<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Adish</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Adish"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Adish"/>
		<updated>2026-04-21T15:01:46Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Top_User_Recommendations&amp;diff=124022</id>
		<title>Top User Recommendations</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Top_User_Recommendations&amp;diff=124022"/>
				<updated>2012-02-09T15:43:19Z</updated>
		
		<summary type="html">&lt;p&gt;Adish: Top 7 user recommendations for safely browsing the net&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
= Top Consumer Guidelines =&lt;br /&gt;
&lt;br /&gt;
We keep seeing users suffer from leakage of personal information, identity theft and even actual money transactions made under their behalf.&lt;br /&gt;
The following list of key practical guidelines would lower the impact of most of these attacks (Page maintained by Adi Sharabani (Adi dot Sharabani at owasp dot org)&lt;br /&gt;
&lt;br /&gt;
== 1. Keep your device up to date / i.e. keep your body in shape ==&lt;br /&gt;
Whether you are using an iPhone, Android Phone, PC or Mac, the software of those devices should always be up to date. Each new update could contain a security fix for a vulnerability that was discovered in those products. When the updates are released, hackers around the world analyze it, deduct what is the vulnerability that was fixed, and create a new exploit that would work on unpatched computers.&lt;br /&gt;
If your computer or device is not up-to-date you are very much likely to be hacked.&lt;br /&gt;
&lt;br /&gt;
== 2. Don’t connect to untrusted networks / i.e. don’t go into dangerous parking lot ==&lt;br /&gt;
Hackers can easily hack into users from the same local network. They can obtain different levels of control on any device in the network, monitor everything it is doing on the internet, including everything the victims type or do in their web browser and even manipulate the information the victims see. This can be simply done either by a malicious user of the same network, or by an infected computer that connects to that network. &lt;br /&gt;
As a rule of thumb, users should try to avoid using untrusted networks - i.e. networks that has users which you do not know. If you have a cellular data plan, try to use it as it is much harder for hackers to hack into it. If you have a home wireless network, put a password on it, so others would not be able to join in, and hack into your devices.&lt;br /&gt;
&lt;br /&gt;
== 3. Use passwords wisely / i.e. don’t use the same lock for you home and gym locker ==&lt;br /&gt;
In mid 2010, Turkish hackers hacked into several small Israeli web sites. They managed to retrieved the names and passwords of users of those sites. The impact should have been relatively minor. However, many users of those sites used the same passwords for their gmail, Facebook, and other more sensitive applications. The Turkish hackers could thus take those passwords and log into their victim’s more sensitive systems, reading their email or logging into their social networks.&lt;br /&gt;
As a user you are not responsible for the security of the websites you browse to. However, having the same password for different web sites, will allow hackers who broke into one site to enter your credentials in the other site. &lt;br /&gt;
In addition, it is clearly not wise to use simple passwords like “qwertyui” - these are easily  guessed by automated tools that try to enumerate passwords to hopefully guess the right one.&lt;br /&gt;
&lt;br /&gt;
== 4. Supply sensitive information through an encrypted channel / i.e don’t shout your pin number in the middle of the mall ==&lt;br /&gt;
Companies should transfer you to an encrypted channel before asking or sending sensitive information. Using an encrypted channel, blocks others from seeing or changing the communication between yourself and the website you browse to. Before filling in any sensitive information such as credit cards or passwords make sure that you are on an encrypted channel to the website you planned to send the information to.&lt;br /&gt;
Each browser reflects the fact it is currently under an encrypted channel in a different way. Know how your device reflects this information and verify that before filling in the sensitive information. This is usually marked by an “https” prefix before the address and an icon of a lock in a location the website could not control (such as the toolbar of your browser). For example:&lt;br /&gt;
IPhone:&lt;br /&gt;
 SHAPE  \* MERGEFORMAT &lt;br /&gt;
&lt;br /&gt;
Android:&lt;br /&gt;
 SHAPE  \* MERGEFORMAT &lt;br /&gt;
&lt;br /&gt;
Chrome:&lt;br /&gt;
 SHAPE  \* MERGEFORMAT &lt;br /&gt;
&lt;br /&gt;
Internet Explorer:&lt;br /&gt;
&amp;lt;Need to add screenshot&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Firefox:&lt;br /&gt;
 SHAPE  \* MERGEFORMAT &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Safari:&lt;br /&gt;
 SHAPE  \* MERGEFORMAT &lt;br /&gt;
&lt;br /&gt;
== 5. Trust your instincts / i.e. Don’t eat in smelly restaurants ==&lt;br /&gt;
While you cannot control the security of the sites you browse to, it is in your power to decide which sites to use, and when to provide your personal information. If the site doesn’t have a budget for investing in clean and nice interface, it probably doesn’t have the budget to secure its database. If something looks fishy to you, the site might not be legitimate at all.&lt;br /&gt;
&lt;br /&gt;
== 6. Don’t trust incoming data / i.e. don’t let the con artist full you ==&lt;br /&gt;
Many of the phishing attacks in which hackers pretend to be someone else, starts by hackers approaching you. If you got an email saying that “you just won 1 million dollars” - don’t trust it. Moreover, hackers could easily forge the origin of the mail making you believe it was sent from someone else. In general, it is always better not to follow anything that was handed to you and you didn’t ask for - this is the same for the physical world as well. While it is sometimes inconvenient, it is wiser not to trust links you get in email. If an email was send to you from someone you don’t know, consider ignoring it. If you get an email from Facebook with a friendship request, it is better to simply go to Facebook and see that request rather than clicking on a link a hacker could have sent you. &lt;br /&gt;
&lt;br /&gt;
== 7. Track your accounts / i.e. Verify your body parts are in-tacked ==&lt;br /&gt;
Even if you follow every single security recommendation, you are always at some level of risk. For example, hackers might not be able to hack into your phone or computer, but hacking into a site that keeps your credit card will allow them to use it. Regularly checking your account balance, and recent transactions will allow you to verify that this did not happen.&lt;/div&gt;</summary>
		<author><name>Adish</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_AU_Conference_2009_Presentations&amp;diff=55654</id>
		<title>OWASP AU Conference 2009 Presentations</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_AU_Conference_2009_Presentations&amp;diff=55654"/>
				<updated>2009-02-27T17:23:38Z</updated>
		
		<summary type="html">&lt;p&gt;Adish: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| &lt;br /&gt;
! width=&amp;quot;350&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
! width=&amp;quot;250&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
! width=&amp;quot;300&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot;|[[Image:Owasp_au2009_conf_logo.jpg]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Presentations ==&lt;br /&gt;
&lt;br /&gt;
The following presentation abstracts are provided to understand the details of the presentations. This year OWASP will be video recording the event again and all videos will be kept online and available through the OWASP wiki.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Christian Heinrich ==&lt;br /&gt;
'''TCP Input Text &amp;amp; Download Indexed Cache'''&lt;br /&gt;
&lt;br /&gt;
Two Proof of Concept (PoC) will be demonstrated that implement the Google SOAP Search API to support the &amp;quot;reconnaissance&amp;quot; phase of a Penetration Test:&lt;br /&gt;
&lt;br /&gt;
	1. &amp;quot;Download Indexed Cache&amp;quot;, which retrieves content indexed within the Google Cache to support the testing specified in the &amp;quot;Search Engine Reconnaissance&amp;quot; section of the recently released OWASP Testing Guide v3, which is a superior methodology to the Google Hacking Database (GHDB).&lt;br /&gt;
&lt;br /&gt;
	2. &amp;quot;TCP Input Text&amp;quot;, which extracts TCP Ports and hostnames from Google Search Results into a .csv file and executes nmap and/or nc aka netcat for assurance of a listening TCP service.&lt;br /&gt;
&lt;br /&gt;
Mitigating controls, such as &amp;lt;META&amp;gt; Tags and robots.txt, based on the recommendations within the &amp;quot;Spiders/Robots/Crawlers&amp;quot; section of the recently released OWASP Testing Guide v3, will be presented.&lt;br /&gt;
&lt;br /&gt;
== Andrew Vanderstock ==&lt;br /&gt;
'''The future (and past) of web application security: how to detect and protect against value attacks.'''&lt;br /&gt;
&lt;br /&gt;
2008 was a bumper year for value attacks. Criminals are finally getting over the sophomoric desire to 0wn large numbers of hosts, turning their attention to getting a lot of money instead. This is bad if you have stuff the criminals want.&lt;br /&gt;
&lt;br /&gt;
Unfortunately, web application scanners (source and dynamic) cannot easily (if at all) detect or scan for this entire class of attack - you need to do the hard work.&lt;br /&gt;
&lt;br /&gt;
In this presentation, you'll learn how to:&lt;br /&gt;
&lt;br /&gt;
* Figure out where the value in your application is&lt;br /&gt;
* Identify weaknesses in your processes by identifying all the paths to your assets&lt;br /&gt;
* Protect your application against value and process attacks by careful and minor changes to your design&lt;br /&gt;
* Identify if folks are trying to do &amp;quot;interesting&amp;quot; things using ESAPI's intrusion detector classes&lt;br /&gt;
&lt;br /&gt;
With some luck, there might even be a demo!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Andrew van der Stock is a leading web application researcher active in the builder web application community. Andrew has recently returned from a two year stint working in the USA.&lt;br /&gt;
&lt;br /&gt;
Andrew is the project lead and lead author for the following OWASP projects:&lt;br /&gt;
&lt;br /&gt;
* OWASP Developer Guide 3.0&lt;br /&gt;
* OWASP Top 10 2009&lt;br /&gt;
* ESAPI for PHP port&lt;br /&gt;
&lt;br /&gt;
He is looking for contributors to all of the above projects. He helped start the Melbourne and Sydney OWASP chapters. Previously, Andrew was Executive Director of OWASP from 2005 to 2007.&lt;br /&gt;
&lt;br /&gt;
He is the moderator of webappsec@securityfocus.com, and has contributed the web application section of the SANS Top 20 since 2005.&lt;br /&gt;
He helped set the SANS GSSP Secure Programmer (Java) certification, and thus is deemed to hold this certification as he literally knows all the answers (he peeked).&lt;br /&gt;
&lt;br /&gt;
In previous lives, he has assisted with the following open source projects:&lt;br /&gt;
&lt;br /&gt;
    * UltimaBB, forum software - fork of XMB&lt;br /&gt;
    * XMB, forum software&lt;br /&gt;
    * SAGE-AU President of SAGE AU in 2000-2001, General Committee member 1999-2000, and a long time member.&lt;br /&gt;
    * pnm2ppa HP print drivers for Unix and work-alike systems&lt;br /&gt;
    * XFree86 Device drivers for Matrox Millennium I/II/Mystique (mid 90's vintage stuff)&lt;br /&gt;
&lt;br /&gt;
In his now copious spare time, Andrew continues to run AussieVeeDubbers, one of Australia's largest car forums, and one of the world's largest VW car forums.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Ranjita Shankar Iyer ==&lt;br /&gt;
'''A Prescriptive approach to Secure SDLC'''&lt;br /&gt;
&lt;br /&gt;
The old adage goes “Prevention is better than cure”. Similarly, many security vulnerabilities can be easily prevented if security was taken into consideration at the beginning of the development process. As application security professionals, we’ve seen that uncovering serious vulnerabilities and subsequent attempts to repair with production-ready applications significantly increase costs to the enterprise and delay project timelines. Moreover, despite the immense amount of literature on application vulnerabilities we find that developers are still unaware or only have very limited knowledge of common threats and secure coding practices. This often leads to the commonly sighted flaws such as the following:&lt;br /&gt;
- Implementation of client-side controls only that are easily bypassed&lt;br /&gt;
- Incorrect implementation of regular expressions to block XSS and SQL injection attacks&lt;br /&gt;
- Including too much sensitive business logic in applications that utilize FLEX and other RIA technologies&lt;br /&gt;
- Insecure use of API's and frameworks such as struts and spring&lt;br /&gt;
There are a number of commercial secure coding tools that facilitate developers to incorporate security controls upfront during the development and build process, but commercial products tend to be expensive, and not practical to provide to every developer. Commercial products are also a black-box to developers and enterprise security teams, where it’s unclear on how vulnerabilities were identified.&lt;br /&gt;
 &lt;br /&gt;
Leveraging our expertise in the field, we have developed an extensive data grid that maps standard security requirements (grouped into categories such as User Authentication, Input Validation, Session Management etc ) to sample implementation snippets in popular frameworks such as .Net, Java Struts and FLEX. This data grid draws on work already complied by open source communities such as OWASP that has a variety of tools and resources to help developers in understanding and resolving security issues. Furthermore the major frameworks mentioned above also often provide a large set of security APIs at the developer’s disposal. Leveraging these existing APIs lessens the burden of implementing security correctly and our data grid references these API's where appropriate. &lt;br /&gt;
 &lt;br /&gt;
However, experience has shown us that such resources alone are not effective in preventing security code flaws. Therefore we are launching an open-source, extensible, secure coding analysis tool that delivers information from the data grid to the developer as they are writing code in their favorite IDE's. The plug-in tool takes a prescriptive approach and prompts the developer with useful information and repair techniques using existing security APIs within major frameworks and open-source resources, such as ESAPI. The tool has an innovative extensible design, whereby modules can be easily extended to incorporate any framework and any vulnerability. Deliberate design decisions have been made to accommodate future frameworks and the customizable vulnerability identification engine can also be tailored to accommodate specific business risks and regulatory policy requirements. &lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
Speaker Bio's&lt;br /&gt;
&lt;br /&gt;
1) Ranjita Shankar Iyer CISSP, GSEC &lt;br /&gt;
Application Security Architect - Morgan Stanley&lt;br /&gt;
Ranjita is an application security specialist with over 8 years of experience developing and securing business critical applications. She is currently a Security Architect at Morgan Stanley and assesses complex applications across the firm to ensure that they are employing appropriate security controls to protect highly confidential client and employee data. Prior to this, she was at EY at the Advanced Security Center performing attack and penetration tests for fortune 100 financial services clients. She is well versed in the many challenges that organizations face with regards to introducing security into the software development lifecycle. &lt;br /&gt;
 &lt;br /&gt;
2) Kai Huang  CISSP, GSEC&lt;br /&gt;
Application Security Specialist - Ernst &amp;amp; Young&lt;br /&gt;
Kai is part of E&amp;amp;Y Global Information Security group, and is responsible for reviewing and advising security matters for a wide range of applications and information systems consumed by E&amp;amp;Y.  Prior to GIS, Kai was a member of the E&amp;amp;Y Advanced Security Center, performing web application, internet, intranet tests for EY's Fortune 500 clients.  Kai's primary areas of interest are web application security and VOIP research and tool development.  Prior to E&amp;amp;Y, Kai worked at CIGNA as a CIRT member.&lt;br /&gt;
&lt;br /&gt;
== Sumit Siddharth  ==&lt;br /&gt;
''' Recent Advancements in SQL Injection Exploitation Techniques '''&lt;br /&gt;
&lt;br /&gt;
This talk will cover different variants of SQL Injections and will demonstrate a variety of exploitation techniques. Starting with the very basics, the talk will progress to more complex scenarios and will discuss exploiting SQL injections which seem to be un-exploitable. The talk will have a number of demonstrations including the scenarios where this vulnerability goes undetected even by the most popular commercial scanners costing $$. Along the way, a number of freely available tools for exploiting SQL Injections will be discussed along with their pros and cons. &lt;br /&gt;
&lt;br /&gt;
'''About the Speaker:'''&lt;br /&gt;
&lt;br /&gt;
Sumit Siddharth (sid) works as a senior IT security consultant for Portcullis Computer Security Ltd in U.K. Sid has authored a number of articles, advisories, white papers over the years and has been a speaker at a number of IT security conferences. He also owns the popular IT security blog www.notsosecure.com.&lt;br /&gt;
&lt;br /&gt;
== Peter Freiberg ==&lt;br /&gt;
'''Determining attack surface and creating security test cases through observing business testing'''&lt;br /&gt;
&lt;br /&gt;
Application security testing is often a last minute black box activity where security testers rely on gut feel and intuition to determine how a system should work in order to compromise it. Even when coupled with source code analysis, a manual review or specialist software will not see all the data flows and context which pass through a system.&lt;br /&gt;
&lt;br /&gt;
By introducing web proxies that passively capture data flows from User Acceptance Testing we can observe the context of how the application should work. Using a newly created proxy log analysis tool, SPLAT, the following benefits can be obtained:&lt;br /&gt;
•	Automatically determine the attack surface of an application&lt;br /&gt;
o	What URLs are seen by users?&lt;br /&gt;
o	Are these shared between roles?&lt;br /&gt;
o	What pieces of data or parameters are passed and where?&lt;br /&gt;
•	Automatically create test cases for some OWASP Top 10 Vulnerabilities&lt;br /&gt;
•	Determine the data flows within your application&lt;br /&gt;
•	Potentially find disclosure of sensitive information such as credit cards and tax file numbers&lt;br /&gt;
•	Generate comparable metrics from testing phases&lt;br /&gt;
&lt;br /&gt;
== Siddharth Anbalahan ==&lt;br /&gt;
''' Advanced Techniques in Code Reviews '''&lt;br /&gt;
&lt;br /&gt;
Learn how experts blend manual and automated techniques to accelerate code reviews. When you review large apps, you’ll love these nifty tricks to find famous, and some not-so-famous flaws. Using demos &amp;amp; code snippets we show how the blended technique is better than simple scanning or manual checks. You learn to write custom scripts that slash review time to 1/5th and get a ready-to-use checklist.&lt;br /&gt;
Session Learning Objectives&lt;br /&gt;
The 3 learning objectives of the session are:&lt;br /&gt;
-	Learn how to code review large applications efficiently&lt;br /&gt;
-	Learn a structured approach to code reviews&lt;br /&gt;
-	Develop a checklist to use in future code reviews&lt;br /&gt;
Participants will be able to do code reviews as mandated by PCI for all applications that handle credit card information.&lt;br /&gt;
&lt;br /&gt;
== Brett Moore ==&lt;br /&gt;
'''Vulnerabilities In Action'''&lt;br /&gt;
&lt;br /&gt;
Common application vulnerabilities have been known for years now, and developers have been told about the threats and how to prevent these flaws. Even so, web applications are still been developed that are vulnerable to some of the oldest and most well known security flaws. The aim of this presentation is to show the attendees how vulnerabilities are discovered and exploited in real world situations, and the devastating effect that a flaw can have on the security of an application. The presentation will demonstrate multiple different application vulnerabilities across various development languages and operating systems. All of the commonly seen vulnerabilities will be demonstrated, aligned with the OWASP top 10 rating system. Attendees will be able to learn about the real dangers that application vulnerabilities pose, by seeing them been exploited as they would in a real compromise situation. The demonstration will be done again a ‘virtual’ network of vulnerable systems that will contain both server and application level flaws, giving a real world insight to an application compromise.&lt;br /&gt;
&lt;br /&gt;
== Karmendra Kohli ==&lt;br /&gt;
'''Wooden Swords and Plastic Guns - Insecure Security Defenses'''&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Securing applications insecurely gives a false sense of security. This session shows how popular security defenses are implemented wrongly, how apps are fitted with wooden swords and plastic guns. Based on our experience of testing 300+ applications, we show the most common errors in security defenses like CAPTCHAs, Encryption, Cache Control, etc. &lt;br /&gt;
Using code snippets and demos, we present actual encounters with insecurely secured applications. The audience will see how insecure implementations of CAPTCHAs allow bots to comfortably bypass defenses and perform automated registrations, post feedback, flood surveys and much more. We take you on a walk-through of how various insecure implementations of hashing defeats its very purpose. The audience learns how wrong use of cache control tags leads to authentication bypass, and disclosure of information among other weaknesses. We show how these wooden swords are a cause for concern. We explain what developers need to keep in mind so they implement security techniques &amp;quot;securely&amp;quot; - learn how to avoid subtle errors, and do things right the first time. With each topic we conclude with implementation best practices so developers / project managers / application owners can practice it from their next day at work.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
== Tom Brennan ==&lt;br /&gt;
'''OWASP 3.0 - Where we came from, where we are, where we are going.'''&lt;br /&gt;
&lt;br /&gt;
== Rajkumar Pandian Sakthivel ==&lt;br /&gt;
'''Web Application Security – A Reality Check'''&lt;br /&gt;
&lt;br /&gt;
Web Applications, harnessing the power of Internet has become a dominant factor in the web centric business .The power of Web applications have enabled businesses “flourish”, contributing to economic growth. To obey the Law of Polarities, the vulnerabilities present in the Web applications have caused an “impediment” to the growth of businesses resulting in huge losses. When the maturity of “containing” and combating Network Security Attacks (comprising of OS and Network Protocol vulnerabilities) has improved a lot with the help of Firewalls, Intrusion Prevention Systems and VPN, the overall scenario of Web application security looks grim. Security evangelists and enthusiasts have taken up the task of spreading the awareness of Web Application security. This paper discusses the current trends in the state of web application security and does a Reality Check. Different approaches of the software development community like Panic and patch approach (Web application attacked-Panic-Provide patch), Ritualistic approach (We have a policy in our company to check vulnerabilities in web apps, so we do something) and oblivious approach (Should it be done?  I never knew it) is discussed.&lt;br /&gt;
&lt;br /&gt;
The second part of the paper calls for a collaborative effort   from the Developers, Testers, Marketing people and users. The paper also suggests that Web application Security should be an intrinsic factor of the Design, Development &amp;amp; Testing phases.  The importance of Decision makers to understand, support and promote the web application security is discussed. The theme of “Securing Web applications – Passion, Art and Character” is advocated.&lt;br /&gt;
&lt;br /&gt;
== Drew Ames ==&lt;br /&gt;
'''Improving Application Security using pre-processing input filters – a case study'''&lt;br /&gt;
&lt;br /&gt;
Recently, CQR Consulting were engaged to assist one of our customers who was having significant difficulties due to compromise through their published web applications.  A review of their code and development practices showed that the quickest and most efficient way to prevent multiple attacks was through the implementation of a pre-processing validation filter.&lt;br /&gt;
 &lt;br /&gt;
This presentation will discuss the issues, approach and results of the development effort in creating a pre-processing validation filter.  It will present the risks which can be mitigated in such a way and others which need further controls to successfully manage.&lt;br /&gt;
 &lt;br /&gt;
The information provided will assist attendees in the decision between roll-your-own, WAF appliance or full scale code re-write.&lt;br /&gt;
&lt;br /&gt;
== Mark Goudie ==&lt;br /&gt;
'''An Insight into the World of Computer Forensics'''&lt;br /&gt;
&lt;br /&gt;
Security breaches and the compromise of sensitive information are a very real concern for&lt;br /&gt;
