Difference between revisions of "Template:OWASP IL 2012 Agenda"

From OWASP
Jump to: navigation, search
Line 70: Line 70:
 
|- style="font-size:10pt"
 
|- style="font-size:10pt"
 
|style="border-style: solid; border-width: 1px;color:#1F497D" align="center" valign="center" | 16:15-16:45
 
|style="border-style: solid; border-width: 1px;color:#1F497D" align="center" valign="center" | 16:15-16:45
| align=center valign="center" colspan="2" style="border-style: solid; border-width: 1px;font-size:11pt" | '''Guest Lecture<br>The New art of WAR & PEACE- a REAL FANTASY'''<br> ''A drill down to the "money time": Was Iran Stuxnet’s main target? how economy is a battle zone?''<br>
+
| align=center valign="center" colspan="2" style="border-style: solid; border-width: 1px;font-size:11pt" | '''Guest Lecture<br>The New art of WAR & PEACE- a REAL FANTASY'''<br> A drill down to the "money time": Was Iran Stuxnet’s main target? how economy is a battle zone?<br>
 
''Guy Phillip Goldstein (Author of "Babel Minute Zero")''
 
''Guy Phillip Goldstein (Author of "Babel Minute Zero")''
 
|- style="font-size:10pt"
 
|- style="font-size:10pt"

Revision as of 14:03, 27 August 2012

08:45-09:15 Registration, Gathering, Socializing & Networking
09:15-09:45 Opening Words

Ofer Maor - Chairman, OWASP Israel; Global Membership Committee, OWASP

09:45-10:10 OWASP Top 10 Hebrew Edition

Or Katz, OWASP Israel Board

  Breakers (Track #1) Defenders (Track #2)
10:15-11:00 The Diviner – Digital Clairvoyance: Getting an Insight
Into Server Code & Memory Using Blackbox Techniques

Shay Chen, CTO, Hacktics ASC, Ernst & Young
Eran Tamir, Team Leader, Hacktics ASC, Ernst & Young

Case Study:
Providing Secure SDLC in an Agile Environment Using ESAPI

Yair Rovek, Security Specialist, Liveperson

11:00-11:15 Coffee Break
11:15-12:00 FYI: You've Got LFI

Tal Beery, Web Security Research Team Leader, Imperva

I>S+D! – Integrated Application Security Testing (IAST),
Beyond SAST/DAST

Ofer Maor, CTO, Quotium

12:00-12:30 Zip It! – Owning Archived File Uploads 

Alex Landa, Security Researcher, IBM

Secure Development Lifecycle – Lessons Learned  

Boaz Shunami, Founder, Komodo Consulting

12:30-13:30 Lunch Break
13:30-14:15 Advanced Pen-Testing of iPhone Applications

Chilik Tamir, Chief Scientist, AppSec Labs

Positive Logic XSS Detection & Prevention
using Generalized JavaScript Assembly 

Tsvi Cherny, Interdisciplinary Center

14:15-15:00 Attacking Android Mobile Applications

Erez Metula, Founder, AppSec Labs

Application Counter Attack

Ziv Gadot, SOC Team Leader, Radware

15:00-15:15 Coffee Break
15:15-15:45 The Dark World of Mobile Payments

Niv Valtman, CSO, Retalix

Identifying Maladvertisements

Maty Siman, CTO, Checkmarx
Meny Duek, Director of R&D, Mediamind

15:45-16:15 Stylish XSS: Fonts Name Injection

Adi Cohen, Security Researcher, IBM

My Authentication Album:
Adaptive Image-Based Login Mechanism 

Ronen Margulis, Bar Ilan University

16:15-16:45 Guest Lecture
The New art of WAR & PEACE- a REAL FANTASY

A drill down to the "money time": Was Iran Stuxnet’s main target? how economy is a battle zone?

Guy Phillip Goldstein (Author of "Babel Minute Zero")

16:45-17:00 End Notes  

Ofer Maor - Chairman, OWASP Israel; Global Membership Committee, OWASP