<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Adrian+Hayes</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Adrian+Hayes"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Adrian_Hayes"/>
		<updated>2026-04-27T10:26:29Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_New_Zealand_Day_2016&amp;diff=200499</id>
		<title>OWASP New Zealand Day 2016</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_New_Zealand_Day_2016&amp;diff=200499"/>
				<updated>2015-09-14T02:32:13Z</updated>
		
		<summary type="html">&lt;p&gt;Adrian Hayes: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2016 https://www.owasp.org/images/2/23/OWASP_NZ_Day_2016_logo.jpg]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''3rd and 4th Feburary 2016 - Auckland'''&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
= Introduction =&lt;br /&gt;
==Introduction==&lt;br /&gt;
We are proud to announce the seventh OWASP New Zealand Day conference, to be held at the University of Auckland on Thursday February 4th, 2016. OWASP New Zealand Day is a one-day conference dedicated to application security, with an emphasis on secure architecture and development techniques to help Kiwi developers build more secure applications.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Who is it for?&lt;br /&gt;
&lt;br /&gt;
* Web Developers: The morning sessions will introduce you to application security. Afternoon sessions will dive deeper into technical topics, and build on the morning sessions.&lt;br /&gt;
* Management: After an introduction to web application security, one of the afternoon streams will focus on policy, compliance and risk management.&lt;br /&gt;
* Security Professionals and Enthusiasts: Technical sessions later in the day will showcase new and interesting attack and defence topics.&lt;br /&gt;
&lt;br /&gt;
==Conference structure==&lt;br /&gt;
&lt;br /&gt;
Date: Thurs 4 Feb 2016&amp;lt;br&amp;gt;&lt;br /&gt;
Time: 9:00am - 5:00pm&amp;lt;br&amp;gt;&lt;br /&gt;
Cost: Free&amp;lt;br&amp;gt;&lt;br /&gt;
Food: Morning and Afternoon tea&lt;br /&gt;
&lt;br /&gt;
The main conference is on Thursday 4th of February, and will have three streams:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table style=&amp;quot;border:1px solid black;&amp;quot;&amp;gt;&lt;br /&gt;
   &amp;lt;tr&amp;gt;&lt;br /&gt;
      &amp;lt;td width=&amp;quot;10%&amp;quot; style=&amp;quot;text-align:center; border:1px solid black&amp;quot;&amp;gt;Morning&amp;lt;/td&amp;gt;&lt;br /&gt;
      &amp;lt;td width=&amp;quot;90%&amp;quot; colspan=&amp;quot;2&amp;quot; style=&amp;quot;border:1px solid black; padding: 0px 0px 0px 12px;&amp;quot;&amp;gt;Introductions to application security topics&amp;lt;/td&amp;gt;&lt;br /&gt;
   &amp;lt;/tr&amp;gt;&lt;br /&gt;
   &amp;lt;tr&amp;gt;&lt;br /&gt;
      &amp;lt;td width=&amp;quot;10%&amp;quot; style=&amp;quot;text-align:center; border:1px solid black;&amp;quot;&amp;gt;Afternoon&amp;lt;/td&amp;gt;&lt;br /&gt;
      &amp;lt;td width=&amp;quot;45%&amp;quot; style=&amp;quot;border:1px solid black; padding: 0px 0px 0px 12px;&amp;quot;&amp;gt;Deeply technical topics&amp;lt;/td&amp;gt;&lt;br /&gt;
      &amp;lt;td width=&amp;quot;45%&amp;quot; style=&amp;quot;border:1px solid black; padding: 0px 0px 0px 12px;&amp;quot;&amp;gt;Policy, Compliance, and Risk Management&amp;lt;/td&amp;gt;   &lt;br /&gt;
   &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Training==&lt;br /&gt;
&lt;br /&gt;
Date: Wed 3 Feb 2016&amp;lt;br&amp;gt;&lt;br /&gt;
Time: 9:00am - 5:00pm or part thereof&amp;lt;br&amp;gt;&lt;br /&gt;
Cost: To be advised&amp;lt;br&amp;gt;&lt;br /&gt;
Food: Lunch provided&lt;br /&gt;
&lt;br /&gt;
As well as the main conference on Thursday, we are pleased to be able to provide training on Wednesday at a discounted price. We anticipate a selection of introductory and advanced training topics.&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Training sessions will be announced by XXX, and will be held at the same venue on Wednesday 3 February.&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The seventh OWASP New Zealand Day will be happening thanks to the support provided by the University of Auckland, which will kindly offer a slightly different location from last year. Entry to the event will, as in the past, be free.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For any comments, feedback or observations, please don't hesitate to contact [mailto:kim.carter@owasp.org?cc=adrian.hayes@owasp.org?cc=denis.andzakovic@owasp.org us].&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Registration==&lt;br /&gt;
&lt;br /&gt;
Registration is not yet open. Please join our low volume [https://lists.owasp.org/mailman/listinfo/owasp-newzealand mailing list] to be notified when registration opens.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Registration for the main conference day is now open: [https://registration.owasp.org.nz/ Conference Registration Here]&lt;br /&gt;
&lt;br /&gt;
There is no cost for the main conference day. Morning and afternoon tea will be provided. Unfortunately due to increased conference running costs, lunch will not be provided as it has been for the past OWASP NZ Days. We do ask that if at any point you realise you cannot make it please cancel your registration to make room for others as spaces are limited.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Training Registration is now open: [http://www.regonline.com/owaspnzday2016trainingandsponsorship Training Registration]&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Registration is now closed.&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Important dates==&lt;br /&gt;
&lt;br /&gt;
* CFP &amp;amp; CFT submission deadline: 7th December 2015&lt;br /&gt;
* Conference Registration deadline: 21st January 2016&lt;br /&gt;
* Training Registration deadline:   21st January 2016&lt;br /&gt;
* Training Day date:          3rd February 2016&lt;br /&gt;
* Conference Day date:           4th February 2016&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
For those of you booking flights, ensure you can be at the venue at 8:30am, the conference will end by 5:30pm however we will have post conference drinks at a local drinking establishment for those interested.&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Conference Venue==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
   &amp;lt;td&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The University of Auckland School of Commerce&amp;lt;br&amp;gt;&lt;br /&gt;
Address: 12 Grafton Road&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Main conference room: Level 1&amp;lt;br&amp;gt;&lt;br /&gt;
Room: 115 (Fisher &amp;amp; Paykel Auditorium)&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Afternoon parallel stream: Level 0&amp;lt;br&amp;gt;&lt;br /&gt;
Room: B5&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Auckland&amp;lt;br&amp;gt;&lt;br /&gt;
New Zealand&amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.google.com/maps/place/Owen+G+Glenn+Building+12+Grafton+Road/@-36.8528203,174.770224,17z/data=!4m6!1m3!3m2!1s0x0000000000000000:0x0205ad91287ba364!2sUniversity+of+Auckland+Graduate+School+of+Enterprise!3m1!1s0x0000000000000000:0xc9d224e5921a6690 Map]&lt;br /&gt;
   &amp;lt;/td&amp;gt;&lt;br /&gt;
   &amp;lt;td&amp;gt;&lt;br /&gt;
[[Image:073_AUBiz_10Apr08small.jpg]] [[Image:MG_0037small.JPG]]&lt;br /&gt;
   &amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Conference Sponsors==&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;bottom&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;[http://www.auckland.ac.nz/ https://www.owasp.org/images/8/82/University_of_Auckland_crest_small.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;bottom&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;[http://www.security.org.nz/NZISF_NZISForumContent.php https://www.owasp.org/images/5/5a/Nz_information_security_forum.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;ICT and Department of Information Systems and Operations Management&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Conference Committee==&lt;br /&gt;
&lt;br /&gt;
* Denis Andzakovic - OWASP New Zealand Leader (Auckland)&lt;br /&gt;
* Adrian Hayes -  OWASP New Zealand Leader (Wellington)&lt;br /&gt;
* Kim Carter -  OWASP New Zealand Leader (Christchurch)&lt;br /&gt;
* Lech Janczewski - Associate Professor - University of Auckland School of Business&lt;br /&gt;
&lt;br /&gt;
Please direct all enquiries to denis.andzakovic@owasp.org | adrian.hayes@owasp.org | kim.carter@owasp.org&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Call For Presentations =&lt;br /&gt;
==Call For Presentations==&lt;br /&gt;
&lt;br /&gt;
OWASP New Zealand Day conferences attract a high quality of speakers from a variety of security disciplines including&lt;br /&gt;
architects, web developers and engineers, system administrators, penetration testers, policy specialists and more.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We would like a variety of technical levels in the presentations submitted, corresponding to the three sections of the conference:&lt;br /&gt;
&lt;br /&gt;
* Introductions to various Web Application Security topics, and the OWASP projects&lt;br /&gt;
* Technical topics&lt;br /&gt;
* Policy, Compliance and Risk Management&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The introductory talks should appeal to an intermediate to experienced web developer, without a solid grounding in web application security or knowledge of the OWASP projects. These talks should be engaging, encourage developers to learn more about web application security, and give them techniques that they can immediately return to work and apply to their jobs.&lt;br /&gt;
&lt;br /&gt;
Technical topics in the afternoon should appeal to two audiences - experienced web application security testers or researchers, and web developers who have a “OWASP Top Ten” level of understanding of web attacks and defenses. You could present a lightning, short or long talk on something you have researched, developed yourself, or learnt in your travels. Ideally the topics will have technical depth or novelty so that the majority of attendees learn something new.&lt;br /&gt;
&lt;br /&gt;
For the “Management Stream” in the afternoon we would like to invite talks that will appeal to those interested in the various non-technical topics that are important in our industry. These talks could focus on the development of policies, dealing with compliance obligations, managing risks within an enterprise, or other issues that could appeal to those in management roles.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We encourage presentations to have a strong component on fixing and prevention of security issues. We are looking for presentations on a wide variety of security topics, including but not limited to:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Web application security&lt;br /&gt;
* Mobile security&lt;br /&gt;
* Secure development&lt;br /&gt;
* Vulnerability analysis&lt;br /&gt;
* Threat modelling&lt;br /&gt;
* Application exploitation&lt;br /&gt;
* Exploitation techniques&lt;br /&gt;
* Threat and vulnerability countermeasures&lt;br /&gt;
* Platform or language security (JavaScript, NodeJS, .NET, Java, RoR, etc)&lt;br /&gt;
* Penetration Testing&lt;br /&gt;
* Browser and client security&lt;br /&gt;
* Application and solution architecture security&lt;br /&gt;
* PCI DSS&lt;br /&gt;
* Risk management&lt;br /&gt;
* Security concepts for C*Os, project managers and other non-technical attendees&lt;br /&gt;
* Privacy controls&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The email subject must be &amp;quot;OWASP New Zealand 2016: CFP&amp;quot; and the email body must contain the following information/sections:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name and Surname&lt;br /&gt;
* Affiliation&lt;br /&gt;
* Telephone number&lt;br /&gt;
* Email address&lt;br /&gt;
* Short presenter bio&lt;br /&gt;
* Title of the contribution&lt;br /&gt;
* Type of contribution: Technical, Informative, Management&lt;br /&gt;
* Suggested length for the talk&lt;br /&gt;
* Short abstract (up to 500 words)&lt;br /&gt;
* List of the author's previous papers/articles/speeches on the same/similar topic (if any)&lt;br /&gt;
* If you are not from New Zealand, will your company support your travel/accommodation costs? - Yes/No&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The submission will be reviewed by the OWASP New Zealand Day conference committee and the highest voted talks will be selected and invited for presentation.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
PLEASE NOTE:&lt;br /&gt;
&lt;br /&gt;
* Due to limited budget available, expenses for international speakers cannot be covered.&lt;br /&gt;
* If your company is willing to cover travel and accommodation costs, the company will become &amp;quot;Support Sponsor&amp;quot; of the event.&lt;br /&gt;
&lt;br /&gt;
Please submit the above information to all of the following: Denis Andzakovic (denis.andzakovic@owasp.org), Adrian Hayes (adrian.hayes@owasp.org) and Kim Carter (kim.carter@owasp.org).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Submissions deadline: 7th December 2015&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Call For Trainers =&lt;br /&gt;
== Call For Trainers ==&lt;br /&gt;
&lt;br /&gt;
We are happy to announce that training will run on Wednesday February 3rd 2016, the day before the OWASP Day conference.&lt;br /&gt;
The training venue will be Level 0, Room: 40C, kindly provided by the University of Auckland School of Commerce, in the same building as the OWASP NZ Day conference itself.&lt;br /&gt;
Classes will contain up to 48 students, with power for laptop usage and Wi-Fi. A wide range of half-day or full-day training proposals will be considered,&lt;br /&gt;
see the Call for Papers for a list of example topics.&lt;br /&gt;
&lt;br /&gt;
If you are interested in running one of the training sessions, please contact Denis Andzakovic, Adrian Hayes and Kim Carter with the following information:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Trainer name&lt;br /&gt;
* Trainer organisation&lt;br /&gt;
* Telephone + email contact&lt;br /&gt;
* Short Trainer bio&lt;br /&gt;
* Training title&lt;br /&gt;
* Trainer requirements (e.g. a projector, whiteboard, etc)&lt;br /&gt;
* Trainee requirements (e.g. laptop, VMware/VirtualBox, etc)&lt;br /&gt;
* Training summary (less than 500 words)&lt;br /&gt;
* Target audience (e.g. testers, project managers, security managers, web developers, architects)&lt;br /&gt;
* Skill level required (Basic / Intermediate / Advanced)&lt;br /&gt;
* What attendees can expect to learn (key objectives)&lt;br /&gt;
* Short course outline&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The fixed price per head for training will be $250 for a half-day session and $500 for a whole-day session. As this training is part of an OWASP event, part of the proceeds go back to OWASP. The split is as follows:&lt;br /&gt;
&lt;br /&gt;
* 25% to OWASP Global - used for OWASP projects around the world&lt;br /&gt;
* 25% to OWASP NZ Day - used for expenses such as catering during the conference&lt;br /&gt;
* 50% to the training provider.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Please submit the above information to all of the following:&lt;br /&gt;
* Denis Andzakovic (denis.andzakovic@owasp.org)&lt;br /&gt;
* Adrian Hayes (adrian.hayes@owasp.org)&lt;br /&gt;
* Kim Carter (kim.carter@owasp.org).&lt;br /&gt;
&lt;br /&gt;
Submissions deadline: 7th December 2015&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Call For Sponsorships =&lt;br /&gt;
==Call For Sponsorships==&lt;br /&gt;
&lt;br /&gt;
OWASP New Zealand Day 2016 will be held in Auckland on the 4th of February, 2016 and is a security conference entirely dedicated to application security.&lt;br /&gt;
The conference is once again being hosted by the University of Auckland with their support and assistance.&lt;br /&gt;
OWASP New Zealand Day 2016 is a free event, but requires sponsor support to help be an instructive and quality event for the New Zealand community.&lt;br /&gt;
OWASP is strictly not for profit. The sponsorship money will be used to help make OWASP New Zealand Day 2016 a free, compelling, and valuable experience for all attendees.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The sponsorship funds collected are to be used for things such as:&lt;br /&gt;
&lt;br /&gt;
* Refreshments (coffee breaks) - we want to keep people refreshed during the day.&lt;br /&gt;
* Name tags - we feel that getting to know people within the New Zealand community is important, and name tags make that possible.&lt;br /&gt;
* Promotion - up to now our events are propagating by word of mouth. We would like to get to a wider audience by advertising our events.&lt;br /&gt;
* Printed Materials - printed materials will include brochures, tags and lanyards.&lt;br /&gt;
&lt;br /&gt;
== Facts ==&lt;br /&gt;
&lt;br /&gt;
Last year, the event was supported by eight sponsors and attracted more than 230 participants. Plenty of constructive (and positive!) feedback from the audience was received and we are using this to make the conference more appealing to more people. For more information on the last New Zealand Day event, please visit: https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2015&lt;br /&gt;
&lt;br /&gt;
The OWASP New Zealand community is strong, there are more than 410 people currently subscribed to the mailing-list. OWASP New Zealand Day is expected to attract between 400 and 500 attendees this year.&lt;br /&gt;
&lt;br /&gt;
OWASP regular attendees are IT project managers, IT security managers, IT security consultants, web application architects and developers, QA managers, QA testers and system administrators.&lt;br /&gt;
&lt;br /&gt;
== Sponsorships  ==&lt;br /&gt;
&lt;br /&gt;
There are three different levels of sponsorships for the OWASP Day event:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Support Sponsorship&amp;lt;/b&amp;gt;: (Covering international speaker travel expenses, media coverage/article/promotion of the event)&lt;br /&gt;
   &lt;br /&gt;
Includes:&lt;br /&gt;
&lt;br /&gt;
* Publication of the sponsor logo on the event web site - https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2016&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Silver Sponsorship&amp;lt;/b&amp;gt;: 1500 NZD&lt;br /&gt;
&lt;br /&gt;
Includes: &lt;br /&gt;
&lt;br /&gt;
* Publication of the sponsor logo on the event web site - https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2016&lt;br /&gt;
* The publication of the sponsor logo in the event site, in the agenda, on the handouts and in all the official communications with the attendees at the conference.&lt;br /&gt;
* The possibility to distribute the company brochures, CDs or other materials to the participants during the event.&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Gold Sponsorship&amp;lt;/b&amp;gt;: 2750 NZD&lt;br /&gt;
&lt;br /&gt;
Includes: &lt;br /&gt;
&lt;br /&gt;
* The possibility to have a promotional banner or sign side stage in the main auditorium (to be provided by the sponsor, size subject to approval by the OWASP NZ Day Committee).&lt;br /&gt;
* The publication of the sponsor logo in the event site, in the agenda, on the handouts and in all the official communications with the attendees at the conference.&lt;br /&gt;
* The possibility to distribute the company brochures, CDs or other materials to the participants during the event.&lt;br /&gt;
* Publication of the sponsor logo on the OWASP New Zealand Chapter page - Sponsor logo on the OWASP NZ site prior and during the OWASP Day event - https://www.owasp.org/index.php/New_Zealand&lt;br /&gt;
* Publication of the sponsor logo on the event web site - https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2016&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Those who are interested in sponsoring OWASP New Zealand 2016 Conference can contact the [mailto:kim.carter@owasp.org?cc=adrian.hayes@owasp.org?cc=denis.andzakovic@owasp.org OWASP New Zealand Board].&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]]&lt;/div&gt;</summary>
		<author><name>Adrian Hayes</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_New_Zealand_Day_2015&amp;diff=190316</id>
		<title>OWASP New Zealand Day 2015</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_New_Zealand_Day_2015&amp;diff=190316"/>
				<updated>2015-02-26T04:11:03Z</updated>
		
		<summary type="html">&lt;p&gt;Adrian Hayes: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2015 https://www.owasp.org/images/9/94/New_Zealand_Day_2015_020.png]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''26th and 27th Feburary 2015 - Auckland'''&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
= Introduction =&lt;br /&gt;
==Introduction==&lt;br /&gt;
We are proud to announce the sixth OWASP New Zealand Day conference, to be held at the University of Auckland on Friday February 27th, 2015. OWASP New Zealand Day is a one-day conference dedicated to application security, with an emphasis on secure architecture and development techniques to help Kiwi developers build more secure applications.&lt;br /&gt;
&lt;br /&gt;
Similar to last year:&lt;br /&gt;
&lt;br /&gt;
* We will be offering training on the day before the conference (Thursday, 26th of February). &lt;br /&gt;
* After lunch on the conference day, we will split to two tracks - one focused on technical topics, the other on policy, compliance and risk management. &lt;br /&gt;
&lt;br /&gt;
The sixth OWASP New Zealand Day will be happening thanks to the support provided by the University of Auckland, which will kindly offer a slightly different location from the last five years. Entry to the event will, as in the past, be free.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For any comments, feedback or observations, please don't hesitate to contact [mailto:kim.carter@owasp.org?cc=adrian.hayes@owasp.org?cc=denis.andzakovic@owasp.org us].&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Registration==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Registration is not yet open. Please join our low volume [https://lists.owasp.org/mailman/listinfo/owasp-newzealand mailing list] to be notified when registration opens.&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Registration for the main conference day is now open: [https://registration.owasp.org.nz/ Conference Registration Here]&lt;br /&gt;
&lt;br /&gt;
There is no cost for the main conference day and lunch is provided. We do ask that if at any point you realise you cannot make it please cancel your registration to make room for others as spaces are limited.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Registration for the training session on the 26th is now closed due to being fully booked.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Registration is now closed.&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Important dates==&lt;br /&gt;
&lt;br /&gt;
* ''CFP &amp;amp; CFT submission deadline: 19th January 2015''&lt;br /&gt;
* ''Conference &amp;lt;!--and Training --&amp;gt;Registration deadline: 12th February 2015''&lt;br /&gt;
* Training Day date:          26th February 2015&lt;br /&gt;
* Conference Day date:           27th February 2015&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
For those of you booking flights, ensure you can be at the venue at 8:30am, the conference will end by 5:30pm however we will have post conference drinks at a local drinking establishment for those interested.&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Conference Venue==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
   &amp;lt;td&amp;gt;&lt;br /&gt;
The University of Auckland Engineering Department&amp;lt;br&amp;gt;&lt;br /&gt;
Engineering Building #401&amp;lt;br&amp;gt;&lt;br /&gt;
Room: Eng 1449&amp;lt;br&amp;gt;&lt;br /&gt;
Address: 20 Symonds Street&amp;lt;br&amp;gt;&lt;br /&gt;
Auckland&amp;lt;br&amp;gt;&lt;br /&gt;
New Zealand&amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.google.com/maps/place/Faculty+of+Engineering,+The+University+of+Auckland,+Auckland,+1010,+New+Zealand Map]&lt;br /&gt;
   &amp;lt;/td&amp;gt;&lt;br /&gt;
   &amp;lt;td&amp;gt;&lt;br /&gt;
[[Image:EngineeringBuilding401Web.JPG]] [[Image:RoomEng1449Web.JPG]]&lt;br /&gt;
   &amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Conference Sponsors==&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;bottom&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;[http://www.auckland.ac.nz/ https://www.owasp.org/images/8/82/University_of_Auckland_crest_small.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;bottom&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;[http://www.security.org.nz/NZISF_NZISForumContent.php https://www.owasp.org/images/5/5a/Nz_information_security_forum.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;ICT and Department of Information Systems and Operations Management&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Gold Sponsors:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[[File:INSOMNIA.PNG|center|300px|link=http://www.insomniasec.com/]]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[[File:Aurainfosec300px.jpg|center|300px|link=http://www.aurainfosec.com/]]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com https://www.owasp.org/images/4/41/SA_Logo_w_DD.gif]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.insomniasec.com Insomnia Security]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.aurasoftwaresecurity.co.nz Aura Information Security]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com www.security-assessment.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Silver Sponsors:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[[File:Beca.png|center|200px|link=http://www.beca.com/]]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[[File:Wynyard_CMYK_land.png|center|250px|link=https://www.wynyardgroup.com/]]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Support Sponsor:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[[File:BinaryMistLimited.png|center|150px|link=http://binarymist.net]]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Conference Committee==&lt;br /&gt;
&lt;br /&gt;
* Denis Andzakovic - OWASP New Zealand Leader (Auckland)&lt;br /&gt;
* Adrian Hayes -  OWASP New Zealand Leader (Wellington)&lt;br /&gt;
* Kim Carter -  OWASP New Zealand Leader (Christchurch)&lt;br /&gt;
* Lech Janczewski - Associate Professor - University of Auckland School of Business&lt;br /&gt;
&lt;br /&gt;
Please direct all enquiries to denis.andzakovic@owasp.org | adrian.hayes@owasp.org | kim.carter@owasp.org&lt;br /&gt;
&lt;br /&gt;
= Presentation Schedule=&lt;br /&gt;
==Presentations==&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
27th Feburary 2015&lt;br /&gt;
&amp;lt;table width=&amp;quot;80%&amp;quot;&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;08:30&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #8595C2; text-align: center&amp;quot;&amp;gt;Registration&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;   &lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;09:00&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Welcome to OWASP New Zealand Day 2015&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Lech Janczewski (Associate Professor), Adrian Hayes, Denis Andzakovic and Kim Carter (OWASP Leaders)&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;09:15&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #B9C2DC; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Applying OWASP Top 10 to ASP.NET MVC projects&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Kirk Jackson - Xero&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;10:00&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Integrity protection for third-party JavaScript&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Francois Marier - Mozilla&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;   &lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;10:30&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #D98B66; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Break for Morning Tea&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;   &lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;11:00&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Defaced - An insight into methodologies, tools and motivations&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Adam Bell - Lateral Security&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;11:30&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #B9C2DC; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;CMS Hell&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Pedro Worcel - Security Assessment&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;12:00&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Lazily Finding Holes Without Breaking The Law&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Nick von Dadelszen - Lateral Security&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;   &lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;12:30&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #D98B66; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Break for Lunch&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;   &lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;13:30&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;background-color: #B9C2DC; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Crypto 101 - A &amp;quot;no crazy maths&amp;quot; guide to crypto vulnerabilities&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Benjamin Kearns - Lateral Security&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;background-color: #B9C2DC; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Securing the Cloud to the Internet of Things&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Aloysius Cheang - Cloud Security Alliance&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;14:00&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;background-color: #EEE; ; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;PHP Magic Tricks: Type Juggling&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Chris Smith - Insomnia Security&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;background-color: #EEE; ; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Joined up PCI DSS : A systematic approach to PCI DSS v3 compliance&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Chris Esther - Confide Ltd&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;14:30&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;background-color: #B9C2DC; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Surprise Features in Your Favourite Framework&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Andrew Kampjes - nil and Mike Haworth - Aura&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;   &lt;br /&gt;
		&amp;lt;td style=&amp;quot;background-color: #B9C2DC; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Security among those who keep your secrets: comparing&amp;lt;br /&amp;gt;&lt;br /&gt;
			security in a top competitive intelligence services&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Carlos Cordero&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;15:00&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;background-color: #EEE; ; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Thinking Securely: Practical Advice for Developers&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Jamie Anderson - SafeStack&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;background-color: #EEE; ; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Handling Vulnerability Disclosure in New Zealand&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;James Healy - Stoic Ltd and SafeStack&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;   &lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;15:30&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #D98B66; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Break for Afternoon Tea&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;16:00&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;The Fall and Rise of InfoSec&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Andrew Kelly - Insomnia Security&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;16:45&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #B9C2DC; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Wrap Up&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Time for the pub, for those interested&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Speakers List=&lt;br /&gt;
==Speakers List==&lt;br /&gt;
&lt;br /&gt;
===Kirk Jackson - Xero - Applying OWASP Top 10 to ASP.NET MVC projects===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
What's the OWASP Top 10, and how do we defend against those threats? Advances in web platforms and frameworks make it easier to defend against common web attacks. By introducing the defences available in ASP.NET MVC we'll see how we can make our lives easier (and more secure!).&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Kirk Jackson is Security Officer at Xero, and has presented at previous OWASP, Kiwicon and other developer conferences.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Francois Marier - Mozilla -  Integrity protection for third-party JavaScript===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Modern web applications depend on a lot of auxiliary scripts which are often hosted on third-party CDNs. Should an attacker be able to tamper with the files hosted on such a CDN, millions of sites could be compromised. Web developers need a way to guarantee the integrity of scripts hosted elsewhere.&lt;br /&gt;
&lt;br /&gt;
This is the motivation behing a new addition to the web platform being introduced by the W3C: sub-resource integrity (http://www.w3.org/TR/SRI/). Both Firefox and Chrome have initial implementations of this new specification and a few early adopters are currently evaluating this feature.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Francois is a senior software engineer in the Mozilla Security &amp;amp; Privacy team where he spends his time working on new ways to protect Firefox users. By night, he contributes to Debian and other free software projects.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Adam Bell - Lateral Security - Defaced: An insight into methodologies, tools and motivations===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;quot;The internet is a hostile place, particularly if you are a charitable organisation.&lt;br /&gt;
&lt;br /&gt;
Websites are compromised and defaced on a daily basis and sometimes their owners need a little help getting to the bottom of what happened. &lt;br /&gt;
&lt;br /&gt;
So what if your website has been compromised and is getting reports of abuse... How do you react? What can you do?&lt;br /&gt;
&lt;br /&gt;
This talk will cover a recent incident response and investigation I carried out and describe how you, as the developer-in-charge of an all-in-one webhost can investigate and respond. &lt;br /&gt;
&lt;br /&gt;
Based on a true story,  this talk will describe the incident response methodology I used, take a look at some of the tools that the defacer had left behind and give an insight into the badguys mindset and motives.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Adam Bell once ate a jam sandwich. He lives in Auckland with his newly spawned hacker progeny and fears the day she learns to pop shell. By day he is a security consultant for a prominent boutique security company, by night he tries to remember what sleep is.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Pedro Worcel - Security-Assessment.com - CMS Hell===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
We all know about Wordpress and its (in)security. What about other CMSes? What about NZ made ones?&lt;br /&gt;
&lt;br /&gt;
Introducing 'droopescan', a plugin-based tool for scanning CMSs. In this&lt;br /&gt;
talk we will see its effectiveness in identifying versions and plugins,&lt;br /&gt;
and we will see how the landscape looks like for installations of two&lt;br /&gt;
CMSs (Drupal &amp;amp; SilverStripe) in New Zealand.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Pedro is a security researcher for Security-Assessment.com, with more than five years of experience in IT. I have a strong background on web applications, and generally enjoy building and hacking software of all kinds.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Nick von Dadelszen - Lateral Security - Lazily Finding Holes Without Breaking The Law===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Why risk actively testing for security vulnerabilities in websites when a large amount of vulnerabilities can be passively found? Based on an event where a major security issue was found in a potential client's site just through passive browsing during a scoping exercise, we thought, why not always be scanning? So, enter some dodgy nickvd style code and quick fixes, a little more polished code from feabell, and you have a system that is continuously passively scanning everything you browse. The vulnerabilities just come to you. This is the true lazyman's way to find vulnerabilities, and could be used to check a large number of sites for some common issues in a quick and painless manner.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A regular in the NZ security industry, Nick has now clocked up his 15th year of penetration testing. With a full security team at Lateral Security to keep in check, his time is now more commonly spent in meetings and reviewing reports. However, he still loves to jump in and get his hands dirty, especially when it is something new and interesting. Origin: New Zealand&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Benjamin Kearns - Lateral Security - Crypto 101: A &amp;quot;no crazy maths&amp;quot; guide to crypto vulnerabilities===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
While less common that other types of security vulnerabilities encryption flaws can often have a very high impact. Some big applications, hardware and frameworks have been vulnerable to simple encryption flaws in recent years. &lt;br /&gt;
&lt;br /&gt;
This talk with run you through a variety of crypto flaws which we've observed in web and mobile applications over the last couple of years.&lt;br /&gt;
&lt;br /&gt;
It will show you how to exploit them and discuss how to protect yourself.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Ben works as a Security Consultant for Lateral Security. He has two and a half years of security experience which is backed by a further five years of IT experience, primarily spent developing web applications and administering Linux systems.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Chris Smith - Insomnia Security - PHP Magic Tricks: Type Juggling===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
PHP is a magical language! Unfortunately, magic leads to unexpected behaviour and unexpected behaviour leads to security bugs. This talk will go over a specific magic trick that PHP performs as a loosely- and dynamically-typed language.&lt;br /&gt;
&lt;br /&gt;
The trick is type juggling, a set of rules that PHP enacts when trying to compare different types together. Given the different possible ways you might want to compare different data, you'd expect there to be some unexpected behaviour in there. You'd be right. And, given the importance of the comparison operator for enforcing security controls, you'd expect that to lead to some tasty bugs. You'd be right.&lt;br /&gt;
&lt;br /&gt;
You will be introduced to PHP's various type juggling rules and how you might want to exploit them in security-critical areas of modern applications. We'll also look at a few publicized bugs that exploit this functionality and then finish off on how you can avoid exposing yourself to these issues. It'll be as easy as 'abc' == 0, I promise.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Chris is a consultant for Insomnia Security where he breaks other peoples stuff and writes reports about it. Previously a Linux sysadmin and polyglot developer, he now exacts his revenge on technologies that have wronged him.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Andrew Kampjes and Mike Haworth - nil and Aura - Surprise Features in Your Favourite Framework===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Modern web frameworks allow developers to be productive, however they are feature rich and not every feature is well understood. Some of these features can work in unexpected ways and can be leveraged by attackers. This talk will look at some of the gotchas in popular frameworks. We'll also look at the ways popular features such as social logins can go wrong.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Andrew Kampjes enjoys getting under the hood of Rails and playing with its quirks. He also gets a sick satisfaction finding security flaws in other’s code.&lt;br /&gt;
&lt;br /&gt;
Mike Haworth is a Principal Security Consultant for AuraInfoSec, he spends his days doing everything from Red Team engagements to Code Reviews.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Jamie Anderson - SafeStack - Thinking Securely: Practical Advice for Developers===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If there’s one lesson that we can learn from 2014, it’s that security needs to become a priority for any web-based application. The challenge for developers is that they don’t think the same way that security professional do. They don’t see the holes until it’s too late.&lt;br /&gt;
&lt;br /&gt;
As someone who has experienced both sides of the story, I have found a few ways to help to bridge this gap. In this talk I will share my story as well as a few tips and tricks I've learned along the way so that developers like me can think more securely and  write more secure software.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Jamie has spent a decade and a half writing software, ranging from desktop software to back-end services to web-based applications. He has recently joined the information security community and is now a secure development specialist for SafeStack.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Andrew Kelly - Insomnia Security Group Ltd - The Fall and Rise of InfoSec===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A talk with a beginning, a middle ... and a 'will it ever end?' at the end. A light-hearted, albeit with a serious message somewhere, skip and jump through three decades of collected wisdom and anecdotes on the 'fall' of InfoSec with the rise of viruses, worms, etc., in the 80's and 90's - and its subsequent 'rise' again in the 2000's due to hacking and similar nefarious activities now being 'accepted' as mainstream. Changing attitudes in the last 30 years - but not changes in music and fashion - will be covered; alongside some ideas on how you can use such changes to your advantage in your own careers and/or organisations. All this by a man who (he claims) has done the hard yards: All nine of them!&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Andrew is the Operations Manager for Insomnia Security, and a man in the twilight years of his working life. 2015 marks his 27th in Computer Security, Data Security, IT Security, Cyber Security and/or Information Security (and his 30th in IT), and he reckons he's fogotten more than he ever knew about most things - including InfoSec. Andrew now spends most of the short ime left to him now reminiscing about the old days, wallowing in past glories ... and wondering why kids today just don't understand.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Aloysius Cheang - Cloud Security Alliance - Securing the Cloud to the Internet of Things===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
CSA's Software Defined Perimeter (SDP), a next generation security architecture for virtual private clouds, hardened SaaS, BYOD and Internet of Things (IOT), is explained. CSA is disrupting network security by making networks dark and adapting innovations from top secret systems. We will deep dive into the reference architecture, review enterprise implementations and discuss the future of SDP and IOT through the looking glass of the CSA.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Aloysius Cheang is Managing Director APAC of Cloud Security Alliance. He also heads up the Standards Secretariat. Aloysius brings to the CSA extensive experience gained from running business units and multi-million enterprise security and technology programs for Global 500 organizations worldwide in his previous roles as a global CSO for a leading Telco and as APAC practice leaders for leading management consulting firms. He is an active community leader, having founded and mentored various information security projects, forums, groups and associations in Singapore and globally. He is also active in standardization and was most recently a co-editor for ISO/IEC 27032 “Guidelines for Cybersecurity”. Aloysius holds a B. Sc (Hons) and Master’s degrees in Computer Science from the National University of Singapore with professional certifications such as CISA, CISSP and GCIH. His views are valued by global media such as Times, Wall Street Journal and CIO Magazine as a trusted independent source of specialist opinion over the last 15 years.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Chris Esther - Confide Ltd - Joined up PCI DSS : A systematic approach to PCI DSS v3 compliance===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In this presentation I will eschew the list of requirements approach to&lt;br /&gt;
compliance and will reframe the PCI DSS using a systems approach to&lt;br /&gt;
provide a holistic view of its requirements.&lt;br /&gt;
The key processes and their linkages will be identified, including:&lt;br /&gt;
* Scoping&lt;br /&gt;
* Vulnerability management&lt;br /&gt;
* Configuration management&lt;br /&gt;
* Change management&lt;br /&gt;
* Development&lt;br /&gt;
* Testing&lt;br /&gt;
Similarly the core information required by PCI DSS will be identified&lt;br /&gt;
and relationships between them discussed, including:&lt;br /&gt;
* Cardholder data flow diagram&lt;br /&gt;
* Network diagram&lt;br /&gt;
* Configuration Management Database&lt;br /&gt;
If you are new to PCI DSS it should provide a solid foundation for&lt;br /&gt;
understanding it. For those already being embraced by PCI DSS it may&lt;br /&gt;
provide another perspective that should help when managing the increased&lt;br /&gt;
evidential requirements of PCI DSS V3.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Developer background, qualified lawyer, QSA. Currently providing advisory and compliance services to commercial and government organisations focusing on PCI DSS and privacy.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Carlos Cordero - Security among those who keep your secrets: comparing security in a top competitive intelligence services===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Firm A is the Latin American equivalent of IDC, Gartner, or Forrester but Peruvian. Firm B started&lt;br /&gt;
as a top New Zealand market research firm and is not part of a top 5 multinational market research&lt;br /&gt;
corporation. Both companies provide research services to enterprise corporations, Firm A to&lt;br /&gt;
practically every well know IT vendor which operates in Latin America and Firm B to New Zealand&lt;br /&gt;
and Australian corporation in the Financial, FMCG, Telecom, Media, and other critical industries.&lt;br /&gt;
Therefore, both firms hold commercially sensitive information about the goals, intentions, activities,&lt;br /&gt;
and plans of their clients. Both also have contracts with some of said clients to protect such&lt;br /&gt;
information.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Carlos is a commercial and intelligence practitioner in the IT industry and a full member of the IITP despite not having a computer science degree but a business management one.  Prior to New Zealand, founding partner of an intelligence firm which counts as clients vendors such as Microsoft, Intel, Oracle, IBM, HP, Dell, Telefonica, Telmex, AT&amp;amp;T, Siemens, to name a few.  Also was an elected leader of the Peruvian equivalent to NZ Tech.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===James Healy - Stoic Limited, apprentice at SafeStack - Handling Vulnerability Disclosure in New Zealand===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
As a security researcher, reporting security issues to businesses and organisations can sometimes get dicey. As a company you need a disclosure policy in place, and a plan for what happens post-disclosure.. Especially if you've just had your private emails and photo's from 2011's Christmas do (oh dear..) posted on Twitter. This talk applies to companies of all sizes and addresses planning, right through to patching and publication.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
James researched malware and packers during his teen years before moving onto web application security and development. For the past year he's been a C# developer at CourierPost and recently started an apprenticeship at SafeStack. He's also a freelance developer pretending to be from a large company called Stoic Ltd when in fact it's just him making websites. He enjoys beer and coffee. You should probably buy him one of those. James is also a little weirded out writing a bio in third-person.&lt;br /&gt;
&lt;br /&gt;
= Training Day =&lt;br /&gt;
==Training Day==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We are happy to announce that training will run on Thursday the 26th of February 2015, the day before the OWASP Day conference. The courses will be running from 9:00 AM sharp to 5:00PM. The training venues will be auditoriums kindly provided by the University of Auckland, in the same building as the OWASP Day conference itself. Due to popular demand, we are now sold out! &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Cost: '''$380 USD''' (roughly $500 NZD) per person.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Details are as follows:&lt;br /&gt;
&lt;br /&gt;
===Training Abstract - Bootstrapping Agile Security===&lt;br /&gt;
&lt;br /&gt;
Agile development is often seen as a delicate balance of ritual and roles allowing for rapid development, continuous deployment and the expansion of the post-it note industry. Security is often seen as a lumbering giant of process, governance and technology allowing for increased control, reduced risk and the expansion of the technology vendor industry.&lt;br /&gt;
&lt;br /&gt;
What if you could merge the two?&lt;br /&gt;
&lt;br /&gt;
The world of security is changing to meet the needs of agile software development. Organisations around the world are coming up with tools, techniques and processes to make security a continuous presence to support developers. This hands on, fast-paced course will not only give students a solid grounding in how to bring security into agile software development life-cycles, but also give a range of tools, techniques and practical skills to make it happen. &lt;br /&gt;
&lt;br /&gt;
===Trainer Bio - Laura Bell===&lt;br /&gt;
&lt;br /&gt;
Laura Bell is the founder and lead consultant at SafeStack, a specialist New Zealand agile security firm. With almost a decade of experience in software development and information security, Laura specialises in bringing security practices and culture into organisations of every shape and size. Her recent research into agile security practices has generated a set of tools and processes that can enable the management of security risk without compromising innovation or speed.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Registration===&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--If you are interested in registering for the training session please email [mailto:adrian.hayes@owasp.org?cc=denis.andzakovic@owasp.org&amp;amp;cc=kim.carter@owasp.org adrian.hayes@owasp.org.nz, denis.andzakovic@owasp.org, and kim.carter@owasp.org] and let us know who you would like to attend.--&amp;gt;&lt;br /&gt;
Is now closed.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- = Call For Presentations =&lt;br /&gt;
==Call For Presentations==&lt;br /&gt;
&lt;br /&gt;
OWASP New Zealand Day conferences attract a high quality of speakers from a variety of security disciplines including&lt;br /&gt;
architects, web developers and engineers, system administrators, penetration testers, policy specialists and more.&lt;br /&gt;
We encourage presentations to have a strong component on fixing and prevention of security issues. We are looking for presentations on a wide variety of security topics,&lt;br /&gt;
including but not limited to:&lt;br /&gt;
&lt;br /&gt;
* Web application security&lt;br /&gt;
* Mobile security&lt;br /&gt;
* Secure development&lt;br /&gt;
* Vulnerability analysis&lt;br /&gt;
* Threat modelling&lt;br /&gt;
* Threat and vulnerability countermeasures&lt;br /&gt;
* Platform or language security (JavaScript, .NET, Java, RoR, etc)&lt;br /&gt;
* Penetration Testing&lt;br /&gt;
* Browser and client security&lt;br /&gt;
* Application and solution architecture security&lt;br /&gt;
* PCI DSS&lt;br /&gt;
* Risk management&lt;br /&gt;
* Security concepts for C*Os, project managers and other non-technical attendees&lt;br /&gt;
* Privacy controls&lt;br /&gt;
&lt;br /&gt;
The email subject must be &amp;quot;OWASP New Zealand 2015: CFP&amp;quot; and the email body must contain the following information/sections:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name and Surname&lt;br /&gt;
* Affiliation&lt;br /&gt;
* Telephone number&lt;br /&gt;
* Email address&lt;br /&gt;
* Short presenter bio&lt;br /&gt;
* Title of the contribution&lt;br /&gt;
* Type of contribution: Technical, Informative, Management&lt;br /&gt;
* Short abstract (up to 500 words)&lt;br /&gt;
* List of the author's previous papers/articles/speeches on the same/similar topic (if any)&lt;br /&gt;
* If you are not from New Zealand, will your company support your travel/accommodation costs? - Yes/No&lt;br /&gt;
&lt;br /&gt;
The submission will be reviewed by the OWASP New Zealand Day conference committee and the highest voted talks will be selected and invited for presentation.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
PLEASE NOTE:&lt;br /&gt;
&lt;br /&gt;
* Due to limited budget available, expenses for international speakers cannot be covered.&lt;br /&gt;
* If your company is willing to cover travel and accommodation costs, the company will become &amp;quot;Support Sponsor&amp;quot; of the event.&lt;br /&gt;
&lt;br /&gt;
Please submit the above information to all of the following: Denis Andzakovic (denis.andzakovic@owasp.org), Adrian Hayes (adrian.hayes@owasp.org) and Kim Carter (kim.carter@owasp.org).&lt;br /&gt;
&lt;br /&gt;
Submissions deadline: 19th January 2015&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Call For Trainers =&lt;br /&gt;
== Call For Trainers ==&lt;br /&gt;
&lt;br /&gt;
We are happy to announce that training will run on Thursday February 26th 2015, the day before the OWASP Day conference.&lt;br /&gt;
The training venues will be auditoriums kindly provided by the University of Auckland, in the same building as the OWASP Day conference itself.&lt;br /&gt;
Classes will contain up to 20 students, and each seat has power for laptop usage. A wide range of half-day or full-day training proposals will be considered,&lt;br /&gt;
see the Call for Papers for a list of example topics.&lt;br /&gt;
&lt;br /&gt;
If you are interested in running one of the training sessions, please contact Denis Andzakovic, Adrian Hayes and Kim Carter with the following information:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Trainer name&lt;br /&gt;
* Trainer organisation&lt;br /&gt;
* Telephone + email contact&lt;br /&gt;
* Short Trainer bio&lt;br /&gt;
* Training title&lt;br /&gt;
* Trainer requirements (e.g. a projector, whiteboard, etc)&lt;br /&gt;
* Trainee requirements (e.g. laptop, VMWare/Virtualbox, etc)&lt;br /&gt;
* Training summary (less than 500 words)&lt;br /&gt;
* Target audience (e.g. testers, project managers, security managers, web developers, architects)&lt;br /&gt;
* Skill level required (Basic / Intermediate / Advanced)&lt;br /&gt;
* What attendees can expect to learn (key objectives)&lt;br /&gt;
* Short course outline&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The fixed price per head for training will be $250 for a half-day session and $500 for a whole-day session. As this training is part of an OWASP event, part of the proceeds go back to OWASP. The split is as follows:&lt;br /&gt;
&lt;br /&gt;
* 25% to OWASP Global - used for OWASP projects around the world&lt;br /&gt;
* 25% to OWASP NZ Day - used for expenses such as catering during the conference&lt;br /&gt;
* 50% to the training provider.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Please submit the above information to all of the following:&lt;br /&gt;
* Denis Andzakovic (denis.andzakovic@owasp.org)&lt;br /&gt;
* Adrian Hayes (adrian.hayes@owasp.org)&lt;br /&gt;
* Kim Carter (kim.carter@owasp.org).&lt;br /&gt;
&lt;br /&gt;
Submissions deadline: 19th January 2015&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Call For Sponsorships =&lt;br /&gt;
==Call For Sponsorships==&lt;br /&gt;
&lt;br /&gt;
OWASP New Zealand Day 2015 will be held in Auckland on the 27th of February, 2015 and is a security conference entirely dedicated to application security.&lt;br /&gt;
The conference is once again being hosted by the University of Auckland with their support and assistance.&lt;br /&gt;
OWASP New Zealand Day 2015 is a free event, but requires sponsor support to help be an instructive and quality event for the New Zealand community.&lt;br /&gt;
OWASP is strictly not for profit. The sponsorship money will be used to help make OWASP New Zealand Day 2015 a free, compelling, and valuable experience for all attendees.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The sponsorship funds collected are to be used for things such as:&lt;br /&gt;
&lt;br /&gt;
* Refreshments (coffee break/lunch) - we want to keep people refreshed during the day; while we certainly bring good and interesting speakers, we don't want people to go home when they become hungry. &lt;br /&gt;
* Name tags - we feel that getting to know people within the New Zealand community is important, and name tags make that possible.&lt;br /&gt;
* Promotion - up to now our events are propagating by word of mouth. We would like to get to a wider audience by advertising our events.&lt;br /&gt;
* Printed Materials - printed materials will include brochures, tags and lanyards.&lt;br /&gt;
&lt;br /&gt;
== Facts ==&lt;br /&gt;
&lt;br /&gt;
In 2013, the event was supported by six sponsors and attracted more than 250 participants. Plenty of constructive (and positive!) feedback from the audience was received and we are using this to make the conference more appealing to more people. For more information on the last New Zealand Day event, please visit: https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2013&lt;br /&gt;
&lt;br /&gt;
The OWASP New Zealand community is strong, this year has Christchurch as a new region and there are more than 360 people currently subscribed to the mailing-list. OWASP New Zealand Day is expected to attract between 250 and 300 attendees this year.&lt;br /&gt;
&lt;br /&gt;
OWASP regular attendees are IT project managers, IT security managers, IT security consultants, web application architects and developers, QA managers, QA testers and system administrators.&lt;br /&gt;
&lt;br /&gt;
== Sponsorships  ==&lt;br /&gt;
&lt;br /&gt;
There are three different levels of sponsorships for the OWASP Day event:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Support Sponsorship&amp;lt;/b&amp;gt;: (Covering international speaker travel expenses, media coverage/article/promotion of the event)&lt;br /&gt;
   &lt;br /&gt;
Includes:&lt;br /&gt;
&lt;br /&gt;
* Publication of the sponsor logo on the event web site - https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2015&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Silver Sponsorship&amp;lt;/b&amp;gt;: 1500 NZD&lt;br /&gt;
&lt;br /&gt;
Includes: &lt;br /&gt;
&lt;br /&gt;
* Publication of the sponsor logo on the event web site - https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2015&lt;br /&gt;
* The publication of the sponsor logo on the event site, in the agenda, on the handouts and in all the official communications with the attendees at the conference.&lt;br /&gt;
* The possibility to distribute the company brochures, CDs or other materials to the participants during the event.&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Gold Sponsorship&amp;lt;/b&amp;gt;: 2750 NZD&lt;br /&gt;
&lt;br /&gt;
Includes: &lt;br /&gt;
&lt;br /&gt;
* The possibility to have a promotional banner or sign side stage in the main auditorium (to be provided by the sponsor, size subject to approval by the OWASP NZ Day Committee).&lt;br /&gt;
* The publication of the sponsor logo on the event site, in the agenda, on the handouts and in all the official communications with the attendees at the conference.&lt;br /&gt;
* The possibility to distribute the company brochures, CDs or other materials to the participants during the event.&lt;br /&gt;
* Publication of the sponsor logo on the OWASP New Zealand Chapter page - Sponsor logo on the OWASP NZ site prior and during the OWASP Day event - https://www.owasp.org/index.php/New_Zealand&lt;br /&gt;
* Publication of the sponsor logo on the event web site - https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2015&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Those who are interested in sponsoring OWASP New Zealand 2015 Conference can contact the [mailto:kim.carter@owasp.org?cc=adrian.hayes@owasp.org?cc=denis.andzakovic@owasp.org OWASP New Zealand Board].&amp;lt;br&amp;gt;&lt;br /&gt;
 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]]&lt;/div&gt;</summary>
		<author><name>Adrian Hayes</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_New_Zealand_Day_2015&amp;diff=190300</id>
		<title>OWASP New Zealand Day 2015</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_New_Zealand_Day_2015&amp;diff=190300"/>
				<updated>2015-02-25T19:44:08Z</updated>
		
		<summary type="html">&lt;p&gt;Adrian Hayes: /* Presentations */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2015 https://www.owasp.org/images/9/94/New_Zealand_Day_2015_020.png]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''26th and 27th Feburary 2015 - Auckland'''&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
= Introduction =&lt;br /&gt;
==Introduction==&lt;br /&gt;
We are proud to announce the sixth OWASP New Zealand Day conference, to be held at the University of Auckland on Friday February 27th, 2015. OWASP New Zealand Day is a one-day conference dedicated to application security, with an emphasis on secure architecture and development techniques to help Kiwi developers build more secure applications.&lt;br /&gt;
&lt;br /&gt;
Similar to last year:&lt;br /&gt;
&lt;br /&gt;
* We will be offering training on the day before the conference (Thursday, 26th of February). &lt;br /&gt;
* After lunch on the conference day, we will split to two tracks - one focused on technical topics, the other on policy, compliance and risk management. &lt;br /&gt;
&lt;br /&gt;
The sixth OWASP New Zealand Day will be happening thanks to the support provided by the University of Auckland, which will kindly offer a slightly different location from the last five years. Entry to the event will, as in the past, be free.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For any comments, feedback or observations, please don't hesitate to contact [mailto:kim.carter@owasp.org?cc=adrian.hayes@owasp.org?cc=denis.andzakovic@owasp.org us].&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Registration==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Registration is not yet open. Please join our low volume [https://lists.owasp.org/mailman/listinfo/owasp-newzealand mailing list] to be notified when registration opens.&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Registration for the main conference day is now open: [https://registration.owasp.org.nz/ Conference Registration Here]&lt;br /&gt;
&lt;br /&gt;
There is no cost for the main conference day and lunch is provided. We do ask that if at any point you realise you cannot make it please cancel your registration to make room for others as spaces are limited.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Registration for the training session on the 26th is now closed due to being fully booked.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Registration is now closed.&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Important dates==&lt;br /&gt;
&lt;br /&gt;
* ''CFP &amp;amp; CFT submission deadline: 19th January 2015''&lt;br /&gt;
* ''Conference &amp;lt;!--and Training --&amp;gt;Registration deadline: 12th February 2015''&lt;br /&gt;
* Training Day date:          26th February 2015&lt;br /&gt;
* Conference Day date:           27th February 2015&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
For those of you booking flights, ensure you can be at the venue at 8:30am, the conference will end by 5:30pm however we will have post conference drinks at a local drinking establishment for those interested.&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Conference Venue==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
   &amp;lt;td&amp;gt;&lt;br /&gt;
The University of Auckland Engineering Department&amp;lt;br&amp;gt;&lt;br /&gt;
Engineering Building #401&amp;lt;br&amp;gt;&lt;br /&gt;
Room: Eng 1449&amp;lt;br&amp;gt;&lt;br /&gt;
Address: 20 Symonds Street&amp;lt;br&amp;gt;&lt;br /&gt;
Auckland&amp;lt;br&amp;gt;&lt;br /&gt;
New Zealand&amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.google.com/maps/place/Faculty+of+Engineering,+The+University+of+Auckland,+Auckland,+1010,+New+Zealand Map]&lt;br /&gt;
   &amp;lt;/td&amp;gt;&lt;br /&gt;
   &amp;lt;td&amp;gt;&lt;br /&gt;
[[Image:EngineeringBuilding401Web.JPG]] [[Image:RoomEng1449Web.JPG]]&lt;br /&gt;
   &amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Conference Sponsors==&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;bottom&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;[http://www.auckland.ac.nz/ https://www.owasp.org/images/8/82/University_of_Auckland_crest_small.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;bottom&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;[http://www.security.org.nz/NZISF_NZISForumContent.php https://www.owasp.org/images/5/5a/Nz_information_security_forum.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;ICT and Department of Information Systems and Operations Management&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Gold Sponsors:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[[File:INSOMNIA.PNG|center|300px|link=http://www.insomniasec.com/]]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[[File:Aurainfosec300px.jpg|center|300px|link=http://www.aurainfosec.com/]]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com https://www.owasp.org/images/4/41/SA_Logo_w_DD.gif]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.insomniasec.com Insomnia Security]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.aurasoftwaresecurity.co.nz Aura Information Security]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com www.security-assessment.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Silver Sponsors:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[[File:Beca.png|center|200px|link=http://www.beca.com/]]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[[File:Wynyard_CMYK_land.png|center|250px|link=https://www.wynyardgroup.com/]]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Support Sponsor:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[[File:BinaryMistLimited.png|center|150px|link=http://binarymist.net]]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Conference Committee==&lt;br /&gt;
&lt;br /&gt;
* Denis Andzakovic - OWASP New Zealand Leader (Auckland)&lt;br /&gt;
* Adrian Hayes -  OWASP New Zealand Leader (Wellington)&lt;br /&gt;
* Kim Carter -  OWASP New Zealand Leader (Christchurch)&lt;br /&gt;
* Lech Janczewski - Associate Professor - University of Auckland School of Business&lt;br /&gt;
&lt;br /&gt;
Please direct all enquiries to denis.andzakovic@owasp.org | adrian.hayes@owasp.org | kim.carter@owasp.org&lt;br /&gt;
&lt;br /&gt;
= Presentation Schedule=&lt;br /&gt;
==Presentations==&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
27th Feburary 2015&lt;br /&gt;
&amp;lt;table width=&amp;quot;80%&amp;quot;&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;08:30&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #8595C2; text-align: center&amp;quot;&amp;gt;Registration&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;   &lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;09:00&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Welcome to OWASP New Zealand Day 2015&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Lech Janczewski (Associate Professor), Adrian Hayes, Denis Andzakovic and Kim Carter (OWASP Leaders)&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;09:15&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #B9C2DC; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Applying OWASP Top 10 to ASP.NET MVC projects&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Kirk Jackson - Xero&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;10:00&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Integrity protection for third-party JavaScript&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Francois Marier - Mozilla&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;   &lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;10:30&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #D98B66; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Break for Morning Tea&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;   &lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;11:00&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Defaced - An insight into methodologies, tools and motivations&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Adam Bell - Lateral Security&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;11:30&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #B9C2DC; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;CMS Hell&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Pedro Worcel - Security Assessment&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;12:00&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Lazily Finding Holes Without Breaking The Law&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Nick von Dadelszen - Lateral Security&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;   &lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;12:30&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #D98B66; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Break for Lunch&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;   &lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;13:30&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;background-color: #B9C2DC; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Crypto 101 - A &amp;quot;no crazy maths&amp;quot; guide to crypto vulnerabilities&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Benjamin Kearns - Lateral Security&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;background-color: #B9C2DC; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Securing the Cloud to the Internet of Things&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Aloysius Cheang - Cloud Security Alliance&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;14:00&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;background-color: #EEE; ; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;PHP Magic Tricks: Type Juggling&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Chris Smith - Insomnia Security&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;background-color: #EEE; ; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Joined up PCI DSS : A systematic approach to PCI DSS v3 compliance&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Chris Esther - Confide Ltd&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;14:30&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;background-color: #B9C2DC; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Surprise Features in Your Favourite Framework&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Andrew Kampjes - nil and Mike Haworth - Aura&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;   &lt;br /&gt;
		&amp;lt;td style=&amp;quot;background-color: #B9C2DC; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Security among those who keep your secrets: comparing&amp;lt;br /&amp;gt;&lt;br /&gt;
			security in a top competitive intelligence services&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Carlos Cordero&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;15:00&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;background-color: #EEE; ; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Thinking Securely: Practical Advice for Developers&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Jamie Anderson - SafeStack&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;background-color: #EEE; ; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Handling Vulnerability Disclosure in New Zealand&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;James Healy - Stoic Ltd and SafeStack&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;   &lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;15:30&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #D98B66; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Break for Afternoon Tea&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;16:00&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;The Fall and Rise of InfoSec&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Andrew Kelly - Insomnia Security&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;16:45&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #B9C2DC; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Wrap Up&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Time for the pub, for those interested&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Speakers List=&lt;br /&gt;
==Speakers List==&lt;br /&gt;
&lt;br /&gt;
===Kirk Jackson - Xero - Applying OWASP Top 10 to ASP.NET MVC projects===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
What's the OWASP Top 10, and how do we defend against those threats? Advances in web platforms and frameworks make it easier to defend against common web attacks. By introducing the defences available in ASP.NET MVC we'll see how we can make our lives easier (and more secure!).&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Kirk Jackson is Security Officer at Xero, and has presented at previous OWASP, Kiwicon and other developer conferences.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Francois Marier - Mozilla -  Integrity protection for third-party JavaScript===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Modern web applications depend on a lot of auxiliary scripts which are often hosted on third-party CDNs. Should an attacker be able to tamper with the files hosted on such a CDN, millions of sites could be compromised. Web developers need a way to guarantee the integrity of scripts hosted elsewhere.&lt;br /&gt;
&lt;br /&gt;
This is the motivation behing a new addition to the web platform being introduced by the W3C: sub-resource integrity (http://www.w3.org/TR/SRI/). Both Firefox and Chrome have initial implementations of this new specification and a few early adopters are currently evaluating this feature.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Francois is a senior software engineer in the Mozilla Security &amp;amp; Privacy team where he spends his time working on new ways to protect Firefox users. By night, he contributes to Debian and other free software projects.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Adam Bell - Lateral Security - Defaced: An insight into methodologies, tools and motivations===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;quot;The internet is a hostile place, particularly if you are a charitable organisation.&lt;br /&gt;
&lt;br /&gt;
Websites are compromised and defaced on a daily basis and sometimes their owners need a little help getting to the bottom of what happened. &lt;br /&gt;
&lt;br /&gt;
So what if your website has been compromised and is getting reports of abuse... How do you react? What can you do?&lt;br /&gt;
&lt;br /&gt;
This talk will cover a recent incident response and investigation I carried out and describe how you, as the developer-in-charge of an all-in-one webhost can investigate and respond. &lt;br /&gt;
&lt;br /&gt;
Based on a true story,  this talk will describe the incident response methodology I used, take a look at some of the tools that the defacer had left behind and give an insight into the badguys mindset and motives.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Adam Bell once ate a jam sandwich. He lives in Auckland with his newly spawned hacker progeny and fears the day she learns to pop shell. By day he is a security consultant for a prominent boutique security company, by night he tries to remember what sleep is.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Pedro Worcel - Security-Assessment.com - CMS Hell===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
We all know about Wordpress and its (in)security. What about other CMSes? What about NZ made ones?&lt;br /&gt;
&lt;br /&gt;
Introducing 'droopescan', a plugin-based tool for scanning CMSs. In this&lt;br /&gt;
talk we will see its effectiveness in identifying versions and plugins,&lt;br /&gt;
and we will see how the landscape looks like for installations of two&lt;br /&gt;
CMSs (Drupal &amp;amp; SilverStripe) in New Zealand.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Pedro is a security researcher for Security-Assessment.com, with more than five years of experience in IT. I have a strong background on web applications, and generally enjoy building and hacking software of all kinds.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Nick von Dadelszen - Lateral Security - Lazily Finding Holes Without Breaking The Law===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Why risk actively testing for security vulnerabilities in websites when a large amount of vulnerabilities can be passively found? Based on an event where a major security issue was found in a potential client's site just through passive browsing during a scoping exercise, we thought, why not always be scanning? So, enter some dodgy nickvd style code and quick fixes, a little more polished code from feabell, and you have a system that is continuously passively scanning everything you browse. The vulnerabilities just come to you. This is the true lazyman's way to find vulnerabilities, and could be used to check a large number of sites for some common issues in a quick and painless manner.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A regular in the NZ security industry, Nick has now clocked up his 15th year of penetration testing. With a full security team at Lateral Security to keep in check, his time is now more commonly spent in meetings and reviewing reports. However, he still loves to jump in and get his hands dirty, especially when it is something new and interesting. Origin: New Zealand&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Benjamin Kearns - Lateral Security - Crypto 101: A &amp;quot;no crazy maths&amp;quot; guide to crypto vulnerabilities===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
While less common that other types of security vulnerabilities encryption flaws can often have a very high impact. Some big applications, hardware and frameworks have been vulnerable to simple encryption flaws in recent years. &lt;br /&gt;
&lt;br /&gt;
This talk with run you through a variety of crypto flaws which we've observed in web and mobile applications over the last couple of years.&lt;br /&gt;
&lt;br /&gt;
It will show you how to exploit them and discuss how to protect yourself.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Ben works as a Security Consultant for Lateral Security. He has two and a half years of security experience which is backed by a further five years of IT experience, primarily spent developing web applications and administering Linux systems.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Chris Smith - Insomnia Security - PHP Magic Tricks: Type Juggling===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
PHP is a magical language! Unfortunately, magic leads to unexpected behaviour and unexpected behaviour leads to security bugs. This talk will go over a specific magic trick that PHP performs as a loosely- and dynamically-typed language.&lt;br /&gt;
&lt;br /&gt;
The trick is type juggling, a set of rules that PHP enacts when trying to compare different types together. Given the different possible ways you might want to compare different data, you'd expect there to be some unexpected behaviour in there. You'd be right. And, given the importance of the comparison operator for enforcing security controls, you'd expect that to lead to some tasty bugs. You'd be right.&lt;br /&gt;
&lt;br /&gt;
You will be introduced to PHP's various type juggling rules and how you might want to exploit them in security-critical areas of modern applications. We'll also look at a few publicized bugs that exploit this functionality and then finish off on how you can avoid exposing yourself to these issues. It'll be as easy as 'abc' == 0, I promise.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Chris is a consultant for Insomnia Security where he breaks other peoples stuff and writes reports about it. Previously a Linux sysadmin and polyglot developer, he now exacts his revenge on technologies that have wronged him.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Andrew Kampjes and Mike Haworth - nil and Aura - Surprise Features in Your Favourite Framework===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Modern web frameworks allow developers to be productive, however they are feature rich and not every feature is well understood. Some of these features can work in unexpected ways and can be leveraged by attackers. This talk will look at some of the gotchas in popular frameworks. We'll also look at the ways popular features such as social logins can go wrong.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Andrew Kampjes enjoys getting under the hood of Rails and playing with its quirks. He also gets a sick satisfaction finding security flaws in other’s code.&lt;br /&gt;
&lt;br /&gt;
Mike Haworth is a Principal Security Consultant for AuraInfoSec, he spends his days doing everything from Red Team engagements to Code Reviews.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Jamie Anderson - SafeStack - Thinking Securely: Practical Advice for Developers===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If there’s one lesson that we can learn from 2014, it’s that security needs to become a priority for any web-based application. The challenge for developers is that they don’t think the same way that security professional do. They don’t see the holes until it’s too late.&lt;br /&gt;
&lt;br /&gt;
As someone who has experienced both sides of the story, I have found a few ways to help to bridge this gap. In this talk I will share my story as well as a few tips and tricks I've learned along the way so that developers like me can think more securely and  write more secure software.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Jamie has spent a decade and a half writing software, ranging from desktop software to back-end services to web-based applications. He has recently joined the information security community and is now a secure development specialist for SafeStack.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Andrew Kelly - Insomnia Security Group Ltd - The Fall and Rise of InfoSec===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A talk with a beginning, a middle ... and a 'will it ever end?' at the end. A light-hearted, albeit with a serious message somewhere, skip and jump through three decades of collected wisdom and anecdotes on the 'fall' of InfoSec with the rise of viruses, worms, etc., in the 80's and 90's - and its subsequent 'rise' again in the 2000's due to hacking and similar nefarious activities now being 'accepted' as mainstream. Changing attitudes in the last 30 years - but not changes in music and fashion - will be covered; alongside some ideas on how you can use such changes to your advantage in your own careers and/or organisations. All this by a man who (he claims) has done the hard yards: All nine of them!&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Andrew is the Operations Manager for Insomnia Security, and a man in the twilight years of his working life. 2015 marks his 27th in Computer Security, Data Security, IT Security, Cyber Security and/or Information Security (and his 30th in IT), and he reckons he's fogotten more than he ever knew about most things - including InfoSec. Andrew now spends most of the short ime left to him now reminiscing about the old days, wallowing in past glories ... and wondering why kids today just don't understand.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Aloysius Cheang - Cloud Security Alliance - Securing the Cloud to the Internet of Things===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
CSA's Software Defined Perimeter (SDP), a next generation security architecture for virtual private clouds, hardened SaaS, BYOD and Internet of Things (IOT), is explained. CSA is disrupting network security by making networks dark and adapting innovations from top secret systems. We will deep dive into the reference architecture, review enterprise implementations and discuss the future of SDP and IOT through the looking glass of the CSA.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Aloysius Cheang is Managing Director APAC of Cloud Security Alliance. He also heads up the Standards Secretariat. Aloysius brings to the CSA extensive experience gained from running business units and multi-million enterprise security and technology programs for Global 500 organizations worldwide in his previous roles as a global CSO for a leading Telco and as APAC practice leaders for leading management consulting firms. He is an active community leader, having founded and mentored various information security projects, forums, groups and associations in Singapore and globally. He is also active in standardization and was most recently a co-editor for ISO/IEC 27032 “Guidelines for Cybersecurity”. Aloysius holds a B. Sc (Hons) and Master’s degrees in Computer Science from the National University of Singapore with professional certifications such as CISA, CISSP and GCIH. His views are valued by global media such as Times, Wall Street Journal and CIO Magazine as a trusted independent source of specialist opinion over the last 15 years.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Chris Esther - Confide Ltd - Joined up PCI DSS : A systematic approach to PCI DSS v3 compliance===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In this presentation I will eschew the list of requirements approach to&lt;br /&gt;
compliance and will reframe the PCI DSS using a systems approach to&lt;br /&gt;
provide a holistic view of its requirements.&lt;br /&gt;
The key processes and their linkages will be identified, including:&lt;br /&gt;
* Scoping&lt;br /&gt;
* Vulnerability management&lt;br /&gt;
* Configuration management&lt;br /&gt;
* Change management&lt;br /&gt;
* Development&lt;br /&gt;
* Testing&lt;br /&gt;
Similarly the core information required by PCI DSS will be identified&lt;br /&gt;
and relationships between them discussed, including:&lt;br /&gt;
* Cardholder data flow diagram&lt;br /&gt;
* Network diagram&lt;br /&gt;
* Configuration Management Database&lt;br /&gt;
If you are new to PCI DSS it should provide a solid foundation for&lt;br /&gt;
understanding it. For those already being embraced by PCI DSS it may&lt;br /&gt;
provide another perspective that should help when managing the increased&lt;br /&gt;
evidential requirements of PCI DSS V3.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Developer background, qualified lawyer, QSA. Currently providing advisory and compliance services to commercial and government organisations focusing on PCI DSS and privacy.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Carlos Cordero - Security among those who keep your secrets: comparing security in a top competitive intelligence services===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Firm A is the Latin American equivalent of IDC, Gartner, or Forrester but Peruvian. Firm B started&lt;br /&gt;
as a top New Zealand market research firm and is not part of a top 5 multinational market research&lt;br /&gt;
corporation. Both companies provide research services to enterprise corporations, Firm A to&lt;br /&gt;
practically every well know IT vendor which operates in Latin America and Firm B to New Zealand&lt;br /&gt;
and Australian corporation in the Financial, FMCG, Telecom, Media, and other critical industries.&lt;br /&gt;
Therefore, both firms hold commercially sensitive information about the goals, intentions, activities,&lt;br /&gt;
and plans of their clients. Both also have contracts with some of said clients to protect such&lt;br /&gt;
information.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Commercial Executive at Room9, a web applications development company based in Hamilton.  In charge of all things commercial. A full member of the IITP despite not having a computer science degree but a business management one.  Prior to New Zealand, founding partner of an intelligence firm which counts as clients vendors such as Microsoft, Intel, Oracle, IBM, HP, Dell, Telefonica, Telmex, AT&amp;amp;T, Siemens, to name a few.  Also was an elected leader of the Peruvian equivalent to NZ Tech.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===James Healy - Stoic Limited, apprentice at SafeStack - Handling Vulnerability Disclosure in New Zealand===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
As a security researcher, reporting security issues to businesses and organisations can sometimes get dicey. As a company you need a disclosure policy in place, and a plan for what happens post-disclosure.. Especially if you've just had your private emails and photo's from 2011's Christmas do (oh dear..) posted on Twitter. This talk applies to companies of all sizes and addresses planning, right through to patching and publication.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
James researched malware and packers during his teen years before moving onto web application security and development. For the past year he's been a C# developer at CourierPost and recently started an apprenticeship at SafeStack. He's also a freelance developer pretending to be from a large company called Stoic Ltd when in fact it's just him making websites. He enjoys beer and coffee. You should probably buy him one of those. James is also a little weirded out writing a bio in third-person.&lt;br /&gt;
&lt;br /&gt;
= Training Day =&lt;br /&gt;
==Training Day==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We are happy to announce that training will run on Thursday the 26th of February 2015, the day before the OWASP Day conference. The courses will be running from 9:00 AM sharp to 5:00PM. The training venues will be auditoriums kindly provided by the University of Auckland, in the same building as the OWASP Day conference itself. Due to popular demand, we are now sold out! &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Cost: '''$380 USD''' (roughly $500 NZD) per person.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Details are as follows:&lt;br /&gt;
&lt;br /&gt;
===Training Abstract - Bootstrapping Agile Security===&lt;br /&gt;
&lt;br /&gt;
Agile development is often seen as a delicate balance of ritual and roles allowing for rapid development, continuous deployment and the expansion of the post-it note industry. Security is often seen as a lumbering giant of process, governance and technology allowing for increased control, reduced risk and the expansion of the technology vendor industry.&lt;br /&gt;
&lt;br /&gt;
What if you could merge the two?&lt;br /&gt;
&lt;br /&gt;
The world of security is changing to meet the needs of agile software development. Organisations around the world are coming up with tools, techniques and processes to make security a continuous presence to support developers. This hands on, fast-paced course will not only give students a solid grounding in how to bring security into agile software development life-cycles, but also give a range of tools, techniques and practical skills to make it happen. &lt;br /&gt;
&lt;br /&gt;
===Trainer Bio - Laura Bell===&lt;br /&gt;
&lt;br /&gt;
Laura Bell is the founder and lead consultant at SafeStack, a specialist New Zealand agile security firm. With almost a decade of experience in software development and information security, Laura specialises in bringing security practices and culture into organisations of every shape and size. Her recent research into agile security practices has generated a set of tools and processes that can enable the management of security risk without compromising innovation or speed.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Registration===&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--If you are interested in registering for the training session please email [mailto:adrian.hayes@owasp.org?cc=denis.andzakovic@owasp.org&amp;amp;cc=kim.carter@owasp.org adrian.hayes@owasp.org.nz, denis.andzakovic@owasp.org, and kim.carter@owasp.org] and let us know who you would like to attend.--&amp;gt;&lt;br /&gt;
Is now closed.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- = Call For Presentations =&lt;br /&gt;
==Call For Presentations==&lt;br /&gt;
&lt;br /&gt;
OWASP New Zealand Day conferences attract a high quality of speakers from a variety of security disciplines including&lt;br /&gt;
architects, web developers and engineers, system administrators, penetration testers, policy specialists and more.&lt;br /&gt;
We encourage presentations to have a strong component on fixing and prevention of security issues. We are looking for presentations on a wide variety of security topics,&lt;br /&gt;
including but not limited to:&lt;br /&gt;
&lt;br /&gt;
* Web application security&lt;br /&gt;
* Mobile security&lt;br /&gt;
* Secure development&lt;br /&gt;
* Vulnerability analysis&lt;br /&gt;
* Threat modelling&lt;br /&gt;
* Threat and vulnerability countermeasures&lt;br /&gt;
* Platform or language security (JavaScript, .NET, Java, RoR, etc)&lt;br /&gt;
* Penetration Testing&lt;br /&gt;
* Browser and client security&lt;br /&gt;
* Application and solution architecture security&lt;br /&gt;
* PCI DSS&lt;br /&gt;
* Risk management&lt;br /&gt;
* Security concepts for C*Os, project managers and other non-technical attendees&lt;br /&gt;
* Privacy controls&lt;br /&gt;
&lt;br /&gt;
The email subject must be &amp;quot;OWASP New Zealand 2015: CFP&amp;quot; and the email body must contain the following information/sections:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name and Surname&lt;br /&gt;
* Affiliation&lt;br /&gt;
* Telephone number&lt;br /&gt;
* Email address&lt;br /&gt;
* Short presenter bio&lt;br /&gt;
* Title of the contribution&lt;br /&gt;
* Type of contribution: Technical, Informative, Management&lt;br /&gt;
* Short abstract (up to 500 words)&lt;br /&gt;
* List of the author's previous papers/articles/speeches on the same/similar topic (if any)&lt;br /&gt;
* If you are not from New Zealand, will your company support your travel/accommodation costs? - Yes/No&lt;br /&gt;
&lt;br /&gt;
The submission will be reviewed by the OWASP New Zealand Day conference committee and the highest voted talks will be selected and invited for presentation.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
PLEASE NOTE:&lt;br /&gt;
&lt;br /&gt;
* Due to limited budget available, expenses for international speakers cannot be covered.&lt;br /&gt;
* If your company is willing to cover travel and accommodation costs, the company will become &amp;quot;Support Sponsor&amp;quot; of the event.&lt;br /&gt;
&lt;br /&gt;
Please submit the above information to all of the following: Denis Andzakovic (denis.andzakovic@owasp.org), Adrian Hayes (adrian.hayes@owasp.org) and Kim Carter (kim.carter@owasp.org).&lt;br /&gt;
&lt;br /&gt;
Submissions deadline: 19th January 2015&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Call For Trainers =&lt;br /&gt;
== Call For Trainers ==&lt;br /&gt;
&lt;br /&gt;
We are happy to announce that training will run on Thursday February 26th 2015, the day before the OWASP Day conference.&lt;br /&gt;
The training venues will be auditoriums kindly provided by the University of Auckland, in the same building as the OWASP Day conference itself.&lt;br /&gt;
Classes will contain up to 20 students, and each seat has power for laptop usage. A wide range of half-day or full-day training proposals will be considered,&lt;br /&gt;
see the Call for Papers for a list of example topics.&lt;br /&gt;
&lt;br /&gt;
If you are interested in running one of the training sessions, please contact Denis Andzakovic, Adrian Hayes and Kim Carter with the following information:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Trainer name&lt;br /&gt;
* Trainer organisation&lt;br /&gt;
* Telephone + email contact&lt;br /&gt;
* Short Trainer bio&lt;br /&gt;
* Training title&lt;br /&gt;
* Trainer requirements (e.g. a projector, whiteboard, etc)&lt;br /&gt;
* Trainee requirements (e.g. laptop, VMWare/Virtualbox, etc)&lt;br /&gt;
* Training summary (less than 500 words)&lt;br /&gt;
* Target audience (e.g. testers, project managers, security managers, web developers, architects)&lt;br /&gt;
* Skill level required (Basic / Intermediate / Advanced)&lt;br /&gt;
* What attendees can expect to learn (key objectives)&lt;br /&gt;
* Short course outline&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The fixed price per head for training will be $250 for a half-day session and $500 for a whole-day session. As this training is part of an OWASP event, part of the proceeds go back to OWASP. The split is as follows:&lt;br /&gt;
&lt;br /&gt;
* 25% to OWASP Global - used for OWASP projects around the world&lt;br /&gt;
* 25% to OWASP NZ Day - used for expenses such as catering during the conference&lt;br /&gt;
* 50% to the training provider.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Please submit the above information to all of the following:&lt;br /&gt;
* Denis Andzakovic (denis.andzakovic@owasp.org)&lt;br /&gt;
* Adrian Hayes (adrian.hayes@owasp.org)&lt;br /&gt;
* Kim Carter (kim.carter@owasp.org).&lt;br /&gt;
&lt;br /&gt;
Submissions deadline: 19th January 2015&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Call For Sponsorships =&lt;br /&gt;
==Call For Sponsorships==&lt;br /&gt;
&lt;br /&gt;
OWASP New Zealand Day 2015 will be held in Auckland on the 27th of February, 2015 and is a security conference entirely dedicated to application security.&lt;br /&gt;
The conference is once again being hosted by the University of Auckland with their support and assistance.&lt;br /&gt;
OWASP New Zealand Day 2015 is a free event, but requires sponsor support to help be an instructive and quality event for the New Zealand community.&lt;br /&gt;
OWASP is strictly not for profit. The sponsorship money will be used to help make OWASP New Zealand Day 2015 a free, compelling, and valuable experience for all attendees.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The sponsorship funds collected are to be used for things such as:&lt;br /&gt;
&lt;br /&gt;
* Refreshments (coffee break/lunch) - we want to keep people refreshed during the day; while we certainly bring good and interesting speakers, we don't want people to go home when they become hungry. &lt;br /&gt;
* Name tags - we feel that getting to know people within the New Zealand community is important, and name tags make that possible.&lt;br /&gt;
* Promotion - up to now our events are propagating by word of mouth. We would like to get to a wider audience by advertising our events.&lt;br /&gt;
* Printed Materials - printed materials will include brochures, tags and lanyards.&lt;br /&gt;
&lt;br /&gt;
== Facts ==&lt;br /&gt;
&lt;br /&gt;
In 2013, the event was supported by six sponsors and attracted more than 250 participants. Plenty of constructive (and positive!) feedback from the audience was received and we are using this to make the conference more appealing to more people. For more information on the last New Zealand Day event, please visit: https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2013&lt;br /&gt;
&lt;br /&gt;
The OWASP New Zealand community is strong, this year has Christchurch as a new region and there are more than 360 people currently subscribed to the mailing-list. OWASP New Zealand Day is expected to attract between 250 and 300 attendees this year.&lt;br /&gt;
&lt;br /&gt;
OWASP regular attendees are IT project managers, IT security managers, IT security consultants, web application architects and developers, QA managers, QA testers and system administrators.&lt;br /&gt;
&lt;br /&gt;
== Sponsorships  ==&lt;br /&gt;
&lt;br /&gt;
There are three different levels of sponsorships for the OWASP Day event:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Support Sponsorship&amp;lt;/b&amp;gt;: (Covering international speaker travel expenses, media coverage/article/promotion of the event)&lt;br /&gt;
   &lt;br /&gt;
Includes:&lt;br /&gt;
&lt;br /&gt;
* Publication of the sponsor logo on the event web site - https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2015&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Silver Sponsorship&amp;lt;/b&amp;gt;: 1500 NZD&lt;br /&gt;
&lt;br /&gt;
Includes: &lt;br /&gt;
&lt;br /&gt;
* Publication of the sponsor logo on the event web site - https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2015&lt;br /&gt;
* The publication of the sponsor logo on the event site, in the agenda, on the handouts and in all the official communications with the attendees at the conference.&lt;br /&gt;
* The possibility to distribute the company brochures, CDs or other materials to the participants during the event.&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Gold Sponsorship&amp;lt;/b&amp;gt;: 2750 NZD&lt;br /&gt;
&lt;br /&gt;
Includes: &lt;br /&gt;
&lt;br /&gt;
* The possibility to have a promotional banner or sign side stage in the main auditorium (to be provided by the sponsor, size subject to approval by the OWASP NZ Day Committee).&lt;br /&gt;
* The publication of the sponsor logo on the event site, in the agenda, on the handouts and in all the official communications with the attendees at the conference.&lt;br /&gt;
* The possibility to distribute the company brochures, CDs or other materials to the participants during the event.&lt;br /&gt;
* Publication of the sponsor logo on the OWASP New Zealand Chapter page - Sponsor logo on the OWASP NZ site prior and during the OWASP Day event - https://www.owasp.org/index.php/New_Zealand&lt;br /&gt;
* Publication of the sponsor logo on the event web site - https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2015&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Those who are interested in sponsoring OWASP New Zealand 2015 Conference can contact the [mailto:kim.carter@owasp.org?cc=adrian.hayes@owasp.org?cc=denis.andzakovic@owasp.org OWASP New Zealand Board].&amp;lt;br&amp;gt;&lt;br /&gt;
 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]]&lt;/div&gt;</summary>
		<author><name>Adrian Hayes</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_New_Zealand_Day_2015&amp;diff=190299</id>
		<title>OWASP New Zealand Day 2015</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_New_Zealand_Day_2015&amp;diff=190299"/>
				<updated>2015-02-25T19:42:32Z</updated>
		