organisations worldwide. When such incidents occur, rapid response is critical. The damage&lt;br /&gt;
must be contained quickly, customer data protected, the root cause found and remedied, and an&lt;br /&gt;
accurate record of events and losses produced for authorities.&lt;br /&gt;
Furthermore, the investigation process must collect this evidence without adversely affecting the&lt;br /&gt;
integrity of the information assets involved in the crime.&lt;br /&gt;
The Data Breach Investigations Report – a study that integrates a vast amount of factual&lt;br /&gt;
evidence from forensic investigations over the last four years – provides a unique insight into&lt;br /&gt;
the world of computer forensics.&lt;br /&gt;
The Report is unique in that it offers an objective, first-hand view of data breaches directly from&lt;br /&gt;
casebooks, which represent a large proportion of total known compromised records during 2006&lt;br /&gt;
and 2007, including three of the five largest data breaches ever reported. Industry sectors&lt;br /&gt;
covered include Financial Services; Food and Beverage; Retail; and Technology.&lt;br /&gt;
The expansive statistical data set generated through activities including litigation support, ediscovery,&lt;br /&gt;
expert witness testimony, chain-of-custody, mock-incident training, and incident&lt;br /&gt;
response program development offers an interesting glimpse into the trends surrounding&lt;br /&gt;
computer crime and data compromise.&lt;br /&gt;
In a finding that may surprise some, the study found that most data breaches were caused by&lt;br /&gt;
external sources (73%). Breaches attributed to insiders (18%), though fewer in number, were&lt;br /&gt;
much larger than those caused by outsiders when they did occur.&lt;br /&gt;
Notably, at the commencement of the study, the main avenue of attack was the network or&lt;br /&gt;
operating system. However over time, the typical attack vector has moved up the stack to the&lt;br /&gt;
application layer.&lt;br /&gt;
And Asia Pacific is becoming a “hot” region for both the source and victim for the data breach,&lt;br /&gt;
with the vast majority of these cases involving software failure at some level.&lt;br /&gt;
Key points to be covered in the presentation include demographics, data breach sources, types&lt;br /&gt;
of threats, targeted and opportunistic attacks, pathways, data compromises, discover methods,&lt;br /&gt;
anti-forensics, and unknown unknowns.&lt;br /&gt;
&lt;br /&gt;
== Malathi Carthigaser ==&lt;br /&gt;
'''STRAW - A security Threat &amp;amp; Risk Assessment Methodology for Web Applications'''&lt;br /&gt;
&lt;br /&gt;
Myriad threat and risk assessment methodologies exist, but few that are considered suitable for adequately communicating the risks associated with web applications. In this presentation, a new methodology, the STRAW model will be outlined, that is consistent with current models (such as OWASP Risk Rating Methodology, AS 4360, STRIDE/DREAD etc.), but which extends upon them to provide the following benefits:&lt;br /&gt;
&lt;br /&gt;
•	Comprehensive matrix structure to capture all risk components and ratings.&lt;br /&gt;
&lt;br /&gt;
•	Enumerates a wide range of factors contributing to impact and likelihood ratings.&lt;br /&gt;
&lt;br /&gt;
•	Threat analysis is incorporated within the matrix.&lt;br /&gt;
&lt;br /&gt;
•	Related threat events/vulnerabilities are clearly cross-referenced to allow consideration of the combined effects of multiple related vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
•	Easily understandable, and a common communication tool for both technical and business parties.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The STRAW model is intended to be used after a security review has been completed, as a way of rating the severity of vulnerabilities/weaknesses identified, and subsequently, to aid in prioritising the security issues, and determining mitigation options and effort estimates. &lt;br /&gt;
&lt;br /&gt;
It is a proven model that has been successfully employed in many projects to date.&lt;br /&gt;
&lt;br /&gt;
== Benjamin Mossé ==&lt;br /&gt;
'''Browser Rider: what you never expected your browser could do to you'''&lt;br /&gt;
&lt;br /&gt;
Browser exploitation is in fashion but it doesn't seem that there's a popular tool to build and run attacks. Browser Rider will try to fill the gap by providing a framework to build, deploy and manage payloads that exploit the browser. This project aims on the long term to provide a powerful, simple and flexible interface to any client side attack for hackers. &lt;br /&gt;
&lt;br /&gt;
Proposal&lt;br /&gt;
&lt;br /&gt;
Browser security has become one of the most discussed subjects. This is mainly due to two things: First, nowadays malwares are not spread over emails any longer but through web application often using JavaScript obfuscation to avoid anti-virus detection. Second as the web is growing new technologies are constantly appearing to enhance the user experience but also offering many new attack vectors. In both cases it is important to understand that the browser offers an easy mechanism for bypassing firewalls and other perimeter security to gain unauthorised access or commit other security breach. &lt;br /&gt;
&lt;br /&gt;
From a security consultant point of view it can be hard to justify the risk of vulnerabilities that affect the browser such as cross-site scripting, cross-site request forgery and unauthorized redirection vulnerabilities as they do not impact directly the server or the database.&lt;br /&gt;
&lt;br /&gt;
Browser rider is a security tool to exploit browser vulnerabilities. It offers several existing payloads but also provides a complete programming framework to develop exploits. It also acts as a management system to deploy your attacks and control the infected browsers.&lt;br /&gt;
&lt;br /&gt;
The first part of this presentation will introduce the audience to the tool and demonstrate many attacks that can be ported to the browser using the Browser Rider. The second part will technically explain how the tool works (i.e. obfuscation, signature detection avoidance, polymorphism, program architecture, framework), how to write your own exploits with it and deploy them.&lt;br /&gt;
&lt;br /&gt;
On the long term Browser Rider aims at becoming a complete solution to execute, develop and test browser based attacks for security consultants.&lt;br /&gt;
&lt;br /&gt;
== Paul Theriault ==&lt;br /&gt;
'''Plug-in Purgatory'''&lt;br /&gt;
&lt;br /&gt;
Browser plug-ins allow web developers to embed content in web pages which is otherwise unsupported by the browser. This additional content requires additional system resources and sometimes extended system privileges in order to run. Most plug-ins are expected to release these resources once a page has been unloaded, but as will be discussed in this presentation, bugs and unexpected side-effects in the implementation of these plug-ins may allow an attacker to develop content which does not get unloaded as intended. As a result, an attacker is able to execute attacks ranging from simple abuse of system resources, to persistent bi-directional command and control channels.&lt;br /&gt;
This talk will discuss several approaches to this attack, and also examine the susceptibility to these attacks in common browser plug-ins.&lt;br /&gt;
&lt;br /&gt;
Bio&lt;br /&gt;
&lt;br /&gt;
Paul Theriault is a Senior Consultant with SIFT, and has extensive experience in both technical and policy areas of IT security ranging from application code review and testing, to business-wide risk assessment and management. With a background in web development, Paul's security research interests are centered on all things web - browsers, bytecode and everything in between.&lt;br /&gt;
&lt;br /&gt;
== Alex Kouzemtchenko ==&lt;br /&gt;
'''Examining and Bypassing the IE8 XSS Filter'''&lt;br /&gt;
&lt;br /&gt;
Even with continued focus on XSS vulnerabilities, they are clearly not going away, and the issues are not being properly solved by even the safest frameworks, such as .NET. As such Microsoft has implemented defence-in-depth client-side protections inside Internet Explorer 8 in the form of the XSS Filter to make exploitation of these vulnerabilities either harder or impossible.&lt;br /&gt;
&lt;br /&gt;
This talk will examine the specific situations that the XSS Filter tries to protect users in, the scenarios where it does not prevent attacks, several bypass techniques for these filters and ways in which the XSS Filter's functionality can be abused to help perform attacks, such as Clickjacking or even XSS.&lt;br /&gt;
&lt;br /&gt;
Bio:&lt;br /&gt;
&lt;br /&gt;
Alex Kouzemtchenko has been an active member of the web application security research community for the past several years, publishing several papers and has presented his findings at several conferences such as Bluehat, the Chaos Communications Congress, RUXCON, Power of Community and XCon. Alex is the R&amp;amp;D Team Lead at SIFT where he gets paid to find new ways to break things and apply that work to consulting engagements.&lt;br /&gt;
&lt;br /&gt;
== Adi Sharabani ==&lt;br /&gt;
'''Active Man in the Middle Attacks'''&lt;br /&gt;
&lt;br /&gt;
We've all known for a long time that using a public wireless network is risky. We all think twice before logging into our bank account or accessing any kind of sensitive information. But what about simply reading the news on our favorite news site?&lt;br /&gt;
In this presentation, we will show how using a public network can expose you to practically any web-related client-side security issue on any domain, no matter how careful you think you're being. These issues range from XSS on any domain, through XSRF, to leaking of browser data and more. &lt;br /&gt;
&lt;br /&gt;
We will show how the currently known best practices, which are supposed to keep you from harm when reading a blog in the neighborhood coffee shop, may be overcome. We'll demonstrate how such best practices are only useful against what we call &amp;quot;Passive&amp;quot; attacks, which are passively gathering data from the network. We will introduce a new type of attack coined &amp;quot;Active attacks&amp;quot;, and see how they easily work around a careful user's attempt to browse responsibly in a public network. We will demonstrate how these attacks can steal information from past browsing activities. and how they can monitor your future browsing, inside the safetey of your home and your organization's networks.&lt;br /&gt;
&lt;br /&gt;
* More information on these attacks can be found on the [http://blog.watchfire.com/wfblog/2009/02/active-man-in-the-middle-attacks.html Watchfire's blog]&lt;br /&gt;
&lt;br /&gt;
Bio:&lt;br /&gt;
&lt;br /&gt;
Adi Sharabani manages the IBM Rational Application Security Research Group, responsible for product and industry research activities that pertain to Web application security. Adi joined IBM through the acquisition of Watchfire, a market leader in web application security testing. Prior to security research, Adi was a senior software developer on the AppScan team responsible for the invention and development of many of its key features.&lt;/div&gt;</summary>
		<author><name>Adish</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_AU_Conference_2009_Agenda&amp;diff=55653</id>
		<title>OWASP AU Conference 2009 Agenda</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_AU_Conference_2009_Agenda&amp;diff=55653"/>
				<updated>2009-02-27T17:13:51Z</updated>
		
		<summary type="html">&lt;p&gt;Adish: /* OWASP Australia 2009 Conference Schedule - February 26th &amp;amp; 27th 2009 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The following Agenda is provided currently with approved and accepted Speaking spots. As more information is provided details will be posted online.&lt;br /&gt;
&lt;br /&gt;
== OWASP Australia 2009 Conference Schedule - February 26th &amp;amp; 27th 2009 ==&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | Wednesday Feb 25, 2009&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | || style=&amp;quot;width:40%; background:#BC857A&amp;quot; |  &lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; | &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 17:30 - 19:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#669966&amp;quot; align=&amp;quot;left&amp;quot; | '''Conference Welcome Cocktail Party''' - ''Sponsored by Fortify Inc.'' Presentation on the Fortify Software Assurance Maturity Model. &lt;br /&gt;
&lt;br /&gt;
This is a great opportunity to settle in, meet people at the conference and meet up with industry peers.&lt;br /&gt;
&lt;br /&gt;
Location: Conference Facility Foyer @ Gold Coast Convention Center (Level 1 FOYER)&lt;br /&gt;
 |-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | Day 1 - Thursday Feb 26, 2009&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | || style=&amp;quot;width:40%; background:#BC857A&amp;quot; | '''Track 1 (Rooms 5 &amp;amp; 6)'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; | '''Track 2 (Rooms 7 &amp;amp; 8)'''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 08:00-09:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Registration and Coffee - ''Espresso Coffee (Sponsored by IBM) provided.''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 09:00-09:15 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;left&amp;quot; | '''Welcome to OWASP AU 2009''' - Justin Derry (OWASP Conference Chair AU2009 &amp;amp; Fortify Practice Director Asia Pacific)&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 09:15-10:45 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;left&amp;quot; | '''Keynote:''' Roger Thorton, CTO Fortify Inc&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:45-11:15 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | ''Morning Tea/Coffee, Vendor Technology Expo'' - ''Espresso Coffee (Sponsored by IBM) provided.''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 11:15-12:15 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Christian Heinrich &amp;amp; Darren Skidmore - ''PCI-DSS Application Security''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Ranjita Shankar Iyer - ''A Prescriptive approach to Secure SDLC'' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:15-13:30 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | ''Lunch, Vendor Technology Expo''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 13:30-14:30 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Andrew Vanderstock - ''The future (and past) of web application security how to detect and protect against value attacks''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Siddharth Anbalahan - ''Advanced Techniques in Code Reviews''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 14:45-15:45 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Peter Freiberg - ''Determining attack surface and creating security test cases through observing business testing''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Brett Moore - ''Vulnerabilities In Action''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:45-16:15 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | ''Afternoon Tea/Coffee, Vendor Technology Expo'' - ''Espresso Coffee (Sponsored by IBM) provided.''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 16:15-17:15 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Sumit Siddharth - ''Recent Advancements in SQL Injection Exploitation Techniques''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Karmendra Kohli - ''Wooden Swords and Plastic Guns - Insecure Security Defenses''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 17:15-18:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:40%; background:#F2F2F2&amp;quot; align=&amp;quot;left&amp;quot; | Panel - Industry Experts, Talking about real Application Security Threats. ''(You ask the questions, in this informative 45 minutes of panel discussion on relevant industry issues.)''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 18:30-19:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#669966&amp;quot; align=&amp;quot;left&amp;quot; | '''OWASP Social Gathering:''' Pre-Dinner Drinks &amp;amp; Cocktails&lt;br /&gt;
&lt;br /&gt;
Location: Conference Facility Foyer @ Gold Coast Convention Center (Level 1 FOYER)&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 19:00-22:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#669966&amp;quot; align=&amp;quot;left&amp;quot; | '''OWASP Social Gathering:''' Gala Dinner, Entertainment and Networking Opportunity. ''This is Free to all attendees and will be a great night.''&lt;br /&gt;
&lt;br /&gt;
Location: Conference Facility Foyer @ Gold Coast Convention Center (Level 1 FOYER)&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | Day 2 - Friday Feb 27, 2009&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | || style=&amp;quot;width:40%; background:#BC857A&amp;quot; | '''Track 1 (Rooms 5 &amp;amp; 6)'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; | '''Track 2 (Rooms 7 &amp;amp; 8)'''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 08:00-09:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Registration and Coffee - ''Espresso Coffee (Sponsored by IBM) provided.''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 09:00-9:15 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;left&amp;quot; | '''Conference Day 2 Open''' - Justin Derry (OWASP Conference Chair AU2009 &amp;amp; Fortify Practice Director Asia Pacific)&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 09:15-10:45 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;left&amp;quot; | '''Keynote:''' Adi Sharabani (IBM Rational Application Security Research) ''[http://blog.watchfire.com/wfblog/2009/02/active-man-in-the-middle-attacks.html Web-Based Man-in-the-Middle Attacks]''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:45-11:15 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | ''Morning Tea/Coffee, Vendor Technology Expo'' - ''Espresso Coffee (Sponsored by IBM) provided.''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 11:15 -12:15 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Alex Kouzemtchenko - ''Examining and Bypassing the IE8 XSS Filter''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Paul Theriault - ''Plug-in Purgatory'' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:15-13:30 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | ''Lunch, Vendor Technology Expo''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 13:30-14:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;left&amp;quot; | Panel Discussion - OWASP Australia Discussion. ''(Help us to plan for OWASP chapter sessions, presentations and the 2010 conference in this session.)''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 14:00-14:45 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Mark Goudie - ''An Insight into the World of Computer Forensics''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Malathi Carthigaser - STRAW ''- A security Threat &amp;amp; Risk Assessment Methodology for Web Applications'' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 14:45-15:45 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Drew Ames - ''Improving Application Security using pre-processing input filters – a case study'' &lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Pravir Chandra (OWASP CLASP Project) - ''The Software Assurance Maturity Model (SAMM), a new OWASP Project''&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:45-16:15 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | ''Afternoon Tea/Coffee, Vendor Technology Expo'' - ''Espresso Coffee (Sponsored by IBM) provided.''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 16:15-17:15 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Christian Heinrich - ''Googleless''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Benjamin Mosse - ''Browser Rider: what you never expected your browser could do to you.''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 17:15-17:30 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:40%; background:#F2F2F2&amp;quot; align=&amp;quot;left&amp;quot; | '''Conference Close''', Justin Derry (OWASP Conference Chair AU2009 &amp;amp; Fortify Practice Director Asia Pacific)&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 17:30-19:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#669966&amp;quot; align=&amp;quot;left&amp;quot; | '''Happy Hour &amp;amp; Half''' - Drinks and Cocktails in Vendor Technology Expo &lt;br /&gt;
A Great opportunity to talk about relevant topics presented on and meet/discuss topics with presenters from the day.&lt;br /&gt;
 |-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== OWASP Australia 2009 Conference Facilities Map ==&lt;br /&gt;
To assist delegates the following map of the Conference Facilities is provided. The Gold Coast Convention Center has provided OWASP with the entire top floor of the Conference Facility for all services including presentations, meals and the vendor technology expo.&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/OWASP_AU_Conference_2009 http://www.owasp.org/images/1/16/OWASP-AUS_CONFERENCE_LAYOUT_FIRSTFLOOR.png]&lt;/div&gt;</summary>
		<author><name>Adish</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_NYC_AppSec_2008_Conference&amp;diff=52371</id>
		<title>OWASP NYC AppSec 2008 Conference</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_NYC_AppSec_2008_Conference&amp;diff=52371"/>
				<updated>2009-01-29T17:39:20Z</updated>
		
		<summary type="html">&lt;p&gt;Adish: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
== Introduction ==&lt;br /&gt;
This event was a great success, drawing together professionals from all around the world. Please see the agenda below for copies of the presentations and videos of all the talks!!&lt;br /&gt;
&lt;br /&gt;
Conference Description: This vendor agnostic conference has tracks for management, security, audit and development professionals interested in the state of the appsec industry and its trends. Presented by some of the brightest people in the industry, this event is a must attend for anyone looking to improve their information security posture and threat awareness. With assistance from: [http://www.webappsec.org WASC], [http://www.nym-infragard.us NYM InfraGard], [http://aitglobal.com AITGlobal], [http://nyphp.org/index.php NYC PHP], [http://www.nycbug.org NYCBUG], [http://www.isacany.net NYC ISACA], [http://www.nymissa.org NYC ISSA] and our event co-sponsors you are invited to (2) days of hardcore hands-on training and (2) full days of Seminars and Technology Pavilion from the world's best application security technology minds, all held in the New York City, Midtown.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;h2&amp;gt;SEE BELOW FOR VIDEO AND SLIDES - [http://picasaweb.google.com/jinxpuppy CLICK HERE FOR PHOTOS]&amp;lt;/h2&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt; [http://www.linkedin.com/e/gis/36874 Join the OWASP Linked'In Group] &lt;br /&gt;
- - -&lt;br /&gt;
[https://www.owasp.org/index.php/Category:OWASP_Video For Previous OWASP Conference Video CLICK HERE]&amp;lt;/center&amp;gt;&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== 2008 OWASP USA, NYC Conference Schedule – FULL VIDEO 50+ Speakers see below ==&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h2&amp;gt;Day 1 – Sept 24th, 2008 &amp;lt;/h2&amp;gt; &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | || style=&amp;quot;width:30%; background:#BC857A&amp;quot; | Track 1: BALLROOM&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; | Track 2: SKYLINE&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#99FF99&amp;quot; | Track 3: TIMESQUARE&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 07:30-08:50 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | Doors Open for Attendee/Speaker Registration &lt;br /&gt;
''avoid lines come early get your caffeine fix and use free wifi''&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 09:00-09:45 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | '''OWASP Version 3.0 who we are, how we got here and where we are going?'''&amp;lt;br&amp;gt;&lt;br /&gt;
''OWASP Foundation: [[Contact | Jeff Williams]], [[Contact | Dinis Cruz]], [[Contact | Dave Wichers]], [[Contact | Tom Brennan]], [[Contact | Sebastien Deleersnyder]]'' &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;{{#ev:googlevideo|-228977859802026041}}&amp;lt;/center&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
[http://www.owasp.org/images/b/b7/AppSecNYC08-Delivering_AppSec_Info.ppt Dave Wicher's Slides] / Jeff William's Slides / Dinis Cruz's Slides&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:00-10:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[AppSecEU08_Trends_in_Web_Hacking_Incidents:_What%27s_hot_for_2008 | Analysis of the Web Hacking Incidents Database (WHID)]]''' &amp;lt;br&amp;gt;&lt;br /&gt;
''[http://blog.shezaf.com Ofer Shezaf]''&amp;lt;br&amp;gt;&lt;br /&gt;
[http://video.google.com/videoplay?docid=1130960689238372157&amp;amp;hl=en VIDEO] / SLIDES&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
'''[http://www.webappsecroadmap.com Web Application Security Road Map]'''&amp;lt;br&amp;gt;&lt;br /&gt;
''[http://joesecurity.blogspot.com Joe White]''&amp;lt;br&amp;gt;&lt;br /&gt;
[http://video.google.com/videoplay?docid=-237406228011458703&amp;amp;hl=en VIDEO] / [https://sites.google.com/a/webappsecroadmap.com/main/announcements/owasp-appsec-2008-presentation-has-been-uploaded SLIDES]&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;center&amp;quot; |&lt;br /&gt;
'''[https://buildsecurityin.us-cert.gov/swa/acqwg.html DHS Software Assurance Initiatives]'''&amp;lt;br&amp;gt;&lt;br /&gt;
''[http://www.linkedin.com/pub/0/ab/3b7 Stan Wisseman] &amp;amp; [http://www.linkedin.com/pub/1/439/923 Joe Jarzombek]''&amp;lt;br&amp;gt;&lt;br /&gt;
