Loading…
AppSec Israel 2018 has ended
Wednesday, September 5
 

08:30 IDT

Registration, Gathering and Networking
Wednesday September 5, 2018 08:30 - 09:30 IDT
Break

09:30 IDT

Welcome and Introduction
A few words of introduction welcoming everyone to the training day, thanking the sponsors, explaining the plan for the day and providing some important notices ,

Organizers
avatar for Or Katz

Or Katz

OWASP Israel / Akamai


Wednesday September 5, 2018 09:30 - 09:45 IDT
Bar-Shira Auditorium

09:45 IDT

Introduction To Application Level Attacks
This session is an introduction to application security threats, demonstrating the security problems that exist in corporate or internet based applications with a strong emphasis on application security and secure design. The seminar covers the major security vulnerabilities that might affect modern web application systems.
 
The main objective of this session is raising the awareness on the problems that might occur when secure coding practices are not used. The student will learn about the threat landscape and major attacks he or she must mitigate when as part of the development life cycle.

Speakers


Wednesday September 5, 2018 09:45 - 12:15 IDT
Bar-Shira Auditorium

10:00 IDT

Capture the Flag!
Capture the Flag (CTF)

This year, Tomer Zait (F5 networks) and Nimrod Levy (Scorpiones) worked hard to create a new, interesting, unique challenge, all in the field of application security.

So, if you feel like giving it a try, make sure to register and sign up (with a valid email address) in the following link:
https://owaspil.ctf.today/



Organizers
avatar for Tomer Zait

Tomer Zait

Head of Security Research, F5


Wednesday September 5, 2018 10:00 - Thursday September 6, 2018 16:00 IDT
Room 205

12:15 IDT

Lunch (bring your own or buy on-site)
Wednesday September 5, 2018 12:15 - 13:15 IDT
Break

13:15 IDT

The OWASP Top Ten for Developers (Part 1)
The major cause of web-service and web application insecurity is insecure software development practices. This highly intensive and interactive 4-hour seminar (split over two sessions) will provide essential application security training for web application and web-service developers and architects.

The class is a combination of lecture, security testing demonstration and code review. Students will learn the most common threats against applications. More importantly, students will learn how to code secure web solutions via defense-based code samples.

Our focus will be web application security basics:
  • OWASP Top Ten 2017
  • OWASP Top Ten Proactive Controls v3
  • OWASP ASVS 3.1+

Speakers
avatar for Jim Manico

Jim Manico

Founder, Manicode Security
Jim Manico is the founder of Manicode Security, where he specializes in training software developers on secure coding and security engineering. He is actively involved in multiple ventures, serving as an investor/advisor for companies like SemGrep, Nucleus Security, Defect Dojo, KSOC... Read More →


Wednesday September 5, 2018 13:15 - 15:15 IDT
Bar-Shira Auditorium

15:15 IDT

Break
Wednesday September 5, 2018 15:15 - 15:30 IDT
Break

15:30 IDT

The OWASP Top Ten for Developers (Part 2)
The major cause of web-service and web application insecurity is insecure software development practices. This highly intensive and interactive 4-hour seminar (split over two sessions) will provide essential application security training for web application and web-service developers and architects.

The class is a combination of lecture, security testing demonstration and code review. Students will learn the most common threats against applications. More importantly, students will learn how to code secure web solutions via defense-based code samples.

Our focus will be web application security basics:
  • OWASP Top Ten 2017
  • OWASP Top Ten Proactive Controls v3
  • OWASP ASVS 3.1+

Speakers
avatar for Jim Manico

Jim Manico

Founder, Manicode Security
Jim Manico is the founder of Manicode Security, where he specializes in training software developers on secure coding and security engineering. He is actively involved in multiple ventures, serving as an investor/advisor for companies like SemGrep, Nucleus Security, Defect Dojo, KSOC... Read More →


Wednesday September 5, 2018 15:30 - 17:00 IDT
Bar-Shira Auditorium

17:00 IDT

Closing Words
Wednesday September 5, 2018 17:00 - 17:15 IDT
Bar-Shira Auditorium

17:00 IDT

Gathering, networking, wine and cheese

Wednesday September 5, 2018 17:00 - 17:45 IDT
Room 001

17:45 IDT

Opening
Organizers
avatar for Shira Shamban

Shira Shamban

Dome9 Security


Wednesday September 5, 2018 17:45 - 18:00 IDT
Room 001

18:00 IDT

DNS Exfiltration or Why I threw away my supervised learning models for anomaly detection