		<summary type="html">&lt;p&gt;Adrian Hayes: /* Presentations */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2015 https://www.owasp.org/images/9/94/New_Zealand_Day_2015_020.png]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''26th and 27th Feburary 2015 - Auckland'''&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
= Introduction =&lt;br /&gt;
==Introduction==&lt;br /&gt;
We are proud to announce the sixth OWASP New Zealand Day conference, to be held at the University of Auckland on Friday February 27th, 2015. OWASP New Zealand Day is a one-day conference dedicated to application security, with an emphasis on secure architecture and development techniques to help Kiwi developers build more secure applications.&lt;br /&gt;
&lt;br /&gt;
Similar to last year:&lt;br /&gt;
&lt;br /&gt;
* We will be offering training on the day before the conference (Thursday, 26th of February). &lt;br /&gt;
* After lunch on the conference day, we will split to two tracks - one focused on technical topics, the other on policy, compliance and risk management. &lt;br /&gt;
&lt;br /&gt;
The sixth OWASP New Zealand Day will be happening thanks to the support provided by the University of Auckland, which will kindly offer a slightly different location from the last five years. Entry to the event will, as in the past, be free.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For any comments, feedback or observations, please don't hesitate to contact [mailto:kim.carter@owasp.org?cc=adrian.hayes@owasp.org?cc=denis.andzakovic@owasp.org us].&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Registration==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Registration is not yet open. Please join our low volume [https://lists.owasp.org/mailman/listinfo/owasp-newzealand mailing list] to be notified when registration opens.&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Registration for the main conference day is now open: [https://registration.owasp.org.nz/ Conference Registration Here]&lt;br /&gt;
&lt;br /&gt;
There is no cost for the main conference day and lunch is provided. We do ask that if at any point you realise you cannot make it please cancel your registration to make room for others as spaces are limited.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Registration for the training session on the 26th is now closed due to being fully booked.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Registration is now closed.&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Important dates==&lt;br /&gt;
&lt;br /&gt;
* ''CFP &amp;amp; CFT submission deadline: 19th January 2015''&lt;br /&gt;
* ''Conference &amp;lt;!--and Training --&amp;gt;Registration deadline: 12th February 2015''&lt;br /&gt;
* Training Day date:          26th February 2015&lt;br /&gt;
* Conference Day date:           27th February 2015&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
For those of you booking flights, ensure you can be at the venue at 8:30am, the conference will end by 5:30pm however we will have post conference drinks at a local drinking establishment for those interested.&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Conference Venue==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
   &amp;lt;td&amp;gt;&lt;br /&gt;
The University of Auckland Engineering Department&amp;lt;br&amp;gt;&lt;br /&gt;
Engineering Building #401&amp;lt;br&amp;gt;&lt;br /&gt;
Room: Eng 1449&amp;lt;br&amp;gt;&lt;br /&gt;
Address: 20 Symonds Street&amp;lt;br&amp;gt;&lt;br /&gt;
Auckland&amp;lt;br&amp;gt;&lt;br /&gt;
New Zealand&amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.google.com/maps/place/Faculty+of+Engineering,+The+University+of+Auckland,+Auckland,+1010,+New+Zealand Map]&lt;br /&gt;
   &amp;lt;/td&amp;gt;&lt;br /&gt;
   &amp;lt;td&amp;gt;&lt;br /&gt;
[[Image:EngineeringBuilding401Web.JPG]] [[Image:RoomEng1449Web.JPG]]&lt;br /&gt;
   &amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Conference Sponsors==&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;bottom&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;[http://www.auckland.ac.nz/ https://www.owasp.org/images/8/82/University_of_Auckland_crest_small.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;bottom&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;[http://www.security.org.nz/NZISF_NZISForumContent.php https://www.owasp.org/images/5/5a/Nz_information_security_forum.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;ICT and Department of Information Systems and Operations Management&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Gold Sponsors:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[[File:INSOMNIA.PNG|center|300px|link=http://www.insomniasec.com/]]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[[File:Aurainfosec300px.jpg|center|300px|link=http://www.aurainfosec.com/]]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com https://www.owasp.org/images/4/41/SA_Logo_w_DD.gif]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.insomniasec.com Insomnia Security]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.aurasoftwaresecurity.co.nz Aura Information Security]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com www.security-assessment.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Silver Sponsors:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[[File:Beca.png|center|200px|link=http://www.beca.com/]]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[[File:Wynyard_CMYK_land.png|center|250px|link=https://www.wynyardgroup.com/]]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Support Sponsor:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[[File:BinaryMistLimited.png|center|150px|link=http://binarymist.net]]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Conference Committee==&lt;br /&gt;
&lt;br /&gt;
* Denis Andzakovic - OWASP New Zealand Leader (Auckland)&lt;br /&gt;
* Adrian Hayes -  OWASP New Zealand Leader (Wellington)&lt;br /&gt;
* Kim Carter -  OWASP New Zealand Leader (Christchurch)&lt;br /&gt;
* Lech Janczewski - Associate Professor - University of Auckland School of Business&lt;br /&gt;
&lt;br /&gt;
Please direct all enquiries to denis.andzakovic@owasp.org | adrian.hayes@owasp.org | kim.carter@owasp.org&lt;br /&gt;
&lt;br /&gt;
= Presentation Schedule=&lt;br /&gt;
==Presentations==&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
27th Feburary 2015&lt;br /&gt;
&amp;lt;table width=&amp;quot;80%&amp;quot;&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;08:30&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #8595C2; text-align: center&amp;quot;&amp;gt;Registration&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;   &lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;09:00&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Welcome to OWASP New Zealand Day 2015&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Lech Janczewski (Associate Professor), Adrian Hayes, Denis Andzakovic and Kim Carter (OWASP Leaders)&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;09:15&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #B9C2DC; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Applying OWASP Top 10 to ASP.NET MVC projects&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Kirk Jackson - Xero&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;10:00&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Integrity protection for third-party JavaScript&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Francois Marier - Mozilla&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;   &lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;10:30&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #D98B66; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Break for Morning Tea&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;   &lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;11:00&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Defaced - An insight into methodologies, tools and motivations&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Adam Bell - Lateral Security&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;11:30&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #B9C2DC; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;CMS Hell&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Pedro Worcel - Security Assessment&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;12:00&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Lazily Finding Holes Without Breaking The Law&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Nick von Dadelszen - Lateral Security&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;   &lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;12:30&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #D98B66; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Break for Lunch&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;   &lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;13:30&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;background-color: #B9C2DC; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Crypto 101 - A &amp;quot;no crazy maths&amp;quot; guide to crypto vulnerabilities&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Benjamin Kearns - Lateral Security&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;background-color: #B9C2DC; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Securing the Cloud to the Internet of Things&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Aloysius Cheang - Cloud Security Alliance&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;14:00&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;background-color: #EEE; ; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;PHP Magic Tricks: Type Juggling&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Chris Smith - Insomnia Security&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;background-color: #EEE; ; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Joined up PCI DSS : A systematic approach to PCI DSS v3 compliance&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Chris Esther - Confide Ltd&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;14:30&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;background-color: #B9C2DC; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Surprise Features in Your Favourite Framework&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Andrew Kampjes - nil and Mike Haworth - Aura&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;   &lt;br /&gt;
		&amp;lt;td style=&amp;quot;background-color: #B9C2DC; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Security among those who keep your secrets: comparing security in a top competitive&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;intelligence services&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Carlos Cordero&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;15:00&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;background-color: #EEE; ; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Thinking Securely: Practical Advice for Developers&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Jamie Anderson - SafeStack&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;background-color: #EEE; ; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Handling Vulnerability Disclosure in New Zealand&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;James Healy - Stoic Ltd and SafeStack&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;   &lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;15:30&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #D98B66; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Break for Afternoon Tea&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;16:00&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;The Fall and Rise of InfoSec&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Andrew Kelly - Insomnia Security&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;16:45&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #B9C2DC; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Wrap Up&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Time for the pub, for those interested&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Speakers List=&lt;br /&gt;
==Speakers List==&lt;br /&gt;
&lt;br /&gt;
===Kirk Jackson - Xero - Applying OWASP Top 10 to ASP.NET MVC projects===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
What's the OWASP Top 10, and how do we defend against those threats? Advances in web platforms and frameworks make it easier to defend against common web attacks. By introducing the defences available in ASP.NET MVC we'll see how we can make our lives easier (and more secure!).&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Kirk Jackson is Security Officer at Xero, and has presented at previous OWASP, Kiwicon and other developer conferences.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Francois Marier - Mozilla -  Integrity protection for third-party JavaScript===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Modern web applications depend on a lot of auxiliary scripts which are often hosted on third-party CDNs. Should an attacker be able to tamper with the files hosted on such a CDN, millions of sites could be compromised. Web developers need a way to guarantee the integrity of scripts hosted elsewhere.&lt;br /&gt;
&lt;br /&gt;
This is the motivation behing a new addition to the web platform being introduced by the W3C: sub-resource integrity (http://www.w3.org/TR/SRI/). Both Firefox and Chrome have initial implementations of this new specification and a few early adopters are currently evaluating this feature.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Francois is a senior software engineer in the Mozilla Security &amp;amp; Privacy team where he spends his time working on new ways to protect Firefox users. By night, he contributes to Debian and other free software projects.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Adam Bell - Lateral Security - Defaced: An insight into methodologies, tools and motivations===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;quot;The internet is a hostile place, particularly if you are a charitable organisation.&lt;br /&gt;
&lt;br /&gt;
Websites are compromised and defaced on a daily basis and sometimes their owners need a little help getting to the bottom of what happened. &lt;br /&gt;
&lt;br /&gt;
So what if your website has been compromised and is getting reports of abuse... How do you react? What can you do?&lt;br /&gt;
&lt;br /&gt;
This talk will cover a recent incident response and investigation I carried out and describe how you, as the developer-in-charge of an all-in-one webhost can investigate and respond. &lt;br /&gt;
&lt;br /&gt;
Based on a true story,  this talk will describe the incident response methodology I used, take a look at some of the tools that the defacer had left behind and give an insight into the badguys mindset and motives.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Adam Bell once ate a jam sandwich. He lives in Auckland with his newly spawned hacker progeny and fears the day she learns to pop shell. By day he is a security consultant for a prominent boutique security company, by night he tries to remember what sleep is.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Pedro Worcel - Security-Assessment.com - CMS Hell===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
We all know about Wordpress and its (in)security. What about other CMSes? What about NZ made ones?&lt;br /&gt;
&lt;br /&gt;
Introducing 'droopescan', a plugin-based tool for scanning CMSs. In this&lt;br /&gt;
talk we will see its effectiveness in identifying versions and plugins,&lt;br /&gt;
and we will see how the landscape looks like for installations of two&lt;br /&gt;
CMSs (Drupal &amp;amp; SilverStripe) in New Zealand.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Pedro is a security researcher for Security-Assessment.com, with more than five years of experience in IT. I have a strong background on web applications, and generally enjoy building and hacking software of all kinds.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Nick von Dadelszen - Lateral Security - Lazily Finding Holes Without Breaking The Law===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Why risk actively testing for security vulnerabilities in websites when a large amount of vulnerabilities can be passively found? Based on an event where a major security issue was found in a potential client's site just through passive browsing during a scoping exercise, we thought, why not always be scanning? So, enter some dodgy nickvd style code and quick fixes, a little more polished code from feabell, and you have a system that is continuously passively scanning everything you browse. The vulnerabilities just come to you. This is the true lazyman's way to find vulnerabilities, and could be used to check a large number of sites for some common issues in a quick and painless manner.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A regular in the NZ security industry, Nick has now clocked up his 15th year of penetration testing. With a full security team at Lateral Security to keep in check, his time is now more commonly spent in meetings and reviewing reports. However, he still loves to jump in and get his hands dirty, especially when it is something new and interesting. Origin: New Zealand&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Benjamin Kearns - Lateral Security - Crypto 101: A &amp;quot;no crazy maths&amp;quot; guide to crypto vulnerabilities===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
While less common that other types of security vulnerabilities encryption flaws can often have a very high impact. Some big applications, hardware and frameworks have been vulnerable to simple encryption flaws in recent years. &lt;br /&gt;
&lt;br /&gt;
This talk with run you through a variety of crypto flaws which we've observed in web and mobile applications over the last couple of years.&lt;br /&gt;
&lt;br /&gt;
It will show you how to exploit them and discuss how to protect yourself.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Ben works as a Security Consultant for Lateral Security. He has two and a half years of security experience which is backed by a further five years of IT experience, primarily spent developing web applications and administering Linux systems.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Chris Smith - Insomnia Security - PHP Magic Tricks: Type Juggling===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
PHP is a magical language! Unfortunately, magic leads to unexpected behaviour and unexpected behaviour leads to security bugs. This talk will go over a specific magic trick that PHP performs as a loosely- and dynamically-typed language.&lt;br /&gt;
&lt;br /&gt;
The trick is type juggling, a set of rules that PHP enacts when trying to compare different types together. Given the different possible ways you might want to compare different data, you'd expect there to be some unexpected behaviour in there. You'd be right. And, given the importance of the comparison operator for enforcing security controls, you'd expect that to lead to some tasty bugs. You'd be right.&lt;br /&gt;
&lt;br /&gt;
You will be introduced to PHP's various type juggling rules and how you might want to exploit them in security-critical areas of modern applications. We'll also look at a few publicized bugs that exploit this functionality and then finish off on how you can avoid exposing yourself to these issues. It'll be as easy as 'abc' == 0, I promise.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Chris is a consultant for Insomnia Security where he breaks other peoples stuff and writes reports about it. Previously a Linux sysadmin and polyglot developer, he now exacts his revenge on technologies that have wronged him.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Andrew Kampjes and Mike Haworth - nil and Aura - Surprise Features in Your Favourite Framework===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Modern web frameworks allow developers to be productive, however they are feature rich and not every feature is well understood. Some of these features can work in unexpected ways and can be leveraged by attackers. This talk will look at some of the gotchas in popular frameworks. We'll also look at the ways popular features such as social logins can go wrong.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Andrew Kampjes enjoys getting under the hood of Rails and playing with its quirks. He also gets a sick satisfaction finding security flaws in other’s code.&lt;br /&gt;
&lt;br /&gt;
Mike Haworth is a Principal Security Consultant for AuraInfoSec, he spends his days doing everything from Red Team engagements to Code Reviews.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Jamie Anderson - SafeStack - Thinking Securely: Practical Advice for Developers===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If there’s one lesson that we can learn from 2014, it’s that security needs to become a priority for any web-based application. The challenge for developers is that they don’t think the same way that security professional do. They don’t see the holes until it’s too late.&lt;br /&gt;
&lt;br /&gt;
As someone who has experienced both sides of the story, I have found a few ways to help to bridge this gap. In this talk I will share my story as well as a few tips and tricks I've learned along the way so that developers like me can think more securely and  write more secure software.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Jamie has spent a decade and a half writing software, ranging from desktop software to back-end services to web-based applications. He has recently joined the information security community and is now a secure development specialist for SafeStack.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Andrew Kelly - Insomnia Security Group Ltd - The Fall and Rise of InfoSec===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A talk with a beginning, a middle ... and a 'will it ever end?' at the end. A light-hearted, albeit with a serious message somewhere, skip and jump through three decades of collected wisdom and anecdotes on the 'fall' of InfoSec with the rise of viruses, worms, etc., in the 80's and 90's - and its subsequent 'rise' again in the 2000's due to hacking and similar nefarious activities now being 'accepted' as mainstream. Changing attitudes in the last 30 years - but not changes in music and fashion - will be covered; alongside some ideas on how you can use such changes to your advantage in your own careers and/or organisations. All this by a man who (he claims) has done the hard yards: All nine of them!&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Andrew is the Operations Manager for Insomnia Security, and a man in the twilight years of his working life. 2015 marks his 27th in Computer Security, Data Security, IT Security, Cyber Security and/or Information Security (and his 30th in IT), and he reckons he's fogotten more than he ever knew about most things - including InfoSec. Andrew now spends most of the short ime left to him now reminiscing about the old days, wallowing in past glories ... and wondering why kids today just don't understand.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Aloysius Cheang - Cloud Security Alliance - Securing the Cloud to the Internet of Things===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
CSA's Software Defined Perimeter (SDP), a next generation security architecture for virtual private clouds, hardened SaaS, BYOD and Internet of Things (IOT), is explained. CSA is disrupting network security by making networks dark and adapting innovations from top secret systems. We will deep dive into the reference architecture, review enterprise implementations and discuss the future of SDP and IOT through the looking glass of the CSA.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Aloysius Cheang is Managing Director APAC of Cloud Security Alliance. He also heads up the Standards Secretariat. Aloysius brings to the CSA extensive experience gained from running business units and multi-million enterprise security and technology programs for Global 500 organizations worldwide in his previous roles as a global CSO for a leading Telco and as APAC practice leaders for leading management consulting firms. He is an active community leader, having founded and mentored various information security projects, forums, groups and associations in Singapore and globally. He is also active in standardization and was most recently a co-editor for ISO/IEC 27032 “Guidelines for Cybersecurity”. Aloysius holds a B. Sc (Hons) and Master’s degrees in Computer Science from the National University of Singapore with professional certifications such as CISA, CISSP and GCIH. His views are valued by global media such as Times, Wall Street Journal and CIO Magazine as a trusted independent source of specialist opinion over the last 15 years.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Chris Esther - Confide Ltd - Joined up PCI DSS : A systematic approach to PCI DSS v3 compliance===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In this presentation I will eschew the list of requirements approach to&lt;br /&gt;
compliance and will reframe the PCI DSS using a systems approach to&lt;br /&gt;
provide a holistic view of its requirements.&lt;br /&gt;
The key processes and their linkages will be identified, including:&lt;br /&gt;
* Scoping&lt;br /&gt;
* Vulnerability management&lt;br /&gt;
* Configuration management&lt;br /&gt;
* Change management&lt;br /&gt;
* Development&lt;br /&gt;
* Testing&lt;br /&gt;
Similarly the core information required by PCI DSS will be identified&lt;br /&gt;
and relationships between them discussed, including:&lt;br /&gt;
* Cardholder data flow diagram&lt;br /&gt;
* Network diagram&lt;br /&gt;
* Configuration Management Database&lt;br /&gt;
If you are new to PCI DSS it should provide a solid foundation for&lt;br /&gt;
understanding it. For those already being embraced by PCI DSS it may&lt;br /&gt;
provide another perspective that should help when managing the increased&lt;br /&gt;
evidential requirements of PCI DSS V3.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Developer background, qualified lawyer, QSA. Currently providing advisory and compliance services to commercial and government organisations focusing on PCI DSS and privacy.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Carlos Cordero - Security among those who keep your secrets: comparing security in a top competitive intelligence services===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Firm A is the Latin American equivalent of IDC, Gartner, or Forrester but Peruvian. Firm B started&lt;br /&gt;
as a top New Zealand market research firm and is not part of a top 5 multinational market research&lt;br /&gt;
corporation. Both companies provide research services to enterprise corporations, Firm A to&lt;br /&gt;
practically every well know IT vendor which operates in Latin America and Firm B to New Zealand&lt;br /&gt;
and Australian corporation in the Financial, FMCG, Telecom, Media, and other critical industries.&lt;br /&gt;
Therefore, both firms hold commercially sensitive information about the goals, intentions, activities,&lt;br /&gt;
and plans of their clients. Both also have contracts with some of said clients to protect such&lt;br /&gt;
information.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Commercial Executive at Room9, a web applications development company based in Hamilton.  In charge of all things commercial. A full member of the IITP despite not having a computer science degree but a business management one.  Prior to New Zealand, founding partner of an intelligence firm which counts as clients vendors such as Microsoft, Intel, Oracle, IBM, HP, Dell, Telefonica, Telmex, AT&amp;amp;T, Siemens, to name a few.  Also was an elected leader of the Peruvian equivalent to NZ Tech.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===James Healy - Stoic Limited, apprentice at SafeStack - Handling Vulnerability Disclosure in New Zealand===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
As a security researcher, reporting security issues to businesses and organisations can sometimes get dicey. As a company you need a disclosure policy in place, and a plan for what happens post-disclosure.. Especially if you've just had your private emails and photo's from 2011's Christmas do (oh dear..) posted on Twitter. This talk applies to companies of all sizes and addresses planning, right through to patching and publication.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
James researched malware and packers during his teen years before moving onto web application security and development. For the past year he's been a C# developer at CourierPost and recently started an apprenticeship at SafeStack. He's also a freelance developer pretending to be from a large company called Stoic Ltd when in fact it's just him making websites. He enjoys beer and coffee. You should probably buy him one of those. James is also a little weirded out writing a bio in third-person.&lt;br /&gt;
&lt;br /&gt;
= Training Day =&lt;br /&gt;
==Training Day==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We are happy to announce that training will run on Thursday the 26th of February 2015, the day before the OWASP Day conference. The courses will be running from 9:00 AM sharp to 5:00PM. The training venues will be auditoriums kindly provided by the University of Auckland, in the same building as the OWASP Day conference itself. Due to popular demand, we are now sold out! &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Cost: '''$380 USD''' (roughly $500 NZD) per person.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Details are as follows:&lt;br /&gt;
&lt;br /&gt;
===Training Abstract - Bootstrapping Agile Security===&lt;br /&gt;
&lt;br /&gt;
Agile development is often seen as a delicate balance of ritual and roles allowing for rapid development, continuous deployment and the expansion of the post-it note industry. Security is often seen as a lumbering giant of process, governance and technology allowing for increased control, reduced risk and the expansion of the technology vendor industry.&lt;br /&gt;
&lt;br /&gt;
What if you could merge the two?&lt;br /&gt;
&lt;br /&gt;
The world of security is changing to meet the needs of agile software development. Organisations around the world are coming up with tools, techniques and processes to make security a continuous presence to support developers. This hands on, fast-paced course will not only give students a solid grounding in how to bring security into agile software development life-cycles, but also give a range of tools, techniques and practical skills to make it happen. &lt;br /&gt;
&lt;br /&gt;
===Trainer Bio - Laura Bell===&lt;br /&gt;
&lt;br /&gt;
Laura Bell is the founder and lead consultant at SafeStack, a specialist New Zealand agile security firm. With almost a decade of experience in software development and information security, Laura specialises in bringing security practices and culture into organisations of every shape and size. Her recent research into agile security practices has generated a set of tools and processes that can enable the management of security risk without compromising innovation or speed.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Registration===&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--If you are interested in registering for the training session please email [mailto:adrian.hayes@owasp.org?cc=denis.andzakovic@owasp.org&amp;amp;cc=kim.carter@owasp.org adrian.hayes@owasp.org.nz, denis.andzakovic@owasp.org, and kim.carter@owasp.org] and let us know who you would like to attend.--&amp;gt;&lt;br /&gt;
Is now closed.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- = Call For Presentations =&lt;br /&gt;
==Call For Presentations==&lt;br /&gt;
&lt;br /&gt;
OWASP New Zealand Day conferences attract a high quality of speakers from a variety of security disciplines including&lt;br /&gt;
architects, web developers and engineers, system administrators, penetration testers, policy specialists and more.&lt;br /&gt;
We encourage presentations to have a strong component on fixing and prevention of security issues. We are looking for presentations on a wide variety of security topics,&lt;br /&gt;
including but not limited to:&lt;br /&gt;
&lt;br /&gt;
* Web application security&lt;br /&gt;
* Mobile security&lt;br /&gt;
* Secure development&lt;br /&gt;
* Vulnerability analysis&lt;br /&gt;
* Threat modelling&lt;br /&gt;
* Threat and vulnerability countermeasures&lt;br /&gt;
* Platform or language security (JavaScript, .NET, Java, RoR, etc)&lt;br /&gt;
* Penetration Testing&lt;br /&gt;
* Browser and client security&lt;br /&gt;
* Application and solution architecture security&lt;br /&gt;
* PCI DSS&lt;br /&gt;
* Risk management&lt;br /&gt;
* Security concepts for C*Os, project managers and other non-technical attendees&lt;br /&gt;
* Privacy controls&lt;br /&gt;
&lt;br /&gt;
The email subject must be &amp;quot;OWASP New Zealand 2015: CFP&amp;quot; and the email body must contain the following information/sections:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name and Surname&lt;br /&gt;
* Affiliation&lt;br /&gt;
* Telephone number&lt;br /&gt;
* Email address&lt;br /&gt;
* Short presenter bio&lt;br /&gt;
* Title of the contribution&lt;br /&gt;
* Type of contribution: Technical, Informative, Management&lt;br /&gt;
* Short abstract (up to 500 words)&lt;br /&gt;
* List of the author's previous papers/articles/speeches on the same/similar topic (if any)&lt;br /&gt;
* If you are not from New Zealand, will your company support your travel/accommodation costs? - Yes/No&lt;br /&gt;
&lt;br /&gt;
The submission will be reviewed by the OWASP New Zealand Day conference committee and the highest voted talks will be selected and invited for presentation.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
PLEASE NOTE:&lt;br /&gt;
&lt;br /&gt;
* Due to limited budget available, expenses for international speakers cannot be covered.&lt;br /&gt;
* If your company is willing to cover travel and accommodation costs, the company will become &amp;quot;Support Sponsor&amp;quot; of the event.&lt;br /&gt;
&lt;br /&gt;
Please submit the above information to all of the following: Denis Andzakovic (denis.andzakovic@owasp.org), Adrian Hayes (adrian.hayes@owasp.org) and Kim Carter (kim.carter@owasp.org).&lt;br /&gt;
&lt;br /&gt;
Submissions deadline: 19th January 2015&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Call For Trainers =&lt;br /&gt;
== Call For Trainers ==&lt;br /&gt;
&lt;br /&gt;
We are happy to announce that training will run on Thursday February 26th 2015, the day before the OWASP Day conference.&lt;br /&gt;
The training venues will be auditoriums kindly provided by the University of Auckland, in the same building as the OWASP Day conference itself.&lt;br /&gt;
Classes will contain up to 20 students, and each seat has power for laptop usage. A wide range of half-day or full-day training proposals will be considered,&lt;br /&gt;
see the Call for Papers for a list of example topics.&lt;br /&gt;
&lt;br /&gt;
If you are interested in running one of the training sessions, please contact Denis Andzakovic, Adrian Hayes and Kim Carter with the following information:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Trainer name&lt;br /&gt;
* Trainer organisation&lt;br /&gt;
* Telephone + email contact&lt;br /&gt;
* Short Trainer bio&lt;br /&gt;
* Training title&lt;br /&gt;
* Trainer requirements (e.g. a projector, whiteboard, etc)&lt;br /&gt;
* Trainee requirements (e.g. laptop, VMWare/Virtualbox, etc)&lt;br /&gt;
* Training summary (less than 500 words)&lt;br /&gt;
* Target audience (e.g. testers, project managers, security managers, web developers, architects)&lt;br /&gt;
* Skill level required (Basic / Intermediate / Advanced)&lt;br /&gt;
* What attendees can expect to learn (key objectives)&lt;br /&gt;
* Short course outline&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The fixed price per head for training will be $250 for a half-day session and $500 for a whole-day session. As this training is part of an OWASP event, part of the proceeds go back to OWASP. The split is as follows:&lt;br /&gt;
&lt;br /&gt;
* 25% to OWASP Global - used for OWASP projects around the world&lt;br /&gt;
* 25% to OWASP NZ Day - used for expenses such as catering during the conference&lt;br /&gt;
* 50% to the training provider.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Please submit the above information to all of the following:&lt;br /&gt;
* Denis Andzakovic (denis.andzakovic@owasp.org)&lt;br /&gt;
* Adrian Hayes (adrian.hayes@owasp.org)&lt;br /&gt;
* Kim Carter (kim.carter@owasp.org).&lt;br /&gt;
&lt;br /&gt;
Submissions deadline: 19th January 2015&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Call For Sponsorships =&lt;br /&gt;
==Call For Sponsorships==&lt;br /&gt;
&lt;br /&gt;
OWASP New Zealand Day 2015 will be held in Auckland on the 27th of February, 2015 and is a security conference entirely dedicated to application security.&lt;br /&gt;
The conference is once again being hosted by the University of Auckland with their support and assistance.&lt;br /&gt;
OWASP New Zealand Day 2015 is a free event, but requires sponsor support to help be an instructive and quality event for the New Zealand community.&lt;br /&gt;
OWASP is strictly not for profit. The sponsorship money will be used to help make OWASP New Zealand Day 2015 a free, compelling, and valuable experience for all attendees.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The sponsorship funds collected are to be used for things such as:&lt;br /&gt;
&lt;br /&gt;
* Refreshments (coffee break/lunch) - we want to keep people refreshed during the day; while we certainly bring good and interesting speakers, we don't want people to go home when they become hungry. &lt;br /&gt;
* Name tags - we feel that getting to know people within the New Zealand community is important, and name tags make that possible.&lt;br /&gt;
* Promotion - up to now our events are propagating by word of mouth. We would like to get to a wider audience by advertising our events.&lt;br /&gt;
* Printed Materials - printed materials will include brochures, tags and lanyards.&lt;br /&gt;
&lt;br /&gt;
== Facts ==&lt;br /&gt;
&lt;br /&gt;
In 2013, the event was supported by six sponsors and attracted more than 250 participants. Plenty of constructive (and positive!) feedback from the audience was received and we are using this to make the conference more appealing to more people. For more information on the last New Zealand Day event, please visit: https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2013&lt;br /&gt;
&lt;br /&gt;
The OWASP New Zealand community is strong, this year has Christchurch as a new region and there are more than 360 people currently subscribed to the mailing-list. OWASP New Zealand Day is expected to attract between 250 and 300 attendees this year.&lt;br /&gt;
&lt;br /&gt;
OWASP regular attendees are IT project managers, IT security managers, IT security consultants, web application architects and developers, QA managers, QA testers and system administrators.&lt;br /&gt;
&lt;br /&gt;
== Sponsorships  ==&lt;br /&gt;
&lt;br /&gt;
There are three different levels of sponsorships for the OWASP Day event:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Support Sponsorship&amp;lt;/b&amp;gt;: (Covering international speaker travel expenses, media coverage/article/promotion of the event)&lt;br /&gt;
   &lt;br /&gt;
Includes:&lt;br /&gt;
&lt;br /&gt;
* Publication of the sponsor logo on the event web site - https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2015&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Silver Sponsorship&amp;lt;/b&amp;gt;: 1500 NZD&lt;br /&gt;
&lt;br /&gt;
Includes: &lt;br /&gt;
&lt;br /&gt;
* Publication of the sponsor logo on the event web site - https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2015&lt;br /&gt;
* The publication of the sponsor logo on the event site, in the agenda, on the handouts and in all the official communications with the attendees at the conference.&lt;br /&gt;
* The possibility to distribute the company brochures, CDs or other materials to the participants during the event.&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Gold Sponsorship&amp;lt;/b&amp;gt;: 2750 NZD&lt;br /&gt;
&lt;br /&gt;
Includes: &lt;br /&gt;
&lt;br /&gt;
* The possibility to have a promotional banner or sign side stage in the main auditorium (to be provided by the sponsor, size subject to approval by the OWASP NZ Day Committee).&lt;br /&gt;
* The publication of the sponsor logo on the event site, in the agenda, on the handouts and in all the official communications with the attendees at the conference.&lt;br /&gt;
* The possibility to distribute the company brochures, CDs or other materials to the participants during the event.&lt;br /&gt;
* Publication of the sponsor logo on the OWASP New Zealand Chapter page - Sponsor logo on the OWASP NZ site prior and during the OWASP Day event - https://www.owasp.org/index.php/New_Zealand&lt;br /&gt;
* Publication of the sponsor logo on the event web site - https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2015&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Those who are interested in sponsoring OWASP New Zealand 2015 Conference can contact the [mailto:kim.carter@owasp.org?cc=adrian.hayes@owasp.org?cc=denis.andzakovic@owasp.org OWASP New Zealand Board].&amp;lt;br&amp;gt;&lt;br /&gt;
 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]]&lt;/div&gt;</summary>
		<author><name>Adrian Hayes</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_New_Zealand_Day_2015&amp;diff=190297</id>
		<title>OWASP New Zealand Day 2015</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_New_Zealand_Day_2015&amp;diff=190297"/>
				<updated>2015-02-25T19:41:49Z</updated>
		
		<summary type="html">&lt;p&gt;Adrian Hayes: /* Speakers List */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2015 https://www.owasp.org/images/9/94/New_Zealand_Day_2015_020.png]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''26th and 27th Feburary 2015 - Auckland'''&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
= Introduction =&lt;br /&gt;
==Introduction==&lt;br /&gt;
We are proud to announce the sixth OWASP New Zealand Day conference, to be held at the University of Auckland on Friday February 27th, 2015. OWASP New Zealand Day is a one-day conference dedicated to application security, with an emphasis on secure architecture and development techniques to help Kiwi developers build more secure applications.&lt;br /&gt;
&lt;br /&gt;
Similar to last year:&lt;br /&gt;
&lt;br /&gt;
* We will be offering training on the day before the conference (Thursday, 26th of February). &lt;br /&gt;
* After lunch on the conference day, we will split to two tracks - one focused on technical topics, the other on policy, compliance and risk management. &lt;br /&gt;
&lt;br /&gt;
The sixth OWASP New Zealand Day will be happening thanks to the support provided by the University of Auckland, which will kindly offer a slightly different location from the last five years. Entry to the event will, as in the past, be free.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For any comments, feedback or observations, please don't hesitate to contact [mailto:kim.carter@owasp.org?cc=adrian.hayes@owasp.org?cc=denis.andzakovic@owasp.org us].&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Registration==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Registration is not yet open. Please join our low volume [https://lists.owasp.org/mailman/listinfo/owasp-newzealand mailing list] to be notified when registration opens.&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Registration for the main conference day is now open: [https://registration.owasp.org.nz/ Conference Registration Here]&lt;br /&gt;
&lt;br /&gt;
There is no cost for the main conference day and lunch is provided. We do ask that if at any point you realise you cannot make it please cancel your registration to make room for others as spaces are limited.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Registration for the training session on the 26th is now closed due to being fully booked.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Registration is now closed.&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Important dates==&lt;br /&gt;
&lt;br /&gt;
* ''CFP &amp;amp; CFT submission deadline: 19th January 2015''&lt;br /&gt;
* ''Conference &amp;lt;!--and Training --&amp;gt;Registration deadline: 12th February 2015''&lt;br /&gt;
* Training Day date:          26th February 2015&lt;br /&gt;
* Conference Day date:           27th February 2015&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
For those of you booking flights, ensure you can be at the venue at 8:30am, the conference will end by 5:30pm however we will have post conference drinks at a local drinking establishment for those interested.&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Conference Venue==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
   &amp;lt;td&amp;gt;&lt;br /&gt;
The University of Auckland Engineering Department&amp;lt;br&amp;gt;&lt;br /&gt;
Engineering Building #401&amp;lt;br&amp;gt;&lt;br /&gt;
Room: Eng 1449&amp;lt;br&amp;gt;&lt;br /&gt;
Address: 20 Symonds Street&amp;lt;br&amp;gt;&lt;br /&gt;
Auckland&amp;lt;br&amp;gt;&lt;br /&gt;
New Zealand&amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.google.com/maps/place/Faculty+of+Engineering,+The+University+of+Auckland,+Auckland,+1010,+New+Zealand Map]&lt;br /&gt;
   &amp;lt;/td&amp;gt;&lt;br /&gt;
   &amp;lt;td&amp;gt;&lt;br /&gt;
[[Image:EngineeringBuilding401Web.JPG]] [[Image:RoomEng1449Web.JPG]]&lt;br /&gt;
   &amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Conference Sponsors==&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;bottom&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;[http://www.auckland.ac.nz/ https://www.owasp.org/images/8/82/University_of_Auckland_crest_small.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;bottom&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;[http://www.security.org.nz/NZISF_NZISForumContent.php https://www.owasp.org/images/5/5a/Nz_information_security_forum.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;ICT and Department of Information Systems and Operations Management&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Gold Sponsors:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[[File:INSOMNIA.PNG|center|300px|link=http://www.insomniasec.com/]]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[[File:Aurainfosec300px.jpg|center|300px|link=http://www.aurainfosec.com/]]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com https://www.owasp.org/images/4/41/SA_Logo_w_DD.gif]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.insomniasec.com Insomnia Security]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.aurasoftwaresecurity.co.nz Aura Information Security]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com www.security-assessment.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Silver Sponsors:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[[File:Beca.png|center|200px|link=http://www.beca.com/]]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[[File:Wynyard_CMYK_land.png|center|250px|link=https://www.wynyardgroup.com/]]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Support Sponsor:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[[File:BinaryMistLimited.png|center|150px|link=http://binarymist.net]]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Conference Committee==&lt;br /&gt;
&lt;br /&gt;
* Denis Andzakovic - OWASP New Zealand Leader (Auckland)&lt;br /&gt;
* Adrian Hayes -  OWASP New Zealand Leader (Wellington)&lt;br /&gt;
* Kim Carter -  OWASP New Zealand Leader (Christchurch)&lt;br /&gt;
* Lech Janczewski - Associate Professor - University of Auckland School of Business&lt;br /&gt;
&lt;br /&gt;
Please direct all enquiries to denis.andzakovic@owasp.org | adrian.hayes@owasp.org | kim.carter@owasp.org&lt;br /&gt;
&lt;br /&gt;
= Presentation Schedule=&lt;br /&gt;
==Presentations==&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
27th Feburary 2015&lt;br /&gt;
&amp;lt;table width=&amp;quot;80%&amp;quot;&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;08:30&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #8595C2; text-align: center&amp;quot;&amp;gt;Registration&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;   &lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;09:00&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Welcome to OWASP New Zealand Day 2015&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Lech Janczewski (Associate Professor), Adrian Hayes, Denis Andzakovic and Kim Carter (OWASP Leaders)&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;09:15&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #B9C2DC; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Applying OWASP Top 10 to ASP.NET MVC projects&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Kirk Jackson - Xero&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;10:00&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Integrity protection for third-party JavaScript&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Francois Marier - Mozilla&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;   &lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;10:30&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #D98B66; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Break for Morning Tea&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;   &lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;11:00&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Defaced - An insight into methodologies, tools and motivations&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Adam Bell - Lateral Security&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;11:30&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #B9C2DC; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;CMS Hell&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Pedro Worcel - Security Assessment&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;12:00&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Lazily Finding Holes Without Breaking The Law&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Nick von Dadelszen - Lateral Security&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;   &lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;12:30&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #D98B66; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Break for Lunch&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;   &lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;13:30&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;background-color: #B9C2DC; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Crypto 101 - A &amp;quot;no crazy maths&amp;quot; guide to crypto vulnerabilities&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Benjamin Kearns - Lateral Security&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;background-color: #B9C2DC; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Securing the Cloud to the Internet of Things&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Aloysius Cheang - Cloud Security Alliance&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;14:00&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;background-color: #EEE; ; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;PHP Magic Tricks: Type Juggling&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Chris Smith - Insomnia Security&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;background-color: #EEE; ; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Joined up PCI DSS : A systematic approach to PCI DSS v3 compliance&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Chris Esther - Confide Ltd&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;14:30&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;background-color: #B9C2DC; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Surprise Features in Your Favourite Framework&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Andrew Kampjes - nil and Mike Haworth - Aura&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;   &lt;br /&gt;
		&amp;lt;td style=&amp;quot;background-color: #B9C2DC; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Security among those who keep your secrets: comparing security in a top competitive&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;intelligence services firm in Peru versus a top marketing research firm in New Zealand&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Carlos Cordero - Room9&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;15:00&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;background-color: #EEE; ; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Thinking Securely: Practical Advice for Developers&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Jamie Anderson - SafeStack&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;background-color: #EEE; ; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Handling Vulnerability Disclosure in New Zealand&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;James Healy - Stoic Ltd and SafeStack&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;   &lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;15:30&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #D98B66; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Break for Afternoon Tea&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;16:00&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;The Fall and Rise of InfoSec&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Andrew Kelly - Insomnia Security&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;16:45&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #B9C2DC; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Wrap Up&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Time for the pub, for those interested&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Speakers List=&lt;br /&gt;
==Speakers List==&lt;br /&gt;
&lt;br /&gt;
===Kirk Jackson - Xero - Applying OWASP Top 10 to ASP.NET MVC projects===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
What's the OWASP Top 10, and how do we defend against those threats? Advances in web platforms and frameworks make it easier to defend against common web attacks. By introducing the defences available in ASP.NET MVC we'll see how we can make our lives easier (and more secure!).&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Kirk Jackson is Security Officer at Xero, and has presented at previous OWASP, Kiwicon and other developer conferences.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Francois Marier - Mozilla -  Integrity protection for third-party JavaScript===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Modern web applications depend on a lot of auxiliary scripts which are often hosted on third-party CDNs. Should an attacker be able to tamper with the files hosted on such a CDN, millions of sites could be compromised. Web developers need a way to guarantee the integrity of scripts hosted elsewhere.&lt;br /&gt;
&lt;br /&gt;
This is the motivation behing a new addition to the web platform being introduced by the W3C: sub-resource integrity (http://www.w3.org/TR/SRI/). Both Firefox and Chrome have initial implementations of this new specification and a few early adopters are currently evaluating this feature.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Francois is a senior software engineer in the Mozilla Security &amp;amp; Privacy team where he spends his time working on new ways to protect Firefox users. By night, he contributes to Debian and other free software projects.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Adam Bell - Lateral Security - Defaced: An insight into methodologies, tools and motivations===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;quot;The internet is a hostile place, particularly if you are a charitable organisation.&lt;br /&gt;
&lt;br /&gt;
Websites are compromised and defaced on a daily basis and sometimes their owners need a little help getting to the bottom of what happened. &lt;br /&gt;
&lt;br /&gt;
So what if your website has been compromised and is getting reports of abuse... How do you react? What can you do?&lt;br /&gt;
&lt;br /&gt;
This talk will cover a recent incident response and investigation I carried out and describe how you, as the developer-in-charge of an all-in-one webhost can investigate and respond. &lt;br /&gt;
&lt;br /&gt;
Based on a true story,  this talk will describe the incident response methodology I used, take a look at some of the tools that the defacer had left behind and give an insight into the badguys mindset and motives.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Adam Bell once ate a jam sandwich. He lives in Auckland with his newly spawned hacker progeny and fears the day she learns to pop shell. By day he is a security consultant for a prominent boutique security company, by night he tries to remember what sleep is.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Pedro Worcel - Security-Assessment.com - CMS Hell===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
We all know about Wordpress and its (in)security. What about other CMSes? What about NZ made ones?&lt;br /&gt;
&lt;br /&gt;
Introducing 'droopescan', a plugin-based tool for scanning CMSs. In this&lt;br /&gt;
talk we will see its effectiveness in identifying versions and plugins,&lt;br /&gt;
and we will see how the landscape looks like for installations of two&lt;br /&gt;
CMSs (Drupal &amp;amp; SilverStripe) in New Zealand.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Pedro is a security researcher for Security-Assessment.com, with more than five years of experience in IT. I have a strong background on web applications, and generally enjoy building and hacking software of all kinds.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Nick von Dadelszen - Lateral Security - Lazily Finding Holes Without Breaking The Law===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Why risk actively testing for security vulnerabilities in websites when a large amount of vulnerabilities can be passively found? Based on an event where a major security issue was found in a potential client's site just through passive browsing during a scoping exercise, we thought, why not always be scanning? So, enter some dodgy nickvd style code and quick fixes, a little more polished code from feabell, and you have a system that is continuously passively scanning everything you browse. The vulnerabilities just come to you. This is the true lazyman's way to find vulnerabilities, and could be used to check a large number of sites for some common issues in a quick and painless manner.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A regular in the NZ security industry, Nick has now clocked up his 15th year of penetration testing. With a full security team at Lateral Security to keep in check, his time is now more commonly spent in meetings and reviewing reports. However, he still loves to jump in and get his hands dirty, especially when it is something new and interesting. Origin: New Zealand&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Benjamin Kearns - Lateral Security - Crypto 101: A &amp;quot;no crazy maths&amp;quot; guide to crypto vulnerabilities===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
While less common that other types of security vulnerabilities encryption flaws can often have a very high impact. Some big applications, hardware and frameworks have been vulnerable to simple encryption flaws in recent years. &lt;br /&gt;
&lt;br /&gt;
This talk with run you through a variety of crypto flaws which we've observed in web and mobile applications over the last couple of years.&lt;br /&gt;
&lt;br /&gt;
It will show you how to exploit them and discuss how to protect yourself.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Ben works as a Security Consultant for Lateral Security. He has two and a half years of security experience which is backed by a further five years of IT experience, primarily spent developing web applications and administering Linux systems.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Chris Smith - Insomnia Security - PHP Magic Tricks: Type Juggling===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
PHP is a magical language! Unfortunately, magic leads to unexpected behaviour and unexpected behaviour leads to security bugs. This talk will go over a specific magic trick that PHP performs as a loosely- and dynamically-typed language.&lt;br /&gt;
&lt;br /&gt;
The trick is type juggling, a set of rules that PHP enacts when trying to compare different types together. Given the different possible ways you might want to compare different data, you'd expect there to be some unexpected behaviour in there. You'd be right. And, given the importance of the comparison operator for enforcing security controls, you'd expect that to lead to some tasty bugs. You'd be right.&lt;br /&gt;
&lt;br /&gt;
You will be introduced to PHP's various type juggling rules and how you might want to exploit them in security-critical areas of modern applications. We'll also look at a few publicized bugs that exploit this functionality and then finish off on how you can avoid exposing yourself to these issues. It'll be as easy as 'abc' == 0, I promise.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Chris is a consultant for Insomnia Security where he breaks other peoples stuff and writes reports about it. Previously a Linux sysadmin and polyglot developer, he now exacts his revenge on technologies that have wronged him.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Andrew Kampjes and Mike Haworth - nil and Aura - Surprise Features in Your Favourite Framework===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Modern web frameworks allow developers to be productive, however they are feature rich and not every feature is well understood. Some of these features can work in unexpected ways and can be leveraged by attackers. This talk will look at some of the gotchas in popular frameworks. We'll also look at the ways popular features such as social logins can go wrong.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Andrew Kampjes enjoys getting under the hood of Rails and playing with its quirks. He also gets a sick satisfaction finding security flaws in other’s code.&lt;br /&gt;
&lt;br /&gt;
Mike Haworth is a Principal Security Consultant for AuraInfoSec, he spends his days doing everything from Red Team engagements to Code Reviews.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Jamie Anderson - SafeStack - Thinking Securely: Practical Advice for Developers===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If there’s one lesson that we can learn from 2014, it’s that security needs to become a priority for any web-based application. The challenge for developers is that they don’t think the same way that security professional do. They don’t see the holes until it’s too late.&lt;br /&gt;
&lt;br /&gt;
As someone who has experienced both sides of the story, I have found a few ways to help to bridge this gap. In this talk I will share my story as well as a few tips and tricks I've learned along the way so that developers like me can think more securely and  write more secure software.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Jamie has spent a decade and a half writing software, ranging from desktop software to back-end services to web-based applications. He has recently joined the information security community and is now a secure development specialist for SafeStack.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Andrew Kelly - Insomnia Security Group Ltd - The Fall and Rise of InfoSec===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A talk with a beginning, a middle ... and a 'will it ever end?' at the end. A light-hearted, albeit with a serious message somewhere, skip and jump through three decades of collected wisdom and anecdotes on the 'fall' of InfoSec with the rise of viruses, worms, etc., in the 80's and 90's - and its subsequent 'rise' again in the 2000's due to hacking and similar nefarious activities now being 'accepted' as mainstream. Changing attitudes in the last 30 years - but not changes in music and fashion - will be covered; alongside some ideas on how you can use such changes to your advantage in your own careers and/or organisations. All this by a man who (he claims) has done the hard yards: All nine of them!&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Andrew is the Operations Manager for Insomnia Security, and a man in the twilight years of his working life. 2015 marks his 27th in Computer Security, Data Security, IT Security, Cyber Security and/or Information Security (and his 30th in IT), and he reckons he's fogotten more than he ever knew about most things - including InfoSec. Andrew now spends most of the short ime left to him now reminiscing about the old days, wallowing in past glories ... and wondering why kids today just don't understand.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Aloysius Cheang - Cloud Security Alliance - Securing the Cloud to the Internet of Things===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
CSA's Software Defined Perimeter (SDP), a next generation security architecture for virtual private clouds, hardened SaaS, BYOD and Internet of Things (IOT), is explained. CSA is disrupting network security by making networks dark and adapting innovations from top secret systems. We will deep dive into the reference architecture, review enterprise implementations and discuss the future of SDP and IOT through the looking glass of the CSA.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Aloysius Cheang is Managing Director APAC of Cloud Security Alliance. He also heads up the Standards Secretariat. Aloysius brings to the CSA extensive experience gained from running business units and multi-million enterprise security and technology programs for Global 500 organizations worldwide in his previous roles as a global CSO for a leading Telco and as APAC practice leaders for leading management consulting firms. He is an active community leader, having founded and mentored various information security projects, forums, groups and associations in Singapore and globally. He is also active in standardization and was most recently a co-editor for ISO/IEC 27032 “Guidelines for Cybersecurity”. Aloysius holds a B. Sc (Hons) and Master’s degrees in Computer Science from the National University of Singapore with professional certifications such as CISA, CISSP and GCIH. His views are valued by global media such as Times, Wall Street Journal and CIO Magazine as a trusted independent source of specialist opinion over the last 15 years.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Chris Esther - Confide Ltd - Joined up PCI DSS : A systematic approach to PCI DSS v3 compliance===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In this presentation I will eschew the list of requirements approach to&lt;br /&gt;
compliance and will reframe the PCI DSS using a systems approach to&lt;br /&gt;
provide a holistic view of its requirements.&lt;br /&gt;
The key processes and their linkages will be identified, including:&lt;br /&gt;
* Scoping&lt;br /&gt;
* Vulnerability management&lt;br /&gt;
* Configuration management&lt;br /&gt;
* Change management&lt;br /&gt;
* Development&lt;br /&gt;
* Testing&lt;br /&gt;
Similarly the core information required by PCI DSS will be identified&lt;br /&gt;
and relationships between them discussed, including:&lt;br /&gt;
* Cardholder data flow diagram&lt;br /&gt;
* Network diagram&lt;br /&gt;
* Configuration Management Database&lt;br /&gt;
If you are new to PCI DSS it should provide a solid foundation for&lt;br /&gt;
understanding it. For those already being embraced by PCI DSS it may&lt;br /&gt;
provide another perspective that should help when managing the increased&lt;br /&gt;
evidential requirements of PCI DSS V3.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Developer background, qualified lawyer, QSA. Currently providing advisory and compliance services to commercial and government organisations focusing on PCI DSS and privacy.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Carlos Cordero - Security among those who keep your secrets: comparing security in a top competitive intelligence services===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Firm A is the Latin American equivalent of IDC, Gartner, or Forrester but Peruvian. Firm B started&lt;br /&gt;
as a top New Zealand market research firm and is not part of a top 5 multinational market research&lt;br /&gt;
corporation. Both companies provide research services to enterprise corporations, Firm A to&lt;br /&gt;
practically every well know IT vendor which operates in Latin America and Firm B to New Zealand&lt;br /&gt;
and Australian corporation in the Financial, FMCG, Telecom, Media, and other critical industries.&lt;br /&gt;
Therefore, both firms hold commercially sensitive information about the goals, intentions, activities,&lt;br /&gt;
and plans of their clients. Both also have contracts with some of said clients to protect such&lt;br /&gt;
information.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Commercial Executive at Room9, a web applications development company based in Hamilton.  In charge of all things commercial. A full member of the IITP despite not having a computer science degree but a business management one.  Prior to New Zealand, founding partner of an intelligence firm which counts as clients vendors such as Microsoft, Intel, Oracle, IBM, HP, Dell, Telefonica, Telmex, AT&amp;amp;T, Siemens, to name a few.  Also was an elected leader of the Peruvian equivalent to NZ Tech.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===James Healy - Stoic Limited, apprentice at SafeStack - Handling Vulnerability Disclosure in New Zealand===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
As a security researcher, reporting security issues to businesses and organisations can sometimes get dicey. As a company you need a disclosure policy in place, and a plan for what happens post-disclosure.. Especially if you've just had your private emails and photo's from 2011's Christmas do (oh dear..) posted on Twitter. This talk applies to companies of all sizes and addresses planning, right through to patching and publication.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
James researched malware and packers during his teen years before moving onto web application security and development. For the past year he's been a C# developer at CourierPost and recently started an apprenticeship at SafeStack. He's also a freelance developer pretending to be from a large company called Stoic Ltd when in fact it's just him making websites. He enjoys beer and coffee. You should probably buy him one of those. James is also a little weirded out writing a bio in third-person.&lt;br /&gt;
&lt;br /&gt;
= Training Day =&lt;br /&gt;
==Training Day==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We are happy to announce that training will run on Thursday the 26th of February 2015, the day before the OWASP Day conference. The courses will be running from 9:00 AM sharp to 5:00PM. The training venues will be auditoriums kindly provided by the University of Auckland, in the same building as the OWASP Day conference itself. Due to popular demand, we are now sold out! &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Cost: '''$380 USD''' (roughly $500 NZD) per person.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Details are as follows:&lt;br /&gt;
&lt;br /&gt;
===Training Abstract - Bootstrapping Agile Security===&lt;br /&gt;
&lt;br /&gt;
Agile development is often seen as a delicate balance of ritual and roles allowing for rapid development, continuous deployment and the expansion of the post-it note industry. Security is often seen as a lumbering giant of process, governance and technology allowing for increased control, reduced risk and the expansion of the technology vendor industry.&lt;br /&gt;
&lt;br /&gt;
What if you could merge the two?&lt;br /&gt;
&lt;br /&gt;
The world of security is changing to meet the needs of agile software development. Organisations around the world are coming up with tools, techniques and processes to make security a continuous presence to support developers. This hands on, fast-paced course will not only give students a solid grounding in how to bring security into agile software development life-cycles, but also give a range of tools, techniques and practical skills to make it happen. &lt;br /&gt;
&lt;br /&gt;
===Trainer Bio - Laura Bell===&lt;br /&gt;
&lt;br /&gt;
Laura Bell is the founder and lead consultant at SafeStack, a specialist New Zealand agile security firm. With almost a decade of experience in software development and information security, Laura specialises in bringing security practices and culture into organisations of every shape and size. Her recent research into agile security practices has generated a set of tools and processes that can enable the management of security risk without compromising innovation or speed.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Registration===&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--If you are interested in registering for the training session please email [mailto:adrian.hayes@owasp.org?cc=denis.andzakovic@owasp.org&amp;amp;cc=kim.carter@owasp.org adrian.hayes@owasp.org.nz, denis.andzakovic@owasp.org, and kim.carter@owasp.org] and let us know who you would like to attend.--&amp;gt;&lt;br /&gt;
Is now closed.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- = Call For Presentations =&lt;br /&gt;
==Call For Presentations==&lt;br /&gt;
&lt;br /&gt;
OWASP New Zealand Day conferences attract a high quality of speakers from a variety of security disciplines including&lt;br /&gt;
architects, web developers and engineers, system administrators, penetration testers, policy specialists and more.&lt;br /&gt;
We encourage presentations to have a strong component on fixing and prevention of security issues. We are looking for presentations on a wide variety of security topics,&lt;br /&gt;
including but not limited to:&lt;br /&gt;
&lt;br /&gt;
* Web application security&lt;br /&gt;
* Mobile security&lt;br /&gt;
* Secure development&lt;br /&gt;
* Vulnerability analysis&lt;br /&gt;
* Threat modelling&lt;br /&gt;
* Threat and vulnerability countermeasures&lt;br /&gt;
* Platform or language security (JavaScript, .NET, Java, RoR, etc)&lt;br /&gt;
* Penetration Testing&lt;br /&gt;
* Browser and client security&lt;br /&gt;
* Application and solution architecture security&lt;br /&gt;
* PCI DSS&lt;br /&gt;
* Risk management&lt;br /&gt;
* Security concepts for C*Os, project managers and other non-technical attendees&lt;br /&gt;
* Privacy controls&lt;br /&gt;
&lt;br /&gt;
The email subject must be &amp;quot;OWASP New Zealand 2015: CFP&amp;quot; and the email body must contain the following information/sections:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name and Surname&lt;br /&gt;
* Affiliation&lt;br /&gt;
* Telephone number&lt;br /&gt;
* Email address&lt;br /&gt;
* Short presenter bio&lt;br /&gt;
* Title of the contribution&lt;br /&gt;
* Type of contribution: Technical, Informative, Management&lt;br /&gt;
* Short abstract (up to 500 words)&lt;br /&gt;
* List of the author's previous papers/articles/speeches on the same/similar topic (if any)&lt;br /&gt;
* If you are not from New Zealand, will your company support your travel/accommodation costs? - Yes/No&lt;br /&gt;
&lt;br /&gt;
The submission will be reviewed by the OWASP New Zealand Day conference committee and the highest voted talks will be selected and invited for presentation.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
PLEASE NOTE:&lt;br /&gt;
&lt;br /&gt;
* Due to limited budget available, expenses for international speakers cannot be covered.&lt;br /&gt;
* If your company is willing to cover travel and accommodation costs, the company will become &amp;quot;Support Sponsor&amp;quot; of the event.&lt;br /&gt;
&lt;br /&gt;
Please submit the above information to all of the following: Denis Andzakovic (denis.andzakovic@owasp.org), Adrian Hayes (adrian.hayes@owasp.org) and Kim Carter (kim.carter@owasp.org).&lt;br /&gt;
&lt;br /&gt;
Submissions deadline: 19th January 2015&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Call For Trainers =&lt;br /&gt;
== Call For Trainers ==&lt;br /&gt;
&lt;br /&gt;
We are happy to announce that training will run on Thursday February 26th 2015, the day before the OWASP Day conference.&lt;br /&gt;
The training venues will be auditoriums kindly provided by the University of Auckland, in the same building as the OWASP Day conference itself.&lt;br /&gt;
Classes will contain up to 20 students, and each seat has power for laptop usage. A wide range of half-day or full-day training proposals will be considered,&lt;br /&gt;
see the Call for Papers for a list of example topics.&lt;br /&gt;
&lt;br /&gt;
If you are interested in running one of the training sessions, please contact Denis Andzakovic, Adrian Hayes and Kim Carter with the following information:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Trainer name&lt;br /&gt;
* Trainer organisation&lt;br /&gt;
* Telephone + email contact&lt;br /&gt;
* Short Trainer bio&lt;br /&gt;
* Training title&lt;br /&gt;
* Trainer requirements (e.g. a projector, whiteboard, etc)&lt;br /&gt;
* Trainee requirements (e.g. laptop, VMWare/Virtualbox, etc)&lt;br /&gt;
* Training summary (less than 500 words)&lt;br /&gt;
* Target audience (e.g. testers, project managers, security managers, web developers, architects)&lt;br /&gt;
* Skill level required (Basic / Intermediate / Advanced)&lt;br /&gt;
* What attendees can expect to learn (key objectives)&lt;br /&gt;
* Short course outline&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The fixed price per head for training will be $250 for a half-day session and $500 for a whole-day session. As this training is part of an OWASP event, part of the proceeds go back to OWASP. The split is as follows:&lt;br /&gt;
&lt;br /&gt;
* 25% to OWASP Global - used for OWASP projects around the world&lt;br /&gt;
* 25% to OWASP NZ Day - used for expenses such as catering during the conference&lt;br /&gt;
* 50% to the training provider.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Please submit the above information to all of the following:&lt;br /&gt;
* Denis Andzakovic (denis.andzakovic@owasp.org)&lt;br /&gt;
* Adrian Hayes (adrian.hayes@owasp.org)&lt;br /&gt;
* Kim Carter (kim.carter@owasp.org).&lt;br /&gt;
&lt;br /&gt;
Submissions deadline: 19th January 2015&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Call For Sponsorships =&lt;br /&gt;
==Call For Sponsorships==&lt;br /&gt;
&lt;br /&gt;
OWASP New Zealand Day 2015 will be held in Auckland on the 27th of February, 2015 and is a security conference entirely dedicated to application security.&lt;br /&gt;
The conference is once again being hosted by the University of Auckland with their support and assistance.&lt;br /&gt;
OWASP New Zealand Day 2015 is a free event, but requires sponsor support to help be an instructive and quality event for the New Zealand community.&lt;br /&gt;
OWASP is strictly not for profit. The sponsorship money will be used to help make OWASP New Zealand Day 2015 a free, compelling, and valuable experience for all attendees.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The sponsorship funds collected are to be used for things such as:&lt;br /&gt;
&lt;br /&gt;
* Refreshments (coffee break/lunch) - we want to keep people refreshed during the day; while we certainly bring good and interesting speakers, we don't want people to go home when they become hungry. &lt;br /&gt;
* Name tags - we feel that getting to know people within the New Zealand community is important, and name tags make that possible.&lt;br /&gt;
* Promotion - up to now our events are propagating by word of mouth. We would like to get to a wider audience by advertising our events.&lt;br /&gt;
* Printed Materials - printed materials will include brochures, tags and lanyards.&lt;br /&gt;
&lt;br /&gt;
== Facts ==&lt;br /&gt;
&lt;br /&gt;
In 2013, the event was supported by six sponsors and attracted more than 250 participants. Plenty of constructive (and positive!) feedback from the audience was received and we are using this to make the conference more appealing to more people. For more information on the last New Zealand Day event, please visit: https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2013&lt;br /&gt;
&lt;br /&gt;
The OWASP New Zealand community is strong, this year has Christchurch as a new region and there are more than 360 people currently subscribed to the mailing-list. OWASP New Zealand Day is expected to attract between 250 and 300 attendees this year.&lt;br /&gt;
&lt;br /&gt;
OWASP regular attendees are IT project managers, IT security managers, IT security consultants, web application architects and developers, QA managers, QA testers and system administrators.&lt;br /&gt;
&lt;br /&gt;
== Sponsorships  ==&lt;br /&gt;
&lt;br /&gt;
There are three different levels of sponsorships for the OWASP Day event:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Support Sponsorship&amp;lt;/b&amp;gt;: (Covering international speaker travel expenses, media coverage/article/promotion of the event)&lt;br /&gt;
   &lt;br /&gt;
Includes:&lt;br /&gt;
&lt;br /&gt;
* Publication of the sponsor logo on the event web site - https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2015&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Silver Sponsorship&amp;lt;/b&amp;gt;: 1500 NZD&lt;br /&gt;
&lt;br /&gt;
Includes: &lt;br /&gt;
&lt;br /&gt;
* Publication of the sponsor logo on the event web site - https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2015&lt;br /&gt;
* The publication of the sponsor logo on the event site, in the agenda, on the handouts and in all the official communications with the attendees at the conference.&lt;br /&gt;
* The possibility to distribute the company brochures, CDs or other materials to the participants during the event.&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Gold Sponsorship&amp;lt;/b&amp;gt;: 2750 NZD&lt;br /&gt;
&lt;br /&gt;
Includes: &lt;br /&gt;
&lt;br /&gt;
* The possibility to have a promotional banner or sign side stage in the main auditorium (to be provided by the sponsor, size subject to approval by the OWASP NZ Day Committee).&lt;br /&gt;
* The publication of the sponsor logo on the event site, in the agenda, on the handouts and in all the official communications with the attendees at the conference.&lt;br /&gt;
* The possibility to distribute the company brochures, CDs or other materials to the participants during the event.&lt;br /&gt;
* Publication of the sponsor logo on the OWASP New Zealand Chapter page - Sponsor logo on the OWASP NZ site prior and during the OWASP Day event - https://www.owasp.org/index.php/New_Zealand&lt;br /&gt;
* Publication of the sponsor logo on the event web site - https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2015&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Those who are interested in sponsoring OWASP New Zealand 2015 Conference can contact the [mailto:kim.carter@owasp.org?cc=adrian.hayes@owasp.org?cc=denis.andzakovic@owasp.org OWASP New Zealand Board].&amp;lt;br&amp;gt;&lt;br /&gt;
 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]]&lt;/div&gt;</summary>
		<author><name>Adrian Hayes</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_New_Zealand_Day_2015&amp;diff=188699</id>
		<title>OWASP New Zealand Day 2015</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_New_Zealand_Day_2015&amp;diff=188699"/>
				<updated>2015-01-28T19:20:44Z</updated>
		