[http://video.google.com/videoplay?docid=-6505795148329572484&amp;amp;hl=en VIDEO] / SLIDES&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 11:00-11:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
'''Http Bot Research'''&amp;lt;br&amp;gt;&lt;br /&gt;
''[http://www.shadowserver.org/wiki/pmwiki.php?n=Shadowserver.Mission Andre M. DiMino - ShadowServer Foundation]''&amp;lt;br&amp;gt;&lt;br /&gt;
[http://video.google.com/videoplay?docid=1400503643786264015&amp;amp;hl=en VIDEO] / SLIDES&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
'''OWASP &amp;quot;Google Hacking&amp;quot; Project'''&amp;lt;br&amp;gt;&lt;br /&gt;
''[http://www.linkedin.com/in/ChristianHeinrich Christian Heinrich]''&amp;lt;br&amp;gt;&lt;br /&gt;
[http://video.google.com/videoplay?docid=5419982525671711780&amp;amp;hl=en VIDEO] / SLIDES&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
'''MalSpam Research'''&amp;lt;br&amp;gt;&lt;br /&gt;
'' [http://www.knujon.com/bios.html Garth Bruen]''&amp;lt;br&amp;gt;&lt;br /&gt;
[http://video.google.com/videoplay?docid=-8813268235790993111&amp;amp;hl=en VIDEO] / SLIDES&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:00-13:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | [[OWASP_NYC_AppSec_2008_Conference/ctf | Capture the Flag]] Sign-Up&lt;br /&gt;
''LUNCH - Provided by event sponsors @ TechExpo''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:00-12:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
'''Get Rich or Die Trying - Making Money on The Web, The Black Hat Way'''&amp;lt;br&amp;gt;&lt;br /&gt;
''[http://www.linkedin.com/in/treyford Trey Ford], [http://www.linkedin.com/in/tombrennan Tom Brennan], [http://www.linkedin.com/pub/0/205/77a Jeremiah Grossman]''&amp;lt;br&amp;gt;&lt;br /&gt;
[http://video.google.com/videoplay?docid=-7209323310151363553&amp;amp;hl=en VIDEO] / SLIDES&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
'''Framework-level Threat Analysis: Adding Science to the Art of Source-code review'''&amp;lt;br&amp;gt;&lt;br /&gt;
''[[OWASP_NYC_AppSec_2008_Conference-rohit-sethi | Rohit Sethi]] &amp;amp; [[OWASP_NYC_AppSec_2008_Conference-sahba-kazerooni | Sahba Kazerooni]]''&amp;lt;br&amp;gt;&lt;br /&gt;
[http://video.google.com/videoplay?docid=8935251380629216945&amp;amp;hl=en VIDEO] / SLIDES&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
'''Automated Web-based Malware Behavioral Analysis'''&amp;lt;br&amp;gt;&lt;br /&gt;
''[http://www.linkedin.com/pub/3/359/b1a Tyler Hudak]''&amp;lt;br&amp;gt;&lt;br /&gt;
[http://video.google.com/videoplay?docid=4204600308807371535&amp;amp;hl=en VIDEO] / SLIDES&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 13:00-13:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
'''[http://blogs.adobe.com/psirt/2008/09/thanks_to_jeremiah_grossman_an.html New 0-Day Browser Exploits: Clickjacking - yea, this is bad...]'''&amp;lt;br&amp;gt;&lt;br /&gt;
''[http://jeremiahgrossman.blogspot.com Jeremiah Grossman] &amp;amp; [http://ha.ckers.org/blog/about Robert &amp;quot;RSnake&amp;quot; Hansen]''&amp;lt;br&amp;gt;&lt;br /&gt;
[http://video.google.com/videoplay?docid=-5747622209791380934&amp;amp;hl=en VIDEO] / SLIDES&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
'''Web Intrusion Detection with ModSecurity'''&amp;lt;br&amp;gt;&lt;br /&gt;
''[http://www.breach.com/company/executive-team/ Ivan Ristic]''&amp;lt;br&amp;gt;&lt;br /&gt;
[http://video.google.com/videoplay?docid=-7391448618249578180&amp;amp;hl=en VIDEO] / [[Media:OWASP_NYC_2008-Web_Intrusion_Detection_with_ModSecurity.pdf|SLIDES]]&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
'''Using Layer 8 and OWASP to Secure Web Applications'''&amp;lt;br&amp;gt;&lt;br /&gt;
''[http://www.linkedin.com/in/davidstern2000 David Stern] &amp;amp; [http://www.linkedin.com/in/romangarber Roman Garber]''&amp;lt;br&amp;gt;&lt;br /&gt;
[http://video.google.com/videoplay?docid=-3883297889781954509&amp;amp;hl=en VIDEO] / SLIDES&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 14:00-14:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;center&amp;quot; | '''Application Security Industry Outlook Panel:'''&amp;lt;br&amp;gt;&lt;br /&gt;
''[http://www.linkedin.com/pub/0/497/86a Jim Routh] CISO DTCC, &amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.linkedin.com/pub/0/bb1/68a Sunil Seshadri] CISO NYSE-Euronet, &amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.linkedin.com/in/bernik Joe Bernik] SVP, RBS Americas,&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.linkedin.com/pub/8/878/240 Jennifer Bayuk] Infosec Consultant,&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.linkedin.com/in/philvenables Philip Venables] CISO, Goldman Sachs, &amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.linkedin.com/in/crecalde Carlos Recalde] SVP, Lehman Brothers, &amp;lt;br&amp;gt;&lt;br /&gt;
Moderator: [http://www.linkedin.com/in/mahidontamsetti   Mahi Dontamsetti]''&amp;lt;br&amp;gt;&lt;br /&gt;
[http://video.google.com/videoplay?docid=-7051719323294878516&amp;amp;hl=en VIDEO] / SLIDES&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
'''[http://www.owasp.org/index.php/Security_Assessing_Java_RMI Security Assessing Java RMI] '''&amp;lt;br&amp;gt;&lt;br /&gt;
''[http://www.linkedin.com/in/adamboulton Adam Boulton]''&amp;lt;br&amp;gt;&lt;br /&gt;
[http://video.google.com/videoplay?docid=1673714450539106400&amp;amp;hl=en VIDEO] / SLIDES&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
'''JBroFuzz 0.1 - 1.1: Building a Java Fuzzer for the Web'''&amp;lt;br&amp;gt;&lt;br /&gt;
''[[OWASP_NYC_AppSec_2008_Conference-SPEAKER-Yiannis_Pavlosoglou | Yiannis Pavlosoglou]]''&amp;lt;br&amp;gt;&lt;br /&gt;
[http://video.google.com/videoplay?docid=-1551704659206071145&amp;amp;hl=en VIDEO] / SLIDES&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:00-15:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
'''OWASP Testing Guide - Offensive Assessing Financial Applications'''&amp;lt;br&amp;gt;&lt;br /&gt;
'' [[OWASP_NYC_AppSec_2008_Conference-daniel-cuthbert | Daniel Cuthbert]]''&amp;lt;br&amp;gt;&lt;br /&gt;
[http://video.google.com/videoplay?docid=-3228312539505217121&amp;amp;hl=en VIDEO] / SLIDES&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
'''Flash Parameter Injection (FPI)'''&amp;lt;br&amp;gt;&lt;br /&gt;
''Ayal Yogev &amp;amp; Adi Sharabani''&amp;lt;br&amp;gt;&lt;br /&gt;
[http://video.google.com/videoplay?docid=7818654218575619118&amp;amp;hl=en VIDEO] / [http://blog.watchfire.com/FPI.ppt SLIDES] / [http://blog.watchfire.com/FPI.pdf PAPER]&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;center&amp;quot; |&lt;br /&gt;
'''[[OWASP_NYC_AppSec_2008_Conference-SPEAKER-Andres_Riancho | w3af - A Framework to own the web]]'''&amp;lt;br&amp;gt;&lt;br /&gt;
''Andres Riancho''&amp;lt;br&amp;gt;&lt;br /&gt;
[http://video.google.com/videoplay?docid=4354579888802327250&amp;amp;hl=en VIDEO] / VIDEO&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 16:00-16:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
'''OWASP Enterprise Security API [[ESAPI | (ESAPI) Project]]'''&amp;lt;br&amp;gt;&lt;br /&gt;
'' [http://www.aspectsecurity.com/management.htm Jeff Williams]''&amp;lt;br&amp;gt;&lt;br /&gt;
[http://video.google.com/videoplay?docid=-2912157383449643073&amp;amp;hl=en VIDEO] / SLIDES&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
'''Cross-Site Scripting Filter Evasion'''&amp;lt;br&amp;gt;&lt;br /&gt;
''Alexios Fakos''&amp;lt;br&amp;gt;&lt;br /&gt;
[http://video.google.com/videoplay?docid=-6974576754943514571&amp;amp;hl=en VIDEO] / SLIDES&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
'''[[OWASP_NYC_AppSec_2008_Conference-SPEAKER-GunterOllmann | Multidisciplinary Bank Attacks]]'''&amp;lt;br&amp;gt;&lt;br /&gt;
''Gunter Ollmann''&amp;lt;br&amp;gt;&lt;br /&gt;
[http://video.google.com/videoplay?docid=3041861094296331549&amp;amp;hl=en VIDEO] / SLIDES&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 17:00-17:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
'''Open Discussion On Application Security'''&amp;lt;br&amp;gt;&lt;br /&gt;
''Joe Bernik &amp;amp; Steve Antoniewicz''&amp;lt;br&amp;gt;&lt;br /&gt;
[http://video.google.com/videoplay?docid=6718671647859572098&amp;amp;hl=en VIDEO] / SLIDES&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
'''Mastering PCI Section 6.6'''&amp;lt;br&amp;gt;&lt;br /&gt;
''[http://www.linkedin.com/pub/1/228/6a5 Taylor McKinley] and [http://www.linkedin.com/in/jacobwest Jacob West]''&amp;lt;br&amp;gt;&lt;br /&gt;
[http://video.google.com/videoplay?docid=-2544477786674220116&amp;amp;hl=en VIDEO] / SLIDES&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
'''Case Studies: Exploiting application testing tool deficiencies via &amp;quot;out of band&amp;quot; injection'''&amp;lt;br&amp;gt;&lt;br /&gt;
''[http://www.linkedin.com/pub/0/a91/aa2 Vijay Akasapu] &amp;amp; [http://www.linkedin.com/pub/9/279/381 Marshall Heilman]''&amp;lt;br&amp;gt;&lt;br /&gt;
[http://video.google.com/videoplay?docid=7623989457736720764&amp;amp;hl=en VIDEO] / SLIDES&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 18:00-18:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
'''[http://www.owasp.org/index.php/Category:OWASP_Live_CD_Project Spearfishing and the OWASP Live CD]'''&amp;lt;br&amp;gt;&lt;br /&gt;
''[http://www.linkedin.com/in/packetfocus Joshua Perrymon]''&amp;lt;br&amp;gt;&lt;br /&gt;
[http://video.google.com/videoplay?docid=-4419524791864555496&amp;amp;hl=en VIDEO] / SLIDES&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
'''Phundamental Security - Coding Secure w/PHP'''&amp;lt;br&amp;gt;&lt;br /&gt;
''[http://www.linkedin.com/in/zaunere Hans Zaunere]''&amp;lt;br&amp;gt;&lt;br /&gt;
[http://video.google.com/videoplay?docid=3477751371038020741&amp;amp;hl=en VIDEO] / SLIDES&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
'''[[Payment_Card_Data_Security_and_the_new_Enterprise_Java | Payment Card Data Security and the new Enterprise Java]]'''&amp;lt;br&amp;gt;&lt;br /&gt;
''[[OWASP_NYC_AppSec_2008_Conference-SPEAKER-Dr._B._V._Kumar | Dr. B. V. Kumar]] &amp;amp; [[OWASP_NYC_AppSec_2008_Conference-SPEAKER-Abhay_Bhargav | Mr. Abhay Bhargav]]''&amp;lt;br&amp;gt;&lt;br /&gt;
[http://video.google.com/videoplay?docid=4488848043144792234&amp;amp;hl=en VIDEO] / SLIDES&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 19:00-20:00 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
'''OWASP Chapter Leader / Project Leader working session'''&amp;lt;br&amp;gt;&lt;br /&gt;
''OWSAP Board/Chapter Leaders''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
'''(ISC)2 Cocktail Hour'''&amp;lt;br&amp;gt; &lt;br /&gt;
All welcome to attend for a special announcement presented by:&amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.isc2.org/cgi-bin/content.cgi?page=351 W. Hord Tipton, Executive Director of (ISC)2]&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
'''Technology Movie Night'''&amp;lt;br&amp;gt;&lt;br /&gt;
''[http://www.youtube.com/watch?v=LlKDkTbUFhU&amp;amp;feature=related Sneakers], [http://www.youtube.com/watch?v=tAcEzhQ7oqA WarGames], [http://hackersarepeopletoo.com HackersArePeopleToo], [http://www.youtube.com/watch?v=4Be-ZzcXVLw TigerTeam]'' &amp;lt;br&amp;gt;&lt;br /&gt;
from 19:00 - 23:00&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 20:00-23:00+ || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | OWASP Event Party/Reception &amp;lt;br&amp;gt;Event badge required for admission &amp;lt;br&amp;gt;[[OWASP_NYC_AppSec_2008_Conference/ctf | Food, Drinks w/ New &amp;amp; Old Friends - break out the laptop and play capture the flag for fun and prizes.]] &amp;lt;br&amp;gt;''Location: HOTEL BALLROOM''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! colspan=&amp;quot;10&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h2&amp;gt;Day 2 – Sept 25th, 2008 &amp;lt;/h2&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
  | style=&amp;quot;width:10%; background:#99FF99&amp;quot; | 08:00-10:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; |  BREAKFAST - Provided by event sponsors @ TechExpo&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 08:00-08:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
'''Software Development and Management: The Last Security Frontier'''&amp;lt;br&amp;gt;&lt;br /&gt;
''[http://blog.isc2.org/isc2_blog/tipton/index.html W. Hord Tipton], CISSP-ISSEP, CAP, CISA, CNSS and former Chief Information Officer for the U.S. Department of the Interior Executive Director and member of the Board of Directors, (ISC)²''&amp;lt;br&amp;gt;&lt;br /&gt;
[http://video.google.com/videoplay?docid=-4023599059084294937&amp;amp;hl=en VIDEO] / SLIDES&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
'''[[AppSecEU08_Best_Practices_Guide_Web_Application_Firewalls | Best Practices Guide for Web Application Firewalls]]'''&amp;lt;br&amp;gt;&lt;br /&gt;
''Alexander Meisel''&amp;lt;br&amp;gt;&lt;br /&gt;
[http://video.google.com/videoplay?docid=-2977259539412442033&amp;amp;hl=en VIDEO] / SLIDES&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
'''The Good The Bad and The Ugly - Pen Testing VS. Source Code Analysis&lt;br /&gt;
'''&amp;lt;br&amp;gt;&lt;br /&gt;
''[http://www.linkedin.com/in/tommyryan Thomas Ryan]''&amp;lt;br&amp;gt;&lt;br /&gt;
[http://video.google.com/videoplay?docid=-442445248884665643&amp;amp;hl=en VIDEO] / SLIDES&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 09:00-09:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
'''OWASP Web Services Top Ten'''&amp;lt;br&amp;gt;&lt;br /&gt;
''[http://1raindrop.typepad.com Gunnar Peterson]''&amp;lt;br&amp;gt;&lt;br /&gt;
[http://video.google.com/videoplay?docid=5680040858618100893&amp;amp;hl=en VIDEO] / SLIDES&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
'''[http://www.trutv.com/video/tiger-team/tiger-team-101-1-of-4.html  Red And Tiger Team Application Security Projects]'''&amp;lt;br&amp;gt;&lt;br /&gt;
''[http://www.linkedin.com/pub/1/373/994 Chris Nickerson]''&amp;lt;br&amp;gt;&lt;br /&gt;
[http://video.google.com/videoplay?docid=-1638710543904774703&amp;amp;hl=en VIDEO] / SLIDES&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
'''OpenSource Tools'''&amp;lt;br&amp;gt;&lt;br /&gt;
''Prof. Li-Chiou Chen &amp;amp; Chienitng Lin, [http://www.pace.edu/page.cfm?doc_id=16399 Pace Univ]''&amp;lt;br&amp;gt;&lt;br /&gt;
[http://video.google.com/videoplay?docid=6174945058170583976&amp;amp;hl=en VIDEO] / SLIDES&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:00-10:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
'''Building a tool for Security consultants: A story of a customized source code scanner'''&amp;lt;br&amp;gt;&lt;br /&gt;
''Dinis Cruz''&amp;lt;br&amp;gt;&lt;br /&gt;
[http://video.google.com/videoplay?docid=5269154656993046978&amp;amp;hl=en VIDEO] / SLIDES&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
'''&amp;quot;Help Wanted&amp;quot; [http://www.infosecleaders.com/survey 7 Things You Need to Know APPSEC/INFOSEC Employment]'''&amp;lt;br&amp;gt;&lt;br /&gt;
''[http://www.linkedin.com/pub/0/29/685 Lee Kushner]''&amp;lt;br&amp;gt;&lt;br /&gt;
[http://video.google.com/videoplay?docid=5330096815878108179&amp;amp;hl=en VIDEO] / SLIDES&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
'''Industry Analysis with Forrester Research'''&amp;lt;br&amp;gt;&lt;br /&gt;
''[http://www.forrester.com/rb/analyst/chenxi_wang Chenxi Wang]''&amp;lt;br&amp;gt;&lt;br /&gt;
[http://video.google.com/videoplay?docid=1391450504589087806&amp;amp;hl=en VIDEO] / SLIDES&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 11:00-11:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
'''Software Assurance Maturity Model (SAMM)'''&amp;lt;br&amp;gt;&lt;br /&gt;
''Pravir Chandra''&amp;lt;br&amp;gt;&lt;br /&gt;
[http://video.google.com/videoplay?docid=-7453282550277559385&amp;amp;hl=en VIDEO] / [https://www.owasp.org/images/2/2e/OWASP_CLASP_SAMM.ppt SLIDES]&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;CENTER&amp;quot; | &lt;br /&gt;
'''Security in Agile Development'''&amp;lt;br&amp;gt;&lt;br /&gt;
''[[User:Wichers | Dave Wichers]]''&amp;lt;br&amp;gt;&lt;br /&gt;
[http://video.google.com/videoplay?docid=-8287209466278543377&amp;amp;hl=en VIDEO] / [http://www.owasp.org/images/a/a3/AppSecNYC08-Agile_and_Secure.ppt SLIDES]&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
'''Secure Software Impact'''&amp;lt;br&amp;gt;&lt;br /&gt;
''[http://ouncelabs.com/company/team.asp Jack Danahy]''&amp;lt;br&amp;gt;&lt;br /&gt;
[http://video.google.com/videoplay?docid=-3851913297265683210&amp;amp;hl=en VIDEO] / SLIDES&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:00-12:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
'''Next Generation Cross Site Scripting Worms '''&amp;lt;br&amp;gt;&lt;br /&gt;
''[http://i8jesus.com/?page_id=5 Arshan Dabirsiaghi]''&amp;lt;br&amp;gt;&lt;br /&gt;
[http://video.google.com/videoplay?docid=-2782535918275323123&amp;amp;hl=en VIDEO] / SLIDES&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
'''Security of Software-as-a-Service (SaaS)'''&amp;lt;br&amp;gt;&lt;br /&gt;
''[http://www.linkedin.com/pub/6/372/45a James Landis]''&amp;lt;br&amp;gt;&lt;br /&gt;
[http://video.google.com/videoplay?docid=-513622114181563795&amp;amp;hl=en VIDEO] / SLIDES&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
'''[http://reversebenchmarking.com/About.html Open Reverse Benchmarking Project]'''&amp;lt;br&amp;gt;&lt;br /&gt;
''Marce Luck &amp;amp; [http://www.linkedin.com/pub/1/507/616 Tom Stracener]''&amp;lt;br&amp;gt;&lt;br /&gt;
[http://video.google.com/videoplay?docid=4352770935920515328&amp;amp;hl=en VIDEO] / SLIDES&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:00-13:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | [[OWASP_NYC_AppSec_2008_Conference/ctf | Capture the Flag]] Status&lt;br /&gt;
''LUNCH - Provided @ TechExpo''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 13:00-13:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
'''[[NIST SAMATE Static Analysis Tool Exposition (SATE) | NIST and SAMATE Static Analysis Tool Exposition (SATE)]]'''&amp;lt;br&amp;gt;&lt;br /&gt;
''[[OWASP_NYC_AppSec_2008_Conference-vadim-okun | Vadim Okun]]''&amp;lt;br&amp;gt;&lt;br /&gt;
[http://video.google.com/videoplay?docid=-7567012344169452280&amp;amp;hl=en VIDEO] / SLIDES&lt;br /&gt;
| style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
'''[[User_talk:Jian | Lotus Notes/Domino Web Application Security]]'''&amp;lt;br&amp;gt;&lt;br /&gt;
''[[User_talk:Jian | Jian Hui Wang]]''&amp;lt;br&amp;gt;&lt;br /&gt;
[http://video.google.com/videoplay?docid=8645149711234878540&amp;amp;hl=en VIDEO] / SLIDES&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
'''Shootout @ Blackbox Corral'''&amp;lt;br&amp;gt;&lt;br /&gt;
''Larry Suto''&amp;lt;br&amp;gt;&lt;br /&gt;
[http://video.google.com/videoplay?docid=-1565567642122481539&amp;amp;hl=en VIDEO] / SLIDES&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 14:00-14:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
'''Practical Advanced Threat Modeling'''&amp;lt;br&amp;gt;&lt;br /&gt;
''John Steven''&amp;lt;br&amp;gt;&lt;br /&gt;
[http://video.google.com/videoplay?docid=-734106766899160289&amp;amp;hl=en VIDEO] / SLIDES&lt;br /&gt;
| style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
'''[http://www.owasp.org/index.php/Category:OWASP_Orizon_Project The OWASP Orizon Project: towards version 1.0]'''&amp;lt;br&amp;gt;&lt;br /&gt;
''[[User:Thesp0nge | Paolo Perego]]''&amp;lt;br&amp;gt;&lt;br /&gt;
[http://video.google.com/videoplay?docid=-9104434795648450379&amp;amp;hl=en VIDEO] / [http://www.owasp.org/index.php/Image:The_Owasp_Orizon_Project_Towards_version_1.0_v1.0.ppt#file SLIDES]&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
'''[[Building_Usable_Security | Building Usable Security]]'''&amp;lt;br&amp;gt;&lt;br /&gt;
''[[Zed_Abbadi | Zed Abbadi]]''&amp;lt;br&amp;gt;&lt;br /&gt;
[http://video.google.com/videoplay?docid=8782541141810029760&amp;amp;hl=en VIDEO] / SLIDES&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:00-15:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
'''Off-shoring Application Development? Security is Still Your Problem'''&amp;lt;br&amp;gt;&lt;br /&gt;
''Rohyt Belani''&amp;lt;br&amp;gt;&lt;br /&gt;
[http://video.google.com/videoplay?docid=1042293104444687505&amp;amp;hl=en VIDEO] / SLIDES&lt;br /&gt;
| style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
'''[[OWASP_EU_Summit_2008 | OWASP EU Summit Portugal]]'''&amp;lt;br&amp;gt;&lt;br /&gt;
''Dinis Cruz''&amp;lt;br&amp;gt;&lt;br /&gt;
[http://video.google.com/videoplay?docid=-7044581008789784268&amp;amp;hl=en VIDEO] / SLIDES&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
'''A Security Architecture Case Study'''&amp;lt;br&amp;gt;&lt;br /&gt;
''[http://johanpeeters.com Johan Peeters]''&amp;lt;br&amp;gt;&lt;br /&gt;
[http://video.google.com/videoplay?docid=-4553372140069628300&amp;amp;hl=en VIDEO] / SLIDES&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 16:00-16:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
'''Vulnerabilities in application interpreters and runtimes'''&amp;lt;br&amp;gt;&lt;br /&gt;
''Erik Cabetas''&amp;lt;br&amp;gt;&lt;br /&gt;
[http://video.google.com/videoplay?docid=7859413573034669384&amp;amp;hl=en VIDEO] / SLIDES&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
'''Cryptography For Penetration Testers'''&amp;lt;br&amp;gt;&lt;br /&gt;
''Chris Eng''&amp;lt;br&amp;gt;&lt;br /&gt;
[http://video.google.com/videoplay?docid=-5187022592682372937&amp;amp;hl=en VIDEO] / SLIDES&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
'''Memory Corruption and Buffer Overflows'''&amp;lt;br&amp;gt;&lt;br /&gt;
''[http://www.immunitysec.com Dave Aitel]''&amp;lt;br&amp;gt;&lt;br /&gt;
[http://video.google.com/videoplay?docid=-1012125050474412771&amp;amp;hl=en VIDEO] / SLIDES&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 17:00-17:45 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; |  '''Event Wrap-Up / Speaker &amp;amp; CTF Awards and Sponsor Raffles'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;{{#ev:googlevideo|8211027328063203438}}&amp;lt;/center&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
[http://video.google.com/videoplay?docid=8211027328063203438&amp;amp;hl=en VIDEO]&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 18:30-19:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | OWASP Foundation, Chapter Leader Meeting - to collect ideas to make OWASP better!&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;&amp;lt;b&amp;gt; So did you like the content? Lets us know.. [http://www.owasp.org/index.php/Contact Contact Us] &amp;lt;/b&amp;gt;&amp;lt;/center&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== EVENT SPONSORS ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;[https://www.owasp.org/images/b/bc/APPSEC2008Sponsor.pdf Diamond Sponsor] - [http://www.imperva.com http://www.owasp.org/images/d/de/Imperva_2color_RGB.jpg]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;[https://www.owasp.org/images/b/bc/APPSEC2008Sponsor.pdf Platinum Sponsor]  - [http://www.cenzic.com https://www.owasp.org/images/b/bf/CenzicLogo_RGB.gif]  - [http://www.whitehatsec.com http://www.owasp.org/images/archive/4/4d/20080703021901%21Whitehat.gif] -  [http://www-935.ibm.com/services/us/gbs/app/html/gbs_applicationservices.html?cm_re=masthead-_-business-_-apps-allappserv https://www.owasp.org/images/4/47/Ibm.jpg] &amp;lt;/center&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.owasp.org/images/b/bc/APPSEC2008Sponsor.pdf Gold, Silver, Expo &amp;amp; Other Sponsors] - [http://www.isc2.org http://www.owasp.org/images/4/45/Isc2logo.gif] - [http://www.f5.com http://www.owasp.org/images/7/7e/50px-F5_50px.jpg] - [http://www.aspectsecurity.com http://www.owasp.org/images/d/d1/Aspect_logo.gif] - [http://www.qualys.com https://www.owasp.org/images/a/ae/Qualys.gif] - [http://www.ouncelabs.com https://www.owasp.org/images/6/6e/OunceLabs_logo.jpg] - [http://www.fortify.com https://www.owasp.org/images/a/ac/Fortify.jpg] - [http://www.cigital.com/ https://www.owasp.org/images/b/be/Cigital_OWASP.GIF] - [http://www.acunetix.com https://www.owasp.org/images/e/eb/Acuneti.gif] - [http://www.denimgroup.com http://www.owasp.org/images/5/56/Denimgroup.jpg] - [http://www.accessitgroup.com https://www.owasp.org/images/6/6d/Accessit.JPG] - &lt;br /&gt;
[http://www.fishnetsecurity.com https://www.owasp.org/images/4/4a/Fishnet_security.png] - [http://www.airtightnetworks.net https://www.owasp.org/images/8/8b/Airtight.gif] - &lt;br /&gt;
[http://www.artofdefence.com https://www.owasp.org/images/d/dc/AOD_Logo.gif] - &lt;br /&gt;
[http://www.securityuniversity.net https://www.owasp.org/images/0/0d/Security_university.jpg] - &lt;br /&gt;
[http://www.breach.com https://www.owasp.org/images/9/9c/Breach_logo.gif] - [http://www.armorize.com https://www.owasp.org/images/c/ce/Armorize_Logo.png] -[http://www.barracudanetworks.com/ https://www.owasp.org/images/a/a2/Barracuda_Color_Logo.jpg] - [http://www.symantec.com https://www.owasp.org/images/2/26/New_Symantec_Logo.jpg] - [http://www.prevalent.net https://www.owasp.org/images/4/47/Prev_Logo_with_Tag_Line.jpg] - [http://www.mclabs.com https://www.owasp.org/images/9/91/MicroTek.jpg] - [http://www.protiviti.com https://www.owasp.org/images/c/cf/Protiviti.jpg]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;[https://www.owasp.org/images/b/bc/APPSEC2008Sponsor.pdf Sponsorship Opportunities]&amp;lt;/center&amp;gt;&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== CPE Credits ==&lt;br /&gt;
&lt;br /&gt;
Much of the content is eligible for CPE credits.  Please check with your institution regarding specific requirements.&lt;br /&gt;
&lt;br /&gt;
'''The CISM cpe policy (www.isaca.org/cismcpepolicy) states''': &lt;br /&gt;
&lt;br /&gt;
One continuing professional education hour is earned for each fifty minutes of active participation (excluding lunches and breaks) in a professional educational activity. Continuing professional education hours are only earned in full-hour increments and rounding must be down. For example, a CISA who attends an eight-hour presentation (480 minutes) with 90 minutes of breaks will earn seven (7) continuing professional education hours.&lt;br /&gt;
