Loading…
Main Auditorium [clear filter]
Tuesday, October 17
 

09:30 IDT

OWT Training Day
Speakers
avatar for Shay Chen

Shay Chen

CEO, Effective Security
Shay Chen is the CEO of Effective Security, an information-security boutique company specializing in information security assessments and in automating security processes of vulnerability management and SDLC. He has over twelve years in information technology and security, a strong... Read More →



Tuesday October 17, 2017 09:30 - 17:30 IDT
Main Auditorium

17:30 IDT

WIA (Women in AppSec)
Mentors
avatar for Irene Abezgauz

Irene Abezgauz

Co-founder, VP Product, Cymmetria
Breaking and building stuff, everything security and almost anything technology.
avatar for Keren Elazari

Keren Elazari

@k3r3n3, BSidesTLV
avatar for Limor Sylvie Kessem

Limor Sylvie Kessem

Sr. Managing Consultant, Cyber Crisis Management, IBM Consulting
Limor Kessem is a Senior Managing Consultant with X-Force’s Cyber Crisis Management, helping organizations prepare for and face crisis-level cyber-attacks. Previously Executive Security Advisor at IBM Security. She is a widely sought-after security expert, speaker and author and... Read More →
HM

Hila Meller

Head of Security Services South Region, dxc Technology
SP

Smadar Paradise

Director cyber security protection, Check Point
avatar for Shira Shamban

Shira Shamban

Dome9 Security

Tuesday October 17, 2017 17:30 - 20:30 IDT
Main Auditorium
 
Wednesday, October 18
 

09:30 IDT

Opening Words
Organizers
avatar for Avi Douglen

Avi Douglen

OWASP BoD, Bounce Security
AviD is a high-end, independent security architect and developer, and has been designing, developing and testing secure applications, and leading development teams in building secure products, for around 20 years. My research interests include efficient security engineering, usable... Read More →

Wednesday October 18, 2017 09:30 - 10:00 IDT
Main Auditorium

10:10 IDT

Authentication Without Authentication
Authentication is important, but how do you authenticate when user interaction is not an option? For example, an IoT app without a user interface. We need to authenticate the app - without any predefined credentials. Want to see how? Join me for this session, including a live demo on Raspberry Pi!

Speakers
avatar for Dirk Wetter

Dirk Wetter

Dirk Wetter (Ph.D.) is an independent security consultant with more than 20 years of professional experience in information security. He has a broad technical and information security management background. He has published over 60 articles in computer magazines.His primary focus... Read More →



Wednesday October 18, 2017 10:10 - 10:55 IDT
Main Auditorium
  Builder

11:05 IDT

Bleeding Secrets!
We do our best to protect the servers' information using security controls like TLS communication, Firewall and advanced security cloud services, but then they bleed secrets (arbitrary pieces of memory are leaked to a potential attacker).

This talk observes three zero days found within security solutions (two from this year) that can be the cause for data breaches like the one from May 31 where OneLogin was breached and encrypted secrets were stolen in clear text.
We will review code, understand the vulnerabilities, assess the root cause, challenge a few assumptions (on open-source, security solutions and others) and review some best practices that can help prevent such vulnerabilities.


Wednesday October 18, 2017 11:05 - 11:50 IDT
Main Auditorium
  Builder
  • Technical Level All

12:15 IDT

Infusing Security Awareness in Agile Product Management
The goal of our session is to inspire organizations to increase their security conscience, by addressing the security from both process and content points of view.
As part of the Shift Left movement in the world of security,we'd like to suggest a surprising security ambassador: The Product Manager.

Speakers
avatar for Elena Kravchenko

Elena Kravchenko

ADM BU Security Lead, Micro Focus (former HPE Software)
Elena represents the Security side of the project and brings vast experience in both development and security areas. She is responsible for a department developing 12 products ( ~400 developers) HPE Software Security Lead for HPE's Application Delivery Management (ADM) Business... Read More →
avatar for Efrat Wasserman

Efrat Wasserman

Product manager, Intel
Efrat is a Product Manager at Intel. Efrat brings deep knowledge and experience in both software development and project/product management areas. Efrat's former position was a Senior Program Manager at HPE SW, Efrat holds a BSc in Computer Science and Mathematics and an MBA in... Read More →


Wednesday October 18, 2017 12:15 - 13:00 IDT
Main Auditorium
  Builder
  • Technical Level All

13:10 IDT

Stranger Danger: Addressing Security Risk in Open Source Code

Open source modules, maven and python packages, ruby gems and especially npm, are undoubtedly awesome. However, they also represent an undeniable and massive risk. You’re introducing someone else’s code into your system, often with little or no scrutiny. The wrong package can introduce severe vulnerabilities into your application, exposing your application and your users data.