		<summary type="html">&lt;p&gt;Adrian Hayes: /* Training Day */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2015 https://www.owasp.org/images/9/94/New_Zealand_Day_2015_020.png]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''26th and 27th Feburary 2015 - Auckland'''&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
= Introduction =&lt;br /&gt;
==Introduction==&lt;br /&gt;
We are proud to announce the sixth OWASP New Zealand Day conference, to be held at the University of Auckland on Friday February 27th, 2015. OWASP New Zealand Day is a one-day conference dedicated to application security, with an emphasis on secure architecture and development techniques to help Kiwi developers build more secure applications.&lt;br /&gt;
&lt;br /&gt;
Similar to last year:&lt;br /&gt;
&lt;br /&gt;
* We will be offering training on the day before the conference (Thursday, 26th of February). &lt;br /&gt;
* After lunch on the conference day, we will split to two tracks - one focused on technical topics, the other on policy, compliance and risk management. &lt;br /&gt;
&lt;br /&gt;
The sixth OWASP New Zealand Day will be happening thanks to the support provided by the University of Auckland, which will kindly offer a slightly different location from the last five years. Entry to the event will, as in the past, be free.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For any comments, feedback or observations, please don't hesitate to contact [mailto:kim.carter@owasp.org?cc=adrian.hayes@owasp.org?cc=denis.andzakovic@owasp.org us].&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Registration==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Registration is not yet open. Please join our low volume [https://lists.owasp.org/mailman/listinfo/owasp-newzealand mailing list] to be notified when registration opens.&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Registration for the main conference day is now open: [https://registration.owasp.org.nz/ Conference Registration Here]&lt;br /&gt;
&lt;br /&gt;
There is no cost for the main conference day and lunch is provided. We do ask that if at any point you realise you cannot make it please cancel your registration to make room for others as spaces are limited.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
If you are interested in registering for the training session on the 26th please email [mailto:adrian.hayes@owasp.org?cc=denis.andzakovic@owasp.org&amp;amp;cc=kim.carter@owasp.org adrian.hayes@owasp.org, denis.andzakovic@owasp.org, and kim.carter@owasp.org] and let us know who you would like to attend.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Registration is now closed.&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Important dates==&lt;br /&gt;
&lt;br /&gt;
* ''CFP &amp;amp; CFT submission deadline: 19th January 2015''&lt;br /&gt;
* ''Conference and Training Registration deadline: 12th February 2015''&lt;br /&gt;
* Training Day date:          26th February 2015&lt;br /&gt;
* Conference Day date:           27th February 2015&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
For those of you booking flights, ensure you can be at the venue at 8:30am, the conference will end by 5:30pm however we will have post conference drinks at a local drinking establishment for those interested.&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Conference Venue==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
   &amp;lt;td&amp;gt;&lt;br /&gt;
The University of Auckland Engineering Department&amp;lt;br&amp;gt;&lt;br /&gt;
Engineering Building #401&amp;lt;br&amp;gt;&lt;br /&gt;
Room: Eng 1449&amp;lt;br&amp;gt;&lt;br /&gt;
Address: 20 Symonds Street&amp;lt;br&amp;gt;&lt;br /&gt;
Auckland&amp;lt;br&amp;gt;&lt;br /&gt;
New Zealand&amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.google.com/maps/place/Faculty+of+Engineering,+The+University+of+Auckland,+Auckland,+1010,+New+Zealand Map]&lt;br /&gt;
   &amp;lt;/td&amp;gt;&lt;br /&gt;
   &amp;lt;td&amp;gt;&lt;br /&gt;
[[Image:EngineeringBuilding401Web.JPG]] [[Image:RoomEng1449Web.JPG]]&lt;br /&gt;
   &amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Conference Sponsors==&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;bottom&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;[http://www.auckland.ac.nz/ https://www.owasp.org/images/8/82/University_of_Auckland_crest_small.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;bottom&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;[http://www.security.org.nz/NZISF_NZISForumContent.php https://www.owasp.org/images/5/5a/Nz_information_security_forum.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;ICT and Department of Information Systems and Operations Management&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Gold Sponsors:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[[File:INSOMNIA.PNG|center|300px|link=http://www.insomniasec.com/]]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[[File:Aurainfosec300px.jpg|center|300px|link=http://www.aurainfosec.com/]]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com https://www.owasp.org/images/4/41/SA_Logo_w_DD.gif]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.insomniasec.com Insomnia Security]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.aurasoftwaresecurity.co.nz Aura Information Security]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com www.security-assessment.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Silver Sponsors:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[[File:Beca.png|center|200px|link=http://www.beca.com/]]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[[File:Wynyard_CMYK_land.png|center|250px|link=https://www.wynyardgroup.com/]]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Support Sponsor:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[[File:BinaryMistLimited.png|center|150px|link=http://binarymist.net]]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Conference Committee==&lt;br /&gt;
&lt;br /&gt;
* Denis Andzakovic - OWASP New Zealand Leader (Auckland)&lt;br /&gt;
* Adrian Hayes -  OWASP New Zealand Leader (Wellington)&lt;br /&gt;
* Kim Carter -  OWASP New Zealand Leader (Christchurch)&lt;br /&gt;
* Lech Janczewski - Associate Professor - University of Auckland School of Business&lt;br /&gt;
&lt;br /&gt;
Please direct all enquiries to denis.andzakovic@owasp.org | adrian.hayes@owasp.org | kim.carter@owasp.org&lt;br /&gt;
&lt;br /&gt;
= Presentation Schedule=&lt;br /&gt;
==Presentations==&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
27th Feburary 2015&lt;br /&gt;
&amp;lt;table width=&amp;quot;80%&amp;quot;&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;08:30&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #8595C2; text-align: center&amp;quot;&amp;gt;Registration&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;   &lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;09:00&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Welcome to OWASP New Zealand Day 2015&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Lech Janczewski (Associate Professor), Adrian Hayes, Denis Andzakovic and Kim Carter (OWASP Leaders)&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;09:15&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #B9C2DC; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Title: Applying OWASP Top 10 to ASP.NET MVC projects&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Kirk Jackson - Xero&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;10:00&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Integrity protection for third-party JavaScript&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Francois Marier - Mozilla&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;   &lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;10:30&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #D98B66; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Break for Morning Tea&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;   &lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;11:00&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Defaced - An insight into methodologies, tools and motivations&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Adam Bell - Lateral Security&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;11:30&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #B9C2DC; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;CMS Hell&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Pedro Worcel - Security Assessment&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;12:00&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Lazily Finding Holes Without Breaking The Law&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Nick von Dadelszen - Lateral Security&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;   &lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;12:30&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #D98B66; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Break for Lunch&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;   &lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;13:30&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;background-color: #B9C2DC; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Crypto 101 - A &amp;quot;no crazy maths&amp;quot; guide to crypto vulnerabilities&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Benjamin Kearns - Lateral Security&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;background-color: #B9C2DC; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Securing the Cloud to the Internet of Things&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Aloysius Cheang - Cloud Security Alliance&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;14:00&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;background-color: #EEE; ; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;PHP Magic Tricks: Type Juggling&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Chris Smith - Insomnia Security&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;background-color: #EEE; ; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Joined up PCI DSS : A systematic approach to PCI DSS v3 compliance&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Chris Esther - Confide Ltd&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;14:30&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;background-color: #B9C2DC; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Surprise Features in Your Favourite Framework&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Andrew Kampjes - nil and Mike Haworth - Aura&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;   &lt;br /&gt;
		&amp;lt;td style=&amp;quot;background-color: #B9C2DC; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Security all the way: the transformation of a NZ web applications development firm.&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Carlos Cordero - Room9&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;15:00&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;background-color: #EEE; ; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Thinking Securely: Practical Advice for Developers&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Jamie Anderson - SafeStack&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;background-color: #EEE; ; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Handling Vulnerability Disclosure in New Zealand&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;James Healy - Stoic Ltd and SafeStack&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;   &lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;15:30&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #D98B66; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Break for Afternoon Tea&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;16:00&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;The Fall and Rise of InfoSec&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Andrew Kelly - Insomnia Security&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;16:45&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #B9C2DC; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Wrap Up&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Time for the pub, for those interested&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Speakers List=&lt;br /&gt;
==Speakers List==&lt;br /&gt;
&lt;br /&gt;
===Kirk Jackson - Xero - Applying OWASP Top 10 to ASP.NET MVC projects===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
What's the OWASP Top 10, and how do we defend against those threats? Advances in web platforms and frameworks make it easier to defend against common web attacks. By introducing the defences available in ASP.NET MVC we'll see how we can make our lives easier (and more secure!).&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Kirk Jackson is Security Officer at Xero, and has presented at previous OWASP, Kiwicon and other developer conferences.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Francois Marier - Mozilla -  Integrity protection for third-party JavaScript===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Modern web applications depend on a lot of auxiliary scripts which are often hosted on third-party CDNs. Should an attacker be able to tamper with the files hosted on such a CDN, millions of sites could be compromised. Web developers need a way to guarantee the integrity of scripts hosted elsewhere.&lt;br /&gt;
&lt;br /&gt;
This is the motivation behing a new addition to the web platform being introduced by the W3C: sub-resource integrity (http://www.w3.org/TR/SRI/). Both Firefox and Chrome have initial implementations of this new specification and a few early adopters are currently evaluating this feature.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Francois is a senior software engineer in the Mozilla Security &amp;amp; Privacy team where he spends his time working on new ways to protect Firefox users. By night, he contributes to Debian and other free software projects.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Adam Bell - Lateral Security - Defaced: An insight into methodologies, tools and motivations===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;quot;The internet is a hostile place, particularly if you are a charitable organisation.&lt;br /&gt;
&lt;br /&gt;
Websites are compromised and defaced on a daily basis and sometimes their owners need a little help getting to the bottom of what happened. &lt;br /&gt;
&lt;br /&gt;
So what if your website has been compromised and is getting reports of abuse... How do you react? What can you do?&lt;br /&gt;
&lt;br /&gt;
This talk will cover a recent incident response and investigation I carried out and describe how you, as the developer-in-charge of an all-in-one webhost can investigate and respond. &lt;br /&gt;
&lt;br /&gt;
Based on a true story,  this talk will describe the incident response methodology I used, take a look at some of the tools that the defacer had left behind and give an insight into the badguys mindset and motives.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Adam Bell once ate a jam sandwich. He lives in Auckland with his newly spawned hacker progeny and fears the day she learns to pop shell. By day he is a security consultant for a prominent boutique security company, by night he tries to remember what sleep is.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Pedro Worcel - Security-Assessment.com - CMS Hell===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
We all know about Wordpress and its (in)security. What about other CMSes? What about NZ made ones?&lt;br /&gt;
&lt;br /&gt;
Introducing 'droopescan', a plugin-based tool for scanning CMSs. In this&lt;br /&gt;
talk we will see its effectiveness in identifying versions and plugins,&lt;br /&gt;
and we will see how the landscape looks like for installations of two&lt;br /&gt;
CMSs (Drupal &amp;amp; SilverStripe) in New Zealand.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Pedro is a security researcher for Security-Assessment.com, with more than five years of experience in IT. I have a strong background on web applications, and generally enjoy building and hacking software of all kinds.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Nick von Dadelszen - Lateral Security - Lazily Finding Holes Without Breaking The Law===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Why risk actively testing for security vulnerabilities in websites when a large amount of vulnerabilities can be passively found? Based on an event where a major security issue was found in a potential client's site just through passive browsing during a scoping exercise, we thought, why not always be scanning? So, enter some dodgy nickvd style code and quick fixes, a little more polished code from feabell, and you have a system that is continuously passively scanning everything you browse. The vulnerabilities just come to you. This is the true lazyman's way to find vulnerabilities, and could be used to check a large number of sites for some common issues in a quick and painless manner.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A regular in the NZ security industry, Nick has now clocked up his 15th year of penetration testing. With a full security team at Lateral Security to keep in check, his time is now more commonly spent in meetings and reviewing reports. However, he still loves to jump in and get his hands dirty, especially when it is something new and interesting. Origin: New Zealand&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Benjamin Kearns - Lateral Security - Crypto 101: A &amp;quot;no crazy maths&amp;quot; guide to crypto vulnerabilities===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
While less common that other types of security vulnerabilities encryption flaws can often have a very high impact. Some big applications, hardware and frameworks have been vulnerable to simple encryption flaws in recent years. &lt;br /&gt;
&lt;br /&gt;
This talk with run you through a variety of crypto flaws which we've observed in web and mobile applications over the last couple of years.&lt;br /&gt;
&lt;br /&gt;
It will show you how to exploit them and discuss how to protect yourself.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Ben works as a Security Consultant for Lateral Security. He has two and a half years of security experience which is backed by a further five years of IT experience, primarily spent developing web applications and administering Linux systems.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Chris Smith - Insomnia Security - PHP Magic Tricks: Type Juggling===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
PHP is a magical language! Unfortunately, magic leads to unexpected behaviour and unexpected behaviour leads to security bugs. This talk will go over a specific magic trick that PHP performs as a loosely- and dynamically-typed language.&lt;br /&gt;
&lt;br /&gt;
The trick is type juggling, a set of rules that PHP enacts when trying to compare different types together. Given the different possible ways you might want to compare different data, you'd expect there to be some unexpected behaviour in there. You'd be right. And, given the importance of the comparison operator for enforcing security controls, you'd expect that to lead to some tasty bugs. You'd be right.&lt;br /&gt;
&lt;br /&gt;
You will be introduced to PHP's various type juggling rules and how you might want to exploit them in security-critical areas of modern applications. We'll also look at a few publicized bugs that exploit this functionality and then finish off on how you can avoid exposing yourself to these issues. It'll be as easy as 'abc' == 0, I promise.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Chris is a consultant for Insomnia Security where he breaks other peoples stuff and writes reports about it. Previously a Linux sysadmin and polyglot developer, he now exacts his revenge on technologies that have wronged him.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Andrew Kampjes and Mike Haworth - nil and Aura - Surprise Features in Your Favourite Framework===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Modern web frameworks allow developers to be productive, however they are feature rich and not every feature is well understood. Some of these features can work in unexpected ways and can be leveraged by attackers. This talk will look at some of the gotchas in popular frameworks. We'll also look at the ways popular features such as social logins can go wrong.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Andrew Kampjes enjoys getting under the hood of Rails and playing with its quirks. He also gets a sick satisfaction finding security flaws in other’s code.&lt;br /&gt;
&lt;br /&gt;
Mike Haworth is a Principal Security Consultant for AuraInfoSec, he spends his days doing everything from Red Team engagements to Code Reviews.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Jamie Anderson - SafeStack - Thinking Securely: Practical Advice for Developers===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If there’s one lesson that we can learn from 2014, it’s that security needs to become a priority for any web-based application. The challenge for developers is that they don’t think the same way that security professional do. They don’t see the holes until it’s too late.&lt;br /&gt;
&lt;br /&gt;
As someone who has experienced both sides of the story, I have found a few ways to help to bridge this gap. In this talk I will share my story as well as a few tips and tricks I've learned along the way so that developers like me can think more securely and  write more secure software.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Jamie has spent a decade and a half writing software, ranging from desktop software to back-end services to web-based applications. He has recently joined the information security community and is now a secure development specialist for SafeStack.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Andrew Kelly - Insomnia Security Group Ltd - The Fall and Rise of InfoSec===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A talk with a beginning, a middle ... and a 'will it ever end?' at the end. A light-hearted, albeit with a serious message somewhere, skip and jump through three decades of collected wisdom and anecdotes on the 'fall' of InfoSec with the rise of viruses, worms, etc., in the 80's and 90's - and its subsequent 'rise' again in the 2000's due to hacking and similar nefarious activities now being 'accepted' as mainstream. Changing attitudes in the last 30 years - but not changes in music and fashion - will be covered; alongside some ideas on how you can use such changes to your advantage in your own careers and/or organisations. All this by a man who (he claims) has done the hard yards: All nine of them!&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Andrew is the Operations Manager for Insomnia Security, and a man in the twilight years of his working life. 2015 marks his 27th in Computer Security, Data Security, IT Security, Cyber Security and/or Information Security (and his 30th in IT), and he reckons he's fogotten more than he ever knew about most things - including InfoSec. Andrew now spends most of the short ime left to him now reminiscing about the old days, wallowing in past glories ... and wondering why kids today just don't understand.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Aloysius Cheang - Cloud Security Alliance - Securing the Cloud to the Internet of Things===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
CSA's Software Defined Perimeter (SDP), a next generation security architecture for virtual private clouds, hardened SaaS, BYOD and Internet of Things (IOT), is explained. CSA is disrupting network security by making networks dark and adapting innovations from top secret systems. We will deep dive into the reference architecture, review enterprise implementations and discuss the future of SDP and IOT through the looking glass of the CSA.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Aloysius Cheang is a cybersecurity enthusiast first and a senior business executive second.  He has extensive experience in managing and delivering direct business values in strategic, complex multi-million dollar information technology (IT) program and business projects for Global 500 organisations worldwide. In his line of work, Aloysius has managed large multi-cultural, multi-disciplinary team spread across 5 continents and 4 major time zones, many a time building up the business from scratch.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Chris Esther - Confide Ltd - Joined up PCI DSS : A systematic approach to PCI DSS v3 compliance===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In this presentation I will eschew the list of requirements approach to&lt;br /&gt;
compliance and will reframe the PCI DSS using a systems approach to&lt;br /&gt;
provide a holistic view of its requirements.&lt;br /&gt;
The key processes and their linkages will be identified, including:&lt;br /&gt;
* Scoping&lt;br /&gt;
* Vulnerability management&lt;br /&gt;
* Configuration management&lt;br /&gt;
* Change management&lt;br /&gt;
* Development&lt;br /&gt;
* Testing&lt;br /&gt;
Similarly the core information required by PCI DSS will be identified&lt;br /&gt;
and relationships between them discussed, including:&lt;br /&gt;
* Cardholder data flow diagram&lt;br /&gt;
* Network diagram&lt;br /&gt;
* Configuration Management Database&lt;br /&gt;
If you are new to PCI DSS it should provide a solid foundation for&lt;br /&gt;
understanding it. For those already being embraced by PCI DSS it may&lt;br /&gt;
provide another perspective that should help when managing the increased&lt;br /&gt;
evidential requirements of PCI DSS V3.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Developer background, qualified lawyer, QSA. Currently providing advisory and compliance services to commercial and government organisations focusing on PCI DSS and privacy.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Carlos Cordero - Room9 - Security all the way: the transformation of a NZ web applications development firm===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Room9 develops, re-engineers, and maintains, applications built on web technologies.  We are a software development firm to the core.  In September last year we started a transformation by which we will make the manifold dimensions of security the main distinguishing attribute of our organisation.&lt;br /&gt;
&lt;br /&gt;
To achieve this we are working in several fronts in parallel: upscaling of our staff (SANS), certification (GIAC), reviewing and re-writing all of our policies, reviewing and re-designing all of our processes and guidelines, transforming most of our core operations, and becoming quite active in communicating to our clients the realities of security. &lt;br /&gt;
&lt;br /&gt;
We have learnt are lot already about the realities of refocusing everything on security.  These lessons, reality checks, and anecdotes, we believe could be valuable for any IT shop who is wanting to focus more on security.  &lt;br /&gt;
&lt;br /&gt;
Our presentation will be sharing: &lt;br /&gt;
&lt;br /&gt;
the thinking behind our decision to transform the firm;&lt;br /&gt;
our initial expectations of what the process would be like contrasted against the realities we are finding while implementing it;&lt;br /&gt;
how we are getting organised and moving ahead;&lt;br /&gt;
the role DevOps is playing in our transformation;&lt;br /&gt;
the two foci: on internal security and on the work we do for others;&lt;br /&gt;
why everyone in the organisation has to be involved;&lt;br /&gt;
the role of leadership;&lt;br /&gt;
the importance of benchmarking for best practice and of not compromising the objectives;&lt;br /&gt;
balancing the need to remain secure with the practicalities of what can be achieved;&lt;br /&gt;
the need for an iterative approach, lots of humour, and a sprinkle of paranoia, for mental sanity’s sake.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Commercial Executive at Room9, a web applications development company based in Hamilton.  In charge of all things commercial. A full member of the IITP despite not having a computer science degree but a business management one.  Prior to New Zealand, founding partner of an intelligence firm which counts as clients vendors such as Microsoft, Intel, Oracle, IBM, HP, Dell, Telefonica, Telmex, AT&amp;amp;T, Siemens, to name a few.  Also was an elected leader of the Peruvian equivalent to NZ Tech. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===James Healy - Stoic Limited, soon-to-be apprentice at SafeStack - Handling Vulnerability Disclosure in New Zealand===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
As a security researcher, reporting security issues to businesses and organisations can sometimes get dicey. As a company you need a disclosure policy in place, and a plan for what happens post-disclosure.. Especially if you've just had your private emails and photo's from 2011's Christmas do (oh dear..) posted on Twitter. This talk applies to companies of all sizes and addresses planning, right through to patching and publication.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
James researched malware and packers during his teen years before moving onto web application security and development. For the past year he's been a C# developer at CourierPost and recently started an apprenticeship at SafeStack. He's also a freelance developer pretending to be from a large company called Stoic Ltd when in fact it's just him making websites. He enjoys beer and coffee. You should probably buy him one of those. James is also a little weirded out writing a bio in third-person.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Training Day =&lt;br /&gt;
==Training Day==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We are happy to announce that training will run on Thursday the 26th of February 2015, the day before the OWASP Day conference. The courses will be running from 9:00 AM sharp to 5:00PM. The training venues will be auditoriums kindly provided by the University of Auckland, in the same building as the OWASP Day conference itself. Feedback from previous training has been very positive and there are limited spaces - so get in quick! &lt;br /&gt;
&lt;br /&gt;
Cost: '''$380 USD''' (roughly $500 NZD) per person.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Details are as follows:&lt;br /&gt;
&lt;br /&gt;
===Training Abstract - Bootstrapping Agile Security===&lt;br /&gt;
&lt;br /&gt;
Agile development is often seen as a delicate balance of ritual and roles allowing for rapid development, continuous deployment and the expansion of the post-it note industry. Security is often seen as a lumbering giant of process, governance and technology allowing for increased control, reduced risk and the expansion of the technology vendor industry.&lt;br /&gt;
&lt;br /&gt;
What if you could merge the two?&lt;br /&gt;
&lt;br /&gt;
The world of security is changing to meet the needs of agile software development. Organisations around the world are coming up with tools, techniques and processes to make security a continuous presence to support developers. This hands on, fast-paced course will not only give students a solid grounding in how to bring security into agile software development life-cycles, but also give a range of tools, techniques and practical skills to make it happen. &lt;br /&gt;
&lt;br /&gt;
===Trainer Bio - Laura Bell===&lt;br /&gt;
&lt;br /&gt;
Laura Bell is the founder and lead consultant at SafeStack, a specialist New Zealand agile security firm. With almost a decade of experience in software development and information security, Laura specialises in bringing security practices and culture into organisations of every shape and size. Her recent research into agile security practices has generated a set of tools and processes that can enable the management of security risk without compromising innovation or speed.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Registration===&lt;br /&gt;
&lt;br /&gt;
If you are interested in registering for the training session please email [mailto:adrian.hayes@owasp.org?cc=denis.andzakovic@owasp.org&amp;amp;cc=kim.carter@owasp.org adrian.hayes@owasp.org.nz, denis.andzakovic@owasp.org, and kim.carter@owasp.org] and let us know who you would like to attend.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- = Call For Presentations =&lt;br /&gt;
==Call For Presentations==&lt;br /&gt;
&lt;br /&gt;
OWASP New Zealand Day conferences attract a high quality of speakers from a variety of security disciplines including&lt;br /&gt;
architects, web developers and engineers, system administrators, penetration testers, policy specialists and more.&lt;br /&gt;
We encourage presentations to have a strong component on fixing and prevention of security issues. We are looking for presentations on a wide variety of security topics,&lt;br /&gt;
including but not limited to:&lt;br /&gt;
&lt;br /&gt;
* Web application security&lt;br /&gt;
* Mobile security&lt;br /&gt;
* Secure development&lt;br /&gt;
* Vulnerability analysis&lt;br /&gt;
* Threat modelling&lt;br /&gt;
* Threat and vulnerability countermeasures&lt;br /&gt;
* Platform or language security (JavaScript, .NET, Java, RoR, etc)&lt;br /&gt;
* Penetration Testing&lt;br /&gt;
* Browser and client security&lt;br /&gt;
* Application and solution architecture security&lt;br /&gt;
* PCI DSS&lt;br /&gt;
* Risk management&lt;br /&gt;
* Security concepts for C*Os, project managers and other non-technical attendees&lt;br /&gt;
* Privacy controls&lt;br /&gt;
&lt;br /&gt;
The email subject must be &amp;quot;OWASP New Zealand 2015: CFP&amp;quot; and the email body must contain the following information/sections:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name and Surname&lt;br /&gt;
* Affiliation&lt;br /&gt;
* Telephone number&lt;br /&gt;
* Email address&lt;br /&gt;
* Short presenter bio&lt;br /&gt;
* Title of the contribution&lt;br /&gt;
* Type of contribution: Technical, Informative, Management&lt;br /&gt;
* Short abstract (up to 500 words)&lt;br /&gt;
* List of the author's previous papers/articles/speeches on the same/similar topic (if any)&lt;br /&gt;
* If you are not from New Zealand, will your company support your travel/accommodation costs? - Yes/No&lt;br /&gt;
&lt;br /&gt;
The submission will be reviewed by the OWASP New Zealand Day conference committee and the highest voted talks will be selected and invited for presentation.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
PLEASE NOTE:&lt;br /&gt;
&lt;br /&gt;
* Due to limited budget available, expenses for international speakers cannot be covered.&lt;br /&gt;
* If your company is willing to cover travel and accommodation costs, the company will become &amp;quot;Support Sponsor&amp;quot; of the event.&lt;br /&gt;
&lt;br /&gt;
Please submit the above information to all of the following: Denis Andzakovic (denis.andzakovic@owasp.org), Adrian Hayes (adrian.hayes@owasp.org) and Kim Carter (kim.carter@owasp.org).&lt;br /&gt;
&lt;br /&gt;
Submissions deadline: 19th January 2015&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Call For Trainers =&lt;br /&gt;
== Call For Trainers ==&lt;br /&gt;
&lt;br /&gt;
We are happy to announce that training will run on Thursday February 26th 2015, the day before the OWASP Day conference.&lt;br /&gt;
The training venues will be auditoriums kindly provided by the University of Auckland, in the same building as the OWASP Day conference itself.&lt;br /&gt;
Classes will contain up to 20 students, and each seat has power for laptop usage. A wide range of half-day or full-day training proposals will be considered,&lt;br /&gt;
see the Call for Papers for a list of example topics.&lt;br /&gt;
&lt;br /&gt;
If you are interested in running one of the training sessions, please contact Denis Andzakovic, Adrian Hayes and Kim Carter with the following information:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Trainer name&lt;br /&gt;
* Trainer organisation&lt;br /&gt;
* Telephone + email contact&lt;br /&gt;
* Short Trainer bio&lt;br /&gt;
* Training title&lt;br /&gt;
* Trainer requirements (e.g. a projector, whiteboard, etc)&lt;br /&gt;
* Trainee requirements (e.g. laptop, VMWare/Virtualbox, etc)&lt;br /&gt;
* Training summary (less than 500 words)&lt;br /&gt;
* Target audience (e.g. testers, project managers, security managers, web developers, architects)&lt;br /&gt;
* Skill level required (Basic / Intermediate / Advanced)&lt;br /&gt;
* What attendees can expect to learn (key objectives)&lt;br /&gt;
* Short course outline&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The fixed price per head for training will be $250 for a half-day session and $500 for a whole-day session. As this training is part of an OWASP event, part of the proceeds go back to OWASP. The split is as follows:&lt;br /&gt;
&lt;br /&gt;
* 25% to OWASP Global - used for OWASP projects around the world&lt;br /&gt;
* 25% to OWASP NZ Day - used for expenses such as catering during the conference&lt;br /&gt;
* 50% to the training provider.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Please submit the above information to all of the following:&lt;br /&gt;
* Denis Andzakovic (denis.andzakovic@owasp.org)&lt;br /&gt;
* Adrian Hayes (adrian.hayes@owasp.org)&lt;br /&gt;
* Kim Carter (kim.carter@owasp.org).&lt;br /&gt;
&lt;br /&gt;
Submissions deadline: 19th January 2015&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Call For Sponsorships =&lt;br /&gt;
==Call For Sponsorships==&lt;br /&gt;
&lt;br /&gt;
OWASP New Zealand Day 2015 will be held in Auckland on the 27th of February, 2015 and is a security conference entirely dedicated to application security.&lt;br /&gt;
The conference is once again being hosted by the University of Auckland with their support and assistance.&lt;br /&gt;
OWASP New Zealand Day 2015 is a free event, but requires sponsor support to help be an instructive and quality event for the New Zealand community.&lt;br /&gt;
OWASP is strictly not for profit. The sponsorship money will be used to help make OWASP New Zealand Day 2015 a free, compelling, and valuable experience for all attendees.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The sponsorship funds collected are to be used for things such as:&lt;br /&gt;
&lt;br /&gt;
* Refreshments (coffee break/lunch) - we want to keep people refreshed during the day; while we certainly bring good and interesting speakers, we don't want people to go home when they become hungry. &lt;br /&gt;
* Name tags - we feel that getting to know people within the New Zealand community is important, and name tags make that possible.&lt;br /&gt;
* Promotion - up to now our events are propagating by word of mouth. We would like to get to a wider audience by advertising our events.&lt;br /&gt;
* Printed Materials - printed materials will include brochures, tags and lanyards.&lt;br /&gt;
&lt;br /&gt;
== Facts ==&lt;br /&gt;
&lt;br /&gt;
In 2013, the event was supported by six sponsors and attracted more than 250 participants. Plenty of constructive (and positive!) feedback from the audience was received and we are using this to make the conference more appealing to more people. For more information on the last New Zealand Day event, please visit: https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2013&lt;br /&gt;
&lt;br /&gt;
The OWASP New Zealand community is strong, this year has Christchurch as a new region and there are more than 360 people currently subscribed to the mailing-list. OWASP New Zealand Day is expected to attract between 250 and 300 attendees this year.&lt;br /&gt;
&lt;br /&gt;
OWASP regular attendees are IT project managers, IT security managers, IT security consultants, web application architects and developers, QA managers, QA testers and system administrators.&lt;br /&gt;
&lt;br /&gt;
== Sponsorships  ==&lt;br /&gt;
&lt;br /&gt;
There are three different levels of sponsorships for the OWASP Day event:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Support Sponsorship&amp;lt;/b&amp;gt;: (Covering international speaker travel expenses, media coverage/article/promotion of the event)&lt;br /&gt;
   &lt;br /&gt;
Includes:&lt;br /&gt;
&lt;br /&gt;
* Publication of the sponsor logo on the event web site - https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2015&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Silver Sponsorship&amp;lt;/b&amp;gt;: 1500 NZD&lt;br /&gt;
&lt;br /&gt;
Includes: &lt;br /&gt;
&lt;br /&gt;
* Publication of the sponsor logo on the event web site - https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2015&lt;br /&gt;
* The publication of the sponsor logo on the event site, in the agenda, on the handouts and in all the official communications with the attendees at the conference.&lt;br /&gt;
* The possibility to distribute the company brochures, CDs or other materials to the participants during the event.&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Gold Sponsorship&amp;lt;/b&amp;gt;: 2750 NZD&lt;br /&gt;
&lt;br /&gt;
Includes: &lt;br /&gt;
&lt;br /&gt;
* The possibility to have a promotional banner or sign side stage in the main auditorium (to be provided by the sponsor, size subject to approval by the OWASP NZ Day Committee).&lt;br /&gt;
* The publication of the sponsor logo on the event site, in the agenda, on the handouts and in all the official communications with the attendees at the conference.&lt;br /&gt;
* The possibility to distribute the company brochures, CDs or other materials to the participants during the event.&lt;br /&gt;
* Publication of the sponsor logo on the OWASP New Zealand Chapter page - Sponsor logo on the OWASP NZ site prior and during the OWASP Day event - https://www.owasp.org/index.php/New_Zealand&lt;br /&gt;
* Publication of the sponsor logo on the event web site - https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2015&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Those who are interested in sponsoring OWASP New Zealand 2015 Conference can contact the [mailto:kim.carter@owasp.org?cc=adrian.hayes@owasp.org?cc=denis.andzakovic@owasp.org OWASP New Zealand Board].&amp;lt;br&amp;gt;&lt;br /&gt;
 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]]&lt;/div&gt;</summary>
		<author><name>Adrian Hayes</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_New_Zealand_Day_2015&amp;diff=188581</id>
		<title>OWASP New Zealand Day 2015</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_New_Zealand_Day_2015&amp;diff=188581"/>
				<updated>2015-01-26T22:13:03Z</updated>
		
		<summary type="html">&lt;p&gt;Adrian Hayes: /* Registration */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2015 https://www.owasp.org/images/9/94/New_Zealand_Day_2015_020.png]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''26th and 27th Feburary 2015 - Auckland'''&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
= Introduction =&lt;br /&gt;
==Introduction==&lt;br /&gt;
We are proud to announce the sixth OWASP New Zealand Day conference, to be held at the University of Auckland on Friday February 27th, 2015. OWASP New Zealand Day is a one-day conference dedicated to application security, with an emphasis on secure architecture and development techniques to help Kiwi developers build more secure applications.&lt;br /&gt;
&lt;br /&gt;
Similar to last year:&lt;br /&gt;
&lt;br /&gt;
* We will be offering training on the day before the conference (Thursday, 26th of February). &lt;br /&gt;
* After lunch on the conference day, we will split to two tracks - one focused on technical topics, the other on policy, compliance and risk management. &lt;br /&gt;
&lt;br /&gt;
The sixth OWASP New Zealand Day will be happening thanks to the support provided by the University of Auckland, which will kindly offer a slightly different location from the last five years. Entry to the event will, as in the past, be free.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For any comments, feedback or observations, please don't hesitate to contact [mailto:kim.carter@owasp.org?cc=adrian.hayes@owasp.org?cc=denis.andzakovic@owasp.org us].&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Registration==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Registration is not yet open. Please join our low volume [https://lists.owasp.org/mailman/listinfo/owasp-newzealand mailing list] to be notified when registration opens.&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Registration for the main conference day is now open: [https://registration.owasp.org.nz/ Conference Registration Here]&lt;br /&gt;
&lt;br /&gt;
There is no cost for the main conference day and lunch is provided. We do ask that if at any point you realise you cannot make it please cancel your registration to make room for others as spaces are limited.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
If you are interested in registering for the training session on the 26th please email [mailto:adrian.hayes@owasp.org?cc=denis.andzakovic@owasp.org&amp;amp;cc=kim.carter@owasp.org adrian.hayes@owasp.org, denis.andzakovic@owasp.org, and kim.carter@owasp.org] and let us know who you would like to attend.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Registration is now closed.&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Important dates==&lt;br /&gt;
&lt;br /&gt;
* ''CFP &amp;amp; CFT submission deadline: 19th January 2015''&lt;br /&gt;
* ''Conference and Training Registration deadline: 12th February 2015''&lt;br /&gt;
* Training Day date:          26th February 2015&lt;br /&gt;
* Conference Day date:           27th February 2015&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
For those of you booking flights, ensure you can be at the venue at 8:30am, the conference will end by 5:30pm however we will have post conference drinks at a local drinking establishment for those interested.&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Conference Venue==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
   &amp;lt;td&amp;gt;&lt;br /&gt;
The University of Auckland Engineering Department&amp;lt;br&amp;gt;&lt;br /&gt;
Engineering Building #401&amp;lt;br&amp;gt;&lt;br /&gt;
Room: Eng 1449&amp;lt;br&amp;gt;&lt;br /&gt;
Address: 20 Symonds Street&amp;lt;br&amp;gt;&lt;br /&gt;
Auckland&amp;lt;br&amp;gt;&lt;br /&gt;
New Zealand&amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.google.com/maps/place/Faculty+of+Engineering,+The+University+of+Auckland,+Auckland,+1010,+New+Zealand Map]&lt;br /&gt;
   &amp;lt;/td&amp;gt;&lt;br /&gt;
   &amp;lt;td&amp;gt;&lt;br /&gt;
[[Image:EngineeringBuilding401Web.JPG]] [[Image:RoomEng1449Web.JPG]]&lt;br /&gt;
   &amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Conference Sponsors==&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;bottom&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;[http://www.auckland.ac.nz/ https://www.owasp.org/images/8/82/University_of_Auckland_crest_small.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;bottom&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;[http://www.security.org.nz/NZISF_NZISForumContent.php https://www.owasp.org/images/5/5a/Nz_information_security_forum.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;ICT and Department of Information Systems and Operations Management&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Gold Sponsors:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[[File:INSOMNIA.PNG|center|300px|link=http://www.insomniasec.com/]]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[[File:Aurainfosec300px.jpg|center|300px|link=http://www.aurainfosec.com/]]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com https://www.owasp.org/images/4/41/SA_Logo_w_DD.gif]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.insomniasec.com Insomnia Security]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.aurasoftwaresecurity.co.nz Aura Information Security]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com www.security-assessment.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Silver Sponsors:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[[File:Beca.png|center|200px|link=http://www.beca.com/]]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[[File:Wynyard_CMYK_land.png|center|250px|link=https://www.wynyardgroup.com/]]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Support Sponsor:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[[File:BinaryMistLimited.png|center|150px|link=http://binarymist.net]]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Conference Committee==&lt;br /&gt;
&lt;br /&gt;
* Denis Andzakovic - OWASP New Zealand Leader (Auckland)&lt;br /&gt;
* Adrian Hayes -  OWASP New Zealand Leader (Wellington)&lt;br /&gt;
* Kim Carter -  OWASP New Zealand Leader (Christchurch)&lt;br /&gt;
* Lech Janczewski - Associate Professor - University of Auckland School of Business&lt;br /&gt;
&lt;br /&gt;
Please direct all enquiries to denis.andzakovic@owasp.org | adrian.hayes@owasp.org | kim.carter@owasp.org&lt;br /&gt;
&lt;br /&gt;
= Schedule and Talks =&lt;br /&gt;
== Schedule and Talks ==&lt;br /&gt;
&lt;br /&gt;
We're still finalising the schedule and talks but they're look pretty awesome. We'll have the details out soon!&lt;br /&gt;
&lt;br /&gt;
= Training Day =&lt;br /&gt;
==Training Day==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We are happy to announce that training will run on Thursday the 26th of February 2015, the day before the OWASP Day conference. The courses will be running from 9:00 AM sharp to 5:00PM. The training venues will be auditoriums kindly provided by the University of Auckland, in the same building as the OWASP Day conference itself. Feedback from previous training has been very positive and there are limited spaces - so get in quick! &lt;br /&gt;
&lt;br /&gt;
Details are as follows:&lt;br /&gt;
&lt;br /&gt;
===Training Abstract - Bootstrapping Agile Security===&lt;br /&gt;
&lt;br /&gt;
Agile development is often seen as a delicate balance of ritual and roles allowing for rapid development, continuous deployment and the expansion of the post-it note industry. Security is often seen as a lumbering giant of process, governance and technology allowing for increased control, reduced risk and the expansion of the technology vendor industry.&lt;br /&gt;
&lt;br /&gt;
What if you could merge the two?&lt;br /&gt;
&lt;br /&gt;
The world of security is changing to meet the needs of agile software development. Organisations around the world are coming up with tools, techniques and processes to make security a continuous presence to support developers. This hands on, fast-paced course will not only give students a solid grounding in how to bring security into agile software development life-cycles, but also give a range of tools, techniques and practical skills to make it happen. &lt;br /&gt;
&lt;br /&gt;
===Trainer Bio - Laura Bell===&lt;br /&gt;
&lt;br /&gt;
Laura Bell is the founder and lead consultant at SafeStack, a specialist New Zealand agile security firm. With almost a decade of experience in software development and information security, Laura specialises in bringing security practices and culture into organisations of every shape and size. Her recent research into agile security practices has generated a set of tools and processes that can enable the management of security risk without compromising innovation or speed.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Registration===&lt;br /&gt;
&lt;br /&gt;
If you are interested in registering for the training session please email [mailto:adrian.hayes@owasp.org?cc=denis.andzakovic@owasp.org&amp;amp;cc=kim.carter@owasp.org adrian.hayes@owasp.org.nz, denis.andzakovic@owasp.org, and kim.carter@owasp.org] and let us know who you would like to attend.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- = Call For Presentations =&lt;br /&gt;
==Call For Presentations==&lt;br /&gt;
&lt;br /&gt;
OWASP New Zealand Day conferences attract a high quality of speakers from a variety of security disciplines including&lt;br /&gt;
architects, web developers and engineers, system administrators, penetration testers, policy specialists and more.&lt;br /&gt;
We encourage presentations to have a strong component on fixing and prevention of security issues. We are looking for presentations on a wide variety of security topics,&lt;br /&gt;
including but not limited to:&lt;br /&gt;
&lt;br /&gt;
* Web application security&lt;br /&gt;
* Mobile security&lt;br /&gt;
* Secure development&lt;br /&gt;
* Vulnerability analysis&lt;br /&gt;
* Threat modelling&lt;br /&gt;
* Threat and vulnerability countermeasures&lt;br /&gt;
* Platform or language security (JavaScript, .NET, Java, RoR, etc)&lt;br /&gt;
* Penetration Testing&lt;br /&gt;
* Browser and client security&lt;br /&gt;
* Application and solution architecture security&lt;br /&gt;
* PCI DSS&lt;br /&gt;
* Risk management&lt;br /&gt;
* Security concepts for C*Os, project managers and other non-technical attendees&lt;br /&gt;
* Privacy controls&lt;br /&gt;
&lt;br /&gt;
The email subject must be &amp;quot;OWASP New Zealand 2015: CFP&amp;quot; and the email body must contain the following information/sections:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name and Surname&lt;br /&gt;
* Affiliation&lt;br /&gt;
* Telephone number&lt;br /&gt;
* Email address&lt;br /&gt;
* Short presenter bio&lt;br /&gt;
* Title of the contribution&lt;br /&gt;
* Type of contribution: Technical, Informative, Management&lt;br /&gt;
* Short abstract (up to 500 words)&lt;br /&gt;
* List of the author's previous papers/articles/speeches on the same/similar topic (if any)&lt;br /&gt;
* If you are not from New Zealand, will your company support your travel/accommodation costs? - Yes/No&lt;br /&gt;
&lt;br /&gt;
The submission will be reviewed by the OWASP New Zealand Day conference committee and the highest voted talks will be selected and invited for presentation.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
PLEASE NOTE:&lt;br /&gt;
&lt;br /&gt;
* Due to limited budget available, expenses for international speakers cannot be covered.&lt;br /&gt;
* If your company is willing to cover travel and accommodation costs, the company will become &amp;quot;Support Sponsor&amp;quot; of the event.&lt;br /&gt;
&lt;br /&gt;
Please submit the above information to all of the following: Denis Andzakovic (denis.andzakovic@owasp.org), Adrian Hayes (adrian.hayes@owasp.org) and Kim Carter (kim.carter@owasp.org).&lt;br /&gt;
&lt;br /&gt;
Submissions deadline: 19th January 2015&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Call For Trainers =&lt;br /&gt;
== Call For Trainers ==&lt;br /&gt;
&lt;br /&gt;
We are happy to announce that training will run on Thursday February 26th 2015, the day before the OWASP Day conference.&lt;br /&gt;
The training venues will be auditoriums kindly provided by the University of Auckland, in the same building as the OWASP Day conference itself.&lt;br /&gt;
Classes will contain up to 20 students, and each seat has power for laptop usage. A wide range of half-day or full-day training proposals will be considered,&lt;br /&gt;
see the Call for Papers for a list of example topics.&lt;br /&gt;
&lt;br /&gt;
If you are interested in running one of the training sessions, please contact Denis Andzakovic, Adrian Hayes and Kim Carter with the following information:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Trainer name&lt;br /&gt;
* Trainer organisation&lt;br /&gt;
* Telephone + email contact&lt;br /&gt;
* Short Trainer bio&lt;br /&gt;
* Training title&lt;br /&gt;
* Trainer requirements (e.g. a projector, whiteboard, etc)&lt;br /&gt;
* Trainee requirements (e.g. laptop, VMWare/Virtualbox, etc)&lt;br /&gt;
* Training summary (less than 500 words)&lt;br /&gt;
* Target audience (e.g. testers, project managers, security managers, web developers, architects)&lt;br /&gt;
* Skill level required (Basic / Intermediate / Advanced)&lt;br /&gt;
* What attendees can expect to learn (key objectives)&lt;br /&gt;
* Short course outline&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The fixed price per head for training will be $250 for a half-day session and $500 for a whole-day session. As this training is part of an OWASP event, part of the proceeds go back to OWASP. The split is as follows:&lt;br /&gt;
&lt;br /&gt;
* 25% to OWASP Global - used for OWASP projects around the world&lt;br /&gt;
* 25% to OWASP NZ Day - used for expenses such as catering during the conference&lt;br /&gt;
* 50% to the training provider.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Please submit the above information to all of the following:&lt;br /&gt;
* Denis Andzakovic (denis.andzakovic@owasp.org)&lt;br /&gt;
* Adrian Hayes (adrian.hayes@owasp.org)&lt;br /&gt;
* Kim Carter (kim.carter@owasp.org).&lt;br /&gt;
&lt;br /&gt;
Submissions deadline: 19th January 2015&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Call For Sponsorships =&lt;br /&gt;
==Call For Sponsorships==&lt;br /&gt;
&lt;br /&gt;
OWASP New Zealand Day 2015 will be held in Auckland on the 27th of February, 2015 and is a security conference entirely dedicated to application security.&lt;br /&gt;
The conference is once again being hosted by the University of Auckland with their support and assistance.&lt;br /&gt;
OWASP New Zealand Day 2015 is a free event, but requires sponsor support to help be an instructive and quality event for the New Zealand community.&lt;br /&gt;
OWASP is strictly not for profit. The sponsorship money will be used to help make OWASP New Zealand Day 2015 a free, compelling, and valuable experience for all attendees.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The sponsorship funds collected are to be used for things such as:&lt;br /&gt;
&lt;br /&gt;
* Refreshments (coffee break/lunch) - we want to keep people refreshed during the day; while we certainly bring good and interesting speakers, we don't want people to go home when they become hungry. &lt;br /&gt;
* Name tags - we feel that getting to know people within the New Zealand community is important, and name tags make that possible.&lt;br /&gt;
* Promotion - up to now our events are propagating by word of mouth. We would like to get to a wider audience by advertising our events.&lt;br /&gt;
* Printed Materials - printed materials will include brochures, tags and lanyards.&lt;br /&gt;
&lt;br /&gt;
== Facts ==&lt;br /&gt;
&lt;br /&gt;
In 2013, the event was supported by six sponsors and attracted more than 250 participants. Plenty of constructive (and positive!) feedback from the audience was received and we are using this to make the conference more appealing to more people. For more information on the last New Zealand Day event, please visit: https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2013&lt;br /&gt;
&lt;br /&gt;
The OWASP New Zealand community is strong, this year has Christchurch as a new region and there are more than 360 people currently subscribed to the mailing-list. OWASP New Zealand Day is expected to attract between 250 and 300 attendees this year.&lt;br /&gt;
&lt;br /&gt;
OWASP regular attendees are IT project managers, IT security managers, IT security consultants, web application architects and developers, QA managers, QA testers and system administrators.&lt;br /&gt;
&lt;br /&gt;
== Sponsorships  ==&lt;br /&gt;
&lt;br /&gt;
There are three different levels of sponsorships for the OWASP Day event:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Support Sponsorship&amp;lt;/b&amp;gt;: (Covering international speaker travel expenses, media coverage/article/promotion of the event)&lt;br /&gt;
   &lt;br /&gt;
Includes:&lt;br /&gt;
&lt;br /&gt;
* Publication of the sponsor logo on the event web site - https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2015&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Silver Sponsorship&amp;lt;/b&amp;gt;: 1500 NZD&lt;br /&gt;
&lt;br /&gt;
Includes: &lt;br /&gt;
&lt;br /&gt;
* Publication of the sponsor logo on the event web site - https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2015&lt;br /&gt;
* The publication of the sponsor logo on the event site, in the agenda, on the handouts and in all the official communications with the attendees at the conference.&lt;br /&gt;
* The possibility to distribute the company brochures, CDs or other materials to the participants during the event.&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Gold Sponsorship&amp;lt;/b&amp;gt;: 2750 NZD&lt;br /&gt;
&lt;br /&gt;
Includes: &lt;br /&gt;
&lt;br /&gt;
* The possibility to have a promotional banner or sign side stage in the main auditorium (to be provided by the sponsor, size subject to approval by the OWASP NZ Day Committee).&lt;br /&gt;
* The publication of the sponsor logo on the event site, in the agenda, on the handouts and in all the official communications with the attendees at the conference.&lt;br /&gt;
* The possibility to distribute the company brochures, CDs or other materials to the participants during the event.&lt;br /&gt;
* Publication of the sponsor logo on the OWASP New Zealand Chapter page - Sponsor logo on the OWASP NZ site prior and during the OWASP Day event - https://www.owasp.org/index.php/New_Zealand&lt;br /&gt;
* Publication of the sponsor logo on the event web site - https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2015&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Those who are interested in sponsoring OWASP New Zealand 2015 Conference can contact the [mailto:kim.carter@owasp.org?cc=adrian.hayes@owasp.org?cc=denis.andzakovic@owasp.org OWASP New Zealand Board].&amp;lt;br&amp;gt;&lt;br /&gt;
 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]]&lt;/div&gt;</summary>
		<author><name>Adrian Hayes</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_New_Zealand_Day_2015&amp;diff=188537</id>
		<title>OWASP New Zealand Day 2015</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_New_Zealand_Day_2015&amp;diff=188537"/>
				<updated>2015-01-26T02:47:02Z</updated>
		
		<summary type="html">&lt;p&gt;Adrian Hayes: /* Schedule and Talks */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2015 https://www.owasp.org/images/9/94/New_Zealand_Day_2015_020.png]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''26th and 27th Feburary 2015 - Auckland'''&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
= Introduction =&lt;br /&gt;
==Introduction==&lt;br /&gt;
We are proud to announce the sixth OWASP New Zealand Day conference, to be held at the University of Auckland on Friday February 27th, 2015. OWASP New Zealand Day is a one-day conference dedicated to application security, with an emphasis on secure architecture and development techniques to help Kiwi developers build more secure applications.&lt;br /&gt;
&lt;br /&gt;
Similar to last year:&lt;br /&gt;
&lt;br /&gt;
* We will be offering training on the day before the conference (Thursday, 26th of February). &lt;br /&gt;
* After lunch on the conference day, we will split to two tracks - one focused on technical topics, the other on policy, compliance and risk management. &lt;br /&gt;
&lt;br /&gt;
The sixth OWASP New Zealand Day will be happening thanks to the support provided by the University of Auckland, which will kindly offer a slightly different location from the last five years. Entry to the event will, as in the past, be free.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For any comments, feedback or observations, please don't hesitate to contact [mailto:kim.carter@owasp.org?cc=adrian.hayes@owasp.org?cc=denis.andzakovic@owasp.org us].&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Registration==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Registration is not yet open. Please join our low volume [https://lists.owasp.org/mailman/listinfo/owasp-newzealand mailing list] to be notified when registration opens.&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Registration for the main conference day is now open: [https://registration.owasp.org.nz/ Conference Registration Here]&lt;br /&gt;
&lt;br /&gt;
There is no cost for the main conference day and lunch is provided. We do ask that if at any point you realise you cannot make it please cancel your registration to make room for others as spaces are limited.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
If you are interested in registering for the training session on the 26th please email [mailto:adrian.hayes@owasp.org?cc=denis.andzakovic@owasp.org&amp;amp;cc=kim.carter@owasp.org adrian.hayes@owasp.org.nz, denis.andzakovic@owasp.org, and kim.carter@owasp.org] and let us know who you would like to attend.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Registration is now closed.&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Important dates==&lt;br /&gt;
&lt;br /&gt;
* ''CFP &amp;amp; CFT submission deadline: 19th January 2015''&lt;br /&gt;
* ''Conference and Training Registration deadline: 12th February 2015''&lt;br /&gt;
* Training Day date:          26th February 2015&lt;br /&gt;
* Conference Day date:           27th February 2015&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
For those of you booking flights, ensure you can be at the venue at 8:30am, the conference will end by 5:30pm however we will have post conference drinks at a local drinking establishment for those interested.&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Conference Venue==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
   &amp;lt;td&amp;gt;&lt;br /&gt;
The University of Auckland Engineering Department&amp;lt;br&amp;gt;&lt;br /&gt;
Engineering Building #401&amp;lt;br&amp;gt;&lt;br /&gt;
Room: Eng 1449&amp;lt;br&amp;gt;&lt;br /&gt;
Address: 20 Symonds Street&amp;lt;br&amp;gt;&lt;br /&gt;
Auckland&amp;lt;br&amp;gt;&lt;br /&gt;
New Zealand&amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.google.com/maps/place/Faculty+of+Engineering,+The+University+of+Auckland,+Auckland,+1010,+New+Zealand Map]&lt;br /&gt;
   &amp;lt;/td&amp;gt;&lt;br /&gt;
   &amp;lt;td&amp;gt;&lt;br /&gt;
[[Image:EngineeringBuilding401Web.JPG]] [[Image:RoomEng1449Web.JPG]]&lt;br /&gt;
   &amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Conference Sponsors==&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;bottom&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;[http://www.auckland.ac.nz/ https://www.owasp.org/images/8/82/University_of_Auckland_crest_small.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;bottom&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;[http://www.security.org.nz/NZISF_NZISForumContent.php https://www.owasp.org/images/5/5a/Nz_information_security_forum.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;ICT and Department of Information Systems and Operations Management&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Gold Sponsors:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[[File:INSOMNIA.PNG|center|300px|link=http://www.insomniasec.com/]]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[[File:Aurainfosec300px.jpg|center|300px|link=http://www.aurainfosec.com/]]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com https://www.owasp.org/images/4/41/SA_Logo_w_DD.gif]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.insomniasec.com Insomnia Security]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.aurasoftwaresecurity.co.nz Aura Information Security]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com www.security-assessment.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Silver Sponsors:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[[File:Beca.png|center|200px|link=http://www.beca.com/]]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[[File:Wynyard_CMYK_land.png|center|250px|link=https://www.wynyardgroup.com/]]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Support Sponsor:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[[File:BinaryMistLimited.png|center|150px|link=http://binarymist.net]]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Conference Committee==&lt;br /&gt;
&lt;br /&gt;
* Denis Andzakovic - OWASP New Zealand Leader (Auckland)&lt;br /&gt;
* Adrian Hayes -  OWASP New Zealand Leader (Wellington)&lt;br /&gt;
* Kim Carter -  OWASP New Zealand Leader (Christchurch)&lt;br /&gt;
* Lech Janczewski - Associate Professor - University of Auckland School of Business&lt;br /&gt;
&lt;br /&gt;
Please direct all enquiries to denis.andzakovic@owasp.org | adrian.hayes@owasp.org | kim.carter@owasp.org&lt;br /&gt;
&lt;br /&gt;
= Schedule and Talks =&lt;br /&gt;
== Schedule and Talks ==&lt;br /&gt;
&lt;br /&gt;
We're still finalising the schedule and talks but they're look pretty awesome. We'll have the details out soon!&lt;br /&gt;
&lt;br /&gt;
= Training Day =&lt;br /&gt;
==Training Day==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We are happy to announce that training will run on Thursday the 26th of February 2015, the day before the OWASP Day conference. The courses will be running from 9:00 AM sharp to 5:00PM. The training venues will be auditoriums kindly provided by the University of Auckland, in the same building as the OWASP Day conference itself. Feedback from previous training has been very positive and there are limited spaces - so get in quick! &lt;br /&gt;
&lt;br /&gt;
Details are as follows:&lt;br /&gt;
&lt;br /&gt;
===Training Abstract - Bootstrapping Agile Security===&lt;br /&gt;
&lt;br /&gt;
Agile development is often seen as a delicate balance of ritual and roles allowing for rapid development, continuous deployment and the expansion of the post-it note industry. Security is often seen as a lumbering giant of process, governance and technology allowing for increased control, reduced risk and the expansion of the technology vendor industry.&lt;br /&gt;
&lt;br /&gt;
What if you could merge the two?&lt;br /&gt;
&lt;br /&gt;
The world of security is changing to meet the needs of agile software development. Organisations around the world are coming up with tools, techniques and processes to make security a continuous presence to support developers. This hands on, fast-paced course will not only give students a solid grounding in how to bring security into agile software development life-cycles, but also give a range of tools, techniques and practical skills to make it happen. &lt;br /&gt;
&lt;br /&gt;
===Trainer Bio - Laura Bell===&lt;br /&gt;
&lt;br /&gt;
Laura Bell is the founder and lead consultant at SafeStack, a specialist New Zealand agile security firm. With almost a decade of experience in software development and information security, Laura specialises in bringing security practices and culture into organisations of every shape and size. Her recent research into agile security practices has generated a set of tools and processes that can enable the management of security risk without compromising innovation or speed.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Registration===&lt;br /&gt;
&lt;br /&gt;
If you are interested in registering for the training session please email [mailto:adrian.hayes@owasp.org?cc=denis.andzakovic@owasp.org&amp;amp;cc=kim.carter@owasp.org adrian.hayes@owasp.org.nz, denis.andzakovic@owasp.org, and kim.carter@owasp.org] and let us know who you would like to attend.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- = Call For Presentations =&lt;br /&gt;
==Call For Presentations==&lt;br /&gt;
&lt;br /&gt;
OWASP New Zealand Day conferences attract a high quality of speakers from a variety of security disciplines including&lt;br /&gt;
architects, web developers and engineers, system administrators, penetration testers, policy specialists and more.&lt;br /&gt;
We encourage presentations to have a strong component on fixing and prevention of security issues. We are looking for presentations on a wide variety of security topics,&lt;br /&gt;
including but not limited to:&lt;br /&gt;
&lt;br /&gt;
* Web application security&lt;br /&gt;
* Mobile security&lt;br /&gt;
* Secure development&lt;br /&gt;
* Vulnerability analysis&lt;br /&gt;
* Threat modelling&lt;br /&gt;
* Threat and vulnerability countermeasures&lt;br /&gt;
* Platform or language security (JavaScript, .NET, Java, RoR, etc)&lt;br /&gt;
* Penetration Testing&lt;br /&gt;
* Browser and client security&lt;br /&gt;
* Application and solution architecture security&lt;br /&gt;
* PCI DSS&lt;br /&gt;
* Risk management&lt;br /&gt;
* Security concepts for C*Os, project managers and other non-technical attendees&lt;br /&gt;
* Privacy controls&lt;br /&gt;
&lt;br /&gt;
The email subject must be &amp;quot;OWASP New Zealand 2015: CFP&amp;quot; and the email body must contain the following information/sections:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name and Surname&lt;br /&gt;
* Affiliation&lt;br /&gt;
* Telephone number&lt;br /&gt;
* Email address&lt;br /&gt;
* Short presenter bio&lt;br /&gt;
* Title of the contribution&lt;br /&gt;
* Type of contribution: Technical, Informative, Management&lt;br /&gt;
* Short abstract (up to 500 words)&lt;br /&gt;
* List of the author's previous papers/articles/speeches on the same/similar topic (if any)&lt;br /&gt;
* If you are not from New Zealand, will your company support your travel/accommodation costs? - Yes/No&lt;br /&gt;
&lt;br /&gt;
The submission will be reviewed by the OWASP New Zealand Day conference committee and the highest voted talks will be selected and invited for presentation.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
PLEASE NOTE:&lt;br /&gt;
&lt;br /&gt;
* Due to limited budget available, expenses for international speakers cannot be covered.&lt;br /&gt;
* If your company is willing to cover travel and accommodation costs, the company will become &amp;quot;Support Sponsor&amp;quot; of the event.&lt;br /&gt;
&lt;br /&gt;
Please submit the above information to all of the following: Denis Andzakovic (denis.andzakovic@owasp.org), Adrian Hayes (adrian.hayes@owasp.org) and Kim Carter (kim.carter@owasp.org).&lt;br /&gt;
&lt;br /&gt;
Submissions deadline: 19th January 2015&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Call For Trainers =&lt;br /&gt;
== Call For Trainers ==&lt;br /&gt;
&lt;br /&gt;
We are happy to announce that training will run on Thursday February 26th 2015, the day before the OWASP Day conference.&lt;br /&gt;
The training venues will be auditoriums kindly provided by the University of Auckland, in the same building as the OWASP Day conference itself.&lt;br /&gt;
Classes will contain up to 20 students, and each seat has power for laptop usage. A wide range of half-day or full-day training proposals will be considered,&lt;br /&gt;
see the Call for Papers for a list of example topics.&lt;br /&gt;
&lt;br /&gt;
If you are interested in running one of the training sessions, please contact Denis Andzakovic, Adrian Hayes and Kim Carter with the following information:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Trainer name&lt;br /&gt;
* Trainer organisation&lt;br /&gt;
* Telephone + email contact&lt;br /&gt;
* Short Trainer bio&lt;br /&gt;
* Training title&lt;br /&gt;
* Trainer requirements (e.g. a projector, whiteboard, etc)&lt;br /&gt;
* Trainee requirements (e.g. laptop, VMWare/Virtualbox, etc)&lt;br /&gt;
* Training summary (less than 500 words)&lt;br /&gt;
* Target audience (e.g. testers, project managers, security managers, web developers, architects)&lt;br /&gt;
* Skill level required (Basic / Intermediate / Advanced)&lt;br /&gt;
* What attendees can expect to learn (key objectives)&lt;br /&gt;
* Short course outline&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The fixed price per head for training will be $250 for a half-day session and $500 for a whole-day session. As this training is part of an OWASP event, part of the proceeds go back to OWASP. The split is as follows:&lt;br /&gt;
&lt;br /&gt;
* 25% to OWASP Global - used for OWASP projects around the world&lt;br /&gt;
* 25% to OWASP NZ Day - used for expenses such as catering during the conference&lt;br /&gt;
* 50% to the training provider.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Please submit the above information to all of the following:&lt;br /&gt;
* Denis Andzakovic (denis.andzakovic@owasp.org)&lt;br /&gt;
* Adrian Hayes (adrian.hayes@owasp.org)&lt;br /&gt;
* Kim Carter (kim.carter@owasp.org).&lt;br /&gt;
&lt;br /&gt;
Submissions deadline: 19th January 2015&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Call For Sponsorships =&lt;br /&gt;
==Call For Sponsorships==&lt;br /&gt;
&lt;br /&gt;
OWASP New Zealand Day 2015 will be held in Auckland on the 27th of February, 2015 and is a security conference entirely dedicated to application security.&lt;br /&gt;
The conference is once again being hosted by the University of Auckland with their support and assistance.&lt;br /&gt;
OWASP New Zealand Day 2015 is a free event, but requires sponsor support to help be an instructive and quality event for the New Zealand community.&lt;br /&gt;
OWASP is strictly not for profit. The sponsorship money will be used to help make OWASP New Zealand Day 2015 a free, compelling, and valuable experience for all attendees.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The sponsorship funds collected are to be used for things such as:&lt;br /&gt;
&lt;br /&gt;
* Refreshments (coffee break/lunch) - we want to keep people refreshed during the day; while we certainly bring good and interesting speakers, we don't want people to go home when they become hungry. &lt;br /&gt;
* Name tags - we feel that getting to know people within the New Zealand community is important, and name tags make that possible.&lt;br /&gt;
* Promotion - up to now our events are propagating by word of mouth. We would like to get to a wider audience by advertising our events.&lt;br /&gt;
* Printed Materials - printed materials will include brochures, tags and lanyards.&lt;br /&gt;
&lt;br /&gt;
== Facts ==&lt;br /&gt;
&lt;br /&gt;
In 2013, the event was supported by six sponsors and attracted more than 250 participants. Plenty of constructive (and positive!) feedback from the audience was received and we are using this to make the conference more appealing to more people. For more information on the last New Zealand Day event, please visit: https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2013&lt;br /&gt;
&lt;br /&gt;
The OWASP New Zealand community is strong, this year has Christchurch as a new region and there are more than 360 people currently subscribed to the mailing-list. OWASP New Zealand Day is expected to attract between 250 and 300 attendees this year.&lt;br /&gt;
&lt;br /&gt;
OWASP regular attendees are IT project managers, IT security managers, IT security consultants, web application architects and developers, QA managers, QA testers and system administrators.&lt;br /&gt;
&lt;br /&gt;
== Sponsorships  ==&lt;br /&gt;
&lt;br /&gt;
There are three different levels of sponsorships for the OWASP Day event:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Support Sponsorship&amp;lt;/b&amp;gt;: (Covering international speaker travel expenses, media coverage/article/promotion of the event)&lt;br /&gt;
   &lt;br /&gt;
Includes:&lt;br /&gt;
&lt;br /&gt;
* Publication of the sponsor logo on the event web site - https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2015&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Silver Sponsorship&amp;lt;/b&amp;gt;: 1500 NZD&lt;br /&gt;
&lt;br /&gt;
Includes: &lt;br /&gt;
&lt;br /&gt;
* Publication of the sponsor logo on the event web site - https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2015&lt;br /&gt;
* The publication of the sponsor logo on the event site, in the agenda, on the handouts and in all the official communications with the attendees at the conference.&lt;br /&gt;
* The possibility to distribute the company brochures, CDs or other materials to the participants during the event.&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Gold Sponsorship&amp;lt;/b&amp;gt;: 2750 NZD&lt;br /&gt;
&lt;br /&gt;
Includes: &lt;br /&gt;
&lt;br /&gt;
* The possibility to have a promotional banner or sign side stage in the main auditorium (to be provided by the sponsor, size subject to approval by the OWASP NZ Day Committee).&lt;br /&gt;
* The publication of the sponsor logo on the event site, in the agenda, on the handouts and in all the official communications with the attendees at the conference.&lt;br /&gt;
* The possibility to distribute the company brochures, CDs or other materials to the participants during the event.&lt;br /&gt;
* Publication of the sponsor logo on the OWASP New Zealand Chapter page - Sponsor logo on the OWASP NZ site prior and during the OWASP Day event - https://www.owasp.org/index.php/New_Zealand&lt;br /&gt;
* Publication of the sponsor logo on the event web site - https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2015&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Those who are interested in sponsoring OWASP New Zealand 2015 Conference can contact the [mailto:kim.carter@owasp.org?cc=adrian.hayes@owasp.org?cc=denis.andzakovic@owasp.org OWASP New Zealand Board].&amp;lt;br&amp;gt;&lt;br /&gt;
 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]]&lt;/div&gt;</summary>
		<author><name>Adrian Hayes</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_New_Zealand_Day_2015&amp;diff=188536</id>
		<title>OWASP New Zealand Day 2015</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_New_Zealand_Day_2015&amp;diff=188536"/>
				<updated>2015-01-26T02:08:23Z</updated>
		