&lt;br /&gt;
Activities that qualify for CPE must be directly applicable to the management, design or assessment of an enterprise's information security as per the CISM job practice&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''Earn (ISC)2 CPE Credits at 2008 OWASP USA, NYC'''&lt;br /&gt;
&lt;br /&gt;
Attendance at the 2008 OWASP NYC Training Courses or Conferences will earn you Continuing Professional Education (CPE) credits as follows:&lt;br /&gt;
Training Courses: September 22-23, 2008&lt;br /&gt;
•	16 CPE units for 2 days of training (Monday - Tuesday) &lt;br /&gt;
•	8 CPE units for 1 day of training (Monday or Tuesday Only) &lt;br /&gt;
Conferences: September 24-25, 2008&lt;br /&gt;
Earn 1 CPE per hour of conference attendance&lt;br /&gt;
&lt;br /&gt;
== [http://www.owasp.org/index.php/Category:OWASP_AppSec_Conference_Training OWASP NYC AppSec 2008 Training Courses - September 22nd and 23rd, 2008 ] ==&lt;br /&gt;
&lt;br /&gt;
All classes begin at 9AM and end at 5:30PM&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T1. Defensive Programming - 2-Days - $1350&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; | This class will teach you how to program defensively. A must for developers, managers, testers and security professionals. Learn the latest techniques to build attack resistant code, protect from current and future vulnerabilities and how to secure an application from both implementation bugs and design flaws. [[:Category:OWASP_AppSec_Conference_Training#T1._Defensive_Programming_-_2-Day_Course_-_Sep_22-23.2C_2008 | Learn More Here]]&lt;br /&gt;
&lt;br /&gt;
Instructor: Jason Rouse, Technical Manager, [http://www.cigital.com/training/series http://www.owasp.org/images/b/be/Cigital_OWASP.GIF]''' &lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T2. Secure Coding for Java EE - 2-Days - $1350&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; | This course is similar to Aspect's Building and Testing Secure Web Applications except it includes a significant amount of Java focused content, including:&lt;br /&gt;
# Java EE security overview,&lt;br /&gt;
# All coding examples and recommendations are specifically focused on Java and Java servers, and&lt;br /&gt;
# 3 additional hands on coding labs where the students find and then fix security vulnerabilities in a Java EE application developed for the class.&lt;br /&gt;
&lt;br /&gt;
[[:Category:OWASP_AppSec_Conference_Training#T2._Secure_Coding_for_Java_EE-_2-Day_Course_-_Sep_22-23.2C_2008 | Learn More Here]]&lt;br /&gt;
&lt;br /&gt;
Instructor: Dave Wichers: [http://www.aspectsecurity.com http://www.owasp.org/images/d/d1/Aspect_logo.gif]&lt;br /&gt;
'''&lt;br /&gt;
 |-&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T3. Web Services and XML Security - 2-Days - $1350&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; | The movement towards Web Services and Service Oriented architecture (SOA) paradigms requires new security paradigms to deal with new risks posed by these architectures. This session takes a pragmatic approach towards identifying Web Services security risks and selecting and applying countermeasures to the application, code, web servers, databases, application, and identity servers and related software. [[:Category:OWASP_AppSec_Conference_Training#T3._Web_Services_and_XML_Security_-_2-Day_Course_-_Sep_22-23.2C_2008 | Learn More Here]]&lt;br /&gt;
&lt;br /&gt;
Instructor: Gunnar Peterson''' [http://www.arctecgroup.net https://www.owasp.org/images/b/bf/Arctec.jpg]&lt;br /&gt;
 |-&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T4. Advanced Web Application Security Testing - 2-Days - $1350&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; | Course Overview While all developers need to know the basics of web application security testing, application security specialists will want to know all the advanced techniques for finding and diagnosing security problems in applications. Aspect’s Advanced Web Application Security Testing training is based on a decade of work verifying the security of critical applications. The course is taught by an experienced application security practitioner in an interactive manner. [[:Category:OWASP_AppSec_Conference_Training#T4._Advanced_Web_Application_Security_Testing_-_2-Day_Course_-_Sep_22-23.2C_2008 | Learn More Here]]&lt;br /&gt;
&lt;br /&gt;
Instructor: Eric Sheridan: [http://www.aspectsecurity.com http://www.owasp.org/images/d/d1/Aspect_logo.gif]'''&lt;br /&gt;
 |-&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T5. Leading the Development of Secure Applications 1-Day - Sept 22nd- $675&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; |  In this one-day management session you’ll get the answers to the ten key questions that most CIOs and development managers face when trying to improve security in the development process.  The course provides proven techniques and valuable lessons learned that can be applied to projects at any phase of their application’s lifecycle. [[:Category:OWASP_AppSec_Conference_Training#T5._Leading_the_Development_of_Secure_Applications_-_1-Day_Course_-_Sep_22.2C_2008 | Learn More Here]]&lt;br /&gt;
Instructor: John Pavone: [http://www.aspectsecurity.com http://www.owasp.org/images/d/d1/Aspect_logo.gif]'''&lt;br /&gt;
|-&lt;br /&gt;
 {| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T6. Building Secure Rich Internet Applications 1-Day - Sept 23rd- $675&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; |  Rich Internet applications using technologies like Ajax, Flash, ActiveX, and Java Applets require special attention to secure. This one day training addresses the special issues that arise in this type of application development.  [[:Category:OWASP_AppSec_Conference_Training#T6._Building_Secure_Rich_Internet_Applications_-_1-Day_Course_-_Sep_23.2C_2008 | Learn More Here]]&lt;br /&gt;
Instructor: Arshan Dabirsiaghi: [http://www.aspectsecurity.com http://www.owasp.org/images/d/d1/Aspect_logo.gif]'''&lt;br /&gt;
|-&lt;br /&gt;
 {| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T8. Secure Coding for .NET - 2-Days - $1350&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; | This course is similar to Aspect's Building and Testing Secure Web Applications except it includes a significant amount of .NET focused content, including:&lt;br /&gt;
# .NET security overview,&lt;br /&gt;
# All coding examples and recommendations are specifically focused on C#.NET and/or VB.NET and IIS servers, and&lt;br /&gt;
# 3 additional hands on coding labs where the students find and then fix security vulnerabilities in a .NET application developed for the class. Both C# and VB.NET versions of the hands on coding labs are available.&lt;br /&gt;
&lt;br /&gt;
[[:Category:OWASP_AppSec_Conference_Training#T8._Writing_Secure_Code_ASP.NET_-_Sep_22-23.2C_2008 | Learn More Here]]&lt;br /&gt;
&lt;br /&gt;
Instructor: Jerry Hoff: [http://www.aspectsecurity.com http://www.owasp.org/images/d/d1/Aspect_logo.gif]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h2&amp;gt; HOTELS / TRAVEL &amp;lt;/h2&amp;gt;&lt;br /&gt;
[http://www.parkcentralny.com Park Central Hotel]&lt;br /&gt;
 &lt;br /&gt;
[http://maps.google.com/maps?near=7th+Ave+%26+W+56th+St,+New+York,+NY&amp;amp;geocode=&amp;amp;q=hotels&amp;amp;f=l&amp;amp;sll=40.766339,-73.980539&amp;amp;sspn=0.007654,0.02223&amp;amp;ie=UTF8&amp;amp;ll=40.764681,-73.980668&amp;amp;spn=0.007655,0.02223&amp;amp;z=16 Hotels close to the venue]&lt;br /&gt;
&lt;br /&gt;
What is around APPSEC2008 - [http://www.parkcentralny.com/attractions/attractions.cfm  Area Attractions]&lt;br /&gt;
&lt;br /&gt;
New York City MTA: http://www.mta.nyc.ny.us/nyct/index.html&lt;br /&gt;
&lt;br /&gt;
New York City Subway &amp;amp; walking directions: http://www.hopstop.com/?city=newyork&lt;br /&gt;
&lt;br /&gt;
New York Sights &amp;amp; Sounds - SightsSounds&lt;br /&gt;
&lt;br /&gt;
New York City Travel Guide - http://www.nytoday.com/&lt;br /&gt;
&lt;br /&gt;
New York City Attractions - http://www.nycvisit.com&lt;br /&gt;
&lt;br /&gt;
New York TV Show Tickets - Get free tickets to TV shows! - http://www.nytix.com/&lt;br /&gt;
&lt;br /&gt;
New York City local news: http://www.ny1news.com&lt;/div&gt;</summary>
		<author><name>Adish</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_NYC_AppSec_2008_Conference&amp;diff=52370</id>
		<title>OWASP NYC AppSec 2008 Conference</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_NYC_AppSec_2008_Conference&amp;diff=52370"/>
				<updated>2009-01-29T17:38:13Z</updated>
		
		<summary type="html">&lt;p&gt;Adish: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
== Introduction ==&lt;br /&gt;
This event was a great success, drawing together professionals from all around the world. Please see the agenda below for copies of the presentations and videos of all the talks!!&lt;br /&gt;
&lt;br /&gt;
Conference Description: This vendor agnostic conference has tracks for management, security, audit and development professionals interested in the state of the appsec industry and its trends. Presented by some of the brightest people in the industry, this event is a must attend for anyone looking to improve their information security posture and threat awareness. With assistance from: [http://www.webappsec.org WASC], [http://www.nym-infragard.us NYM InfraGard], [http://aitglobal.com AITGlobal], [http://nyphp.org/index.php NYC PHP], [http://www.nycbug.org NYCBUG], [http://www.isacany.net NYC ISACA], [http://www.nymissa.org NYC ISSA] and our event co-sponsors you are invited to (2) days of hardcore hands-on training and (2) full days of Seminars and Technology Pavilion from the world's best application security technology minds, all held in the New York City, Midtown.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;h2&amp;gt;SEE BELOW FOR VIDEO AND SLIDES - [http://picasaweb.google.com/jinxpuppy CLICK HERE FOR PHOTOS]&amp;lt;/h2&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt; [http://www.linkedin.com/e/gis/36874 Join the OWASP Linked'In Group] &lt;br /&gt;
- - -&lt;br /&gt;
[https://www.owasp.org/index.php/Category:OWASP_Video For Previous OWASP Conference Video CLICK HERE]&amp;lt;/center&amp;gt;&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== 2008 OWASP USA, NYC Conference Schedule – FULL VIDEO 50+ Speakers see below ==&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h2&amp;gt;Day 1 – Sept 24th, 2008 &amp;lt;/h2&amp;gt; &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | || style=&amp;quot;width:30%; background:#BC857A&amp;quot; | Track 1: BALLROOM&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; | Track 2: SKYLINE&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#99FF99&amp;quot; | Track 3: TIMESQUARE&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 07:30-08:50 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | Doors Open for Attendee/Speaker Registration &lt;br /&gt;
''avoid lines come early get your caffeine fix and use free wifi''&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 09:00-09:45 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | '''OWASP Version 3.0 who we are, how we got here and where we are going?'''&amp;lt;br&amp;gt;&lt;br /&gt;
''OWASP Foundation: [[Contact | Jeff Williams]], [[Contact | Dinis Cruz]], [[Contact | Dave Wichers]], [[Contact | Tom Brennan]], [[Contact | Sebastien Deleersnyder]]'' &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;{{#ev:googlevideo|-228977859802026041}}&amp;lt;/center&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
[http://www.owasp.org/images/b/b7/AppSecNYC08-Delivering_AppSec_Info.ppt Dave Wicher's Slides] / Jeff William's Slides / Dinis Cruz's Slides&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:00-10:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[AppSecEU08_Trends_in_Web_Hacking_Incidents:_What%27s_hot_for_2008 | Analysis of the Web Hacking Incidents Database (WHID)]]''' &amp;lt;br&amp;gt;&lt;br /&gt;
''[http://blog.shezaf.com Ofer Shezaf]''&amp;lt;br&amp;gt;&lt;br /&gt;
[http://video.google.com/videoplay?docid=1130960689238372157&amp;amp;hl=en VIDEO] / SLIDES&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
'''[http://www.webappsecroadmap.com Web Application Security Road Map]'''&amp;lt;br&amp;gt;&lt;br /&gt;
''[http://joesecurity.blogspot.com Joe White]''&amp;lt;br&amp;gt;&lt;br /&gt;
[http://video.google.com/videoplay?docid=-237406228011458703&amp;amp;hl=en VIDEO] / [https://sites.google.com/a/webappsecroadmap.com/main/announcements/owasp-appsec-2008-presentation-has-been-uploaded SLIDES]&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;center&amp;quot; |&lt;br /&gt;
'''[https://buildsecurityin.us-cert.gov/swa/acqwg.html DHS Software Assurance Initiatives]'''&amp;lt;br&amp;gt;&lt;br /&gt;
''[http://www.linkedin.com/pub/0/ab/3b7 Stan Wisseman] &amp;amp; [http://www.linkedin.com/pub/1/439/923 Joe Jarzombek]''&amp;lt;br&amp;gt;&lt;br /&gt;
[http://video.google.com/videoplay?docid=-6505795148329572484&amp;amp;hl=en VIDEO] / SLIDES&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 11:00-11:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
'''Http Bot Research'''&amp;lt;br&amp;gt;&lt;br /&gt;
''[http://www.shadowserver.org/wiki/pmwiki.php?n=Shadowserver.Mission Andre M. DiMino - ShadowServer Foundation]''&amp;lt;br&amp;gt;&lt;br /&gt;
[http://video.google.com/videoplay?docid=1400503643786264015&amp;amp;hl=en VIDEO] / SLIDES&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
'''OWASP &amp;quot;Google Hacking&amp;quot; Project'''&amp;lt;br&amp;gt;&lt;br /&gt;
''[http://www.linkedin.com/in/ChristianHeinrich Christian Heinrich]''&amp;lt;br&amp;gt;&lt;br /&gt;
[http://video.google.com/videoplay?docid=5419982525671711780&amp;amp;hl=en VIDEO] / SLIDES&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
'''MalSpam Research'''&amp;lt;br&amp;gt;&lt;br /&gt;
'' [http://www.knujon.com/bios.html Garth Bruen]''&amp;lt;br&amp;gt;&lt;br /&gt;
[http://video.google.com/videoplay?docid=-8813268235790993111&amp;amp;hl=en VIDEO] / SLIDES&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:00-13:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | [[OWASP_NYC_AppSec_2008_Conference/ctf | Capture the Flag]] Sign-Up&lt;br /&gt;
''LUNCH - Provided by event sponsors @ TechExpo''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:00-12:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
'''Get Rich or Die Trying - Making Money on The Web, The Black Hat Way'''&amp;lt;br&amp;gt;&lt;br /&gt;
''[http://www.linkedin.com/in/treyford Trey Ford], [http://www.linkedin.com/in/tombrennan Tom Brennan], [http://www.linkedin.com/pub/0/205/77a Jeremiah Grossman]''&amp;lt;br&amp;gt;&lt;br /&gt;
[http://video.google.com/videoplay?docid=-7209323310151363553&amp;amp;hl=en VIDEO] / SLIDES&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
'''Framework-level Threat Analysis: Adding Science to the Art of Source-code review'''&amp;lt;br&amp;gt;&lt;br /&gt;
''[[OWASP_NYC_AppSec_2008_Conference-rohit-sethi | Rohit Sethi]] &amp;amp; [[OWASP_NYC_AppSec_2008_Conference-sahba-kazerooni | Sahba Kazerooni]]''&amp;lt;br&amp;gt;&lt;br /&gt;
[http://video.google.com/videoplay?docid=8935251380629216945&amp;amp;hl=en VIDEO] / SLIDES&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
'''Automated Web-based Malware Behavioral Analysis'''&amp;lt;br&amp;gt;&lt;br /&gt;
''[http://www.linkedin.com/pub/3/359/b1a Tyler Hudak]''&amp;lt;br&amp;gt;&lt;br /&gt;
[http://video.google.com/videoplay?docid=4204600308807371535&amp;amp;hl=en VIDEO] / SLIDES&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 13:00-13:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
'''[http://blogs.adobe.com/psirt/2008/09/thanks_to_jeremiah_grossman_an.html New 0-Day Browser Exploits: Clickjacking - yea, this is bad...]'''&amp;lt;br&amp;gt;&lt;br /&gt;
''[http://jeremiahgrossman.blogspot.com Jeremiah Grossman] &amp;amp; [http://ha.ckers.org/blog/about Robert &amp;quot;RSnake&amp;quot; Hansen]''&amp;lt;br&amp;gt;&lt;br /&gt;
[http://video.google.com/videoplay?docid=-5747622209791380934&amp;amp;hl=en VIDEO] / SLIDES&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
'''Web Intrusion Detection with ModSecurity'''&amp;lt;br&amp;gt;&lt;br /&gt;
''[http://www.breach.com/company/executive-team/ Ivan Ristic]''&amp;lt;br&amp;gt;&lt;br /&gt;
[http://video.google.com/videoplay?docid=-7391448618249578180&amp;amp;hl=en VIDEO] / [[Media:OWASP_NYC_2008-Web_Intrusion_Detection_with_ModSecurity.pdf|SLIDES]]&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
'''Using Layer 8 and OWASP to Secure Web Applications'''&amp;lt;br&amp;gt;&lt;br /&gt;
''[http://www.linkedin.com/in/davidstern2000 David Stern] &amp;amp; [http://www.linkedin.com/in/romangarber Roman Garber]''&amp;lt;br&amp;gt;&lt;br /&gt;
[http://video.google.com/videoplay?docid=-3883297889781954509&amp;amp;hl=en VIDEO] / SLIDES&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 14:00-14:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;center&amp;quot; | '''Application Security Industry Outlook Panel:'''&amp;lt;br&amp;gt;&lt;br /&gt;
''[http://www.linkedin.com/pub/0/497/86a Jim Routh] CISO DTCC, &amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.linkedin.com/pub/0/bb1/68a Sunil Seshadri] CISO NYSE-Euronet, &amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.linkedin.com/in/bernik Joe Bernik] SVP, RBS Americas,&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.linkedin.com/pub/8/878/240 Jennifer Bayuk] Infosec Consultant,&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.linkedin.com/in/philvenables Philip Venables] CISO, Goldman Sachs, &amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.linkedin.com/in/crecalde Carlos Recalde] SVP, Lehman Brothers, &amp;lt;br&amp;gt;&lt;br /&gt;
Moderator: [http://www.linkedin.com/in/mahidontamsetti   Mahi Dontamsetti]''&amp;lt;br&amp;gt;&lt;br /&gt;
[http://video.google.com/videoplay?docid=-7051719323294878516&amp;amp;hl=en VIDEO] / SLIDES&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
'''[http://www.owasp.org/index.php/Security_Assessing_Java_RMI Security Assessing Java RMI] '''&amp;lt;br&amp;gt;&lt;br /&gt;
''[http://www.linkedin.com/in/adamboulton Adam Boulton]''&amp;lt;br&amp;gt;&lt;br /&gt;
[http://video.google.com/videoplay?docid=1673714450539106400&amp;amp;hl=en VIDEO] / SLIDES&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
'''JBroFuzz 0.1 - 1.1: Building a Java Fuzzer for the Web'''&amp;lt;br&amp;gt;&lt;br /&gt;
''[[OWASP_NYC_AppSec_2008_Conference-SPEAKER-Yiannis_Pavlosoglou | Yiannis Pavlosoglou]]''&amp;lt;br&amp;gt;&lt;br /&gt;
[http://video.google.com/videoplay?docid=-1551704659206071145&amp;amp;hl=en VIDEO] / SLIDES&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:00-15:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
'''OWASP Testing Guide - Offensive Assessing Financial Applications'''&amp;lt;br&amp;gt;&lt;br /&gt;
'' [[OWASP_NYC_AppSec_2008_Conference-daniel-cuthbert | Daniel Cuthbert]]''&amp;lt;br&amp;gt;&lt;br /&gt;
[http://video.google.com/videoplay?docid=-3228312539505217121&amp;amp;hl=en VIDEO] / SLIDES&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
'''Flash Parameter Injection (FPI)'''&amp;lt;br&amp;gt;&lt;br /&gt;
''Ayal Yogev &amp;amp; Adi Sharabani''&amp;lt;br&amp;gt;&lt;br /&gt;
[http://video.google.com/videoplay?docid=7818654218575619118&amp;amp;hl=en VIDEO] / [http://blog.watchfire.com/FPI.ppt SLIDES] / [http://blog.watchfire.com/FPI.pdf Paper]&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;center&amp;quot; |&lt;br /&gt;
'''[[OWASP_NYC_AppSec_2008_Conference-SPEAKER-Andres_Riancho | w3af - A Framework to own the web]]'''&amp;lt;br&amp;gt;&lt;br /&gt;
''Andres Riancho''&amp;lt;br&amp;gt;&lt;br /&gt;
[http://video.google.com/videoplay?docid=4354579888802327250&amp;amp;hl=en VIDEO] / VIDEO&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 16:00-16:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
'''OWASP Enterprise Security API [[ESAPI | (ESAPI) Project]]'''&amp;lt;br&amp;gt;&lt;br /&gt;
'' [http://www.aspectsecurity.com/management.htm Jeff Williams]''&amp;lt;br&amp;gt;&lt;br /&gt;
[http://video.google.com/videoplay?docid=-2912157383449643073&amp;amp;hl=en VIDEO] / SLIDES&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
'''Cross-Site Scripting Filter Evasion'''&amp;lt;br&amp;gt;&lt;br /&gt;
''Alexios Fakos''&amp;lt;br&amp;gt;&lt;br /&gt;
[http://video.google.com/videoplay?docid=-6974576754943514571&amp;amp;hl=en VIDEO] / SLIDES&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
'''[[OWASP_NYC_AppSec_2008_Conference-SPEAKER-GunterOllmann | Multidisciplinary Bank Attacks]]'''&amp;lt;br&amp;gt;&lt;br /&gt;
''Gunter Ollmann''&amp;lt;br&amp;gt;&lt;br /&gt;
[http://video.google.com/videoplay?docid=3041861094296331549&amp;amp;hl=en VIDEO] / SLIDES&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 17:00-17:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
'''Open Discussion On Application Security'''&amp;lt;br&amp;gt;&lt;br /&gt;
''Joe Bernik &amp;amp; Steve Antoniewicz''&amp;lt;br&amp;gt;&lt;br /&gt;
[http://video.google.com/videoplay?docid=6718671647859572098&amp;amp;hl=en VIDEO] / SLIDES&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
'''Mastering PCI Section 6.6'''&amp;lt;br&amp;gt;&lt;br /&gt;
''[http://www.linkedin.com/pub/1/228/6a5 Taylor McKinley] and [http://www.linkedin.com/in/jacobwest Jacob West]''&amp;lt;br&amp;gt;&lt;br /&gt;
[http://video.google.com/videoplay?docid=-2544477786674220116&amp;amp;hl=en VIDEO] / SLIDES&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
'''Case Studies: Exploiting application testing tool deficiencies via &amp;quot;out of band&amp;quot; injection'''&amp;lt;br&amp;gt;&lt;br /&gt;
''[http://www.linkedin.com/pub/0/a91/aa2 Vijay Akasapu] &amp;amp; [http://www.linkedin.com/pub/9/279/381 Marshall Heilman]''&amp;lt;br&amp;gt;&lt;br /&gt;
[http://video.google.com/videoplay?docid=7623989457736720764&amp;amp;hl=en VIDEO] / SLIDES&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 18:00-18:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
'''[http://www.owasp.org/index.php/Category:OWASP_Live_CD_Project Spearfishing and the OWASP Live CD]'''&amp;lt;br&amp;gt;&lt;br /&gt;
''[http://www.linkedin.com/in/packetfocus Joshua Perrymon]''&amp;lt;br&amp;gt;&lt;br /&gt;
[http://video.google.com/videoplay?docid=-4419524791864555496&amp;amp;hl=en VIDEO] / SLIDES&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
'''Phundamental Security - Coding Secure w/PHP'''&amp;lt;br&amp;gt;&lt;br /&gt;
''[http://www.linkedin.com/in/zaunere Hans Zaunere]''&amp;lt;br&amp;gt;&lt;br /&gt;
[http://video.google.com/videoplay?docid=3477751371038020741&amp;amp;hl=en VIDEO] / SLIDES&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
'''[[Payment_Card_Data_Security_and_the_new_Enterprise_Java | Payment Card Data Security and the new Enterprise Java]]'''&amp;lt;br&amp;gt;&lt;br /&gt;
''[[OWASP_NYC_AppSec_2008_Conference-SPEAKER-Dr._B._V._Kumar | Dr. B. V. Kumar]] &amp;amp; [[OWASP_NYC_AppSec_2008_Conference-SPEAKER-Abhay_Bhargav | Mr. Abhay Bhargav]]''&amp;lt;br&amp;gt;&lt;br /&gt;
[http://video.google.com/videoplay?docid=4488848043144792234&amp;amp;hl=en VIDEO] / SLIDES&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 19:00-20:00 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
'''OWASP Chapter Leader / Project Leader working session'''&amp;lt;br&amp;gt;&lt;br /&gt;
''OWSAP Board/Chapter Leaders''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
'''(ISC)2 Cocktail Hour'''&amp;lt;br&amp;gt; &lt;br /&gt;
All welcome to attend for a special announcement presented by:&amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.isc2.org/cgi-bin/content.cgi?page=351 W. Hord Tipton, Executive Director of (ISC)2]&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
'''Technology Movie Night'''&amp;lt;br&amp;gt;&lt;br /&gt;
''[http://www.youtube.com/watch?v=LlKDkTbUFhU&amp;amp;feature=related Sneakers], [http://www.youtube.com/watch?v=tAcEzhQ7oqA WarGames], [http://hackersarepeopletoo.com HackersArePeopleToo], [http://www.youtube.com/watch?v=4Be-ZzcXVLw TigerTeam]'' &amp;lt;br&amp;gt;&lt;br /&gt;
from 19:00 - 23:00&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 20:00-23:00+ || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | OWASP Event Party/Reception &amp;lt;br&amp;gt;Event badge required for admission &amp;lt;br&amp;gt;[[OWASP_NYC_AppSec_2008_Conference/ctf | Food, Drinks w/ New &amp;amp; Old Friends - break out the laptop and play capture the flag for fun and prizes.]] &amp;lt;br&amp;gt;''Location: HOTEL BALLROOM''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! colspan=&amp;quot;10&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h2&amp;gt;Day 2 – Sept 25th, 2008 &amp;lt;/h2&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
  | style=&amp;quot;width:10%; background:#99FF99&amp;quot; | 08:00-10:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; |  BREAKFAST - Provided by event sponsors @ TechExpo&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 08:00-08:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
'''Software Development and Management: The Last Security Frontier'''&amp;lt;br&amp;gt;&lt;br /&gt;
''[http://blog.isc2.org/isc2_blog/tipton/index.html W. Hord Tipton], CISSP-ISSEP, CAP, CISA, CNSS and former Chief Information Officer for the U.S. Department of the Interior Executive Director and member of the Board of Directors, (ISC)²''&amp;lt;br&amp;gt;&lt;br /&gt;
[http://video.google.com/videoplay?docid=-4023599059084294937&amp;amp;hl=en VIDEO] / SLIDES&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
'''[[AppSecEU08_Best_Practices_Guide_Web_Application_Firewalls | Best Practices Guide for Web Application Firewalls]]'''&amp;lt;br&amp;gt;&lt;br /&gt;
''Alexander Meisel''&amp;lt;br&amp;gt;&lt;br /&gt;
[http://video.google.com/videoplay?docid=-2977259539412442033&amp;amp;hl=en VIDEO] / SLIDES&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
'''The Good The Bad and The Ugly - Pen Testing VS. Source Code Analysis&lt;br /&gt;