Supervised learning (or “machine learning by examples”) is here to stay, but is it always the optimal solution? Whenever engineers need to tell the difference between cats and dogs they will turn to supervised learning models provided with lots of training examples. But what happens when you’re looking for a rare and extraordinary phenomenon such as a unicorn? In that case you might have abundant examples of horses but almost no unicorn examples. In our story, the unicorn is the problem of detecting “low and slow” DNS exfiltration attacks, such as the 2014 cyberattack on Home Depot that resulted in the theft of 65M credit card numbers. While the Home Depot attack establishes the importance of the problem, it’s rare to find enough similar examples in order to predict the next DNS exfiltration cyber campaign. In this talk we will discuss the advantages of Anomaly Detection in the absence of training samples and walk through our solution based on the Isolation Forest algorithm and the challenges we faced implementing it as a large-scale solution in Spark Scala. This is the story of how we had to take a different approach to our problem and how we got to catch and block a live ‘white-hat’ cyber attack on one of our clients’ platform.


Speakers
avatar for Ada Sharoni

Ada Sharoni

Senior Software Developer, Akamai
Originally started as an algorithm developer in signal processing and for the past several years have been a back-end developer. As a "Talpiot" graduate, I served in the Israeli intelligence community and as a commander of Talpiot cadets. When asked about my favorite book I still... Read More →


Wednesday September 5, 2018 18:00 - 18:30 IDT
Room 001

18:30 IDT

Lessons Learned from My Path in the Appsec World
Speakers
avatar for Tamar Twena-Stern

Tamar Twena-Stern

Software Manager & Architect, Bit
I am a software manager and an architect. In the past, I Managed a development group in Edgeverve systems and was an architect of a transaction engine. I also led a team of performance experts at NCR Retail , I was a solution architect in Personetics, and I had a start up of my own... Read More →


Wednesday September 5, 2018 18:30 - 19:00 IDT
Room 001

19:00 IDT

Networking
Wednesday September 5, 2018 19:00 - 19:30 IDT
Room 001
 
Thursday, September 6
 

08:00 IDT

Capture the Flag!
Capture the Flag (CTF)

This year, Tomer Zait (F5 networks) and Nimrod Levy (Scorpiones) worked hard to create a new, interesting, unique challenge, all in the field of application security.

So, if you feel like giving it a try, make sure to register and sign up (with a valid email address) in the following link:
https://owaspil.ctf.today/


Organizers
avatar for Tomer Zait

Tomer Zait

Head of Security Research, F5


Thursday September 6, 2018 08:00 - 16:00 IDT
Room 205

08:30 IDT

Registration, Gathering and Networking
Thursday September 6, 2018 08:30 - 09:30 IDT
Break

09:30 IDT

Opening
Or Katz
Ofer Maor

Organizers
avatar for Or Katz

Or Katz

OWASP Israel / Akamai


Thursday September 6, 2018 09:30 - 10:00 IDT
Bar-Shira Auditorium

10:00 IDT

Opening Keynote - The Last XSS Defense Talk
The Last XSS Defense Talk

Why are we still talking about Cross Site Scripting in 2018? Because it's painfully difficult to defend against XSS even to this day. This talk is a fundamental update to the 2011 AppSec USA talk "The Past Present and Future of XSS Defense". We'll address new defensive strategies such as modern JavaScript framework defense in Angular, React and other frameworks. We'll also look at how CSP deployment has changed in the past 7 years illustrating the progressive use of content security which supports CSP v1, v2 and v3 concurrently. We will then look at advances in HTML sanitization on both the client and server and focus on sanitizers and defensive libraries that have stood the test of time in terms of maintenance and security. We'll also look at interesting design topics such as how HTML injection is still critical even in the face of rigorous XSS defense and how HTTPOnly cookies are largely ineffective. This talk should help developers and security professionals alike build a focused and modern strategy to defend against XSS in modern applications.