		<summary type="html">&lt;p&gt;Adrian Hayes: /* Introduction */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2015 https://www.owasp.org/images/9/94/New_Zealand_Day_2015_020.png]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''26th and 27th Feburary 2015 - Auckland'''&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
= Introduction =&lt;br /&gt;
==Introduction==&lt;br /&gt;
We are proud to announce the sixth OWASP New Zealand Day conference, to be held at the University of Auckland on Friday February 27th, 2015. OWASP New Zealand Day is a one-day conference dedicated to application security, with an emphasis on secure architecture and development techniques to help Kiwi developers build more secure applications.&lt;br /&gt;
&lt;br /&gt;
Similar to last year:&lt;br /&gt;
&lt;br /&gt;
* We will be offering training on the day before the conference (Thursday, 26th of February). &lt;br /&gt;
* After lunch on the conference day, we will split to two tracks - one focused on technical topics, the other on policy, compliance and risk management. &lt;br /&gt;
&lt;br /&gt;
The sixth OWASP New Zealand Day will be happening thanks to the support provided by the University of Auckland, which will kindly offer a slightly different location from the last five years. Entry to the event will, as in the past, be free.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For any comments, feedback or observations, please don't hesitate to contact [mailto:kim.carter@owasp.org?cc=adrian.hayes@owasp.org?cc=denis.andzakovic@owasp.org us].&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Registration==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Registration is not yet open. Please join our low volume [https://lists.owasp.org/mailman/listinfo/owasp-newzealand mailing list] to be notified when registration opens.&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Registration for the main conference day is now open: [https://registration.owasp.org.nz/ Conference Registration Here]&lt;br /&gt;
&lt;br /&gt;
There is no cost for the main conference day and lunch is provided. We do ask that if at any point you realise you cannot make it please cancel your registration to make room for others as spaces are limited.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
If you are interested in registering for the training session on the 26th please email [mailto:adrian.hayes@owasp.org?cc=denis.andzakovic@owasp.org&amp;amp;cc=kim.carter@owasp.org adrian.hayes@owasp.org.nz, denis.andzakovic@owasp.org, and kim.carter@owasp.org] and let us know who you would like to attend.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Registration is now closed.&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Important dates==&lt;br /&gt;
&lt;br /&gt;
* ''CFP &amp;amp; CFT submission deadline: 19th January 2015''&lt;br /&gt;
* ''Conference and Training Registration deadline: 12th February 2015''&lt;br /&gt;
* Training Day date:          26th February 2015&lt;br /&gt;
* Conference Day date:           27th February 2015&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
For those of you booking flights, ensure you can be at the venue at 8:30am, the conference will end by 5:30pm however we will have post conference drinks at a local drinking establishment for those interested.&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Conference Venue==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
   &amp;lt;td&amp;gt;&lt;br /&gt;
The University of Auckland Engineering Department&amp;lt;br&amp;gt;&lt;br /&gt;
Engineering Building #401&amp;lt;br&amp;gt;&lt;br /&gt;
Room: Eng 1449&amp;lt;br&amp;gt;&lt;br /&gt;
Address: 20 Symonds Street&amp;lt;br&amp;gt;&lt;br /&gt;
Auckland&amp;lt;br&amp;gt;&lt;br /&gt;
New Zealand&amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.google.com/maps/place/Faculty+of+Engineering,+The+University+of+Auckland,+Auckland,+1010,+New+Zealand Map]&lt;br /&gt;
   &amp;lt;/td&amp;gt;&lt;br /&gt;
   &amp;lt;td&amp;gt;&lt;br /&gt;
[[Image:EngineeringBuilding401Web.JPG]] [[Image:RoomEng1449Web.JPG]]&lt;br /&gt;
   &amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Conference Sponsors==&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;bottom&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;[http://www.auckland.ac.nz/ https://www.owasp.org/images/8/82/University_of_Auckland_crest_small.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;bottom&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;[http://www.security.org.nz/NZISF_NZISForumContent.php https://www.owasp.org/images/5/5a/Nz_information_security_forum.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;ICT and Department of Information Systems and Operations Management&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Gold Sponsors:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[[File:INSOMNIA.PNG|center|300px|link=http://www.insomniasec.com/]]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[[File:Aurainfosec300px.jpg|center|300px|link=http://www.aurainfosec.com/]]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com https://www.owasp.org/images/4/41/SA_Logo_w_DD.gif]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.insomniasec.com Insomnia Security]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.aurasoftwaresecurity.co.nz Aura Information Security]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com www.security-assessment.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Silver Sponsors:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[[File:Beca.png|center|200px|link=http://www.beca.com/]]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[[File:Wynyard_CMYK_land.png|center|250px|link=https://www.wynyardgroup.com/]]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Support Sponsor:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[[File:BinaryMistLimited.png|center|150px|link=http://binarymist.net]]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Conference Committee==&lt;br /&gt;
&lt;br /&gt;
* Denis Andzakovic - OWASP New Zealand Leader (Auckland)&lt;br /&gt;
* Adrian Hayes -  OWASP New Zealand Leader (Wellington)&lt;br /&gt;
* Kim Carter -  OWASP New Zealand Leader (Christchurch)&lt;br /&gt;
* Lech Janczewski - Associate Professor - University of Auckland School of Business&lt;br /&gt;
&lt;br /&gt;
Please direct all enquiries to denis.andzakovic@owasp.org | adrian.hayes@owasp.org | kim.carter@owasp.org&lt;br /&gt;
&lt;br /&gt;
= Schedule and Talks =&lt;br /&gt;
== Schedule and Talks ==&lt;br /&gt;
&lt;br /&gt;
We're still finalising the schedule and talks, please come back tomorrow!&lt;br /&gt;
&lt;br /&gt;
= Training Day =&lt;br /&gt;
==Training Day==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We are happy to announce that training will run on Thursday the 26th of February 2015, the day before the OWASP Day conference. The courses will be running from 9:00 AM sharp to 5:00PM. The training venues will be auditoriums kindly provided by the University of Auckland, in the same building as the OWASP Day conference itself. Feedback from previous training has been very positive and there are limited spaces - so get in quick! &lt;br /&gt;
&lt;br /&gt;
Details are as follows:&lt;br /&gt;
&lt;br /&gt;
===Training Abstract - Bootstrapping Agile Security===&lt;br /&gt;
&lt;br /&gt;
Agile development is often seen as a delicate balance of ritual and roles allowing for rapid development, continuous deployment and the expansion of the post-it note industry. Security is often seen as a lumbering giant of process, governance and technology allowing for increased control, reduced risk and the expansion of the technology vendor industry.&lt;br /&gt;
&lt;br /&gt;
What if you could merge the two?&lt;br /&gt;
&lt;br /&gt;
The world of security is changing to meet the needs of agile software development. Organisations around the world are coming up with tools, techniques and processes to make security a continuous presence to support developers. This hands on, fast-paced course will not only give students a solid grounding in how to bring security into agile software development life-cycles, but also give a range of tools, techniques and practical skills to make it happen. &lt;br /&gt;
&lt;br /&gt;
===Trainer Bio - Laura Bell===&lt;br /&gt;
&lt;br /&gt;
Laura Bell is the founder and lead consultant at SafeStack, a specialist New Zealand agile security firm. With almost a decade of experience in software development and information security, Laura specialises in bringing security practices and culture into organisations of every shape and size. Her recent research into agile security practices has generated a set of tools and processes that can enable the management of security risk without compromising innovation or speed.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Registration===&lt;br /&gt;
&lt;br /&gt;
If you are interested in registering for the training session please email [mailto:adrian.hayes@owasp.org?cc=denis.andzakovic@owasp.org&amp;amp;cc=kim.carter@owasp.org adrian.hayes@owasp.org.nz, denis.andzakovic@owasp.org, and kim.carter@owasp.org] and let us know who you would like to attend.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- = Call For Presentations =&lt;br /&gt;
==Call For Presentations==&lt;br /&gt;
&lt;br /&gt;
OWASP New Zealand Day conferences attract a high quality of speakers from a variety of security disciplines including&lt;br /&gt;
architects, web developers and engineers, system administrators, penetration testers, policy specialists and more.&lt;br /&gt;
We encourage presentations to have a strong component on fixing and prevention of security issues. We are looking for presentations on a wide variety of security topics,&lt;br /&gt;
including but not limited to:&lt;br /&gt;
&lt;br /&gt;
* Web application security&lt;br /&gt;
* Mobile security&lt;br /&gt;
* Secure development&lt;br /&gt;
* Vulnerability analysis&lt;br /&gt;
* Threat modelling&lt;br /&gt;
* Threat and vulnerability countermeasures&lt;br /&gt;
* Platform or language security (JavaScript, .NET, Java, RoR, etc)&lt;br /&gt;
* Penetration Testing&lt;br /&gt;
* Browser and client security&lt;br /&gt;
* Application and solution architecture security&lt;br /&gt;
* PCI DSS&lt;br /&gt;
* Risk management&lt;br /&gt;
* Security concepts for C*Os, project managers and other non-technical attendees&lt;br /&gt;
* Privacy controls&lt;br /&gt;
&lt;br /&gt;
The email subject must be &amp;quot;OWASP New Zealand 2015: CFP&amp;quot; and the email body must contain the following information/sections:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name and Surname&lt;br /&gt;
* Affiliation&lt;br /&gt;
* Telephone number&lt;br /&gt;
* Email address&lt;br /&gt;
* Short presenter bio&lt;br /&gt;
* Title of the contribution&lt;br /&gt;
* Type of contribution: Technical, Informative, Management&lt;br /&gt;
* Short abstract (up to 500 words)&lt;br /&gt;
* List of the author's previous papers/articles/speeches on the same/similar topic (if any)&lt;br /&gt;
* If you are not from New Zealand, will your company support your travel/accommodation costs? - Yes/No&lt;br /&gt;
&lt;br /&gt;
The submission will be reviewed by the OWASP New Zealand Day conference committee and the highest voted talks will be selected and invited for presentation.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
PLEASE NOTE:&lt;br /&gt;
&lt;br /&gt;
* Due to limited budget available, expenses for international speakers cannot be covered.&lt;br /&gt;
* If your company is willing to cover travel and accommodation costs, the company will become &amp;quot;Support Sponsor&amp;quot; of the event.&lt;br /&gt;
&lt;br /&gt;
Please submit the above information to all of the following: Denis Andzakovic (denis.andzakovic@owasp.org), Adrian Hayes (adrian.hayes@owasp.org) and Kim Carter (kim.carter@owasp.org).&lt;br /&gt;
&lt;br /&gt;
Submissions deadline: 19th January 2015&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Call For Trainers =&lt;br /&gt;
== Call For Trainers ==&lt;br /&gt;
&lt;br /&gt;
We are happy to announce that training will run on Thursday February 26th 2015, the day before the OWASP Day conference.&lt;br /&gt;
The training venues will be auditoriums kindly provided by the University of Auckland, in the same building as the OWASP Day conference itself.&lt;br /&gt;
Classes will contain up to 20 students, and each seat has power for laptop usage. A wide range of half-day or full-day training proposals will be considered,&lt;br /&gt;
see the Call for Papers for a list of example topics.&lt;br /&gt;
&lt;br /&gt;
If you are interested in running one of the training sessions, please contact Denis Andzakovic, Adrian Hayes and Kim Carter with the following information:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Trainer name&lt;br /&gt;
* Trainer organisation&lt;br /&gt;
* Telephone + email contact&lt;br /&gt;
* Short Trainer bio&lt;br /&gt;
* Training title&lt;br /&gt;
* Trainer requirements (e.g. a projector, whiteboard, etc)&lt;br /&gt;
* Trainee requirements (e.g. laptop, VMWare/Virtualbox, etc)&lt;br /&gt;
* Training summary (less than 500 words)&lt;br /&gt;
* Target audience (e.g. testers, project managers, security managers, web developers, architects)&lt;br /&gt;
* Skill level required (Basic / Intermediate / Advanced)&lt;br /&gt;
* What attendees can expect to learn (key objectives)&lt;br /&gt;
* Short course outline&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The fixed price per head for training will be $250 for a half-day session and $500 for a whole-day session. As this training is part of an OWASP event, part of the proceeds go back to OWASP. The split is as follows:&lt;br /&gt;
&lt;br /&gt;
* 25% to OWASP Global - used for OWASP projects around the world&lt;br /&gt;
* 25% to OWASP NZ Day - used for expenses such as catering during the conference&lt;br /&gt;
* 50% to the training provider.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Please submit the above information to all of the following:&lt;br /&gt;
* Denis Andzakovic (denis.andzakovic@owasp.org)&lt;br /&gt;
* Adrian Hayes (adrian.hayes@owasp.org)&lt;br /&gt;
* Kim Carter (kim.carter@owasp.org).&lt;br /&gt;
&lt;br /&gt;
Submissions deadline: 19th January 2015&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Call For Sponsorships =&lt;br /&gt;
==Call For Sponsorships==&lt;br /&gt;
&lt;br /&gt;
OWASP New Zealand Day 2015 will be held in Auckland on the 27th of February, 2015 and is a security conference entirely dedicated to application security.&lt;br /&gt;
The conference is once again being hosted by the University of Auckland with their support and assistance.&lt;br /&gt;
OWASP New Zealand Day 2015 is a free event, but requires sponsor support to help be an instructive and quality event for the New Zealand community.&lt;br /&gt;
OWASP is strictly not for profit. The sponsorship money will be used to help make OWASP New Zealand Day 2015 a free, compelling, and valuable experience for all attendees.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The sponsorship funds collected are to be used for things such as:&lt;br /&gt;
&lt;br /&gt;
* Refreshments (coffee break/lunch) - we want to keep people refreshed during the day; while we certainly bring good and interesting speakers, we don't want people to go home when they become hungry. &lt;br /&gt;
* Name tags - we feel that getting to know people within the New Zealand community is important, and name tags make that possible.&lt;br /&gt;
* Promotion - up to now our events are propagating by word of mouth. We would like to get to a wider audience by advertising our events.&lt;br /&gt;
* Printed Materials - printed materials will include brochures, tags and lanyards.&lt;br /&gt;
&lt;br /&gt;
== Facts ==&lt;br /&gt;
&lt;br /&gt;
In 2013, the event was supported by six sponsors and attracted more than 250 participants. Plenty of constructive (and positive!) feedback from the audience was received and we are using this to make the conference more appealing to more people. For more information on the last New Zealand Day event, please visit: https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2013&lt;br /&gt;
&lt;br /&gt;
The OWASP New Zealand community is strong, this year has Christchurch as a new region and there are more than 360 people currently subscribed to the mailing-list. OWASP New Zealand Day is expected to attract between 250 and 300 attendees this year.&lt;br /&gt;
&lt;br /&gt;
OWASP regular attendees are IT project managers, IT security managers, IT security consultants, web application architects and developers, QA managers, QA testers and system administrators.&lt;br /&gt;
&lt;br /&gt;
== Sponsorships  ==&lt;br /&gt;
&lt;br /&gt;
There are three different levels of sponsorships for the OWASP Day event:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Support Sponsorship&amp;lt;/b&amp;gt;: (Covering international speaker travel expenses, media coverage/article/promotion of the event)&lt;br /&gt;
   &lt;br /&gt;
Includes:&lt;br /&gt;
&lt;br /&gt;
* Publication of the sponsor logo on the event web site - https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2015&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Silver Sponsorship&amp;lt;/b&amp;gt;: 1500 NZD&lt;br /&gt;
&lt;br /&gt;
Includes: &lt;br /&gt;
&lt;br /&gt;
* Publication of the sponsor logo on the event web site - https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2015&lt;br /&gt;
* The publication of the sponsor logo on the event site, in the agenda, on the handouts and in all the official communications with the attendees at the conference.&lt;br /&gt;
* The possibility to distribute the company brochures, CDs or other materials to the participants during the event.&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Gold Sponsorship&amp;lt;/b&amp;gt;: 2750 NZD&lt;br /&gt;
&lt;br /&gt;
Includes: &lt;br /&gt;
&lt;br /&gt;
* The possibility to have a promotional banner or sign side stage in the main auditorium (to be provided by the sponsor, size subject to approval by the OWASP NZ Day Committee).&lt;br /&gt;
* The publication of the sponsor logo on the event site, in the agenda, on the handouts and in all the official communications with the attendees at the conference.&lt;br /&gt;
* The possibility to distribute the company brochures, CDs or other materials to the participants during the event.&lt;br /&gt;
* Publication of the sponsor logo on the OWASP New Zealand Chapter page - Sponsor logo on the OWASP NZ site prior and during the OWASP Day event - https://www.owasp.org/index.php/New_Zealand&lt;br /&gt;
* Publication of the sponsor logo on the event web site - https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2015&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Those who are interested in sponsoring OWASP New Zealand 2015 Conference can contact the [mailto:kim.carter@owasp.org?cc=adrian.hayes@owasp.org?cc=denis.andzakovic@owasp.org OWASP New Zealand Board].&amp;lt;br&amp;gt;&lt;br /&gt;
 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]]&lt;/div&gt;</summary>
		<author><name>Adrian Hayes</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_New_Zealand_Day_2015&amp;diff=188535</id>
		<title>OWASP New Zealand Day 2015</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_New_Zealand_Day_2015&amp;diff=188535"/>
				<updated>2015-01-26T02:05:59Z</updated>
		
		<summary type="html">&lt;p&gt;Adrian Hayes: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2015 https://www.owasp.org/images/9/94/New_Zealand_Day_2015_020.png]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''26th and 27th Feburary 2015 - Auckland'''&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
= Introduction =&lt;br /&gt;
==Introduction==&lt;br /&gt;
We are proud to announce the sixth OWASP New Zealand Day conference, to be held at the University of Auckland on Friday February 27th, 2015. OWASP New Zealand Day is a one-day conference dedicated to application security, with an emphasis on secure architecture and development techniques to help Kiwi developers build more secure applications.&lt;br /&gt;
&lt;br /&gt;
Similar to last year:&lt;br /&gt;
&lt;br /&gt;
* We will be offering training on the day before the conference (Thursday, 26th of February). &lt;br /&gt;
* After lunch on the conference day, we will split to two tracks - one focused on technical topics, the other on policy, compliance and risk management. &lt;br /&gt;
&lt;br /&gt;
The sixth OWASP New Zealand Day will be happening thanks to the support provided by the University of Auckland, which will kindly offer a slightly different location from the last five years. Entry to the event will, as in the past, be free.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For any comments, feedback or observations, please don't hesitate to contact [mailto:kim.carter@owasp.org?cc=adrian.hayes@owasp.org?cc=denis.andzakovic@owasp.org us].&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Registration==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Registration is not yet open. Please join our low volume [https://lists.owasp.org/mailman/listinfo/owasp-newzealand mailing list] to be notified when registration opens.&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Registration for the main conference day is now open: [https://registration.owasp.org.nz/ Conference Registration Here]&lt;br /&gt;
&lt;br /&gt;
There is no cost for the main conference day and lunch is provided. We do ask that if at any point you realise you cannot make it please cancel your registration to make room for others as spaces are limited.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Registration for the training on the 26th of Feb is not open yet and will be announced on our [https://lists.owasp.org/mailman/listinfo/owasp-newzealand mailing list] after the 19th of Feb.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Training Registration is now open: [http://www.regonline.com/owaspnzday2015trainingandsponsorship Training Registration]&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Registration is now closed.&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Important dates==&lt;br /&gt;
&lt;br /&gt;
* ''CFP &amp;amp; CFT submission deadline: 19th January 2015''&lt;br /&gt;
* ''Conference and Training Registration deadline: 12th February 2015''&lt;br /&gt;
* Training Day date:          26th February 2015&lt;br /&gt;
* Conference Day date:           27th February 2015&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
For those of you booking flights, ensure you can be at the venue at 8:30am, the conference will end by 5:30pm however we will have post conference drinks at a local drinking establishment for those interested.&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Conference Venue==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
   &amp;lt;td&amp;gt;&lt;br /&gt;
The University of Auckland Engineering Department&amp;lt;br&amp;gt;&lt;br /&gt;
Engineering Building #401&amp;lt;br&amp;gt;&lt;br /&gt;
Room: Eng 1449&amp;lt;br&amp;gt;&lt;br /&gt;
Address: 20 Symonds Street&amp;lt;br&amp;gt;&lt;br /&gt;
Auckland&amp;lt;br&amp;gt;&lt;br /&gt;
New Zealand&amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.google.com/maps/place/Faculty+of+Engineering,+The+University+of+Auckland,+Auckland,+1010,+New+Zealand Map]&lt;br /&gt;
   &amp;lt;/td&amp;gt;&lt;br /&gt;
   &amp;lt;td&amp;gt;&lt;br /&gt;
[[Image:EngineeringBuilding401Web.JPG]] [[Image:RoomEng1449Web.JPG]]&lt;br /&gt;
   &amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Conference Sponsors==&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;bottom&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;[http://www.auckland.ac.nz/ https://www.owasp.org/images/8/82/University_of_Auckland_crest_small.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;bottom&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;[http://www.security.org.nz/NZISF_NZISForumContent.php https://www.owasp.org/images/5/5a/Nz_information_security_forum.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;ICT and Department of Information Systems and Operations Management&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Gold Sponsors:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[[File:INSOMNIA.PNG|center|300px|link=http://www.insomniasec.com/]]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[[File:Aurainfosec300px.jpg|center|300px|link=http://www.aurainfosec.com/]]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com https://www.owasp.org/images/4/41/SA_Logo_w_DD.gif]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.insomniasec.com Insomnia Security]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.aurasoftwaresecurity.co.nz Aura Information Security]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com www.security-assessment.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Silver Sponsors:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[[File:Beca.png|center|200px|link=http://www.beca.com/]]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[[File:Wynyard_CMYK_land.png|center|250px|link=https://www.wynyardgroup.com/]]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Support Sponsor:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[[File:BinaryMistLimited.png|center|150px|link=http://binarymist.net]]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Conference Committee==&lt;br /&gt;
&lt;br /&gt;
* Denis Andzakovic - OWASP New Zealand Leader (Auckland)&lt;br /&gt;
* Adrian Hayes -  OWASP New Zealand Leader (Wellington)&lt;br /&gt;
* Kim Carter -  OWASP New Zealand Leader (Christchurch)&lt;br /&gt;
* Lech Janczewski - Associate Professor - University of Auckland School of Business&lt;br /&gt;
&lt;br /&gt;
Please direct all enquiries to denis.andzakovic@owasp.org | adrian.hayes@owasp.org | kim.carter@owasp.org&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Schedule and Talks =&lt;br /&gt;
== Schedule and Talks ==&lt;br /&gt;
&lt;br /&gt;
We're still finalising the schedule and talks, please come back tomorrow!&lt;br /&gt;
&lt;br /&gt;
= Training Day =&lt;br /&gt;
==Training Day==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We are happy to announce that training will run on Thursday the 26th of February 2015, the day before the OWASP Day conference. The courses will be running from 9:00 AM sharp to 5:00PM. The training venues will be auditoriums kindly provided by the University of Auckland, in the same building as the OWASP Day conference itself. Feedback from previous training has been very positive and there are limited spaces - so get in quick! &lt;br /&gt;
&lt;br /&gt;
Details are as follows:&lt;br /&gt;
&lt;br /&gt;
===Training Abstract - Bootstrapping Agile Security===&lt;br /&gt;
&lt;br /&gt;
Agile development is often seen as a delicate balance of ritual and roles allowing for rapid development, continuous deployment and the expansion of the post-it note industry. Security is often seen as a lumbering giant of process, governance and technology allowing for increased control, reduced risk and the expansion of the technology vendor industry.&lt;br /&gt;
&lt;br /&gt;
What if you could merge the two?&lt;br /&gt;
&lt;br /&gt;
The world of security is changing to meet the needs of agile software development. Organisations around the world are coming up with tools, techniques and processes to make security a continuous presence to support developers. This hands on, fast-paced course will not only give students a solid grounding in how to bring security into agile software development life-cycles, but also give a range of tools, techniques and practical skills to make it happen. &lt;br /&gt;
&lt;br /&gt;
===Trainer Bio - Laura Bell===&lt;br /&gt;
&lt;br /&gt;
Laura Bell is the founder and lead consultant at SafeStack, a specialist New Zealand agile security firm. With almost a decade of experience in software development and information security, Laura specialises in bringing security practices and culture into organisations of every shape and size. Her recent research into agile security practices has generated a set of tools and processes that can enable the management of security risk without compromising innovation or speed.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Registration===&lt;br /&gt;
&lt;br /&gt;
If you are interested in registering for the training session please email [mailto:adrian.hayes@owasp.org?cc=denis.andzakovic@owasp.org&amp;amp;cc=kim.carter@owasp.org adrian.hayes@owasp.org.nz, denis.andzakovic@owasp.org, and kim.carter@owasp.org] and let us know who you would like to attend.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- = Call For Presentations =&lt;br /&gt;
==Call For Presentations==&lt;br /&gt;
&lt;br /&gt;
OWASP New Zealand Day conferences attract a high quality of speakers from a variety of security disciplines including&lt;br /&gt;
architects, web developers and engineers, system administrators, penetration testers, policy specialists and more.&lt;br /&gt;
We encourage presentations to have a strong component on fixing and prevention of security issues. We are looking for presentations on a wide variety of security topics,&lt;br /&gt;
including but not limited to:&lt;br /&gt;
&lt;br /&gt;
* Web application security&lt;br /&gt;
* Mobile security&lt;br /&gt;
* Secure development&lt;br /&gt;
* Vulnerability analysis&lt;br /&gt;
* Threat modelling&lt;br /&gt;
* Threat and vulnerability countermeasures&lt;br /&gt;
* Platform or language security (JavaScript, .NET, Java, RoR, etc)&lt;br /&gt;
* Penetration Testing&lt;br /&gt;
* Browser and client security&lt;br /&gt;
* Application and solution architecture security&lt;br /&gt;
* PCI DSS&lt;br /&gt;
* Risk management&lt;br /&gt;
* Security concepts for C*Os, project managers and other non-technical attendees&lt;br /&gt;
* Privacy controls&lt;br /&gt;
&lt;br /&gt;
The email subject must be &amp;quot;OWASP New Zealand 2015: CFP&amp;quot; and the email body must contain the following information/sections:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name and Surname&lt;br /&gt;
* Affiliation&lt;br /&gt;
* Telephone number&lt;br /&gt;
* Email address&lt;br /&gt;
* Short presenter bio&lt;br /&gt;
* Title of the contribution&lt;br /&gt;
* Type of contribution: Technical, Informative, Management&lt;br /&gt;
* Short abstract (up to 500 words)&lt;br /&gt;
* List of the author's previous papers/articles/speeches on the same/similar topic (if any)&lt;br /&gt;
* If you are not from New Zealand, will your company support your travel/accommodation costs? - Yes/No&lt;br /&gt;
&lt;br /&gt;
The submission will be reviewed by the OWASP New Zealand Day conference committee and the highest voted talks will be selected and invited for presentation.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
PLEASE NOTE:&lt;br /&gt;
&lt;br /&gt;
* Due to limited budget available, expenses for international speakers cannot be covered.&lt;br /&gt;
* If your company is willing to cover travel and accommodation costs, the company will become &amp;quot;Support Sponsor&amp;quot; of the event.&lt;br /&gt;
&lt;br /&gt;
Please submit the above information to all of the following: Denis Andzakovic (denis.andzakovic@owasp.org), Adrian Hayes (adrian.hayes@owasp.org) and Kim Carter (kim.carter@owasp.org).&lt;br /&gt;
&lt;br /&gt;
Submissions deadline: 19th January 2015&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Call For Trainers =&lt;br /&gt;
== Call For Trainers ==&lt;br /&gt;
&lt;br /&gt;
We are happy to announce that training will run on Thursday February 26th 2015, the day before the OWASP Day conference.&lt;br /&gt;
The training venues will be auditoriums kindly provided by the University of Auckland, in the same building as the OWASP Day conference itself.&lt;br /&gt;
Classes will contain up to 20 students, and each seat has power for laptop usage. A wide range of half-day or full-day training proposals will be considered,&lt;br /&gt;
see the Call for Papers for a list of example topics.&lt;br /&gt;
&lt;br /&gt;
If you are interested in running one of the training sessions, please contact Denis Andzakovic, Adrian Hayes and Kim Carter with the following information:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Trainer name&lt;br /&gt;
* Trainer organisation&lt;br /&gt;
* Telephone + email contact&lt;br /&gt;
* Short Trainer bio&lt;br /&gt;
* Training title&lt;br /&gt;
* Trainer requirements (e.g. a projector, whiteboard, etc)&lt;br /&gt;
* Trainee requirements (e.g. laptop, VMWare/Virtualbox, etc)&lt;br /&gt;
* Training summary (less than 500 words)&lt;br /&gt;
* Target audience (e.g. testers, project managers, security managers, web developers, architects)&lt;br /&gt;
* Skill level required (Basic / Intermediate / Advanced)&lt;br /&gt;
* What attendees can expect to learn (key objectives)&lt;br /&gt;
* Short course outline&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The fixed price per head for training will be $250 for a half-day session and $500 for a whole-day session. As this training is part of an OWASP event, part of the proceeds go back to OWASP. The split is as follows:&lt;br /&gt;
&lt;br /&gt;
* 25% to OWASP Global - used for OWASP projects around the world&lt;br /&gt;
* 25% to OWASP NZ Day - used for expenses such as catering during the conference&lt;br /&gt;
* 50% to the training provider.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Please submit the above information to all of the following:&lt;br /&gt;
* Denis Andzakovic (denis.andzakovic@owasp.org)&lt;br /&gt;
* Adrian Hayes (adrian.hayes@owasp.org)&lt;br /&gt;
* Kim Carter (kim.carter@owasp.org).&lt;br /&gt;
&lt;br /&gt;
Submissions deadline: 19th January 2015&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Call For Sponsorships =&lt;br /&gt;
==Call For Sponsorships==&lt;br /&gt;
&lt;br /&gt;
OWASP New Zealand Day 2015 will be held in Auckland on the 27th of February, 2015 and is a security conference entirely dedicated to application security.&lt;br /&gt;
The conference is once again being hosted by the University of Auckland with their support and assistance.&lt;br /&gt;
OWASP New Zealand Day 2015 is a free event, but requires sponsor support to help be an instructive and quality event for the New Zealand community.&lt;br /&gt;
OWASP is strictly not for profit. The sponsorship money will be used to help make OWASP New Zealand Day 2015 a free, compelling, and valuable experience for all attendees.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The sponsorship funds collected are to be used for things such as:&lt;br /&gt;
&lt;br /&gt;
* Refreshments (coffee break/lunch) - we want to keep people refreshed during the day; while we certainly bring good and interesting speakers, we don't want people to go home when they become hungry. &lt;br /&gt;
* Name tags - we feel that getting to know people within the New Zealand community is important, and name tags make that possible.&lt;br /&gt;
* Promotion - up to now our events are propagating by word of mouth. We would like to get to a wider audience by advertising our events.&lt;br /&gt;
* Printed Materials - printed materials will include brochures, tags and lanyards.&lt;br /&gt;
&lt;br /&gt;
== Facts ==&lt;br /&gt;
&lt;br /&gt;
In 2013, the event was supported by six sponsors and attracted more than 250 participants. Plenty of constructive (and positive!) feedback from the audience was received and we are using this to make the conference more appealing to more people. For more information on the last New Zealand Day event, please visit: https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2013&lt;br /&gt;
&lt;br /&gt;
The OWASP New Zealand community is strong, this year has Christchurch as a new region and there are more than 360 people currently subscribed to the mailing-list. OWASP New Zealand Day is expected to attract between 250 and 300 attendees this year.&lt;br /&gt;
&lt;br /&gt;
OWASP regular attendees are IT project managers, IT security managers, IT security consultants, web application architects and developers, QA managers, QA testers and system administrators.&lt;br /&gt;
&lt;br /&gt;
== Sponsorships  ==&lt;br /&gt;
&lt;br /&gt;
There are three different levels of sponsorships for the OWASP Day event:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Support Sponsorship&amp;lt;/b&amp;gt;: (Covering international speaker travel expenses, media coverage/article/promotion of the event)&lt;br /&gt;
   &lt;br /&gt;
Includes:&lt;br /&gt;
&lt;br /&gt;
* Publication of the sponsor logo on the event web site - https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2015&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Silver Sponsorship&amp;lt;/b&amp;gt;: 1500 NZD&lt;br /&gt;
&lt;br /&gt;
Includes: &lt;br /&gt;
&lt;br /&gt;
* Publication of the sponsor logo on the event web site - https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2015&lt;br /&gt;
* The publication of the sponsor logo on the event site, in the agenda, on the handouts and in all the official communications with the attendees at the conference.&lt;br /&gt;
* The possibility to distribute the company brochures, CDs or other materials to the participants during the event.&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Gold Sponsorship&amp;lt;/b&amp;gt;: 2750 NZD&lt;br /&gt;
&lt;br /&gt;
Includes: &lt;br /&gt;
&lt;br /&gt;
* The possibility to have a promotional banner or sign side stage in the main auditorium (to be provided by the sponsor, size subject to approval by the OWASP NZ Day Committee).&lt;br /&gt;
* The publication of the sponsor logo on the event site, in the agenda, on the handouts and in all the official communications with the attendees at the conference.&lt;br /&gt;
* The possibility to distribute the company brochures, CDs or other materials to the participants during the event.&lt;br /&gt;
* Publication of the sponsor logo on the OWASP New Zealand Chapter page - Sponsor logo on the OWASP NZ site prior and during the OWASP Day event - https://www.owasp.org/index.php/New_Zealand&lt;br /&gt;
* Publication of the sponsor logo on the event web site - https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2015&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Those who are interested in sponsoring OWASP New Zealand 2015 Conference can contact the [mailto:kim.carter@owasp.org?cc=adrian.hayes@owasp.org?cc=denis.andzakovic@owasp.org OWASP New Zealand Board].&amp;lt;br&amp;gt;&lt;br /&gt;
 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]]&lt;/div&gt;</summary>
		<author><name>Adrian Hayes</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_New_Zealand_Day_2015&amp;diff=188397</id>
		<title>OWASP New Zealand Day 2015</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_New_Zealand_Day_2015&amp;diff=188397"/>
				<updated>2015-01-22T01:22:15Z</updated>
		
		<summary type="html">&lt;p&gt;Adrian Hayes: /* Conference Sponsors */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2015 https://www.owasp.org/images/9/94/New_Zealand_Day_2015_020.png]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''26th and 27th Feburary 2015 - Auckland'''&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
= Introduction =&lt;br /&gt;
==Introduction==&lt;br /&gt;
We are proud to announce the sixth OWASP New Zealand Day conference, to be held at the University of Auckland on Friday February 27th, 2015. OWASP New Zealand Day is a one-day conference dedicated to application security, with an emphasis on secure architecture and development techniques to help Kiwi developers build more secure applications.&lt;br /&gt;
&lt;br /&gt;
Similar to last year:&lt;br /&gt;
&lt;br /&gt;
* We will be offering training on the day before the conference (Thursday, 26th of February). &lt;br /&gt;
* After lunch on the conference day, we will split to two tracks - one focused on technical topics, the other on policy, compliance and risk management. &lt;br /&gt;
&lt;br /&gt;
The sixth OWASP New Zealand Day will be happening thanks to the support provided by the University of Auckland, which will kindly offer a slightly different location from the last five years. Entry to the event will, as in the past, be free.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For any comments, feedback or observations, please don't hesitate to contact [mailto:kim.carter@owasp.org?cc=adrian.hayes@owasp.org?cc=denis.andzakovic@owasp.org us].&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Registration==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Registration is not yet open. Please join our low volume [https://lists.owasp.org/mailman/listinfo/owasp-newzealand mailing list] to be notified when registration opens.&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Registration for the main conference day is now open: [https://registration.owasp.org.nz/ Conference Registration Here]&lt;br /&gt;
&lt;br /&gt;
There is no cost for the main conference day and lunch is provided. We do ask that if at any point you realise you cannot make it please cancel your registration to make room for others as spaces are limited.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Registration for the training on the 26th of Feb is not open yet and will be announced on our [https://lists.owasp.org/mailman/listinfo/owasp-newzealand mailing list] after the 19th of Feb.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Training Registration is now open: [http://www.regonline.com/owaspnzday2015trainingandsponsorship Training Registration]&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Registration is now closed.&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Important dates==&lt;br /&gt;
&lt;br /&gt;
* CFP &amp;amp; CFT submission deadline: 19th January 2015&lt;br /&gt;
* Conference and Training Registration deadline: 12th February 2015&lt;br /&gt;
* Training Day date:          26th February 2015&lt;br /&gt;
* Conference Day date:           27th February 2015&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
For those of you booking flights, ensure you can be at the venue at 8:30am, the conference will end by 5:30pm however we will have post conference drinks at a local drinking establishment for those interested.&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Conference Venue==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
   &amp;lt;td&amp;gt;&lt;br /&gt;
The University of Auckland Engineering Department&amp;lt;br&amp;gt;&lt;br /&gt;
Engineering Building #401&amp;lt;br&amp;gt;&lt;br /&gt;
Room: Eng 1449&amp;lt;br&amp;gt;&lt;br /&gt;
Address: 20 Symonds Street&amp;lt;br&amp;gt;&lt;br /&gt;
Auckland&amp;lt;br&amp;gt;&lt;br /&gt;
New Zealand&amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.google.com/maps/place/Faculty+of+Engineering,+The+University+of+Auckland,+Auckland,+1010,+New+Zealand Map]&lt;br /&gt;
   &amp;lt;/td&amp;gt;&lt;br /&gt;
   &amp;lt;td&amp;gt;&lt;br /&gt;
[[Image:EngineeringBuilding401Web.JPG]] [[Image:RoomEng1449Web.JPG]]&lt;br /&gt;
   &amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Conference Sponsors==&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;bottom&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;[http://www.auckland.ac.nz/ https://www.owasp.org/images/8/82/University_of_Auckland_crest_small.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;bottom&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;[http://www.security.org.nz/NZISF_NZISForumContent.php https://www.owasp.org/images/5/5a/Nz_information_security_forum.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;ICT and Department of Information Systems and Operations Management&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Gold Sponsors:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[[File:INSOMNIA.PNG|center|300px|link=http://www.insomniasec.com/]]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[[File:Aurainfosec300px.jpg|center|300px|link=http://www.aurainfosec.com/]]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com https://www.owasp.org/images/4/41/SA_Logo_w_DD.gif]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.insomniasec.com Insomnia Security]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.aurasoftwaresecurity.co.nz Aura Information Security]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com www.security-assessment.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Silver Sponsors:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[[File:Beca.png|center|200px|link=http://www.beca.com/]]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[[File:Wynyard_CMYK_land.png|center|250px|link=https://www.wynyardgroup.com/]]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Support Sponsor:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[[File:BinaryMistLimited.png|center|150px|link=http://binarymist.net]]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Conference Committee==&lt;br /&gt;
&lt;br /&gt;
* Denis Andzakovic - OWASP New Zealand Leader (Auckland)&lt;br /&gt;
* Adrian Hayes -  OWASP New Zealand Leader (Wellington)&lt;br /&gt;
* Kim Carter -  OWASP New Zealand Leader (Christchurch)&lt;br /&gt;
* Lech Janczewski - Associate Professor - University of Auckland School of Business&lt;br /&gt;
&lt;br /&gt;
Please direct all enquiries to denis.andzakovic@owasp.org | adrian.hayes@owasp.org | kim.carter@owasp.org&lt;br /&gt;
&lt;br /&gt;
= Call For Presentations =&lt;br /&gt;
==Call For Presentations==&lt;br /&gt;
&lt;br /&gt;
OWASP New Zealand Day conferences attract a high quality of speakers from a variety of security disciplines including&lt;br /&gt;
architects, web developers and engineers, system administrators, penetration testers, policy specialists and more.&lt;br /&gt;
We encourage presentations to have a strong component on fixing and prevention of security issues. We are looking for presentations on a wide variety of security topics,&lt;br /&gt;
including but not limited to:&lt;br /&gt;
&lt;br /&gt;
* Web application security&lt;br /&gt;
* Mobile security&lt;br /&gt;
* Secure development&lt;br /&gt;
* Vulnerability analysis&lt;br /&gt;
* Threat modelling&lt;br /&gt;
* Threat and vulnerability countermeasures&lt;br /&gt;
* Platform or language security (JavaScript, .NET, Java, RoR, etc)&lt;br /&gt;
* Penetration Testing&lt;br /&gt;
* Browser and client security&lt;br /&gt;
* Application and solution architecture security&lt;br /&gt;
* PCI DSS&lt;br /&gt;
* Risk management&lt;br /&gt;
* Security concepts for C*Os, project managers and other non-technical attendees&lt;br /&gt;
* Privacy controls&lt;br /&gt;
&lt;br /&gt;
The email subject must be &amp;quot;OWASP New Zealand 2015: CFP&amp;quot; and the email body must contain the following information/sections:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name and Surname&lt;br /&gt;
* Affiliation&lt;br /&gt;
* Telephone number&lt;br /&gt;
* Email address&lt;br /&gt;
* Short presenter bio&lt;br /&gt;
* Title of the contribution&lt;br /&gt;
* Type of contribution: Technical, Informative, Management&lt;br /&gt;
* Short abstract (up to 500 words)&lt;br /&gt;
* List of the author's previous papers/articles/speeches on the same/similar topic (if any)&lt;br /&gt;
* If you are not from New Zealand, will your company support your travel/accommodation costs? - Yes/No&lt;br /&gt;
&lt;br /&gt;
The submission will be reviewed by the OWASP New Zealand Day conference committee and the highest voted talks will be selected and invited for presentation.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
PLEASE NOTE:&lt;br /&gt;
&lt;br /&gt;
* Due to limited budget available, expenses for international speakers cannot be covered.&lt;br /&gt;
* If your company is willing to cover travel and accommodation costs, the company will become &amp;quot;Support Sponsor&amp;quot; of the event.&lt;br /&gt;
&lt;br /&gt;
Please submit the above information to all of the following: Denis Andzakovic (denis.andzakovic@owasp.org), Adrian Hayes (adrian.hayes@owasp.org) and Kim Carter (kim.carter@owasp.org).&lt;br /&gt;
&lt;br /&gt;
Submissions deadline: 19th January 2015&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Call For Trainers =&lt;br /&gt;
== Call For Trainers ==&lt;br /&gt;
&lt;br /&gt;
We are happy to announce that training will run on Thursday February 26th 2015, the day before the OWASP Day conference.&lt;br /&gt;
The training venues will be auditoriums kindly provided by the University of Auckland, in the same building as the OWASP Day conference itself.&lt;br /&gt;
Classes will contain up to 20 students, and each seat has power for laptop usage. A wide range of half-day or full-day training proposals will be considered,&lt;br /&gt;
see the Call for Papers for a list of example topics.&lt;br /&gt;
&lt;br /&gt;
If you are interested in running one of the training sessions, please contact Denis Andzakovic, Adrian Hayes and Kim Carter with the following information:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Trainer name&lt;br /&gt;
* Trainer organisation&lt;br /&gt;
* Telephone + email contact&lt;br /&gt;
* Short Trainer bio&lt;br /&gt;
* Training title&lt;br /&gt;
* Trainer requirements (e.g. a projector, whiteboard, etc)&lt;br /&gt;
* Trainee requirements (e.g. laptop, VMWare/Virtualbox, etc)&lt;br /&gt;
* Training summary (less than 500 words)&lt;br /&gt;
* Target audience (e.g. testers, project managers, security managers, web developers, architects)&lt;br /&gt;
* Skill level required (Basic / Intermediate / Advanced)&lt;br /&gt;
* What attendees can expect to learn (key objectives)&lt;br /&gt;
* Short course outline&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The fixed price per head for training will be $250 for a half-day session and $500 for a whole-day session. As this training is part of an OWASP event, part of the proceeds go back to OWASP. The split is as follows:&lt;br /&gt;
&lt;br /&gt;
* 25% to OWASP Global - used for OWASP projects around the world&lt;br /&gt;
* 25% to OWASP NZ Day - used for expenses such as catering during the conference&lt;br /&gt;
* 50% to the training provider.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Please submit the above information to all of the following:&lt;br /&gt;
* Denis Andzakovic (denis.andzakovic@owasp.org)&lt;br /&gt;
* Adrian Hayes (adrian.hayes@owasp.org)&lt;br /&gt;
* Kim Carter (kim.carter@owasp.org).&lt;br /&gt;
&lt;br /&gt;
Submissions deadline: 19th January 2015&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Call For Sponsorships =&lt;br /&gt;
==Call For Sponsorships==&lt;br /&gt;
&lt;br /&gt;
OWASP New Zealand Day 2015 will be held in Auckland on the 27th of February, 2015 and is a security conference entirely dedicated to application security.&lt;br /&gt;
The conference is once again being hosted by the University of Auckland with their support and assistance.&lt;br /&gt;
OWASP New Zealand Day 2015 is a free event, but requires sponsor support to help be an instructive and quality event for the New Zealand community.&lt;br /&gt;
OWASP is strictly not for profit. The sponsorship money will be used to help make OWASP New Zealand Day 2015 a free, compelling, and valuable experience for all attendees.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The sponsorship funds collected are to be used for things such as:&lt;br /&gt;
&lt;br /&gt;
* Refreshments (coffee break/lunch) - we want to keep people refreshed during the day; while we certainly bring good and interesting speakers, we don't want people to go home when they become hungry. &lt;br /&gt;
* Name tags - we feel that getting to know people within the New Zealand community is important, and name tags make that possible.&lt;br /&gt;
* Promotion - up to now our events are propagating by word of mouth. We would like to get to a wider audience by advertising our events.&lt;br /&gt;
* Printed Materials - printed materials will include brochures, tags and lanyards.&lt;br /&gt;
&lt;br /&gt;
== Facts ==&lt;br /&gt;
&lt;br /&gt;
In 2013, the event was supported by six sponsors and attracted more than 250 participants. Plenty of constructive (and positive!) feedback from the audience was received and we are using this to make the conference more appealing to more people. For more information on the last New Zealand Day event, please visit: https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2013&lt;br /&gt;
&lt;br /&gt;
The OWASP New Zealand community is strong, this year has Christchurch as a new region and there are more than 360 people currently subscribed to the mailing-list. OWASP New Zealand Day is expected to attract between 250 and 300 attendees this year.&lt;br /&gt;
&lt;br /&gt;
OWASP regular attendees are IT project managers, IT security managers, IT security consultants, web application architects and developers, QA managers, QA testers and system administrators.&lt;br /&gt;
&lt;br /&gt;
== Sponsorships  ==&lt;br /&gt;
&lt;br /&gt;
There are three different levels of sponsorships for the OWASP Day event:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Support Sponsorship&amp;lt;/b&amp;gt;: (Covering international speaker travel expenses, media coverage/article/promotion of the event)&lt;br /&gt;
   &lt;br /&gt;
Includes:&lt;br /&gt;
&lt;br /&gt;
* Publication of the sponsor logo on the event web site - https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2015&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Silver Sponsorship&amp;lt;/b&amp;gt;: 1500 NZD&lt;br /&gt;
&lt;br /&gt;
Includes: &lt;br /&gt;
&lt;br /&gt;
* Publication of the sponsor logo on the event web site - https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2015&lt;br /&gt;
* The publication of the sponsor logo on the event site, in the agenda, on the handouts and in all the official communications with the attendees at the conference.&lt;br /&gt;
* The possibility to distribute the company brochures, CDs or other materials to the participants during the event.&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Gold Sponsorship&amp;lt;/b&amp;gt;: 2750 NZD&lt;br /&gt;
&lt;br /&gt;
Includes: &lt;br /&gt;
&lt;br /&gt;
* The possibility to have a promotional banner or sign side stage in the main auditorium (to be provided by the sponsor, size subject to approval by the OWASP NZ Day Committee).&lt;br /&gt;
* The publication of the sponsor logo on the event site, in the agenda, on the handouts and in all the official communications with the attendees at the conference.&lt;br /&gt;
* The possibility to distribute the company brochures, CDs or other materials to the participants during the event.&lt;br /&gt;
* Publication of the sponsor logo on the OWASP New Zealand Chapter page - Sponsor logo on the OWASP NZ site prior and during the OWASP Day event - https://www.owasp.org/index.php/New_Zealand&lt;br /&gt;
* Publication of the sponsor logo on the event web site - https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2015&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Those who are interested in sponsoring OWASP New Zealand 2015 Conference can contact the [mailto:kim.carter@owasp.org?cc=adrian.hayes@owasp.org?cc=denis.andzakovic@owasp.org OWASP New Zealand Board].&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]]&lt;/div&gt;</summary>
		<author><name>Adrian Hayes</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Wynyard_CMYK_land.png&amp;diff=188396</id>
		<title>File:Wynyard CMYK land.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Wynyard_CMYK_land.png&amp;diff=188396"/>
				<updated>2015-01-22T01:16:58Z</updated>
		
		<summary type="html">&lt;p&gt;Adrian Hayes: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Adrian Hayes</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_New_Zealand_Day_2015&amp;diff=188141</id>
		<title>OWASP New Zealand Day 2015</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_New_Zealand_Day_2015&amp;diff=188141"/>
				<updated>2015-01-15T02:05:28Z</updated>
		
		<summary type="html">&lt;p&gt;Adrian Hayes: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2015 https://www.owasp.org/images/9/94/New_Zealand_Day_2015_020.png]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''26th and 27th Feburary 2015 - Auckland'''&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
= Introduction =&lt;br /&gt;
==Introduction==&lt;br /&gt;
We are proud to announce the sixth OWASP New Zealand Day conference, to be held at the University of Auckland on Friday February 27th, 2015. OWASP New Zealand Day is a one-day conference dedicated to application security, with an emphasis on secure architecture and development techniques to help Kiwi developers build more secure applications.&lt;br /&gt;
&lt;br /&gt;
Similar to last year:&lt;br /&gt;
&lt;br /&gt;
* We will be offering training on the day before the conference (Thursday, 26th of February). &lt;br /&gt;
* After lunch on the conference day, we will split to two tracks - one focused on technical topics, the other on policy, compliance and risk management. &lt;br /&gt;
&lt;br /&gt;
The sixth OWASP New Zealand Day will be happening thanks to the support provided by the University of Auckland, which will kindly offer a slightly different location from the last five years. Entry to the event will, as in the past, be free.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For any comments, feedback or observations, please don't hesitate to contact [mailto:kim.carter@owasp.org?cc=adrian.hayes@owasp.org?cc=denis.andzakovic@owasp.org us].&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Registration==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Registration is not yet open. Please join our low volume [https://lists.owasp.org/mailman/listinfo/owasp-newzealand mailing list] to be notified when registration opens.&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Registration for the main conference day is now open: [https://registration.owasp.org.nz/ Conference Registration Here]&lt;br /&gt;
&lt;br /&gt;
There is no cost for the main conference day and lunch is provided. We do ask that if at any point you realise you cannot make it please cancel your registration to make room for others as spaces are limited.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Registration for the training on the 26th of Feb is not open yet and will be announced on our [https://lists.owasp.org/mailman/listinfo/owasp-newzealand mailing list] after the 19th of Feb.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Training Registration is now open: [http://www.regonline.com/owaspnzday2015trainingandsponsorship Training Registration]&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Registration is now closed.&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Important dates==&lt;br /&gt;
&lt;br /&gt;
* CFP &amp;amp; CFT submission deadline: 19th January 2015&lt;br /&gt;
* Conference and Training Registration deadline: 12th February 2015&lt;br /&gt;
* Training Day date:          26th February 2015&lt;br /&gt;
* Conference Day date:           27th February 2015&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
For those of you booking flights, ensure you can be at the venue at 8:30am, the conference will end by 5:30pm however we will have post conference drinks at a local drinking establishment for those interested.&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Conference Venue==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
   &amp;lt;td&amp;gt;&lt;br /&gt;
The University of Auckland Engineering Department&amp;lt;br&amp;gt;&lt;br /&gt;
Engineering Building #401&amp;lt;br&amp;gt;&lt;br /&gt;
Room: Eng 1449&amp;lt;br&amp;gt;&lt;br /&gt;
Address: 20 Symonds Street&amp;lt;br&amp;gt;&lt;br /&gt;
Auckland&amp;lt;br&amp;gt;&lt;br /&gt;
New Zealand&amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.google.com/maps/place/Faculty+of+Engineering,+The+University+of+Auckland,+Auckland,+1010,+New+Zealand Map]&lt;br /&gt;
   &amp;lt;/td&amp;gt;&lt;br /&gt;
   &amp;lt;td&amp;gt;&lt;br /&gt;
[[Image:EngineeringBuilding401Web.JPG]] [[Image:RoomEng1449Web.JPG]]&lt;br /&gt;
   &amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Conference Sponsors==&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;bottom&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;[http://www.auckland.ac.nz/ https://www.owasp.org/images/8/82/University_of_Auckland_crest_small.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;bottom&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;[http://www.security.org.nz/NZISF_NZISForumContent.php https://www.owasp.org/images/5/5a/Nz_information_security_forum.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;ICT and Department of Information Systems and Operations Management&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Gold Sponsors:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[[File:INSOMNIA.PNG|center|300px|link=http://www.insomniasec.com/]]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[[File:Aurainfosec300px.jpg|center|300px|link=http://www.aurainfosec.com/]]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com https://www.owasp.org/images/4/41/SA_Logo_w_DD.gif]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.insomniasec.com Insomnia Security]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.aurasoftwaresecurity.co.nz Aura Information Security]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com www.security-assessment.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Silver Sponsor:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[[File:Beca.png|center|200px|link=http://www.beca.com/]]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.beca.com/ www.beca.com/]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Support Sponsor:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[[File:BinaryMistLimited.png|center|200px|link=http://binarymist.net]]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://binarymist.net binarymist.net]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Conference Committee==&lt;br /&gt;
&lt;br /&gt;
* Denis Andzakovic - OWASP New Zealand Leader (Auckland)&lt;br /&gt;
* Adrian Hayes -  OWASP New Zealand Leader (Wellington)&lt;br /&gt;
* Kim Carter -  OWASP New Zealand Leader (Christchurch)&lt;br /&gt;
* Lech Janczewski - Associate Professor - University of Auckland School of Business&lt;br /&gt;
&lt;br /&gt;
Please direct all enquiries to denis.andzakovic@owasp.org | adrian.hayes@owasp.org | kim.carter@owasp.org&lt;br /&gt;
&lt;br /&gt;
= Call For Presentations =&lt;br /&gt;
==Call For Presentations==&lt;br /&gt;
&lt;br /&gt;
OWASP New Zealand Day conferences attract a high quality of speakers from a variety of security disciplines including&lt;br /&gt;
architects, web developers and engineers, system administrators, penetration testers, policy specialists and more.&lt;br /&gt;
We encourage presentations to have a strong component on fixing and prevention of security issues. We are looking for presentations on a wide variety of security topics,&lt;br /&gt;
including but not limited to:&lt;br /&gt;
&lt;br /&gt;
* Web application security&lt;br /&gt;
* Mobile security&lt;br /&gt;
* Secure development&lt;br /&gt;
* Vulnerability analysis&lt;br /&gt;
* Threat modelling&lt;br /&gt;
* Threat and vulnerability countermeasures&lt;br /&gt;
* Platform or language security (JavaScript, .NET, Java, RoR, etc)&lt;br /&gt;
* Penetration Testing&lt;br /&gt;
* Browser and client security&lt;br /&gt;
* Application and solution architecture security&lt;br /&gt;
* PCI DSS&lt;br /&gt;
* Risk management&lt;br /&gt;
* Security concepts for C*Os, project managers and other non-technical attendees&lt;br /&gt;
* Privacy controls&lt;br /&gt;
&lt;br /&gt;
The email subject must be &amp;quot;OWASP New Zealand 2015: CFP&amp;quot; and the email body must contain the following information/sections:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name and Surname&lt;br /&gt;
* Affiliation&lt;br /&gt;
* Telephone number&lt;br /&gt;
* Email address&lt;br /&gt;
* Short presenter bio&lt;br /&gt;
* Title of the contribution&lt;br /&gt;
* Type of contribution: Technical, Informative, Management&lt;br /&gt;
* Short abstract (up to 500 words)&lt;br /&gt;
* List of the author's previous papers/articles/speeches on the same/similar topic (if any)&lt;br /&gt;
* If you are not from New Zealand, will your company support your travel/accommodation costs? - Yes/No&lt;br /&gt;
&lt;br /&gt;
The submission will be reviewed by the OWASP New Zealand Day conference committee and the highest voted talks will be selected and invited for presentation.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
PLEASE NOTE:&lt;br /&gt;
&lt;br /&gt;
* Due to limited budget available, expenses for international speakers cannot be covered.&lt;br /&gt;
* If your company is willing to cover travel and accommodation costs, the company will become &amp;quot;Support Sponsor&amp;quot; of the event.&lt;br /&gt;
&lt;br /&gt;
Please submit the above information to all of the following: Denis Andzakovic (denis.andzakovic@owasp.org), Adrian Hayes (adrian.hayes@owasp.org) and Kim Carter (kim.carter@owasp.org).&lt;br /&gt;
&lt;br /&gt;
Submissions deadline: 19th January 2015&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Call For Trainers =&lt;br /&gt;
== Call For Trainers ==&lt;br /&gt;
&lt;br /&gt;
We are happy to announce that training will run on Thursday February 26th 2015, the day before the OWASP Day conference.&lt;br /&gt;
The training venues will be auditoriums kindly provided by the University of Auckland, in the same building as the OWASP Day conference itself.&lt;br /&gt;
Classes will contain up to 20 students, and each seat has power for laptop usage. A wide range of half-day or full-day training proposals will be considered,&lt;br /&gt;
see the Call for Papers for a list of example topics.&lt;br /&gt;
&lt;br /&gt;
If you are interested in running one of the training sessions, please contact Denis Andzakovic, Adrian Hayes and Kim Carter with the following information:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Trainer name&lt;br /&gt;
* Trainer organisation&lt;br /&gt;
* Telephone + email contact&lt;br /&gt;
* Short Trainer bio&lt;br /&gt;
* Training title&lt;br /&gt;
* Trainer requirements (e.g. a projector, whiteboard, etc)&lt;br /&gt;
* Trainee requirements (e.g. laptop, VMWare/Virtualbox, etc)&lt;br /&gt;
* Training summary (less than 500 words)&lt;br /&gt;
* Target audience (e.g. testers, project managers, security managers, web developers, architects)&lt;br /&gt;
* Skill level required (Basic / Intermediate / Advanced)&lt;br /&gt;
* What attendees can expect to learn (key objectives)&lt;br /&gt;
* Short course outline&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The fixed price per head for training will be $250 for a half-day session and $500 for a whole-day session. As this training is part of an OWASP event, part of the proceeds go back to OWASP. The split is as follows:&lt;br /&gt;
&lt;br /&gt;
* 25% to OWASP Global - used for OWASP projects around the world&lt;br /&gt;
* 25% to OWASP NZ Day - used for expenses such as catering during the conference&lt;br /&gt;
* 50% to the training provider.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Please submit the above information to all of the following:&lt;br /&gt;
* Denis Andzakovic (denis.andzakovic@owasp.org)&lt;br /&gt;
* Adrian Hayes (adrian.hayes@owasp.org)&lt;br /&gt;
* Kim Carter (kim.carter@owasp.org).&lt;br /&gt;
&lt;br /&gt;
Submissions deadline: 19th January 2015&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Call For Sponsorships =&lt;br /&gt;
==Call For Sponsorships==&lt;br /&gt;
&lt;br /&gt;
OWASP New Zealand Day 2015 will be held in Auckland on the 27th of February, 2015 and is a security conference entirely dedicated to application security.&lt;br /&gt;
The conference is once again being hosted by the University of Auckland with their support and assistance.&lt;br /&gt;
OWASP New Zealand Day 2015 is a free event, but requires sponsor support to help be an instructive and quality event for the New Zealand community.&lt;br /&gt;
OWASP is strictly not for profit. The sponsorship money will be used to help make OWASP New Zealand Day 2015 a free, compelling, and valuable experience for all attendees.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The sponsorship funds collected are to be used for things such as:&lt;br /&gt;
&lt;br /&gt;
* Refreshments (coffee break/lunch) - we want to keep people refreshed during the day; while we certainly bring good and interesting speakers, we don't want people to go home when they become hungry. &lt;br /&gt;
* Name tags - we feel that getting to know people within the New Zealand community is important, and name tags make that possible.&lt;br /&gt;
* Promotion - up to now our events are propagating by word of mouth. We would like to get to a wider audience by advertising our events.&lt;br /&gt;
* Printed Materials - printed materials will include brochures, tags and lanyards.&lt;br /&gt;
&lt;br /&gt;
== Facts ==&lt;br /&gt;
&lt;br /&gt;
In 2013, the event was supported by six sponsors and attracted more than 250 participants. Plenty of constructive (and positive!) feedback from the audience was received and we are using this to make the conference more appealing to more people. For more information on the last New Zealand Day event, please visit: https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2013&lt;br /&gt;
&lt;br /&gt;
The OWASP New Zealand community is strong, this year has Christchurch as a new region and there are more than 360 people currently subscribed to the mailing-list. OWASP New Zealand Day is expected to attract between 250 and 300 attendees this year.&lt;br /&gt;
&lt;br /&gt;
OWASP regular attendees are IT project managers, IT security managers, IT security consultants, web application architects and developers, QA managers, QA testers and system administrators.&lt;br /&gt;
&lt;br /&gt;
== Sponsorships  ==&lt;br /&gt;
&lt;br /&gt;
There are three different levels of sponsorships for the OWASP Day event:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Support Sponsorship&amp;lt;/b&amp;gt;: (Covering international speaker travel expenses, media coverage/article/promotion of the event)&lt;br /&gt;
   &lt;br /&gt;
Includes:&lt;br /&gt;
&lt;br /&gt;
* Publication of the sponsor logo on the event web site - https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2015&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Silver Sponsorship&amp;lt;/b&amp;gt;: 1500 NZD&lt;br /&gt;
&lt;br /&gt;
Includes: &lt;br /&gt;
&lt;br /&gt;
* Publication of the sponsor logo on the event web site - https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2015&lt;br /&gt;
* The publication of the sponsor logo on the event site, in the agenda, on the handouts and in all the official communications with the attendees at the conference.&lt;br /&gt;
* The possibility to distribute the company brochures, CDs or other materials to the participants during the event.&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Gold Sponsorship&amp;lt;/b&amp;gt;: 2750 NZD&lt;br /&gt;
&lt;br /&gt;
Includes: &lt;br /&gt;
&lt;br /&gt;
* The possibility to have a promotional banner or sign side stage in the main auditorium (to be provided by the sponsor, size subject to approval by the OWASP NZ Day Committee).&lt;br /&gt;
* The publication of the sponsor logo on the event site, in the agenda, on the handouts and in all the official communications with the attendees at the conference.&lt;br /&gt;
* The possibility to distribute the company brochures, CDs or other materials to the participants during the event.&lt;br /&gt;
* Publication of the sponsor logo on the OWASP New Zealand Chapter page - Sponsor logo on the OWASP NZ site prior and during the OWASP Day event - https://www.owasp.org/index.php/New_Zealand&lt;br /&gt;
* Publication of the sponsor logo on the event web site - https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2015&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Those who are interested in sponsoring OWASP New Zealand 2015 Conference can contact the [mailto:kim.carter@owasp.org?cc=adrian.hayes@owasp.org?cc=denis.andzakovic@owasp.org OWASP New Zealand Board].&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]]&lt;/div&gt;</summary>
		<author><name>Adrian Hayes</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_New_Zealand_Day_2015&amp;diff=187837</id>
		<title>OWASP New Zealand Day 2015</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_New_Zealand_Day_2015&amp;diff=187837"/>
				<updated>2015-01-12T00:34:48Z</updated>
		
		<summary type="html">&lt;p&gt;Adrian Hayes: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2015 https://www.owasp.org/images/9/94/New_Zealand_Day_2015_020.png]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''26th and 27th Feburary 2015 - Auckland'''&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
= Introduction =&lt;br /&gt;
==Introduction==&lt;br /&gt;
We are proud to announce the sixth OWASP New Zealand Day conference, to be held at the University of Auckland on Friday February 27th, 2015. OWASP New Zealand Day is a one-day conference dedicated to application security, with an emphasis on secure architecture and development techniques to help Kiwi developers build more secure applications.&lt;br /&gt;
&lt;br /&gt;
Similar to last year:&lt;br /&gt;
&lt;br /&gt;
* We will be offering training on the day before the conference (Thursday, 26th of February). &lt;br /&gt;
* After lunch on the conference day, we will split to two tracks - one focused on technical topics, the other on policy, compliance and risk management. &lt;br /&gt;
&lt;br /&gt;
The sixth OWASP New Zealand Day will be happening thanks to the support provided by the University of Auckland, which will kindly offer a slightly different location from the last five years. Entry to the event will, as in the past, be free.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For any comments, feedback or observations, please don't hesitate to contact [mailto:kim.carter@owasp.org?cc=adrian.hayes@owasp.org?cc=denis.andzakovic@owasp.org us].&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Registration==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Registration is not yet open. Please join our low volume [https://lists.owasp.org/mailman/listinfo/owasp-newzealand mailing list] to be notified when registration opens.&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Registration for the main conference day is now open: [https://registration.owasp.org.nz/ Conference Registration Here]&lt;br /&gt;
&lt;br /&gt;
There is no cost for the main conference day and lunch is provided. We do ask that if at any point you realise you cannot make it please cancel your registration to make room for others as spaces are limited.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Training Registration is now open: [http://www.regonline.com/owaspnzday2015trainingandsponsorship Training Registration]&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Registration is now closed.&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Important dates==&lt;br /&gt;
&lt;br /&gt;
* CFP &amp;amp; CFT submission deadline: 19th January 2015&lt;br /&gt;
* Conference Registration deadline: 12th February 2015&lt;br /&gt;
* Training Registration deadline:   12th February 2015&lt;br /&gt;
* Training Day date:          26th February 2015&lt;br /&gt;
* Conference Day date:           27th February 2015&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
For those of you booking flights, ensure you can be at the venue at 8:30am, the conference will end by 5:30pm however we will have post conference drinks at a local drinking establishment for those interested.&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Conference Venue==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
   &amp;lt;td&amp;gt;&lt;br /&gt;
The University of Auckland Engineering Department&amp;lt;br&amp;gt;&lt;br /&gt;
Engineering Building #401&amp;lt;br&amp;gt;&lt;br /&gt;
Room: Eng 1449&amp;lt;br&amp;gt;&lt;br /&gt;
Address: 20 Symonds Street&amp;lt;br&amp;gt;&lt;br /&gt;
Auckland&amp;lt;br&amp;gt;&lt;br /&gt;
New Zealand&amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.google.com/maps/place/Faculty+of+Engineering,+The+University+of+Auckland,+Auckland,+1010,+New+Zealand Map]&lt;br /&gt;
   &amp;lt;/td&amp;gt;&lt;br /&gt;
   &amp;lt;td&amp;gt;&lt;br /&gt;
[[Image:EngineeringBuilding401Web.JPG]] [[Image:RoomEng1449Web.JPG]]&lt;br /&gt;
   &amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Conference Sponsors==&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;bottom&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;[http://www.auckland.ac.nz/ https://www.owasp.org/images/8/82/University_of_Auckland_crest_small.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;bottom&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;[http://www.security.org.nz/NZISF_NZISForumContent.php https://www.owasp.org/images/5/5a/Nz_information_security_forum.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;ICT and Department of Information Systems and Operations Management&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Conference Committee==&lt;br /&gt;
&lt;br /&gt;
* Denis Andzakovic - OWASP New Zealand Leader (Auckland)&lt;br /&gt;
* Adrian Hayes -  OWASP New Zealand Leader (Wellington)&lt;br /&gt;
* Kim Carter -  OWASP New Zealand Leader (Christchurch)&lt;br /&gt;
* Lech Janczewski - Associate Professor - University of Auckland School of Business&lt;br /&gt;
&lt;br /&gt;
Please direct all enquiries to denis.andzakovic@owasp.org | adrian.hayes@owasp.org | kim.carter@owasp.org&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Call For Presentations =&lt;br /&gt;
==Call For Presentations==&lt;br /&gt;
&lt;br /&gt;
OWASP New Zealand Day conferences attract a high quality of speakers from a variety of security disciplines including&lt;br /&gt;
architects, web developers and engineers, system administrators, penetration testers, policy specialists and more.&lt;br /&gt;
We encourage presentations to have a strong component on fixing and prevention of security issues. We are looking for presentations on a wide variety of security topics,&lt;br /&gt;
including but not limited to:&lt;br /&gt;
&lt;br /&gt;
* Web application security&lt;br /&gt;
* Mobile security&lt;br /&gt;
* Secure development&lt;br /&gt;
* Vulnerability analysis&lt;br /&gt;
* Threat modelling&lt;br /&gt;
* Threat and vulnerability countermeasures&lt;br /&gt;
* Platform or language security (JavaScript, .NET, Java, RoR, etc)&lt;br /&gt;
* Penetration Testing&lt;br /&gt;
* Browser and client security&lt;br /&gt;
* Application and solution architecture security&lt;br /&gt;
* PCI DSS&lt;br /&gt;
* Risk management&lt;br /&gt;
* Security concepts for C*Os, project managers and other non-technical attendees&lt;br /&gt;
* Privacy controls&lt;br /&gt;
&lt;br /&gt;
The email subject must be &amp;quot;OWASP New Zealand 2015: CFP&amp;quot; and the email body must contain the following information/sections:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name and Surname&lt;br /&gt;
* Affiliation&lt;br /&gt;
* Telephone number&lt;br /&gt;
* Email address&lt;br /&gt;
* Short presenter bio&lt;br /&gt;
* Title of the contribution&lt;br /&gt;
* Type of contribution: Technical, Informative, Management&lt;br /&gt;
* Short abstract (up to 500 words)&lt;br /&gt;
* List of the author's previous papers/articles/speeches on the same/similar topic (if any)&lt;br /&gt;
* If you are not from New Zealand, will your company support your travel/accommodation costs? - Yes/No&lt;br /&gt;
&lt;br /&gt;
The submission will be reviewed by the OWASP New Zealand Day conference committee and the highest voted talks will be selected and invited for presentation.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
PLEASE NOTE:&lt;br /&gt;
&lt;br /&gt;
* Due to limited budget available, expenses for international speakers cannot be covered.&lt;br /&gt;
* If your company is willing to cover travel and accommodation costs, the company will become &amp;quot;Support Sponsor&amp;quot; of the event.&lt;br /&gt;
&lt;br /&gt;
Please submit the above information to all of the following: Denis Andzakovic (denis.andzakovic@owasp.org), Adrian Hayes (adrian.hayes@owasp.org) and Kim Carter (kim.carter@owasp.org).&lt;br /&gt;
&lt;br /&gt;
Submissions deadline: 19th January 2015&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Call For Trainers =&lt;br /&gt;
== Call For Trainers ==&lt;br /&gt;
&lt;br /&gt;
We are happy to announce that training will run on Thursday February 26th 2015, the day before the OWASP Day conference.&lt;br /&gt;
The training venues will be auditoriums kindly provided by the University of Auckland, in the same building as the OWASP Day conference itself.&lt;br /&gt;
Classes will contain up to 20 students, and each seat has power for laptop usage. A wide range of half-day or full-day training proposals will be considered,&lt;br /&gt;
see the Call for Papers for a list of example topics.&lt;br /&gt;
&lt;br /&gt;
If you are interested in running one of the training sessions, please contact Denis Andzakovic, Adrian Hayes and Kim Carter with the following information:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Trainer name&lt;br /&gt;
* Trainer organisation&lt;br /&gt;
* Telephone + email contact&lt;br /&gt;
* Short Trainer bio&lt;br /&gt;
* Training title&lt;br /&gt;
* Trainer requirements (e.g. a projector, whiteboard, etc)&lt;br /&gt;
* Trainee requirements (e.g. laptop, VMWare/Virtualbox, etc)&lt;br /&gt;
* Training summary (less than 500 words)&lt;br /&gt;
* Target audience (e.g. testers, project managers, security managers, web developers, architects)&lt;br /&gt;
* Skill level required (Basic / Intermediate / Advanced)&lt;br /&gt;
* What attendees can expect to learn (key objectives)&lt;br /&gt;
* Short course outline&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The fixed price per head for training will be $250 for a half-day session and $500 for a whole-day session. As this training is part of an OWASP event, part of the proceeds go back to OWASP. The split is as follows:&lt;br /&gt;
&lt;br /&gt;
* 25% to OWASP Global - used for OWASP projects around the world&lt;br /&gt;
* 25% to OWASP NZ Day - used for expenses such as catering during the conference&lt;br /&gt;
* 50% to the training provider.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Please submit the above information to all of the following:&lt;br /&gt;
* Denis Andzakovic (denis.andzakovic@owasp.org)&lt;br /&gt;
* Adrian Hayes (adrian.hayes@owasp.org)&lt;br /&gt;
* Kim Carter (kim.carter@owasp.org).&lt;br /&gt;
&lt;br /&gt;
Submissions deadline: 19th January 2015&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Call For Sponsorships =&lt;br /&gt;
==Call For Sponsorships==&lt;br /&gt;
&lt;br /&gt;
OWASP New Zealand Day 2015 will be held in Auckland on the 27th of February, 2015 and is a security conference entirely dedicated to application security.&lt;br /&gt;
The conference is once again being hosted by the University of Auckland with their support and assistance.&lt;br /&gt;
OWASP New Zealand Day 2015 is a free event, but requires sponsor support to help be an instructive and quality event for the New Zealand community.&lt;br /&gt;
OWASP is strictly not for profit. The sponsorship money will be used to help make OWASP New Zealand Day 2015 a free, compelling, and valuable experience for all attendees.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The sponsorship funds collected are to be used for things such as:&lt;br /&gt;
&lt;br /&gt;
* Refreshments (coffee break/lunch) - we want to keep people refreshed during the day; while we certainly bring good and interesting speakers, we don't want people to go home when they become hungry. &lt;br /&gt;
* Name tags - we feel that getting to know people within the New Zealand community is important, and name tags make that possible.&lt;br /&gt;
* Promotion - up to now our events are propagating by word of mouth. We would like to get to a wider audience by advertising our events.&lt;br /&gt;
* Printed Materials - printed materials will include brochures, tags and lanyards.&lt;br /&gt;
&lt;br /&gt;
== Facts ==&lt;br /&gt;
&lt;br /&gt;
In 2013, the event was supported by six sponsors and attracted more than 250 participants. Plenty of constructive (and positive!) feedback from the audience was received and we are using this to make the conference more appealing to more people. For more information on the last New Zealand Day event, please visit: https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2013&lt;br /&gt;
&lt;br /&gt;
The OWASP New Zealand community is strong, this year has Christchurch as a new region and there are more than 360 people currently subscribed to the mailing-list. OWASP New Zealand Day is expected to attract between 250 and 300 attendees this year.&lt;br /&gt;
&lt;br /&gt;
OWASP regular attendees are IT project managers, IT security managers, IT security consultants, web application architects and developers, QA managers, QA testers and system administrators.&lt;br /&gt;
&lt;br /&gt;
== Sponsorships  ==&lt;br /&gt;
&lt;br /&gt;
There are three different levels of sponsorships for the OWASP Day event:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Support Sponsorship&amp;lt;/b&amp;gt;: (Covering international speaker travel expenses, media coverage/article/promotion of the event)&lt;br /&gt;
   &lt;br /&gt;
Includes:&lt;br /&gt;
&lt;br /&gt;
* Publication of the sponsor logo on the event web site - https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2015&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Silver Sponsorship&amp;lt;/b&amp;gt;: 1500 NZD&lt;br /&gt;
&lt;br /&gt;
Includes: &lt;br /&gt;
&lt;br /&gt;
* Publication of the sponsor logo on the event web site - https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2015&lt;br /&gt;
* The publication of the sponsor logo on the event site, in the agenda, on the handouts and in all the official communications with the attendees at the conference.&lt;br /&gt;
* The possibility to distribute the company brochures, CDs or other materials to the participants during the event.&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Gold Sponsorship&amp;lt;/b&amp;gt;: 2750 NZD&lt;br /&gt;
&lt;br /&gt;
Includes: &lt;br /&gt;
&lt;br /&gt;
* The possibility to have a promotional banner or sign side stage in the main auditorium (to be provided by the sponsor, size subject to approval by the OWASP NZ Day Committee).&lt;br /&gt;
* The publication of the sponsor logo on the event site, in the agenda, on the handouts and in all the official communications with the attendees at the conference.&lt;br /&gt;
* The possibility to distribute the company brochures, CDs or other materials to the participants during the event.&lt;br /&gt;
* Publication of the sponsor logo on the OWASP New Zealand Chapter page - Sponsor logo on the OWASP NZ site prior and during the OWASP Day event - https://www.owasp.org/index.php/New_Zealand&lt;br /&gt;
* Publication of the sponsor logo on the event web site - https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2015&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Those who are interested in sponsoring OWASP New Zealand 2015 Conference can contact the [mailto:kim.carter@owasp.org?cc=adrian.hayes@owasp.org?cc=denis.andzakovic@owasp.org OWASP New Zealand Board].&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]]&lt;/div&gt;</summary>
		<author><name>Adrian Hayes</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_New_Zealand_Day_2013&amp;diff=158137</id>
		<title>OWASP New Zealand Day 2013</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_New_Zealand_Day_2013&amp;diff=158137"/>
				<updated>2013-09-09T20:48:37Z</updated>
		