'''&amp;lt;br&amp;gt;&lt;br /&gt;
''[http://www.linkedin.com/in/tommyryan Thomas Ryan]''&amp;lt;br&amp;gt;&lt;br /&gt;
[http://video.google.com/videoplay?docid=-442445248884665643&amp;amp;hl=en VIDEO] / SLIDES&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 09:00-09:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
'''OWASP Web Services Top Ten'''&amp;lt;br&amp;gt;&lt;br /&gt;
''[http://1raindrop.typepad.com Gunnar Peterson]''&amp;lt;br&amp;gt;&lt;br /&gt;
[http://video.google.com/videoplay?docid=5680040858618100893&amp;amp;hl=en VIDEO] / SLIDES&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
'''[http://www.trutv.com/video/tiger-team/tiger-team-101-1-of-4.html  Red And Tiger Team Application Security Projects]'''&amp;lt;br&amp;gt;&lt;br /&gt;
''[http://www.linkedin.com/pub/1/373/994 Chris Nickerson]''&amp;lt;br&amp;gt;&lt;br /&gt;
[http://video.google.com/videoplay?docid=-1638710543904774703&amp;amp;hl=en VIDEO] / SLIDES&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
'''OpenSource Tools'''&amp;lt;br&amp;gt;&lt;br /&gt;
''Prof. Li-Chiou Chen &amp;amp; Chienitng Lin, [http://www.pace.edu/page.cfm?doc_id=16399 Pace Univ]''&amp;lt;br&amp;gt;&lt;br /&gt;
[http://video.google.com/videoplay?docid=6174945058170583976&amp;amp;hl=en VIDEO] / SLIDES&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:00-10:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
'''Building a tool for Security consultants: A story of a customized source code scanner'''&amp;lt;br&amp;gt;&lt;br /&gt;
''Dinis Cruz''&amp;lt;br&amp;gt;&lt;br /&gt;
[http://video.google.com/videoplay?docid=5269154656993046978&amp;amp;hl=en VIDEO] / SLIDES&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
'''&amp;quot;Help Wanted&amp;quot; [http://www.infosecleaders.com/survey 7 Things You Need to Know APPSEC/INFOSEC Employment]'''&amp;lt;br&amp;gt;&lt;br /&gt;
''[http://www.linkedin.com/pub/0/29/685 Lee Kushner]''&amp;lt;br&amp;gt;&lt;br /&gt;
[http://video.google.com/videoplay?docid=5330096815878108179&amp;amp;hl=en VIDEO] / SLIDES&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
'''Industry Analysis with Forrester Research'''&amp;lt;br&amp;gt;&lt;br /&gt;
''[http://www.forrester.com/rb/analyst/chenxi_wang Chenxi Wang]''&amp;lt;br&amp;gt;&lt;br /&gt;
[http://video.google.com/videoplay?docid=1391450504589087806&amp;amp;hl=en VIDEO] / SLIDES&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 11:00-11:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
'''Software Assurance Maturity Model (SAMM)'''&amp;lt;br&amp;gt;&lt;br /&gt;
''Pravir Chandra''&amp;lt;br&amp;gt;&lt;br /&gt;
[http://video.google.com/videoplay?docid=-7453282550277559385&amp;amp;hl=en VIDEO] / [https://www.owasp.org/images/2/2e/OWASP_CLASP_SAMM.ppt SLIDES]&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;CENTER&amp;quot; | &lt;br /&gt;
'''Security in Agile Development'''&amp;lt;br&amp;gt;&lt;br /&gt;
''[[User:Wichers | Dave Wichers]]''&amp;lt;br&amp;gt;&lt;br /&gt;
[http://video.google.com/videoplay?docid=-8287209466278543377&amp;amp;hl=en VIDEO] / [http://www.owasp.org/images/a/a3/AppSecNYC08-Agile_and_Secure.ppt SLIDES]&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
'''Secure Software Impact'''&amp;lt;br&amp;gt;&lt;br /&gt;
''[http://ouncelabs.com/company/team.asp Jack Danahy]''&amp;lt;br&amp;gt;&lt;br /&gt;
[http://video.google.com/videoplay?docid=-3851913297265683210&amp;amp;hl=en VIDEO] / SLIDES&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:00-12:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
'''Next Generation Cross Site Scripting Worms '''&amp;lt;br&amp;gt;&lt;br /&gt;
''[http://i8jesus.com/?page_id=5 Arshan Dabirsiaghi]''&amp;lt;br&amp;gt;&lt;br /&gt;
[http://video.google.com/videoplay?docid=-2782535918275323123&amp;amp;hl=en VIDEO] / SLIDES&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
'''Security of Software-as-a-Service (SaaS)'''&amp;lt;br&amp;gt;&lt;br /&gt;
''[http://www.linkedin.com/pub/6/372/45a James Landis]''&amp;lt;br&amp;gt;&lt;br /&gt;
[http://video.google.com/videoplay?docid=-513622114181563795&amp;amp;hl=en VIDEO] / SLIDES&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
'''[http://reversebenchmarking.com/About.html Open Reverse Benchmarking Project]'''&amp;lt;br&amp;gt;&lt;br /&gt;
''Marce Luck &amp;amp; [http://www.linkedin.com/pub/1/507/616 Tom Stracener]''&amp;lt;br&amp;gt;&lt;br /&gt;
[http://video.google.com/videoplay?docid=4352770935920515328&amp;amp;hl=en VIDEO] / SLIDES&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:00-13:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | [[OWASP_NYC_AppSec_2008_Conference/ctf | Capture the Flag]] Status&lt;br /&gt;
''LUNCH - Provided @ TechExpo''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 13:00-13:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
'''[[NIST SAMATE Static Analysis Tool Exposition (SATE) | NIST and SAMATE Static Analysis Tool Exposition (SATE)]]'''&amp;lt;br&amp;gt;&lt;br /&gt;
''[[OWASP_NYC_AppSec_2008_Conference-vadim-okun | Vadim Okun]]''&amp;lt;br&amp;gt;&lt;br /&gt;
[http://video.google.com/videoplay?docid=-7567012344169452280&amp;amp;hl=en VIDEO] / SLIDES&lt;br /&gt;
| style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
'''[[User_talk:Jian | Lotus Notes/Domino Web Application Security]]'''&amp;lt;br&amp;gt;&lt;br /&gt;
''[[User_talk:Jian | Jian Hui Wang]]''&amp;lt;br&amp;gt;&lt;br /&gt;
[http://video.google.com/videoplay?docid=8645149711234878540&amp;amp;hl=en VIDEO] / SLIDES&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
'''Shootout @ Blackbox Corral'''&amp;lt;br&amp;gt;&lt;br /&gt;
''Larry Suto''&amp;lt;br&amp;gt;&lt;br /&gt;
[http://video.google.com/videoplay?docid=-1565567642122481539&amp;amp;hl=en VIDEO] / SLIDES&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 14:00-14:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
'''Practical Advanced Threat Modeling'''&amp;lt;br&amp;gt;&lt;br /&gt;
''John Steven''&amp;lt;br&amp;gt;&lt;br /&gt;
[http://video.google.com/videoplay?docid=-734106766899160289&amp;amp;hl=en VIDEO] / SLIDES&lt;br /&gt;
| style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
'''[http://www.owasp.org/index.php/Category:OWASP_Orizon_Project The OWASP Orizon Project: towards version 1.0]'''&amp;lt;br&amp;gt;&lt;br /&gt;
''[[User:Thesp0nge | Paolo Perego]]''&amp;lt;br&amp;gt;&lt;br /&gt;
[http://video.google.com/videoplay?docid=-9104434795648450379&amp;amp;hl=en VIDEO] / [http://www.owasp.org/index.php/Image:The_Owasp_Orizon_Project_Towards_version_1.0_v1.0.ppt#file SLIDES]&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
'''[[Building_Usable_Security | Building Usable Security]]'''&amp;lt;br&amp;gt;&lt;br /&gt;
''[[Zed_Abbadi | Zed Abbadi]]''&amp;lt;br&amp;gt;&lt;br /&gt;
[http://video.google.com/videoplay?docid=8782541141810029760&amp;amp;hl=en VIDEO] / SLIDES&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:00-15:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
'''Off-shoring Application Development? Security is Still Your Problem'''&amp;lt;br&amp;gt;&lt;br /&gt;
''Rohyt Belani''&amp;lt;br&amp;gt;&lt;br /&gt;
[http://video.google.com/videoplay?docid=1042293104444687505&amp;amp;hl=en VIDEO] / SLIDES&lt;br /&gt;
| style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
'''[[OWASP_EU_Summit_2008 | OWASP EU Summit Portugal]]'''&amp;lt;br&amp;gt;&lt;br /&gt;
''Dinis Cruz''&amp;lt;br&amp;gt;&lt;br /&gt;
[http://video.google.com/videoplay?docid=-7044581008789784268&amp;amp;hl=en VIDEO] / SLIDES&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
'''A Security Architecture Case Study'''&amp;lt;br&amp;gt;&lt;br /&gt;
''[http://johanpeeters.com Johan Peeters]''&amp;lt;br&amp;gt;&lt;br /&gt;
[http://video.google.com/videoplay?docid=-4553372140069628300&amp;amp;hl=en VIDEO] / SLIDES&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 16:00-16:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
'''Vulnerabilities in application interpreters and runtimes'''&amp;lt;br&amp;gt;&lt;br /&gt;
''Erik Cabetas''&amp;lt;br&amp;gt;&lt;br /&gt;
[http://video.google.com/videoplay?docid=7859413573034669384&amp;amp;hl=en VIDEO] / SLIDES&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
'''Cryptography For Penetration Testers'''&amp;lt;br&amp;gt;&lt;br /&gt;
''Chris Eng''&amp;lt;br&amp;gt;&lt;br /&gt;
[http://video.google.com/videoplay?docid=-5187022592682372937&amp;amp;hl=en VIDEO] / SLIDES&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
'''Memory Corruption and Buffer Overflows'''&amp;lt;br&amp;gt;&lt;br /&gt;
''[http://www.immunitysec.com Dave Aitel]''&amp;lt;br&amp;gt;&lt;br /&gt;
[http://video.google.com/videoplay?docid=-1012125050474412771&amp;amp;hl=en VIDEO] / SLIDES&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 17:00-17:45 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; |  '''Event Wrap-Up / Speaker &amp;amp; CTF Awards and Sponsor Raffles'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;{{#ev:googlevideo|8211027328063203438}}&amp;lt;/center&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
[http://video.google.com/videoplay?docid=8211027328063203438&amp;amp;hl=en VIDEO]&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 18:30-19:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | OWASP Foundation, Chapter Leader Meeting - to collect ideas to make OWASP better!&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;&amp;lt;b&amp;gt; So did you like the content? Lets us know.. [http://www.owasp.org/index.php/Contact Contact Us] &amp;lt;/b&amp;gt;&amp;lt;/center&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== EVENT SPONSORS ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;[https://www.owasp.org/images/b/bc/APPSEC2008Sponsor.pdf Diamond Sponsor] - [http://www.imperva.com http://www.owasp.org/images/d/de/Imperva_2color_RGB.jpg]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;[https://www.owasp.org/images/b/bc/APPSEC2008Sponsor.pdf Platinum Sponsor]  - [http://www.cenzic.com https://www.owasp.org/images/b/bf/CenzicLogo_RGB.gif]  - [http://www.whitehatsec.com http://www.owasp.org/images/archive/4/4d/20080703021901%21Whitehat.gif] -  [http://www-935.ibm.com/services/us/gbs/app/html/gbs_applicationservices.html?cm_re=masthead-_-business-_-apps-allappserv https://www.owasp.org/images/4/47/Ibm.jpg] &amp;lt;/center&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.owasp.org/images/b/bc/APPSEC2008Sponsor.pdf Gold, Silver, Expo &amp;amp; Other Sponsors] - [http://www.isc2.org http://www.owasp.org/images/4/45/Isc2logo.gif] - [http://www.f5.com http://www.owasp.org/images/7/7e/50px-F5_50px.jpg] - [http://www.aspectsecurity.com http://www.owasp.org/images/d/d1/Aspect_logo.gif] - [http://www.qualys.com https://www.owasp.org/images/a/ae/Qualys.gif] - [http://www.ouncelabs.com https://www.owasp.org/images/6/6e/OunceLabs_logo.jpg] - [http://www.fortify.com https://www.owasp.org/images/a/ac/Fortify.jpg] - [http://www.cigital.com/ https://www.owasp.org/images/b/be/Cigital_OWASP.GIF] - [http://www.acunetix.com https://www.owasp.org/images/e/eb/Acuneti.gif] - [http://www.denimgroup.com http://www.owasp.org/images/5/56/Denimgroup.jpg] - [http://www.accessitgroup.com https://www.owasp.org/images/6/6d/Accessit.JPG] - &lt;br /&gt;
[http://www.fishnetsecurity.com https://www.owasp.org/images/4/4a/Fishnet_security.png] - [http://www.airtightnetworks.net https://www.owasp.org/images/8/8b/Airtight.gif] - &lt;br /&gt;
[http://www.artofdefence.com https://www.owasp.org/images/d/dc/AOD_Logo.gif] - &lt;br /&gt;
[http://www.securityuniversity.net https://www.owasp.org/images/0/0d/Security_university.jpg] - &lt;br /&gt;
[http://www.breach.com https://www.owasp.org/images/9/9c/Breach_logo.gif] - [http://www.armorize.com https://www.owasp.org/images/c/ce/Armorize_Logo.png] -[http://www.barracudanetworks.com/ https://www.owasp.org/images/a/a2/Barracuda_Color_Logo.jpg] - [http://www.symantec.com https://www.owasp.org/images/2/26/New_Symantec_Logo.jpg] - [http://www.prevalent.net https://www.owasp.org/images/4/47/Prev_Logo_with_Tag_Line.jpg] - [http://www.mclabs.com https://www.owasp.org/images/9/91/MicroTek.jpg] - [http://www.protiviti.com https://www.owasp.org/images/c/cf/Protiviti.jpg]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;[https://www.owasp.org/images/b/bc/APPSEC2008Sponsor.pdf Sponsorship Opportunities]&amp;lt;/center&amp;gt;&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== CPE Credits ==&lt;br /&gt;
&lt;br /&gt;
Much of the content is eligible for CPE credits.  Please check with your institution regarding specific requirements.&lt;br /&gt;
&lt;br /&gt;
'''The CISM cpe policy (www.isaca.org/cismcpepolicy) states''': &lt;br /&gt;
&lt;br /&gt;
One continuing professional education hour is earned for each fifty minutes of active participation (excluding lunches and breaks) in a professional educational activity. Continuing professional education hours are only earned in full-hour increments and rounding must be down. For example, a CISA who attends an eight-hour presentation (480 minutes) with 90 minutes of breaks will earn seven (7) continuing professional education hours.&lt;br /&gt;
&lt;br /&gt;
Activities that qualify for CPE must be directly applicable to the management, design or assessment of an enterprise's information security as per the CISM job practice&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''Earn (ISC)2 CPE Credits at 2008 OWASP USA, NYC'''&lt;br /&gt;
&lt;br /&gt;
Attendance at the 2008 OWASP NYC Training Courses or Conferences will earn you Continuing Professional Education (CPE) credits as follows:&lt;br /&gt;
Training Courses: September 22-23, 2008&lt;br /&gt;
•	16 CPE units for 2 days of training (Monday - Tuesday) &lt;br /&gt;
•	8 CPE units for 1 day of training (Monday or Tuesday Only) &lt;br /&gt;
Conferences: September 24-25, 2008&lt;br /&gt;
Earn 1 CPE per hour of conference attendance&lt;br /&gt;
&lt;br /&gt;
== [http://www.owasp.org/index.php/Category:OWASP_AppSec_Conference_Training OWASP NYC AppSec 2008 Training Courses - September 22nd and 23rd, 2008 ] ==&lt;br /&gt;
&lt;br /&gt;
All classes begin at 9AM and end at 5:30PM&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T1. Defensive Programming - 2-Days - $1350&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; | This class will teach you how to program defensively. A must for developers, managers, testers and security professionals. Learn the latest techniques to build attack resistant code, protect from current and future vulnerabilities and how to secure an application from both implementation bugs and design flaws. [[:Category:OWASP_AppSec_Conference_Training#T1._Defensive_Programming_-_2-Day_Course_-_Sep_22-23.2C_2008 | Learn More Here]]&lt;br /&gt;
&lt;br /&gt;
Instructor: Jason Rouse, Technical Manager, [http://www.cigital.com/training/series http://www.owasp.org/images/b/be/Cigital_OWASP.GIF]''' &lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T2. Secure Coding for Java EE - 2-Days - $1350&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; | This course is similar to Aspect's Building and Testing Secure Web Applications except it includes a significant amount of Java focused content, including:&lt;br /&gt;
# Java EE security overview,&lt;br /&gt;
# All coding examples and recommendations are specifically focused on Java and Java servers, and&lt;br /&gt;
# 3 additional hands on coding labs where the students find and then fix security vulnerabilities in a Java EE application developed for the class.&lt;br /&gt;
&lt;br /&gt;
[[:Category:OWASP_AppSec_Conference_Training#T2._Secure_Coding_for_Java_EE-_2-Day_Course_-_Sep_22-23.2C_2008 | Learn More Here]]&lt;br /&gt;
&lt;br /&gt;
Instructor: Dave Wichers: [http://www.aspectsecurity.com http://www.owasp.org/images/d/d1/Aspect_logo.gif]&lt;br /&gt;
'''&lt;br /&gt;
 |-&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T3. Web Services and XML Security - 2-Days - $1350&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; | The movement towards Web Services and Service Oriented architecture (SOA) paradigms requires new security paradigms to deal with new risks posed by these architectures. This session takes a pragmatic approach towards identifying Web Services security risks and selecting and applying countermeasures to the application, code, web servers, databases, application, and identity servers and related software. [[:Category:OWASP_AppSec_Conference_Training#T3._Web_Services_and_XML_Security_-_2-Day_Course_-_Sep_22-23.2C_2008 | Learn More Here]]&lt;br /&gt;
&lt;br /&gt;
Instructor: Gunnar Peterson''' [http://www.arctecgroup.net https://www.owasp.org/images/b/bf/Arctec.jpg]&lt;br /&gt;
 |-&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T4. Advanced Web Application Security Testing - 2-Days - $1350&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; | Course Overview While all developers need to know the basics of web application security testing, application security specialists will want to know all the advanced techniques for finding and diagnosing security problems in applications. Aspect’s Advanced Web Application Security Testing training is based on a decade of work verifying the security of critical applications. The course is taught by an experienced application security practitioner in an interactive manner. [[:Category:OWASP_AppSec_Conference_Training#T4._Advanced_Web_Application_Security_Testing_-_2-Day_Course_-_Sep_22-23.2C_2008 | Learn More Here]]&lt;br /&gt;
&lt;br /&gt;
Instructor: Eric Sheridan: [http://www.aspectsecurity.com http://www.owasp.org/images/d/d1/Aspect_logo.gif]'''&lt;br /&gt;
 |-&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T5. Leading the Development of Secure Applications 1-Day - Sept 22nd- $675&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; |  In this one-day management session you’ll get the answers to the ten key questions that most CIOs and development managers face when trying to improve security in the development process.  The course provides proven techniques and valuable lessons learned that can be applied to projects at any phase of their application’s lifecycle. [[:Category:OWASP_AppSec_Conference_Training#T5._Leading_the_Development_of_Secure_Applications_-_1-Day_Course_-_Sep_22.2C_2008 | Learn More Here]]&lt;br /&gt;
Instructor: John Pavone: [http://www.aspectsecurity.com http://www.owasp.org/images/d/d1/Aspect_logo.gif]'''&lt;br /&gt;
|-&lt;br /&gt;
 {| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T6. Building Secure Rich Internet Applications 1-Day - Sept 23rd- $675&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; |  Rich Internet applications using technologies like Ajax, Flash, ActiveX, and Java Applets require special attention to secure. This one day training addresses the special issues that arise in this type of application development.  [[:Category:OWASP_AppSec_Conference_Training#T6._Building_Secure_Rich_Internet_Applications_-_1-Day_Course_-_Sep_23.2C_2008 | Learn More Here]]&lt;br /&gt;
Instructor: Arshan Dabirsiaghi: [http://www.aspectsecurity.com http://www.owasp.org/images/d/d1/Aspect_logo.gif]'''&lt;br /&gt;
|-&lt;br /&gt;
 {| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T8. Secure Coding for .NET - 2-Days - $1350&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; | This course is similar to Aspect's Building and Testing Secure Web Applications except it includes a significant amount of .NET focused content, including:&lt;br /&gt;
# .NET security overview,&lt;br /&gt;
# All coding examples and recommendations are specifically focused on C#.NET and/or VB.NET and IIS servers, and&lt;br /&gt;
# 3 additional hands on coding labs where the students find and then fix security vulnerabilities in a .NET application developed for the class. Both C# and VB.NET versions of the hands on coding labs are available.&lt;br /&gt;
&lt;br /&gt;
[[:Category:OWASP_AppSec_Conference_Training#T8._Writing_Secure_Code_ASP.NET_-_Sep_22-23.2C_2008 | Learn More Here]]&lt;br /&gt;
&lt;br /&gt;
Instructor: Jerry Hoff: [http://www.aspectsecurity.com http://www.owasp.org/images/d/d1/Aspect_logo.gif]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h2&amp;gt; HOTELS / TRAVEL &amp;lt;/h2&amp;gt;&lt;br /&gt;
[http://www.parkcentralny.com Park Central Hotel]&lt;br /&gt;
 &lt;br /&gt;
[http://maps.google.com/maps?near=7th+Ave+%26+W+56th+St,+New+York,+NY&amp;amp;geocode=&amp;amp;q=hotels&amp;amp;f=l&amp;amp;sll=40.766339,-73.980539&amp;amp;sspn=0.007654,0.02223&amp;amp;ie=UTF8&amp;amp;ll=40.764681,-73.980668&amp;amp;spn=0.007655,0.02223&amp;amp;z=16 Hotels close to the venue]&lt;br /&gt;
&lt;br /&gt;
What is around APPSEC2008 - [http://www.parkcentralny.com/attractions/attractions.cfm  Area Attractions]&lt;br /&gt;
&lt;br /&gt;
New York City MTA: http://www.mta.nyc.ny.us/nyct/index.html&lt;br /&gt;
&lt;br /&gt;
New York City Subway &amp;amp; walking directions: http://www.hopstop.com/?city=newyork&lt;br /&gt;
&lt;br /&gt;
New York Sights &amp;amp; Sounds - SightsSounds&lt;br /&gt;
&lt;br /&gt;
New York City Travel Guide - http://www.nytoday.com/&lt;br /&gt;
&lt;br /&gt;
New York City Attractions - http://www.nycvisit.com&lt;br /&gt;
&lt;br /&gt;
New York TV Show Tickets - Get free tickets to TV shows! - http://www.nytix.com/&lt;br /&gt;
&lt;br /&gt;
New York City local news: http://www.ny1news.com&lt;/div&gt;</summary>
		<author><name>Adish</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Israel_2008_Conference_at_the_Interdisciplinary_Center_Herzliya_(IDC)&amp;diff=38364</id>
		<title>OWASP Israel 2008 Conference at the Interdisciplinary Center Herzliya (IDC)</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Israel_2008_Conference_at_the_Interdisciplinary_Center_Herzliya_(IDC)&amp;diff=38364"/>
				<updated>2008-09-04T12:31:56Z</updated>
		
		<summary type="html">&lt;p&gt;Adish: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:OWASP_IL_2008_Sponsors}}&lt;br /&gt;
&lt;br /&gt;
== Time and Location ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Israel 2008 conference will be held on September 14th at the Interdisciplinary Center Herzliya from 8:30 to 17:00. This time we are raising the bar and will be holding a full day '''two tracks''' event. The tracks would be split according by level: a beginners track and an experts track.&lt;br /&gt;
&lt;br /&gt;
You can find the IDC on&lt;br /&gt;
[http://local.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=%D7%94%D7%9E%D7%A8%D7%9B%D7%96+%D7%94%D7%91%D7%99%D7%9F+%D7%AA%D7%97%D7%95%D7%9E%D7%99+%D7%94%D7%A8%D7%A6%D7%9C%D7%99%D7%94,+%D7%94%D7%A8%D7%A6%D7%9C%D7%99%D7%94,+Israel&amp;amp;sll=32.166567,34.812605&amp;amp;sspn=0.007974,0.019312&amp;amp;ie=UTF8&amp;amp;cd=1&amp;amp;geocode=FbD26gEdeo0TAg&amp;amp;ll=32.177047,34.835844&amp;amp;spn=0.007973,0.019312&amp;amp;z=16&amp;amp;iwloc=addr  Google map] or use the [http://portal.idc.ac.il/he/Main/about_idc/campus_tour/Pages/MapsDirections.aspx instructions] on the IDC web site. Signs at the Campus will lead you the conference halls.&lt;br /&gt;
&lt;br /&gt;
== Registration ==&lt;br /&gt;
&lt;br /&gt;
The conference is '''free and open to all''', but please register by sending an e-mail to me at ofer@shezaf.com. We need to know how many people will arrive in order to be prepared.&lt;br /&gt;
&lt;br /&gt;
== Agenda ==&lt;br /&gt;
&lt;br /&gt;
(Not final, minor changes and additions possible)&lt;br /&gt;
&lt;br /&gt;
{|   class=&amp;quot;wikitable&amp;quot; &amp;lt;hiddentext&amp;gt;generated with   [[:de:Wikipedia:Helferlein/VBA-Macro for EXCEL tableconversion]]   V1.7&amp;lt;\hiddentext&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-   style=&amp;quot;background-color:#000000;font-size:11pt;font-weight:bold;color:#FFFFFF&amp;quot;  valign=&amp;quot;top&amp;quot;&lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;315&amp;quot;   height=&amp;quot;16&amp;quot; | Title&lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;156&amp;quot; | Presentation&lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;91&amp;quot; | Copmany&lt;br /&gt;
|-   style=&amp;quot;background-color:#D8D8D8;font-size:11pt&amp;quot;  valign=&amp;quot;top&amp;quot;&lt;br /&gt;
&lt;br /&gt;
| height=&amp;quot;15&amp;quot; | [[OWASP_Israel_2008_Conference_Erez_Metula|.NET Framework   rootkits - backdoors inside your Framework]]&lt;br /&gt;
&lt;br /&gt;
 |   Erez Metula&lt;br /&gt;
&lt;br /&gt;
 |   2Bsecure&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;  valign=&amp;quot;top&amp;quot;&lt;br /&gt;
&lt;br /&gt;
| height=&amp;quot;30&amp;quot; | [[OWASP_Israel_2008_Conference_Ivan_Ristic|No More Signatures: Defending Web Applications from 0-Day Attacks with ModProfiler Using Traffic Profiling]]&lt;br /&gt;
&lt;br /&gt;
 |   Ivan Ristic&lt;br /&gt;
&lt;br /&gt;
 |   Breach&lt;br /&gt;
|-   style=&amp;quot;background-color:#D8D8D8;font-size:11pt&amp;quot;  valign=&amp;quot;top&amp;quot;&lt;br /&gt;
&lt;br /&gt;
| height=&amp;quot;15&amp;quot; | [http://www.owasp.org/index.php/AppSecEU08_Trends_in_Web_Hacking_Incidents:_What%27s_hot_for_2008 Trends in Web Hacking: What's hot in 2008]&lt;br /&gt;
&lt;br /&gt;
 |   Ofer Shezaf&lt;br /&gt;
&lt;br /&gt;
 |   Breach&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;  valign=&amp;quot;top&amp;quot;&lt;br /&gt;
&lt;br /&gt;
| height=&amp;quot;30&amp;quot; | [[OWASP_Israel_2008_Conference_Amichai_Shulman|Web Application Security and Search Engines – Beyond Google Hacking]]&lt;br /&gt;
&lt;br /&gt;
 |   Amichai Shulman&lt;br /&gt;
&lt;br /&gt;
 |   Imperva&lt;br /&gt;
|-   style=&amp;quot;background-color:#D8D8D8;font-size:11pt&amp;quot;  valign=&amp;quot;top&amp;quot;&lt;br /&gt;
&lt;br /&gt;
| height=&amp;quot;15&amp;quot; | [[OWASP_Israel_2008_Conference_Yuli_Stremovsky|GreenSQL - an open source database security gateway]]&lt;br /&gt;
&lt;br /&gt;
 |   Yuli Stremovsky&lt;br /&gt;
&lt;br /&gt;
 |   &amp;amp;nbsp;&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;  valign=&amp;quot;top&amp;quot;&lt;br /&gt;
&lt;br /&gt;
| height=&amp;quot;15&amp;quot; | [[OWASP_Israel_2008_Conference_Alon_Roser|eVoting]]&lt;br /&gt;
&lt;br /&gt;
 |   Dr. Alon Roser&lt;br /&gt;
&lt;br /&gt;
 |   IDC&lt;br /&gt;
