Difference between revisions of "Template:OWASP IL 2012 Agenda"

From OWASP
Jump to: navigation, search
Line 13: Line 13:
 
|- style="border-style: solid; border-width: 1px;font-size:12pt"
 
|- style="border-style: solid; border-width: 1px;font-size:12pt"
 
|style="border-style: solid; border-width: 1px;color:#1F497D" height="30" align="right" valign="center" |  
 
|style="border-style: solid; border-width: 1px;color:#1F497D" height="30" align="right" valign="center" |  
|  style="border-style: solid; border-width: 1px;" valign="center" align="center" width=500 | <u>'''Breakers'''</u>
+
|  style="border-style: solid; border-width: 1px;" valign="center" align="center" width=500 | <u>'''Breakers (Track #1)'''</u>
|  style="border-style: solid; border-width: 1px;" valign="center" align="center" width=500 | <u>'''Defenders'''</u>
+
|  style="border-style: solid; border-width: 1px;" valign="center" align="center" width=500 | <u>'''Defenders (Track #2)'''</u>
  
 
|- style="border-style: solid; border-width: 1px;font-size:10pt"
 
|- style="border-style: solid; border-width: 1px;font-size:10pt"
Line 28: Line 28:
 
|- style="border-style: solid; border-width: 1px;font-size:10pt"
 
|- style="border-style: solid; border-width: 1px;font-size:10pt"
 
|style="border-style: solid; border-width: 1px;color:#1F497D" height="25" align="center" valign="center" | 11:15-12:00
 
|style="border-style: solid; border-width: 1px;color:#1F497D" height="25" align="center" valign="center" | 11:15-12:00
|  align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5  | '''[[OWASP_Israel_2011_Presentations#Building_an_Effective_SDLC_Program_-_Case_Study|Building an Effective SDLC Program - Case Study]]''' ''([[Media:OWASPIL2011-Bejerano-Maor-BuildingSDLC.pptx|Presentation]])''
+
|  align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5  | '''FYI: You've Got LFI'''  
''Guy Bejerano, CSO, Liveperson''<br>
+
''Tal Beery, Web Security Research Team Leader, Imperva''
''Ofer Maor, CTO, Seeker Security''
+
|  align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5  | '''I>S+D! – Integrated Application Security Testing (IAST), Beyond SAST/DAST '''  
|  align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5  | '''[[OWASP_Israel_2011_Presentations#Space-Time_Tradeoffs_in_Software-Based_Deep_Packet_Inspection|Space-Time Tradeoffs in Software-Based Deep Packet Inspection]]''' ''([[Media:OWASPIL2011-YotamHarchol-SpaceTimeTradeoffDPI.pptx|Presentation]])''
+
''Ofer Maor, CTO, Quotium''
''Yotam Harchol, IDC''
+
 
|- style="border-style: solid; border-width: 1px;font-size:10pt"
 
|- style="border-style: solid; border-width: 1px;font-size:10pt"
 
|style="border-style: solid; border-width: 1px;color:#1F497D" height="25" align="center" valign="center" | 12:00-12:45
 
|style="border-style: solid; border-width: 1px;color:#1F497D" height="25" align="center" valign="center" | 12:00-12:45

Revision as of 13:41, 27 August 2012

08:45-09:15 Registration, Gathering, Socializing & Networking
09:15-09:45 Opening Words

Ofer Maor - Chairman, OWASP Israel; Global Membership Committee, OWASP

09:45-10:10 OWASP Top 10 Hebrew Edition

Or Katz, OWASP Israel Board

  Breakers (Track #1) Defenders (Track #2)
10:15-11:00 The Diviner – Digital Clairvoyance:
Getting an Insight Into Server Code & Memory Using Blackbox Techniques

Shay Chen, CTO, Hacktics ASC, Ernst & Young
Eran Tamir, Team Leader, Hacktics ASC, Ernst & Young

Case Study - Providing Secure SDLC in an Agile Environment Using ESAPI

Yair Rovek, Security Specialist, Liveperson

11:00-11:15 Coffee Break
11:15-12:00 FYI: You've Got LFI

Tal Beery, Web Security Research Team Leader, Imperva

I>S+D! – Integrated Application Security Testing (IAST), Beyond SAST/DAST

Ofer Maor, CTO, Quotium

12:00-12:45 All Your Mobile Applications Are Belong to Us (Presentation)

Itzik Kotler, CTO, Security Art

Glass Box Testing - Thinking Inside the Box (Presentation)

Omri Weisman, Manager, Security Research Group, IBM

12:45-13:45 Lunch Break
13:45-14:30 CMS And Other Giants - The Nightmare of AppSec Testing (Presentation)

Irene Abezgauz, Product Manager, Seeker Security

Agile + SDL – Concepts and Misconceptions (Presentation)

Avi Douglen, Security Architect, Aware Security
Nir Bregman, Senior Project Manager, HP Software

14:30-15:15 When Crypto Goes Wrong (Presentation)

Erez Metula, Founder, AppSec Labs

Advanced Techniques & Tools for Testing Binary Protocols (Presentation)

Chilik Tamir, Information Security Architect, AppSec Labs

15:15-15:30 Coffee Break
15:30-16:15 Security Testing of RESTful Services (Presentation)

Ofer Shezaf, Head of AppSec Research, HP
Eyal Fingold, Senior Security Developer, HP

Hey, What’s your App doing on my (Smart)Phone? (Presentation)

Shay Zalalichin, CTO, Comsec Consulting

16:15-17:00 The Bank Job II (Presentation)

Adi Sharabani, Cross-Rational Security Strategy and Architecture, IBM

17:00-17:05 End Notes  

Ofer Maor - Chairman, OWASP Israel; Global Membership Committee, OWASP