		<summary type="html">&lt;p&gt;Adrian Hayes: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2013 https://www.owasp.org/images/3/3e/OWASP_NZ_Day_2013_logo.png]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''11th and 12th September 2013 - Auckland'''&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
= Introduction =&lt;br /&gt;
==Introduction==&lt;br /&gt;
We are proud to announce the fifth annual OWASP New Zealand Day conference, to be held at the University of Auckland on Thursday September 12th, 2013. OWASP New Zealand Day is a one-day conference dedicated to application security, with an emphasis on secure development techniques to help Kiwi developers build more secure applications.&lt;br /&gt;
&lt;br /&gt;
Similar to last year:&lt;br /&gt;
&lt;br /&gt;
* We will be offering training on the day before the conference (Wednesday, 11th of September). &lt;br /&gt;
* After lunch on the conference day, we will split to two tracks - one focused on deep technical topics, the other on policy, compliance and risk management. &lt;br /&gt;
&lt;br /&gt;
The fifth OWASP New Zealand Day will be happening thanks to the support provided by the University of Auckland School of Business, which will kindly offer the same conference venue of the last four years. Entry to the event will, as in the past, be free. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For any comments, feedback or observations, please don't hesitate to contact [mailto:nick.freeman@owasp.org?cc=adrian.hayes@owasp.org us].&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Registration==&lt;br /&gt;
&lt;br /&gt;
Registration is now closed.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Registration for the main conference day is now open: [https://registration.owasp.org.nz/ Conference Registration Here]&lt;br /&gt;
&lt;br /&gt;
There is no cost for the main conference day and lunch is provided. We do ask that if at any point you realise you cannot make it please cancel your registration to make room for others as spaces are limited.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Training Registration is now open: [http://www.regonline.com/owaspnzday2013trainingandsponsorship Training Registration]&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Important dates==&lt;br /&gt;
&lt;br /&gt;
* CFP &amp;amp; CFT submission deadline:	1st August 2013&lt;br /&gt;
* Conference Registration deadline: 30th August 2013&lt;br /&gt;
* Training Registration deadline: 	30th August 2013&lt;br /&gt;
* Training Day date:				11th September 2013&lt;br /&gt;
* Conference Day date:				12th September 2013&lt;br /&gt;
&lt;br /&gt;
For those of you booking flights, ensure you can be at the venue at 8:30am, the conference will end by 5:30pm however we will have post conference drinks at a local drinking establishment for those interested.&lt;br /&gt;
&lt;br /&gt;
==Conference Venue==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
	&amp;lt;td&amp;gt;&lt;br /&gt;
		The University of Auckland Business School&amp;lt;br&amp;gt;&lt;br /&gt;
		Owen G Glenn Building&amp;lt;br&amp;gt;&lt;br /&gt;
		Room: OGGB 260-073 (OGGB4)&amp;lt;br&amp;gt;&lt;br /&gt;
		Address: 12 Grafton Road&amp;lt;br&amp;gt;&lt;br /&gt;
		Auckland&amp;lt;br&amp;gt;&lt;br /&gt;
		New Zealand&amp;lt;br&amp;gt;&lt;br /&gt;
		[http://maps.google.com/maps?oe=UTF-8&amp;amp;ie=UTF8&amp;amp;q=auckland+business+school&amp;amp;fb=1&amp;amp;split=1&amp;amp;cid=0,0,12303692579639430581&amp;amp;ei=6WeqSZr_OZLFkAWR--zbDQ&amp;amp;ll=-36.852308,174.770916&amp;amp;spn=0.01056,0.020621&amp;amp;z=16&amp;amp;iwloc=A Map]&lt;br /&gt;
	&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;td&amp;gt;&lt;br /&gt;
		[[Image:Auckland_business_school_small2.jpg]] [[Image:Room_hall.jpg]]&lt;br /&gt;
	&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Conference Sponsors==&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;bottom&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;[http://www.auckland.ac.nz/ https://www.owasp.org/images/8/82/University_of_Auckland_crest_small.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;bottom&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;[http://www.security.org.nz/NZISF_NZISForumContent.php https://www.owasp.org/images/5/5a/Nz_information_security_forum.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;ICT and Department of Information Systems and Operations Management&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Gold Sponsors:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com https://www.owasp.org/images/4/41/SA_Logo_w_DD.gif]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[[File:INSOMNIA.PNG|center|350px|link=http://www.insomniasec.com/]]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com www.security-assessment.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.insomniasec.com Insomnia Security]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Silver Sponsors:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[[File:Qualys logo small.png|center|200px|link=]]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[https://www.qualys.com/ www.qualys.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[[File:Orionhealth_logo_small.png|center|200px|link=]]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.orionhealth.com/ www.orionhealth.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Conference Committee==&lt;br /&gt;
&lt;br /&gt;
* Nick Freeman - OWASP New Zealand Leader (Auckland)&lt;br /&gt;
* Adrian Hayes -  OWASP New Zealand Leader (Wellington)&lt;br /&gt;
* Lech Janczewski - Associate Professor - University of Auckland School of Business&lt;br /&gt;
&lt;br /&gt;
Please direct all enquiries to nick.freeman@owasp.org and adrian.hayes@owasp.org.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Presentation Schedule =&lt;br /&gt;
==Presentation Schedule==&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
12th September 2013&lt;br /&gt;
&amp;lt;table width=&amp;quot;80%&amp;quot;&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;08:30&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #8595C2&amp;quot;&amp;gt;Registration&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;09:00&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Welcome to OWASP New Zealand Day 2013&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Nick Freeman and Adrian Hayes (OWASP Leaders)&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;09:10&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #B9C2DC; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Securing the Web Without Site-Specific Passwords&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Francois Marier - Mozilla&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;09:50&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;What's Our Software Doing With All That User Input&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Kim Carter - BinaryMist&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;10:30&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #D98B66; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Break for Morning Tea&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;11:00&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Bug Chaining (aka, why XSS can be worse than you think) &amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Hugh Davenport - Aura RedEye Security&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;11:30&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #B9C2DC; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;OWASP Top 10 Mobile Risks - An Introduction By Case Study&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Mark Piper - Insomnia Security&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;12:30&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #D98B66; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Break for Lunch&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;13:30&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Improving XPath Injection with Binary Search Optimizations&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Paul Haas - Security-Assessment.com&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Nothing to See Here!&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Andrew Kelly&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;14:15&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #B9C2DC; ; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Bad Smells That Lead to Bad Security&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Kirk Jackson - Xero and Andy Prow - Aura&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;background-color: #B9C2DC; ; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Evolution of threats and the skills in your security team&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Hinne Hettema - University of Auckland&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;14:45&amp;lt;/td&amp;gt;&lt;br /&gt;
&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Security Vulnerability Disclosure&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Nick von Dadelszen - Lateral Security&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;15:00&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Serialization formats aren't toys&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Tom Eastman  - Catalyst IT&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;15:30&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #D98B66; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Break for Afternoon Tea&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;16:00&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Discussion Panel&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;An open discussion with our speakers on current security topics&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;16:30&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #B9C2DC; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Wrap Up&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Time for the pub, for those interested&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;	&lt;br /&gt;
	&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Speakers List=&lt;br /&gt;
==Speakers List==&lt;br /&gt;
&lt;br /&gt;
===Tom Eastman  - Catalyst IT - Serialization Formats Aren't Toys===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Do you have an API? Do you accept input from users? Do you accept it in XML? What about YAML? Or maybe JSON? How safe are you? How sure are you? It's not in the OWASP Top 10, but you don't have to look far to hear stories of security vulnerabilities involving deserialization user inputs. Why do they keep happening?&lt;br /&gt;
&lt;br /&gt;
In this talk I'll go over what the threat is, how you might be making yourself vulnerable and how to mitigate the problem. I'll cover the features (not bugs, features) of formats like XML, YAML, and JSON that make them surprisingly dangerous, and how to protect your code from them.&lt;br /&gt;
&lt;br /&gt;
Because here's the thing: If you are using, say, a compliant, properly implemented XML parser to parse your XML, you are NOT safe. Possibly quite the opposite. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Tom is a senior Python developer and technical lead for Catalyst IT, New Zealand's largest company specialising in open source. Prior to that he worked as a developer and system administrator for the University of Otago Faculty of Medicine and as a Computer Science tutor for same.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Paul Haas - Security-Assessment.com -  Improving XPath Injection with Binary Search Optimisations===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
XPath injection is technique similar to SQL injection for attacking XML processors, however many people are unaware of the technique and exploitation vectors. This talk aims to expand awareness of both the risks and remediation path in addition to the introduction of a new technique to significantly improve reconstruction speed of the backend XML document. A brief primer to XPath injection will also be covered within the talk.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Paul Haas hails from California where the waves are better but the quakes are not. With over nine years of experience in professional hacking, he is currently working with Security-Assessment.com in Wellington to bring the good word of web hacks to Kiwis everywhere. His sole hobby is driving people into Mario Kart's abyss.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Nick von Dadelszen - Lateral Security - Security Vulnerability Disclosure===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Disclosing security vulnerabilities can be a dangerous business. While there are systems in place for handling disclosures to most major software companies, the process for disclosing vulnerabilities to local organisations is a lot less discussed.&lt;br /&gt;
&lt;br /&gt;
As the discloser, there is always the chance that you are accused of hacking and get a visit from the police merely for identifying an issue. As an organisation, you can find yourself on the front page of the news when someone goes public with an issue.&lt;br /&gt;
&lt;br /&gt;
This talk outlines the dilemmas faced when stumbling across that SQL injection in the local shopping site and proposes mechanisms to safely get the right people told about it. It also discusses how organisations can make it more likely that security vulnerabilities are reported to them directly, rather than through the press.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Nick von Dadelszen is the technical director at Lateral Security. Nick has been performing professional penetration testing for over 12 years and has managed several successful penetration testing teams. He has worked with the majority of large corporates and Government agencies in New Zealand and is a regular presenter at OWASP and Kiwicon conferences.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Mark Piper - Insomnia Security - OWASP Top 10 Mobile Risks - An Introduction By Case Study===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
As mobile application usage explodes, so does the associated application&lt;br /&gt;
security issues. The OWASP Mobile Security Project includes an&lt;br /&gt;
initiative to categorise and rate these issues into a top 10 format.&lt;br /&gt;
This list is known as the Top 10 Mobile Risks.&lt;br /&gt;
&lt;br /&gt;
During the session, we will introduce the current (RC1) Top 10 supported&lt;br /&gt;
with several real world case studies of issues.  We will cover how the&lt;br /&gt;
issues were identified, how they may be exploited by attackers and what&lt;br /&gt;
mitigation's could be implemented to resolve the issues in the future.&lt;br /&gt;
While the issues will be largely platform agnostic, the examples will&lt;br /&gt;
cover both iOS and Android environments.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Mark is a Principal Security Consultant with the Insomnia Security&lt;br /&gt;
team. Mark spends his days auditing software, running penetration&lt;br /&gt;
testing and red team engagements while working with global customers on&lt;br /&gt;
developing new testing services.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Kirk Jackson and Andy Prow - Xero and Aura Security - Bad Smells That Lead to Bad Security===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Your job as a defender is to reduce the attack surface of your web application and protect your infrastructure and data from being breached. However we can't be involved in every decision that goes on in our organisation, and we don't always think the same as an attacker does. This talk will introduce you to some common &amp;quot;bad smells&amp;quot; that might indicate security issues lurking under the surface of your code, and help you develop your spidey sense so that you know when to raise the alarm.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Kirk is the Security Officer at Xero, and is interested in writing and defending secure web applications.&lt;br /&gt;
&lt;br /&gt;
Andy Prow is an IT Security Consultant, Trainer and software developer who founded Aura back in 2001. With 19 years in the IT industry Andy has developed code for IBM, Vodafone, Telecom and Microsoft. Andy presents around the world at conferences including Microsoft's TechEd.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Kim Carter - BinaryMist - What's Our Software Doing With All That User Input===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
What are we doing with all the characters that get shoved into our applications? Have we considered every potential execution context?&lt;br /&gt;
It's often interesting and surprising to see what sort of concoction of characters can be executed in different places... and linking multiple attack vectors together which the builders haven't thought about.&lt;br /&gt;
What are we trusting? Why are we trusting it? What, where and how should we be sanitising?&lt;br /&gt;
&lt;br /&gt;
We have a vast collection of libraries, techniques, cheat sheets, tutorials, guides and tools at our disposal.&lt;br /&gt;
I often find myself thinking... how can we commoditise the sanitisation of user input and I keep coming up with the same answer.&lt;br /&gt;
It's not easy. Every application has a completely different set of concerns.&lt;br /&gt;
&lt;br /&gt;
In order for our software to be shielded from an attack, the builders must think like attackers.&lt;br /&gt;
&lt;br /&gt;
In this talk I'll attempt to:&lt;br /&gt;
&lt;br /&gt;
* Increase our knowledge and awareness&lt;br /&gt;
* Discuss practical techniques and approaches that increase our defences&lt;br /&gt;
* Break some software&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Kim Carter is a Software Engineer, Architect, Entrepreneur and the founder of BinaryMist. He is passionate about and enjoys many things. Some of which include:&lt;br /&gt;
* Designing and creating robust software and networks.&lt;br /&gt;
* Breaking his and others software and networks, then fixing it/them.&lt;br /&gt;
* Teaching, training, mentoring, motivating, listening to and being around smart people.&lt;br /&gt;
* Increasing quality awareness and helping people and organisations implement higher quality in a cost effective manner.&lt;br /&gt;
* Improving operational efficiencies.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Hugh Davenport - Aura RedEye Security - Bug Chaining (aka, why XSS can be worse than you think) ===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Security bugs can range in damage from small stuff, all the way to big stuff. Some people only focus on the large stuff, and the smaller stuff can go unnoticed. This talk will give a real world example of a project that had a small bug, that allowed a larger bug to happen, which allowed a larger bug, which allowed for unwanted shell access. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Hugh works at Aura RedEye Security on their managed vulnerability scanning service. In his spare time, he is the security point of contact on the Mahara open source tool and contributes to many other open source projects. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Hinne Hettema - University of Auckland - Evolution of Threats and the Skills in our Security Team===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The threat landscape for security threats is constantly evolving, with new threats being stealthier, more diverse, and increasingly aimed at bypassing the protection offered by antivirus and network intrusion detection systems. Adversaries are now often part of a semi-organised underground economy geared towards the acquisition and sale of digital assets such as usernames, passwords, confidential business information, financial data and designs. There are specific value chains in this economy, which make the acquisition, sale and utilisation of such assets a relatively easy process.&lt;br /&gt;
&lt;br /&gt;
This talk focuses on the skills needed in a security team to deal with this next level of threat, and on the sort of teams that we need in enterprise security to address the modern threats that we face.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Hinne Hettema is the team leader of the IT security team at The University of Auckland, an honorary research fellow in the Department of Philosophy at The University of Auckland, and lectures in cyber security at Unitec. He has 10 years experience in security consulting and has a PhD in Philosophy (2012) and theoretical chemistry (1993).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Francois Marier - Mozilla - Securing the Web Without Site-Specific Passwords===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Has anyone else noticed that the OWASP Top 10 is not changing very much?&lt;br /&gt;
Especially in the realm of authentication-related problems. I don't&lt;br /&gt;
claim to have the one true solution for this, but one thing is certain:&lt;br /&gt;
if we change how things are done on the web and relieve developers from&lt;br /&gt;
having to store passwords, we can make things better.&lt;br /&gt;
&lt;br /&gt;
We need to let web developers outsource their authentication needs to&lt;br /&gt;
people who can do it well. Does that mean we should force all of our&lt;br /&gt;
users to join Facebook? Well not really. That might work for some sites,&lt;br /&gt;
but outsourcing all of our logins to a single for-profit company isn't a&lt;br /&gt;
solution that works for the whole web.&lt;br /&gt;
&lt;br /&gt;
The open web needs a better solution. One that enable users to choose&lt;br /&gt;
their identity provider and shop for the most secure one if that's what&lt;br /&gt;
they're into. This is the promise behind Persona and the BrowserID&lt;br /&gt;
protocol. Choose your email provider carefully and let's get rid of all&lt;br /&gt;
of these site-specific passwords that are just sitting there waiting to&lt;br /&gt;
be leaked and cracked.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Francois is a software engineer and security champion on the Mozilla Identity team where he works on decentralising authentication on the web. A long time Debian developer, Francois has been involved in Open Source and web development for a while and has always had a strong interest in security.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Andrew Kelly - Nothing to See Here!===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This is how it starts: &amp;quot;Seeking an exciting new challenge? Want to be responsible for building and shaping an embryonic information security function? Then you so won't want to miss this golden opportunity!&amp;quot; Andrew will talk about the setting up of an information security function in an organisation from scratch ('Greenfield') - as opposed to trying to bed yourself down into an already-existing organisation ('Brownfield'). He'll talk about the pros and the cons, and the many ups and downs. And hopefully he'll answer some questions like: Is there, if fact, any such thing as a greenfield security opportunity left in the wild? And ... if such mythical beasties do exist ... are they worth signing on for? Andrew will discuss the pitfalls and pratfalls of the journey from initial engagement, through (maybe) acceptance, until (perhaps) security sign-off and (hopefully) go-live. He'll also discuss both the Pit Bulls and prats you're likely to meet along the way. So ... if you want to hear a guy speak who reckons he's forgotten more than he ever thought he knew? Then this is so the talk for you!&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Andrew is a whole year older than he was when he presented at last year's OWASP Day: So this time around he's bringing a quarter century's worth of IT security experience to OWASP! Now 25 years ago, he was this mainframe security uber-tech - but today Andrew's recognised as being a 'pragmatic' subject-matter expert on corporate-level information security policy, compliance, frameworks and governance. His first greenfield security 'opportunity' came in November 1989 at the Sun Life Assurance Company of Canada, in the UK. And during those intervening 24 years, he's had similar experiences at various other companies including the likes of Lloyds/TSB Bank, Fonterra, BT Syntegra, Telecom/Gen-i and, lately, Health Benefits Ltd. - amongst many others.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
= Call For Presentations =&lt;br /&gt;
==Call For Presentations==&lt;br /&gt;
&lt;br /&gt;
OWASP New Zealand Day conferences attract a high quality of speakers from a variety of security disciplines including web developers, system administrators, penetration testers, policy specialists and more. We encourage presentations to have a strong component on fixing and prevention of security issues. We are looking for presentations on a wide variety of security topics, including but not limited to:&lt;br /&gt;
&lt;br /&gt;
* Web application security&lt;br /&gt;
* Mobile security&lt;br /&gt;
* Secure development&lt;br /&gt;
* Vulnerability analysis&lt;br /&gt;
* Threat modelling&lt;br /&gt;
* Threat and vulnerability countermeasures&lt;br /&gt;
* Platform or language security (.NET, Java, RoR, etc)&lt;br /&gt;
* Penetration Testing&lt;br /&gt;
* Browser and client security&lt;br /&gt;
* Application and solution architecture security&lt;br /&gt;
* PCI DSS&lt;br /&gt;
* Risk management&lt;br /&gt;
* Security concepts for C*Os, project managers and other non-technical attendees&lt;br /&gt;
* Privacy controls&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The email subject must be &amp;quot;OWASP New Zealand 2013: CFP&amp;quot; and the email body must contains the following information/sections:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name and Surname&lt;br /&gt;
* Affiliation&lt;br /&gt;
* Telephone number&lt;br /&gt;
* Email address&lt;br /&gt;
* Short presenter bio&lt;br /&gt;
* Title of the contribution&lt;br /&gt;
* Type of contribution: Technical, Informative, Management&lt;br /&gt;
* Short abstract (up to 500 words)&lt;br /&gt;
* List of the author's previous papers/articles/speeches on the same topic&lt;br /&gt;
* If you are not from New Zealand, will your company support your travel/accommodation costs? - Yes/No&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The submission will be reviewed by the OWASP New Zealand Day CFP Review Board and the highest voted talks will be selected and invited for presentation.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
PLEASE NOTE:&lt;br /&gt;
* Due to limited budget available, expenses for international speakers cannot be covered.&lt;br /&gt;
* If your company is willing to cover travel and accommodation costs, the company will become &amp;quot;Support Sponsor&amp;quot; of the event.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Please submit the above information to both Nick Freeman and Adrian Hayes - nick.freeman@owasp.org and adrian.hayes@owasp.org&lt;br /&gt;
&lt;br /&gt;
Submissions deadline: 1st August 2013&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Training =&lt;br /&gt;
==Training Events==&lt;br /&gt;
&lt;br /&gt;
We are happy to announce that training will run on Wednesday September 11th 2013, the day before the OWASP Day conference. Both courses will be running from '''9:00 AM sharp''' to '''5:00PM'''.The training venues will be auditoriums kindly provided by the University of Auckland, in the same building as the OWASP Day conference itself. Classes will contain up to 20 students, and each seat has power for laptop usage. Both courses will be run by Aura Information Security, and there is both a basic and advanced course available. Feedback from previous training has been very positive - so get in quick! Details are as follows:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Basic Web Application Security ===&lt;br /&gt;
These days websites are under constant attack and it's incredibly easy for a developer or administrator to make seemingly minor mistakes that introduce security vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
You can't fight a war that you don't know you're waging. You can't defend your websites against attack unless you know the tricks the attackers are using to infiltrate. By the end of this workshop you'll have a good understanding of the OWASP Top 10 including:&lt;br /&gt;
&lt;br /&gt;
* Cross-Site Scripting (XSS)&lt;br /&gt;
* Cross-Site Request Forgery (CSRF)&lt;br /&gt;
* SQL Injection&lt;br /&gt;
* Man-In-the-Middle attacks&lt;br /&gt;
* Layering your defenses (defense-in-depth) that can help protect you from exploit chaining.&lt;br /&gt;
&lt;br /&gt;
More importantly, however, you'll also learn how to minimise the risk from these and other attacks, with practical tips that you can apply straight away to help you design, build and manage more secure websites. This workshop is essential for:&lt;br /&gt;
&lt;br /&gt;
* All developers and designers working on web applications but without formal training in security&lt;br /&gt;
* Anyone working in the website / web application space&lt;br /&gt;
* IT Professionals interested in security issues&lt;br /&gt;
&lt;br /&gt;
This is a hands on workshop where attendees must bring their own laptops. It is required that users are local admins or root on their own machines.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Advanced Web Application Security ===&lt;br /&gt;
This advanced web security course is for senior or experienced developers who are looking for a deeper understanding of web security, beyond the OWASP Top 10. By the end of this workshop you'll have a good understanding of:&lt;br /&gt;
&lt;br /&gt;
==== Advanced Attacks ====&lt;br /&gt;
&lt;br /&gt;
We will run through more complex attacks against web-apps using layered attacks requiring a multi-step defense including&lt;br /&gt;
&lt;br /&gt;
* Malicious file uploads and web shells &lt;br /&gt;
* XXS shells&lt;br /&gt;
* Padding oracle attacks &lt;br /&gt;
* XXE injection attacks &lt;br /&gt;
* Serialisation and file include attacks&lt;br /&gt;
* Timing attacks&lt;br /&gt;
* Cryptography&lt;br /&gt;
&lt;br /&gt;
Where, when and how to use it effectively and securely.&lt;br /&gt;
&lt;br /&gt;
==== Advanced Design and Defense ====&lt;br /&gt;
&lt;br /&gt;
* How to secure systems against malicious users and admins.&lt;br /&gt;
* How to secure data at rest such as credit cards, banking data or other high value data.&lt;br /&gt;
* Tools&lt;br /&gt;
&lt;br /&gt;
We will also introduce some of the tools and techniques you should use to test the security of your own systems&lt;br /&gt;
This is a hands on workshop where attendees must bring their own laptops. It is required that users are local admins or root on their own machines.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For further information, please contact us at the follow email addresses:&lt;br /&gt;
&lt;br /&gt;
* nick.freeman@owasp.org&lt;br /&gt;
* adrian.hayes@owasp.org&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
&lt;br /&gt;
= Call For Sponsorships =&lt;br /&gt;
==Call For Sponsorships==&lt;br /&gt;
&lt;br /&gt;
OWASP New Zealand Day 2013 will be held in Auckland on the 12th of September, 2013 and is a security conference entirely dedicated to application security. The conference is once again being hosted by the University of Auckland with their support and assistance. OWASP New Zealand Day 2013 is a free event, but requires sponsor support to help be an instructive and quality event for the New Zealand community. OWASP is strictly non for profit. The sponsorship money will be used to help make OWASP New Zealand Day 2013 a free, compelling, and valuable experience for the audience.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The sponsorship funds collected are to be used for things such as:&lt;br /&gt;
&lt;br /&gt;
* Refreshments (coffee break/lunch) - we want to keep people refreshed during the day; while we certainly bring good and interesting speakers, we don't want people to go home when they become hungry. &lt;br /&gt;
* Name tags - we feel that getting to know people within the New Zealand community is important, and name tags make that possible.&lt;br /&gt;
* Promotion - up to now our events are propagating by word of mouth. We would like to get to a wider audience by advertising our events.&lt;br /&gt;
* Printed Materials - printed materials will include brochures, tags and lanyards.&lt;br /&gt;
&lt;br /&gt;
== Facts ==&lt;br /&gt;
&lt;br /&gt;
Last year, the event was supported by seven sponsors and attracted more than 250 participants. Plenty of constructive (and positive!) feedback from the audience was received and we are using this to make the conference more appealing to more people. For more information on last year's event, please visit: https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2012&lt;br /&gt;
&lt;br /&gt;
The OWASP New Zealand community is strong and there are more than 220 people currently subscribed to the mailing-list. OWASP New Zealand Day is expected to attract between 250 and 300 attendees this year.&lt;br /&gt;
&lt;br /&gt;
OWASP regular attendees are IT project managers, IT security managers, IT security consultants, web application architects and developers, QA managers, QA testers and system administrators.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Sponsorships  ==&lt;br /&gt;
&lt;br /&gt;
There are three different levels of sponsorships for the OWASP Day event:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Support Sponsorship&amp;lt;/b&amp;gt;: (Covering international speaker travel expenses, media coverage/article/promotion of the event)&lt;br /&gt;
	&lt;br /&gt;
Includes:&lt;br /&gt;
&lt;br /&gt;
* Publication of the sponsor logo on the event web site - https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2013&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Silver Sponsorship&amp;lt;/b&amp;gt;: 1500 NZD&lt;br /&gt;
&lt;br /&gt;
Includes: &lt;br /&gt;
&lt;br /&gt;
* Publication of the sponsor logo on the event web site - https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2013&lt;br /&gt;
* The publication of the sponsor logo in the event site, in the agenda, on the handouts and in all the official communications with the attendees at the conference.&lt;br /&gt;
* The possibility to distribute the company brochures, CDs or other materials to the participants during the event.&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Gold Sponsorship&amp;lt;/b&amp;gt;: 2750 NZD&lt;br /&gt;
&lt;br /&gt;
Includes: &lt;br /&gt;
&lt;br /&gt;
* The possibility to have a promotional banner or sign side stage in the main auditorium (to be provided by the sponsor, size subject to approval by the OWASP NZ Day Committee).&lt;br /&gt;
* The publication of the sponsor logo in the event site, in the agenda, on the handouts and in all the official communications with the attendees at the conference.&lt;br /&gt;
* The possibility to distribute the company brochures, CDs or other materials to the participants during the event.&lt;br /&gt;
* Publication of the sponsor logo on the OWASP New Zealand Chapter page	- Sponsor logo on the OWASP NZ site prior and during the OWASP Day event - https://www.owasp.org/index.php/New_Zealand&lt;br /&gt;
* Publication of the sponsor logo on the event web site - https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2013&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Those who are interested in sponsoring OWASP New Zealand 2013 Conference can contact the [mailto:nick.freeman@owasp.org?cc=adrian.hayes@owasp.org OWASP New Zealand Board].&amp;lt;br&amp;gt;&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]]&lt;/div&gt;</summary>
		<author><name>Adrian Hayes</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_New_Zealand_Day_2013&amp;diff=157799</id>
		<title>OWASP New Zealand Day 2013</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_New_Zealand_Day_2013&amp;diff=157799"/>
				<updated>2013-09-04T01:57:00Z</updated>
		
		<summary type="html">&lt;p&gt;Adrian Hayes: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2013 https://www.owasp.org/images/3/3e/OWASP_NZ_Day_2013_logo.png]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''11th and 12th September 2013 - Auckland'''&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
= Introduction =&lt;br /&gt;
==Introduction==&lt;br /&gt;
We are proud to announce the fifth annual OWASP New Zealand Day conference, to be held at the University of Auckland on Thursday September 12th, 2013. OWASP New Zealand Day is a one-day conference dedicated to application security, with an emphasis on secure development techniques to help Kiwi developers build more secure applications.&lt;br /&gt;
&lt;br /&gt;
Similar to last year:&lt;br /&gt;
&lt;br /&gt;
* We will be offering training on the day before the conference (Wednesday, 11th of September). &lt;br /&gt;
* After lunch on the conference day, we will split to two tracks - one focused on deep technical topics, the other on policy, compliance and risk management. &lt;br /&gt;
&lt;br /&gt;
The fifth OWASP New Zealand Day will be happening thanks to the support provided by the University of Auckland School of Business, which will kindly offer the same conference venue of the last four years. Entry to the event will, as in the past, be free. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For any comments, feedback or observations, please don't hesitate to contact [mailto:nick.freeman@owasp.org?cc=adrian.hayes@owasp.org us].&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Registration==&lt;br /&gt;
&lt;br /&gt;
Registration is now closed.&lt;br /&gt;
&lt;br /&gt;
We may be able to accept some limited last minute registrations. For this please contact adrian.hayes@owasp.org and nick.freeman@owasp.org&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Registration for the main conference day is now open: [https://registration.owasp.org.nz/ Conference Registration Here]&lt;br /&gt;
&lt;br /&gt;
There is no cost for the main conference day and lunch is provided. We do ask that if at any point you realise you cannot make it please cancel your registration to make room for others as spaces are limited.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Training Registration is now open: [http://www.regonline.com/owaspnzday2013trainingandsponsorship Training Registration]&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Important dates==&lt;br /&gt;
&lt;br /&gt;
* CFP &amp;amp; CFT submission deadline:	1st August 2013&lt;br /&gt;
* Conference Registration deadline: 30th August 2013&lt;br /&gt;
* Training Registration deadline: 	30th August 2013&lt;br /&gt;
* Training Day date:				11th September 2013&lt;br /&gt;
* Conference Day date:				12th September 2013&lt;br /&gt;
&lt;br /&gt;
For those of you booking flights, ensure you can be at the venue at 8:30am, the conference will end by 5:30pm however we will have post conference drinks at a local drinking establishment for those interested.&lt;br /&gt;
&lt;br /&gt;
==Conference Venue==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
	&amp;lt;td&amp;gt;&lt;br /&gt;
		The University of Auckland Business School&amp;lt;br&amp;gt;&lt;br /&gt;
		Owen G Glenn Building&amp;lt;br&amp;gt;&lt;br /&gt;
		Room: OGGB 260-073 (OGGB4)&amp;lt;br&amp;gt;&lt;br /&gt;
		Address: 12 Grafton Road&amp;lt;br&amp;gt;&lt;br /&gt;
		Auckland&amp;lt;br&amp;gt;&lt;br /&gt;
		New Zealand&amp;lt;br&amp;gt;&lt;br /&gt;
		[http://maps.google.com/maps?oe=UTF-8&amp;amp;ie=UTF8&amp;amp;q=auckland+business+school&amp;amp;fb=1&amp;amp;split=1&amp;amp;cid=0,0,12303692579639430581&amp;amp;ei=6WeqSZr_OZLFkAWR--zbDQ&amp;amp;ll=-36.852308,174.770916&amp;amp;spn=0.01056,0.020621&amp;amp;z=16&amp;amp;iwloc=A Map]&lt;br /&gt;
	&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;td&amp;gt;&lt;br /&gt;
		[[Image:Auckland_business_school_small2.jpg]] [[Image:Room_hall.jpg]]&lt;br /&gt;
	&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Conference Sponsors==&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;bottom&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;[http://www.auckland.ac.nz/ https://www.owasp.org/images/8/82/University_of_Auckland_crest_small.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;bottom&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;[http://www.security.org.nz/NZISF_NZISForumContent.php https://www.owasp.org/images/5/5a/Nz_information_security_forum.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;ICT and Department of Information Systems and Operations Management&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Gold Sponsors:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com https://www.owasp.org/images/4/41/SA_Logo_w_DD.gif]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[[File:INSOMNIA.PNG|center|350px|link=http://www.insomniasec.com/]]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com www.security-assessment.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.insomniasec.com Insomnia Security]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Silver Sponsors:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[[File:Qualys logo small.png|center|200px|link=]]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[https://www.qualys.com/ www.qualys.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[[File:Orionhealth_logo_small.png|center|200px|link=]]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.orionhealth.com/ www.orionhealth.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Conference Committee==&lt;br /&gt;
&lt;br /&gt;
* Nick Freeman - OWASP New Zealand Leader (Auckland)&lt;br /&gt;
* Adrian Hayes -  OWASP New Zealand Leader (Wellington)&lt;br /&gt;
* Lech Janczewski - Associate Professor - University of Auckland School of Business&lt;br /&gt;
&lt;br /&gt;
Please direct all enquiries to nick.freeman@owasp.org and adrian.hayes@owasp.org.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Presentation Schedule =&lt;br /&gt;
==Presentation Schedule==&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
12th September 2013&lt;br /&gt;
&amp;lt;table width=&amp;quot;80%&amp;quot;&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;08:30&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #8595C2&amp;quot;&amp;gt;Registration&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;09:00&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Welcome to OWASP New Zealand Day 2013&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Nick Freeman and Adrian Hayes (OWASP Leaders)&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;09:10&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #B9C2DC; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Securing the Web Without Site-Specific Passwords&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Francois Marier - Mozilla&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;09:50&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;What's Our Software Doing With All That User Input&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Kim Carter - BinaryMist&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;10:30&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #D98B66; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Break for Morning Tea&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;11:00&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Bug Chaining (aka, why XSS can be worse than you think) &amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Hugh Davenport - Aura RedEye Security&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;11:30&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #B9C2DC; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;OWASP Top 10 Mobile Risks - An Introduction By Case Study&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Mark Piper - Insomnia Security&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;12:30&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #D98B66; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Break for Lunch&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;13:30&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Improving XPath Injection with Binary Search Optimizations&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Paul Haas - Security-Assessment.com&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Nothing to See Here!&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Andrew Kelly&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;14:15&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #B9C2DC; ; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Bad Smells That Lead to Bad Security&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Kirk Jackson - Xero and Andy Prow - Aura&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;background-color: #B9C2DC; ; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Evolution of threats and the skills in your security team&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Hinne Hettema - University of Auckland&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;14:45&amp;lt;/td&amp;gt;&lt;br /&gt;
&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Security Vulnerability Disclosure&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Nick von Dadelszen - Lateral Security&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;15:00&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Serialization formats aren't toys&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Tom Eastman  - Catalyst IT&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;15:30&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #D98B66; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Break for Afternoon Tea&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;16:00&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Discussion Panel&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;An open discussion with our speakers on current security topics&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;16:30&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #B9C2DC; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Wrap Up&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Time for the pub, for those interested&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;	&lt;br /&gt;
	&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Speakers List=&lt;br /&gt;
==Speakers List==&lt;br /&gt;
&lt;br /&gt;
===Tom Eastman  - Catalyst IT - Serialization Formats Aren't Toys===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Do you have an API? Do you accept input from users? Do you accept it in XML? What about YAML? Or maybe JSON? How safe are you? How sure are you? It's not in the OWASP Top 10, but you don't have to look far to hear stories of security vulnerabilities involving deserialization user inputs. Why do they keep happening?&lt;br /&gt;
&lt;br /&gt;
In this talk I'll go over what the threat is, how you might be making yourself vulnerable and how to mitigate the problem. I'll cover the features (not bugs, features) of formats like XML, YAML, and JSON that make them surprisingly dangerous, and how to protect your code from them.&lt;br /&gt;
&lt;br /&gt;
Because here's the thing: If you are using, say, a compliant, properly implemented XML parser to parse your XML, you are NOT safe. Possibly quite the opposite. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Tom is a senior Python developer and technical lead for Catalyst IT, New Zealand's largest company specialising in open source. Prior to that he worked as a developer and system administrator for the University of Otago Faculty of Medicine and as a Computer Science tutor for same.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Paul Haas - Security-Assessment.com -  Improving XPath Injection with Binary Search Optimisations===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
XPath injection is technique similar to SQL injection for attacking XML processors, however many people are unaware of the technique and exploitation vectors. This talk aims to expand awareness of both the risks and remediation path in addition to the introduction of a new technique to significantly improve reconstruction speed of the backend XML document. A brief primer to XPath injection will also be covered within the talk.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Paul Haas hails from California where the waves are better but the quakes are not. With over nine years of experience in professional hacking, he is currently working with Security-Assessment.com in Wellington to bring the good word of web hacks to Kiwis everywhere. His sole hobby is driving people into Mario Kart's abyss.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Nick von Dadelszen - Lateral Security - Security Vulnerability Disclosure===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Disclosing security vulnerabilities can be a dangerous business. While there are systems in place for handling disclosures to most major software companies, the process for disclosing vulnerabilities to local organisations is a lot less discussed.&lt;br /&gt;
&lt;br /&gt;
As the discloser, there is always the chance that you are accused of hacking and get a visit from the police merely for identifying an issue. As an organisation, you can find yourself on the front page of the news when someone goes public with an issue.&lt;br /&gt;
&lt;br /&gt;
This talk outlines the dilemmas faced when stumbling across that SQL injection in the local shopping site and proposes mechanisms to safely get the right people told about it. It also discusses how organisations can make it more likely that security vulnerabilities are reported to them directly, rather than through the press.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Nick von Dadelszen is the technical director at Lateral Security. Nick has been performing professional penetration testing for over 12 years and has managed several successful penetration testing teams. He has worked with the majority of large corporates and Government agencies in New Zealand and is a regular presenter at OWASP and Kiwicon conferences.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Mark Piper - Insomnia Security - OWASP Top 10 Mobile Risks - An Introduction By Case Study===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
As mobile application usage explodes, so does the associated application&lt;br /&gt;
security issues. The OWASP Mobile Security Project includes an&lt;br /&gt;
initiative to categorise and rate these issues into a top 10 format.&lt;br /&gt;
This list is known as the Top 10 Mobile Risks.&lt;br /&gt;
&lt;br /&gt;
During the session, we will introduce the current (RC1) Top 10 supported&lt;br /&gt;
with several real world case studies of issues.  We will cover how the&lt;br /&gt;
issues were identified, how they may be exploited by attackers and what&lt;br /&gt;
mitigation's could be implemented to resolve the issues in the future.&lt;br /&gt;
While the issues will be largely platform agnostic, the examples will&lt;br /&gt;
cover both iOS and Android environments.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Mark is a Principal Security Consultant with the Insomnia Security&lt;br /&gt;
team. Mark spends his days auditing software, running penetration&lt;br /&gt;
testing and red team engagements while working with global customers on&lt;br /&gt;
developing new testing services.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Kirk Jackson and Andy Prow - Xero and Aura Security - Bad Smells That Lead to Bad Security===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Your job as a defender is to reduce the attack surface of your web application and protect your infrastructure and data from being breached. However we can't be involved in every decision that goes on in our organisation, and we don't always think the same as an attacker does. This talk will introduce you to some common &amp;quot;bad smells&amp;quot; that might indicate security issues lurking under the surface of your code, and help you develop your spidey sense so that you know when to raise the alarm.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Kirk is the Security Officer at Xero, and is interested in writing and defending secure web applications.&lt;br /&gt;
&lt;br /&gt;
Andy Prow is an IT Security Consultant, Trainer and software developer who founded Aura back in 2001. With 19 years in the IT industry Andy has developed code for IBM, Vodafone, Telecom and Microsoft. Andy presents around the world at conferences including Microsoft's TechEd.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Kim Carter - BinaryMist - What's Our Software Doing With All That User Input===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
What are we doing with all the characters that get shoved into our applications? Have we considered every potential execution context?&lt;br /&gt;
It's often interesting and surprising to see what sort of concoction of characters can be executed in different places... and linking multiple attack vectors together which the builders haven't thought about.&lt;br /&gt;
What are we trusting? Why are we trusting it? What, where and how should we be sanitising?&lt;br /&gt;
&lt;br /&gt;
We have a vast collection of libraries, techniques, cheat sheets, tutorials, guides and tools at our disposal.&lt;br /&gt;
I often find myself thinking... how can we commoditise the sanitisation of user input and I keep coming up with the same answer.&lt;br /&gt;
It's not easy. Every application has a completely different set of concerns.&lt;br /&gt;
&lt;br /&gt;
In order for our software to be shielded from an attack, the builders must think like attackers.&lt;br /&gt;
&lt;br /&gt;
In this talk I'll attempt to:&lt;br /&gt;
&lt;br /&gt;
* Increase our knowledge and awareness&lt;br /&gt;
* Discuss practical techniques and approaches that increase our defences&lt;br /&gt;
* Break some software&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Kim Carter is a Software Engineer, Architect, Entrepreneur and the founder of BinaryMist. He is passionate about and enjoys many things. Some of which include:&lt;br /&gt;
* Designing and creating robust software and networks.&lt;br /&gt;
* Breaking his and others software and networks, then fixing it/them.&lt;br /&gt;
* Teaching, training, mentoring, motivating, listening to and being around smart people.&lt;br /&gt;
* Increasing quality awareness and helping people and organisations implement higher quality in a cost effective manner.&lt;br /&gt;
* Improving operational efficiencies.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Hugh Davenport - Aura RedEye Security - Bug Chaining (aka, why XSS can be worse than you think) ===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Security bugs can range in damage from small stuff, all the way to big stuff. Some people only focus on the large stuff, and the smaller stuff can go unnoticed. This talk will give a real world example of a project that had a small bug, that allowed a larger bug to happen, which allowed a larger bug, which allowed for unwanted shell access. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Hugh works at Aura RedEye Security on their managed vulnerability scanning service. In his spare time, he is the security point of contact on the Mahara open source tool and contributes to many other open source projects. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Hinne Hettema - University of Auckland - Evolution of Threats and the Skills in our Security Team===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The threat landscape for security threats is constantly evolving, with new threats being stealthier, more diverse, and increasingly aimed at bypassing the protection offered by antivirus and network intrusion detection systems. Adversaries are now often part of a semi-organised underground economy geared towards the acquisition and sale of digital assets such as usernames, passwords, confidential business information, financial data and designs. There are specific value chains in this economy, which make the acquisition, sale and utilisation of such assets a relatively easy process.&lt;br /&gt;
&lt;br /&gt;
This talk focuses on the skills needed in a security team to deal with this next level of threat, and on the sort of teams that we need in enterprise security to address the modern threats that we face.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Hinne Hettema is the team leader of the IT security team at The University of Auckland, an honorary research fellow in the Department of Philosophy at The University of Auckland, and lectures in cyber security at Unitec. He has 10 years experience in security consulting and has a PhD in Philosophy (2012) and theoretical chemistry (1993).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Francois Marier - Mozilla - Securing the Web Without Site-Specific Passwords===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Has anyone else noticed that the OWASP Top 10 is not changing very much?&lt;br /&gt;
Especially in the realm of authentication-related problems. I don't&lt;br /&gt;
claim to have the one true solution for this, but one thing is certain:&lt;br /&gt;
if we change how things are done on the web and relieve developers from&lt;br /&gt;
having to store passwords, we can make things better.&lt;br /&gt;
&lt;br /&gt;
We need to let web developers outsource their authentication needs to&lt;br /&gt;
people who can do it well. Does that mean we should force all of our&lt;br /&gt;
users to join Facebook? Well not really. That might work for some sites,&lt;br /&gt;
but outsourcing all of our logins to a single for-profit company isn't a&lt;br /&gt;
solution that works for the whole web.&lt;br /&gt;
&lt;br /&gt;
The open web needs a better solution. One that enable users to choose&lt;br /&gt;
their identity provider and shop for the most secure one if that's what&lt;br /&gt;
they're into. This is the promise behind Persona and the BrowserID&lt;br /&gt;
protocol. Choose your email provider carefully and let's get rid of all&lt;br /&gt;
of these site-specific passwords that are just sitting there waiting to&lt;br /&gt;
be leaked and cracked.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Francois is a software engineer and security champion on the Mozilla Identity team where he works on decentralising authentication on the web. A long time Debian developer, Francois has been involved in Open Source and web development for a while and has always had a strong interest in security.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Andrew Kelly - Nothing to See Here!===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This is how it starts: &amp;quot;Seeking an exciting new challenge? Want to be responsible for building and shaping an embryonic information security function? Then you so won't want to miss this golden opportunity!&amp;quot; Andrew will talk about the setting up of an information security function in an organisation from scratch ('Greenfield') - as opposed to trying to bed yourself down into an already-existing organisation ('Brownfield'). He'll talk about the pros and the cons, and the many ups and downs. And hopefully he'll answer some questions like: Is there, if fact, any such thing as a greenfield security opportunity left in the wild? And ... if such mythical beasties do exist ... are they worth signing on for? Andrew will discuss the pitfalls and pratfalls of the journey from initial engagement, through (maybe) acceptance, until (perhaps) security sign-off and (hopefully) go-live. He'll also discuss both the Pit Bulls and prats you're likely to meet along the way. So ... if you want to hear a guy speak who reckons he's forgotten more than he ever thought he knew? Then this is so the talk for you!&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Andrew is a whole year older than he was when he presented at last year's OWASP Day: So this time around he's bringing a quarter century's worth of IT security experience to OWASP! Now 25 years ago, he was this mainframe security uber-tech - but today Andrew's recognised as being a 'pragmatic' subject-matter expert on corporate-level information security policy, compliance, frameworks and governance. His first greenfield security 'opportunity' came in November 1989 at the Sun Life Assurance Company of Canada, in the UK. And during those intervening 24 years, he's had similar experiences at various other companies including the likes of Lloyds/TSB Bank, Fonterra, BT Syntegra, Telecom/Gen-i and, lately, Health Benefits Ltd. - amongst many others.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
= Call For Presentations =&lt;br /&gt;
==Call For Presentations==&lt;br /&gt;
&lt;br /&gt;
OWASP New Zealand Day conferences attract a high quality of speakers from a variety of security disciplines including web developers, system administrators, penetration testers, policy specialists and more. We encourage presentations to have a strong component on fixing and prevention of security issues. We are looking for presentations on a wide variety of security topics, including but not limited to:&lt;br /&gt;
&lt;br /&gt;
* Web application security&lt;br /&gt;
* Mobile security&lt;br /&gt;
* Secure development&lt;br /&gt;
* Vulnerability analysis&lt;br /&gt;
* Threat modelling&lt;br /&gt;
* Threat and vulnerability countermeasures&lt;br /&gt;
* Platform or language security (.NET, Java, RoR, etc)&lt;br /&gt;
* Penetration Testing&lt;br /&gt;
* Browser and client security&lt;br /&gt;
* Application and solution architecture security&lt;br /&gt;
* PCI DSS&lt;br /&gt;
* Risk management&lt;br /&gt;
* Security concepts for C*Os, project managers and other non-technical attendees&lt;br /&gt;
* Privacy controls&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The email subject must be &amp;quot;OWASP New Zealand 2013: CFP&amp;quot; and the email body must contains the following information/sections:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name and Surname&lt;br /&gt;
* Affiliation&lt;br /&gt;
* Telephone number&lt;br /&gt;
* Email address&lt;br /&gt;
* Short presenter bio&lt;br /&gt;
* Title of the contribution&lt;br /&gt;
* Type of contribution: Technical, Informative, Management&lt;br /&gt;
* Short abstract (up to 500 words)&lt;br /&gt;
* List of the author's previous papers/articles/speeches on the same topic&lt;br /&gt;
* If you are not from New Zealand, will your company support your travel/accommodation costs? - Yes/No&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The submission will be reviewed by the OWASP New Zealand Day CFP Review Board and the highest voted talks will be selected and invited for presentation.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
PLEASE NOTE:&lt;br /&gt;
* Due to limited budget available, expenses for international speakers cannot be covered.&lt;br /&gt;
* If your company is willing to cover travel and accommodation costs, the company will become &amp;quot;Support Sponsor&amp;quot; of the event.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Please submit the above information to both Nick Freeman and Adrian Hayes - nick.freeman@owasp.org and adrian.hayes@owasp.org&lt;br /&gt;
&lt;br /&gt;
Submissions deadline: 1st August 2013&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Training =&lt;br /&gt;
==Training Events==&lt;br /&gt;
&lt;br /&gt;
We are happy to announce that training will run on Wednesday September 11th 2013, the day before the OWASP Day conference. Both courses will be running from '''9:00 AM sharp''' to '''5:00PM'''.The training venues will be auditoriums kindly provided by the University of Auckland, in the same building as the OWASP Day conference itself. Classes will contain up to 20 students, and each seat has power for laptop usage. Both courses will be run by Aura Information Security, and there is both a basic and advanced course available. Feedback from previous training has been very positive - so get in quick! Details are as follows:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Basic Web Application Security ===&lt;br /&gt;
These days websites are under constant attack and it's incredibly easy for a developer or administrator to make seemingly minor mistakes that introduce security vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
You can't fight a war that you don't know you're waging. You can't defend your websites against attack unless you know the tricks the attackers are using to infiltrate. By the end of this workshop you'll have a good understanding of the OWASP Top 10 including:&lt;br /&gt;
&lt;br /&gt;
* Cross-Site Scripting (XSS)&lt;br /&gt;
* Cross-Site Request Forgery (CSRF)&lt;br /&gt;
* SQL Injection&lt;br /&gt;
* Man-In-the-Middle attacks&lt;br /&gt;
* Layering your defenses (defense-in-depth) that can help protect you from exploit chaining.&lt;br /&gt;
&lt;br /&gt;
More importantly, however, you'll also learn how to minimise the risk from these and other attacks, with practical tips that you can apply straight away to help you design, build and manage more secure websites. This workshop is essential for:&lt;br /&gt;
&lt;br /&gt;
* All developers and designers working on web applications but without formal training in security&lt;br /&gt;
* Anyone working in the website / web application space&lt;br /&gt;
* IT Professionals interested in security issues&lt;br /&gt;
&lt;br /&gt;
This is a hands on workshop where attendees must bring their own laptops. It is required that users are local admins or root on their own machines.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Advanced Web Application Security ===&lt;br /&gt;
This advanced web security course is for senior or experienced developers who are looking for a deeper understanding of web security, beyond the OWASP Top 10. By the end of this workshop you'll have a good understanding of:&lt;br /&gt;
&lt;br /&gt;
==== Advanced Attacks ====&lt;br /&gt;
&lt;br /&gt;
We will run through more complex attacks against web-apps using layered attacks requiring a multi-step defense including&lt;br /&gt;
&lt;br /&gt;
* Malicious file uploads and web shells &lt;br /&gt;
* XXS shells&lt;br /&gt;
* Padding oracle attacks &lt;br /&gt;
* XXE injection attacks &lt;br /&gt;
* Serialisation and file include attacks&lt;br /&gt;
* Timing attacks&lt;br /&gt;
* Cryptography&lt;br /&gt;
&lt;br /&gt;
Where, when and how to use it effectively and securely.&lt;br /&gt;
&lt;br /&gt;
==== Advanced Design and Defense ====&lt;br /&gt;
&lt;br /&gt;
* How to secure systems against malicious users and admins.&lt;br /&gt;
* How to secure data at rest such as credit cards, banking data or other high value data.&lt;br /&gt;
* Tools&lt;br /&gt;
&lt;br /&gt;
We will also introduce some of the tools and techniques you should use to test the security of your own systems&lt;br /&gt;
This is a hands on workshop where attendees must bring their own laptops. It is required that users are local admins or root on their own machines.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For further information, please contact us at the follow email addresses:&lt;br /&gt;
&lt;br /&gt;
* nick.freeman@owasp.org&lt;br /&gt;
* adrian.hayes@owasp.org&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
&lt;br /&gt;
= Call For Sponsorships =&lt;br /&gt;
==Call For Sponsorships==&lt;br /&gt;
&lt;br /&gt;
OWASP New Zealand Day 2013 will be held in Auckland on the 12th of September, 2013 and is a security conference entirely dedicated to application security. The conference is once again being hosted by the University of Auckland with their support and assistance. OWASP New Zealand Day 2013 is a free event, but requires sponsor support to help be an instructive and quality event for the New Zealand community. OWASP is strictly non for profit. The sponsorship money will be used to help make OWASP New Zealand Day 2013 a free, compelling, and valuable experience for the audience.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The sponsorship funds collected are to be used for things such as:&lt;br /&gt;
&lt;br /&gt;
* Refreshments (coffee break/lunch) - we want to keep people refreshed during the day; while we certainly bring good and interesting speakers, we don't want people to go home when they become hungry. &lt;br /&gt;
* Name tags - we feel that getting to know people within the New Zealand community is important, and name tags make that possible.&lt;br /&gt;
* Promotion - up to now our events are propagating by word of mouth. We would like to get to a wider audience by advertising our events.&lt;br /&gt;
* Printed Materials - printed materials will include brochures, tags and lanyards.&lt;br /&gt;
&lt;br /&gt;
== Facts ==&lt;br /&gt;
&lt;br /&gt;
Last year, the event was supported by seven sponsors and attracted more than 250 participants. Plenty of constructive (and positive!) feedback from the audience was received and we are using this to make the conference more appealing to more people. For more information on last year's event, please visit: https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2012&lt;br /&gt;
&lt;br /&gt;
The OWASP New Zealand community is strong and there are more than 220 people currently subscribed to the mailing-list. OWASP New Zealand Day is expected to attract between 250 and 300 attendees this year.&lt;br /&gt;
&lt;br /&gt;
OWASP regular attendees are IT project managers, IT security managers, IT security consultants, web application architects and developers, QA managers, QA testers and system administrators.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Sponsorships  ==&lt;br /&gt;
&lt;br /&gt;
There are three different levels of sponsorships for the OWASP Day event:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Support Sponsorship&amp;lt;/b&amp;gt;: (Covering international speaker travel expenses, media coverage/article/promotion of the event)&lt;br /&gt;
	&lt;br /&gt;
Includes:&lt;br /&gt;
&lt;br /&gt;
* Publication of the sponsor logo on the event web site - https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2013&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Silver Sponsorship&amp;lt;/b&amp;gt;: 1500 NZD&lt;br /&gt;
&lt;br /&gt;
Includes: &lt;br /&gt;
&lt;br /&gt;
* Publication of the sponsor logo on the event web site - https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2013&lt;br /&gt;
* The publication of the sponsor logo in the event site, in the agenda, on the handouts and in all the official communications with the attendees at the conference.&lt;br /&gt;
* The possibility to distribute the company brochures, CDs or other materials to the participants during the event.&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Gold Sponsorship&amp;lt;/b&amp;gt;: 2750 NZD&lt;br /&gt;
&lt;br /&gt;
Includes: &lt;br /&gt;
&lt;br /&gt;
* The possibility to have a promotional banner or sign side stage in the main auditorium (to be provided by the sponsor, size subject to approval by the OWASP NZ Day Committee).&lt;br /&gt;
* The publication of the sponsor logo in the event site, in the agenda, on the handouts and in all the official communications with the attendees at the conference.&lt;br /&gt;
* The possibility to distribute the company brochures, CDs or other materials to the participants during the event.&lt;br /&gt;
* Publication of the sponsor logo on the OWASP New Zealand Chapter page	- Sponsor logo on the OWASP NZ site prior and during the OWASP Day event - https://www.owasp.org/index.php/New_Zealand&lt;br /&gt;
* Publication of the sponsor logo on the event web site - https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2013&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Those who are interested in sponsoring OWASP New Zealand 2013 Conference can contact the [mailto:nick.freeman@owasp.org?cc=adrian.hayes@owasp.org OWASP New Zealand Board].&amp;lt;br&amp;gt;&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]]&lt;/div&gt;</summary>
		<author><name>Adrian Hayes</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_New_Zealand_Day_2013&amp;diff=157798</id>
		<title>OWASP New Zealand Day 2013</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_New_Zealand_Day_2013&amp;diff=157798"/>
				<updated>2013-09-04T01:56:21Z</updated>
		