|-   style=&amp;quot;background-color:#D8D8D8;font-size:11pt&amp;quot;  valign=&amp;quot;top&amp;quot;&lt;br /&gt;
&lt;br /&gt;
| height=&amp;quot;15&amp;quot; | [[OWASP_Israel_2008_Conference_Adi_Sharabani|Black Box vs. White Box - pros and cons]]&lt;br /&gt;
&lt;br /&gt;
 |   Adi Sharabani  &amp;amp; Yinnon Haviv&lt;br /&gt;
&lt;br /&gt;
 |   IBM/Watchfire&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;  valign=&amp;quot;top&amp;quot;&lt;br /&gt;
&lt;br /&gt;
| height=&amp;quot;15&amp;quot; | [[OWASP_Israel_2008_Conference_Ofer_Maor|Testing the Tester – Measuring Quality of Security Testing]]&lt;br /&gt;
&lt;br /&gt;
 |   Ofer Maor&lt;br /&gt;
&lt;br /&gt;
 |   Hacktics&lt;br /&gt;
|-   style=&amp;quot;background-color:#D8D8D8;font-size:11pt&amp;quot;  valign=&amp;quot;top&amp;quot;&lt;br /&gt;
&lt;br /&gt;
| height=&amp;quot;15&amp;quot; | [[OWASP_Israel_2008_Conference_Shai_Chen|Achilles’ heel – Hacking Through Java Protocols]]&lt;br /&gt;
&lt;br /&gt;
 |   Shai Chen&lt;br /&gt;
&lt;br /&gt;
 |   Hacktics&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;  valign=&amp;quot;top&amp;quot;&lt;br /&gt;
&lt;br /&gt;
| height=&amp;quot;15&amp;quot; | [[OWASP_Israel_2008_Conference_Amir_Herzberg|Defending against Phishing without Client-side Code]]&lt;br /&gt;
&lt;br /&gt;
 |   Prof. Amir Herzberg&lt;br /&gt;
&lt;br /&gt;
 |   Bar Ilan Univeristy&lt;br /&gt;
|-   style=&amp;quot;background-color:#D8D8D8;font-size:11pt&amp;quot;  valign=&amp;quot;top&amp;quot;&lt;br /&gt;
&lt;br /&gt;
| height=&amp;quot;30&amp;quot; | [[OWASP_Israel_2008_Conference_Ronen_Bachar|Automated Crawling &amp;amp; Security Analysis of Flash/Flex based Web Applications]]&lt;br /&gt;
&lt;br /&gt;
 |   Ronen Bachar&lt;br /&gt;
&lt;br /&gt;
 |   IBM/Watchfire&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;  valign=&amp;quot;top&amp;quot;&lt;br /&gt;
&lt;br /&gt;
| height=&amp;quot;15&amp;quot; | [[OWASP_Israel_2008_Conference_Maty_Siman|Application Security - The code analysis way]]&lt;br /&gt;
&lt;br /&gt;
 |   Maty Siman&lt;br /&gt;
&lt;br /&gt;
 |   Checkmarx&lt;br /&gt;
|-   style=&amp;quot;background-color:#D8D8D8;font-size:11pt&amp;quot;  valign=&amp;quot;top&amp;quot;&lt;br /&gt;
&lt;br /&gt;
| height=&amp;quot;15&amp;quot; | [[OWASP_Israel_2008_Conference_David_Movshovitz|AJAX - new technologies new threats]]&lt;br /&gt;
&lt;br /&gt;
 |   Dr. David Movshovitz&lt;br /&gt;
&lt;br /&gt;
 |   IDC&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;  valign=&amp;quot;top&amp;quot;&lt;br /&gt;
&lt;br /&gt;
| height=&amp;quot;16&amp;quot; | [[OWASP_Israel_2008_Conference_Ohad_Ben_Cohen|Korset: Code-based Intrusion Detection System for Linux]]&lt;br /&gt;
&lt;br /&gt;
 |   Ohad Ben-Cohen&lt;br /&gt;
&lt;br /&gt;
 |   &amp;amp;nbsp;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Note that the [[OWASP_Israel_2008_Conference_Turbo_Talks|Turbo Talk (Rump) Session]] is still open for submissions.&lt;br /&gt;
&lt;br /&gt;
== Call for participation ==&lt;br /&gt;
&lt;br /&gt;
Being a community event, we are staring a call for involvement, which means it is the time to speak up if you want to:&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Israel_2008_Conference_Turbo_Talks|Turbo Talk (Rump) Session]] - a new feature in this conference, consisting of a series of 5-minute talks.&lt;br /&gt;
: The deadline for submissions for the rump session is '''Monday, September 8, 2008'''. &lt;br /&gt;
* [[OWASP IL Sponsorship|Call for sponsors]]&lt;br /&gt;
* Help in organizing&lt;br /&gt;
* Otherwise participate (plenty of time for that, but if you know you will come, speak up)&lt;br /&gt;
&lt;br /&gt;
'''This is also a good time to raise other ideas you have regarding the conference'''. Many of you have been to previous conferences and have great ideas, so don't be shy and speak up.&lt;br /&gt;
&lt;br /&gt;
== Agenda ==&lt;br /&gt;
&lt;br /&gt;
The [[OWASP_IL_CFP|CFP]] is underway and the program would be published by mid August. &lt;br /&gt;
&lt;br /&gt;
== The people behind the conference ==&lt;br /&gt;
&lt;br /&gt;
OWASP Israel is made by the people who contribute their time and brain to its success. The following people are working to ensure that OWASP Israel 2008 is a success.&lt;br /&gt;
&lt;br /&gt;
If you feel that you also can contribute or have interesting ideas regarding the conference, don't hesitate to contact me.&lt;br /&gt;
&lt;br /&gt;
=== Steering Committee ===&lt;br /&gt;
&lt;br /&gt;
The steering committee includes prominent individuals in the field of information security and help set the program for the conference:&lt;br /&gt;
&lt;br /&gt;
* Adi Sharabani (IBM)&lt;br /&gt;
* Dr. David Movshovitz (Interdisciplinary Center Herzliya)&lt;br /&gt;
* Ofer Maor (Hacktics)&lt;br /&gt;
* Ofer Shezaf (Breach Security)&lt;br /&gt;
* Ory Segal (IBM)&lt;br /&gt;
* Shay Zalalichin (ComSec)&lt;br /&gt;
* Yossi Oren (Proxy Software Systems)&lt;br /&gt;
&lt;br /&gt;
=== Organization Committee ===&lt;br /&gt;
&lt;br /&gt;
The organization committee is in charge of making this all happen:&lt;br /&gt;
&lt;br /&gt;
* Dr. Anat Bremler-Barr (Interdisciplinary Center Herzliya)&lt;br /&gt;
* Daniel Kallner&lt;br /&gt;
* Ofer Shezaf (Breach Security)&lt;br /&gt;
* Shay Shuker&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
~ [[User:Oshezaf|Ofer Shezaf]],Conference Chair&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;small&amp;gt;[mailto:ofer@shezaf.com ofer@shezaf.com]&amp;lt;/small&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Israel 2008]]&lt;/div&gt;</summary>
		<author><name>Adish</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_NYC_AppSec_2008_Conference&amp;diff=33769</id>
		<title>OWASP NYC AppSec 2008 Conference</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_NYC_AppSec_2008_Conference&amp;diff=33769"/>
				<updated>2008-07-09T17:00:19Z</updated>
		
		<summary type="html">&lt;p&gt;Adish: /* 2008 OWASP USA, NYC Conference Schedule – Sept 24th - Sept 25th */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= 2008 OWASP USA, NYC =&lt;br /&gt;
Last Update: {{REVISIONMONTH}}/{{REVISIONDAY}}/{{REVISIONYEAR}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;[http://guest.cvent.com/i.aspx?4W,M3,828ca6d1-1b60-4105-8034-d344700e6956 http://www.owasp.org/images/6/61/Banner2_irfan.jpg]&amp;lt;/center&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;[http://www.owasp.org/images/6/66/NY_Sponsorship_Form_update_%282%29.pdf Diamond Sponsor] 1/1 - [http://www.imperva.com http://www.owasp.org/images/d/de/Imperva_2color_RGB.jpg]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;[https://www.owasp.org/images/6/66/NY_Sponsorship_Form_update_%282%29.pdf Platinum Sponsor] 2/3 - [http://www.whitehatsec.com http://www.owasp.org/images/archive/4/4d/20080703021901%21Whitehat.gif] - [http://www.cenzic.com/ https://www.owasp.org/images/b/bf/CenzicLogo_RGB.gif]  -  [http://www.owasp.org/images/6/66/NY_Sponsorship_Form_update_%282%29.pdf http://www.owasp.org/images/f/f8/Sponsorsm.gif] &amp;lt;/center&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.owasp.org/images/6/66/NY_Sponsorship_Form_update_%282%29.pdf Gold, Silver &amp;amp; Other Sponsors] - [http://www.isc2.org http://www.owasp.org/images/4/45/Isc2logo.gif] - [http://www.f5.com http://www.owasp.org/images/7/7e/50px-F5_50px.jpg] - [http://www.aspectsecurity.com http://www.owasp.org/images/d/d1/Aspect_logo.gif] - [http://www.foundstone.com/us/education-overview.asp http://www.owasp.org/images/2/26/Foundstone.jpg] - [http://www.proactiverisk.com https://www.owasp.org/images/9/97/Proactiverisk_logo.jpg] - [http://www.ouncelabs.com https://www.owasp.org/images/6/6e/OunceLabs_logo.jpg] - [http://www.fortify.com https://www.owasp.org/images/a/ac/Fortify.jpg] - [http://www.cigital.com/ https://www.owasp.org/images/b/be/Cigital_OWASP.GIF] - [http://www.accessitgroup.com https://www.owasp.org/images/6/6d/Accessit.JPG] - [http://evangelyze.net/marketing.asp https://www.owasp.org/images/1/10/Evlogo.jpg] - [http://www.arctecgroup.net http://www.owasp.org/images/b/bf/Arctec.jpg] - [http://www.airtightnetworks.net https://www.owasp.org/images/8/8b/Airtight.gif] - [http://www.securityuniversity.net/ https://www.owasp.org/images/0/0d/Security_university.jpg] - [http://www.owasp.org/images/6/66/NY_Sponsorship_Form_update_%282%29.pdf http://www.owasp.org/images/f/f8/Sponsorsm.gif]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;[https://www.owasp.org/images/6/66/NY_Sponsorship_Form_update_%282%29.pdf Sponsorship Opportunities] -- [http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference-PRESS Press Registration] -- [http://www.owasp.org/index.php/Member_Offers Other OWASP Member Offers] &amp;lt;/center&amp;gt; &lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
In association with: [http://www.webappsec.org WASC], [http://www.nym-infragard.us NYM InfraGard], [http://aitglobal.com AITGlobal], [http://nyphp.org/index.php NYC PHP], [http://www.nycbug.org NYCBUG], [http://www.isacany.net ISACA], [http://www.issa.org ISSA] and [http://www.pace.edu Pace University] you're invited to (2) days of Seminars and Technology Pavilion from the world's best application security technology minds, (2) days of hardcore hands-on training, all held at &amp;lt;b&amp;gt;[http://www.pace.edu/page.cfm?doc_id=16157 Pace University]&amp;lt;/b&amp;gt;, located in downtown New York City at &amp;lt;b&amp;gt;One Pace Plaza New York, NY 10038.&amp;lt;/b&amp;gt; Event Fees: $350 Members / $400 Non-Members / $200 for Students for [http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference#OWASP_NYC_AppSec_2008_Training_Courses_-_September_22nd_and_23rd.2C_2008 2 days of hands on training classes] are also available.&lt;br /&gt;
&amp;lt;center&amp;gt;[http://guest.cvent.com/i.aspx?4W,M3,828ca6d1-1b60-4105-8034-d344700e6956 http://www.owasp.org/images/7/7f/Register.gif]&lt;br /&gt;
To Get more involved and discuss this upcoming event [http://owaspfoundation.ning.com click here for forums] or visit other OWASP [http://www.owasp.org/index.php/Member_Offers member offers]&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== 2008 OWASP USA, NYC Conference Schedule – Sept 24th - Sept 25th ==&lt;br /&gt;
&amp;lt;center&amp;gt;[http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference/speakeragreement OWASP Speaker Agreement]&amp;lt;/center&amp;gt;&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | Day 1 – Sept 24th, 2008 &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | || style=&amp;quot;width:30%; background:#BC857A&amp;quot; | Track 1: &lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; | Track 2: &lt;br /&gt;
 | style=&amp;quot;width:30%; background:#99FF99&amp;quot; | Track 3: &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 07:30-10:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | '''Doors Open for Attendee/Speaker Registration &amp;amp; [http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference#Technology_Pavilion_-_September_24th_and_25th Exhibit/Sponsor Area]'''&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 09:00-09:45 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | OWASP Version 3.0 who we are, where we are.. where we are going &lt;br /&gt;
''[http://www.owasp.org/index.php/Contact OWASP Foundation]: Jeff Williams, Dinis Cruz, Dave Wichers, Tom Brennan, Sebastien Deleersnyder, Paolo Perego, Kate Hartmann &amp;amp; Alison Shrader  &lt;br /&gt;
'' &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:00-10:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; |  [http://www.owasp.org/index.php/AppSecEU08_Trends_in_Web_Hacking_Incidents:_What%27s_hot_for_2008 Analysis of the Web Hacking Incidents Database (WHID)]&lt;br /&gt;
''[http://blog.shezaf.com Ofer Shezaf]''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [http://www.webappsecroadmap.com Web Application Security Road Map]  &amp;lt;br&amp;gt;&lt;br /&gt;
''[http://joesecurity.blogspot.com Joe White]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; |[https://buildsecurityin.us-cert.gov/swa/acqwg.html Enhancing the software acquisition process to address software assurance issues.]&lt;br /&gt;
''Stan Wisseman''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 11:00-11:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Web Security Education using Open Source Tools&lt;br /&gt;
''Prof. Li-Chiou Chen &amp;amp; Chienitng Lin, [http://www.pace.edu/page.cfm?doc_id=16399 Pace Univ]''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Http Bot Research&lt;br /&gt;
''[http://www.shadowserver.org/wiki/pmwiki.php?n=Shadowserver.Mission Andre M. DiMino - ShadowServer Foundation]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | MalSpam Research &lt;br /&gt;
'' [http://www.knujon.com/bios.html Garth Bruen]''&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:00-13:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; |  [http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference/ctf Capture the Flag] Sign-Up&lt;br /&gt;
''LUNCH - Provided by event sponsors @ TechExpo''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:00-12:30 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | e-Gateway&lt;br /&gt;
''[http://www.linkedin.com/in/tommyryan Tom Ryan]''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Framework-level Threat Analysis: Adding Science to the Art of Source-code review&lt;br /&gt;
''Nishchal Bhalla''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | Automated Web-based Malware Behavioral Analysis &lt;br /&gt;
'' Tyler Hudak''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 13:00-13:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Offensive Assessing Financial Applications&lt;br /&gt;
'' [http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference-daniel-cuthbert Daniel Cuthbert]''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | WAF ModSecurity&lt;br /&gt;
''[http://www.thinkingstone.com/about/ivan-ristic.html Ivan Ristic]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | OWASP &amp;amp; NYC&lt;br /&gt;
''[http://www.linkedin.com/in/davidstern2000 David Stern]''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 14:00-14:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Logic Attacks and Inefficiencies of Robotic Detection&lt;br /&gt;
''[http://ha.ckers.org/blog/about Robert &amp;quot;RSnake&amp;quot; Hansen], CEO SecTheory''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Reverse Engineering .NET &lt;br /&gt;
''Adam Boulton''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | JBroFuzz 0.1 - 1.1: Building a Java Fuzzer for the Web &lt;br /&gt;
''[http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference-SPEAKER-Yiannis_Pavlosoglou Yiannis Pavlosoglou]''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:00-15:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; |Industry Panel w/ Jennifer Bayuk CISO Bear Stearns, Mark Clancy EVP CitiGroup, Jim Routh CISO DTCC, Sunil Seshadri CISO NYSE-Euronet, Warren Axelrod SVP Bank of America, Joe Bernik Royal Bank of Scotland &amp;amp; Philip Venables CIRO, Goldman, Sachs&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [http://www.owasp.org/index.php/Wild_Wild_Web_on_Security_Planet Wild Wild Web on Security Planet]&lt;br /&gt;
''[http://www.expresscertifications.com/company/execmgt.aspx Mano Paul] CEO Express Certifications''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; |[http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference-SPEAKER-GunterOllmann Multidisciplinary Bank Attacks]&lt;br /&gt;
''Gunter Ollmann''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 16:00-16:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | OWASP Enterprise Security API [http://www.owasp.org/index.php/ESAPI (ESAPI) Project]&lt;br /&gt;
'' [http://www.aspectsecurity.com/management.htm Jeff Williams] &amp;amp; Jim Manico''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Shootout @ Blackbox Corral&lt;br /&gt;
''Larry Suto ''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | 80% 10% 10%&lt;br /&gt;
'' [http://www.blogger.com/profile/07177656204885181542 Andy Steingruebl], Security @ PayPal''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 17:00-17:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Threading the Needle:&lt;br /&gt;
&lt;br /&gt;
Bypassing web application/service security controls using Encoding, Transcoding, Filter Evasion, and other Canonicalization Attacks&lt;br /&gt;
'' [http://www.linkedin.com/in/arianevans Arian Evans]''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; |Shhhh Don’t Tell Anybody &lt;br /&gt;
''[http://www.linkedin.com/in/ppetkov Petko D. Petkov]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | [http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference-SPEAKER-Andres_Riancho W3AF Open Source App Scanner]&lt;br /&gt;
''Andres Riancho''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 18:00-18:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [http://www.owasp.org/index.php/Category:OWASP_Live_CD_Project OWASP Live CD]&lt;br /&gt;
'' [http://www.linkedin.com/in/packetfocus Joshua Perrymon]''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Coding Secure w/PHP&lt;br /&gt;
''[http://www.linkedin.com/in/zaunere Hans Zaunere]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | [http://www.owasp.org/index.php/Payment_Card_Data_Security_and_the_new_Enterprise_Java Payment Card Data Security and the new Enterprise Java]&lt;br /&gt;
''Dr. B. V. Kumar &amp;amp; Mr. Abhay Bhargav''&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 20:00-23:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | OWASP NYC AppSec 2008 VIP Party&lt;br /&gt;
''Location: TBD''&lt;br /&gt;
|-&lt;br /&gt;
! colspan=&amp;quot;10&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | Day 2 – Sept 25th, 2008 &lt;br /&gt;
|-&lt;br /&gt;
  | style=&amp;quot;width:10%; background:#99FF99&amp;quot; | 08:00-10:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; |  BREAKFAST - Provided by event sponsors @ TechExpo&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 08:00-08:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | State of the Union&lt;br /&gt;
''[http://www.aeispeakers.com/speakerbio.php?SpeakerID=1192 Prof. Howard A. Schmidt, CISSP, CISM (Hon.)] Current (ISC)² Security Strategist and Former White House Cyber Security Advisor''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Best Practices Guide: Web Application Firewalls&lt;br /&gt;
''Dr. Georg Hess''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | TOPIC&lt;br /&gt;
''SPEAKER''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 09:00-09:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Good vs. Evil JavaScript&lt;br /&gt;
''[http://jeremiahgrossman.blogspot.com Jeremiah Grossman]''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | OWASP V2 Testing Guide 4.2.3 Spidering and Googling in depth &lt;br /&gt;
''[http://www.linkedin.com/in/ChristianHeinrich Christian Heinrich]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | OWASP Web Services Top Ten&lt;br /&gt;
''[http://1raindrop.typepad.com Gunnar Peterson]''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:00-10:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | OWASP Update &lt;br /&gt;
''Dinis Cruz/Jeff Williams + Surprise Guest''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Help Wanted 7 Things You Need to Know APPSEC/INFOSEC Employment&lt;br /&gt;
''[http://www.linkedin.com/pub/0/29/685 Lee Kushner]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | APPSEC Industry Analysts&lt;br /&gt;
''Speaker TBD''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 11:00-11:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [http://www.owasp.org/index.php/Category:OWASP_CLASP_Project CLASP (Comprehensive, Lightweight Application Security Process)]&lt;br /&gt;
''Pravir Chandra''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Next Generation Cross Site Scripting Worms &lt;br /&gt;
''[http://i8jesus.com/?page_id=5 Arshan Dabirsiaghi]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | Secure Software Impact&lt;br /&gt;
''[http://ouncelabs.com/company/team.asp Jack Danahy]''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:00-12:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Security in Agile Development&lt;br /&gt;
''[http://www.owasp.org/index.php/User:Wichers Dave Wichers]''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Security of Software-as-a-Service (SaaS)&lt;br /&gt;
''[http://www.linkedin.com/pub/6/372/45a James Landis]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | [http://reversebenchmarking.com/About.html Open Reverse Benchmarking Project]&lt;br /&gt;
''Marce Luck &amp;amp; [http://www.linkedin.com/pub/1/507/616 Tom Stracener]''&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:00-13:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference/ctf Capture the Flag] Status&lt;br /&gt;
''LUNCH - Provided @ TechExpo''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 13:00-13:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Security Research Report&lt;br /&gt;
''[http://www.linkedin.com/pub/5/742/233 Dinis Cruz]''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [http://www.owasp.org/index.php/Category:OWASP_Pantera_Web_Assessment_Studio_Project Pantera Advances]&lt;br /&gt;
''[http://www.linkedin.com/pub/1/598/855 Simon Roses Femerling]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | Lotus Notes Insecurity &lt;br /&gt;
''Jian Hui Wang''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 14:00-14:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Practical Advanced Threat Modeling&lt;br /&gt;
''John Steven''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [http://www.owasp.org/index.php/Category:OWASP_Orizon_Project Owasp Orizon]&lt;br /&gt;
''Paolo Perego''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | Building Usable Security&lt;br /&gt;
''Zed Abbadi''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:00-15:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [http://www.owasp.org/index.php/Input_validation:_the_Good%2C_the_Bad_and_the_Ugly Input validation: the Good, the Bad and the Ugly]&lt;br /&gt;
''Johan Peeters''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Off-shoring Application Development? Security is Still Your Problem&lt;br /&gt;
''Rohyt Belani''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | NIST SAMATE Static Analysis Tool Exposition (SATE)&lt;br /&gt;
''Vadim Okun''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 16:00-16:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Vulnerabilities in application interpreters and runtimes&lt;br /&gt;
''Erik Cabetas''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Flash Parameter Injection (FPI)&lt;br /&gt;
''Ayal Yogev &amp;amp; Adi Sharabani''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | Cross-Site Scripting Filter Evasion&lt;br /&gt;
''Alexios Fakos''&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 17:00-17:45 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; |  '''Wizdom of Crowds / CTF Awards &amp;amp; Raffles'''&lt;br /&gt;
|-&lt;br /&gt;
  | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 18:30-19:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | OWASP Foundation, Chapter Leader Meeting&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;[http://guest.cvent.com/i.aspx?4W,M3,828ca6d1-1b60-4105-8034-d344700e6956 http://www.owasp.org/images/7/7f/Register.gif]&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Technology Pavilion - September 24th and 25th  ==&lt;br /&gt;
&lt;br /&gt;
Want to see the latest offerings from technology product and service firms, visit the Technology Pavilion. On September 24th and 25th. 2 full days of exhibits by service providers and manufacturers from around the world.&lt;br /&gt;
&lt;br /&gt;
Do you want to preview the event space [http://www.flickr.com/photos/21550725@N04/sets/72157604662279903/detail Click Here]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== [http://www.owasp.org/index.php/Category:OWASP_AppSec_Conference_Training OWASP NYC AppSec 2008 Training Courses - September 22nd and 23rd, 2008] ==&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T1. Defensive Programming - 2-Days - $1350&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; | This class will teach you how to program defensively. A must for developers, managers, testers and security professionals. Learn the latest techniques to build attack resistant code, protect from current and future vulnerabilities and how to secure an application from both implementation bugs and design flaws. The instructor Pravir Chandra is well known security expert, project lead for OWASP CLASP project and former co-founder &amp;amp; CTO of secure software [[:Category:OWASP_AppSec_Conference_Training | Learn More Here]]&lt;br /&gt;
&lt;br /&gt;
Instructor: Jason Rouse, Sr. Consultant, [http://www.cigital.com/training/series http://www.owasp.org/images/b/be/Cigital_OWASP.GIF]''' &lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T2. Secure Coding for Java EE - 2-Days - $1350&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; | This course is similar to Aspect's Building and Testing Secure Web Applications except it includes a significant amount of Java focused content, including:&lt;br /&gt;
# Java EE security overview,&lt;br /&gt;
# All coding examples and recommendations are specifically focused on Java and Java servers, and&lt;br /&gt;
# 3 additional hands on coding labs where the students find and then fix security vulnerabilities in a Java EE application developed for the class.&lt;br /&gt;
&lt;br /&gt;
[[:Category:OWASP_AppSec_Conference_Training | Learn More Here]]&lt;br /&gt;
&lt;br /&gt;
Instructor: This tutorial is provided by longtime OWASP contributor: [http://www.aspectsecurity.com http://www.owasp.org/images/d/d1/Aspect_logo.gif]&lt;br /&gt;
'''&lt;br /&gt;