The security risk from vulnerable open source binaries is well understood. While still often mishandled, there are good practices for tackling it, and industry trends like Serverless & PaaS all but eliminate it.

Vulnerabilities in open source code packages, however, get practically no air time. These packages, pulled from the likes of npm, RubyGems and Maven, are just as prevalent, outdated and hard to manage. More importantly, they’re just as vulnerable!

In this talk I’ll share details and demonstrate several vulnerabilities in popular packages. For each issue, I’ll explain why it happened, show its impact, and – most importantly – see how to avoid or fix it.


Speakers
avatar for Danny Grander

Danny Grander

Security, Snyk
Danny Grander is a veteran security researcher and the cofounder of Snyk.io, where he works on open source security and leads Snyk’s security research. Previously, Danny was the CTO of Gita Technologies and a lead researcher and developer for a few startups. Danny is a frequent... Read More →



Wednesday October 18, 2017 13:10 - 13:35 IDT
Main Auditorium
  Builder

14:30 IDT

Bots and Carts
This lecture will go over some examples of automated attacks targeting eCommerce websites and specifically the cart and purchase flow. We will discuss some real (yet anonymized) examples from our customers and what you can do to protect yourself.

Speakers
avatar for Amir Shaked

Amir Shaked

VP Research, PerimeterX
Amir Shaked is a software engineer and security researcher. He has been writing code from the age of 14, and worked at various startups and enterprises ever since. Today he is VP of research at PerimeterX, fending of automated attacks from websites. Amir specializes in web and data... Read More →



Wednesday October 18, 2017 14:30 - 15:15 IDT
Main Auditorium
  Defender

15:25 IDT

Don't let the cuteness fool you - Exploiting IoT's MQTT protocol

"Connect all the things!" is, for some time now, the main theme when talking about IoT devices, solutions and products. Our eagerness to find new, at times - innovative, ways to make anything to rhyme along the anthem of the internet is a great promise for malicious activity.

As those devices supposed to be lightweight they mostly rely on a small fingerprint stack of protocols - one of those protocols is the message protocol - MQTT.

We will go deep into protocol details, observe how common is to find such devices (and how), and several novel ways to abuse any one of tens of thousands easily spotted publicly facing MQTT brokers on the internet for "fun and profit".

During the presentation we will learn about - WHAT is using MQTT (common and extreme examples) - How SPREAD OUT it is? I’ll be sharing statistical information on different MQTT brokers and version fragmentation collected during research - An OVERVIEW of o its infrastructure and protocol bit & bytes (no prior knowledge required, your head won’t be blown). o General purpose TOOLS – libraries, open source software and apps - RECON – exploring device’s settings, gathering intel, spotting vulnerable devices (+ dropping tools) - Identifying clients - EXPLOITING bad configurations for fun and profit (+ in-the-wild examples): o Spy on subscribers via MQTT o Running remote code on connected devices. o Hijack unsuspected servers and utilize them for evil (e.g. botnet communication). o Misconfigured broker spits machine’s credentials. - DEMOs - Notes on securing your own MQTT-wielding IoT device. - All tools and scripts that were used will be shared right after the talk

Speakers
avatar for dalmoz (Moshe Zioni)

dalmoz (Moshe Zioni)

Director of Threat Research, Akamai
Moshe (dalmoz) have been researching security since youth, positioned professionally since he was 18, when was actually surprised to find a place for his enthusiasm and talent. Consulted many industry leaders, banks, software vendors, insurance companies, health organizations, governments... Read More →


Wednesday October 18, 2017 15:25 - 16:10 IDT
Main Auditorium

16:30 IDT

Adversarial Machine Learning: 'Some rules can be bent, others can be broken'
Offensive AI allows us to leverage techniques used by ML algorithm to gauge their weak points and exploiting them. ML is great at identifying and classifying patterns, but an attacker can use the gray areas to influence (or even subvert) the pattern matching algorithms.

Speakers
avatar for Guy Barnhart-Magen

Guy Barnhart-Magen

OS Hardening, Security Architecture and Embedded Devices, Cyber Security Consultant
BSidesTLV co-founder and CTF lead, Public speaker, and recipient of the Cisco “black belt” security ninja honor – Cisco’s highest cyber security advocate rank.With nearly 20 years of experience in the cyber-security industry, Guy held various positions in both corporates and... Read More →



Wednesday October 18, 2017 16:30 - 17:15 IDT
Main Auditorium
  Breaker

17:20 IDT

Closing Note and Award Ceremony
Wednesday October 18, 2017 17:20 - 17:30 IDT
Main Auditorium
 
Filter sessions
Apply filters to sessions.