		<summary type="html">&lt;p&gt;Adrian Hayes: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2013 https://www.owasp.org/images/3/3e/OWASP_NZ_Day_2013_logo.png]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''11th and 12th September 2013 - Auckland'''&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
= Introduction =&lt;br /&gt;
==Introduction==&lt;br /&gt;
We are proud to announce the fifth annual OWASP New Zealand Day conference, to be held at the University of Auckland on Thursday September 12th, 2013. OWASP New Zealand Day is a one-day conference dedicated to application security, with an emphasis on secure development techniques to help Kiwi developers build more secure applications.&lt;br /&gt;
&lt;br /&gt;
Similar to last year:&lt;br /&gt;
&lt;br /&gt;
* We will be offering training on the day before the conference (Wednesday, 11th of September). &lt;br /&gt;
* After lunch on the conference day, we will split to two tracks - one focused on deep technical topics, the other on policy, compliance and risk management. &lt;br /&gt;
&lt;br /&gt;
The fifth OWASP New Zealand Day will be happening thanks to the support provided by the University of Auckland School of Business, which will kindly offer the same conference venue of the last four years. Entry to the event will, as in the past, be free. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For any comments, feedback or observations, please don't hesitate to contact [mailto:nick.freeman@owasp.org?cc=adrian.hayes@owasp.org us].&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Registration==&lt;br /&gt;
&lt;br /&gt;
Registration is now closed.&lt;br /&gt;
&lt;br /&gt;
We may be able to accept some limited last minute registrations. For this please contact adrian.hayes@owasp.org and nick.freeman@owasp.org&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Registration for the main conference day is now open: [https://registration.owasp.org.nz/ Conference Registration Here]&lt;br /&gt;
&lt;br /&gt;
There is no cost for the main conference day and lunch is provided. We do ask that if at any point you realise you cannot make it please cancel your registration to make room for others as spaces are limited.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Training Registration is now open: [http://www.regonline.com/owaspnzday2013trainingandsponsorship Training Registration]&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Important dates==&lt;br /&gt;
&lt;br /&gt;
* CFP &amp;amp; CFT submission deadline:	1st August 2013&lt;br /&gt;
* Conference Registration deadline: 30th August 2013&lt;br /&gt;
* Training Registration deadline: 	30th August 2013&lt;br /&gt;
* Training Day date:				11th September 2013&lt;br /&gt;
* Conference Day date:				12th September 2013&lt;br /&gt;
&lt;br /&gt;
For those of you booking flights, ensure you can be at the venue at 8:30am, the conference will end by 5:30pm however we will have post conference drinks at a local drinking establishment for those interested.&lt;br /&gt;
&lt;br /&gt;
==Conference Venue==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
	&amp;lt;td&amp;gt;&lt;br /&gt;
		The University of Auckland Business School&amp;lt;br&amp;gt;&lt;br /&gt;
		Owen G Glenn Building&amp;lt;br&amp;gt;&lt;br /&gt;
		Room: OGGB 260-073 (OGGB4)&amp;lt;br&amp;gt;&lt;br /&gt;
		Address: 12 Grafton Road&amp;lt;br&amp;gt;&lt;br /&gt;
		Auckland&amp;lt;br&amp;gt;&lt;br /&gt;
		New Zealand&amp;lt;br&amp;gt;&lt;br /&gt;
		[http://maps.google.com/maps?oe=UTF-8&amp;amp;ie=UTF8&amp;amp;q=auckland+business+school&amp;amp;fb=1&amp;amp;split=1&amp;amp;cid=0,0,12303692579639430581&amp;amp;ei=6WeqSZr_OZLFkAWR--zbDQ&amp;amp;ll=-36.852308,174.770916&amp;amp;spn=0.01056,0.020621&amp;amp;z=16&amp;amp;iwloc=A Map]&lt;br /&gt;
	&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;td&amp;gt;&lt;br /&gt;
		[[Image:Auckland_business_school_small2.jpg]] [[Image:Room_hall.jpg]]&lt;br /&gt;
	&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Conference Sponsors==&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;bottom&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;[http://www.auckland.ac.nz/ https://www.owasp.org/images/8/82/University_of_Auckland_crest_small.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;bottom&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;[http://www.security.org.nz/NZISF_NZISForumContent.php https://www.owasp.org/images/5/5a/Nz_information_security_forum.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;ICT and Department of Information Systems and Operations Management&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Gold Sponsors:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com https://www.owasp.org/images/4/41/SA_Logo_w_DD.gif]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[[File:INSOMNIA.PNG|center|350px|link=http://www.insomniasec.com/]]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com www.security-assessment.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.insomniasec.com Insomnia Security]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Silver Sponsors:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[[File:Qualys logo small.png|center|200px|link=]]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[https://www.qualys.com/ www.qualys.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[[File:Orionhealth_logo_small.png|center|200px|link=]]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.orionhealth.com/ www.orionhealth.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Conference Committee==&lt;br /&gt;
&lt;br /&gt;
* Nick Freeman - OWASP New Zealand Leader (Auckland)&lt;br /&gt;
* Adrian Hayes -  OWASP New Zealand Leader (Wellington)&lt;br /&gt;
* Lech Janczewski - Associate Professor - University of Auckland School of Business&lt;br /&gt;
&lt;br /&gt;
Please direct all enquiries to nick.freeman@owasp.org and adrian.hayes@owasp.org.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Presentation Schedule =&lt;br /&gt;
==Presentation Schedule==&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
12th September 2013&lt;br /&gt;
&amp;lt;table width=&amp;quot;80%&amp;quot;&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;08:30&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #8595C2&amp;quot;&amp;gt;Registration&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;09:00&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Welcome to OWASP New Zealand Day 2013&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Nick Freeman and Adrian Hayes (OWASP Leaders)&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;09:10&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #B9C2DC; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Securing the Web Without Site-Specific Passwords&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Francois Marier - Mozilla&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;09:50&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;What's Our Software Doing With All That User Input&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Kim Carter - BinaryMist&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;10:30&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #D98B66; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Break for Morning Tea&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;11:00&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Bug Chaining (aka, why XSS can be worse than you think) &amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Hugh Davenport - Aura RedEye Security&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;11:30&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #B9C2DC; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;OWASP Top 10 Mobile Risks - An Introduction By Case Study&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Mark Piper - Insomnia Security&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;12:30&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #D98B66; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Break for Lunch&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;13:30&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Improving XPath Injection with Binary Search Optimizations&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Paul Haas - Security-Assessment.com&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Nothing to See Here!&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Andrew Kelly&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;14:15&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #B9C2DC; ; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Bad Smells That Lead to Bad Security&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Kirk Jackson - Xero and Andy Prow - Aura&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;background-color: #B9C2DC; ; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Evolution of threats and the skills in your security team&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Hinne Hettema - University of Auckland&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;14:45&amp;lt;/td&amp;gt;&lt;br /&gt;
&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Security Vulnerability Disclosure&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Nick von Dadelszen - Lateral Security&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;15:00&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Serialization formats aren't toys&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Tom Eastman  - Catalyst IT&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;15:30&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #D98B66; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Break for Afternoon Tea&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;16:00&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Discussion Panel&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;An open discussion with our speakers on current security topics&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;16:30&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #B9C2DC; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Wrap Up&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Time for the pub, for those interested&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;	&lt;br /&gt;
	&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Speakers List=&lt;br /&gt;
==Speakers List==&lt;br /&gt;
&lt;br /&gt;
===Tom Eastman  - Catalyst IT - Serialization Formats Aren't Toys===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Do you have an API? Do you accept input from users? Do you accept it in XML? What about YAML? Or maybe JSON? How safe are you? How sure are you? It's not in the OWASP Top 10, but you don't have to look far to hear stories of security vulnerabilities involving deserialization user inputs. Why do they keep happening?&lt;br /&gt;
&lt;br /&gt;
In this talk I'll go over what the threat is, how you might be making yourself vulnerable and how to mitigate the problem. I'll cover the features (not bugs, features) of formats like XML, YAML, and JSON that make them surprisingly dangerous, and how to protect your code from them.&lt;br /&gt;
&lt;br /&gt;
Because here's the thing: If you are using, say, a compliant, properly implemented XML parser to parse your XML, you are NOT safe. Possibly quite the opposite. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Tom is a senior Python developer and technical lead for Catalyst IT, New Zealand's largest company specialising in open source. Prior to that he worked as a developer and system administrator for the University of Otago Faculty of Medicine and as a Computer Science tutor for same.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Paul Haas - Security-Assessment.com -  Improving XPath Injection with Binary Search Optimisations===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
XPath injection is technique similar to SQL injection for attacking XML processors, however many people are unaware of the technique and exploitation vectors. This talk aims to expand awareness of both the risks and remediation path in addition to the introduction of a new technique to significantly improve reconstruction speed of the backend XML document. A brief primer to XPath injection will also be covered within the talk.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Paul Haas hails from California where the waves are better but the quakes are not. With over nine years of experience in professional hacking, he is currently working with Security-Assessment.com in Wellington to bring the good word of web hacks to Kiwis everywhere. His sole hobby is driving people into Mario Kart's abyss.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Nick von Dadelszen - Lateral Security - Security Vulnerability Disclosure===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Disclosing security vulnerabilities can be a dangerous business. While there are systems in place for handling disclosures to most major software companies, the process for disclosing vulnerabilities to local organisations is a lot less discussed.&lt;br /&gt;
&lt;br /&gt;
As the discloser, there is always the chance that you are accused of hacking and get a visit from the police merely for identifying an issue. As an organisation, you can find yourself on the front page of the news when someone goes public with an issue.&lt;br /&gt;
&lt;br /&gt;
This talk outlines the dilemmas faced when stumbling across that SQL injection in the local shopping site and proposes mechanisms to safely get the right people told about it. It also discusses how organisations can make it more likely that security vulnerabilities are reported to them directly, rather than through the press.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Nick von Dadelszen is the technical director at Lateral Security. Nick has been performing professional penetration testing for over 12 years and has managed several successful penetration testing teams. He has worked with the majority of large corporates and Government agencies in New Zealand and is a regular presenter at OWASP and Kiwicon conferences.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Mark Piper - Insomnia Security - OWASP Top 10 Mobile Risks - An Introduction By Case Study===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
As mobile application usage explodes, so does the associated application&lt;br /&gt;
security issues. The OWASP Mobile Security Project includes an&lt;br /&gt;
initiative to categorise and rate these issues into a top 10 format.&lt;br /&gt;
This list is known as the Top 10 Mobile Risks.&lt;br /&gt;
&lt;br /&gt;
During the session, we will introduce the current (RC1) Top 10 supported&lt;br /&gt;
with several real world case studies of issues.  We will cover how the&lt;br /&gt;
issues were identified, how they may be exploited by attackers and what&lt;br /&gt;
mitigation's could be implemented to resolve the issues in the future.&lt;br /&gt;
While the issues will be largely platform agnostic, the examples will&lt;br /&gt;
cover both iOS and Android environments.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Mark is a Principal Security Consultant with the Insomnia Security&lt;br /&gt;
team. Mark spends his days auditing software, running penetration&lt;br /&gt;
testing and red team engagements while working with global customers on&lt;br /&gt;
developing new testing services.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Kirk Jackson and Andy Prow - Xero and Aura Security - Bad Smells That Lead to Bad Security===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Your job as a defender is to reduce the attack surface of your web application and protect your infrastructure and data from being breached. However we can't be involved in every decision that goes on in our organisation, and we don't always think the same as an attacker does. This talk will introduce you to some common &amp;quot;bad smells&amp;quot; that might indicate security issues lurking under the surface of your code, and help you develop your spidey sense so that you know when to raise the alarm.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Kirk is the Security Officer at Xero, and is interested in writing and defending secure web applications.&lt;br /&gt;
&lt;br /&gt;
Andy Prow is an IT Security Consultant, Trainer and software developer who founded Aura back in 2001. With 19 years in the IT industry Andy has developed code for IBM, Vodafone, Telecom and Microsoft. Andy presents around the world at conferences including Microsoft's TechEd.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Kim Carter - BinaryMist - What's Our Software Doing With All That User Input===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
What are we doing with all the characters that get shoved into our applications? Have we considered every potential execution context?&lt;br /&gt;
It's often interesting and surprising to see what sort of concoction of characters can be executed in different places... and linking multiple attack vectors together which the builders haven't thought about.&lt;br /&gt;
What are we trusting? Why are we trusting it? What, where and how should we be sanitising?&lt;br /&gt;
&lt;br /&gt;
We have a vast collection of libraries, techniques, cheat sheets, tutorials, guides and tools at our disposal.&lt;br /&gt;
I often find myself thinking... how can we commoditise the sanitisation of user input and I keep coming up with the same answer.&lt;br /&gt;
It's not easy. Every application has a completely different set of concerns.&lt;br /&gt;
&lt;br /&gt;
In order for our software to be shielded from an attack, the builders must think like attackers.&lt;br /&gt;
&lt;br /&gt;
In this talk I'll attempt to:&lt;br /&gt;
&lt;br /&gt;
* Increase our knowledge and awareness&lt;br /&gt;
* Discuss practical techniques and approaches that increase our defences&lt;br /&gt;
* Break some software&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Kim Carter is a Software Engineer, Architect, Entrepreneur and the founder of BinaryMist. He is passionate about and enjoys many things. Some of which include:&lt;br /&gt;
* Designing and creating robust software and networks.&lt;br /&gt;
* Breaking his and others software and networks, then fixing it/them.&lt;br /&gt;
* Teaching, training, mentoring, motivating, listening to and being around smart people.&lt;br /&gt;
* Increasing quality awareness and helping people and organisations implement higher quality in a cost effective manner.&lt;br /&gt;
* Improving operational efficiencies.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Hugh Davenport - Aura RedEye Security - Bug Chaining (aka, why XSS can be worse than you think) ===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Security bugs can range in damage from small stuff, all the way to big stuff. Some people only focus on the large stuff, and the smaller stuff can go unnoticed. This talk will give a real world example of a project that had a small bug, that allowed a larger bug to happen, which allowed a larger bug, which allowed for unwanted shell access. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Hugh works at Aura RedEye Security on their managed vulnerability scanning service. In his spare time, he is the security point of contact on the Mahara open source tool and contributes to many other open source projects. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Hinne Hettema - University of Auckland - Evolution of Threats and the Skills in our Security Team===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The threat landscape for security threats is constantly evolving, with new threats being stealthier, more diverse, and increasingly aimed at bypassing the protection offered by antivirus and network intrusion detection systems. Adversaries are now often part of a semi-organised underground economy geared towards the acquisition and sale of digital assets such as usernames, passwords, confidential business information, financial data and designs. There are specific value chains in this economy, which make the acquisition, sale and utilisation of such assets a relatively easy process.&lt;br /&gt;
&lt;br /&gt;
This talk focuses on the skills needed in a security team to deal with this next level of threat, and on the sort of teams that we need in enterprise security to address the modern threats that we face.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Hinne Hettema is the team leader of the IT security team at The University of Auckland, an honorary research fellow in the Department of Philosophy at The University of Auckland, and lectures in cyber security at Unitec. He has 10 years experience in security consulting and has a PhD in Philosophy (2012) and theoretical chemistry (1993).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Francois Marier - Mozilla - Securing the Web Without Site-Specific Passwords===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Has anyone else noticed that the OWASP Top 10 is not changing very much?&lt;br /&gt;
Especially in the realm of authentication-related problems. I don't&lt;br /&gt;
claim to have the one true solution for this, but one thing is certain:&lt;br /&gt;
if we change how things are done on the web and relieve developers from&lt;br /&gt;
having to store passwords, we can make things better.&lt;br /&gt;
&lt;br /&gt;
We need to let web developers outsource their authentication needs to&lt;br /&gt;
people who can do it well. Does that mean we should force all of our&lt;br /&gt;
users to join Facebook? Well not really. That might work for some sites,&lt;br /&gt;
but outsourcing all of our logins to a single for-profit company isn't a&lt;br /&gt;
solution that works for the whole web.&lt;br /&gt;
&lt;br /&gt;
The open web needs a better solution. One that enable users to choose&lt;br /&gt;
their identity provider and shop for the most secure one if that's what&lt;br /&gt;
they're into. This is the promise behind Persona and the BrowserID&lt;br /&gt;
protocol. Choose your email provider carefully and let's get rid of all&lt;br /&gt;
of these site-specific passwords that are just sitting there waiting to&lt;br /&gt;
be leaked and cracked.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Francois is a software engineer and security champion on the Mozilla Identity team where he works on decentralising authentication on the web. A long time Debian developer, Francois has been involved in Open Source and web development for a while and has always had a strong interest in security.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Andrew Kelly - Nothing to See Here!===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This is how it starts: &amp;quot;Seeking an exciting new challenge? Want to be responsible for building and shaping an embryonic information security function? Then you so won't want to miss this golden opportunity!&amp;quot; Andrew will talk about the setting up of an information security function in an organisation from scratch ('Greenfield') - as opposed to trying to bed yourself down into an already-existing organisation ('Brownfield'). He'll talk about the pros and the cons, and the many ups and downs. And hopefully he'll answer some questions like: Is there, if fact, any such thing as a greenfield security opportunity left in the wild? And ... if such mythical beasties do exist ... are they worth signing on for? Andrew will discuss the pitfalls and pratfalls of the journey from initial engagement, through (maybe) acceptance, until (perhaps) security sign-off and (hopefully) go-live. He'll also discuss both the Pit Bulls and prats you're likely to meet along the way. So ... if you want to hear a guy speak who reckons he's forgotten more than he ever thought he knew? Then this is so the talk for you!&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Andrew is a whole year older than he was when he presented at last year's OWASP Day: So this time around he's bringing a quarter century's worth of IT security experience to OWASP! Now 25 years ago, he was this mainframe security uber-tech - but today Andrew's recognised as being a 'pragmatic' subject-matter expert on corporate-level information security policy, compliance, frameworks and governance. His first greenfield security 'opportunity' came in November 1989 at the Sun Life Assurance Company of Canada, in the UK. And during those intervening 24 years, he's had similar experiences at various other companies including the likes of Lloyds/TSB Bank, Fonterra, BT Syntegra, Telecom/Gen-i and, lately, Health Benefits Ltd. - amongst many others.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
= Call For Presentations =&lt;br /&gt;
==Call For Presentations==&lt;br /&gt;
&lt;br /&gt;
OWASP New Zealand Day conferences attract a high quality of speakers from a variety of security disciplines including web developers, system administrators, penetration testers, policy specialists and more. We encourage presentations to have a strong component on fixing and prevention of security issues. We are looking for presentations on a wide variety of security topics, including but not limited to:&lt;br /&gt;
&lt;br /&gt;
* Web application security&lt;br /&gt;
* Mobile security&lt;br /&gt;
* Secure development&lt;br /&gt;
* Vulnerability analysis&lt;br /&gt;
* Threat modelling&lt;br /&gt;
* Threat and vulnerability countermeasures&lt;br /&gt;
* Platform or language security (.NET, Java, RoR, etc)&lt;br /&gt;
* Penetration Testing&lt;br /&gt;
* Browser and client security&lt;br /&gt;
* Application and solution architecture security&lt;br /&gt;
* PCI DSS&lt;br /&gt;
* Risk management&lt;br /&gt;
* Security concepts for C*Os, project managers and other non-technical attendees&lt;br /&gt;
* Privacy controls&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The email subject must be &amp;quot;OWASP New Zealand 2013: CFP&amp;quot; and the email body must contains the following information/sections:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name and Surname&lt;br /&gt;
* Affiliation&lt;br /&gt;
* Telephone number&lt;br /&gt;
* Email address&lt;br /&gt;
* Short presenter bio&lt;br /&gt;
* Title of the contribution&lt;br /&gt;
* Type of contribution: Technical, Informative, Management&lt;br /&gt;
* Short abstract (up to 500 words)&lt;br /&gt;
* List of the author's previous papers/articles/speeches on the same topic&lt;br /&gt;
* If you are not from New Zealand, will your company support your travel/accommodation costs? - Yes/No&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The submission will be reviewed by the OWASP New Zealand Day CFP Review Board and the highest voted talks will be selected and invited for presentation.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
PLEASE NOTE:&lt;br /&gt;
* Due to limited budget available, expenses for international speakers cannot be covered.&lt;br /&gt;
* If your company is willing to cover travel and accommodation costs, the company will become &amp;quot;Support Sponsor&amp;quot; of the event.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Please submit the above information to both Nick Freeman and Adrian Hayes - nick.freeman@owasp.org and adrian.hayes@owasp.org&lt;br /&gt;
&lt;br /&gt;
Submissions deadline: 1st August 2013&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Training =&lt;br /&gt;
==Training Events==&lt;br /&gt;
&lt;br /&gt;
We are happy to announce that training will run on Wednesday September 11th 2013, the day before the OWASP Day conference. Both courses will be running from '''9:00 AM sharp''' to '''5:00PM'''.The training venues will be auditoriums kindly provided by the University of Auckland, in the same building as the OWASP Day conference itself. Classes will contain up to 20 students, and each seat has power for laptop usage. Both courses will be run by Aura Information Security, and there is both a basic and advanced course available. Feedback from previous training has been very positive - so get in quick! Details are as follows:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Basic Web Application Security ===&lt;br /&gt;
These days websites are under constant attack and it's incredibly easy for a developer or administrator to make seemingly minor mistakes that introduce security vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
You can't fight a war that you don't know you're waging. You can't defend your websites against attack unless you know the tricks the attackers are using to infiltrate. By the end of this workshop you'll have a good understanding of the OWASP Top 10 including:&lt;br /&gt;
&lt;br /&gt;
* Cross-Site Scripting (XSS)&lt;br /&gt;
* Cross-Site Request Forgery (CSRF)&lt;br /&gt;
* SQL Injection&lt;br /&gt;
* Man-In-the-Middle attacks&lt;br /&gt;
* Layering your defenses (defense-in-depth) that can help protect you from exploit chaining.&lt;br /&gt;
&lt;br /&gt;
More importantly, however, you'll also learn how to minimise the risk from these and other attacks, with practical tips that you can apply straight away to help you design, build and manage more secure websites. This workshop is essential for:&lt;br /&gt;
&lt;br /&gt;
* All developers and designers working on web applications but without formal training in security&lt;br /&gt;
* Anyone working in the website / web application space&lt;br /&gt;
* IT Professionals interested in security issues&lt;br /&gt;
&lt;br /&gt;
This is a hands on workshop where attendees must bring their own laptops. It is required that users are local admins or root on their own machines.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Advanced Web Application Security ===&lt;br /&gt;
This advanced web security course is for senior or experienced developers who are looking for a deeper understanding of web security, beyond the OWASP Top 10. By the end of this workshop you'll have a good understanding of:&lt;br /&gt;
&lt;br /&gt;
==== Advanced Attacks ====&lt;br /&gt;
&lt;br /&gt;
We will run through more complex attacks against web-apps using layered attacks requiring a multi-step defense including&lt;br /&gt;
&lt;br /&gt;
* Malicious file uploads and web shells &lt;br /&gt;
* XXS shells&lt;br /&gt;
* Padding oracle attacks &lt;br /&gt;
* XXE injection attacks &lt;br /&gt;
* Serialisation and file include attacks&lt;br /&gt;
* Timing attacks&lt;br /&gt;
* Cryptography&lt;br /&gt;
&lt;br /&gt;
Where, when and how to use it effectively and securely.&lt;br /&gt;
&lt;br /&gt;
==== Advanced Design and Defense ====&lt;br /&gt;
&lt;br /&gt;
* How to secure systems against malicious users and admins.&lt;br /&gt;
* How to secure data at rest such as credit cards, banking data or other high value data.&lt;br /&gt;
* Tools&lt;br /&gt;
&lt;br /&gt;
We will also introduce some of the tools and techniques you should use to test the security of your own systems&lt;br /&gt;
This is a hands on workshop where attendees must bring their own laptops. It is required that users are local admins or root on their own machines.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Registration ==&lt;br /&gt;
&lt;br /&gt;
Registration is handled through RegOnline, and both courses are NZD$500 per person. Please follow the link below to save your seat!&lt;br /&gt;
&lt;br /&gt;
[http://www.regonline.com/owaspnzday2013trainingandsponsorship http://www.regonline.com/owaspnzday2013trainingandsponsorship]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For further information, please contact us at the follow email addresses:&lt;br /&gt;
&lt;br /&gt;
* nick.freeman@owasp.org&lt;br /&gt;
* adrian.hayes@owasp.org&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
&lt;br /&gt;
= Call For Sponsorships =&lt;br /&gt;
==Call For Sponsorships==&lt;br /&gt;
&lt;br /&gt;
OWASP New Zealand Day 2013 will be held in Auckland on the 12th of September, 2013 and is a security conference entirely dedicated to application security. The conference is once again being hosted by the University of Auckland with their support and assistance. OWASP New Zealand Day 2013 is a free event, but requires sponsor support to help be an instructive and quality event for the New Zealand community. OWASP is strictly non for profit. The sponsorship money will be used to help make OWASP New Zealand Day 2013 a free, compelling, and valuable experience for the audience.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The sponsorship funds collected are to be used for things such as:&lt;br /&gt;
&lt;br /&gt;
* Refreshments (coffee break/lunch) - we want to keep people refreshed during the day; while we certainly bring good and interesting speakers, we don't want people to go home when they become hungry. &lt;br /&gt;
* Name tags - we feel that getting to know people within the New Zealand community is important, and name tags make that possible.&lt;br /&gt;
* Promotion - up to now our events are propagating by word of mouth. We would like to get to a wider audience by advertising our events.&lt;br /&gt;
* Printed Materials - printed materials will include brochures, tags and lanyards.&lt;br /&gt;
&lt;br /&gt;
== Facts ==&lt;br /&gt;
&lt;br /&gt;
Last year, the event was supported by seven sponsors and attracted more than 250 participants. Plenty of constructive (and positive!) feedback from the audience was received and we are using this to make the conference more appealing to more people. For more information on last year's event, please visit: https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2012&lt;br /&gt;
&lt;br /&gt;
The OWASP New Zealand community is strong and there are more than 220 people currently subscribed to the mailing-list. OWASP New Zealand Day is expected to attract between 250 and 300 attendees this year.&lt;br /&gt;
&lt;br /&gt;
OWASP regular attendees are IT project managers, IT security managers, IT security consultants, web application architects and developers, QA managers, QA testers and system administrators.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Sponsorships  ==&lt;br /&gt;
&lt;br /&gt;
There are three different levels of sponsorships for the OWASP Day event:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Support Sponsorship&amp;lt;/b&amp;gt;: (Covering international speaker travel expenses, media coverage/article/promotion of the event)&lt;br /&gt;
	&lt;br /&gt;
Includes:&lt;br /&gt;
&lt;br /&gt;
* Publication of the sponsor logo on the event web site - https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2013&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Silver Sponsorship&amp;lt;/b&amp;gt;: 1500 NZD&lt;br /&gt;
&lt;br /&gt;
Includes: &lt;br /&gt;
&lt;br /&gt;
* Publication of the sponsor logo on the event web site - https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2013&lt;br /&gt;
* The publication of the sponsor logo in the event site, in the agenda, on the handouts and in all the official communications with the attendees at the conference.&lt;br /&gt;
* The possibility to distribute the company brochures, CDs or other materials to the participants during the event.&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Gold Sponsorship&amp;lt;/b&amp;gt;: 2750 NZD&lt;br /&gt;
&lt;br /&gt;
Includes: &lt;br /&gt;
&lt;br /&gt;
* The possibility to have a promotional banner or sign side stage in the main auditorium (to be provided by the sponsor, size subject to approval by the OWASP NZ Day Committee).&lt;br /&gt;
* The publication of the sponsor logo in the event site, in the agenda, on the handouts and in all the official communications with the attendees at the conference.&lt;br /&gt;
* The possibility to distribute the company brochures, CDs or other materials to the participants during the event.&lt;br /&gt;
* Publication of the sponsor logo on the OWASP New Zealand Chapter page	- Sponsor logo on the OWASP NZ site prior and during the OWASP Day event - https://www.owasp.org/index.php/New_Zealand&lt;br /&gt;
* Publication of the sponsor logo on the event web site - https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2013&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Those who are interested in sponsoring OWASP New Zealand 2013 Conference can contact the [mailto:nick.freeman@owasp.org?cc=adrian.hayes@owasp.org OWASP New Zealand Board].&amp;lt;br&amp;gt;&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]]&lt;/div&gt;</summary>
		<author><name>Adrian Hayes</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_New_Zealand_Day_2013&amp;diff=157485</id>
		<title>OWASP New Zealand Day 2013</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_New_Zealand_Day_2013&amp;diff=157485"/>
				<updated>2013-08-29T03:53:22Z</updated>
		
		<summary type="html">&lt;p&gt;Adrian Hayes: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2013 https://www.owasp.org/images/3/3e/OWASP_NZ_Day_2013_logo.png]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''11th and 12th September 2013 - Auckland'''&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
= Introduction =&lt;br /&gt;
==Introduction==&lt;br /&gt;
We are proud to announce the fifth annual OWASP New Zealand Day conference, to be held at the University of Auckland on Thursday September 12th, 2013. OWASP New Zealand Day is a one-day conference dedicated to application security, with an emphasis on secure development techniques to help Kiwi developers build more secure applications.&lt;br /&gt;
&lt;br /&gt;
Similar to last year:&lt;br /&gt;
&lt;br /&gt;
* We will be offering training on the day before the conference (Wednesday, 11th of September). &lt;br /&gt;
* After lunch on the conference day, we will split to two tracks - one focused on deep technical topics, the other on policy, compliance and risk management. &lt;br /&gt;
&lt;br /&gt;
The fifth OWASP New Zealand Day will be happening thanks to the support provided by the University of Auckland School of Business, which will kindly offer the same conference venue of the last four years. Entry to the event will, as in the past, be free. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For any comments, feedback or observations, please don't hesitate to contact [mailto:nick.freeman@owasp.org?cc=adrian.hayes@owasp.org us].&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Registration==&lt;br /&gt;
&lt;br /&gt;
Registration for the main conference day is now open: [https://registration.owasp.org.nz/ Conference Registration Here]&lt;br /&gt;
&lt;br /&gt;
There is no cost for the main conference day and lunch is provided. We do ask that if at any point you realise you cannot make it please cancel your registration to make room for others as spaces are limited.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Training Registration is now open: [http://www.regonline.com/owaspnzday2013trainingandsponsorship Training Registration]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Important dates==&lt;br /&gt;
&lt;br /&gt;
* CFP &amp;amp; CFT submission deadline:	1st August 2013&lt;br /&gt;
* Conference Registration deadline: 30th August 2013&lt;br /&gt;
* Training Registration deadline: 	30th August 2013&lt;br /&gt;
* Training Day date:				11th September 2013&lt;br /&gt;
* Conference Day date:				12th September 2013&lt;br /&gt;
&lt;br /&gt;
For those of you booking flights, ensure you can be at the venue at 8:30am, the conference will end by 5:30pm however we will have post conference drinks at a local drinking establishment for those interested.&lt;br /&gt;
&lt;br /&gt;
==Conference Venue==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
	&amp;lt;td&amp;gt;&lt;br /&gt;
		The University of Auckland Business School&amp;lt;br&amp;gt;&lt;br /&gt;
		Owen G Glenn Building&amp;lt;br&amp;gt;&lt;br /&gt;
		Room: OGGB 260-073 (OGGB4)&amp;lt;br&amp;gt;&lt;br /&gt;
		Address: 12 Grafton Road&amp;lt;br&amp;gt;&lt;br /&gt;
		Auckland&amp;lt;br&amp;gt;&lt;br /&gt;
		New Zealand&amp;lt;br&amp;gt;&lt;br /&gt;
		[http://maps.google.com/maps?oe=UTF-8&amp;amp;ie=UTF8&amp;amp;q=auckland+business+school&amp;amp;fb=1&amp;amp;split=1&amp;amp;cid=0,0,12303692579639430581&amp;amp;ei=6WeqSZr_OZLFkAWR--zbDQ&amp;amp;ll=-36.852308,174.770916&amp;amp;spn=0.01056,0.020621&amp;amp;z=16&amp;amp;iwloc=A Map]&lt;br /&gt;
	&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;td&amp;gt;&lt;br /&gt;
		[[Image:Auckland_business_school_small2.jpg]] [[Image:Room_hall.jpg]]&lt;br /&gt;
	&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Conference Sponsors==&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;bottom&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;[http://www.auckland.ac.nz/ https://www.owasp.org/images/8/82/University_of_Auckland_crest_small.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;bottom&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;[http://www.security.org.nz/NZISF_NZISForumContent.php https://www.owasp.org/images/5/5a/Nz_information_security_forum.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;ICT and Department of Information Systems and Operations Management&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Gold Sponsors:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com https://www.owasp.org/images/4/41/SA_Logo_w_DD.gif]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[[File:INSOMNIA.PNG|center|350px|link=http://www.insomniasec.com/]]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com www.security-assessment.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.insomniasec.com Insomnia Security]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Silver Sponsors:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[[File:Qualys logo small.png|center|200px|link=]]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[https://www.qualys.com/ www.qualys.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[[File:Orionhealth_logo_small.png|center|200px|link=]]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.orionhealth.com/ www.orionhealth.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Conference Committee==&lt;br /&gt;
&lt;br /&gt;
* Nick Freeman - OWASP New Zealand Leader (Auckland)&lt;br /&gt;
* Adrian Hayes -  OWASP New Zealand Leader (Wellington)&lt;br /&gt;
* Lech Janczewski - Associate Professor - University of Auckland School of Business&lt;br /&gt;
&lt;br /&gt;
Please direct all enquiries to nick.freeman@owasp.org and adrian.hayes@owasp.org.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Presentation Schedule =&lt;br /&gt;
==Presentation Schedule==&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
12th September 2013&lt;br /&gt;
&amp;lt;table width=&amp;quot;80%&amp;quot;&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;08:30&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #8595C2&amp;quot;&amp;gt;Registration&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;09:00&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Welcome to OWASP New Zealand Day 2013&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Nick Freeman and Adrian Hayes (OWASP Leaders)&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;09:10&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #B9C2DC; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Securing the Web Without Site-Specific Passwords&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Francois Marier - Mozilla&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;09:50&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;What's Our Software Doing With All That User Input&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Kim Carter - BinaryMist&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;10:30&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #D98B66; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Break for Morning Tea&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;11:00&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Bug Chaining (aka, why XSS can be worse than you think) &amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Hugh Davenport - Aura RedEye Security&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;11:30&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #B9C2DC; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;OWASP Top 10 Mobile Risks - An Introduction By Case Study&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Mark Piper - Insomnia Security&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;12:30&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #D98B66; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Break for Lunch&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;13:30&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Improving XPath Injection with Binary Search Optimizations&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Paul Haas - Security-Assessment.com&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Nothing to See Here!&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Andrew Kelly&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;14:15&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #B9C2DC; ; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Bad Smells That Lead to Bad Security&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Kirk Jackson - Xero and Andy Prow - Aura&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;background-color: #B9C2DC; ; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Evolution of threats and the skills in your security team&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Hinne Hettema - University of Auckland&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;14:45&amp;lt;/td&amp;gt;&lt;br /&gt;
&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Security Vulnerability Disclosure&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Nick von Dadelszen - Lateral Security&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;15:00&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Serialization formats aren't toys&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Tom Eastman  - Catalyst IT&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;15:30&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #D98B66; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Break for Afternoon Tea&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;16:00&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Discussion Panel&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;An open discussion with our speakers on current security topics&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;16:30&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #B9C2DC; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Wrap Up&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Time for the pub, for those interested&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;	&lt;br /&gt;
	&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Speakers List=&lt;br /&gt;
==Speakers List==&lt;br /&gt;
&lt;br /&gt;
===Tom Eastman  - Catalyst IT - Serialization Formats Aren't Toys===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Do you have an API? Do you accept input from users? Do you accept it in XML? What about YAML? Or maybe JSON? How safe are you? How sure are you? It's not in the OWASP Top 10, but you don't have to look far to hear stories of security vulnerabilities involving deserialization user inputs. Why do they keep happening?&lt;br /&gt;
&lt;br /&gt;
In this talk I'll go over what the threat is, how you might be making yourself vulnerable and how to mitigate the problem. I'll cover the features (not bugs, features) of formats like XML, YAML, and JSON that make them surprisingly dangerous, and how to protect your code from them.&lt;br /&gt;
&lt;br /&gt;
Because here's the thing: If you are using, say, a compliant, properly implemented XML parser to parse your XML, you are NOT safe. Possibly quite the opposite. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Tom is a senior Python developer and technical lead for Catalyst IT, New Zealand's largest company specialising in open source. Prior to that he worked as a developer and system administrator for the University of Otago Faculty of Medicine and as a Computer Science tutor for same.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Paul Haas - Security-Assessment.com -  Improving XPath Injection with Binary Search Optimisations===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
XPath injection is technique similar to SQL injection for attacking XML processors, however many people are unaware of the technique and exploitation vectors. This talk aims to expand awareness of both the risks and remediation path in addition to the introduction of a new technique to significantly improve reconstruction speed of the backend XML document. A brief primer to XPath injection will also be covered within the talk.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Paul Haas hails from California where the waves are better but the quakes are not. With over nine years of experience in professional hacking, he is currently working with Security-Assessment.com in Wellington to bring the good word of web hacks to Kiwis everywhere. His sole hobby is driving people into Mario Kart's abyss.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Nick von Dadelszen - Lateral Security - Security Vulnerability Disclosure===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Disclosing security vulnerabilities can be a dangerous business. While there are systems in place for handling disclosures to most major software companies, the process for disclosing vulnerabilities to local organisations is a lot less discussed.&lt;br /&gt;
&lt;br /&gt;
As the discloser, there is always the chance that you are accused of hacking and get a visit from the police merely for identifying an issue. As an organisation, you can find yourself on the front page of the news when someone goes public with an issue.&lt;br /&gt;
&lt;br /&gt;
This talk outlines the dilemmas faced when stumbling across that SQL injection in the local shopping site and proposes mechanisms to safely get the right people told about it. It also discusses how organisations can make it more likely that security vulnerabilities are reported to them directly, rather than through the press.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Nick von Dadelszen is the technical director at Lateral Security. Nick has been performing professional penetration testing for over 12 years and has managed several successful penetration testing teams. He has worked with the majority of large corporates and Government agencies in New Zealand and is a regular presenter at OWASP and Kiwicon conferences.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Mark Piper - Insomnia Security - OWASP Top 10 Mobile Risks - An Introduction By Case Study===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
As mobile application usage explodes, so does the associated application&lt;br /&gt;
security issues. The OWASP Mobile Security Project includes an&lt;br /&gt;
initiative to categorise and rate these issues into a top 10 format.&lt;br /&gt;
This list is known as the Top 10 Mobile Risks.&lt;br /&gt;
&lt;br /&gt;
During the session, we will introduce the current (RC1) Top 10 supported&lt;br /&gt;
with several real world case studies of issues.  We will cover how the&lt;br /&gt;
issues were identified, how they may be exploited by attackers and what&lt;br /&gt;
mitigation's could be implemented to resolve the issues in the future.&lt;br /&gt;
While the issues will be largely platform agnostic, the examples will&lt;br /&gt;
cover both iOS and Android environments.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Mark is a Principal Security Consultant with the Insomnia Security&lt;br /&gt;
team. Mark spends his days auditing software, running penetration&lt;br /&gt;
testing and red team engagements while working with global customers on&lt;br /&gt;
developing new testing services.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Kirk Jackson and Andy Prow - Xero and Aura Security - Bad Smells That Lead to Bad Security===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Your job as a defender is to reduce the attack surface of your web application and protect your infrastructure and data from being breached. However we can't be involved in every decision that goes on in our organisation, and we don't always think the same as an attacker does. This talk will introduce you to some common &amp;quot;bad smells&amp;quot; that might indicate security issues lurking under the surface of your code, and help you develop your spidey sense so that you know when to raise the alarm.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Kirk is the Security Officer at Xero, and is interested in writing and defending secure web applications.&lt;br /&gt;
&lt;br /&gt;
Andy Prow is an IT Security Consultant, Trainer and software developer who founded Aura back in 2001. With 19 years in the IT industry Andy has developed code for IBM, Vodafone, Telecom and Microsoft. Andy presents around the world at conferences including Microsoft's TechEd.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Kim Carter - BinaryMist - What's Our Software Doing With All That User Input===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
What are we doing with all the characters that get shoved into our applications? Have we considered every potential execution context?&lt;br /&gt;
It's often interesting and surprising to see what sort of concoction of characters can be executed in different places... and linking multiple attack vectors together which the builders haven't thought about.&lt;br /&gt;
What are we trusting? Why are we trusting it? What, where and how should we be sanitising?&lt;br /&gt;
&lt;br /&gt;
We have a vast collection of libraries, techniques, cheat sheets, tutorials, guides and tools at our disposal.&lt;br /&gt;
I often find myself thinking... how can we commoditise the sanitisation of user input and I keep coming up with the same answer.&lt;br /&gt;
It's not easy. Every application has a completely different set of concerns.&lt;br /&gt;
&lt;br /&gt;
In order for our software to be shielded from an attack, the builders must think like attackers.&lt;br /&gt;
&lt;br /&gt;
In this talk I'll attempt to:&lt;br /&gt;
&lt;br /&gt;
* Increase our knowledge and awareness&lt;br /&gt;
* Discuss practical techniques and approaches that increase our defences&lt;br /&gt;
* Break some software&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Kim Carter is a Software Engineer, Architect, Entrepreneur and the founder of BinaryMist. He is passionate about and enjoys many things. Some of which include:&lt;br /&gt;
* Designing and creating robust software and networks.&lt;br /&gt;
* Breaking his and others software and networks, then fixing it/them.&lt;br /&gt;
* Teaching, training, mentoring, motivating, listening to and being around smart people.&lt;br /&gt;
* Increasing quality awareness and helping people and organisations implement higher quality in a cost effective manner.&lt;br /&gt;
* Improving operational efficiencies.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Hugh Davenport - Aura RedEye Security - Bug Chaining (aka, why XSS can be worse than you think) ===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Security bugs can range in damage from small stuff, all the way to big stuff. Some people only focus on the large stuff, and the smaller stuff can go unnoticed. This talk will give a real world example of a project that had a small bug, that allowed a larger bug to happen, which allowed a larger bug, which allowed for unwanted shell access. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Hugh works at Aura RedEye Security on their managed vulnerability scanning service. In his spare time, he is the security point of contact on the Mahara open source tool and contributes to many other open source projects. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Hinne Hettema - University of Auckland - Evolution of Threats and the Skills in our Security Team===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The threat landscape for security threats is constantly evolving, with new threats being stealthier, more diverse, and increasingly aimed at bypassing the protection offered by antivirus and network intrusion detection systems. Adversaries are now often part of a semi-organised underground economy geared towards the acquisition and sale of digital assets such as usernames, passwords, confidential business information, financial data and designs. There are specific value chains in this economy, which make the acquisition, sale and utilisation of such assets a relatively easy process.&lt;br /&gt;
&lt;br /&gt;
This talk focuses on the skills needed in a security team to deal with this next level of threat, and on the sort of teams that we need in enterprise security to address the modern threats that we face.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Hinne Hettema is the team leader of the IT security team at The University of Auckland, an honorary research fellow in the Department of Philosophy at The University of Auckland, and lectures in cyber security at Unitec. He has 10 years experience in security consulting and has a PhD in Philosophy (2012) and theoretical chemistry (1993).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Francois Marier - Mozilla - Securing the Web Without Site-Specific Passwords===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Has anyone else noticed that the OWASP Top 10 is not changing very much?&lt;br /&gt;
Especially in the realm of authentication-related problems. I don't&lt;br /&gt;
claim to have the one true solution for this, but one thing is certain:&lt;br /&gt;
if we change how things are done on the web and relieve developers from&lt;br /&gt;
having to store passwords, we can make things better.&lt;br /&gt;
&lt;br /&gt;
We need to let web developers outsource their authentication needs to&lt;br /&gt;
people who can do it well. Does that mean we should force all of our&lt;br /&gt;
users to join Facebook? Well not really. That might work for some sites,&lt;br /&gt;
but outsourcing all of our logins to a single for-profit company isn't a&lt;br /&gt;
solution that works for the whole web.&lt;br /&gt;
&lt;br /&gt;
The open web needs a better solution. One that enable users to choose&lt;br /&gt;
their identity provider and shop for the most secure one if that's what&lt;br /&gt;
they're into. This is the promise behind Persona and the BrowserID&lt;br /&gt;
protocol. Choose your email provider carefully and let's get rid of all&lt;br /&gt;
of these site-specific passwords that are just sitting there waiting to&lt;br /&gt;
be leaked and cracked.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Francois is a software engineer and security champion on the Mozilla Identity team where he works on decentralising authentication on the web. A long time Debian developer, Francois has been involved in Open Source and web development for a while and has always had a strong interest in security.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Andrew Kelly - Nothing to See Here!===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This is how it starts: &amp;quot;Seeking an exciting new challenge? Want to be responsible for building and shaping an embryonic information security function? Then you so won't want to miss this golden opportunity!&amp;quot; Andrew will talk about the setting up of an information security function in an organisation from scratch ('Greenfield') - as opposed to trying to bed yourself down into an already-existing organisation ('Brownfield'). He'll talk about the pros and the cons, and the many ups and downs. And hopefully he'll answer some questions like: Is there, if fact, any such thing as a greenfield security opportunity left in the wild? And ... if such mythical beasties do exist ... are they worth signing on for? Andrew will discuss the pitfalls and pratfalls of the journey from initial engagement, through (maybe) acceptance, until (perhaps) security sign-off and (hopefully) go-live. He'll also discuss both the Pit Bulls and prats you're likely to meet along the way. So ... if you want to hear a guy speak who reckons he's forgotten more than he ever thought he knew? Then this is so the talk for you!&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Andrew is a whole year older than he was when he presented at last year's OWASP Day: So this time around he's bringing a quarter century's worth of IT security experience to OWASP! Now 25 years ago, he was this mainframe security uber-tech - but today Andrew's recognised as being a 'pragmatic' subject-matter expert on corporate-level information security policy, compliance, frameworks and governance. His first greenfield security 'opportunity' came in November 1989 at the Sun Life Assurance Company of Canada, in the UK. And during those intervening 24 years, he's had similar experiences at various other companies including the likes of Lloyds/TSB Bank, Fonterra, BT Syntegra, Telecom/Gen-i and, lately, Health Benefits Ltd. - amongst many others.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
= Call For Presentations =&lt;br /&gt;
==Call For Presentations==&lt;br /&gt;
&lt;br /&gt;
OWASP New Zealand Day conferences attract a high quality of speakers from a variety of security disciplines including web developers, system administrators, penetration testers, policy specialists and more. We encourage presentations to have a strong component on fixing and prevention of security issues. We are looking for presentations on a wide variety of security topics, including but not limited to:&lt;br /&gt;
&lt;br /&gt;
* Web application security&lt;br /&gt;
* Mobile security&lt;br /&gt;
* Secure development&lt;br /&gt;
* Vulnerability analysis&lt;br /&gt;
* Threat modelling&lt;br /&gt;
* Threat and vulnerability countermeasures&lt;br /&gt;
* Platform or language security (.NET, Java, RoR, etc)&lt;br /&gt;
* Penetration Testing&lt;br /&gt;
* Browser and client security&lt;br /&gt;
* Application and solution architecture security&lt;br /&gt;
* PCI DSS&lt;br /&gt;
* Risk management&lt;br /&gt;
* Security concepts for C*Os, project managers and other non-technical attendees&lt;br /&gt;
* Privacy controls&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The email subject must be &amp;quot;OWASP New Zealand 2013: CFP&amp;quot; and the email body must contains the following information/sections:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name and Surname&lt;br /&gt;
* Affiliation&lt;br /&gt;
* Telephone number&lt;br /&gt;
* Email address&lt;br /&gt;
* Short presenter bio&lt;br /&gt;
* Title of the contribution&lt;br /&gt;
* Type of contribution: Technical, Informative, Management&lt;br /&gt;
* Short abstract (up to 500 words)&lt;br /&gt;
* List of the author's previous papers/articles/speeches on the same topic&lt;br /&gt;
* If you are not from New Zealand, will your company support your travel/accommodation costs? - Yes/No&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The submission will be reviewed by the OWASP New Zealand Day CFP Review Board and the highest voted talks will be selected and invited for presentation.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
PLEASE NOTE:&lt;br /&gt;
* Due to limited budget available, expenses for international speakers cannot be covered.&lt;br /&gt;
* If your company is willing to cover travel and accommodation costs, the company will become &amp;quot;Support Sponsor&amp;quot; of the event.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Please submit the above information to both Nick Freeman and Adrian Hayes - nick.freeman@owasp.org and adrian.hayes@owasp.org&lt;br /&gt;
&lt;br /&gt;
Submissions deadline: 1st August 2013&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Training =&lt;br /&gt;
==Training Events==&lt;br /&gt;
&lt;br /&gt;
We are happy to announce that training will run on Wednesday September 11th 2013, the day before the OWASP Day conference. Both courses will be running from '''9:00 AM sharp''' to '''5:00PM'''.The training venues will be auditoriums kindly provided by the University of Auckland, in the same building as the OWASP Day conference itself. Classes will contain up to 20 students, and each seat has power for laptop usage. Both courses will be run by Aura Information Security, and there is both a basic and advanced course available. Feedback from previous training has been very positive - so get in quick! Details are as follows:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Basic Web Application Security ===&lt;br /&gt;
These days websites are under constant attack and it's incredibly easy for a developer or administrator to make seemingly minor mistakes that introduce security vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
You can't fight a war that you don't know you're waging. You can't defend your websites against attack unless you know the tricks the attackers are using to infiltrate. By the end of this workshop you'll have a good understanding of the OWASP Top 10 including:&lt;br /&gt;
&lt;br /&gt;
* Cross-Site Scripting (XSS)&lt;br /&gt;
* Cross-Site Request Forgery (CSRF)&lt;br /&gt;
* SQL Injection&lt;br /&gt;
* Man-In-the-Middle attacks&lt;br /&gt;
* Layering your defenses (defense-in-depth) that can help protect you from exploit chaining.&lt;br /&gt;
&lt;br /&gt;
More importantly, however, you'll also learn how to minimise the risk from these and other attacks, with practical tips that you can apply straight away to help you design, build and manage more secure websites. This workshop is essential for:&lt;br /&gt;
&lt;br /&gt;
* All developers and designers working on web applications but without formal training in security&lt;br /&gt;
* Anyone working in the website / web application space&lt;br /&gt;
* IT Professionals interested in security issues&lt;br /&gt;
&lt;br /&gt;
This is a hands on workshop where attendees must bring their own laptops. It is required that users are local admins or root on their own machines.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Advanced Web Application Security ===&lt;br /&gt;
This advanced web security course is for senior or experienced developers who are looking for a deeper understanding of web security, beyond the OWASP Top 10. By the end of this workshop you'll have a good understanding of:&lt;br /&gt;
&lt;br /&gt;
==== Advanced Attacks ====&lt;br /&gt;
&lt;br /&gt;
We will run through more complex attacks against web-apps using layered attacks requiring a multi-step defense including&lt;br /&gt;
&lt;br /&gt;
* Malicious file uploads and web shells &lt;br /&gt;
* XXS shells&lt;br /&gt;
* Padding oracle attacks &lt;br /&gt;
* XXE injection attacks &lt;br /&gt;
* Serialisation and file include attacks&lt;br /&gt;
* Timing attacks&lt;br /&gt;
* Cryptography&lt;br /&gt;
&lt;br /&gt;
Where, when and how to use it effectively and securely.&lt;br /&gt;
&lt;br /&gt;
==== Advanced Design and Defense ====&lt;br /&gt;
&lt;br /&gt;
* How to secure systems against malicious users and admins.&lt;br /&gt;
* How to secure data at rest such as credit cards, banking data or other high value data.&lt;br /&gt;
* Tools&lt;br /&gt;
&lt;br /&gt;
We will also introduce some of the tools and techniques you should use to test the security of your own systems&lt;br /&gt;
This is a hands on workshop where attendees must bring their own laptops. It is required that users are local admins or root on their own machines.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Registration ==&lt;br /&gt;
&lt;br /&gt;
Registration is handled through RegOnline, and both courses are NZD$500 per person. Please follow the link below to save your seat!&lt;br /&gt;
&lt;br /&gt;
[http://www.regonline.com/owaspnzday2013trainingandsponsorship http://www.regonline.com/owaspnzday2013trainingandsponsorship]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For further information, please contact us at the follow email addresses:&lt;br /&gt;
&lt;br /&gt;
* nick.freeman@owasp.org&lt;br /&gt;
* adrian.hayes@owasp.org&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
&lt;br /&gt;
= Call For Sponsorships =&lt;br /&gt;
==Call For Sponsorships==&lt;br /&gt;
&lt;br /&gt;
OWASP New Zealand Day 2013 will be held in Auckland on the 12th of September, 2013 and is a security conference entirely dedicated to application security. The conference is once again being hosted by the University of Auckland with their support and assistance. OWASP New Zealand Day 2013 is a free event, but requires sponsor support to help be an instructive and quality event for the New Zealand community. OWASP is strictly non for profit. The sponsorship money will be used to help make OWASP New Zealand Day 2013 a free, compelling, and valuable experience for the audience.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The sponsorship funds collected are to be used for things such as:&lt;br /&gt;
&lt;br /&gt;
* Refreshments (coffee break/lunch) - we want to keep people refreshed during the day; while we certainly bring good and interesting speakers, we don't want people to go home when they become hungry. &lt;br /&gt;
* Name tags - we feel that getting to know people within the New Zealand community is important, and name tags make that possible.&lt;br /&gt;
* Promotion - up to now our events are propagating by word of mouth. We would like to get to a wider audience by advertising our events.&lt;br /&gt;
* Printed Materials - printed materials will include brochures, tags and lanyards.&lt;br /&gt;
&lt;br /&gt;
== Facts ==&lt;br /&gt;
&lt;br /&gt;
Last year, the event was supported by seven sponsors and attracted more than 250 participants. Plenty of constructive (and positive!) feedback from the audience was received and we are using this to make the conference more appealing to more people. For more information on last year's event, please visit: https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2012&lt;br /&gt;
&lt;br /&gt;
The OWASP New Zealand community is strong and there are more than 220 people currently subscribed to the mailing-list. OWASP New Zealand Day is expected to attract between 250 and 300 attendees this year.&lt;br /&gt;
&lt;br /&gt;
OWASP regular attendees are IT project managers, IT security managers, IT security consultants, web application architects and developers, QA managers, QA testers and system administrators.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Sponsorships  ==&lt;br /&gt;
&lt;br /&gt;
There are three different levels of sponsorships for the OWASP Day event:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Support Sponsorship&amp;lt;/b&amp;gt;: (Covering international speaker travel expenses, media coverage/article/promotion of the event)&lt;br /&gt;
	&lt;br /&gt;
Includes:&lt;br /&gt;
&lt;br /&gt;
* Publication of the sponsor logo on the event web site - https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2013&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Silver Sponsorship&amp;lt;/b&amp;gt;: 1500 NZD&lt;br /&gt;
&lt;br /&gt;
Includes: &lt;br /&gt;
&lt;br /&gt;
* Publication of the sponsor logo on the event web site - https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2013&lt;br /&gt;
* The publication of the sponsor logo in the event site, in the agenda, on the handouts and in all the official communications with the attendees at the conference.&lt;br /&gt;
* The possibility to distribute the company brochures, CDs or other materials to the participants during the event.&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Gold Sponsorship&amp;lt;/b&amp;gt;: 2750 NZD&lt;br /&gt;
&lt;br /&gt;
Includes: &lt;br /&gt;
&lt;br /&gt;
* The possibility to have a promotional banner or sign side stage in the main auditorium (to be provided by the sponsor, size subject to approval by the OWASP NZ Day Committee).&lt;br /&gt;
* The publication of the sponsor logo in the event site, in the agenda, on the handouts and in all the official communications with the attendees at the conference.&lt;br /&gt;
* The possibility to distribute the company brochures, CDs or other materials to the participants during the event.&lt;br /&gt;
* Publication of the sponsor logo on the OWASP New Zealand Chapter page	- Sponsor logo on the OWASP NZ site prior and during the OWASP Day event - https://www.owasp.org/index.php/New_Zealand&lt;br /&gt;
* Publication of the sponsor logo on the event web site - https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2013&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Those who are interested in sponsoring OWASP New Zealand 2013 Conference can contact the [mailto:nick.freeman@owasp.org?cc=adrian.hayes@owasp.org OWASP New Zealand Board].&amp;lt;br&amp;gt;&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]]&lt;/div&gt;</summary>
		<author><name>Adrian Hayes</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_New_Zealand_Day_2013&amp;diff=157482</id>
		<title>OWASP New Zealand Day 2013</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_New_Zealand_Day_2013&amp;diff=157482"/>
				<updated>2013-08-29T02:16:36Z</updated>
		
		<summary type="html">&lt;p&gt;Adrian Hayes: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2013 https://www.owasp.org/images/3/3e/OWASP_NZ_Day_2013_logo.png]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''11th and 12st September 2013 - Auckland'''&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
= Introduction =&lt;br /&gt;
==Introduction==&lt;br /&gt;
We are proud to announce the fifth annual OWASP New Zealand Day conference, to be held at the University of Auckland on Thursday September 12th, 2013. OWASP New Zealand Day is a one-day conference dedicated to application security, with an emphasis on secure development techniques to help Kiwi developers build more secure applications.&lt;br /&gt;
&lt;br /&gt;
Similar to last year:&lt;br /&gt;
&lt;br /&gt;
* We will be offering training on the day before the conference (Wednesday, 11th of September). &lt;br /&gt;
* After lunch on the conference day, we will split to two tracks - one focused on deep technical topics, the other on policy, compliance and risk management. &lt;br /&gt;
&lt;br /&gt;
The fifth OWASP New Zealand Day will be happening thanks to the support provided by the University of Auckland School of Business, which will kindly offer the same conference venue of the last four years. Entry to the event will, as in the past, be free. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For any comments, feedback or observations, please don't hesitate to contact [mailto:nick.freeman@owasp.org?cc=adrian.hayes@owasp.org us].&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Registration==&lt;br /&gt;
&lt;br /&gt;
Registration for the main conference day is now open: [https://registration.owasp.org.nz/ Conference Registration Here]&lt;br /&gt;
&lt;br /&gt;
There is no cost for the main conference day and lunch is provided. We do ask that if at any point you realise you cannot make it please cancel your registration to make room for others as spaces are limited.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Training Registration is now open: [http://www.regonline.com/owaspnzday2013trainingandsponsorship Training Registration]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Important dates==&lt;br /&gt;
&lt;br /&gt;
* CFP &amp;amp; CFT submission deadline:	1st August 2013&lt;br /&gt;
* Conference Registration deadline: 30th August 2013&lt;br /&gt;
* Training Registration deadline: 	30th August 2013&lt;br /&gt;
* Training Day date:				11th September 2013&lt;br /&gt;
* Conference Day date:				12th September 2013&lt;br /&gt;
&lt;br /&gt;
For those of you booking flights, ensure you can be at the venue at 8:30am, the conference will end by 5:30pm however we will have post conference drinks at a local drinking establishment for those interested.&lt;br /&gt;
&lt;br /&gt;
==Conference Venue==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
	&amp;lt;td&amp;gt;&lt;br /&gt;
		The University of Auckland Business School&amp;lt;br&amp;gt;&lt;br /&gt;
		Owen G Glenn Building&amp;lt;br&amp;gt;&lt;br /&gt;
		Room: OGGB 260-073 (OGGB4)&amp;lt;br&amp;gt;&lt;br /&gt;
		Address: 12 Grafton Road&amp;lt;br&amp;gt;&lt;br /&gt;
		Auckland&amp;lt;br&amp;gt;&lt;br /&gt;
		New Zealand&amp;lt;br&amp;gt;&lt;br /&gt;
		[http://maps.google.com/maps?oe=UTF-8&amp;amp;ie=UTF8&amp;amp;q=auckland+business+school&amp;amp;fb=1&amp;amp;split=1&amp;amp;cid=0,0,12303692579639430581&amp;amp;ei=6WeqSZr_OZLFkAWR--zbDQ&amp;amp;ll=-36.852308,174.770916&amp;amp;spn=0.01056,0.020621&amp;amp;z=16&amp;amp;iwloc=A Map]&lt;br /&gt;
	&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;td&amp;gt;&lt;br /&gt;
		[[Image:Auckland_business_school_small2.jpg]] [[Image:Room_hall.jpg]]&lt;br /&gt;
	&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Conference Sponsors==&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;bottom&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;[http://www.auckland.ac.nz/ https://www.owasp.org/images/8/82/University_of_Auckland_crest_small.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;bottom&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;[http://www.security.org.nz/NZISF_NZISForumContent.php https://www.owasp.org/images/5/5a/Nz_information_security_forum.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;ICT and Department of Information Systems and Operations Management&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Gold Sponsors:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com https://www.owasp.org/images/4/41/SA_Logo_w_DD.gif]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[[File:INSOMNIA.PNG|center|350px|link=http://www.insomniasec.com/]]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com www.security-assessment.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.insomniasec.com Insomnia Security]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Silver Sponsors:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[[File:Qualys logo small.png|center|200px|link=]]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[https://www.qualys.com/ www.qualys.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[[File:Orionhealth_logo_small.png|center|200px|link=]]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.orionhealth.com/ www.orionhealth.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Conference Committee==&lt;br /&gt;
&lt;br /&gt;
* Nick Freeman - OWASP New Zealand Leader (Auckland)&lt;br /&gt;
* Adrian Hayes -  OWASP New Zealand Leader (Wellington)&lt;br /&gt;
* Lech Janczewski - Associate Professor - University of Auckland School of Business&lt;br /&gt;
&lt;br /&gt;
Please direct all enquiries to nick.freeman@owasp.org and adrian.hayes@owasp.org.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Presentation Schedule =&lt;br /&gt;
==Presentation Schedule==&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
12st September 2013&lt;br /&gt;
&amp;lt;table width=&amp;quot;80%&amp;quot;&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;08:30&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #8595C2&amp;quot;&amp;gt;Registration&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;09:00&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Welcome to OWASP New Zealand Day 2013&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Nick Freeman and Adrian Hayes (OWASP Leaders)&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;09:10&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #B9C2DC; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Securing the Web Without Site-Specific Passwords&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Francois Marier - Mozilla&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;09:50&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;What's Our Software Doing With All That User Input&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Kim Carter - BinaryMist&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;10:30&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #D98B66; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Break for Morning Tea&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;11:00&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Bug Chaining (aka, why XSS can be worse than you think) &amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Hugh Davenport - Aura RedEye Security&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;11:30&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #B9C2DC; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;OWASP Top 10 Mobile Risks - An Introduction By Case Study&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Mark Piper - Insomnia Security&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;12:30&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #D98B66; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Break for Lunch&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;13:30&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Improving XPath Injection with Binary Search Optimizations&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Paul Haas - Security-Assessment.com&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Nothing to See Here!&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Andrew Kelly&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;14:15&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #B9C2DC; ; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Bad Smells That Lead to Bad Security&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Kirk Jackson - Xero and Andy Prow - Aura&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;background-color: #B9C2DC; ; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Evolution of threats and the skills in your security team&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Hinne Hettema - University of Auckland&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;14:45&amp;lt;/td&amp;gt;&lt;br /&gt;
&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Security Vulnerability Disclosure&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Nick von Dadelszen - Lateral Security&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;15:00&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Serialization formats aren't toys&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Tom Eastman  - Catalyst IT&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;15:30&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #D98B66; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Break for Afternoon Tea&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;16:00&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Discussion Panel&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;An open discussion with our speakers on current security topics&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;16:30&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #B9C2DC; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Wrap Up&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Time for the pub, for those interested&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;	&lt;br /&gt;
	&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Speakers List=&lt;br /&gt;
==Speakers List==&lt;br /&gt;
&lt;br /&gt;
===Tom Eastman  - Catalyst IT - Serialization Formats Aren't Toys===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Do you have an API? Do you accept input from users? Do you accept it in XML? What about YAML? Or maybe JSON? How safe are you? How sure are you? It's not in the OWASP Top 10, but you don't have to look far to hear stories of security vulnerabilities involving deserialization user inputs. Why do they keep happening?&lt;br /&gt;
&lt;br /&gt;
In this talk I'll go over what the threat is, how you might be making yourself vulnerable and how to mitigate the problem. I'll cover the features (not bugs, features) of formats like XML, YAML, and JSON that make them surprisingly dangerous, and how to protect your code from them.&lt;br /&gt;
&lt;br /&gt;
Because here's the thing: If you are using, say, a compliant, properly implemented XML parser to parse your XML, you are NOT safe. Possibly quite the opposite. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Tom is a senior Python developer and technical lead for Catalyst IT, New Zealand's largest company specialising in open source. Prior to that he worked as a developer and system administrator for the University of Otago Faculty of Medicine and as a Computer Science tutor for same.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Paul Haas - Security-Assessment.com -  Improving XPath Injection with Binary Search Optimisations===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
XPath injection is technique similar to SQL injection for attacking XML processors, however many people are unaware of the technique and exploitation vectors. This talk aims to expand awareness of both the risks and remediation path in addition to the introduction of a new technique to significantly improve reconstruction speed of the backend XML document. A brief primer to XPath injection will also be covered within the talk.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Paul Haas hails from California where the waves are better but the quakes are not. With over nine years of experience in professional hacking, he is currently working with Security-Assessment.com in Wellington to bring the good word of web hacks to Kiwis everywhere. His sole hobby is driving people into Mario Kart's abyss.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Nick von Dadelszen - Lateral Security - Security Vulnerability Disclosure===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Disclosing security vulnerabilities can be a dangerous business. While there are systems in place for handling disclosures to most major software companies, the process for disclosing vulnerabilities to local organisations is a lot less discussed.&lt;br /&gt;
&lt;br /&gt;
As the discloser, there is always the chance that you are accused of hacking and get a visit from the police merely for identifying an issue. As an organisation, you can find yourself on the front page of the news when someone goes public with an issue.&lt;br /&gt;
&lt;br /&gt;
This talk outlines the dilemmas faced when stumbling across that SQL injection in the local shopping site and proposes mechanisms to safely get the right people told about it. It also discusses how organisations can make it more likely that security vulnerabilities are reported to them directly, rather than through the press.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Nick von Dadelszen is the technical director at Lateral Security. Nick has been performing professional penetration testing for over 12 years and has managed several successful penetration testing teams. He has worked with the majority of large corporates and Government agencies in New Zealand and is a regular presenter at OWASP and Kiwicon conferences.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Mark Piper - Insomnia Security - OWASP Top 10 Mobile Risks - An Introduction By Case Study===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
As mobile application usage explodes, so does the associated application&lt;br /&gt;
security issues. The OWASP Mobile Security Project includes an&lt;br /&gt;
initiative to categorise and rate these issues into a top 10 format.&lt;br /&gt;
This list is known as the Top 10 Mobile Risks.&lt;br /&gt;
&lt;br /&gt;
During the session, we will introduce the current (RC1) Top 10 supported&lt;br /&gt;
with several real world case studies of issues.  We will cover how the&lt;br /&gt;
issues were identified, how they may be exploited by attackers and what&lt;br /&gt;
mitigation's could be implemented to resolve the issues in the future.&lt;br /&gt;
While the issues will be largely platform agnostic, the examples will&lt;br /&gt;
cover both iOS and Android environments.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Mark is a Principal Security Consultant with the Insomnia Security&lt;br /&gt;
team. Mark spends his days auditing software, running penetration&lt;br /&gt;
testing and red team engagements while working with global customers on&lt;br /&gt;
developing new testing services.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Kirk Jackson and Andy Prow - Xero and Aura Security - Bad Smells That Lead to Bad Security===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Your job as a defender is to reduce the attack surface of your web application and protect your infrastructure and data from being breached. However we can't be involved in every decision that goes on in our organisation, and we don't always think the same as an attacker does. This talk will introduce you to some common &amp;quot;bad smells&amp;quot; that might indicate security issues lurking under the surface of your code, and help you develop your spidey sense so that you know when to raise the alarm.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Kirk is the Security Officer at Xero, and is interested in writing and defending secure web applications.&lt;br /&gt;
&lt;br /&gt;
Andy Prow is an IT Security Consultant, Trainer and software developer who founded Aura back in 2001. With 19 years in the IT industry Andy has developed code for IBM, Vodafone, Telecom and Microsoft. Andy presents around the world at conferences including Microsoft's TechEd.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Kim Carter - BinaryMist - What's Our Software Doing With All That User Input===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
What are we doing with all the characters that get shoved into our applications? Have we considered every potential execution context?&lt;br /&gt;
It's often interesting and surprising to see what sort of concoction of characters can be executed in different places... and linking multiple attack vectors together which the builders haven't thought about.&lt;br /&gt;
What are we trusting? Why are we trusting it? What, where and how should we be sanitising?&lt;br /&gt;
&lt;br /&gt;
We have a vast collection of libraries, techniques, cheat sheets, tutorials, guides and tools at our disposal.&lt;br /&gt;
I often find myself thinking... how can we commoditise the sanitisation of user input and I keep coming up with the same answer.&lt;br /&gt;
It's not easy. Every application has a completely different set of concerns.&lt;br /&gt;
&lt;br /&gt;
In order for our software to be shielded from an attack, the builders must think like attackers.&lt;br /&gt;
&lt;br /&gt;
In this talk I'll attempt to:&lt;br /&gt;
&lt;br /&gt;
* Increase our knowledge and awareness&lt;br /&gt;
* Discuss practical techniques and approaches that increase our defences&lt;br /&gt;
* Break some software&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Kim Carter is a Software Engineer, Architect, Entrepreneur and the founder of BinaryMist. He is passionate about and enjoys many things. Some of which include:&lt;br /&gt;
* Designing and creating robust software and networks.&lt;br /&gt;
* Breaking his and others software and networks, then fixing it/them.&lt;br /&gt;
* Teaching, training, mentoring, motivating, listening to and being around smart people.&lt;br /&gt;
* Increasing quality awareness and helping people and organisations implement higher quality in a cost effective manner.&lt;br /&gt;
* Improving operational efficiencies.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Hugh Davenport - Aura RedEye Security - Bug Chaining (aka, why XSS can be worse than you think) ===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Security bugs can range in damage from small stuff, all the way to big stuff. Some people only focus on the large stuff, and the smaller stuff can go unnoticed. This talk will give a real world example of a project that had a small bug, that allowed a larger bug to happen, which allowed a larger bug, which allowed for unwanted shell access. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Hugh works at Aura RedEye Security on their managed vulnerability scanning service. In his spare time, he is the security point of contact on the Mahara open source tool and contributes to many other open source projects. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Hinne Hettema - University of Auckland - Evolution of Threats and the Skills in our Security Team===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The threat landscape for security threats is constantly evolving, with new threats being stealthier, more diverse, and increasingly aimed at bypassing the protection offered by antivirus and network intrusion detection systems. Adversaries are now often part of a semi-organised underground economy geared towards the acquisition and sale of digital assets such as usernames, passwords, confidential business information, financial data and designs. There are specific value chains in this economy, which make the acquisition, sale and utilisation of such assets a relatively easy process.&lt;br /&gt;
&lt;br /&gt;
This talk focuses on the skills needed in a security team to deal with this next level of threat, and on the sort of teams that we need in enterprise security to address the modern threats that we face.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Hinne Hettema is the team leader of the IT security team at The University of Auckland, an honorary research fellow in the Department of Philosophy at The University of Auckland, and lectures in cyber security at Unitec. He has 10 years experience in security consulting and has a PhD in Philosophy (2012) and theoretical chemistry (1993).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Francois Marier - Mozilla - Securing the Web Without Site-Specific Passwords===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Has anyone else noticed that the OWASP Top 10 is not changing very much?&lt;br /&gt;
Especially in the realm of authentication-related problems. I don't&lt;br /&gt;
claim to have the one true solution for this, but one thing is certain:&lt;br /&gt;
if we change how things are done on the web and relieve developers from&lt;br /&gt;
having to store passwords, we can make things better.&lt;br /&gt;
&lt;br /&gt;
We need to let web developers outsource their authentication needs to&lt;br /&gt;
people who can do it well. Does that mean we should force all of our&lt;br /&gt;
users to join Facebook? Well not really. That might work for some sites,&lt;br /&gt;
but outsourcing all of our logins to a single for-profit company isn't a&lt;br /&gt;
solution that works for the whole web.&lt;br /&gt;
&lt;br /&gt;
The open web needs a better solution. One that enable users to choose&lt;br /&gt;
their identity provider and shop for the most secure one if that's what&lt;br /&gt;
they're into. This is the promise behind Persona and the BrowserID&lt;br /&gt;
protocol. Choose your email provider carefully and let's get rid of all&lt;br /&gt;
of these site-specific passwords that are just sitting there waiting to&lt;br /&gt;
be leaked and cracked.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Francois is a software engineer and security champion on the Mozilla Identity team where he works on decentralising authentication on the web. A long time Debian developer, Francois has been involved in Open Source and web development for a while and has always had a strong interest in security.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Andrew Kelly - Nothing to See Here!===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This is how it starts: &amp;quot;Seeking an exciting new challenge? Want to be responsible for building and shaping an embryonic information security function? Then you so won't want to miss this golden opportunity!&amp;quot; Andrew will talk about the setting up of an information security function in an organisation from scratch ('Greenfield') - as opposed to trying to bed yourself down into an already-existing organisation ('Brownfield'). He'll talk about the pros and the cons, and the many ups and downs. And hopefully he'll answer some questions like: Is there, if fact, any such thing as a greenfield security opportunity left in the wild? And ... if such mythical beasties do exist ... are they worth signing on for? Andrew will discuss the pitfalls and pratfalls of the journey from initial engagement, through (maybe) acceptance, until (perhaps) security sign-off and (hopefully) go-live. He'll also discuss both the Pit Bulls and prats you're likely to meet along the way. So ... if you want to hear a guy speak who reckons he's forgotten more than he ever thought he knew? Then this is so the talk for you!&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Andrew is a whole year older than he was when he presented at last year's OWASP Day: So this time around he's bringing a quarter century's worth of IT security experience to OWASP! Now 25 years ago, he was this mainframe security uber-tech - but today Andrew's recognised as being a 'pragmatic' subject-matter expert on corporate-level information security policy, compliance, frameworks and governance. His first greenfield security 'opportunity' came in November 1989 at the Sun Life Assurance Company of Canada, in the UK. And during those intervening 24 years, he's had similar experiences at various other companies including the likes of Lloyds/TSB Bank, Fonterra, BT Syntegra, Telecom/Gen-i and, lately, Health Benefits Ltd. - amongst many others.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
= Call For Presentations =&lt;br /&gt;
==Call For Presentations==&lt;br /&gt;
&lt;br /&gt;
OWASP New Zealand Day conferences attract a high quality of speakers from a variety of security disciplines including web developers, system administrators, penetration testers, policy specialists and more. We encourage presentations to have a strong component on fixing and prevention of security issues. We are looking for presentations on a wide variety of security topics, including but not limited to:&lt;br /&gt;
&lt;br /&gt;
* Web application security&lt;br /&gt;
* Mobile security&lt;br /&gt;
* Secure development&lt;br /&gt;
* Vulnerability analysis&lt;br /&gt;
* Threat modelling&lt;br /&gt;
* Threat and vulnerability countermeasures&lt;br /&gt;
* Platform or language security (.NET, Java, RoR, etc)&lt;br /&gt;
* Penetration Testing&lt;br /&gt;
* Browser and client security&lt;br /&gt;
* Application and solution architecture security&lt;br /&gt;
* PCI DSS&lt;br /&gt;
* Risk management&lt;br /&gt;
* Security concepts for C*Os, project managers and other non-technical attendees&lt;br /&gt;
* Privacy controls&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The email subject must be &amp;quot;OWASP New Zealand 2013: CFP&amp;quot; and the email body must contains the following information/sections:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name and Surname&lt;br /&gt;
* Affiliation&lt;br /&gt;
* Telephone number&lt;br /&gt;
* Email address&lt;br /&gt;
* Short presenter bio&lt;br /&gt;
* Title of the contribution&lt;br /&gt;
* Type of contribution: Technical, Informative, Management&lt;br /&gt;
* Short abstract (up to 500 words)&lt;br /&gt;
* List of the author's previous papers/articles/speeches on the same topic&lt;br /&gt;
* If you are not from New Zealand, will your company support your travel/accommodation costs? - Yes/No&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The submission will be reviewed by the OWASP New Zealand Day CFP Review Board and the highest voted talks will be selected and invited for presentation.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
PLEASE NOTE:&lt;br /&gt;
* Due to limited budget available, expenses for international speakers cannot be covered.&lt;br /&gt;
* If your company is willing to cover travel and accommodation costs, the company will become &amp;quot;Support Sponsor&amp;quot; of the event.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Please submit the above information to both Nick Freeman and Adrian Hayes - nick.freeman@owasp.org and adrian.hayes@owasp.org&lt;br /&gt;
&lt;br /&gt;
Submissions deadline: 1st August 2013&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Training =&lt;br /&gt;
==Training Events==&lt;br /&gt;
&lt;br /&gt;
We are happy to announce that training will run on Wednesday September 11th 2013, the day before the OWASP Day conference. Both courses will be running from '''9:00 AM sharp''' to '''5:00PM'''.The training venues will be auditoriums kindly provided by the University of Auckland, in the same building as the OWASP Day conference itself. Classes will contain up to 20 students, and each seat has power for laptop usage. Both courses will be run by Aura Information Security, and there is both a basic and advanced course available. Feedback from previous training has been very positive - so get in quick! Details are as follows:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Basic Web Application Security ===&lt;br /&gt;
These days websites are under constant attack and it's incredibly easy for a developer or administrator to make seemingly minor mistakes that introduce security vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
You can't fight a war that you don't know you're waging. You can't defend your websites against attack unless you know the tricks the attackers are using to infiltrate. By the end of this workshop you'll have a good understanding of the OWASP Top 10 including:&lt;br /&gt;
&lt;br /&gt;
* Cross-Site Scripting (XSS)&lt;br /&gt;
* Cross-Site Request Forgery (CSRF)&lt;br /&gt;
* SQL Injection&lt;br /&gt;
* Man-In-the-Middle attacks&lt;br /&gt;
* Layering your defenses (defense-in-depth) that can help protect you from exploit chaining.&lt;br /&gt;
&lt;br /&gt;
More importantly, however, you'll also learn how to minimise the risk from these and other attacks, with practical tips that you can apply straight away to help you design, build and manage more secure websites. This workshop is essential for:&lt;br /&gt;
&lt;br /&gt;
* All developers and designers working on web applications but without formal training in security&lt;br /&gt;
* Anyone working in the website / web application space&lt;br /&gt;
* IT Professionals interested in security issues&lt;br /&gt;
&lt;br /&gt;
This is a hands on workshop where attendees must bring their own laptops. It is required that users are local admins or root on their own machines.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Advanced Web Application Security ===&lt;br /&gt;
This advanced web security course is for senior or experienced developers who are looking for a deeper understanding of web security, beyond the OWASP Top 10. By the end of this workshop you'll have a good understanding of:&lt;br /&gt;
&lt;br /&gt;
==== Advanced Attacks ====&lt;br /&gt;
&lt;br /&gt;
We will run through more complex attacks against web-apps using layered attacks requiring a multi-step defense including&lt;br /&gt;
&lt;br /&gt;
* Malicious file uploads and web shells &lt;br /&gt;
* XXS shells&lt;br /&gt;
* Padding oracle attacks &lt;br /&gt;
* XXE injection attacks &lt;br /&gt;
* Serialisation and file include attacks&lt;br /&gt;
* Timing attacks&lt;br /&gt;
* Cryptography&lt;br /&gt;
&lt;br /&gt;
Where, when and how to use it effectively and securely.&lt;br /&gt;
&lt;br /&gt;
==== Advanced Design and Defense ====&lt;br /&gt;
&lt;br /&gt;
* How to secure systems against malicious users and admins.&lt;br /&gt;
* How to secure data at rest such as credit cards, banking data or other high value data.&lt;br /&gt;
* Tools&lt;br /&gt;
&lt;br /&gt;
We will also introduce some of the tools and techniques you should use to test the security of your own systems&lt;br /&gt;
This is a hands on workshop where attendees must bring their own laptops. It is required that users are local admins or root on their own machines.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Registration ==&lt;br /&gt;
&lt;br /&gt;
Registration is handled through RegOnline, and both courses are NZD$500 per person. Please follow the link below to save your seat!&lt;br /&gt;
&lt;br /&gt;
[http://www.regonline.com/owaspnzday2013trainingandsponsorship http://www.regonline.com/owaspnzday2013trainingandsponsorship]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For further information, please contact us at the follow email addresses:&lt;br /&gt;
&lt;br /&gt;
* nick.freeman@owasp.org&lt;br /&gt;
* adrian.hayes@owasp.org&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
&lt;br /&gt;
= Call For Sponsorships =&lt;br /&gt;
==Call For Sponsorships==&lt;br /&gt;
&lt;br /&gt;
OWASP New Zealand Day 2013 will be held in Auckland on the 12th of September, 2013 and is a security conference entirely dedicated to application security. The conference is once again being hosted by the University of Auckland with their support and assistance. OWASP New Zealand Day 2013 is a free event, but requires sponsor support to help be an instructive and quality event for the New Zealand community. OWASP is strictly non for profit. The sponsorship money will be used to help make OWASP New Zealand Day 2013 a free, compelling, and valuable experience for the audience.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The sponsorship funds collected are to be used for things such as:&lt;br /&gt;
&lt;br /&gt;
* Refreshments (coffee break/lunch) - we want to keep people refreshed during the day; while we certainly bring good and interesting speakers, we don't want people to go home when they become hungry. &lt;br /&gt;
* Name tags - we feel that getting to know people within the New Zealand community is important, and name tags make that possible.&lt;br /&gt;
* Promotion - up to now our events are propagating by word of mouth. We would like to get to a wider audience by advertising our events.&lt;br /&gt;
* Printed Materials - printed materials will include brochures, tags and lanyards.&lt;br /&gt;
&lt;br /&gt;
== Facts ==&lt;br /&gt;
&lt;br /&gt;
Last year, the event was supported by seven sponsors and attracted more than 250 participants. Plenty of constructive (and positive!) feedback from the audience was received and we are using this to make the conference more appealing to more people. For more information on last year's event, please visit: https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2012&lt;br /&gt;
&lt;br /&gt;
The OWASP New Zealand community is strong and there are more than 220 people currently subscribed to the mailing-list. OWASP New Zealand Day is expected to attract between 250 and 300 attendees this year.&lt;br /&gt;
&lt;br /&gt;
OWASP regular attendees are IT project managers, IT security managers, IT security consultants, web application architects and developers, QA managers, QA testers and system administrators.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Sponsorships  ==&lt;br /&gt;
&lt;br /&gt;
There are three different levels of sponsorships for the OWASP Day event:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Support Sponsorship&amp;lt;/b&amp;gt;: (Covering international speaker travel expenses, media coverage/article/promotion of the event)&lt;br /&gt;
	&lt;br /&gt;
Includes:&lt;br /&gt;
&lt;br /&gt;
* Publication of the sponsor logo on the event web site - https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2013&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Silver Sponsorship&amp;lt;/b&amp;gt;: 1500 NZD&lt;br /&gt;
&lt;br /&gt;
Includes: &lt;br /&gt;
&lt;br /&gt;
* Publication of the sponsor logo on the event web site - https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2013&lt;br /&gt;
* The publication of the sponsor logo in the event site, in the agenda, on the handouts and in all the official communications with the attendees at the conference.&lt;br /&gt;
* The possibility to distribute the company brochures, CDs or other materials to the participants during the event.&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Gold Sponsorship&amp;lt;/b&amp;gt;: 2750 NZD&lt;br /&gt;
&lt;br /&gt;
Includes: &lt;br /&gt;
&lt;br /&gt;
* The possibility to have a promotional banner or sign side stage in the main auditorium (to be provided by the sponsor, size subject to approval by the OWASP NZ Day Committee).&lt;br /&gt;
* The publication of the sponsor logo in the event site, in the agenda, on the handouts and in all the official communications with the attendees at the conference.&lt;br /&gt;
* The possibility to distribute the company brochures, CDs or other materials to the participants during the event.&lt;br /&gt;
* Publication of the sponsor logo on the OWASP New Zealand Chapter page	- Sponsor logo on the OWASP NZ site prior and during the OWASP Day event - https://www.owasp.org/index.php/New_Zealand&lt;br /&gt;
* Publication of the sponsor logo on the event web site - https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2013&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Those who are interested in sponsoring OWASP New Zealand 2013 Conference can contact the [mailto:nick.freeman@owasp.org?cc=adrian.hayes@owasp.org OWASP New Zealand Board].&amp;lt;br&amp;gt;&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]]&lt;/div&gt;</summary>
		<author><name>Adrian Hayes</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_New_Zealand_Day_2013&amp;diff=157481</id>
		<title>OWASP New Zealand Day 2013</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_New_Zealand_Day_2013&amp;diff=157481"/>
				<updated>2013-08-29T02:13:17Z</updated>
		