 |-&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T3. Web Services and XML Security - 2-Days - $1350&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; | The movement towards Web Services and Service Oriented architecture (SOA) paradigms requires new security paradigms to deal with new risks posed by these architectures. This session takes a pragmatic approach towards identifying Web Services security risks and selecting and applying countermeasures to the application, code, web servers, databases, application, and identity servers and related software. [[:Category:OWASP_AppSec_Conference_Training | Learn More Here]]&lt;br /&gt;
&lt;br /&gt;
Instructor: Gunnar Peterson''' [http://www.arctecgroup.net https://www.owasp.org/images/b/bf/Arctec.jpg]&lt;br /&gt;
 |-&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T4. Advanced Web Application Security Testing - 2-Days - $1350&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; | Course Overview While all developers need to know the basics of web application security testing, application security specialists will want to know all the advanced techniques for finding and diagnosing security problems in applications. Aspect’s Advanced Web Application Security Testing training is based on a decade of work verifying the security of critical applications. The course is taught by an experienced application security practitioner in an interactive manner. [[:Category:OWASP_AppSec_Conference_Training | Learn More Here]]&lt;br /&gt;
&lt;br /&gt;
Instructor: This tutorial is provided by longtime OWASP contributor: [http://www.aspectsecurity.com http://www.owasp.org/images/d/d1/Aspect_logo.gif]'''&lt;br /&gt;
 |-&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T5. Leading the Development of Secure Applications 1-Day - Sept 22nd- $675&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; |  In this one-day management session you’ll get the answers to the ten key questions that most CIOs and development managers face when trying to improve security in the development process.  The course provides proven techniques and valuable lessons learned that can be applied to projects at any phase of their application’s lifecycle. [[:Category:OWASP_AppSec_Conference_Training | Learn More Here]]&lt;br /&gt;
Instructor: This tutorial is provided by longtime OWASP contributor: [http://www.aspectsecurity.com http://www.owasp.org/images/d/d1/Aspect_logo.gif]'''&lt;br /&gt;
 |-&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T7. Encryption Programming Using SKSML - 2-Days - $1350&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; |  Application developers are increasingly required to protect sensitive data through encryption.  While there are many libraries that can assist with cryptography, there are few to none that focus on encryption key management.&lt;br /&gt;
&lt;br /&gt;
This class will introduce you to an OASIS standards protocol - Symmetric Key Services Markup Language (SKSML) - and show you how it can be used to securely encrypt sensitive data and manage encryption keys across the enterprise. [[:Category:OWASP_AppSec_Conference_Training | Learn More Here]]&lt;br /&gt;
&lt;br /&gt;
Instructor: Arshad Noor, CTO, StrongAuth Inc.''' [http://www.strongauth.com https://www.owasp.org/images/8/86/StrongAuth.jpg]&lt;br /&gt;
|-&lt;br /&gt;
 {| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T8. Writing Secure Code  ASP.NET - 2-Days - $1350&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; | Understand the key security features of the .NET platform, the common web security pitfalls developers make, and how to build secure and reliable web applications using ASP.NET. Students are lead through hands on code examples that highlight issues and prescribe solutions. [[:Category:OWASP_AppSec_Conference_Training | Learn More Here]]&lt;br /&gt;
&lt;br /&gt;
The instructors are Foundstone's Technical Director, Rudolph Araujo and Foundstone's Professional Services Conlultant, Alex Smolen. [http://www.foundstone.com/us/education-overview.asp https://www.owasp.org/images/2/26/Foundstone.jpg]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;center&amp;gt;[http://guest.cvent.com/i.aspx?4W,M3,828ca6d1-1b60-4105-8034-d344700e6956 https://www.owasp.org/images/7/7f/Register.gif]&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h2&amp;gt; HOTELS / TRAVEL &amp;lt;/h2&amp;gt;&lt;br /&gt;
[http://maps.google.com/maps?near=Pace+Plz,+New+York,+NY+10038+(Pace+University+New+York+Cmps)&amp;amp;geocode=15467452012610799558,40.711640,-74.005820&amp;amp;q=hotel&amp;amp;f=l&amp;amp;dq=Pace+University-New+York&amp;amp;ie=UTF8&amp;amp;z=15&amp;amp;om=0 Hotels in the area of the event]&lt;br /&gt;
&lt;br /&gt;
New York City MTA: http://www.mta.nyc.ny.us/nyct/index.html&lt;br /&gt;
&lt;br /&gt;
New York City Subway &amp;amp; walking directions: http://www.hopstop.com/?city=newyork&lt;br /&gt;
&lt;br /&gt;
New York Sights &amp;amp; Sounds - SightsSounds&lt;br /&gt;
&lt;br /&gt;
New York City Travel Guide - http://www.nytoday.com/&lt;br /&gt;
&lt;br /&gt;
New York City Attractions - http://www.nycvisit.com&lt;br /&gt;
&lt;br /&gt;
New York TV Show Tickets - Get free tickets to TV shows! - http://www.nytix.com/&lt;br /&gt;
&lt;br /&gt;
New York City local news: http://www.ny1news.com&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h2&amp;gt;EVENT SPONSORSHIP &amp;lt;/h2&amp;gt;The OWASP Conferences &amp;amp; Training security technologists including CSOs,admins, application admins, MIS directors, homeland defense chiefs. These important influencers drive buying decisions exclusive access to its audiences. OWASP has established strategic relationships with security—print publications, newsletters, portals, consultants,message—and leadership positioning OWASP events. OWASP’s mission is supported by organizations who share our application, and software security communities. This approach should be part of your mix.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;[https://www.owasp.org/images/6/66/NY_Sponsorship_Form_update_%282%29.pdf Sponsorship Opportunities]- Register online: [http://guest.cvent.com/i.aspx?4W,M3,09e3b490-ba93-4474-851e-be803b1a01c2 click here]&amp;lt;/b&amp;gt;&lt;/div&gt;</summary>
		<author><name>Adish</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_NYC_AppSec_2008_Conference&amp;diff=29610</id>
		<title>OWASP NYC AppSec 2008 Conference</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_NYC_AppSec_2008_Conference&amp;diff=29610"/>
				<updated>2008-05-21T08:22:56Z</updated>
		
		<summary type="html">&lt;p&gt;Adish: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;center&amp;gt;[[Image:NYC08_468x60_72_newdates.gif]]&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= OWASP NYC AppSec 2008 - September 22th-25th 2008 =&lt;br /&gt;
Last Update: {{REVISIONMONTH}}/{{REVISIONDAY}}/{{REVISIONYEAR}}&lt;br /&gt;
In association with: [http://www.webappsec.org WASC], [http://www.nym-infragard.us NYM InfraGard], [http://aitglobal.com AITGlobal], [http://nyphp.org/index.php NYC PHP], [http://www.nycbug.org NYCBUG], [http://www.isacany.net ISACA], [http://www.issa.org ISSA] and [http://www.pace.edu Pace University] you're invited to (2) days of Seminars and Technology Pavilion from the world's best application security technology minds, (2) days of hardcore hands-on training, all held at &amp;lt;b&amp;gt;[http://www.pace.edu/page.cfm?doc_id=16157 Pace University]&amp;lt;/b&amp;gt;, located in downtown New York City at &amp;lt;b&amp;gt;One Pace Plaza New York, NY 10038.&amp;lt;/b&amp;gt; Event Fees: $350 for 2 days of seminars, $675 for 1-day training classes and $1,350 for 2-day courses. [http://guest.cvent.com/i.aspx?4W,M3,828ca6d1-1b60-4105-8034-d344700e6956 https://www.owasp.org/images/7/7f/Register.gif] - do you want to preview the event space [http://www.flickr.com/photos/21550725@N04/sets/72157604662279903/detail Click Here]&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
[https://www.owasp.org/images/6/60/NY_Sponsorship.pdf Diamond Sponsor] - [http://www.imperva.com https://www.owasp.org/images/d/de/Imperva_2color_RGB.jpg]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.owasp.org/images/6/60/NY_Sponsorship.pdf Platinum Sponsor] - [http://www.cenzic.com/ https://www.owasp.org/images/b/bf/CenzicLogo_RGB.gif]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.owasp.org/images/6/60/NY_Sponsorship.pdf Gold &amp;amp; Silver Sponsors] -[http://www.accessitgroup.com/products/inspectit.php https://www.owasp.org/images/6/6d/Accessit.JPG] - [http://www.fortify.com https://www.owasp.org/images/a/ac/Fortify.jpg] - [http://www.aspectsecurity.com http://www.owasp.org/images/d/d1/Aspect_logo.gif] - [http://www.cigital.com/ https://www.owasp.org/images/b/be/Cigital_OWASP.GIF] - [http://www.ouncelabs.com/ https://www.owasp.org/images/6/6e/OunceLabs_logo.jpg]&lt;br /&gt;
[http://www.proactiverisk.com https://www.owasp.org/images/9/97/Proactiverisk_logo.jpg]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;[https://www.owasp.org/images/9/98/NY_Sponsorship_Form.pdf Sponsorship Opportunities] -- [https://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference-PRESS Press Registration] -- [http://www.owasp.org/index.php/Member_Offers Other OWASP Member Offers] &amp;lt;/center&amp;gt; &lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== OWASP NYC AppSec 2008 Conference Schedule – Sept 24th - Sept 25th ==&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | Day 1 – Sept 24th, 2008&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | || style=&amp;quot;width:30%; background:#BC857A&amp;quot; | Track 1: &lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; | Track 2: &lt;br /&gt;
 | style=&amp;quot;width:30%; background:#7B8ABD&amp;quot; | Track 3: &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 08:00-09:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | '''Registration Opens and Tech Expo'''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 09:15-10:15 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | Introduction, OWASP Version 3.0 where we are.. where we are going &lt;br /&gt;
''OWASP Foundation Board Jeff Williams, Tom Brennan, Dinis Cruz, Sebastien Deleersnyder &amp;amp; Dave Wichers''&lt;br /&gt;
 |-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:30-11:30 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Logic Attacks and Inefficiencies of Robotic Detection&lt;br /&gt;
''Robert &amp;quot;RSnake&amp;quot; Hansen CEO [http://www.sectheory.com SecTheory]''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Offensive Assessing Financial Apps&lt;br /&gt;
''Daniel Cuthbert''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#7B8ABD&amp;quot; align=&amp;quot;left&amp;quot; | Web Intrusion Detection with ModSecurity &lt;br /&gt;
''Ivan Ristic''&lt;br /&gt;
 |-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 11:30-12:30 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Reverse Engineering .NET&lt;br /&gt;
''Adam Boulton''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [http://www.owasp.org/index.php/Category:OWASP_JBroFuzz JBroFuzz] 0.1 - 1.1: [https://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference-SPEAKER-Yiannis_Pavlosoglou Building a Java Fuzzer for the Web]&lt;br /&gt;
''[https://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference-SPEAKER-Yiannis_Pavlosoglou Yiannis Pavlosoglou] - Senior Director - [http://www.ouncelabs.com Ounce Labs] ''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#7B8ABD&amp;quot; align=&amp;quot;left&amp;quot; | [http://www.owasp.org/index.php/Category:OWASP_Live_CD_Project OWASP LIVE CD] &lt;br /&gt;
''Joshua Perrymon - CEO [http://www.packetfocus.com Packetfocus]''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:30-13:30 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Multidisciplinary Bank Attacks&lt;br /&gt;
''Gunter Ollmann, Director Security Strategy, [http://www.iss.net IBM Internet Security Systems]''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | OWASP CLASP&lt;br /&gt;
''Pravir Chandra''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#7B8ABD&amp;quot; align=&amp;quot;left&amp;quot; | Shootout at the Blackbox Corral &lt;br /&gt;
''Dinis Cruz &amp;amp; Larry Suto''&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 13:30-14:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | Collective Intelligence - Jennifer Bayuk-CISO Bear Stearns, Mark Clancy EVP CitiGroup, Jim Routh CISO DTCC, Sunil Seshadri CISO NYSE-Euronet, Warren Axelrod SVP Bank of America, Joe Bernik Royal Bank of Scotland &amp;amp; Philip Venables CIRO, Goldman, Sachs&lt;br /&gt;
Moderator: Mahi Dontamsetti&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 14:30-15:30 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [https://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference-SPEAKER-Andres_Riancho w3af, a framework to own the web] - &lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference-SPEAKER-Andres_Riancho ''Andres Riancho''], [http://www.cybsec.com/ Cybsec]&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[AppSecEU08_Trends_in_Web_Hacking_Incidents:_What's_hot_for_2008 | Trends in Web Hacking: What's hot in 2008&amp;lt;br/&amp;gt;Analysis of the Web Hacking Incidents Database (WHID)]]&lt;br /&gt;
''[http://blog.shezaf.com Ofer Shezaf], Breach''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#7B8ABD&amp;quot; align=&amp;quot;left&amp;quot; | Security in Agile Development&lt;br /&gt;
''Dave Wichers, COO [http://www.aspectsecurity.com Aspect Security]''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:30-16:30 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [http://www.owasp.org/index.php/ESAPI OWASP Enterprise Security API (ESAPI) Project]&lt;br /&gt;
''Jeff Williams, CEO [http://www.aspectsecurity.com Aspect Security]''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Next Generation Cross Site Scripting Worms&lt;br /&gt;
''Arshan Dabirsiaghi, Director of Research [http://www.aspectsecurity.com Aspect Security]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#7B8ABD&amp;quot; align=&amp;quot;left&amp;quot; | &amp;quot;Threading the Needle:&lt;br /&gt;
Bypassing web application/service security controls using Encoding, Transcoding, Filter Evasion, and other Canonicalization Attacks.&amp;quot;&lt;br /&gt;
''Arian Evans, Director of Operations [http://www.whitehatsec.com WhiteHat Security]''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 16:30-17:30 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Shhhh Don’t Tell Anybody&lt;br /&gt;
''Petko D. Petkov, a.k.a. pdp''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Secure PHP&lt;br /&gt;
''Hans Zaunere, CEO [http://www.nyphp.com NYCPHP]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#7B8ABD&amp;quot; align=&amp;quot;left&amp;quot; | Payment Card Data Security and the new Enterprise Java&lt;br /&gt;
''Dr. B. V. Kumar &amp;amp; Mr. Abhay ''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 17:30-18:30 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Notes Security&lt;br /&gt;
''Jian Hui Wang''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Mastering PCI Section 6.6&lt;br /&gt;
''Taylor McKinley and Jacob West''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#7B8ABD&amp;quot; align=&amp;quot;left&amp;quot; | AppSec Techniques&lt;br /&gt;
''JD Glaser, CEO [http://www.ntobjectives.com/company/management.php NTO Objectives]''&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 18:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | '''Web Application Capture the Flag - [http://isis.poly.edu/projects Polytechnic University]'''&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 20:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | ''' Speaker/Attendee Reception'''&lt;br /&gt;
|-&lt;br /&gt;
! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | Day 2 – Sept 25th, 2008&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 8:00-10:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | Breakfast @ Tech-Expo &lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 0900-10:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | '''&amp;quot;We have all the tools, policies, frameworks, documents, community support available what works... what does not?&amp;quot; '  Industry Panel: &amp;lt;TBD&amp;gt;, &amp;lt;TBD&amp;gt;, &amp;lt;TBD&amp;gt;, &amp;lt;TBD&amp;gt;, &amp;lt;TBD&amp;gt;  Moderator: Daniel Cuthbert''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:00-11:00 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Practical Advanced Threat Modeling&lt;br /&gt;
''John Steven''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [http://reversebenchmarking.com Open Reverse Benchmarking Project]&lt;br /&gt;
''Marce Luck &amp;amp; Tom Stracener''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#7B8ABD&amp;quot; align=&amp;quot;left&amp;quot; | Building Usable Security&lt;br /&gt;
''Zed Abbadi''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 11:00-12:00 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Offshoring Application Development? Security is Still Your Problem&lt;br /&gt;
''Rohyt Belani''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | OWASP Orizon Project&lt;br /&gt;
''Paolo Perego''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#7B8ABD&amp;quot; align=&amp;quot;left&amp;quot; | NIST SAMATE Static Analysis Tool Exposition (SATE)&lt;br /&gt;
''Vadim Okun''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:00-13:00 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | The Art and Nature of Web Application Security&lt;br /&gt;
''Mano Paul CEO [http://www.expresscertifications.com Express Certifications]''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Software Liability&lt;br /&gt;
''Jack Danahy''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#7B8ABD&amp;quot; align=&amp;quot;left&amp;quot; | Cross-Site Scripting Filter Evasion&lt;br /&gt;
''Alexios Fakos''&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 13:00-14:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | OWASP Projects &amp;quot;Dinis Cruz &amp;amp; OWASP Project Leaders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 14:00-15:00 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Projects with OWASP&lt;br /&gt;
''Steve Malson''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | OWASP Pantera Advances&lt;br /&gt;
''Simon Roses Femerling''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#7B8ABD&amp;quot; align=&amp;quot;left&amp;quot; | Software-as-a-Service (SaaS)&lt;br /&gt;
''James Landis''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:00-16:00 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | &amp;quot;Out of Band&amp;quot; Injection&lt;br /&gt;
''Vijay Akasapu &amp;amp; Marshall Heilman''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | OWASP V2 Testing Guide 4.2.3 Spidering and Googling in depth&lt;br /&gt;
''Christian Heinrich''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#7B8ABD&amp;quot; align=&amp;quot;left&amp;quot; | Caution, Java ahead&lt;br /&gt;
''Jeremiah Grossman CTO [http://www.whitehatsec.com WhiteHat Security]''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 16:00-17:00 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [[Input validation: the Good, the Bad and the Ugly]]&lt;br /&gt;
''[[Johan Peeters]]''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Flash Parameter Injection (FPI)&lt;br /&gt;
''Ayal Yogev &amp;amp; Yuval Baror''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#7B8ABD&amp;quot; align=&amp;quot;left&amp;quot; | Learning the .Net Debugging API&lt;br /&gt;
''Kevin Spett''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 17:00-18:00 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Secure System Development Life Cycle (SSDLC) Methodology for SOA&lt;br /&gt;
''Ken Huang''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; |  Web Security Education using Open Source Tools&lt;br /&gt;
''Prof. Li-Chiou Chen &amp;amp; Chienitng Lin''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#7B8ABD&amp;quot; align=&amp;quot;left&amp;quot; | Friend or Foe: Penetration Testing VS Source Code Analysis&lt;br /&gt;
''Tom Ryan''&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 18:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | '''Closing Remarks / CTF Awards / Raffles'''&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 21:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | '''Farewell dinner.. Go secure the world'''&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;[http://guest.cvent.com/i.aspx?4W,M3,828ca6d1-1b60-4105-8034-d344700e6956 https://www.owasp.org/images/7/7f/Register.gif]&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Technology Pavilion - September 24th and 25th  ==&lt;br /&gt;
&lt;br /&gt;
Want to see the latest offerings from technology product and service firms, visit the Technology Pavilion. On September 24th and 25th there will be 2 full days of exhibits by service providers and manufacturers from around the world.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== [https://www.owasp.org/index.php/Category:OWASP_AppSec_Conference_Training OWASP NYC AppSec 2008 Training Courses - September 22nd and 23rd, 2008] ==&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T1. Defensive Programming - 2-Days - $1350&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; | This class will teach you how to program defensively. A must for developers, managers, testers and security professionals. Learn the latest techniques to build attack resistant code, protect from current and future vulnerabilities and how to secure an application from both implementation bugs and design flaws. The instructor Pravir Chandra is well known security expert, project lead for OWASP CLASP project and former co-founder &amp;amp; CTO of secure software [[:Category:OWASP_AppSec_Conference_Training | Learn More Here]]&lt;br /&gt;
&lt;br /&gt;
Instructor: Pravir Chandra, Project Lead OWASP [[:Category:OWASP_CLASP_Project | CLASP]] Project, Principal Consultant, [http://www.cigital.com https://www.owasp.org/images/b/be/Cigital_OWASP.GIF]''' &lt;br /&gt;
 |-&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T2. Secure Coding for Java EE - 2-Days - $1350&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; | This course is similar to Aspect's Building and Testing Secure Web Applications except it includes a significant amount of Java focused content, including:&lt;br /&gt;
# Java EE security overview,&lt;br /&gt;
# All coding examples and recommendations are specifically focused on Java and Java servers, and&lt;br /&gt;
# 3 additional hands on coding labs where the students find and then fix security vulnerabilities in a Java EE application developed for the class.&lt;br /&gt;
&lt;br /&gt;
[[:Category:OWASP_AppSec_Conference_Training | Learn More Here]]&lt;br /&gt;
&lt;br /&gt;
Instructor: This tutorial is provided by longtime OWASP contributor: [http://www.aspectsecurity.com http://www.owasp.org/images/d/d1/Aspect_logo.gif]&lt;br /&gt;
'''&lt;br /&gt;
 |-&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T3. Web Services and XML Security - 2-Days - $1350&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; | The movement towards Web Services and Service Oriented architecture (SOA) paradigms requires new security paradigms to deal with new risks posed by these architectures. This session takes a pragmatic approach towards identifying Web Services security risks and selecting and applying countermeasures to the application, code, web servers, databases, application, and identity servers and related software. [[:Category:OWASP_AppSec_Conference_Training | Learn More Here]]&lt;br /&gt;
&lt;br /&gt;
Instructor: Gunnar Peterson''' [http://www.arctecgroup.net https://www.owasp.org/images/b/bf/Arctec.jpg]&lt;br /&gt;
 |-&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T4. Advanced Web Application Security Testing - 2-Days - $1350&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; | Course Overview While all developers need to know the basics of web application security testing, application security specialists will want to know all the advanced techniques for finding and diagnosing security problems in applications. Aspect’s Advanced Web Application Security Testing training is based on a decade of work verifying the security of critical applications. The course is taught by an experienced application security practitioner in an interactive manner. [[:Category:OWASP_AppSec_Conference_Training | Learn More Here]]&lt;br /&gt;
&lt;br /&gt;
Instructor: This tutorial is provided by longtime OWASP contributor: [http://www.aspectsecurity.com http://www.owasp.org/images/d/d1/Aspect_logo.gif]'''&lt;br /&gt;
 |-&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T5. Leading the Development of Secure Applications 1-Day - Sept 22nd- $675&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; |  In this one-day management session you’ll get the answers to the ten key questions that most CIOs and development managers face when trying to improve security in the development process.  The course provides proven techniques and valuable lessons learned that can be applied to projects at any phase of their application’s lifecycle. [[:Category:OWASP_AppSec_Conference_Training | Learn More Here]]&lt;br /&gt;
Instructor: This tutorial is provided by longtime OWASP contributor: [http://www.aspectsecurity.com http://www.owasp.org/images/d/d1/Aspect_logo.gif]'''&lt;br /&gt;
 |-&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T6. Application Security Forensics - 1-Day - Sep 23rd - $675&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; |  Web application forensics and incident response, requires a solid understanding of web application, security issues – this 1 day class will provide you with a crashcourse on chain of custody and issues related to dealing with a breach&lt;br /&gt;