Speakers
avatar for Jim Manico

Jim Manico

Founder, Manicode Security
Jim Manico is the founder of Manicode Security, where he specializes in training software developers on secure coding and security engineering. He is actively involved in multiple ventures, serving as an investor/advisor for companies like SemGrep, Nucleus Security, Defect Dojo, KSOC... Read More →


Thursday September 6, 2018 10:00 - 10:40 IDT
Bar-Shira Auditorium

10:40 IDT

Transition Break
Thursday September 6, 2018 10:40 - 10:45 IDT
Break

10:45 IDT

The Adventures of AV/IR and the Leaky Sandbox
By Amit Klein and Dor Azouri

Suppose you have malware running on one of your endpoints. But you have a highly secure enterprise, with cloud AV, IR team, and locked down network (endpoints can’t access the external network). Can the malware still exfiltrate sensitive data out of your network? You bet! And we’ll show you how!

Speakers
avatar for Dor Azouri

Dor Azouri

Researcher, SafeBreach
Dor Azouri is a security professional, having 7+ years of unique experience in the sec field. Currently doing research @SafeBreach, previously serving in various sec positions @IDF.His experience involved security from many angles: starting with data analysis, to network research... Read More →
avatar for Amit Klein

Amit Klein

VP Security Research, Safebreach
Amit Klein is a world renowned information security expert, with 25 years in information security and over 30 published technical papers on this topic. Amit is VP Security Research at SafeBreach, responsible for researching various infiltration, exfiltration and lateral movement attacks... Read More →


Thursday September 6, 2018 10:45 - 11:30 IDT
Bar-Shira Auditorium

10:45 IDT

(De)Serial Killers
By Dor Tumarkin

Take the plunge into deserialization attacks - from understanding the fundamentals of serialization to vulnerability breakdown, through RCE demos in various technologies (Java, C#, Python). Includes research and exploit demo of never-before-seen vulnerabilities in Microsoft’s Message Queue. 

Speakers
avatar for Dor Tumarkin

Dor Tumarkin

Application Security Research Team Leader, Checkmarx
AppSec Researcher, Team Leader at Checkmarx. Former Red-Team member and consultant at Cisco and Security-Art.7 years experience in red-teams, penetration testing, code-review, threat modelling and more.


Thursday September 6, 2018 10:45 - 11:30 IDT
Room 001

10:45 IDT

Writing security code in Node.js
By TamarTwena

Node.js has become more and more, and lots of enterprise and B2C application implement their server with Node.js. It is becoming importent to know what are the possible vulnerabilities in your Node.js server. As a developer after this talk you will be able to write a more secure code in Node.js. 

Speakers
avatar for Tamar Twena-Stern

Tamar Twena-Stern

Software Manager & Architect, Bit
I am a software manager and an architect. In the past, I Managed a development group in Edgeverve systems and was an architect of a transaction engine. I also led a team of performance experts at NCR Retail , I was a solution architect in Personetics, and I had a start up of my own... Read More →


Thursday September 6, 2018 10:45 - 11:30 IDT
Room 101

11:30 IDT

Break
Thursday September 6, 2018 11:30 - 11:45 IDT
Break

11:45 IDT

JARVIS never saw it coming: Hacking machine learning (ML) in speech, text and face recognition - and frankly, everywhere else
By Guy Barnhart-Magen and Ezra Caltum

Exploits, Backdoors, and Hacks: words we do not commonly hear when speaking of Machine Learning (ML). In this talk, I will present the relatively new field of hacking and manipulate machine learning systems and the potential these techniques pose for active offensive research.  

Speakers
avatar for Guy Barnhart-Magen

Guy Barnhart-Magen

OS Hardening, Security Architecture and Embedded Devices, Cyber Security Consultant
BSidesTLV co-founder and CTF lead, Public speaker, and recipient of the Cisco “black belt” security ninja honor – Cisco’s highest cyber security advocate rank.With nearly 20 years of experience in the cyber-security industry, Guy held various positions in both corporates and... Read More →
avatar for Ezra Caltum

Ezra Caltum

Security Research Manager, Intel
Ezra is a cyber-security practitioner, with a passion for reverse engineering, data analysis, and exploitation. He is the leader of the Tel Aviv DC9723 Defcon group and a co-founder and organizer of BSidesTlv.He is a frequent speaker at local and international events, like BHUSA... Read More →