		<summary type="html">&lt;p&gt;Adrian Hayes: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2013 https://www.owasp.org/images/3/3e/OWASP_NZ_Day_2013_logo.png]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''11th and 12st September 2013 - Auckland'''&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
= Introduction =&lt;br /&gt;
==Introduction==&lt;br /&gt;
We are proud to announce the fifth annual OWASP New Zealand Day conference, to be held at the University of Auckland on Thursday September 12th, 2013. OWASP New Zealand Day is a one-day conference dedicated to application security, with an emphasis on secure development techniques to help Kiwi developers build more secure applications.&lt;br /&gt;
&lt;br /&gt;
Similar to last year:&lt;br /&gt;
&lt;br /&gt;
* We will be offering training on the day before the conference (Wednesday, 11th of September). &lt;br /&gt;
* After lunch on the conference day, we will split to two tracks - one focused on deep technical topics, the other on policy, compliance and risk management. &lt;br /&gt;
&lt;br /&gt;
The fifth OWASP New Zealand Day will be happening thanks to the support provided by the University of Auckland School of Business, which will kindly offer the same conference venue of the last four years. Entry to the event will, as in the past, be free. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For any comments, feedback or observations, please don't hesitate to contact [mailto:nick.freeman@owasp.org?cc=adrian.hayes@owasp.org us].&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Registration==&lt;br /&gt;
&lt;br /&gt;
Registration for the main conference day is now open: [https://registration.owasp.org.nz/ Conference Registration Here]&lt;br /&gt;
&lt;br /&gt;
There is no cost for the main conference day and lunch is provided. We do ask that if at any point you realise you cannot make it please cancel your registration to make room for others as spaces are limited.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Training Registration is now open: [http://www.regonline.com/owaspnzday2013trainingandsponsorship Training Registration]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Important dates==&lt;br /&gt;
&lt;br /&gt;
* CFP &amp;amp; CFT submission deadline:	1st August 2013&lt;br /&gt;
* Conference Registration deadline: 30th August 2013&lt;br /&gt;
* Training Registration deadline: 	30th August 2013&lt;br /&gt;
* Training Day date:				11th September 2013&lt;br /&gt;
* Conference Day date:				12th September 2013&lt;br /&gt;
&lt;br /&gt;
For those of you booking flights, ensure you can be at the venue at 8:30am, the conference will end by 5:30pm however we will have post conference drinks at a local drinking establishment for those interested.&lt;br /&gt;
&lt;br /&gt;
==Conference Venue==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
	&amp;lt;td&amp;gt;&lt;br /&gt;
		The University of Auckland Business School&amp;lt;br&amp;gt;&lt;br /&gt;
		Owen G Glenn Building&amp;lt;br&amp;gt;&lt;br /&gt;
		Room: OGGB 260-073 (OGGB4)&amp;lt;br&amp;gt;&lt;br /&gt;
		Address: 12 Grafton Road&amp;lt;br&amp;gt;&lt;br /&gt;
		Auckland&amp;lt;br&amp;gt;&lt;br /&gt;
		New Zealand&amp;lt;br&amp;gt;&lt;br /&gt;
		[http://maps.google.com/maps?oe=UTF-8&amp;amp;ie=UTF8&amp;amp;q=auckland+business+school&amp;amp;fb=1&amp;amp;split=1&amp;amp;cid=0,0,12303692579639430581&amp;amp;ei=6WeqSZr_OZLFkAWR--zbDQ&amp;amp;ll=-36.852308,174.770916&amp;amp;spn=0.01056,0.020621&amp;amp;z=16&amp;amp;iwloc=A Map]&lt;br /&gt;
	&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;td&amp;gt;&lt;br /&gt;
		[[Image:Auckland_business_school_small2.jpg]] [[Image:Room_hall.jpg]]&lt;br /&gt;
	&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Conference Sponsors==&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;bottom&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;[http://www.auckland.ac.nz/ https://www.owasp.org/images/8/82/University_of_Auckland_crest_small.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;bottom&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;[http://www.security.org.nz/NZISF_NZISForumContent.php https://www.owasp.org/images/5/5a/Nz_information_security_forum.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;ICT and Department of Information Systems and Operations Management&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Gold Sponsors:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com https://www.owasp.org/images/4/41/SA_Logo_w_DD.gif]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[[File:INSOMNIA.PNG|center|350px|link=http://www.insomniasec.com/]]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com www.security-assessment.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.insomniasec.com Insomnia Security]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Silver Sponsors:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[[File:Qualys logo small.png|center|200px|link=]]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[https://www.qualys.com/ www.qualys.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[[File:Orionhealth_logo_small.png|center|200px|link=]]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.orionhealth.com/ www.orionhealth.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Conference Committee==&lt;br /&gt;
&lt;br /&gt;
* Nick Freeman - OWASP New Zealand Leader (Auckland)&lt;br /&gt;
* Adrian Hayes -  OWASP New Zealand Leader (Wellington)&lt;br /&gt;
* Lech Janczewski - Associate Professor - University of Auckland School of Business&lt;br /&gt;
&lt;br /&gt;
Please direct all enquiries to nick.freeman@owasp.org and adrian.hayes@owasp.org.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Presentation Schedule =&lt;br /&gt;
==Presentation Schedule==&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
12st September 2013&lt;br /&gt;
&amp;lt;table width=&amp;quot;80%&amp;quot;&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;08:30&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #8595C2&amp;quot;&amp;gt;Registration&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;09:00&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Welcome to OWASP New Zealand Day 2013&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Nick Freema and Adrian Hayes (OWASP Leaders)&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;09:10&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #B9C2DC; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Securing the Web Without Site-Specific Passwords&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Francois Marier - Mozilla&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;09:50&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;What's Our Software Doing With All That User Input&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Kim Carter - BinaryMist&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;10:30&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #D98B66; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Break for Morning Tea&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;11:00&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Bug Chaining (aka, why XSS can be worse than you think) &amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Hugh Davenport - Aura RedEye Security&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;11:30&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #B9C2DC; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;OWASP Top 10 Mobile Risks - An Introduction By Case Study&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Mark Piper - Insomnia Security&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;12:30&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #D98B66; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Break for Lunch&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;13:30&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Improving XPath Injection with Binary Search Optimizations&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Paul Haas - Security-Assessment.com&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Nothing to See Here!&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Andrew Kelly&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;14:15&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #B9C2DC; ; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Bad Smells That Lead to Bad Security&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Kirk Jackson - Xero and Andy Prow - Aura&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;background-color: #B9C2DC; ; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Evolution of threats and the skills in your security team&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Hinne Hettema - University of Auckland&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;14:45&amp;lt;/td&amp;gt;&lt;br /&gt;
&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Security Vulnerability Disclosure&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Nick von Dadelszen - Lateral Security&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;15:00&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Serialization formats aren't toys&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Tom Eastman  - Catalyst IT&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;15:30&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #D98B66; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Break for Afternoon Tea&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;16:00&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Discussion Panel&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;An open discussion with our speakers on current security topics&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;16:30&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #B9C2DC; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Wrap Up&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Time for the pub, for those interested&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;	&lt;br /&gt;
	&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Speakers List=&lt;br /&gt;
==Speakers List==&lt;br /&gt;
&lt;br /&gt;
===Tom Eastman  - Catalyst IT - Serialization Formats Aren't Toys===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Do you have an API? Do you accept input from users? Do you accept it in XML? What about YAML? Or maybe JSON? How safe are you? How sure are you? It's not in the OWASP Top 10, but you don't have to look far to hear stories of security vulnerabilities involving deserialization user inputs. Why do they keep happening?&lt;br /&gt;
&lt;br /&gt;
In this talk I'll go over what the threat is, how you might be making yourself vulnerable and how to mitigate the problem. I'll cover the features (not bugs, features) of formats like XML, YAML, and JSON that make them surprisingly dangerous, and how to protect your code from them.&lt;br /&gt;
&lt;br /&gt;
Because here's the thing: If you are using, say, a compliant, properly implemented XML parser to parse your XML, you are NOT safe. Possibly quite the opposite. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Tom is a senior Python developer and technical lead for Catalyst IT, New Zealand's largest company specialising in open source. Prior to that he worked as a developer and system administrator for the University of Otago Faculty of Medicine and as a Computer Science tutor for same.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Paul Haas - Security-Assessment.com -  Improving XPath Injection with Binary Search Optimisations===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
XPath injection is technique similar to SQL injection for attacking XML processors, however many people are unaware of the technique and exploitation vectors. This talk aims to expand awareness of both the risks and remediation path in addition to the introduction of a new technique to significantly improve reconstruction speed of the backend XML document. A brief primer to XPath injection will also be covered within the talk.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Paul Haas hails from California where the waves are better but the quakes are not. With over nine years of experience in professional hacking, he is currently working with Security-Assessment.com in Wellington to bring the good word of web hacks to Kiwis everywhere. His sole hobby is driving people into Mario Kart's abyss.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Nick von Dadelszen - Lateral Security - Security Vulnerability Disclosure===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Disclosing security vulnerabilities can be a dangerous business. While there are systems in place for handling disclosures to most major software companies, the process for disclosing vulnerabilities to local organisations is a lot less discussed.&lt;br /&gt;
&lt;br /&gt;
As the discloser, there is always the chance that you are accused of hacking and get a visit from the police merely for identifying an issue. As an organisation, you can find yourself on the front page of the news when someone goes public with an issue.&lt;br /&gt;
&lt;br /&gt;
This talk outlines the dilemmas faced when stumbling across that SQL injection in the local shopping site and proposes mechanisms to safely get the right people told about it. It also discusses how organisations can make it more likely that security vulnerabilities are reported to them directly, rather than through the press.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Nick von Dadelszen is the technical director at Lateral Security. Nick has been performing professional penetration testing for over 12 years and has managed several successful penetration testing teams. He has worked with the majority of large corporates and Government agencies in New Zealand and is a regular presenter at OWASP and Kiwicon conferences.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Mark Piper - Insomnia Security - OWASP Top 10 Mobile Risks - An Introduction By Case Study===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
As mobile application usage explodes, so does the associated application&lt;br /&gt;
security issues. The OWASP Mobile Security Project includes an&lt;br /&gt;
initiative to categorise and rate these issues into a top 10 format.&lt;br /&gt;
This list is known as the Top 10 Mobile Risks.&lt;br /&gt;
&lt;br /&gt;
During the session, we will introduce the current (RC1) Top 10 supported&lt;br /&gt;
with several real world case studies of issues.  We will cover how the&lt;br /&gt;
issues were identified, how they may be exploited by attackers and what&lt;br /&gt;
mitigation's could be implemented to resolve the issues in the future.&lt;br /&gt;
While the issues will be largely platform agnostic, the examples will&lt;br /&gt;
cover both iOS and Android environments.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Mark is a Principal Security Consultant with the Insomnia Security&lt;br /&gt;
team. Mark spends his days auditing software, running penetration&lt;br /&gt;
testing and red team engagements while working with global customers on&lt;br /&gt;
developing new testing services.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Kirk Jackson and Andy Prow - Xero and Aura Security - Bad Smells That Lead to Bad Security===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Your job as a defender is to reduce the attack surface of your web application and protect your infrastructure and data from being breached. However we can't be involved in every decision that goes on in our organisation, and we don't always think the same as an attacker does. This talk will introduce you to some common &amp;quot;bad smells&amp;quot; that might indicate security issues lurking under the surface of your code, and help you develop your spidey sense so that you know when to raise the alarm.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Kirk is the Security Officer at Xero, and is interested in writing and defending secure web applications.&lt;br /&gt;
&lt;br /&gt;
Andy Prow is an IT Security Consultant, Trainer and software developer who founded Aura back in 2001. With 19 years in the IT industry Andy has developed code for IBM, Vodafone, Telecom and Microsoft. Andy presents around the world at conferences including Microsoft's TechEd.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Kim Carter - BinaryMist - What's Our Software Doing With All That User Input===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
What are we doing with all the characters that get shoved into our applications? Have we considered every potential execution context?&lt;br /&gt;
It's often interesting and surprising to see what sort of concoction of characters can be executed in different places... and linking multiple attack vectors together which the builders haven't thought about.&lt;br /&gt;
What are we trusting? Why are we trusting it? What, where and how should we be sanitising?&lt;br /&gt;
&lt;br /&gt;
We have a vast collection of libraries, techniques, cheat sheets, tutorials, guides and tools at our disposal.&lt;br /&gt;
I often find myself thinking... how can we commoditise the sanitisation of user input and I keep coming up with the same answer.&lt;br /&gt;
It's not easy. Every application has a completely different set of concerns.&lt;br /&gt;
&lt;br /&gt;
In order for our software to be shielded from an attack, the builders must think like attackers.&lt;br /&gt;
&lt;br /&gt;
In this talk I'll attempt to:&lt;br /&gt;
&lt;br /&gt;
* Increase our knowledge and awareness&lt;br /&gt;
* Discuss practical techniques and approaches that increase our defences&lt;br /&gt;
* Break some software&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Kim Carter is a Software Engineer, Architect, Entrepreneur and the founder of BinaryMist. He is passionate about and enjoys many things. Some of which include:&lt;br /&gt;
* Designing and creating robust software and networks.&lt;br /&gt;
* Breaking his and others software and networks, then fixing it/them.&lt;br /&gt;
* Teaching, training, mentoring, motivating, listening to and being around smart people.&lt;br /&gt;
* Increasing quality awareness and helping people and organisations implement higher quality in a cost effective manner.&lt;br /&gt;
* Improving operational efficiencies.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Hugh Davenport - Aura RedEye Security - Bug Chaining (aka, why XSS can be worse than you think) ===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Security bugs can range in damage from small stuff, all the way to big stuff. Some people only focus on the large stuff, and the smaller stuff can go unnoticed. This talk will give a real world example of a project that had a small bug, that allowed a larger bug to happen, which allowed a larger bug, which allowed for unwanted shell access. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Hugh works at Aura RedEye Security on their managed vulnerability scanning service. In his spare time, he is the security point of contact on the Mahara open source tool and contributes to many other open source projects. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Hinne Hettema - University of Auckland - Evolution of Threats and the Skills in our Security Team===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The threat landscape for security threats is constantly evolving, with new threats being stealthier, more diverse, and increasingly aimed at bypassing the protection offered by antivirus and network intrusion detection systems. Adversaries are now often part of a semi-organised underground economy geared towards the acquisition and sale of digital assets such as usernames, passwords, confidential business information, financial data and designs. There are specific value chains in this economy, which make the acquisition, sale and utilisation of such assets a relatively easy process.&lt;br /&gt;
&lt;br /&gt;
This talk focuses on the skills needed in a security team to deal with this next level of threat, and on the sort of teams that we need in enterprise security to address the modern threats that we face.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Hinne Hettema is the team leader of the IT security team at The University of Auckland, an honorary research fellow in the Department of Philosophy at The University of Auckland, and lectures in cyber security at Unitec. He has 10 years experience in security consulting and has a PhD in Philosophy (2012) and theoretical chemistry (1993).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Francois Marier - Mozilla - Securing the Web Without Site-Specific Passwords===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Has anyone else noticed that the OWASP Top 10 is not changing very much?&lt;br /&gt;
Especially in the realm of authentication-related problems. I don't&lt;br /&gt;
claim to have the one true solution for this, but one thing is certain:&lt;br /&gt;
if we change how things are done on the web and relieve developers from&lt;br /&gt;
having to store passwords, we can make things better.&lt;br /&gt;
&lt;br /&gt;
We need to let web developers outsource their authentication needs to&lt;br /&gt;
people who can do it well. Does that mean we should force all of our&lt;br /&gt;
users to join Facebook? Well not really. That might work for some sites,&lt;br /&gt;
but outsourcing all of our logins to a single for-profit company isn't a&lt;br /&gt;
solution that works for the whole web.&lt;br /&gt;
&lt;br /&gt;
The open web needs a better solution. One that enable users to choose&lt;br /&gt;
their identity provider and shop for the most secure one if that's what&lt;br /&gt;
they're into. This is the promise behind Persona and the BrowserID&lt;br /&gt;
protocol. Choose your email provider carefully and let's get rid of all&lt;br /&gt;
of these site-specific passwords that are just sitting there waiting to&lt;br /&gt;
be leaked and cracked.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Francois is a software engineer and security champion on the Mozilla Identity team where he works on decentralising authentication on the web. A long time Debian developer, Francois has been involved in Open Source and web development for a while and has always had a strong interest in security.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Andrew Kelly - Nothing to See Here!===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This is how it starts: &amp;quot;Seeking an exciting new challenge? Want to be responsible for building and shaping an embryonic information security function? Then you so won't want to miss this golden opportunity!&amp;quot; Andrew will talk about the setting up of an information security function in an organisation from scratch ('Greenfield') - as opposed to trying to bed yourself down into an already-existing organisation ('Brownfield'). He'll talk about the pros and the cons, and the many ups and downs. And hopefully he'll answer some questions like: Is there, if fact, any such thing as a greenfield security opportunity left in the wild? And ... if such mythical beasties do exist ... are they worth signing on for? Andrew will discuss the pitfalls and pratfalls of the journey from initial engagement, through (maybe) acceptance, until (perhaps) security sign-off and (hopefully) go-live. He'll also discuss both the Pit Bulls and prats you're likely to meet along the way. So ... if you want to hear a guy speak who reckons he's forgotten more than he ever thought he knew? Then this is so the talk for you!&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Andrew is a whole year older than he was when he presented at last year's OWASP Day: So this time around he's bringing a quarter century's worth of IT security experience to OWASP! Now 25 years ago, he was this mainframe security uber-tech - but today Andrew's recognised as being a 'pragmatic' subject-matter expert on corporate-level information security policy, compliance, frameworks and governance. His first greenfield security 'opportunity' came in November 1989 at the Sun Life Assurance Company of Canada, in the UK. And during those intervening 24 years, he's had similar experiences at various other companies including the likes of Lloyds/TSB Bank, Fonterra, BT Syntegra, Telecom/Gen-i and, lately, Health Benefits Ltd. - amongst many others.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
= Call For Presentations =&lt;br /&gt;
==Call For Presentations==&lt;br /&gt;
&lt;br /&gt;
OWASP New Zealand Day conferences attract a high quality of speakers from a variety of security disciplines including web developers, system administrators, penetration testers, policy specialists and more. We encourage presentations to have a strong component on fixing and prevention of security issues. We are looking for presentations on a wide variety of security topics, including but not limited to:&lt;br /&gt;
&lt;br /&gt;
* Web application security&lt;br /&gt;
* Mobile security&lt;br /&gt;
* Secure development&lt;br /&gt;
* Vulnerability analysis&lt;br /&gt;
* Threat modelling&lt;br /&gt;
* Threat and vulnerability countermeasures&lt;br /&gt;
* Platform or language security (.NET, Java, RoR, etc)&lt;br /&gt;
* Penetration Testing&lt;br /&gt;
* Browser and client security&lt;br /&gt;
* Application and solution architecture security&lt;br /&gt;
* PCI DSS&lt;br /&gt;
* Risk management&lt;br /&gt;
* Security concepts for C*Os, project managers and other non-technical attendees&lt;br /&gt;
* Privacy controls&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The email subject must be &amp;quot;OWASP New Zealand 2013: CFP&amp;quot; and the email body must contains the following information/sections:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name and Surname&lt;br /&gt;
* Affiliation&lt;br /&gt;
* Telephone number&lt;br /&gt;
* Email address&lt;br /&gt;
* Short presenter bio&lt;br /&gt;
* Title of the contribution&lt;br /&gt;
* Type of contribution: Technical, Informative, Management&lt;br /&gt;
* Short abstract (up to 500 words)&lt;br /&gt;
* List of the author's previous papers/articles/speeches on the same topic&lt;br /&gt;
* If you are not from New Zealand, will your company support your travel/accommodation costs? - Yes/No&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The submission will be reviewed by the OWASP New Zealand Day CFP Review Board and the highest voted talks will be selected and invited for presentation.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
PLEASE NOTE:&lt;br /&gt;
* Due to limited budget available, expenses for international speakers cannot be covered.&lt;br /&gt;
* If your company is willing to cover travel and accommodation costs, the company will become &amp;quot;Support Sponsor&amp;quot; of the event.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Please submit the above information to both Nick Freeman and Adrian Hayes - nick.freeman@owasp.org and adrian.hayes@owasp.org&lt;br /&gt;
&lt;br /&gt;
Submissions deadline: 1st August 2013&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Training =&lt;br /&gt;
==Training Events==&lt;br /&gt;
&lt;br /&gt;
We are happy to announce that training will run on Wednesday September 11th 2013, the day before the OWASP Day conference. Both courses will be running from '''9:00 AM sharp''' to '''5:00PM'''.The training venues will be auditoriums kindly provided by the University of Auckland, in the same building as the OWASP Day conference itself. Classes will contain up to 20 students, and each seat has power for laptop usage. Both courses will be run by Aura Information Security, and there is both a basic and advanced course available. Feedback from previous training has been very positive - so get in quick! Details are as follows:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Basic Web Application Security ===&lt;br /&gt;
These days websites are under constant attack and it's incredibly easy for a developer or administrator to make seemingly minor mistakes that introduce security vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
You can't fight a war that you don't know you're waging. You can't defend your websites against attack unless you know the tricks the attackers are using to infiltrate. By the end of this workshop you'll have a good understanding of the OWASP Top 10 including:&lt;br /&gt;
&lt;br /&gt;
* Cross-Site Scripting (XSS)&lt;br /&gt;
* Cross-Site Request Forgery (CSRF)&lt;br /&gt;
* SQL Injection&lt;br /&gt;
* Man-In-the-Middle attacks&lt;br /&gt;
* Layering your defenses (defense-in-depth) that can help protect you from exploit chaining.&lt;br /&gt;
&lt;br /&gt;
More importantly, however, you'll also learn how to minimise the risk from these and other attacks, with practical tips that you can apply straight away to help you design, build and manage more secure websites. This workshop is essential for:&lt;br /&gt;
&lt;br /&gt;
* All developers and designers working on web applications but without formal training in security&lt;br /&gt;
* Anyone working in the website / web application space&lt;br /&gt;
* IT Professionals interested in security issues&lt;br /&gt;
&lt;br /&gt;
This is a hands on workshop where attendees must bring their own laptops. It is required that users are local admins or root on their own machines.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Advanced Web Application Security ===&lt;br /&gt;
This advanced web security course is for senior or experienced developers who are looking for a deeper understanding of web security, beyond the OWASP Top 10. By the end of this workshop you'll have a good understanding of:&lt;br /&gt;
&lt;br /&gt;
==== Advanced Attacks ====&lt;br /&gt;
&lt;br /&gt;
We will run through more complex attacks against web-apps using layered attacks requiring a multi-step defense including&lt;br /&gt;
&lt;br /&gt;
* Malicious file uploads and web shells &lt;br /&gt;
* XXS shells&lt;br /&gt;
* Padding oracle attacks &lt;br /&gt;
* XXE injection attacks &lt;br /&gt;
* Serialisation and file include attacks&lt;br /&gt;
* Timing attacks&lt;br /&gt;
* Cryptography&lt;br /&gt;
&lt;br /&gt;
Where, when and how to use it effectively and securely.&lt;br /&gt;
&lt;br /&gt;
==== Advanced Design and Defense ====&lt;br /&gt;
&lt;br /&gt;
* How to secure systems against malicious users and admins.&lt;br /&gt;
* How to secure data at rest such as credit cards, banking data or other high value data.&lt;br /&gt;
* Tools&lt;br /&gt;
&lt;br /&gt;
We will also introduce some of the tools and techniques you should use to test the security of your own systems&lt;br /&gt;
This is a hands on workshop where attendees must bring their own laptops. It is required that users are local admins or root on their own machines.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Registration ==&lt;br /&gt;
&lt;br /&gt;
Registration is handled through RegOnline, and both courses are NZD$500 per person. Please follow the link below to save your seat!&lt;br /&gt;
&lt;br /&gt;
[http://www.regonline.com/owaspnzday2013trainingandsponsorship http://www.regonline.com/owaspnzday2013trainingandsponsorship]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For further information, please contact us at the follow email addresses:&lt;br /&gt;
&lt;br /&gt;
* nick.freeman@owasp.org&lt;br /&gt;
* adrian.hayes@owasp.org&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
&lt;br /&gt;
= Call For Sponsorships =&lt;br /&gt;
==Call For Sponsorships==&lt;br /&gt;
&lt;br /&gt;
OWASP New Zealand Day 2013 will be held in Auckland on the 12th of September, 2013 and is a security conference entirely dedicated to application security. The conference is once again being hosted by the University of Auckland with their support and assistance. OWASP New Zealand Day 2013 is a free event, but requires sponsor support to help be an instructive and quality event for the New Zealand community. OWASP is strictly non for profit. The sponsorship money will be used to help make OWASP New Zealand Day 2013 a free, compelling, and valuable experience for the audience.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The sponsorship funds collected are to be used for things such as:&lt;br /&gt;
&lt;br /&gt;
* Refreshments (coffee break/lunch) - we want to keep people refreshed during the day; while we certainly bring good and interesting speakers, we don't want people to go home when they become hungry. &lt;br /&gt;
* Name tags - we feel that getting to know people within the New Zealand community is important, and name tags make that possible.&lt;br /&gt;
* Promotion - up to now our events are propagating by word of mouth. We would like to get to a wider audience by advertising our events.&lt;br /&gt;
* Printed Materials - printed materials will include brochures, tags and lanyards.&lt;br /&gt;
&lt;br /&gt;
== Facts ==&lt;br /&gt;
&lt;br /&gt;
Last year, the event was supported by seven sponsors and attracted more than 250 participants. Plenty of constructive (and positive!) feedback from the audience was received and we are using this to make the conference more appealing to more people. For more information on last year's event, please visit: https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2012&lt;br /&gt;
&lt;br /&gt;
The OWASP New Zealand community is strong and there are more than 220 people currently subscribed to the mailing-list. OWASP New Zealand Day is expected to attract between 250 and 300 attendees this year.&lt;br /&gt;
&lt;br /&gt;
OWASP regular attendees are IT project managers, IT security managers, IT security consultants, web application architects and developers, QA managers, QA testers and system administrators.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Sponsorships  ==&lt;br /&gt;
&lt;br /&gt;
There are three different levels of sponsorships for the OWASP Day event:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Support Sponsorship&amp;lt;/b&amp;gt;: (Covering international speaker travel expenses, media coverage/article/promotion of the event)&lt;br /&gt;
	&lt;br /&gt;
Includes:&lt;br /&gt;
&lt;br /&gt;
* Publication of the sponsor logo on the event web site - https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2013&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Silver Sponsorship&amp;lt;/b&amp;gt;: 1500 NZD&lt;br /&gt;
&lt;br /&gt;
Includes: &lt;br /&gt;
&lt;br /&gt;
* Publication of the sponsor logo on the event web site - https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2013&lt;br /&gt;
* The publication of the sponsor logo in the event site, in the agenda, on the handouts and in all the official communications with the attendees at the conference.&lt;br /&gt;
* The possibility to distribute the company brochures, CDs or other materials to the participants during the event.&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Gold Sponsorship&amp;lt;/b&amp;gt;: 2750 NZD&lt;br /&gt;
&lt;br /&gt;
Includes: &lt;br /&gt;
&lt;br /&gt;
* The possibility to have a promotional banner or sign side stage in the main auditorium (to be provided by the sponsor, size subject to approval by the OWASP NZ Day Committee).&lt;br /&gt;
* The publication of the sponsor logo in the event site, in the agenda, on the handouts and in all the official communications with the attendees at the conference.&lt;br /&gt;
* The possibility to distribute the company brochures, CDs or other materials to the participants during the event.&lt;br /&gt;
* Publication of the sponsor logo on the OWASP New Zealand Chapter page	- Sponsor logo on the OWASP NZ site prior and during the OWASP Day event - https://www.owasp.org/index.php/New_Zealand&lt;br /&gt;
* Publication of the sponsor logo on the event web site - https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2013&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Those who are interested in sponsoring OWASP New Zealand 2013 Conference can contact the [mailto:nick.freeman@owasp.org?cc=adrian.hayes@owasp.org OWASP New Zealand Board].&amp;lt;br&amp;gt;&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]]&lt;/div&gt;</summary>
		<author><name>Adrian Hayes</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_New_Zealand_Day_2013&amp;diff=157442</id>
		<title>OWASP New Zealand Day 2013</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_New_Zealand_Day_2013&amp;diff=157442"/>
				<updated>2013-08-28T03:32:48Z</updated>
		
		<summary type="html">&lt;p&gt;Adrian Hayes: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2013 https://www.owasp.org/images/3/3e/OWASP_NZ_Day_2013_logo.png]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''11th and 12st September 2013 - Auckland'''&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
= Introduction =&lt;br /&gt;
==Introduction==&lt;br /&gt;
We are proud to announce the fifth annual OWASP New Zealand Day conference, to be held at the University of Auckland on Thursday September 12th, 2013. OWASP New Zealand Day is a one-day conference dedicated to application security, with an emphasis on secure development techniques to help Kiwi developers build more secure applications.&lt;br /&gt;
&lt;br /&gt;
Similar to last year:&lt;br /&gt;
&lt;br /&gt;
* We will be offering training on the day before the conference (Wednesday, 11th of September). &lt;br /&gt;
* After lunch on the conference day, we will split to two tracks - one focused on deep technical topics, the other on policy, compliance and risk management. &lt;br /&gt;
&lt;br /&gt;
The fifth OWASP New Zealand Day will be happening thanks to the support provided by the University of Auckland School of Business, which will kindly offer the same conference venue of the last four years. Entry to the event will, as in the past, be free. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For any comments, feedback or observations, please don't hesitate to contact [mailto:nick.freeman@owasp.org?cc=adrian.hayes@owasp.org us].&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Registration==&lt;br /&gt;
&lt;br /&gt;
Registration for the main conference day is now open: [https://registration.owasp.org.nz/ Conference Registration Here]&lt;br /&gt;
&lt;br /&gt;
There is no cost for the main conference day and lunch is provided. We do ask that if at any point you realise you cannot make it please cancel your registration to make room for others as spaces are limited.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Training Registration is now open: [http://www.regonline.com/owaspnzday2013trainingandsponsorship Training Registration]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Important dates==&lt;br /&gt;
&lt;br /&gt;
* CFP &amp;amp; CFT submission deadline:	1st August 2013&lt;br /&gt;
* Conference Registration deadline: 30th August 2013&lt;br /&gt;
* Training Registration deadline: 	30th August 2013&lt;br /&gt;
* Training Day date:				11th September 2013&lt;br /&gt;
* Conference Day date:				12th September 2013&lt;br /&gt;
&lt;br /&gt;
For those of you booking flights, ensure you can be at the venue at 8:30am, the conference will end by 5:30pm however we will have post conference drinks at a local drinking establishment for those interested.&lt;br /&gt;
&lt;br /&gt;
==Conference Venue==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
	&amp;lt;td&amp;gt;&lt;br /&gt;
		The University of Auckland Business School&amp;lt;br&amp;gt;&lt;br /&gt;
		Owen G Glenn Building&amp;lt;br&amp;gt;&lt;br /&gt;
		Room: OGGB 260-073 (OGGB4)&amp;lt;br&amp;gt;&lt;br /&gt;
		Address: 12 Grafton Road&amp;lt;br&amp;gt;&lt;br /&gt;
		Auckland&amp;lt;br&amp;gt;&lt;br /&gt;
		New Zealand&amp;lt;br&amp;gt;&lt;br /&gt;
		[http://maps.google.com/maps?oe=UTF-8&amp;amp;ie=UTF8&amp;amp;q=auckland+business+school&amp;amp;fb=1&amp;amp;split=1&amp;amp;cid=0,0,12303692579639430581&amp;amp;ei=6WeqSZr_OZLFkAWR--zbDQ&amp;amp;ll=-36.852308,174.770916&amp;amp;spn=0.01056,0.020621&amp;amp;z=16&amp;amp;iwloc=A Map]&lt;br /&gt;
	&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;td&amp;gt;&lt;br /&gt;
		[[Image:Auckland_business_school_small2.jpg]] [[Image:Room_hall.jpg]]&lt;br /&gt;
	&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Conference Sponsors==&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;bottom&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;[http://www.auckland.ac.nz/ https://www.owasp.org/images/8/82/University_of_Auckland_crest_small.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;bottom&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;[http://www.security.org.nz/NZISF_NZISForumContent.php https://www.owasp.org/images/5/5a/Nz_information_security_forum.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;ICT and Department of Information Systems and Operations Management&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Gold Sponsors:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com https://www.owasp.org/images/4/41/SA_Logo_w_DD.gif]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[[File:INSOMNIA.PNG|center|350px|link=http://www.insomniasec.com/]]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com www.security-assessment.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.insomniasec.com Insomnia Security]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Silver Sponsors:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[[File:Qualys logo small.png|center|200px|link=]]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[https://www.qualys.com/ www.qualys.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[[File:Orionhealth_logo_small.png|center|200px|link=]]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.orionhealth.com/ www.orionhealth.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Conference Committee==&lt;br /&gt;
&lt;br /&gt;
* Nick Freeman - OWASP New Zealand Leader (Auckland)&lt;br /&gt;
* Adrian Hayes -  OWASP New Zealand Leader (Wellington)&lt;br /&gt;
* Lech Janczewski - Associate Professor - University of Auckland School of Business&lt;br /&gt;
&lt;br /&gt;
Please direct all enquiries to nick.freeman@owasp.org and adrian.hayes@owasp.org.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Speakers List=&lt;br /&gt;
==Speakers List==&lt;br /&gt;
&lt;br /&gt;
===Tom Eastman  - Catalyst IT - Serialization Formats Aren't Toys===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Do you have an API? Do you accept input from users? Do you accept it in XML? What about YAML? Or maybe JSON? How safe are you? How sure are you? It's not in the OWASP Top 10, but you don't have to look far to hear stories of security vulnerabilities involving deserialization user inputs. Why do they keep happening?&lt;br /&gt;
&lt;br /&gt;
In this talk I'll go over what the threat is, how you might be making yourself vulnerable and how to mitigate the problem. I'll cover the features (not bugs, features) of formats like XML, YAML, and JSON that make them surprisingly dangerous, and how to protect your code from them.&lt;br /&gt;
&lt;br /&gt;
Because here's the thing: If you are using, say, a compliant, properly implemented XML parser to parse your XML, you are NOT safe. Possibly quite the opposite. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Tom is a senior Python developer and technical lead for Catalyst IT, New Zealand's largest company specialising in open source. Prior to that he worked as a developer and system administrator for the University of Otago Faculty of Medicine and as a Computer Science tutor for same.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Paul Haas - Security-Assessment.com -  Improving XPath Injection with Binary Search Optimisations===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
XPath injection is technique similar to SQL injection for attacking XML processors, however many people are unaware of the technique and exploitation vectors. This talk aims to expand awareness of both the risks and remediation path in addition to the introduction of a new technique to significantly improve reconstruction speed of the backend XML document. A brief primer to XPath injection will also be covered within the talk.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Paul Haas hails from California where the waves are better but the quakes are not. With over nine years of experience in professional hacking, he is currently working with Security-Assessment.com in Wellington to bring the good word of web hacks to Kiwis everywhere. His sole hobby is driving people into Mario Kart's abyss.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Nick von Dadelszen - Lateral Security - Security Vulnerability Disclosure===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Disclosing security vulnerabilities can be a dangerous business. While there are systems in place for handling disclosures to most major software companies, the process for disclosing vulnerabilities to local organisations is a lot less discussed.&lt;br /&gt;
&lt;br /&gt;
As the discloser, there is always the chance that you are accused of hacking and get a visit from the police merely for identifying an issue. As an organisation, you can find yourself on the front page of the news when someone goes public with an issue.&lt;br /&gt;
&lt;br /&gt;
This talk outlines the dilemmas faced when stumbling across that SQL injection in the local shopping site and proposes mechanisms to safely get the right people told about it. It also discusses how organisations can make it more likely that security vulnerabilities are reported to them directly, rather than through the press.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Nick von Dadelszen is the technical director at Lateral Security. Nick has been performing professional penetration testing for over 12 years and has managed several successful penetration testing teams. He has worked with the majority of large corporates and Government agencies in New Zealand and is a regular presenter at OWASP and Kiwicon conferences.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Mark Piper - Insomnia Security - OWASP Top 10 Mobile Risks - An Introduction By Case Study===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
As mobile application usage explodes, so does the associated application&lt;br /&gt;
security issues. The OWASP Mobile Security Project includes an&lt;br /&gt;
initiative to categorise and rate these issues into a top 10 format.&lt;br /&gt;
This list is known as the Top 10 Mobile Risks.&lt;br /&gt;
&lt;br /&gt;
During the session, we will introduce the current (RC1) Top 10 supported&lt;br /&gt;
with several real world case studies of issues.  We will cover how the&lt;br /&gt;
issues were identified, how they may be exploited by attackers and what&lt;br /&gt;
mitigation's could be implemented to resolve the issues in the future.&lt;br /&gt;
While the issues will be largely platform agnostic, the examples will&lt;br /&gt;
cover both iOS and Android environments.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Mark is a Principal Security Consultant with the Insomnia Security&lt;br /&gt;
team. Mark spends his days auditing software, running penetration&lt;br /&gt;
testing and red team engagements while working with global customers on&lt;br /&gt;
developing new testing services.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Kirk Jackson and Andy Prow - Xero and Aura Security - Bad Smells That Lead to Bad Security===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Your job as a defender is to reduce the attack surface of your web application and protect your infrastructure and data from being breached. However we can't be involved in every decision that goes on in our organisation, and we don't always think the same as an attacker does. This talk will introduce you to some common &amp;quot;bad smells&amp;quot; that might indicate security issues lurking under the surface of your code, and help you develop your spidey sense so that you know when to raise the alarm.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Kirk is the Security Officer at Xero, and is interested in writing and defending secure web applications.&lt;br /&gt;
&lt;br /&gt;
Andy Prow is an IT Security Consultant, Trainer and software developer who founded Aura back in 2001. With 19 years in the IT industry Andy has developed code for IBM, Vodafone, Telecom and Microsoft. Andy presents around the world at conferences including Microsoft's TechEd.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Kim Carter - BinaryMist - What's Our Software Doing With All That User Input===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
What are we doing with all the characters that get shoved into our applications? Have we considered every potential execution context?&lt;br /&gt;
It's often interesting and surprising to see what sort of concoction of characters can be executed in different places... and linking multiple attack vectors together which the builders haven't thought about.&lt;br /&gt;
What are we trusting? Why are we trusting it? What, where and how should we be sanitising?&lt;br /&gt;
&lt;br /&gt;
We have a vast collection of libraries, techniques, cheat sheets, tutorials, guides and tools at our disposal.&lt;br /&gt;
I often find myself thinking... how can we commoditise the sanitisation of user input and I keep coming up with the same answer.&lt;br /&gt;
It's not easy. Every application has a completely different set of concerns.&lt;br /&gt;
&lt;br /&gt;
In order for our software to be shielded from an attack, the builders must think like attackers.&lt;br /&gt;
&lt;br /&gt;
In this talk I'll attempt to:&lt;br /&gt;
&lt;br /&gt;
* Increase our knowledge and awareness&lt;br /&gt;
* Discuss practical techniques and approaches that increase our defences&lt;br /&gt;
* Break some software&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Kim Carter is a Software Engineer, Architect, Entrepreneur and the founder of BinaryMist. He is passionate about and enjoys many things. Some of which include:&lt;br /&gt;
* Designing and creating robust software and networks.&lt;br /&gt;
* Breaking his and others software and networks, then fixing it/them.&lt;br /&gt;
* Teaching, training, mentoring, motivating, listening to and being around smart people.&lt;br /&gt;
* Increasing quality awareness and helping people and organisations implement higher quality in a cost effective manner.&lt;br /&gt;
* Improving operational efficiencies.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Hugh Davenport - Aura RedEye Security - Bug Chaining (aka, why XSS can be worse than you think) ===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Security bugs can range in damage from small stuff, all the way to big stuff. Some people only focus on the large stuff, and the smaller stuff can go unnoticed. This talk will give a real world example of a project that had a small bug, that allowed a larger bug to happen, which allowed a larger bug, which allowed for unwanted shell access. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Hugh works at Aura RedEye Security on their managed vulnerability scanning service. In his spare time, he is the security point of contact on the Mahara open source tool and contributes to many other open source projects. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Hinne Hettema - University of Auckland - Evolution of Threats and the Skills in our Security Team===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The threat landscape for security threats is constantly evolving, with new threats being stealthier, more diverse, and increasingly aimed at bypassing the protection offered by antivirus and network intrusion detection systems. Adversaries are now often part of a semi-organised underground economy geared towards the acquisition and sale of digital assets such as usernames, passwords, confidential business information, financial data and designs. There are specific value chains in this economy, which make the acquisition, sale and utilisation of such assets a relatively easy process.&lt;br /&gt;
&lt;br /&gt;
This talk focuses on the skills needed in a security team to deal with this next level of threat, and on the sort of teams that we need in enterprise security to address the modern threats that we face.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Hinne Hettema is the team leader of the IT security team at The University of Auckland, an honorary research fellow in the Department of Philosophy at The University of Auckland, and lectures in cyber security at Unitec. He has 10 years experience in security consulting and has a PhD in Philosophy (2012) and theoretical chemistry (1993).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Francois Marier - Mozilla - Securing the Web Without Site-Specific Passwords===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Has anyone else noticed that the OWASP Top 10 is not changing very much?&lt;br /&gt;
Especially in the realm of authentication-related problems. I don't&lt;br /&gt;
claim to have the one true solution for this, but one thing is certain:&lt;br /&gt;
if we change how things are done on the web and relieve developers from&lt;br /&gt;
having to store passwords, we can make things better.&lt;br /&gt;
&lt;br /&gt;
We need to let web developers outsource their authentication needs to&lt;br /&gt;
people who can do it well. Does that mean we should force all of our&lt;br /&gt;
users to join Facebook? Well not really. That might work for some sites,&lt;br /&gt;
but outsourcing all of our logins to a single for-profit company isn't a&lt;br /&gt;
solution that works for the whole web.&lt;br /&gt;
&lt;br /&gt;
The open web needs a better solution. One that enable users to choose&lt;br /&gt;
their identity provider and shop for the most secure one if that's what&lt;br /&gt;
they're into. This is the promise behind Persona and the BrowserID&lt;br /&gt;
protocol. Choose your email provider carefully and let's get rid of all&lt;br /&gt;
of these site-specific passwords that are just sitting there waiting to&lt;br /&gt;
be leaked and cracked.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Francois is a software engineer and security champion on the Mozilla Identity team where he works on decentralising authentication on the web. A long time Debian developer, Francois has been involved in Open Source and web development for a while and has always had a strong interest in security.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Andrew Kelly - Nothing to See Here!===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This is how it starts: &amp;quot;Seeking an exciting new challenge? Want to be responsible for building and shaping an embryonic information security function? Then you so won't want to miss this golden opportunity!&amp;quot; Andrew will talk about the setting up of an information security function in an organisation from scratch ('Greenfield') - as opposed to trying to bed yourself down into an already-existing organisation ('Brownfield'). He'll talk about the pros and the cons, and the many ups and downs. And hopefully he'll answer some questions like: Is there, if fact, any such thing as a greenfield security opportunity left in the wild? And ... if such mythical beasties do exist ... are they worth signing on for? Andrew will discuss the pitfalls and pratfalls of the journey from initial engagement, through (maybe) acceptance, until (perhaps) security sign-off and (hopefully) go-live. He'll also discuss both the Pit Bulls and prats you're likely to meet along the way. So ... if you want to hear a guy speak who reckons he's forgotten more than he ever thought he knew? Then this is so the talk for you!&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Andrew is a whole year older than he was when he presented at last year's OWASP Day: So this time around he's bringing a quarter century's worth of IT security experience to OWASP! Now 25 years ago, he was this mainframe security uber-tech - but today Andrew's recognised as being a 'pragmatic' subject-matter expert on corporate-level information security policy, compliance, frameworks and governance. His first greenfield security 'opportunity' came in November 1989 at the Sun Life Assurance Company of Canada, in the UK. And during those intervening 24 years, he's had similar experiences at various other companies including the likes of Lloyds/TSB Bank, Fonterra, BT Syntegra, Telecom/Gen-i and, lately, Health Benefits Ltd. - amongst many others.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
= Call For Presentations =&lt;br /&gt;
==Call For Presentations==&lt;br /&gt;
&lt;br /&gt;
OWASP New Zealand Day conferences attract a high quality of speakers from a variety of security disciplines including web developers, system administrators, penetration testers, policy specialists and more. We encourage presentations to have a strong component on fixing and prevention of security issues. We are looking for presentations on a wide variety of security topics, including but not limited to:&lt;br /&gt;
&lt;br /&gt;
* Web application security&lt;br /&gt;
* Mobile security&lt;br /&gt;
* Secure development&lt;br /&gt;
* Vulnerability analysis&lt;br /&gt;
* Threat modelling&lt;br /&gt;
* Threat and vulnerability countermeasures&lt;br /&gt;
* Platform or language security (.NET, Java, RoR, etc)&lt;br /&gt;
* Penetration Testing&lt;br /&gt;
* Browser and client security&lt;br /&gt;
* Application and solution architecture security&lt;br /&gt;
* PCI DSS&lt;br /&gt;
* Risk management&lt;br /&gt;
* Security concepts for C*Os, project managers and other non-technical attendees&lt;br /&gt;
* Privacy controls&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The email subject must be &amp;quot;OWASP New Zealand 2013: CFP&amp;quot; and the email body must contains the following information/sections:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name and Surname&lt;br /&gt;
* Affiliation&lt;br /&gt;
* Telephone number&lt;br /&gt;
* Email address&lt;br /&gt;
* Short presenter bio&lt;br /&gt;
* Title of the contribution&lt;br /&gt;
* Type of contribution: Technical, Informative, Management&lt;br /&gt;
* Short abstract (up to 500 words)&lt;br /&gt;
* List of the author's previous papers/articles/speeches on the same topic&lt;br /&gt;
* If you are not from New Zealand, will your company support your travel/accommodation costs? - Yes/No&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The submission will be reviewed by the OWASP New Zealand Day CFP Review Board and the highest voted talks will be selected and invited for presentation.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
PLEASE NOTE:&lt;br /&gt;
* Due to limited budget available, expenses for international speakers cannot be covered.&lt;br /&gt;
* If your company is willing to cover travel and accommodation costs, the company will become &amp;quot;Support Sponsor&amp;quot; of the event.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Please submit the above information to both Nick Freeman and Adrian Hayes - nick.freeman@owasp.org and adrian.hayes@owasp.org&lt;br /&gt;
&lt;br /&gt;
Submissions deadline: 1st August 2013&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Training =&lt;br /&gt;
==Training Events==&lt;br /&gt;
&lt;br /&gt;
We are happy to announce that training will run on Wednesday September 11th 2013, the day before the OWASP Day conference. Both courses will be running from '''9:00 AM sharp''' to '''5:00PM'''.The training venues will be auditoriums kindly provided by the University of Auckland, in the same building as the OWASP Day conference itself. Classes will contain up to 20 students, and each seat has power for laptop usage. Both courses will be run by Aura Information Security, and there is both a basic and advanced course available. Feedback from previous training has been very positive - so get in quick! Details are as follows:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Basic Web Application Security ===&lt;br /&gt;
These days websites are under constant attack and it's incredibly easy for a developer or administrator to make seemingly minor mistakes that introduce security vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
You can't fight a war that you don't know you're waging. You can't defend your websites against attack unless you know the tricks the attackers are using to infiltrate. By the end of this workshop you'll have a good understanding of the OWASP Top 10 including:&lt;br /&gt;
&lt;br /&gt;
* Cross-Site Scripting (XSS)&lt;br /&gt;
* Cross-Site Request Forgery (CSRF)&lt;br /&gt;
* SQL Injection&lt;br /&gt;
* Man-In-the-Middle attacks&lt;br /&gt;
* Layering your defenses (defense-in-depth) that can help protect you from exploit chaining.&lt;br /&gt;
&lt;br /&gt;
More importantly, however, you'll also learn how to minimise the risk from these and other attacks, with practical tips that you can apply straight away to help you design, build and manage more secure websites. This workshop is essential for:&lt;br /&gt;
&lt;br /&gt;
* All developers and designers working on web applications but without formal training in security&lt;br /&gt;
* Anyone working in the website / web application space&lt;br /&gt;
* IT Professionals interested in security issues&lt;br /&gt;
&lt;br /&gt;
This is a hands on workshop where attendees must bring their own laptops. It is required that users are local admins or root on their own machines.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Advanced Web Application Security ===&lt;br /&gt;
This advanced web security course is for senior or experienced developers who are looking for a deeper understanding of web security, beyond the OWASP Top 10. By the end of this workshop you'll have a good understanding of:&lt;br /&gt;
&lt;br /&gt;
==== Advanced Attacks ====&lt;br /&gt;
&lt;br /&gt;
We will run through more complex attacks against web-apps using layered attacks requiring a multi-step defense including&lt;br /&gt;
&lt;br /&gt;
* Malicious file uploads and web shells &lt;br /&gt;
* XXS shells&lt;br /&gt;
* Padding oracle attacks &lt;br /&gt;
* XXE injection attacks &lt;br /&gt;
* Serialisation and file include attacks&lt;br /&gt;
* Timing attacks&lt;br /&gt;
* Cryptography&lt;br /&gt;
&lt;br /&gt;
Where, when and how to use it effectively and securely.&lt;br /&gt;
&lt;br /&gt;
==== Advanced Design and Defense ====&lt;br /&gt;
&lt;br /&gt;
* How to secure systems against malicious users and admins.&lt;br /&gt;
* How to secure data at rest such as credit cards, banking data or other high value data.&lt;br /&gt;
* Tools&lt;br /&gt;
&lt;br /&gt;
We will also introduce some of the tools and techniques you should use to test the security of your own systems&lt;br /&gt;
This is a hands on workshop where attendees must bring their own laptops. It is required that users are local admins or root on their own machines.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Registration ==&lt;br /&gt;
&lt;br /&gt;
Registration is handled through RegOnline, and both courses are NZD$500 per person. Please follow the link below to save your seat!&lt;br /&gt;
&lt;br /&gt;
[http://www.regonline.com/owaspnzday2013trainingandsponsorship http://www.regonline.com/owaspnzday2013trainingandsponsorship]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For further information, please contact us at the follow email addresses:&lt;br /&gt;
&lt;br /&gt;
* nick.freeman@owasp.org&lt;br /&gt;
* adrian.hayes@owasp.org&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Call For Sponsorships =&lt;br /&gt;
==Call For Sponsorships==&lt;br /&gt;
&lt;br /&gt;
OWASP New Zealand Day 2013 will be held in Auckland on the 12th of September, 2013 and is a security conference entirely dedicated to application security. The conference is once again being hosted by the University of Auckland with their support and assistance. OWASP New Zealand Day 2013 is a free event, but requires sponsor support to help be an instructive and quality event for the New Zealand community. OWASP is strictly non for profit. The sponsorship money will be used to help make OWASP New Zealand Day 2013 a free, compelling, and valuable experience for the audience.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The sponsorship funds collected are to be used for things such as:&lt;br /&gt;
&lt;br /&gt;
* Refreshments (coffee break/lunch) - we want to keep people refreshed during the day; while we certainly bring good and interesting speakers, we don't want people to go home when they become hungry. &lt;br /&gt;
* Name tags - we feel that getting to know people within the New Zealand community is important, and name tags make that possible.&lt;br /&gt;
* Promotion - up to now our events are propagating by word of mouth. We would like to get to a wider audience by advertising our events.&lt;br /&gt;
* Printed Materials - printed materials will include brochures, tags and lanyards.&lt;br /&gt;
&lt;br /&gt;
== Facts ==&lt;br /&gt;
&lt;br /&gt;
Last year, the event was supported by seven sponsors and attracted more than 250 participants. Plenty of constructive (and positive!) feedback from the audience was received and we are using this to make the conference more appealing to more people. For more information on last year's event, please visit: https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2012&lt;br /&gt;
&lt;br /&gt;
The OWASP New Zealand community is strong and there are more than 220 people currently subscribed to the mailing-list. OWASP New Zealand Day is expected to attract between 250 and 300 attendees this year.&lt;br /&gt;
&lt;br /&gt;
OWASP regular attendees are IT project managers, IT security managers, IT security consultants, web application architects and developers, QA managers, QA testers and system administrators.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Sponsorships  ==&lt;br /&gt;
&lt;br /&gt;
There are three different levels of sponsorships for the OWASP Day event:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Support Sponsorship&amp;lt;/b&amp;gt;: (Covering international speaker travel expenses, media coverage/article/promotion of the event)&lt;br /&gt;
	&lt;br /&gt;
Includes:&lt;br /&gt;
&lt;br /&gt;
* Publication of the sponsor logo on the event web site - https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2013&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Silver Sponsorship&amp;lt;/b&amp;gt;: 1500 NZD&lt;br /&gt;
&lt;br /&gt;
Includes: &lt;br /&gt;
&lt;br /&gt;
* Publication of the sponsor logo on the event web site - https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2013&lt;br /&gt;
* The publication of the sponsor logo in the event site, in the agenda, on the handouts and in all the official communications with the attendees at the conference.&lt;br /&gt;
* The possibility to distribute the company brochures, CDs or other materials to the participants during the event.&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Gold Sponsorship&amp;lt;/b&amp;gt;: 2750 NZD&lt;br /&gt;
&lt;br /&gt;
Includes: &lt;br /&gt;
&lt;br /&gt;
* The possibility to have a promotional banner or sign side stage in the main auditorium (to be provided by the sponsor, size subject to approval by the OWASP NZ Day Committee).&lt;br /&gt;
* The publication of the sponsor logo in the event site, in the agenda, on the handouts and in all the official communications with the attendees at the conference.&lt;br /&gt;
* The possibility to distribute the company brochures, CDs or other materials to the participants during the event.&lt;br /&gt;
* Publication of the sponsor logo on the OWASP New Zealand Chapter page	- Sponsor logo on the OWASP NZ site prior and during the OWASP Day event - https://www.owasp.org/index.php/New_Zealand&lt;br /&gt;
* Publication of the sponsor logo on the event web site - https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2013&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Those who are interested in sponsoring OWASP New Zealand 2013 Conference can contact the [mailto:nick.freeman@owasp.org?cc=adrian.hayes@owasp.org OWASP New Zealand Board].&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]]&lt;/div&gt;</summary>
		<author><name>Adrian Hayes</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_New_Zealand_Day_2013&amp;diff=157244</id>
		<title>OWASP New Zealand Day 2013</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_New_Zealand_Day_2013&amp;diff=157244"/>
				<updated>2013-08-22T22:15:33Z</updated>
		
		<summary type="html">&lt;p&gt;Adrian Hayes: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2013 https://www.owasp.org/images/3/3e/OWASP_NZ_Day_2013_logo.png]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''11th and 12st September 2013 - Auckland'''&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
= Introduction =&lt;br /&gt;
==Introduction==&lt;br /&gt;
We are proud to announce the fifth annual OWASP New Zealand Day conference, to be held at the University of Auckland on Thursday September 12th, 2013. OWASP New Zealand Day is a one-day conference dedicated to application security, with an emphasis on secure development techniques to help Kiwi developers build more secure applications.&lt;br /&gt;
&lt;br /&gt;
Similar to last year:&lt;br /&gt;
&lt;br /&gt;
* We will be offering training on the day before the conference (Wednesday, 11th of September). &lt;br /&gt;
* After lunch on the conference day, we will split to two tracks - one focused on deep technical topics, the other on policy, compliance and risk management. &lt;br /&gt;
&lt;br /&gt;
The fifth OWASP New Zealand Day will be happening thanks to the support provided by the University of Auckland School of Business, which will kindly offer the same conference venue of the last four years. Entry to the event will, as in the past, be free. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For any comments, feedback or observations, please don't hesitate to contact [mailto:nick.freeman@owasp.org?cc=adrian.hayes@owasp.org us].&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Registration==&lt;br /&gt;
&lt;br /&gt;
Registration for the main conference day is now open: [https://registration.owasp.org.nz/ Conference Registration Here]&lt;br /&gt;
&lt;br /&gt;
There is no cost for the main conference day and lunch is provided. We do ask that if at any point you realise you cannot make it please cancel your registration to make room for others as spaces are limited.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Training Registration is now open: [http://www.regonline.com/owaspnzday2013trainingandsponsorship Training Registration]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Important dates==&lt;br /&gt;
&lt;br /&gt;
* CFP &amp;amp; CFT submission deadline:	1st August 2013&lt;br /&gt;
* Conference Registration deadline: 30th August 2013&lt;br /&gt;
* Training Registration deadline: 	30th August 2013&lt;br /&gt;
* Training Day date:				11th September 2013&lt;br /&gt;
* Conference Day date:				12th September 2013&lt;br /&gt;
&lt;br /&gt;
For those of you booking flights, ensure you can be at the venue at 8:30am, the conference will end by 5:30pm however we will have post conference drinks at a local drinking establishment for those interested.&lt;br /&gt;
&lt;br /&gt;
==Conference Venue==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
	&amp;lt;td&amp;gt;&lt;br /&gt;
		The University of Auckland Business School&amp;lt;br&amp;gt;&lt;br /&gt;
		Owen G Glenn Building&amp;lt;br&amp;gt;&lt;br /&gt;
		Room: OGGB 260-073 (OGGB4)&amp;lt;br&amp;gt;&lt;br /&gt;
		Address: 12 Grafton Road&amp;lt;br&amp;gt;&lt;br /&gt;
		Auckland&amp;lt;br&amp;gt;&lt;br /&gt;
		New Zealand&amp;lt;br&amp;gt;&lt;br /&gt;
		[http://maps.google.com/maps?oe=UTF-8&amp;amp;ie=UTF8&amp;amp;q=auckland+business+school&amp;amp;fb=1&amp;amp;split=1&amp;amp;cid=0,0,12303692579639430581&amp;amp;ei=6WeqSZr_OZLFkAWR--zbDQ&amp;amp;ll=-36.852308,174.770916&amp;amp;spn=0.01056,0.020621&amp;amp;z=16&amp;amp;iwloc=A Map]&lt;br /&gt;
	&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;td&amp;gt;&lt;br /&gt;
		[[Image:Auckland_business_school_small2.jpg]] [[Image:Room_hall.jpg]]&lt;br /&gt;
	&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Conference Sponsors==&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;bottom&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;[http://www.auckland.ac.nz/ https://www.owasp.org/images/8/82/University_of_Auckland_crest_small.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;bottom&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;[http://www.security.org.nz/NZISF_NZISForumContent.php https://www.owasp.org/images/5/5a/Nz_information_security_forum.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;ICT and Department of Information Systems and Operations Management&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Gold Sponsors:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com https://www.owasp.org/images/4/41/SA_Logo_w_DD.gif]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[[File:INSOMNIA.PNG|center|350px|link=http://www.insomniasec.com/]]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com www.security-assessment.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.insomniasec.com Insomnia Security]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Silver Sponsors:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[[File:Qualys logo small.png|center|200px|link=]]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[https://www.qualys.com/ www.qualys.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[[File:Orionhealth_logo_small.png|center|200px|link=]]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.orionhealth.com/ www.orionhealth.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Conference Committee==&lt;br /&gt;
&lt;br /&gt;
* Nick Freeman - OWASP New Zealand Leader (Auckland)&lt;br /&gt;
* Adrian Hayes -  OWASP New Zealand Leader (Wellington)&lt;br /&gt;
* Lech Janczewski - Associate Professor - University of Auckland School of Business&lt;br /&gt;
&lt;br /&gt;
Please direct all enquiries to nick.freeman@owasp.org and adrian.hayes@owasp.org.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Speakers List=&lt;br /&gt;
==Speakers List==&lt;br /&gt;
&lt;br /&gt;
===Tom Eastman  - Catalyst IT - Serialization Formats Aren't Toys===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Do you have an API? Do you accept input from users? Do you accept it in XML? What about YAML? Or maybe JSON? How safe are you? How sure are you? It's not in the OWASP Top 10, but you don't have to look far to hear stories of security vulnerabilities involving deserialization user inputs. Why do they keep happening?&lt;br /&gt;
&lt;br /&gt;
In this talk I'll go over what the threat is, how you might be making yourself vulnerable and how to mitigate the problem. I'll cover the features (not bugs, features) of formats like XML, YAML, and JSON that make them surprisingly dangerous, and how to protect your code from them.&lt;br /&gt;
&lt;br /&gt;
Because here's the thing: If you are using, say, a compliant, properly implemented XML parser to parse your XML, you are NOT safe. Possibly quite the opposite. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Tom is a senior Python developer and technical lead for Catalyst IT, New Zealand's largest company specialising in open source. Prior to that he worked as a developer and system administrator for the University of Otago Faculty of Medicine and as a Computer Science tutor for same.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Paul Haas - Security-Assessment.com -  Improving XPath Injection with Binary Search Optimisations===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
XPath injection is technique similar to SQL injection for attacking XML processors, however many people are unaware of the technique and exploitation vectors. This talk aims to expand awareness of both the risks and remediation path in addition to the introduction of a new technique to significantly improve reconstruction speed of the backend XML document. A brief primer to XPath injection will also be covered within the talk.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Paul Haas hails from California where the waves are better but the quakes are not. With over nine years of experience in professional hacking, he is currently working with Security-Assessment.com in Wellington to bring the good word of web hacks to Kiwis everywhere. His sole hobby is driving people into Mario Kart's abyss.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Nick von Dadelszen - Lateral Security - Security Vulnerability Disclosure===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Disclosing security vulnerabilities can be a dangerous business. While there are systems in place for handling disclosures to most major software companies, the process for disclosing vulnerabilities to local organisations is a lot less discussed.&lt;br /&gt;
&lt;br /&gt;
As the discloser, there is always the chance that you are accused of hacking and get a visit from the police merely for identifying an issue. As an organisation, you can find yourself on the front page of the news when someone goes public with an issue.&lt;br /&gt;
&lt;br /&gt;
This talk outlines the dilemmas faced when stumbling across that SQL injection in the local shopping site and proposes mechanisms to safely get the right people told about it. It also discusses how organisations can make it more likely that security vulnerabilities are reported to them directly, rather than through the press.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Nick von Dadelszen is the technical director at Lateral Security. Nick has been performing professional penetration testing for over 12 years and has managed several successful penetration testing teams. He has worked with the majority of large corporates and Government agencies in New Zealand and is a regular presenter at OWASP and Kiwicon conferences.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Mark Piper - Insomnia Security - OWASP Top 10 Mobile Risks - An Introduction By Case Study===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
As mobile application usage explodes, so does the associated application&lt;br /&gt;
security issues. The OWASP Mobile Security Project includes an&lt;br /&gt;
initiative to categorise and rate these issues into a top 10 format.&lt;br /&gt;
This list is known as the Top 10 Mobile Risks.&lt;br /&gt;
&lt;br /&gt;
During the session, we will introduce the current (RC1) Top 10 supported&lt;br /&gt;
with several real world case studies of issues.  We will cover how the&lt;br /&gt;
issues were identified, how they may be exploited by attackers and what&lt;br /&gt;
mitigation's could be implemented to resolve the issues in the future.&lt;br /&gt;
While the issues will be largely platform agnostic, the examples will&lt;br /&gt;
cover both iOS and Android environments.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Mark is a Principal Security Consultant with the Insomnia Security&lt;br /&gt;
team. Mark spends his days auditing software, running penetration&lt;br /&gt;
testing and red team engagements while working with global customers on&lt;br /&gt;
developing new testing services.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Kirk Jackson - Xero - Bad Smells That Lead to Bad Security===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Your job as a defender is to reduce the attack surface of your web application and protect your infrastructure and data from being breached. However we can't be involved in every decision that goes on in our organisation, and we don't always think the same as an attacker does. This talk will introduce you to some common &amp;quot;bad smells&amp;quot; that might indicate security issues lurking under the surface of your code, and help you develop your spidey sense so that you know when to raise the alarm.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Kirk is the Security Officer at Xero, and is interested in writing and defending secure web applications.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Kim Carter - BinaryMist - What's Our Software Doing With All That User Input===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
What are we doing with all the characters that get shoved into our applications? Have we considered every potential execution context?&lt;br /&gt;
It's often interesting and surprising to see what sort of concoction of characters can be executed in different places... and linking multiple attack vectors together which the builders haven't thought about.&lt;br /&gt;
What are we trusting? Why are we trusting it? What, where and how should we be sanitising?&lt;br /&gt;
&lt;br /&gt;
We have a vast collection of libraries, techniques, cheat sheets, tutorials, guides and tools at our disposal.&lt;br /&gt;
I often find myself thinking... how can we commoditise the sanitisation of user input and I keep coming up with the same answer.&lt;br /&gt;
It's not easy. Every application has a completely different set of concerns.&lt;br /&gt;
&lt;br /&gt;
In order for our software to be shielded from an attack, the builders must think like attackers.&lt;br /&gt;
&lt;br /&gt;
In this talk I'll attempt to:&lt;br /&gt;
&lt;br /&gt;
* Increase our knowledge and awareness&lt;br /&gt;
* Discuss practical techniques and approaches that increase our defences&lt;br /&gt;
* Break some software&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Kim Carter is a Software Engineer, Architect, Entrepreneur and the founder of BinaryMist. He is passionate about and enjoys many things. Some of which include:&lt;br /&gt;
* Designing and creating robust software and networks.&lt;br /&gt;
* Breaking his and others software and networks, then fixing it/them.&lt;br /&gt;
* Teaching, training, mentoring, motivating, listening to and being around smart people.&lt;br /&gt;
* Increasing quality awareness and helping people and organisations implement higher quality in a cost effective manner.&lt;br /&gt;
* Improving operational efficiencies.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Hugh Davenport - Aura RedEye Security - Bug Chaining (aka, why XSS can be worse than you think) ===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Security bugs can range in damage from small stuff, all the way to big stuff. Some people only focus on the large stuff, and the smaller stuff can go unnoticed. This talk will give a real world example of a project that had a small bug, that allowed a larger bug to happen, which allowed a larger bug, which allowed for unwanted shell access. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Hugh works at Aura RedEye Security on their managed vulnerability scanning service. In his spare time, he is the security point of contact on the Mahara open source tool and contributes to many other open source projects. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Hinne Hettema - University of Auckland - Evolution of Threats and the Skills in our Security Team===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The threat landscape for security threats is constantly evolving, with new threats being stealthier, more diverse, and increasingly aimed at bypassing the protection offered by antivirus and network intrusion detection systems. Adversaries are now often part of a semi-organised underground economy geared towards the acquisition and sale of digital assets such as usernames, passwords, confidential business information, financial data and designs. There are specific value chains in this economy, which make the acquisition, sale and utilisation of such assets a relatively easy process.&lt;br /&gt;
&lt;br /&gt;
This talk focuses on the skills needed in a security team to deal with this next level of threat, and on the sort of teams that we need in enterprise security to address the modern threats that we face.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Hinne Hettema is the team leader of the IT security team at The University of Auckland, an honorary research fellow in the Department of Philosophy at The University of Auckland, and lectures in cyber security at Unitec. He has 10 years experience in security consulting and has a PhD in Philosophy (2012) and theoretical chemistry (1993).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Francois Marier - Mozilla - Securing the Web Without Site-Specific Passwords===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Has anyone else noticed that the OWASP Top 10 is not changing very much?&lt;br /&gt;
Especially in the realm of authentication-related problems. I don't&lt;br /&gt;
claim to have the one true solution for this, but one thing is certain:&lt;br /&gt;
if we change how things are done on the web and relieve developers from&lt;br /&gt;
having to store passwords, we can make things better.&lt;br /&gt;
&lt;br /&gt;
We need to let web developers outsource their authentication needs to&lt;br /&gt;
people who can do it well. Does that mean we should force all of our&lt;br /&gt;
users to join Facebook? Well not really. That might work for some sites,&lt;br /&gt;
but outsourcing all of our logins to a single for-profit company isn't a&lt;br /&gt;
solution that works for the whole web.&lt;br /&gt;
&lt;br /&gt;
The open web needs a better solution. One that enable users to choose&lt;br /&gt;
their identity provider and shop for the most secure one if that's what&lt;br /&gt;
they're into. This is the promise behind Persona and the BrowserID&lt;br /&gt;
protocol. Choose your email provider carefully and let's get rid of all&lt;br /&gt;
of these site-specific passwords that are just sitting there waiting to&lt;br /&gt;
be leaked and cracked.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Francois is a software engineer and security champion on the Mozilla Identity team where he works on decentralising authentication on the web. A long time Debian developer, Francois has been involved in Open Source and web development for a while and has always had a strong interest in security.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Andrew Kelly - Nothing to See Here!===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This is how it starts: &amp;quot;Seeking an exciting new challenge? Want to be responsible for building and shaping an embryonic information security function? Then you so won't want to miss this golden opportunity!&amp;quot; Andrew will talk about the setting up of an information security function in an organisation from scratch ('Greenfield') - as opposed to trying to bed yourself down into an already-existing organisation ('Brownfield'). He'll talk about the pros and the cons, and the many ups and downs. And hopefully he'll answer some questions like: Is there, if fact, any such thing as a greenfield security opportunity left in the wild? And ... if such mythical beasties do exist ... are they worth signing on for? Andrew will discuss the pitfalls and pratfalls of the journey from initial engagement, through (maybe) acceptance, until (perhaps) security sign-off and (hopefully) go-live. He'll also discuss both the Pit Bulls and prats you're likely to meet along the way. So ... if you want to hear a guy speak who reckons he's forgotten more than he ever thought he knew? Then this is so the talk for you!&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Andrew is a whole year older than he was when he presented at last year's OWASP Day: So this time around he's bringing a quarter century's worth of IT security experience to OWASP! Now 25 years ago, he was this mainframe security uber-tech - but today Andrew's recognised as being a 'pragmatic' subject-matter expert on corporate-level information security policy, compliance, frameworks and governance. His first greenfield security 'opportunity' came in November 1989 at the Sun Life Assurance Company of Canada, in the UK. And during those intervening 24 years, he's had similar experiences at various other companies including the likes of Lloyds/TSB Bank, Fonterra, BT Syntegra, Telecom/Gen-i and, lately, Health Benefits Ltd. - amongst many others.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
= Call For Presentations =&lt;br /&gt;
==Call For Presentations==&lt;br /&gt;
&lt;br /&gt;
OWASP New Zealand Day conferences attract a high quality of speakers from a variety of security disciplines including web developers, system administrators, penetration testers, policy specialists and more. We encourage presentations to have a strong component on fixing and prevention of security issues. We are looking for presentations on a wide variety of security topics, including but not limited to:&lt;br /&gt;
&lt;br /&gt;
* Web application security&lt;br /&gt;
* Mobile security&lt;br /&gt;
* Secure development&lt;br /&gt;
* Vulnerability analysis&lt;br /&gt;
* Threat modelling&lt;br /&gt;
* Threat and vulnerability countermeasures&lt;br /&gt;
* Platform or language security (.NET, Java, RoR, etc)&lt;br /&gt;
* Penetration Testing&lt;br /&gt;
* Browser and client security&lt;br /&gt;
* Application and solution architecture security&lt;br /&gt;
* PCI DSS&lt;br /&gt;
* Risk management&lt;br /&gt;
* Security concepts for C*Os, project managers and other non-technical attendees&lt;br /&gt;
* Privacy controls&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The email subject must be &amp;quot;OWASP New Zealand 2013: CFP&amp;quot; and the email body must contains the following information/sections:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name and Surname&lt;br /&gt;
* Affiliation&lt;br /&gt;
* Telephone number&lt;br /&gt;
* Email address&lt;br /&gt;
* Short presenter bio&lt;br /&gt;
* Title of the contribution&lt;br /&gt;
* Type of contribution: Technical, Informative, Management&lt;br /&gt;
* Short abstract (up to 500 words)&lt;br /&gt;
* List of the author's previous papers/articles/speeches on the same topic&lt;br /&gt;
* If you are not from New Zealand, will your company support your travel/accommodation costs? - Yes/No&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The submission will be reviewed by the OWASP New Zealand Day CFP Review Board and the highest voted talks will be selected and invited for presentation.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
PLEASE NOTE:&lt;br /&gt;
* Due to limited budget available, expenses for international speakers cannot be covered.&lt;br /&gt;
* If your company is willing to cover travel and accommodation costs, the company will become &amp;quot;Support Sponsor&amp;quot; of the event.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Please submit the above information to both Nick Freeman and Adrian Hayes - nick.freeman@owasp.org and adrian.hayes@owasp.org&lt;br /&gt;
&lt;br /&gt;
Submissions deadline: 1st August 2013&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Training =&lt;br /&gt;
==Training Events==&lt;br /&gt;
&lt;br /&gt;
We are happy to announce that training will run on Wednesday September 11th 2013, the day before the OWASP Day conference. The training venues will be auditoriums kindly provided by the University of Auckland, in the same building as the OWASP Day conference itself. Classes will contain up to 20 students, and each seat has power for laptop usage. Both courses will be run by the Aura Information Security, and there is both a basic and advanced course available. Feedback from previous training has been very positive - so get in quick! Details are as follows:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Basic Web Application Security ===&lt;br /&gt;
These days websites are under constant attack and it's incredibly easy for a developer or administrator to make seemingly minor mistakes that introduce security vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
You can't fight a war that you don't know you're waging. You can't defend your websites against attack unless you know the tricks the attackers are using to infiltrate. By the end of this workshop you'll have a good understanding of the OWASP Top 10 including:&lt;br /&gt;
&lt;br /&gt;
* Cross-Site Scripting (XSS)&lt;br /&gt;
* Cross-Site Request Forgery (CSRF)&lt;br /&gt;
* SQL Injection&lt;br /&gt;
* Man-In-the-Middle attacks&lt;br /&gt;
* Layering your defenses (defense-in-depth) that can help protect you from exploit chaining.&lt;br /&gt;
&lt;br /&gt;
More importantly, however, you'll also learn how to minimise the risk from these and other attacks, with practical tips that you can apply straight away to help you design, build and manage more secure websites. This workshop is essential for:&lt;br /&gt;
&lt;br /&gt;
* All developers and designers working on web applications but without formal training in security&lt;br /&gt;
* Anyone working in the website / web application space&lt;br /&gt;
* IT Professionals interested in security issues&lt;br /&gt;
&lt;br /&gt;
This is a hands on workshop where attendees must bring their own laptops. It is required that users are local admins or root on their own machines.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Advanced Web Application Security ===&lt;br /&gt;
This advanced web security course is for senior or experienced developers who are looking for a deeper understanding of web security, beyond the OWASP Top 10. By the end of this workshop you'll have a good understanding of:&lt;br /&gt;
&lt;br /&gt;
==== Advanced Attacks ====&lt;br /&gt;
&lt;br /&gt;
We will run through more complex attacks against web-apps using layered attacks requiring a multi-step defense including&lt;br /&gt;
&lt;br /&gt;
* Malicious file uploads and web shells &lt;br /&gt;
* XXS shells&lt;br /&gt;
* Padding oracle attacks &lt;br /&gt;
* XXE injection attacks &lt;br /&gt;
* Serialisation and file include attacks&lt;br /&gt;
* Timing attacks&lt;br /&gt;
* Cryptography&lt;br /&gt;
&lt;br /&gt;
Where, when and how to use it effectively and securely.&lt;br /&gt;
&lt;br /&gt;
==== Advanced Design and Defense ====&lt;br /&gt;
&lt;br /&gt;
* How to secure systems against malicious users and admins.&lt;br /&gt;
* How to secure data at rest such as credit cards, banking data or other high value data.&lt;br /&gt;
* Tools&lt;br /&gt;
&lt;br /&gt;
We will also introduce some of the tools and techniques you should use to test the security of your own systems&lt;br /&gt;
This is a hands on workshop where attendees must bring their own laptops. It is required that users are local admins or root on their own machines.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Registration ==&lt;br /&gt;
&lt;br /&gt;
Registration is handled through RegOnline, and both courses are NZD$500 per person. Please follow the link below to save your seat!&lt;br /&gt;
&lt;br /&gt;
[http://www.regonline.com/owaspnzday2013trainingandsponsorship http://www.regonline.com/owaspnzday2013trainingandsponsorship]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For further information, please contact us at the follow email addresses:&lt;br /&gt;
&lt;br /&gt;
* nick.freeman@owasp.org&lt;br /&gt;
* adrian.hayes@owasp.org&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Call For Sponsorships =&lt;br /&gt;
==Call For Sponsorships==&lt;br /&gt;
&lt;br /&gt;
OWASP New Zealand Day 2013 will be held in Auckland on the 12th of September, 2013 and is a security conference entirely dedicated to application security. The conference is once again being hosted by the University of Auckland with their support and assistance. OWASP New Zealand Day 2013 is a free event, but requires sponsor support to help be an instructive and quality event for the New Zealand community. OWASP is strictly non for profit. The sponsorship money will be used to help make OWASP New Zealand Day 2013 a free, compelling, and valuable experience for the audience.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The sponsorship funds collected are to be used for things such as:&lt;br /&gt;
&lt;br /&gt;
* Refreshments (coffee break/lunch) - we want to keep people refreshed during the day; while we certainly bring good and interesting speakers, we don't want people to go home when they become hungry. &lt;br /&gt;
* Name tags - we feel that getting to know people within the New Zealand community is important, and name tags make that possible.&lt;br /&gt;
* Promotion - up to now our events are propagating by word of mouth. We would like to get to a wider audience by advertising our events.&lt;br /&gt;
* Printed Materials - printed materials will include brochures, tags and lanyards.&lt;br /&gt;
&lt;br /&gt;
== Facts ==&lt;br /&gt;
&lt;br /&gt;
Last year, the event was supported by seven sponsors and attracted more than 250 participants. Plenty of constructive (and positive!) feedback from the audience was received and we are using this to make the conference more appealing to more people. For more information on last year's event, please visit: https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2012&lt;br /&gt;
&lt;br /&gt;
The OWASP New Zealand community is strong and there are more than 220 people currently subscribed to the mailing-list. OWASP New Zealand Day is expected to attract between 250 and 300 attendees this year.&lt;br /&gt;
&lt;br /&gt;
OWASP regular attendees are IT project managers, IT security managers, IT security consultants, web application architects and developers, QA managers, QA testers and system administrators.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Sponsorships  ==&lt;br /&gt;
&lt;br /&gt;
There are three different levels of sponsorships for the OWASP Day event:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Support Sponsorship&amp;lt;/b&amp;gt;: (Covering international speaker travel expenses, media coverage/article/promotion of the event)&lt;br /&gt;
	&lt;br /&gt;
Includes:&lt;br /&gt;
&lt;br /&gt;
* Publication of the sponsor logo on the event web site - https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2013&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Silver Sponsorship&amp;lt;/b&amp;gt;: 1500 NZD&lt;br /&gt;
&lt;br /&gt;
Includes: &lt;br /&gt;
&lt;br /&gt;
* Publication of the sponsor logo on the event web site - https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2013&lt;br /&gt;
* The publication of the sponsor logo in the event site, in the agenda, on the handouts and in all the official communications with the attendees at the conference.&lt;br /&gt;
* The possibility to distribute the company brochures, CDs or other materials to the participants during the event.&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Gold Sponsorship&amp;lt;/b&amp;gt;: 2750 NZD&lt;br /&gt;
&lt;br /&gt;
Includes: &lt;br /&gt;
&lt;br /&gt;
* The possibility to have a promotional banner or sign side stage in the main auditorium (to be provided by the sponsor, size subject to approval by the OWASP NZ Day Committee).&lt;br /&gt;
* The publication of the sponsor logo in the event site, in the agenda, on the handouts and in all the official communications with the attendees at the conference.&lt;br /&gt;
* The possibility to distribute the company brochures, CDs or other materials to the participants during the event.&lt;br /&gt;
* Publication of the sponsor logo on the OWASP New Zealand Chapter page	- Sponsor logo on the OWASP NZ site prior and during the OWASP Day event - https://www.owasp.org/index.php/New_Zealand&lt;br /&gt;
* Publication of the sponsor logo on the event web site - https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2013&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Those who are interested in sponsoring OWASP New Zealand 2013 Conference can contact the [mailto:nick.freeman@owasp.org?cc=adrian.hayes@owasp.org OWASP New Zealand Board].&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]]&lt;/div&gt;</summary>
		<author><name>Adrian Hayes</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_New_Zealand_Day_2013&amp;diff=157241</id>
		<title>OWASP New Zealand Day 2013</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_New_Zealand_Day_2013&amp;diff=157241"/>
				<updated>2013-08-22T22:09:58Z</updated>
		