 |-&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T7. Encryption Programming Using SKSML - 2-Days - $1350&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; |  Application developers are increasingly required to protect sensitive data through encryption.  While there are many libraries that can assist with cryptography, there are few to none that focus on encryption key management.&lt;br /&gt;
&lt;br /&gt;
This class will introduce you to an OASIS standards protocol - Symmetric Key Services Markup Language (SKSML) - and show you how it can be used to securely encrypt sensitive data and manage encryption keys across the enterprise. [[:Category:OWASP_AppSec_Conference_Training | Learn More Here]]&lt;br /&gt;
&lt;br /&gt;
Instructor: Arshad Noor, CTO, StrongAuth Inc.''' [http://www.strongauth.com https://www.owasp.org/images/8/86/StrongAuth.jpg]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;center&amp;gt;[http://guest.cvent.com/i.aspx?4W,M3,828ca6d1-1b60-4105-8034-d344700e6956 https://www.owasp.org/images/7/7f/Register.gif]&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h2&amp;gt; HOTELS / TRAVEL &amp;lt;/h2&amp;gt;&lt;br /&gt;
[http://maps.google.com/maps?near=Pace+Plz,+New+York,+NY+10038+(Pace+University+New+York+Cmps)&amp;amp;geocode=15467452012610799558,40.711640,-74.005820&amp;amp;q=hotel&amp;amp;f=l&amp;amp;dq=Pace+University-New+York&amp;amp;ie=UTF8&amp;amp;z=15&amp;amp;om=0 Hotel's in the area of the event]&lt;br /&gt;
&lt;br /&gt;
New York City MTA: http://www.mta.nyc.ny.us/nyct/index.html&lt;br /&gt;
&lt;br /&gt;
New York City Subway &amp;amp; walking directions: http://www.hopstop.com/?city=newyork&lt;br /&gt;
&lt;br /&gt;
New York Sights &amp;amp; Sounds - SightsSounds&lt;br /&gt;
&lt;br /&gt;
New York City Travel Guide - http://www.nytoday.com/&lt;br /&gt;
&lt;br /&gt;
New York City Attractions - http://www.nycvisit.com&lt;br /&gt;
&lt;br /&gt;
New York TV Show Tickets - Get free tickets to TV shows! - http://www.nytix.com/&lt;br /&gt;
&lt;br /&gt;
New York City local news: http://www.ny1news.com&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h2&amp;gt;EVENT SPONSORSHIP &amp;lt;/h2&amp;gt;The OWASP Conferences &amp;amp; Training security technologists including CSOs,admins, application admins, MIS directors, homeland defense chiefs. These important influencers drive buying decisions exclusive access to its audiences. OWASP has established strategic relationships with security—print publications, newsletters, portals, consultants,message—and leadership positioning OWASP events. OWASP’s mission is supported by organizations who share our application, and software security communities. This approach should be part of your mix.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;[https://www.owasp.org/images/9/98/NY_Sponsorship_Form.pdf Sponsorship Opportunities]- Register online: [http://guest.cvent.com/i.aspx?4W,M3,09e3b490-ba93-4474-851e-be803b1a01c2 click here]&amp;lt;/b&amp;gt;&lt;/div&gt;</summary>
		<author><name>Adish</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Israel&amp;diff=18389</id>
		<title>Israel</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Israel&amp;diff=18389"/>
				<updated>2007-05-08T11:47:46Z</updated>
		
		<summary type="html">&lt;p&gt;Adish: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Israel|extra=The chapter leader is [mailto:ofers@breach.com Ofer Shezaf]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-israel|emailarchives=http://lists.owasp.org/pipermail/owasp-israel}}&lt;br /&gt;
&lt;br /&gt;
== 2nd OWASP IL mini conference at IDC, May  21th 2007 ==&lt;br /&gt;
&lt;br /&gt;
Following the big success of the 1st one, we are glad to announce the 2nd OWASP IL mini conference at Interdisciplinary Center Herzliya (IDC). The mini conference is a non-commercial event focusing on web application security. As you can see in the program below, we have carefully selected the presentations and we hope they are all relevant, informative and most importantly, none commercial. Never the less, we are happy to say that we were able to get very distinguish companies to sponsor the event and make sure that the refreshments would be great. &lt;br /&gt;
&lt;br /&gt;
The meeting will be held on Monday, May 21st, Starting at 13:30 at IDC Herzliya campus. Participation is free and open to all, but please inform us (e-mail to ofers@breach.com) that you are coming as space is limited. Feel free to spread the word about this meeting to anyone you feel would be interested. You can also register to get the [http://lists.owasp.org/mailman/listinfo/owasp-israel OWASP Israel mailing list] and receive updates regarding chapter's meetings. For further details please contact us.&lt;br /&gt;
&lt;br /&gt;
Dr. Anat Bremler-Barr&amp;lt;br&amp;gt;&lt;br /&gt;
Program Academic Director, Information Security Program&amp;lt;br&amp;gt;&lt;br /&gt;
Efi Arazi School of Computer Science, IDC Herzliya&lt;br /&gt;
&lt;br /&gt;
Ofer Shezaf&amp;lt;br&amp;gt;&lt;br /&gt;
CTO, Breach Security&amp;lt;br&amp;gt;&lt;br /&gt;
Chapter Leader, OWASP Israel&lt;br /&gt;
&lt;br /&gt;
The meeting is sponsored by Breach Security, Checkpoint, Hacktics, Applicure Technologies, Microsoft, Zend and the Interdisciplinary Center Herzliya (IDC).&lt;br /&gt;
&lt;br /&gt;
[[Image:Breach_logo.gif]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;[[Image:Applicure_logo.JPG|160px]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;[[Image:OWASP_IL_Sponsor_Hacktics.jpg|160px]][[Image:OWASP_IL_Sponsor_Zend.jpg|110px]][[Image:OWASP_IL_Sponsor_Checkpoint.gif]][[Image:OWASP_IL_Sponsor_Microsoft.gif]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The agenda of the meeting is:&lt;br /&gt;
&lt;br /&gt;
'''Gathering and Refreshments'''&amp;lt;br&amp;gt;&lt;br /&gt;
13:30 - 14:00 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;big&amp;gt;'''Updates from OWASP Europe, Milan'''&amp;lt;/big&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''Ofer Shezaf, OWASP IL chapter leader, CTO, [http://www.breach.com/ Breach Security]'''&amp;lt;br&amp;gt;&lt;br /&gt;
14:00 - 14:15&lt;br /&gt;
&lt;br /&gt;
Since the conference is just a few days after OWASP Europe 2007 in Milan, and since most of you would not have a chance to be there, I will try to convey the content and spirit of this unique conference to you.&lt;br /&gt;
&lt;br /&gt;
In addition you will hear Yair Amit, who will repeat the presentation he is going to make in OWASP Europe, and Erez Metula will build his lecture on OWASP chief evangelist's presentation about .NET. For my presentation in OWASP Europe, you had to come to the previous OWASP IL Mini Conference.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;big&amp;gt;'''Pen-Testing at Microsoft: FuzzGuru fuzzing framework'''&amp;lt;/big&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''John Neystadt, Lead Program Manager, Microsoft Forefront Edge, Microsoft'''&amp;lt;br&amp;gt;&lt;br /&gt;
14:15 - 15:00&lt;br /&gt;
&lt;br /&gt;
Fuzzing is the main systematic methodology used these days by hackers to find vulnerabilities in web and other applications. Fuzzing can find buffer overrun, denial-of-service and information disclosure vulnerabilities. It should be done for C++, C#/Java, ASP/JP code.&lt;br /&gt;
&lt;br /&gt;
FuzzGuru is a generic network fuzzing development framework developed in Microsoft Israel Development Center and is formally recommended best practice for all products developed in Microsoft.&lt;br /&gt;
&lt;br /&gt;
In this talk John will present some fuzzing testing theory, demonstrate the tools and discuss Microsoft fuzzing practices.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;big&amp;gt;'''Unregister Attacks in SIP'''&amp;lt;/big&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''Ronit Halachmi-Bekel, IDC'''&amp;lt;br&amp;gt;&lt;br /&gt;
15:00 - 15:40&lt;br /&gt;
	&lt;br /&gt;
The presentation discusses a research work done at the IDS about the &amp;quot;unregister attack&amp;quot;, a new kind of a denial of service attack on SIP servers. In this attack, the attacker sends a spoofed &amp;quot;unregister&amp;quot; message to a SIP server and cancels the registration of the victim at that server. This prevents the victim user from receiving any calls.&lt;br /&gt;
 &lt;br /&gt;
The research also offers a solution: the SIP One-Way Hash Function Algorithm (SOHA), motivated by the one-time password mechanism. SOHA prevents the unregister attack in all situations. The algorithm is easy to deploy since it requires only a minor modification and is fully backwards compatible and requires no additional configuration from the user or the server.&lt;br /&gt;
&lt;br /&gt;
The paper is a joint work with Dr. Anat Bremler-Barr and Jussi Kangasharju. The paper was presented at the 14th IEEE International Conference on Network Protocols (ICNP).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Break'''&amp;lt;br&amp;gt;&lt;br /&gt;
15:40 - 16:00&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;big&amp;gt;'''Application Denial of Service; is it Really That Easy?'''&amp;lt;/big&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''Shay Chen, Hacktics'''&amp;lt;br&amp;gt;&lt;br /&gt;
16:00 - 16:40&lt;br /&gt;
&lt;br /&gt;
Denial of service attacks, which are quite a nuisance on the network layer, are a nightmare when done on the application layer, but are equally underrated.&lt;br /&gt;
 &lt;br /&gt;
On our last conference, Dr. Anat Bremler-Bar discussed some of the theoretical aspects of application layer denial of service attacks. Shay Chen will expand and explore the practicalities of application layer denial of service. He will show real world techniques, real life stories and personal experiences conducting DOS attacks during penetration testing on major Israeli sites.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;big&amp;gt;'''Behavioral Analysis for Generating A Positive Security Model For Applications'''&amp;lt;/big&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''Ofer Shezaf, OWASP IL chapter leader, CTO, Breach Security'''&amp;lt;br&amp;gt;&lt;br /&gt;
16:40 - 17:10&lt;br /&gt;
&lt;br /&gt;
In the last OWASP IL conference, as well as in OWASP Europe in Milan, I explored the potential of a negative security model for securing applications. While a negative security model can provide some level of security, most agree that a positive security model is preferable for protection application. &lt;br /&gt;
&lt;br /&gt;
However, building a rule set to provide positive security is a difficult and never ending project. Modern tools employ behavioral analysis to build automatically those rules. The presentation will discuss the algorithms and methods used to build automatically an application layer positive security rule set as well as the problems and limitation of such as approach.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;big&amp;gt;'''Overtaking Google Desktop - Leveraging XSS to Raise Havoc'''&amp;lt;/big&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''Yair Amit, Senior Security Researcher, Watchfire'''&amp;lt;br&amp;gt;&lt;br /&gt;
17:10 - 17:50&lt;br /&gt;
&lt;br /&gt;
Yair will present a ground breaking research paper by Watchfire application security team. The paper describes an innovative attack methodology against Google Desktop which enables a malicious individual to achieve a remote, persistent access to sensitive data, and potentially a full system control.&lt;br /&gt;
&lt;br /&gt;
This represents a significant real world example of a new generation of computer attacks which take advantage of Web application vulnerabilities utilizing the increasing power of the Web browser. Their purpose is to remotely access private information. &lt;br /&gt;
&lt;br /&gt;
This presentation would be presented by Yair the week before at OWASP Europe in Milan.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Break'''&amp;lt;br&amp;gt;&lt;br /&gt;
17:50 - 18:00&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;big&amp;gt;'''Application Security is Not Just About Development'''&amp;lt;/big&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''David Lewis, CISM, CISA, CISSP, Rosenblum Holtzman'''&amp;lt;br&amp;gt;&lt;br /&gt;
18:00 - 18:20&lt;br /&gt;
&lt;br /&gt;
What many developers forget about is that the application even though it is a very important part of securing the &amp;quot;Gold&amp;quot;, data, there are other risks that require their attention. These risks require their understanding and preventative measures need to be implemented, managed and validated to limit the exposure to themselves and their organizations. E.g. Developers do not see the need for securing their code.&lt;br /&gt;
&lt;br /&gt;
One of the things I will provide you during my presentation is why you should secure your code.  It is one of the ways you will keep your job.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;big&amp;gt;'''.NET reverse engineering'''&amp;lt;/big&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''Erez Metula, Application Security Department Manager, 2Bsecure'''&amp;lt;br&amp;gt;&lt;br /&gt;
18:20 - 19:20&lt;br /&gt;
&lt;br /&gt;
The presentation will introduce MSIL (Microsoft Intermediate Language) and debugging MSIL. Based on this foundation the presentation will explore and demonstrate tools and techniques for changing the behavior of .NET assemblies and the CLR using reversing engineering techniques.&lt;br /&gt;
&lt;br /&gt;
== 6th OWASP IL meeting, January 24th 2007 ==&lt;br /&gt;
&lt;br /&gt;
The 6th OWASP IL meeting was held on January 24th 2007, at 17:15, at Breach Security offices in Herzelya and was sponsored by [[www.breach.com|Breach Security]]. The meeting was very successful, with nearly 50 people attending the meeting.&lt;br /&gt;
&lt;br /&gt;
The agenda of the meeting was:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;big&amp;gt;'''[[media:OWASP_IL_Source_Code_Analysis_and_Application_Security.pdf|Source Code Analysis and Application Security - Cheating the Maze]]'''&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Maty Siman, Founder &amp;amp; CTO, [http://www.checkmarx.com/ Checkmarx]'''&lt;br /&gt;
&lt;br /&gt;
During the last few years automatically analyzing source code in order to find security vulnerabilities became a popular method in the field of Application Security. The presentation will discuss the theory and research of static code analysis, the application of static code analysis for security, comparing this method to other application security defense technologies and will demonstrate the use of static code analysis for application security.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;big&amp;gt;'''[[media:OWASP_IL_WCF_Security.pdf|Security Implications of .Net 3.0 and the Windows Communication Foundation (WCF)]]'''&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Emmanuel Cohen-Yashar (Manu), Senior .NET technology consultant, [http://www.sela.co.il Sela Group]'''   &lt;br /&gt;
&lt;br /&gt;
Windows Communication Foundation (WCF) is the new Microsoft communication framework bundled as part of of .NET Framework 3.0, the new .NET Windows API succeeding Win32 with the release of Windows Vista. WCF programming model unifies Web Services, .NET Remoting, Distributed Transactions, and Message Queues into a single Service-oriented programming model for distributed computing. The presentation will describe the tenets of SOA – Service Oriented Architecture, introduce WCF and discuss the security implications of this broad new communication paradigm.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;big&amp;gt;'''[[media:OWASP_IL_The_Universal_XSS_PDF_Vulnerability.pdf|Analysis of the Universal XSS PDF vulnerability - Cause, Solutions and Fun Stuff]]'''&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Ofer Shezaf, CTO, [http://www.breach.com Breach Security], Leader of [http://www.modsecurity.org/projects/rules/index.html ModSecurity Core Rule Set] open source project '''&lt;br /&gt;
&lt;br /&gt;
Recently a new vulnerability was discovered in commonly used versions of Adobe Acrobat software. Unlike common XSS attacks that require a specific vulnerability in the attacked web site, in this case the vulnerability in Acrobat is sufficient and no fault is required in the attacked web site, and any site that serves PDF files is vulnerable. Therefore it is called &amp;quot;universal XSS&amp;quot; vulnerability.&lt;br /&gt;
&lt;br /&gt;
The presentation will describe the vulnerability, the theoretical and practical solutions for the vulnerability as well as some very funny stories about the dynamics of such a high profile vulnerability, or in other words, what happens when you try to get a car mechanic to fix an application security vulnerability.&lt;br /&gt;
&lt;br /&gt;
== OWASP IL mini conference at IDC, November 13th 2006 ==&lt;br /&gt;
&lt;br /&gt;
OWASP IL and the Interdisciplinary Center Herzliya (IDC) held a half day conference on application security on Nov 13th 2006. The event marked the establishment of a new academic program on information security in the net era at IDC's Efi Arazi School of Computer Science. More than 90! people attended the conference, enjoyed professional catering and heard no less than 7 presentations.&lt;br /&gt;
&lt;br /&gt;
The meeting was sponsored by [[www.breach.com|Breach Security]] and [[www.applicure.com|Applicure Technologies]].&lt;br /&gt;
&lt;br /&gt;
[[Image:Breach_logo.gif]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;[[Image:Applicure_logo.JPG|180px]]&lt;br /&gt;
&lt;br /&gt;
Use the links in the event program to access the presentations themselves:&lt;br /&gt;
&lt;br /&gt;
'''14:30 – 15:00 Gathering and refreshments (hopefully more elaborate than Pizza this time!)''' [[Image:OWASP_IL_IDC.jpg|right]]&lt;br /&gt;
 &lt;br /&gt;
'''15:00 – 15:10 Introducing the new information security program at the net era at the Efi Arazi School of Computer Science, IDC Herzliya'''&lt;br /&gt;
&lt;br /&gt;
Dr. Anat Bremler-Barr, Program Academic Director.&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&amp;lt;big&amp;gt;'''15:10 – 15:40 Sophisticated Denial of Service attacks'''&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Dr. Anat Bremler-Barr,  Efi Arazi School of Computer Science, IDC Herzliya&lt;br /&gt;
&lt;br /&gt;
In Denial of Service attack, the attackers consume the resources of the victim, a server or a network, causing degradation in performance or even total failure of the victim. The basic DDoS attack is a simple brute force flooding, where the attacker sends as much traffic as he can to consume the network resources. In contrast, the sophisticated DDoS attack aims to hurt the weakest point in the victim's applications by sending specific traffic type that burdens the application the most. In this talk we will cover recent works that show that several common mechanisms are vulnerable to sophisticated DDoS attacks. For example, Crosby and Wallach showed that using bandwidth of less than a typical dialup modem can bring a dedicated Bro server to its knees. We will discuss some basic guidelines of how to design applications to be resilient to sophisticated attacks.&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&amp;lt;big&amp;gt;'''15:40 – 16:00 [[Media:Enterprise_portals_security.pdf|Malicious content in enterprise portals]]'''&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Shalom Carmel, A security icon, the world's authority on hacking AS/400 and a BlackHat 2006 speaker&lt;br /&gt;
&lt;br /&gt;
In 2005, enterprise portals rank in the top 10 of CIO technology focus areas in many surveys. The main drivers of the portal business growth are the horizontal portal suites, which provide content management capabilities, application integration tools, and specific solutions for collaboration and knowledge management. This lecture will address the security problems an enterprise may have due to the various content management abilities in a typical Portal implementation, and will focus on cross site scripting attacks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;big&amp;gt;'''16:00 – 16:30 Information Warfare against commercial companies – lessons from dealing with hostile internet entities'''&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Ariel Pisetsky, CISO and Infrastructure Manager, NetVision&lt;br /&gt;
&lt;br /&gt;
During the recent war in the north, many information security events where detected in private and government organization. These events, usually no more than web site defacement, provide an opportunity to examine a large scale hostile activity against web sites affiliated with Israel. Commercial companies with no direct relation to the war found themselves under a direct attack or indirectly affected due to attacks on ISPs and the Internet Infrastructure in Israel. &lt;br /&gt;
&lt;br /&gt;
In the presentation we will discuss what happened during this summer of war, whether it can be classified as information warfare and what are the lessons that can be learnt going forward&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
'''16:30 – 16:45 Break, coffee, tea &amp;amp; fruits'''&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&amp;lt;big&amp;gt;'''16:45 – 17:15 [[Media:Secure_coding.pdf|Real vs. Virtual Patching]]'''&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Ravid Lazinski, Technical Manager, Applicure Technologies&lt;br /&gt;
&lt;br /&gt;
The penetration team has found a bug. What's next? In order to prevent exploitation, the application has to be patched.&lt;br /&gt;
&lt;br /&gt;
The presentation will discuss the advantage and disadvantages of the two available solutions: patching the application or using an external patching solution in a process called &amp;quot;virtual patching&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&amp;lt;big&amp;gt;'''17:15 – 17:45 [[Media:The_Core_Rule_Set.pdf|&amp;quot;The Core Rule Set&amp;quot;: Generic detection of application layer attacks]]'''&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Ofer Shezaf, CTO, Breach Security, OWASP IL chapter Leader, Director, the Web Application Security Consortium&lt;br /&gt;
&lt;br /&gt;
Web Applications are unique, each one having its own vulnerabilities and therefore a positive security model is usually considered the optimal way to protect them. The [http://www.modsecurity.org ModSecurity] open source project has recently released a &amp;quot;core rule set&amp;quot;, essentially a set of super signatures that try to provide significant security to custom application without the effort of defining a positive security model.&lt;br /&gt;
&lt;br /&gt;
The lecture will discuss generic application security signatures and rules, how they differ from network centric signatures and their strengths and limitations when dealing with the OWASP top 10 attacks.&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
'''17:50 – 18:00 Break'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;big&amp;gt;'''18:00 – 18:30 [[Media:OWASP_10_Most_Common_Backdoors.pdf|The OWASP Top Ten Backdoors]]'''&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Yaniv Simsolo, Application Security Consultant, Comsec Consulting&lt;br /&gt;
&lt;br /&gt;
Just as the OWASP Top Ten outlines the top ten mistakes that developers make in applications, the top ten backdoors discuss the features developed on purpose, that do just the same: leave the application vulnerable. Backdoors are more common than developers and system professionals think. Hackers and malicious users can exploit backdoors easily, without leaving any special traces in the system. An SQL interface to an application, providing a lot of flexibility but little security is a good example of such a backdoor.&lt;br /&gt;
&lt;br /&gt;
The presentation will discuss common backdoors found in web applications and how they relate to the OWASP top 10.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;big&amp;gt;'''18:30 – 19:15 [[Media:Hacking_The_FrameWork.ppt|Hacking The Framework]]'''&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Nimrod Luria, Head Of Consulting Services, 2Bsecure&lt;br /&gt;
&lt;br /&gt;
Modern development environment such as .Net and J2EE promise enhanced security by relying on the framework services rather than good coding. The presentation will demonstrate using real hacking demos the weak points in such frameworks using .Net as an example.&lt;br /&gt;
&lt;br /&gt;
== 4th OWASP IL meeting, July 26th 2006 ==&lt;br /&gt;
&lt;br /&gt;
The 4th OWASP IL meeting was held on July 26th 2006 at [http://www.breach.com Breach Security] offices with the following presentations:&lt;br /&gt;
 &lt;br /&gt;
&amp;lt;big&amp;gt;'''[[Media:OWASP_IL_0706_Comsec_ShayZ_Crypto_1_0_2.pdf|Exposing cryptography for software developers]]'''&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Shai Zalalichin, Head of AppSec group, [http://www.comsec.co.il Comsec]'''&lt;br /&gt;
&lt;br /&gt;
Encryption is a very important tool in the application security tool chest, but is also a very complex technology. The presentation will explore common pitfalls &amp;amp; countermeasures that every developer should follow when writing crypto-aware applications.&lt;br /&gt;
&lt;br /&gt;
The presentation was originally given at OWASP Europe conference in May.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;big&amp;gt;'''[[Media:OWASP_IL_Preventing_spoofing_phishing_and_spam.pdf|Preventing Spoofing, Phishing and Spamming by Secure Usability and Cryptography]]'''&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''[http://www.cs.biu.ac.il/~herzbea/ Prof. Amir Herzberg], dept. of computer science, Bar-Ilan University, Israel'''   &lt;br /&gt;
&lt;br /&gt;
Spoofing, Phishing and spamming are of the worst security problems in the Internet. Amir will present vulnerabilities in the current email and web systems, causing the proliferation of such attacks.   Amir will then discuss some recent proposals made by him as well as others to improve security against these threats. Some solutions involve secure usability,&lt;br /&gt;
some use (simple) cryptographic protocols, while others involve both areas.&lt;/div&gt;</summary>
		<author><name>Adish</name></author>	</entry>

	</feed>