Thursday September 6, 2018 11:45 - 12:30 IDT
Bar-Shira Auditorium

11:45 IDT

How to hack cryptographic protocols with formal methods
By Ofer Rivlin

The presentation slides can be found at:
https://www.slideshare.net/OferRivlin/how-to-hack-cryptographic-protocols-with-formal-methods


tl;dr: The design of even the smallest security protocols is prone to vulnerabilities. For example, the security protocols of federation & connected cars networks are extremely complex. I explore the use of formal methods for automating validation and hacking cryptographic protocols.
---
Long description:
Key exchange and trust establishment protocols are high risk and complex. Manual security verification of these protocols is error-prone, incomplete, and time-consuming.
Protocol designers are not necessarily security experts. We want to give them the methods and tools that will simplify security assessment and help understand security requirements.
Many standard web protocols for establishing trust between service providers and clients, and with identity providers have proven vulnerable, as well as custom protocols to enable some specific B2B communication (i.e. online payments, cross-domain authentication, etc.)
The target of the talk is to share high-level practicle knowledge of formal methods and to recognize the benefits of using formal methods when designing or attacking cryptography protocols.
I will discuss the following subjects:
Logical issues and attack scenarios in protocols.
Simplifying the secure designing of complex key exchange and trust establishment protocols by using formal methods, automation and the change of mindset.
Demonstrating analysis and hacking of security protocol formal models in domains like SSO & access delegation, IOT and connected vehicles (V2X and VANET - Vehicle Ad Hock Networks).

Thursday September 6, 2018 11:45 - 12:30 IDT
Room 001

11:45 IDT

One Push Too Far - Exploiting Web-Push notifications
By Zohar Shachar

In recent years the ability to send push notifications was introduced into the web environment. After getting annoyed with yet another website asking to send me ‘notifications’, I’ve decided to explore this relatively new feature to better understand what risks are involved (Hint - Quite a few!). 

Speakers
avatar for Zohar Shachar

Zohar Shachar

Tech Lead, Komodo Consulting


Thursday September 6, 2018 11:45 - 12:30 IDT
Room 101

12:30 IDT

Stackoverflow, the vulnerability marketplace
By Danny Grander

Whether we like to admit it or not, we’ve all borrowed code from stackoverflow at one time in our lives. Many do it more often than they care to admit. If a vulnerability exists in a stackoverflow code snippet, it’s easy for it to go viral in even the most widely used frameworks and libraries. 

Speakers
avatar for Danny Grander

Danny Grander

Security, Snyk
Danny Grander is a veteran security researcher and the cofounder of Snyk.io, where he works on open source security and leads Snyk’s security research. Previously, Danny was the CTO of Gita Technologies and a lead researcher and developer for a few startups. Danny is a frequent... Read More →


Thursday September 6, 2018 12:30 - 13:00 IDT
Bar-Shira Auditorium

12:30 IDT

Attacking and Defending NFC Applications
By Aviad Ben-Moshe

In this lecture, I will present an overview of the NFC technology, how it is being used and what industries can and will benefit from it most (hint – Retail, Fintech & IoT) – while focusing on its security aspects.
We have seen an increase of 400% in the production of NFC enables devices in the last 3 years and an increase of ~300% of the number of connected IoT devices. The numbers are continually growing rapidly.
After clarifying the uniqueness and special aspects of the NFC technology, we will take a deep dive into application security aspects of NFC based solutions such as duplicating tags, parameter tampering, sensitive information saved in plain text and more.
The technological mechanisms of NFC create a unique threat landscape which I will discuss in detail presenting the risks, threats, and mitigations relevant to NFC.
In addition, we will expose a customized PENETRATION TESTING METHODOLOGY for NFC based applications so you can tackle your next NFC based PT in an educated effective manner.


Speakers

Thursday September 6, 2018 12:30 - 13:00 IDT
Room 001

12:30 IDT

Achieving Least Privilege IAM Permissions for AWS Lambda
By Guy Lichtman

Achieving Least Privilege permissions for AWS Lambda is key for ensuring security but in many cases very lax ones are used in practice. This talk presents real-life examples and an open source tool that leverages AWS X-Ray to auto generate a policy based on runtime resource-access profiling. 

Speakers
avatar for Guy Lichtman

Guy Lichtman

Co-Founder, Functional One
Guy Lichtman is an experienced R&D Leader with over 15 years experience of working in the computer and cyber security industry. He is the Co-Founder of Functional One, a new startup in the field of Serverless Security. Previously, he was Director of Engineering and Site Manager at... Read More →


Thursday September 6, 2018 12:30 - 13:00 IDT
Room 101

13:00 IDT

Lunch break

Thursday September 6, 2018 13:00 - 14:00 IDT
Break

13:30 IDT

Resume Review and CV Critique
Resume Review / CV Critique workshop
So many talented young professionals in the AppSec field (and some not so young) miss out on great opportunities in which they would excel, and bring amazing value to their employers. Often, this happens because of a lackluster resume or CV, which does not properly showcase their talent and abilities.

