Difference between revisions of "Template:OWASP IL 2012 Agenda"

From OWASP
Jump to: navigation, search
Line 43: Line 43:
 
|- style="border-style: solid; border-width: 1px;font-size:10pt"
 
|- style="border-style: solid; border-width: 1px;font-size:10pt"
 
|style="border-style: solid; border-width: 1px;color:#1F497D" height="25" align="center" valign="center" | 13:30-14:15
 
|style="border-style: solid; border-width: 1px;color:#1F497D" height="25" align="center" valign="center" | 13:30-14:15
|  align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5  | '''[[OWASP_Israel_2011_Presentations#CMS_and_Other_Giants_.E2.80.93_The_Nightmare_of_AppSec_Testing|CMS And Other Giants - The Nightmare of AppSec Testing]]''' ''([[Media:OWASPIL2011-IreneAbezgauz-CMSnOtherGiants.pptx|Presentation]])''
+
|  align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5  | '''Advanced Pen-Testing of iPhone Applications'''  
''Irene Abezgauz, Product Manager, Seeker Security''
+
''Chilik Tamir, Chief Scientist, AppSec Labs ''
|  align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5  | '''[[OWASP_Israel_2011_Presentations#Agile_.2B_SDL_.E2.80.93_Concepts_and_Misconceptions|Agile + SDL – Concepts and Misconceptions]]''' ''([[Media:OWASPIL2011-Douglen-Bregman-AgileSDL.ppt|Presentation]])''
+
|  align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5  | '''Positive Logic XSS Detection & Prevention using Generalized JavaScript Assembly '''  
''Avi Douglen, Security Architect, Aware Security''<br>
+
''Tsvi Cherny, Interdisciplinary Center''
''Nir Bregman, Senior Project Manager, HP Software''
+
 
|- style="border-style: solid; border-width: 1px;font-size:10pt"
 
|- style="border-style: solid; border-width: 1px;font-size:10pt"
|style="border-style: solid; border-width: 1px;color:#1F497D" height="25" align="center" valign="center" | 14:30-15:15
+
|style="border-style: solid; border-width: 1px;color:#1F497D" height="25" align="center" valign="center" | 14:15-15:00
|  align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5  | '''[[OWASP_Israel_2011_Presentations#When_Crypto_Goes_Wrong|When Crypto Goes Wrong]]''' ''([[Media:OWASPIL2011-ErezMetula-WhenCryptoGoesWrong.pdf|Presentation]])''
+
|  align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5  | '''Attacking Android Mobile Applications'''  
 
''Erez Metula, Founder, AppSec Labs''  
 
''Erez Metula, Founder, AppSec Labs''  
|  align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5  | '''[[OWASP_Israel_2011_Presentations#Advanced_Techniques_.26_Tools_for_Testing_Binary_Protocols|Advanced Techniques & Tools for Testing Binary Protocols]]''' ''([[Media:OWSPIL2011_Tamir_Tampering101.pdf|Presentation]])''
+
|  align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5  | '''Application Counter Attack'''  
''Chilik Tamir, Information Security Architect, AppSec Labs''
+
''Ziv Gadot, SOC Team Leader, Radware''
 
|- style="border-style: solid; border-width: 1px;font-size:10pt"
 
|- style="border-style: solid; border-width: 1px;font-size:10pt"
|style="border-style: solid; border-width: 1px;color:#1F497D" height="40" align="center" valign="center" | 15:15-15:30
+
|style="border-style: solid; border-width: 1px;color:#1F497D" height="40" align="center" valign="center" | 15:00-15:15
 
|  valign="center" align="center" style="border-style: solid; border-width: 1px;font-size:12pt" colspan="2" | '''Coffee Break'''
 
|  valign="center" align="center" style="border-style: solid; border-width: 1px;font-size:12pt" colspan="2" | '''Coffee Break'''
 
|- style="border-style: solid; border-width: 1px;font-size:10pt"
 
|- style="border-style: solid; border-width: 1px;font-size:10pt"

Revision as of 13:54, 27 August 2012

08:45-09:15 Registration, Gathering, Socializing & Networking
09:15-09:45 Opening Words

Ofer Maor - Chairman, OWASP Israel; Global Membership Committee, OWASP

09:45-10:10 OWASP Top 10 Hebrew Edition

Or Katz, OWASP Israel Board

  Breakers (Track #1) Defenders (Track #2)
10:15-11:00 The Diviner – Digital Clairvoyance: Getting an Insight
Into Server Code & Memory Using Blackbox Techniques

Shay Chen, CTO, Hacktics ASC, Ernst & Young
Eran Tamir, Team Leader, Hacktics ASC, Ernst & Young

Case Study:
Providing Secure SDLC in an Agile Environment Using ESAPI

Yair Rovek, Security Specialist, Liveperson

11:00-11:15 Coffee Break
11:15-12:00 FYI: You've Got LFI

Tal Beery, Web Security Research Team Leader, Imperva

I>S+D! – Integrated Application Security Testing (IAST),
Beyond SAST/DAST

Ofer Maor, CTO, Quotium

12:00-12:30 Zip It! – Owning Archived File Uploads 

Alex Landa, Security Researcher, IBM

Secure Development Lifecycle – Lessons Learned  

Boaz Shunami, Founder, Komodo Consulting

12:30-13:30 Lunch Break
13:30-14:15 Advanced Pen-Testing of iPhone Applications

Chilik Tamir, Chief Scientist, AppSec Labs

Positive Logic XSS Detection & Prevention using Generalized JavaScript Assembly 

Tsvi Cherny, Interdisciplinary Center

14:15-15:00 Attacking Android Mobile Applications

Erez Metula, Founder, AppSec Labs

Application Counter Attack

Ziv Gadot, SOC Team Leader, Radware

15:00-15:15 Coffee Break
15:30-16:15 Security Testing of RESTful Services (Presentation)

Ofer Shezaf, Head of AppSec Research, HP
Eyal Fingold, Senior Security Developer, HP

Hey, What’s your App doing on my (Smart)Phone? (Presentation)

Shay Zalalichin, CTO, Comsec Consulting

16:15-17:00 The Bank Job II (Presentation)

Adi Sharabani, Cross-Rational Security Strategy and Architecture, IBM

17:00-17:05 End Notes  

Ofer Maor - Chairman, OWASP Israel; Global Membership Committee, OWASP