SANS AppSec Summit 2012 Call For Papers
Hi everyone,
We’re happy to announce that the sixth annual SANS AppSec Summit will be
held in Las Vegas, Nevada on April 30 – May 1, 2012.
The theme for this conference is “Application Security at Scale”.
Billions of records in the cloud. Millions of smart mobile devices.
Millions of developers writing new code. Hundreds of apps in your
enterprise. Untold numbers of existing bugs. Unknown numbers of
“sophisticated” attackers exploiting your software. What cutting edge
techniques are attackers using? How do large enterprises handle these
problems at scale? And how do small companies manage it all with fewer
resources?
We invite you to submit presentations in the following areas:
– Cloud Security
– Mobile Security
– Security in the SDLC
– Secure Coding
– Security Architecture
– Securing Legacy Applications
– Securing Open Source Frameworks
– Program Development
– Security Metrics
– Security Testing
– Penetration Testing
– Cutting Edge Attacks
– Cutting Edge Defense
– Case Studies
– Any topic related to Application Security
Submission Deadline
February 1, 2012
Submit papers via EasyChair (account required). Talks will be 50 minutes
in length.
https://www.easychair.org/conferences/?conf=sansappsec2012
For additional information please visit the conference web site or
contact us via email.
https://www.sans.org/appsec-2012/
callforpapers-appsec@sans.org
Please forward to anyone who might be interested in speaking.
Thanks!
The SANS AppSec 2012 Team
Cyber Security Summit
| Register here You can attend any or all of the webinars at no cost, and will be able to submit real-time questions to presenters and vote in audience polls during the live online event. If you are unable to attend the webcasts live, you can also view them afterward on demand. Each presentation will consist of slides and audio streaming live over the Web, and you can tune in from anywhere you have Internet access. |
|||||||||||||
|
|||||||||||||
|
|||||||||||||
October Issue of BSD Magazine is Out!
ARTICLES IN THIS ISSUE:
iXsystems Announces Release of FreeNAS™ Version 8.0.1
Josh Paetzel
Release features back end changes and bugfixes, as well as new front end user features
More…
Configuring a FreeBSD Stealth Logging Server
Michael Shirk
The collection of log files provides security administrators with the ability to have an audit trail for the behavior of an information system. In the event that a system is compromised, remote logging provides a forensic trail to determine what occurred on the system.
More…
DragonflyBSD news: Recovering data with hammer
Justin C. Sherrill
It’s been a while since we had a straightforward news report for DragonFly; the time since then has been filled with reports on Hammer and bulk pkgsrc builds.
More…
Using Openmaps data with Geoserver
Rob Somerville
In this article in our GIS series, we will examine how to import Openmaps data. Open Street Map (openstreetmap.org) founded in July 2004 by Steve Coast, is a treasure trove of worldwide street maps available under the Creative Commons licence.
More…
ONMP on OpenBSD 4.9
Toby Richards
OpenBSD is my BSD of choice. In fact, it is my OS of choice wherever possible. I always challenge those who disagree with me to name another OS with a similar track record for security.
More…
OSSEC on OpenBSD (ONMP) 4.9
Toby Richards
It is worth saying up front that these instructions assume that you’re running Nginx compiled from source vice Apache or Nginx from Ports or Packages.
More…
Taking a Peek Under the Hood Without Compromising Security – LibGTop and OpenBSD
Jasper Lievisse Adriaanse
LibGTop allows developers to peek under the hood of the kernel and export lots of system data in a convenient and easy to use library.
More…
Protecting Apache From Dos And Ddos Attacks
Stavros N. Shaeles
DOS(Denial of Service) or DDOS(Distributed Denial of Service), it is an attack where multiple compromised systems (which are usually infected with a Trojan) are used to target a single system in attempt to make the system resources(cpu,memory,network) unavailable to its intended users and causing system to crash.
More…
The Inevitability of IPv6, Part 1 & 2
Paul Ammann
Part 1: A switch from IPv4 to IPv6 is on your horizon. Are you ready for it?
Part 2: Configure IPv6 in your network – even if your routing infrastructure doesn’t yet support it.
More…
What’s New in Nexpose 5.0: The Next Generation in Vulnerability Management
This is from a Rapid7 email address we received today:
What’s New in Nexpose 5.0: The Next Generation in Vulnerability Management
Organizations across all industries and government agencies (at both the federal and state level) are struggling to mitigate constant cyber threats and comply with legislative or regulatory mandates. That’s nothing new in today’s information security landscape. What is new is that the new release of Rapid7 Nexpose provides a security risk intelligence solution that represents a paradigm shift in vulnerability management solutions.
With Nexpose 5.0, organizations can implement a proactive approach to risk management that leverages unique capabilities for:
• Continuous discovery of virtualized assets
• Clear identification of misconfigurations, malware threats and exploit exposure
• Effective prioritization of remediation tasks, and
• Customizable risk trending analytics across an entire IT infrastructure.
This integrated approach to security risk intelligence enables greater foresight into potential risks, addresses the increasingly complex security needs emerging from the widespread adoption of virtualization techniques and increases the efficiency and effectiveness of risk mitigation strategies.
Please join Kelly Martin, Director of Product Management for Rapid7 on Wednesday October 26 at 2pm to learn about the patent-pending new features of Nexpose 5.0 and see how they can help you improve your overall risk posture.
Vulnerability Management eSymposium
SC Magazine is offering you a new opportunity to earn CPE credits at no cost and with no travel required.
SC eSymposium: Vulnerability management
Date: Tuesday, November 8
Location: Your computer
Earn CPE credits for attending*
Click on the link below to register for FREE:
http://sc.haymarketcomm.net/r/
Cybercriminals frequently take advantage of vulnerabilities in web and other applications to gain entrance to wider corporate infrastructures. With breaches now happening on a regular basis using these methods, critical information of all kinds is being exposed. We learn from experts want companies can do to mitigate against these threats.
Platinum sponsors:
Lumension
NetIQ
Qualys
SC World Congress 24/7 exhibitors:
Damballa
LogRhythm
Secunia
Solutionary
Sophos
Click on the link below to register for FREE:
http://sc.haymarketcomm.net/r/
For more information, please e-mail mailto:maggie.keller@
*SC Magazine is a designated (ISC)2 CPE provider. CPE credits will be issued to only live attendees with (ISC)2 credentials.
Hacker Halted Miami – Last Chance to Register
LAST CHANCE TO REGISTER FOR ONE OF THE SECURITY EVENTS OF THE YEAR!
|
|
|
|