Experienced managers, interviewers, and HR professionals will help you improve your resume, and offer tips to better show off what you can do - and get you in the door at the right employer!

Please sign up here.
And remember to bring your resume or CV with you! (Preferably paper printout, as that is easier to review).

Speakers
avatar for Guy Barnhart-Magen

Guy Barnhart-Magen

OS Hardening, Security Architecture and Embedded Devices, Cyber Security Consultant
BSidesTLV co-founder and CTF lead, Public speaker, and recipient of the Cisco “black belt” security ninja honor – Cisco’s highest cyber security advocate rank.With nearly 20 years of experience in the cyber-security industry, Guy held various positions in both corporates and... Read More →


Thursday September 6, 2018 13:30 - 15:30 IDT
Room 206

14:00 IDT

Security is everybody's job... Literally.
By Tanya Janca

This talk will explain what developers needs to adjust in order to turn DevOps into DevSecOps within their organizations. Several strategies are presented for weaving security into each of the “Three Ways”, with clear steps audience members can start implementing immediately. 

Speakers

Thursday September 6, 2018 14:00 - 14:45 IDT
Bar-Shira Auditorium

14:00 IDT

Is Your Mobile Application Storing Your Company Secrets?
By Swaroop Yermalkar

Is your product or application has a mobile app? Do you use any of AWS services? Are your product security engineers working on mobile application security? Looking for information about the importance of mobile app security? If your answer is yes to any of these questions then this talk is for you! 

Speakers
avatar for Swaroop Yermalkar

Swaroop Yermalkar

Lead Security Engineer
Swaroop Yermalkar works as a lead security engineer with a diverse skill set focused on Mobile App Pentest, Web, API and AWS Pentesting. In addition, he has authored the book “Learning iOS Pentesting” and lead an open source project - OWASP iGoat which is developed for iOS security... Read More →


Thursday September 6, 2018 14:00 - 14:45 IDT
Room 001

14:00 IDT

Serverless Authentication with JWT
By Mehul Patel

Authentication is one of the big parts of every application. Security is always something that is changing and evolving. In this talk, I will cover what JSON Web Tokens (JWTs) are and why using JWTs in your applications when it comes to security is awesome. 

Speakers
avatar for Mehul Patel

Mehul Patel

Tech Evangelist at Auth0, Mozilla | Engineer at Zimbra, Zimbra | Auth0 | Mozilla
I am a student, web developer, and tech speaker currently living in India. My interests range from technology to innovation. I am also interested in web development, writing, and safe programming.


Thursday September 6, 2018 14:00 - 14:45 IDT
Room 101

14:45 IDT

Path Of LeAst Resistance - Accelerating the search for vulnerable functions
By Ezra Caltum

By finding function relationships between dynamically compiled binaries and its libraries, and representing them in a Graph Database, we can quickly identify exploitation points. In this presentation, I’ll discuss Graphs, Binary Relationships and Vulnerable Functions.

Speakers
avatar for Ezra Caltum

Ezra Caltum

Security Research Manager, Intel
Ezra is a cyber-security practitioner, with a passion for reverse engineering, data analysis, and exploitation. He is the leader of the Tel Aviv DC9723 Defcon group and a co-founder and organizer of BSidesTlv.He is a frequent speaker at local and international events, like BHUSA... Read More →


Thursday September 6, 2018 14:45 - 15:30 IDT
Bar-Shira Auditorium

14:45 IDT

Controlling the view controllers in iOS applications - a new automatic tool
By Tomer Hadad

A major part of mobile PT deals with bypassing client-side controls; mostly to load a post-registration/validation screen/component. This ultimate goal is mostly achieved by combining tools/methods. What if we could simply auto-enum the screens and force-load interesting ones? Meet Scwapper. 

Speakers
avatar for Tomer Hadad

Tomer Hadad

Application Attack & Penetration Researcher, EY IL Advanced Security Center
Tomer is an application security researcher in EY's Cyber Security Center in Tel Aviv, Israel. He performs vulnerability research on a wide range of applications: web apps, desktop apps, mobile, and embedded systems. Tomer has trained and mentored dozens of consultants in the industry... Read More →


Thursday September 6, 2018 14:45 - 15:30 IDT
Room 001

14:45 IDT

Your Apps Have Gone Serverless. Has Your Security?
By Hillel Solow

Serverless architecture presents new security challenges. Some are equal to those we know from traditional application development, but some take a new form. Both, developers and attackers must start thinking differently to gain the upper hand. Are you going to be ready when the perimeter is lifted? 

