 26: Line 26:
 
| valign="center" colspan=2 style="font-size:12pt" |   '''Gathering and Socializing'''
 
| valign="center" colspan=2 style="font-size:12pt" |   '''Gathering and Socializing'''
  
|- style="font-size:12pt"
 
|style="color:#1F497D" height="30" align="right" valign="center" |  
 
|  width="291" valign="center" align="center" | '''Room #1'''
 
|  width="296" valign="center" align="center" | '''Room #2
 
'''
 
 
|- style="font-size:11pt"
 
|- style="font-size:11pt"
 
|style="color:#1F497D" height="25" align="right" valign="center" | 14:15-14:30
 
|style="color:#1F497D" height="25" align="right" valign="center" | 14:15-14:30
|  valign="center" |  '''Opening Words'''    ''Ofer Maor, Hacktics - OWASP Israel Chairman''
+
|  valign="center" colspan="2" |  '''Opening Words'''    ''Ofer Maor, Hacktics - OWASP Israel Chairman''
|  valign="center" |  
+
  
 
|- style="font-size:11pt"
 
|- style="font-size:11pt"
 
|style="color:#1F497D" height="25" align="right" valign="center" | 14:30-15:10
 
|style="color:#1F497D" height="25" align="right" valign="center" | 14:30-15:10
|  valign="center" |  Hacker Intelligence: 6 Months of Attack Vector Research    ''Tal Be'ery, Imperva''
+
|  valign="center" colspan="2" |  Hacker Intelligence: 6 Months of Attack Vector Research    ''Tal Be'ery, Imperva''
|  valign="center" |  
+
  
 
|- style="font-size:11pt"
 
|- style="font-size:11pt"
 
|style="color:#1F497D" height="25" align="right" valign="center" | 15:10-15:50
 
|style="color:#1F497D" height="25" align="right" valign="center" | 15:10-15:50
|  valign="center" |  CSA Israel & The Challenges of Cloud Security    ''Guy Alfassi''
+
|  valign="center" colspan="2" |  CSA Israel & The Challenges of Cloud Security    ''Guy Alfassi''
|  valign="center" |  
+
  
 
|- style="font-size:11pt"
 
|- style="font-size:11pt"
 
|style="color:#1F497D" height="25" align="right" valign="center" | 15:50-16:30
 
|style="color:#1F497D" height="25" align="right" valign="center" | 15:50-16:30
|  valign="center" |  Beyond Negative Security: Protecting Web Applications using Positive Security    ''Or Katz, Trustwave''
+
|  valign="center" colspan="2" |  Beyond Negative Security: Protecting Web Applications using Positive Security    ''Or Katz, Trustwave''
|  valign="center" |  
+
  
 
|- style="font-size:11pt"
 
|- style="font-size:11pt"
 
|style="color:#1F497D" height="50" align="right" valign="center" | 16:30-17:00
 
|style="color:#1F497D" height="50" align="right" valign="center" | 16:30-17:00
 
|  valign="center"  style="font-size:12pt" colspan="2" |   '''Break'''
 
|  valign="center"  style="font-size:12pt" colspan="2" |   '''Break'''
 +
 +
|- style="font-size:12pt"
 +
|style="color:#1F497D" height="30" align="right" valign="center" |  
 +
|  width="291" valign="center" align="center" | '''Room #1'''
 +
|  width="296" valign="center" align="center" | '''Room #2'''
  
 
|- style="font-size:11pt"
 
|- style="font-size:11pt"

Revision as of 04:30, 1 September 2010

Contents

Location and Time

The 2010 annual OWASP Israel conference will be held at the Interdisciplinary Center Herzliya (IDC) on September 6th in the Efi Arazi school of computer science. You can find information on how to get to the IDC and a map of the campus here.

All presentations are in Hebrew.

The conference is sponsored by:

OWASP IL Sponsors IDC New.JPG    Hacktics_logo_verblue.jpg     Trustwave_2010_Logo.jpg

Contact

For further details contact Ofer Maor (ofer.maor at owasp.org)


    If you would like to participate, please confirm your arrival by mailing Ofer Maor (ofer.maor at owasp.org)


Agenda

13:30-14:15   Gathering and Socializing
14:15-14:30  Opening Words    Ofer Maor, Hacktics - OWASP Israel Chairman
14:30-15:10  Hacker Intelligence: 6 Months of Attack Vector Research    Tal Be'ery, Imperva
15:10-15:50  CSA Israel & The Challenges of Cloud Security    Guy Alfassi
15:50-16:30  Beyond Negative Security: Protecting Web Applications using Positive Security    Or Katz, Trustwave
16:30-17:00   Break
  Room #1 Room #2
17:00-17:40  Practical Mod Security: Beyond the Core Rule Set    Josh Amishav-Zlatin, Pure Hacking  PCI:DSS and the New PA:DSS Standards: Myths, Trends and Pragmatic Methods for Building Secure Software that Complies
17:40-18:20  Accelerating Multi-Pattern Matching on Compressed HTTP Traffic    Yaron Koral, IDC  Cloud Computing Security: Mapping Concepts to Practical Techniques    Gilad Parann-Nissany, Porticor
18:20-19:00  Runtime Hardening    Erez Metula, AppSec  Real Life Application DoS Attacks    Ziv Gadot, Radware
19:00-19:05  Closing Words    Ofer Maor, Hacktics - OWASP Israel Chairman

The people behind the conference

OWASP Israel is made by the people who contribute their time and brain to its success. The following people are working to ensure that OWASP Israel 2010 is a success.

If you feel that you also can contribute or have interesting ideas regarding the conference, don't hesitate to contact me.

Contributors

  • Adi Sharabani (IBM)
  • Dr. Anat Bremler-Barr (Interdisciplinary Center Herzliya)
  • Avi Douglen
  • Ofer Maor (Hacktics)
  • Ofer Shezaf (Better Place)
  • Or Katz (Trustwave)