Speakers
avatar for Hillel Solow

Hillel Solow

CTO, Protego Labs
Hillel is passionate about security innovation, and is driving product innovation and security at Protego. Prior to co-founding Protego, he was CTO in Cisco’s IoT Security Group, where he worked on innovative security solutions for new technology markets.


Thursday September 6, 2018 14:45 - 15:30 IDT
Room 101

15:30 IDT

Break
Thursday September 6, 2018 15:30 - 15:45 IDT
Break

15:45 IDT

Exploiting Smart Contracts For Fun And Profit
By Erez Metula

During this talk, we'll discuss common security vulnerabilities that can occur in smart contracts and see how code that caused losses of millions of dollars looks like. We'll cover the tools and techniques to explore , analyze, identify and exploit vulnerabilities in smart contracts.

We'll talk about real world exploits, and look at the vulnerable code that caused them. We'll talk about a new class of code vulnerabilities related to smart contracts, such as re-entrancy, time manipulations, overflows, authorization bypass, exposing secrets, etc.  


Speakers


Thursday September 6, 2018 15:45 - 16:30 IDT
Bar-Shira Auditorium

15:45 IDT

Value Driven Threat Modeling
By Avi Douglen

Threat Modeling is a great method to identify potential security flaws, part of any secure design. But instead of investing time + budget in a top-heavy, big-model-up-front threat modeling methodology, we can use a lightweight value-driven approach to embed security right into the agile dev process! 

Organizers
avatar for Avi Douglen

Avi Douglen

OWASP BoD, Bounce Security
AviD is a high-end, independent security architect and developer, and has been designing, developing and testing secure applications, and leading development teams in building secure products, for around 20 years. My research interests include efficient security engineering, usable... Read More →


Thursday September 6, 2018 15:45 - 16:30 IDT
Room 001

15:45 IDT

Passwords are passé – WebAuthn is simpler, stronger, and ready to go
By Michael Furman

Forgot which password belongs to which website? Forgot your password altogether? Been a victim of a phishing attack? Do you want to know why Google, Microsoft, and others are moving away from old fashioned passwords? Because there’s a better way to authenticate, and it’s called WebAuthn. 

Speakers
avatar for Michael Furman

Michael Furman

Lead Security Architect, Tufin
I have over 10 years of experience with application security. I have been the Lead Security Architect at Tufin for over 4 years. I am responsible for the security of all Tufin software products, including Tufin Orchestration Suite as well as our new products that integrate security... Read More →



Thursday September 6, 2018 15:45 - 16:30 IDT
Room 101

16:30 IDT

Closing Keynote - A breach on your watch, do you really want to be that person?
A breach on your watch, do you really want to be that person?
Do you want to be that developer, that caused that vulnerability that caused that breach? Do you want to be that CIO that needs to explain to his board why it happened  on your watch?
If you don't want to be that person, then you should come and hear how it is actually possible for cybersecurity professionals and developers to partner, even collaborate, to create a secure coding culture. Security and development don't have to be adversarial anymore. Julie Baker will be sharing her lessons learned from years of experience as a security executive in large enterprises, including examples and practical tips, to turn the R&D lifecycle more secure and less of a headache.
The session will include time for Q&A, and an opportunity for you to share your personal "war story" about handling and implementing security (stories with a happy ending are welcome too!)

Speakers
avatar for Julie Baker

Julie Baker

CEO, TD Innovation Center Ltd.
Julie Baker has over 25 years of experience in all aspects of IT and Information Security in financial services as well as in academia.  Currently, Julie is the head of Cyber Innovation for TD Bank and the  CEO of the TD Innovation Center Ltd, located in Tel Aviv, which is a wholly... Read More →



Thursday September 6, 2018 16:30 - 17:15 IDT
Bar-Shira Auditorium

17:15 IDT

Closing
Organizers
avatar for Or Katz

Or Katz

OWASP Israel / Akamai


Thursday September 6, 2018 17:15 - 17:30 IDT
Bar-Shira Auditorium
 
Filter sessions
Apply filters to sessions.