		<summary type="html">&lt;p&gt;Adrian Hayes: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2013 https://www.owasp.org/images/3/3e/OWASP_NZ_Day_2013_logo.png]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''11th and 12st September 2013 - Auckland'''&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
= Introduction =&lt;br /&gt;
==Introduction==&lt;br /&gt;
We are proud to announce the fifth annual OWASP New Zealand Day conference, to be held at the University of Auckland on Thursday September 12th, 2013. OWASP New Zealand Day is a one-day conference dedicated to application security, with an emphasis on secure development techniques to help Kiwi developers build more secure applications.&lt;br /&gt;
&lt;br /&gt;
Similar to last year:&lt;br /&gt;
&lt;br /&gt;
* We will be offering training on the day before the conference (Wednesday, 11th of September). &lt;br /&gt;
* After lunch on the conference day, we will split to two tracks - one focused on deep technical topics, the other on policy, compliance and risk management. &lt;br /&gt;
&lt;br /&gt;
The fifth OWASP New Zealand Day will be happening thanks to the support provided by the University of Auckland School of Business, which will kindly offer the same conference venue of the last four years. Entry to the event will, as in the past, be free. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For any comments, feedback or observations, please don't hesitate to contact [mailto:nick.freeman@owasp.org?cc=adrian.hayes@owasp.org us].&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Registration==&lt;br /&gt;
&lt;br /&gt;
Registration for the main conference day is now open: [https://registration.owasp.org.nz/ Conference Registration Here]&lt;br /&gt;
&lt;br /&gt;
There is no cost for the main conference day and lunch is provided. We do ask that if at any point you realise you cannot make it please cancel your registration to make room for others as spaces are limited.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Training Registration is now open: [http://www.regonline.com/owaspnzday2013trainingandsponsorship Training Registration]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Important dates==&lt;br /&gt;
&lt;br /&gt;
* CFP &amp;amp; CFT submission deadline:	1st August 2013&lt;br /&gt;
* Conference Registration deadline: 30th August 2013&lt;br /&gt;
* Training Registration deadline: 	30th August 2013&lt;br /&gt;
* Training Day date:				11th September 2013&lt;br /&gt;
* Conference Day date:				12th September 2013&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Conference Venue==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
	&amp;lt;td&amp;gt;&lt;br /&gt;
		The University of Auckland Business School&amp;lt;br&amp;gt;&lt;br /&gt;
		Owen G Glenn Building&amp;lt;br&amp;gt;&lt;br /&gt;
		Room: OGGB 260-073 (OGGB4)&amp;lt;br&amp;gt;&lt;br /&gt;
		Address: 12 Grafton Road&amp;lt;br&amp;gt;&lt;br /&gt;
		Auckland&amp;lt;br&amp;gt;&lt;br /&gt;
		New Zealand&amp;lt;br&amp;gt;&lt;br /&gt;
		[http://maps.google.com/maps?oe=UTF-8&amp;amp;ie=UTF8&amp;amp;q=auckland+business+school&amp;amp;fb=1&amp;amp;split=1&amp;amp;cid=0,0,12303692579639430581&amp;amp;ei=6WeqSZr_OZLFkAWR--zbDQ&amp;amp;ll=-36.852308,174.770916&amp;amp;spn=0.01056,0.020621&amp;amp;z=16&amp;amp;iwloc=A Map]&lt;br /&gt;
	&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;td&amp;gt;&lt;br /&gt;
		[[Image:Auckland_business_school_small2.jpg]] [[Image:Room_hall.jpg]]&lt;br /&gt;
	&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Conference Sponsors==&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;bottom&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;[http://www.auckland.ac.nz/ https://www.owasp.org/images/8/82/University_of_Auckland_crest_small.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;bottom&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;[http://www.security.org.nz/NZISF_NZISForumContent.php https://www.owasp.org/images/5/5a/Nz_information_security_forum.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;ICT and Department of Information Systems and Operations Management&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Gold Sponsors:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com https://www.owasp.org/images/4/41/SA_Logo_w_DD.gif]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[[File:INSOMNIA.PNG|center|350px|link=http://www.insomniasec.com/]]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com www.security-assessment.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.insomniasec.com Insomnia Security]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Silver Sponsors:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[[File:Qualys logo small.png|center|200px|link=]]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[https://www.qualys.com/ www.qualys.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[[File:Orionhealth_logo_small.png|center|200px|link=]]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.orionhealth.com/ www.orionhealth.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Conference Committee==&lt;br /&gt;
&lt;br /&gt;
* Nick Freeman - OWASP New Zealand Leader (Auckland)&lt;br /&gt;
* Adrian Hayes -  OWASP New Zealand Leader (Wellington)&lt;br /&gt;
* Lech Janczewski - Associate Professor - University of Auckland School of Business&lt;br /&gt;
&lt;br /&gt;
Please direct all enquiries to nick.freeman@owasp.org and adrian.hayes@owasp.org.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Speakers List=&lt;br /&gt;
==Speakers List==&lt;br /&gt;
&lt;br /&gt;
===Tom Eastman  - Catalyst IT - Serialization Formats Aren't Toys===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Do you have an API? Do you accept input from users? Do you accept it in XML? What about YAML? Or maybe JSON? How safe are you? How sure are you? It's not in the OWASP Top 10, but you don't have to look far to hear stories of security vulnerabilities involving deserialization user inputs. Why do they keep happening?&lt;br /&gt;
&lt;br /&gt;
In this talk I'll go over what the threat is, how you might be making yourself vulnerable and how to mitigate the problem. I'll cover the features (not bugs, features) of formats like XML, YAML, and JSON that make them surprisingly dangerous, and how to protect your code from them.&lt;br /&gt;
&lt;br /&gt;
Because here's the thing: If you are using, say, a compliant, properly implemented XML parser to parse your XML, you are NOT safe. Possibly quite the opposite. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Tom is a senior Python developer and technical lead for Catalyst IT, New Zealand's largest company specialising in open source. Prior to that he worked as a developer and system administrator for the University of Otago Faculty of Medicine and as a Computer Science tutor for same.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Paul Haas - Security-Assessment.com -  Improving XPath Injection with Binary Search Optimisations===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
XPath injection is technique similar to SQL injection for attacking XML processors, however many people are unaware of the technique and exploitation vectors. This talk aims to expand awareness of both the risks and remediation path in addition to the introduction of a new technique to significantly improve reconstruction speed of the backend XML document. A brief primer to XPath injection will also be covered within the talk.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Paul Haas hails from California where the waves are better but the quakes are not. With over nine years of experience in professional hacking, he is currently working with Security-Assessment.com in Wellington to bring the good word of web hacks to Kiwis everywhere. His sole hobby is driving people into Mario Kart's abyss.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Nick von Dadelszen - Lateral Security - Security Vulnerability Disclosure===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Disclosing security vulnerabilities can be a dangerous business. While there are systems in place for handling disclosures to most major software companies, the process for disclosing vulnerabilities to local organisations is a lot less discussed.&lt;br /&gt;
&lt;br /&gt;
As the discloser, there is always the chance that you are accused of hacking and get a visit from the police merely for identifying an issue. As an organisation, you can find yourself on the front page of the news when someone goes public with an issue.&lt;br /&gt;
&lt;br /&gt;
This talk outlines the dilemmas faced when stumbling across that SQL injection in the local shopping site and proposes mechanisms to safely get the right people told about it. It also discusses how organisations can make it more likely that security vulnerabilities are reported to them directly, rather than through the press.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Nick von Dadelszen is the technical director at Lateral Security. Nick has been performing professional penetration testing for over 12 years and has managed several successful penetration testing teams. He has worked with the majority of large corporates and Government agencies in New Zealand and is a regular presenter at OWASP and Kiwicon conferences.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Mark Piper - Insomnia Security - OWASP Top 10 Mobile Risks - An Introduction By Case Study===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
As mobile application usage explodes, so does the associated application&lt;br /&gt;
security issues. The OWASP Mobile Security Project includes an&lt;br /&gt;
initiative to categorise and rate these issues into a top 10 format.&lt;br /&gt;
This list is known as the Top 10 Mobile Risks.&lt;br /&gt;
&lt;br /&gt;
During the session, we will introduce the current (RC1) Top 10 supported&lt;br /&gt;
with several real world case studies of issues.  We will cover how the&lt;br /&gt;
issues were identified, how they may be exploited by attackers and what&lt;br /&gt;
mitigation's could be implemented to resolve the issues in the future.&lt;br /&gt;
While the issues will be largely platform agnostic, the examples will&lt;br /&gt;
cover both iOS and Android environments.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Mark is a Principal Security Consultant with the Insomnia Security&lt;br /&gt;
team. Mark spends his days auditing software, running penetration&lt;br /&gt;
testing and red team engagements while working with global customers on&lt;br /&gt;
developing new testing services.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Kirk Jackson - Xero - Bad Smells That Lead to Bad Security===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Your job as a defender is to reduce the attack surface of your web application and protect your infrastructure and data from being breached. However we can't be involved in every decision that goes on in our organisation, and we don't always think the same as an attacker does. This talk will introduce you to some common &amp;quot;bad smells&amp;quot; that might indicate security issues lurking under the surface of your code, and help you develop your spidey sense so that you know when to raise the alarm.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Kirk is the Security Officer at Xero, and is interested in writing and defending secure web applications.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Kim Carter - BinaryMist - What's Our Software Doing With All That User Input===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
What are we doing with all the characters that get shoved into our applications? Have we considered every potential execution context?&lt;br /&gt;
It's often interesting and surprising to see what sort of concoction of characters can be executed in different places... and linking multiple attack vectors together which the builders haven't thought about.&lt;br /&gt;
What are we trusting? Why are we trusting it? What, where and how should we be sanitising?&lt;br /&gt;
&lt;br /&gt;
We have a vast collection of libraries, techniques, cheat sheets, tutorials, guides and tools at our disposal.&lt;br /&gt;
I often find myself thinking... how can we commoditise the sanitisation of user input and I keep coming up with the same answer.&lt;br /&gt;
It's not easy. Every application has a completely different set of concerns.&lt;br /&gt;
&lt;br /&gt;
In order for our software to be shielded from an attack, the builders must think like attackers.&lt;br /&gt;
&lt;br /&gt;
In this talk I'll attempt to:&lt;br /&gt;
&lt;br /&gt;
* Increase our knowledge and awareness&lt;br /&gt;
* Discuss practical techniques and approaches that increase our defences&lt;br /&gt;
* Break some software&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Kim Carter is a Software Engineer, Architect, Entrepreneur and the founder of BinaryMist. He is passionate about and enjoys many things. Some of which include:&lt;br /&gt;
* Designing and creating robust software and networks.&lt;br /&gt;
* Breaking his and others software and networks, then fixing it/them.&lt;br /&gt;
* Teaching, training, mentoring, motivating, listening to and being around smart people.&lt;br /&gt;
* Increasing quality awareness and helping people and organisations implement higher quality in a cost effective manner.&lt;br /&gt;
* Improving operational efficiencies.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Hugh Davenport - Aura RedEye Security - Bug Chaining (aka, why XSS can be worse than you think) ===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Security bugs can range in damage from small stuff, all the way to big stuff. Some people only focus on the large stuff, and the smaller stuff can go unnoticed. This talk will give a real world example of a project that had a small bug, that allowed a larger bug to happen, which allowed a larger bug, which allowed for unwanted shell access. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Hugh works at Aura RedEye Security on their managed vulnerability scanning service. In his spare time, he is the security point of contact on the Mahara open source tool and contributes to many other open source projects. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Hinne Hettema - University of Auckland - Evolution of Threats and the Skills in our Security Team===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The threat landscape for security threats is constantly evolving, with new threats being stealthier, more diverse, and increasingly aimed at bypassing the protection offered by antivirus and network intrusion detection systems. Adversaries are now often part of a semi-organised underground economy geared towards the acquisition and sale of digital assets such as usernames, passwords, confidential business information, financial data and designs. There are specific value chains in this economy, which make the acquisition, sale and utilisation of such assets a relatively easy process.&lt;br /&gt;
&lt;br /&gt;
This talk focuses on the skills needed in a security team to deal with this next level of threat, and on the sort of teams that we need in enterprise security to address the modern threats that we face.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Hinne Hettema is the team leader of the IT security team at The University of Auckland, an honorary research fellow in the Department of Philosophy at The University of Auckland, and lectures in cyber security at Unitec. He has 10 years experience in security consulting and has a PhD in Philosophy (2012) and theoretical chemistry (1993).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Francois Marier - Mozilla - Securing the Web Without Site-Specific Passwords===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Has anyone else noticed that the OWASP Top 10 is not changing very much?&lt;br /&gt;
Especially in the realm of authentication-related problems. I don't&lt;br /&gt;
claim to have the one true solution for this, but one thing is certain:&lt;br /&gt;
if we change how things are done on the web and relieve developers from&lt;br /&gt;
having to store passwords, we can make things better.&lt;br /&gt;
&lt;br /&gt;
We need to let web developers outsource their authentication needs to&lt;br /&gt;
people who can do it well. Does that mean we should force all of our&lt;br /&gt;
users to join Facebook? Well not really. That might work for some sites,&lt;br /&gt;
but outsourcing all of our logins to a single for-profit company isn't a&lt;br /&gt;
solution that works for the whole web.&lt;br /&gt;
&lt;br /&gt;
The open web needs a better solution. One that enable users to choose&lt;br /&gt;
their identity provider and shop for the most secure one if that's what&lt;br /&gt;
they're into. This is the promise behind Persona and the BrowserID&lt;br /&gt;
protocol. Choose your email provider carefully and let's get rid of all&lt;br /&gt;
of these site-specific passwords that are just sitting there waiting to&lt;br /&gt;
be leaked and cracked.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Francois is a software engineer and security champion on the Mozilla Identity team where he works on decentralising authentication on the web. A long time Debian developer, Francois has been involved in Open Source and web development for a while and has always had a strong interest in security.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Andrew Kelly - Nothing to See Here!===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This is how it starts: &amp;quot;Seeking an exciting new challenge? Want to be responsible for building and shaping an embryonic information security function? Then you so won't want to miss this golden opportunity!&amp;quot; Andrew will talk about the setting up of an information security function in an organisation from scratch ('Greenfield') - as opposed to trying to bed yourself down into an already-existing organisation ('Brownfield'). He'll talk about the pros and the cons, and the many ups and downs. And hopefully he'll answer some questions like: Is there, if fact, any such thing as a greenfield security opportunity left in the wild? And ... if such mythical beasties do exist ... are they worth signing on for? Andrew will discuss the pitfalls and pratfalls of the journey from initial engagement, through (maybe) acceptance, until (perhaps) security sign-off and (hopefully) go-live. He'll also discuss both the Pit Bulls and prats you're likely to meet along the way. So ... if you want to hear a guy speak who reckons he's forgotten more than he ever thought he knew? Then this is so the talk for you!&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Andrew is a whole year older than he was when he presented at last year's OWASP Day: So this time around he's bringing a quarter century's worth of IT security experience to OWASP! Now 25 years ago, he was this mainframe security uber-tech - but today Andrew's recognised as being a 'pragmatic' subject-matter expert on corporate-level information security policy, compliance, frameworks and governance. His first greenfield security 'opportunity' came in November 1989 at the Sun Life Assurance Company of Canada, in the UK. And during those intervening 24 years, he's had similar experiences at various other companies including the likes of Lloyds/TSB Bank, Fonterra, BT Syntegra, Telecom/Gen-i and, lately, Health Benefits Ltd. - amongst many others.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
= Call For Presentations =&lt;br /&gt;
==Call For Presentations==&lt;br /&gt;
&lt;br /&gt;
OWASP New Zealand Day conferences attract a high quality of speakers from a variety of security disciplines including web developers, system administrators, penetration testers, policy specialists and more. We encourage presentations to have a strong component on fixing and prevention of security issues. We are looking for presentations on a wide variety of security topics, including but not limited to:&lt;br /&gt;
&lt;br /&gt;
* Web application security&lt;br /&gt;
* Mobile security&lt;br /&gt;
* Secure development&lt;br /&gt;
* Vulnerability analysis&lt;br /&gt;
* Threat modelling&lt;br /&gt;
* Threat and vulnerability countermeasures&lt;br /&gt;
* Platform or language security (.NET, Java, RoR, etc)&lt;br /&gt;
* Penetration Testing&lt;br /&gt;
* Browser and client security&lt;br /&gt;
* Application and solution architecture security&lt;br /&gt;
* PCI DSS&lt;br /&gt;
* Risk management&lt;br /&gt;
* Security concepts for C*Os, project managers and other non-technical attendees&lt;br /&gt;
* Privacy controls&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The email subject must be &amp;quot;OWASP New Zealand 2013: CFP&amp;quot; and the email body must contains the following information/sections:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name and Surname&lt;br /&gt;
* Affiliation&lt;br /&gt;
* Telephone number&lt;br /&gt;
* Email address&lt;br /&gt;
* Short presenter bio&lt;br /&gt;
* Title of the contribution&lt;br /&gt;
* Type of contribution: Technical, Informative, Management&lt;br /&gt;
* Short abstract (up to 500 words)&lt;br /&gt;
* List of the author's previous papers/articles/speeches on the same topic&lt;br /&gt;
* If you are not from New Zealand, will your company support your travel/accommodation costs? - Yes/No&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The submission will be reviewed by the OWASP New Zealand Day CFP Review Board and the highest voted talks will be selected and invited for presentation.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
PLEASE NOTE:&lt;br /&gt;
* Due to limited budget available, expenses for international speakers cannot be covered.&lt;br /&gt;
* If your company is willing to cover travel and accommodation costs, the company will become &amp;quot;Support Sponsor&amp;quot; of the event.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Please submit the above information to both Nick Freeman and Adrian Hayes - nick.freeman@owasp.org and adrian.hayes@owasp.org&lt;br /&gt;
&lt;br /&gt;
Submissions deadline: 1st August 2013&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Training =&lt;br /&gt;
==Training Events==&lt;br /&gt;
&lt;br /&gt;
We are happy to announce that training will run on Wednesday September 11th 2013, the day before the OWASP Day conference. The training venues will be auditoriums kindly provided by the University of Auckland, in the same building as the OWASP Day conference itself. Classes will contain up to 20 students, and each seat has power for laptop usage. Both courses will be run by the Aura Information Security, and there is both a basic and advanced course available. Feedback from previous training has been very positive - so get in quick! Details are as follows:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Basic Web Application Security ===&lt;br /&gt;
These days websites are under constant attack and it's incredibly easy for a developer or administrator to make seemingly minor mistakes that introduce security vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
You can't fight a war that you don't know you're waging. You can't defend your websites against attack unless you know the tricks the attackers are using to infiltrate. By the end of this workshop you'll have a good understanding of the OWASP Top 10 including:&lt;br /&gt;
&lt;br /&gt;
* Cross-Site Scripting (XSS)&lt;br /&gt;
* Cross-Site Request Forgery (CSRF)&lt;br /&gt;
* SQL Injection&lt;br /&gt;
* Man-In-the-Middle attacks&lt;br /&gt;
* Layering your defenses (defense-in-depth) that can help protect you from exploit chaining.&lt;br /&gt;
&lt;br /&gt;
More importantly, however, you'll also learn how to minimise the risk from these and other attacks, with practical tips that you can apply straight away to help you design, build and manage more secure websites. This workshop is essential for:&lt;br /&gt;
&lt;br /&gt;
* All developers and designers working on web applications but without formal training in security&lt;br /&gt;
* Anyone working in the website / web application space&lt;br /&gt;
* IT Professionals interested in security issues&lt;br /&gt;
&lt;br /&gt;
This is a hands on workshop where attendees must bring their own laptops. It is required that users are local admins or root on their own machines.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Advanced Web Application Security ===&lt;br /&gt;
This advanced web security course is for senior or experienced developers who are looking for a deeper understanding of web security, beyond the OWASP Top 10. By the end of this workshop you'll have a good understanding of:&lt;br /&gt;
&lt;br /&gt;
==== Advanced Attacks ====&lt;br /&gt;
&lt;br /&gt;
We will run through more complex attacks against web-apps using layered attacks requiring a multi-step defense including&lt;br /&gt;
&lt;br /&gt;
* Malicious file uploads and web shells &lt;br /&gt;
* XXS shells&lt;br /&gt;
* Padding oracle attacks &lt;br /&gt;
* XXE injection attacks &lt;br /&gt;
* Serialisation and file include attacks&lt;br /&gt;
* Timing attacks&lt;br /&gt;
* Cryptography&lt;br /&gt;
&lt;br /&gt;
Where, when and how to use it effectively and securely.&lt;br /&gt;
&lt;br /&gt;
==== Advanced Design and Defense ====&lt;br /&gt;
&lt;br /&gt;
* How to secure systems against malicious users and admins.&lt;br /&gt;
* How to secure data at rest such as credit cards, banking data or other high value data.&lt;br /&gt;
* Tools&lt;br /&gt;
&lt;br /&gt;
We will also introduce some of the tools and techniques you should use to test the security of your own systems&lt;br /&gt;
This is a hands on workshop where attendees must bring their own laptops. It is required that users are local admins or root on their own machines.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Registration ==&lt;br /&gt;
&lt;br /&gt;
Registration is handled through RegOnline, and both courses are NZD$500 per person. Please follow the link below to save your seat!&lt;br /&gt;
&lt;br /&gt;
[http://www.regonline.com/owaspnzday2013trainingandsponsorship http://www.regonline.com/owaspnzday2013trainingandsponsorship]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For further information, please contact us at the follow email addresses:&lt;br /&gt;
&lt;br /&gt;
* nick.freeman@owasp.org&lt;br /&gt;
* adrian.hayes@owasp.org&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Call For Sponsorships =&lt;br /&gt;
==Call For Sponsorships==&lt;br /&gt;
&lt;br /&gt;
OWASP New Zealand Day 2013 will be held in Auckland on the 12th of September, 2013 and is a security conference entirely dedicated to application security. The conference is once again being hosted by the University of Auckland with their support and assistance. OWASP New Zealand Day 2013 is a free event, but requires sponsor support to help be an instructive and quality event for the New Zealand community. OWASP is strictly non for profit. The sponsorship money will be used to help make OWASP New Zealand Day 2013 a free, compelling, and valuable experience for the audience.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The sponsorship funds collected are to be used for things such as:&lt;br /&gt;
&lt;br /&gt;
* Refreshments (coffee break/lunch) - we want to keep people refreshed during the day; while we certainly bring good and interesting speakers, we don't want people to go home when they become hungry. &lt;br /&gt;
* Name tags - we feel that getting to know people within the New Zealand community is important, and name tags make that possible.&lt;br /&gt;
* Promotion - up to now our events are propagating by word of mouth. We would like to get to a wider audience by advertising our events.&lt;br /&gt;
* Printed Materials - printed materials will include brochures, tags and lanyards.&lt;br /&gt;
&lt;br /&gt;
== Facts ==&lt;br /&gt;
&lt;br /&gt;
Last year, the event was supported by seven sponsors and attracted more than 250 participants. Plenty of constructive (and positive!) feedback from the audience was received and we are using this to make the conference more appealing to more people. For more information on last year's event, please visit: https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2012&lt;br /&gt;
&lt;br /&gt;
The OWASP New Zealand community is strong and there are more than 220 people currently subscribed to the mailing-list. OWASP New Zealand Day is expected to attract between 250 and 300 attendees this year.&lt;br /&gt;
&lt;br /&gt;
OWASP regular attendees are IT project managers, IT security managers, IT security consultants, web application architects and developers, QA managers, QA testers and system administrators.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Sponsorships  ==&lt;br /&gt;
&lt;br /&gt;
There are three different levels of sponsorships for the OWASP Day event:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Support Sponsorship&amp;lt;/b&amp;gt;: (Covering international speaker travel expenses, media coverage/article/promotion of the event)&lt;br /&gt;
	&lt;br /&gt;
Includes:&lt;br /&gt;
&lt;br /&gt;
* Publication of the sponsor logo on the event web site - https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2013&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Silver Sponsorship&amp;lt;/b&amp;gt;: 1500 NZD&lt;br /&gt;
&lt;br /&gt;
Includes: &lt;br /&gt;
&lt;br /&gt;
* Publication of the sponsor logo on the event web site - https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2013&lt;br /&gt;
* The publication of the sponsor logo in the event site, in the agenda, on the handouts and in all the official communications with the attendees at the conference.&lt;br /&gt;
* The possibility to distribute the company brochures, CDs or other materials to the participants during the event.&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Gold Sponsorship&amp;lt;/b&amp;gt;: 2750 NZD&lt;br /&gt;
&lt;br /&gt;
Includes: &lt;br /&gt;
&lt;br /&gt;
* The possibility to have a promotional banner or sign side stage in the main auditorium (to be provided by the sponsor, size subject to approval by the OWASP NZ Day Committee).&lt;br /&gt;
* The publication of the sponsor logo in the event site, in the agenda, on the handouts and in all the official communications with the attendees at the conference.&lt;br /&gt;
* The possibility to distribute the company brochures, CDs or other materials to the participants during the event.&lt;br /&gt;
* Publication of the sponsor logo on the OWASP New Zealand Chapter page	- Sponsor logo on the OWASP NZ site prior and during the OWASP Day event - https://www.owasp.org/index.php/New_Zealand&lt;br /&gt;
* Publication of the sponsor logo on the event web site - https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2013&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Those who are interested in sponsoring OWASP New Zealand 2013 Conference can contact the [mailto:nick.freeman@owasp.org?cc=adrian.hayes@owasp.org OWASP New Zealand Board].&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]]&lt;/div&gt;</summary>
		<author><name>Adrian Hayes</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_New_Zealand_Day_2013&amp;diff=157240</id>
		<title>OWASP New Zealand Day 2013</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_New_Zealand_Day_2013&amp;diff=157240"/>
				<updated>2013-08-22T22:08:56Z</updated>
		
		<summary type="html">&lt;p&gt;Adrian Hayes: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2013 https://www.owasp.org/images/3/3e/OWASP_NZ_Day_2013_logo.png]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''11th and 12st September 2013 - Auckland'''&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
= Introduction =&lt;br /&gt;
==Introduction==&lt;br /&gt;
We are proud to announce the fifth annual OWASP New Zealand Day conference, to be held at the University of Auckland on Thursday September 12th, 2013. OWASP New Zealand Day is a one-day conference dedicated to application security, with an emphasis on secure development techniques to help Kiwi developers build more secure applications.&lt;br /&gt;
&lt;br /&gt;
Similar to last year:&lt;br /&gt;
&lt;br /&gt;
* We will be offering training on the day before the conference (Wednesday, 11th of September). &lt;br /&gt;
* After lunch on the conference day, we will split to two tracks - one focused on deep technical topics, the other on policy, compliance and risk management. &lt;br /&gt;
&lt;br /&gt;
The fifth OWASP New Zealand Day will be happening thanks to the support provided by the University of Auckland School of Business, which will kindly offer the same conference venue of the last four years. Entry to the event will, as in the past, be free. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For any comments, feedback or observations, please don't hesitate to contact [mailto:nick.freeman@owasp.org?cc=adrian.hayes@owasp.org us].&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Registration==&lt;br /&gt;
&lt;br /&gt;
Registration for the main conference day is now open: [https://registration.owasp.org.nz/ Conference Registration Here]&lt;br /&gt;
&lt;br /&gt;
There is no cost for the main conference day and lunch is provided. We do ask that if at any point you realise you cannot make it please cancel your registration to make room for others as spaces are limited.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Training Registration is now open: [http://www.regonline.com/owaspnzday2013trainingandsponsorship Training Registration]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Important dates==&lt;br /&gt;
&lt;br /&gt;
* CFP &amp;amp; CFT submission deadline:	1st August 2013&lt;br /&gt;
* Conference Registration deadline: 30th August 2013&lt;br /&gt;
* Training Registration deadline: 	30th August 2013&lt;br /&gt;
* Training Day date:				11th September 2013&lt;br /&gt;
* Conference Day date:				12th September 2013&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Conference Venue==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
	&amp;lt;td&amp;gt;&lt;br /&gt;
		The University of Auckland Business School&amp;lt;br&amp;gt;&lt;br /&gt;
		Owen G Glenn Building&amp;lt;br&amp;gt;&lt;br /&gt;
		Room: OGGB 260-073 (OGGB4)&amp;lt;br&amp;gt;&lt;br /&gt;
		Address: 12 Grafton Road&amp;lt;br&amp;gt;&lt;br /&gt;
		Auckland&amp;lt;br&amp;gt;&lt;br /&gt;
		New Zealand&amp;lt;br&amp;gt;&lt;br /&gt;
		[http://maps.google.com/maps?oe=UTF-8&amp;amp;ie=UTF8&amp;amp;q=auckland+business+school&amp;amp;fb=1&amp;amp;split=1&amp;amp;cid=0,0,12303692579639430581&amp;amp;ei=6WeqSZr_OZLFkAWR--zbDQ&amp;amp;ll=-36.852308,174.770916&amp;amp;spn=0.01056,0.020621&amp;amp;z=16&amp;amp;iwloc=A Map]&lt;br /&gt;
	&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;td&amp;gt;&lt;br /&gt;
		[[Image:Auckland_business_school_small2.jpg]] [[Image:Room_hall.jpg]]&lt;br /&gt;
	&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Conference Sponsors==&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;bottom&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;[http://www.auckland.ac.nz/ https://www.owasp.org/images/8/82/University_of_Auckland_crest_small.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;bottom&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;[http://www.security.org.nz/NZISF_NZISForumContent.php https://www.owasp.org/images/5/5a/Nz_information_security_forum.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;ICT and Department of Information Systems and Operations Management&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Gold Sponsors:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com https://www.owasp.org/images/4/41/SA_Logo_w_DD.gif]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[[File:INSOMNIA.PNG|center|350px|link=http://www.insomniasec.com/]]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com www.security-assessment.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.insomniasec.com Insomnia Security]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Silver Sponsors:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[[File:Qualys logo small.png|center|200px|link=]]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[https://www.qualys.com/ www.qualys.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[[File:Orionhealth_logo_small.png|center|200px|link=]]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.orionhealth.com/ www.orionhealth.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Conference Committee==&lt;br /&gt;
&lt;br /&gt;
* Nick Freeman - OWASP New Zealand Leader (Auckland)&lt;br /&gt;
* Adrian Hayes -  OWASP New Zealand Leader (Wellington)&lt;br /&gt;
* Lech Janczewski - Associate Professor - University of Auckland School of Business&lt;br /&gt;
&lt;br /&gt;
Please direct all enquiries to nick.freeman@owasp.org and adrian.hayes@owasp.org.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Speakers List=&lt;br /&gt;
==Speakers List==&lt;br /&gt;
&lt;br /&gt;
===Tom Eastman  - Catalyst IT - Serialization Formats Aren't Toys===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Do you have an API? Do you accept input from users? Do you accept it in XML? What about YAML? Or maybe JSON? How safe are you? How sure are you? It's not in the OWASP Top 10, but you don't have to look far to hear stories of security vulnerabilities involving deserialization user inputs. Why do they keep happening?&lt;br /&gt;
&lt;br /&gt;
In this talk I'll go over what the threat is, how you might be making yourself vulnerable and how to mitigate the problem. I'll cover the features (not bugs, features) of formats like XML, YAML, and JSON that make them surprisingly dangerous, and how to protect your code from them.&lt;br /&gt;
&lt;br /&gt;
Because here's the thing: If you are using, say, a compliant, properly implemented XML parser to parse your XML, you are NOT safe. Possibly quite the opposite. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Tom is a senior Python developer and technical lead for Catalyst IT, New Zealand's largest company specialising in open source. Prior to that he worked as a developer and system administrator for the University of Otago Faculty of Medicine and as a Computer Science tutor for same.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Paul Haas - Security-Assessment.com -  Improving XPath Injection with Binary Search Optimisations===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
XPath injection is technique similar to SQL injection for attacking XML processors, however many people are unaware of the technique and exploitation vectors. This talk aims to expand awareness of both the risks and remediation path in addition to the introduction of a new technique to significantly improve reconstruction speed of the backend XML document. A brief primer to XPath injection will also be covered within the talk.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Paul Haas hails from California where the waves are better but the quakes are not. With over nine years of experience in professional hacking, he is currently working with Security-Assessment.com in Wellington to bring the good word of web hacks to Kiwis everywhere. His sole hobby is driving people into Mario Kart's abyss.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Nick von Dadelszen - Lateral Security - Security Vulnerability Disclosure===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Disclosing security vulnerabilities can be a dangerous business. While there are systems in place for handling disclosures to most major software companies, the process for disclosing vulnerabilities to local organisations is a lot less discussed.&lt;br /&gt;
&lt;br /&gt;
As the discloser, there is always the chance that you are accused of hacking and get a visit from the police merely for identifying an issue. As an organisation, you can find yourself on the front page of the news when someone goes public with an issue.&lt;br /&gt;
&lt;br /&gt;
This talk outlines the dilemmas faced when stumbling across that SQL injection in the local shopping site and proposes mechanisms to safely get the right people told about it. It also discusses how organisations can make it more likely that security vulnerabilities are reported to them directly, rather than through the press.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Nick von Dadelszen is the technical director at Lateral Security. Nick has been performing professional penetration testing for over 12 years and has managed several successful penetration testing teams. He has worked with the majority of large corporates and Government agencies in New Zealand and is a regular presenter at OWASP and Kiwicon conferences.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Mark Piper - Insomnia Security - OWASP Top 10 Mobile Risks - An Introduction By Case Study===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
As mobile application usage explodes, so does the associated application&lt;br /&gt;
security issues. The OWASP Mobile Security Project includes an&lt;br /&gt;
initiative to categorise and rate these issues into a top 10 format.&lt;br /&gt;
This list is known as the Top 10 Mobile Risks.&lt;br /&gt;
&lt;br /&gt;
During the session, we will introduce the current (RC1) Top 10 supported&lt;br /&gt;
with several real world case studies of issues.  We will cover how the&lt;br /&gt;
issues were identified, how they may be exploited by attackers and what&lt;br /&gt;
mitigation's could be implemented to resolve the issues in the future.&lt;br /&gt;
While the issues will be largely platform agnostic, the examples will&lt;br /&gt;
cover both iOS and Android environments.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Mark is a Principal Security Consultant with the Insomnia Security&lt;br /&gt;
team. Mark spends his days auditing software, running penetration&lt;br /&gt;
testing and red team engagements while working with global customers on&lt;br /&gt;
developing new testing services.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Kirk Jackson - Xero - Bad Smells That Lead to Bad Security===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Your job as a defender is to reduce the attack surface of your web application and protect your infrastructure and data from being breached. However we can't be involved in every decision that goes on in our organisation, and we don't always think the same as an attacker does. This talk will introduce you to some common &amp;quot;bad smells&amp;quot; that might indicate security issues lurking under the surface of your code, and help you develop your spidey sense so that you know when to raise the alarm.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Kirk is the Security Officer at Xero, and is interested in writing and defending secure web applications.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Kim Carter - BinaryMist - What's Our Software Doing With All That User Input===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
What are we doing with all the characters that get shoved into our applications? Have we considered every potential execution context?&lt;br /&gt;
It's often interesting and surprising to see what sort of concoction of characters can be executed in different places... and linking multiple attack vectors together which the builders haven't thought about.&lt;br /&gt;
What are we trusting? Why are we trusting it? What, where and how should we be sanitising?&lt;br /&gt;
&lt;br /&gt;
We have a vast collection of libraries, techniques, cheat sheets, tutorials, guides and tools at our disposal.&lt;br /&gt;
I often find myself thinking... how can we commoditise the sanitisation of user input and I keep coming up with the same answer.&lt;br /&gt;
It's not easy. Every application has a completely different set of concerns.&lt;br /&gt;
&lt;br /&gt;
In order for our software to be shielded from an attack, the builders must think like attackers.&lt;br /&gt;
&lt;br /&gt;
In this talk I'll attempt to:&lt;br /&gt;
&lt;br /&gt;
* Increase our knowledge and awareness&lt;br /&gt;
* Discuss practical techniques and approaches that increase our defences&lt;br /&gt;
* Break some software&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Kim Carter is a Software Engineer, Architect, Entrepreneur and the founder of BinaryMist. He is passionate about and enjoys many things. Some of which include:&lt;br /&gt;
* Designing and creating robust software and networks.&lt;br /&gt;
* Breaking his and others software and networks, then fixing it/them.&lt;br /&gt;
* Teaching, training, mentoring, motivating, listening to and being around smart people.&lt;br /&gt;
* Increasing quality awareness and helping people and organisations implement higher quality in a cost effective manner.&lt;br /&gt;
* Improving operational efficiencies.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Hugh Davenport - Aura RedEye Security - Bug Chaining (aka, why XSS can be worse than you think) ===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Security bugs can range in damage from small stuff, all the way to big stuff. Some people only focus on the large stuff, and the smaller stuff can go unnoticed. This talk will give a real world example of a project that had a small bug, that allowed a larger bug to happen, which allowed a larger bug, which allowed for unwanted shell access. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Hugh works at Aura RedEye Security on their managed vulnerability scanning service. In his spare time, he is the security point of contact on the Mahara open source tool and contributes to many other open source projects. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Hinne Hettema - University of Auckland - Evolution of Threats and the Skills in our Security Team===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The threat landscape for security threats is constantly evolving, with new threats being stealthier, more diverse, and increasingly aimed at bypassing the protection offered by antivirus and network intrusion detection systems. Adversaries are now often part of a semi-organised underground economy geared towards the acquisition and sale of digital assets such as usernames, passwords, confidential business information, financial data and designs. There are specific value chains in this economy, which make the acquisition, sale and utilisation of such assets a relatively easy process.&lt;br /&gt;
&lt;br /&gt;
This talk focuses on the skills needed in a security team to deal with this next level of threat, and on the sort of teams that we need in enterprise security to address the modern threats that we face.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Hinne Hettema is the team leader of the IT security team at The University of Auckland, an honorary research fellow in the Department of Philosophy at The University of Auckland, and lectures in cyber security at Unitec. He has 10 years experience in security consulting and has a PhD in Philosophy (2012) and theoretical chemistry (1993).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Francois Marier - Mozilla - Securing the Web Without Site-Specific Passwords===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Has anyone else noticed that the OWASP Top 10 is not changing very much?&lt;br /&gt;
Especially in the realm of authentication-related problems. I don't&lt;br /&gt;
claim to have the one true solution for this, but one thing is certain:&lt;br /&gt;
if we change how things are done on the web and relieve developers from&lt;br /&gt;
having to store passwords, we can make things better.&lt;br /&gt;
&lt;br /&gt;
We need to let web developers outsource their authentication needs to&lt;br /&gt;
people who can do it well. Does that mean we should force all of our&lt;br /&gt;
users to join Facebook? Well not really. That might work for some sites,&lt;br /&gt;
but outsourcing all of our logins to a single for-profit company isn't a&lt;br /&gt;
solution that works for the whole web.&lt;br /&gt;
&lt;br /&gt;
The open web needs a better solution. One that enable users to choose&lt;br /&gt;
their identity provider and shop for the most secure one if that's what&lt;br /&gt;
they're into. This is the promise behind Persona and the BrowserID&lt;br /&gt;
protocol. Choose your email provider carefully and let's get rid of all&lt;br /&gt;
of these site-specific passwords that are just sitting there waiting to&lt;br /&gt;
be leaked and cracked.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Francois is a software engineer and security champion on the Mozilla Identity team where he works on decentralising authentication on the web. A long time Debian developer, Francois has been involved in Open Source and web development for a while and has always had a strong interest in security.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Andrew Kelly - Nothing to See Here!===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This is how it starts: &amp;quot;Seeking an exciting new challenge? Want to be responsible for building and shaping an embryonic information security function? Then you so won't want to miss this golden opportunity!&amp;quot; Andrew will talk about the setting up of an information security function in an organisation from scratch ('Greenfield') - as opposed to trying to bed yourself down into an already-existing organisation ('Brownfield'). He'll talk about the pros and the cons, and the many ups and downs. And hopefully he'll answer some questions like: Is there, if fact, any such thing as a greenfield security opportunity left in the wild? And ... if such mythical beasties do exist ... are they worth signing on for? Andrew will discuss the pitfalls and pratfalls of the journey from initial engagement, through (maybe) acceptance, until (perhaps) security sign-off and (hopefully) go-live. He'll also discuss both the Pit Bulls and prats you're likely to meet along the way. So ... if you want to hear a guy speak who reckons he's forgotten more than he ever thought he knew? Then this is so the talk for you!&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Andrew is a whole year older than he was when he presented at last year's OWASP Day: So this time around he's bringing a quarter century's worth of IT security experience to OWASP! Now 25 years ago, he was this mainframe security uber-tech - but today Andrew's recognised as being a 'pragmatic' subject-matter expert on corporate-level information security policy, compliance, frameworks and governance. His first greenfield security 'opportunity' came in November 1989 at the Sun Life Assurance Company of Canada, in the UK. And during those intervening 24 years, he's had similar experiences at various other companies including the likes of Lloyds/TSB Bank, Fonterra, BT Syntegra, Telecom/Gen-i and, lately, Health Benefits Ltd. - amongst many others.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Call For Presentations =&lt;br /&gt;
==Call For Presentations==&lt;br /&gt;
&lt;br /&gt;
OWASP New Zealand Day conferences attract a high quality of speakers from a variety of security disciplines including web developers, system administrators, penetration testers, policy specialists and more. We encourage presentations to have a strong component on fixing and prevention of security issues. We are looking for presentations on a wide variety of security topics, including but not limited to:&lt;br /&gt;
&lt;br /&gt;
* Web application security&lt;br /&gt;
* Mobile security&lt;br /&gt;
* Secure development&lt;br /&gt;
* Vulnerability analysis&lt;br /&gt;
* Threat modelling&lt;br /&gt;
* Threat and vulnerability countermeasures&lt;br /&gt;
* Platform or language security (.NET, Java, RoR, etc)&lt;br /&gt;
* Penetration Testing&lt;br /&gt;
* Browser and client security&lt;br /&gt;
* Application and solution architecture security&lt;br /&gt;
* PCI DSS&lt;br /&gt;
* Risk management&lt;br /&gt;
* Security concepts for C*Os, project managers and other non-technical attendees&lt;br /&gt;
* Privacy controls&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The email subject must be &amp;quot;OWASP New Zealand 2013: CFP&amp;quot; and the email body must contains the following information/sections:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name and Surname&lt;br /&gt;
* Affiliation&lt;br /&gt;
* Telephone number&lt;br /&gt;
* Email address&lt;br /&gt;
* Short presenter bio&lt;br /&gt;
* Title of the contribution&lt;br /&gt;
* Type of contribution: Technical, Informative, Management&lt;br /&gt;
* Short abstract (up to 500 words)&lt;br /&gt;
* List of the author's previous papers/articles/speeches on the same topic&lt;br /&gt;
* If you are not from New Zealand, will your company support your travel/accommodation costs? - Yes/No&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The submission will be reviewed by the OWASP New Zealand Day CFP Review Board and the highest voted talks will be selected and invited for presentation.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
PLEASE NOTE:&lt;br /&gt;
* Due to limited budget available, expenses for international speakers cannot be covered.&lt;br /&gt;
* If your company is willing to cover travel and accommodation costs, the company will become &amp;quot;Support Sponsor&amp;quot; of the event.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Please submit the above information to both Nick Freeman and Adrian Hayes - nick.freeman@owasp.org and adrian.hayes@owasp.org&lt;br /&gt;
&lt;br /&gt;
Submissions deadline: 1st August 2013&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Training =&lt;br /&gt;
==Training Events==&lt;br /&gt;
&lt;br /&gt;
We are happy to announce that training will run on Wednesday September 11th 2013, the day before the OWASP Day conference. The training venues will be auditoriums kindly provided by the University of Auckland, in the same building as the OWASP Day conference itself. Classes will contain up to 20 students, and each seat has power for laptop usage. Both courses will be run by the Aura Information Security, and there is both a basic and advanced course available. Feedback from previous training has been very positive - so get in quick! Details are as follows:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Basic Web Application Security ===&lt;br /&gt;
These days websites are under constant attack and it's incredibly easy for a developer or administrator to make seemingly minor mistakes that introduce security vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
You can't fight a war that you don't know you're waging. You can't defend your websites against attack unless you know the tricks the attackers are using to infiltrate. By the end of this workshop you'll have a good understanding of the OWASP Top 10 including:&lt;br /&gt;
&lt;br /&gt;
* Cross-Site Scripting (XSS)&lt;br /&gt;
* Cross-Site Request Forgery (CSRF)&lt;br /&gt;
* SQL Injection&lt;br /&gt;
* Man-In-the-Middle attacks&lt;br /&gt;
* Layering your defenses (defense-in-depth) that can help protect you from exploit chaining.&lt;br /&gt;
&lt;br /&gt;
More importantly, however, you'll also learn how to minimise the risk from these and other attacks, with practical tips that you can apply straight away to help you design, build and manage more secure websites. This workshop is essential for:&lt;br /&gt;
&lt;br /&gt;
* All developers and designers working on web applications but without formal training in security&lt;br /&gt;
* Anyone working in the website / web application space&lt;br /&gt;
* IT Professionals interested in security issues&lt;br /&gt;
&lt;br /&gt;
This is a hands on workshop where attendees must bring their own laptops. It is required that users are local admins or root on their own machines.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Advanced Web Application Security ===&lt;br /&gt;
This advanced web security course is for senior or experienced developers who are looking for a deeper understanding of web security, beyond the OWASP Top 10. By the end of this workshop you'll have a good understanding of:&lt;br /&gt;
&lt;br /&gt;
==== Advanced Attacks ====&lt;br /&gt;
&lt;br /&gt;
We will run through more complex attacks against web-apps using layered attacks requiring a multi-step defense including&lt;br /&gt;
&lt;br /&gt;
* Malicious file uploads and web shells &lt;br /&gt;
* XXS shells&lt;br /&gt;
* Padding oracle attacks &lt;br /&gt;
* XXE injection attacks &lt;br /&gt;
* Serialisation and file include attacks&lt;br /&gt;
* Timing attacks&lt;br /&gt;
* Cryptography&lt;br /&gt;
&lt;br /&gt;
Where, when and how to use it effectively and securely.&lt;br /&gt;
&lt;br /&gt;
==== Advanced Design and Defense ====&lt;br /&gt;
&lt;br /&gt;
* How to secure systems against malicious users and admins.&lt;br /&gt;
* How to secure data at rest such as credit cards, banking data or other high value data.&lt;br /&gt;
* Tools&lt;br /&gt;
&lt;br /&gt;
We will also introduce some of the tools and techniques you should use to test the security of your own systems&lt;br /&gt;
This is a hands on workshop where attendees must bring their own laptops. It is required that users are local admins or root on their own machines.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Registration ==&lt;br /&gt;
&lt;br /&gt;
Registration is handled through RegOnline, and both courses are NZD$500 per person. Please follow the link below to save your seat!&lt;br /&gt;
&lt;br /&gt;
[http://www.regonline.com/owaspnzday2013trainingandsponsorship http://www.regonline.com/owaspnzday2013trainingandsponsorship]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For further information, please contact us at the follow email addresses:&lt;br /&gt;
&lt;br /&gt;
* nick.freeman@owasp.org&lt;br /&gt;
* adrian.hayes@owasp.org&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Call For Sponsorships =&lt;br /&gt;
==Call For Sponsorships==&lt;br /&gt;
&lt;br /&gt;
OWASP New Zealand Day 2013 will be held in Auckland on the 12th of September, 2013 and is a security conference entirely dedicated to application security. The conference is once again being hosted by the University of Auckland with their support and assistance. OWASP New Zealand Day 2013 is a free event, but requires sponsor support to help be an instructive and quality event for the New Zealand community. OWASP is strictly non for profit. The sponsorship money will be used to help make OWASP New Zealand Day 2013 a free, compelling, and valuable experience for the audience.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The sponsorship funds collected are to be used for things such as:&lt;br /&gt;
&lt;br /&gt;
* Refreshments (coffee break/lunch) - we want to keep people refreshed during the day; while we certainly bring good and interesting speakers, we don't want people to go home when they become hungry. &lt;br /&gt;
* Name tags - we feel that getting to know people within the New Zealand community is important, and name tags make that possible.&lt;br /&gt;
* Promotion - up to now our events are propagating by word of mouth. We would like to get to a wider audience by advertising our events.&lt;br /&gt;
* Printed Materials - printed materials will include brochures, tags and lanyards.&lt;br /&gt;
&lt;br /&gt;
== Facts ==&lt;br /&gt;
&lt;br /&gt;
Last year, the event was supported by seven sponsors and attracted more than 250 participants. Plenty of constructive (and positive!) feedback from the audience was received and we are using this to make the conference more appealing to more people. For more information on last year's event, please visit: https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2012&lt;br /&gt;
&lt;br /&gt;
The OWASP New Zealand community is strong and there are more than 220 people currently subscribed to the mailing-list. OWASP New Zealand Day is expected to attract between 250 and 300 attendees this year.&lt;br /&gt;
&lt;br /&gt;
OWASP regular attendees are IT project managers, IT security managers, IT security consultants, web application architects and developers, QA managers, QA testers and system administrators.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Sponsorships  ==&lt;br /&gt;
&lt;br /&gt;
There are three different levels of sponsorships for the OWASP Day event:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Support Sponsorship&amp;lt;/b&amp;gt;: (Covering international speaker travel expenses, media coverage/article/promotion of the event)&lt;br /&gt;
	&lt;br /&gt;
Includes:&lt;br /&gt;
&lt;br /&gt;
* Publication of the sponsor logo on the event web site - https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2013&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Silver Sponsorship&amp;lt;/b&amp;gt;: 1500 NZD&lt;br /&gt;
&lt;br /&gt;
Includes: &lt;br /&gt;
&lt;br /&gt;
* Publication of the sponsor logo on the event web site - https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2013&lt;br /&gt;
* The publication of the sponsor logo in the event site, in the agenda, on the handouts and in all the official communications with the attendees at the conference.&lt;br /&gt;
* The possibility to distribute the company brochures, CDs or other materials to the participants during the event.&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Gold Sponsorship&amp;lt;/b&amp;gt;: 2750 NZD&lt;br /&gt;
&lt;br /&gt;
Includes: &lt;br /&gt;
&lt;br /&gt;
* The possibility to have a promotional banner or sign side stage in the main auditorium (to be provided by the sponsor, size subject to approval by the OWASP NZ Day Committee).&lt;br /&gt;
* The publication of the sponsor logo in the event site, in the agenda, on the handouts and in all the official communications with the attendees at the conference.&lt;br /&gt;
* The possibility to distribute the company brochures, CDs or other materials to the participants during the event.&lt;br /&gt;
* Publication of the sponsor logo on the OWASP New Zealand Chapter page	- Sponsor logo on the OWASP NZ site prior and during the OWASP Day event - https://www.owasp.org/index.php/New_Zealand&lt;br /&gt;
* Publication of the sponsor logo on the event web site - https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2013&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Those who are interested in sponsoring OWASP New Zealand 2013 Conference can contact the [mailto:nick.freeman@owasp.org?cc=adrian.hayes@owasp.org OWASP New Zealand Board].&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]]&lt;/div&gt;</summary>
		<author><name>Adrian Hayes</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_New_Zealand_Day_2013&amp;diff=157121</id>
		<title>OWASP New Zealand Day 2013</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_New_Zealand_Day_2013&amp;diff=157121"/>
				<updated>2013-08-22T03:14:09Z</updated>
		
		<summary type="html">&lt;p&gt;Adrian Hayes: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2013 https://www.owasp.org/images/3/3e/OWASP_NZ_Day_2013_logo.png]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''11th and 12st September 2013 - Auckland'''&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
= Introduction =&lt;br /&gt;
==Introduction==&lt;br /&gt;
We are proud to announce the fifth annual OWASP New Zealand Day conference, to be held at the University of Auckland on Thursday September 12th, 2013. OWASP New Zealand Day is a one-day conference dedicated to application security, with an emphasis on secure development techniques to help Kiwi developers build more secure applications.&lt;br /&gt;
&lt;br /&gt;
Similar to last year:&lt;br /&gt;
&lt;br /&gt;
* We will be offering training on the day before the conference (Wednesday, 11th of September). &lt;br /&gt;
* After lunch on the conference day, we will split to two tracks - one focused on deep technical topics, the other on policy, compliance and risk management. &lt;br /&gt;
&lt;br /&gt;
The fifth OWASP New Zealand Day will be happening thanks to the support provided by the University of Auckland School of Business, which will kindly offer the same conference venue of the last four years. Entry to the event will, as in the past, be free. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For any comments, feedback or observations, please don't hesitate to contact [mailto:nick.freeman@owasp.org?cc=adrian.hayes@owasp.org us].&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Registration==&lt;br /&gt;
&lt;br /&gt;
Registration for the main conference day is now open: [https://registration.owasp.org.nz/ Register Here]&lt;br /&gt;
&lt;br /&gt;
There is no cost for the main conference day and lunch is provided. We do ask that if at any point you realise you cannot make it please cancel your registration to make room for others as spaces are limited.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Training registration will be handled separately and is not yet open. Please join our low volume [http://lists.owasp.org/mailman/listinfo/owasp-newzealand mailing list] to be notified when registration opens.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Important dates==&lt;br /&gt;
&lt;br /&gt;
* CFP &amp;amp; CFT submission deadline:	1st August 2013&lt;br /&gt;
* Conference Registration deadline: 30th August 2013&lt;br /&gt;
* Training Registration deadline: 	30th August 2013&lt;br /&gt;
* Training Day date:				11th September 2013&lt;br /&gt;
* Conference Day date:				12th September 2013&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Conference Venue==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
	&amp;lt;td&amp;gt;&lt;br /&gt;
		The University of Auckland Business School&amp;lt;br&amp;gt;&lt;br /&gt;
		Owen G Glenn Building&amp;lt;br&amp;gt;&lt;br /&gt;
		Room: OGGB 260-073 (OGGB4)&amp;lt;br&amp;gt;&lt;br /&gt;
		Address: 12 Grafton Road&amp;lt;br&amp;gt;&lt;br /&gt;
		Auckland&amp;lt;br&amp;gt;&lt;br /&gt;
		New Zealand&amp;lt;br&amp;gt;&lt;br /&gt;
		[http://maps.google.com/maps?oe=UTF-8&amp;amp;ie=UTF8&amp;amp;q=auckland+business+school&amp;amp;fb=1&amp;amp;split=1&amp;amp;cid=0,0,12303692579639430581&amp;amp;ei=6WeqSZr_OZLFkAWR--zbDQ&amp;amp;ll=-36.852308,174.770916&amp;amp;spn=0.01056,0.020621&amp;amp;z=16&amp;amp;iwloc=A Map]&lt;br /&gt;
	&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;td&amp;gt;&lt;br /&gt;
		[[Image:Auckland_business_school_small2.jpg]] [[Image:Room_hall.jpg]]&lt;br /&gt;
	&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Conference Sponsors==&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;bottom&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;[http://www.auckland.ac.nz/ https://www.owasp.org/images/8/82/University_of_Auckland_crest_small.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;bottom&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;[http://www.security.org.nz/NZISF_NZISForumContent.php https://www.owasp.org/images/5/5a/Nz_information_security_forum.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;ICT and Department of Information Systems and Operations Management&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Gold Sponsors:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com https://www.owasp.org/images/4/41/SA_Logo_w_DD.gif]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[[File:INSOMNIA.PNG|center|350px|link=http://www.insomniasec.com/]]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com www.security-assessment.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.insomniasec.com Insomnia Security]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Silver Sponsors:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[[File:Qualys logo small.png|center|200px|link=]]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[https://www.qualys.com/ www.qualys.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[[File:Orionhealth_logo_small.png|center|200px|link=]]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.orionhealth.com/ www.orionhealth.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Conference Committee==&lt;br /&gt;
&lt;br /&gt;
* Nick Freeman - OWASP New Zealand Leader (Auckland)&lt;br /&gt;
* Adrian Hayes -  OWASP New Zealand Leader (Wellington)&lt;br /&gt;
* Lech Janczewski - Associate Professor - University of Auckland School of Business&lt;br /&gt;
&lt;br /&gt;
Please direct all enquiries to nick.freeman@owasp.org and adrian.hayes@owasp.org.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Speakers List=&lt;br /&gt;
==Speakers List==&lt;br /&gt;
&lt;br /&gt;
===Tom Eastman  - Catalyst IT - Serialization Formats Aren't Toys===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Do you have an API? Do you accept input from users? Do you accept it in XML? What about YAML? Or maybe JSON? How safe are you? How sure are you? It's not in the OWASP Top 10, but you don't have to look far to hear stories of security vulnerabilities involving deserialization user inputs. Why do they keep happening?&lt;br /&gt;
&lt;br /&gt;
In this talk I'll go over what the threat is, how you might be making yourself vulnerable and how to mitigate the problem. I'll cover the features (not bugs, features) of formats like XML, YAML, and JSON that make them surprisingly dangerous, and how to protect your code from them.&lt;br /&gt;
&lt;br /&gt;
Because here's the thing: If you are using, say, a compliant, properly implemented XML parser to parse your XML, you are NOT safe. Possibly quite the opposite. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Tom is a senior Python developer and technical lead for Catalyst IT, New Zealand's largest company specialising in open source. Prior to that he worked as a developer and system administrator for the University of Otago Faculty of Medicine and as a Computer Science tutor for same.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Paul Haas - Security-Assessment.com -  Improving XPath Injection with Binary Search Optimisations===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
XPath injection is technique similar to SQL injection for attacking XML processors, however many people are unaware of the technique and exploitation vectors. This talk aims to expand awareness of both the risks and remediation path in addition to the introduction of a new technique to significantly improve reconstruction speed of the backend XML document. A brief primer to XPath injection will also be covered within the talk.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Paul Haas hails from California where the waves are better but the quakes are not. With over nine years of experience in professional hacking, he is currently working with Security-Assessment.com in Wellington to bring the good word of web hacks to Kiwis everywhere. His sole hobby is driving people into Mario Kart's abyss.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Nick von Dadelszen - Lateral Security - Security Vulnerability Disclosure===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Disclosing security vulnerabilities can be a dangerous business. While there are systems in place for handling disclosures to most major software companies, the process for disclosing vulnerabilities to local organisations is a lot less discussed.&lt;br /&gt;
&lt;br /&gt;
As the discloser, there is always the chance that you are accused of hacking and get a visit from the police merely for identifying an issue. As an organisation, you can find yourself on the front page of the news when someone goes public with an issue.&lt;br /&gt;
&lt;br /&gt;
This talk outlines the dilemmas faced when stumbling across that SQL injection in the local shopping site and proposes mechanisms to safely get the right people told about it. It also discusses how organisations can make it more likely that security vulnerabilities are reported to them directly, rather than through the press.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Nick von Dadelszen is the technical director at Lateral Security. Nick has been performing professional penetration testing for over 12 years and has managed several successful penetration testing teams. He has worked with the majority of large corporates and Government agencies in New Zealand and is a regular presenter at OWASP and Kiwicon conferences.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Mark Piper - Insomnia Security - OWASP Top 10 Mobile Risks - An Introduction By Case Study===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
As mobile application usage explodes, so does the associated application&lt;br /&gt;
security issues. The OWASP Mobile Security Project includes an&lt;br /&gt;
initiative to categorise and rate these issues into a top 10 format.&lt;br /&gt;
This list is known as the Top 10 Mobile Risks.&lt;br /&gt;
&lt;br /&gt;
During the session, we will introduce the current (RC1) Top 10 supported&lt;br /&gt;
with several real world case studies of issues.  We will cover how the&lt;br /&gt;
issues were identified, how they may be exploited by attackers and what&lt;br /&gt;
mitigation's could be implemented to resolve the issues in the future.&lt;br /&gt;
While the issues will be largely platform agnostic, the examples will&lt;br /&gt;
cover both iOS and Android environments.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Mark is a Principal Security Consultant with the Insomnia Security&lt;br /&gt;
team. Mark spends his days auditing software, running penetration&lt;br /&gt;
testing and red team engagements while working with global customers on&lt;br /&gt;
developing new testing services.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Kirk Jackson - Xero - Bad Smells That Lead to Bad Security===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Your job as a defender is to reduce the attack surface of your web application and protect your infrastructure and data from being breached. However we can't be involved in every decision that goes on in our organisation, and we don't always think the same as an attacker does. This talk will introduce you to some common &amp;quot;bad smells&amp;quot; that might indicate security issues lurking under the surface of your code, and help you develop your spidey sense so that you know when to raise the alarm.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Kirk is the Security Officer at Xero, and is interested in writing and defending secure web applications.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Kim Carter - BinaryMist - What's Our Software Doing With All That User Input===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
What are we doing with all the characters that get shoved into our applications? Have we considered every potential execution context?&lt;br /&gt;
It's often interesting and surprising to see what sort of concoction of characters can be executed in different places... and linking multiple attack vectors together which the builders haven't thought about.&lt;br /&gt;
What are we trusting? Why are we trusting it? What, where and how should we be sanitising?&lt;br /&gt;
&lt;br /&gt;
We have a vast collection of libraries, techniques, cheat sheets, tutorials, guides and tools at our disposal.&lt;br /&gt;
I often find myself thinking... how can we commoditise the sanitisation of user input and I keep coming up with the same answer.&lt;br /&gt;
It's not easy. Every application has a completely different set of concerns.&lt;br /&gt;
&lt;br /&gt;
In order for our software to be shielded from an attack, the builders must think like attackers.&lt;br /&gt;
&lt;br /&gt;
In this talk I'll attempt to:&lt;br /&gt;
&lt;br /&gt;
* Increase our knowledge and awareness&lt;br /&gt;
* Discuss practical techniques and approaches that increase our defences&lt;br /&gt;
* Break some software&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Kim Carter is a Software Engineer, Architect, Entrepreneur and the founder of BinaryMist. He is passionate about and enjoys many things. Some of which include:&lt;br /&gt;
* Designing and creating robust software and networks.&lt;br /&gt;
* Breaking his and others software and networks, then fixing it/them.&lt;br /&gt;
* Teaching, training, mentoring, motivating, listening to and being around smart people.&lt;br /&gt;
* Increasing quality awareness and helping people and organisations implement higher quality in a cost effective manner.&lt;br /&gt;
* Improving operational efficiencies.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Hugh Davenport - Aura RedEye Security - Bug Chaining (aka, why XSS can be worse than you think) ===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Security bugs can range in damage from small stuff, all the way to big stuff. Some people only focus on the large stuff, and the smaller stuff can go unnoticed. This talk will give a real world example of a project that had a small bug, that allowed a larger bug to happen, which allowed a larger bug, which allowed for unwanted shell access. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Hugh works at Aura RedEye Security on their managed vulnerability scanning service. In his spare time, he is the security point of contact on the Mahara open source tool and contributes to many other open source projects. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Hinne Hettema - University of Auckland - Evolution of Threats and the Skills in our Security Team===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The threat landscape for security threats is constantly evolving, with new threats being stealthier, more diverse, and increasingly aimed at bypassing the protection offered by antivirus and network intrusion detection systems. Adversaries are now often part of a semi-organised underground economy geared towards the acquisition and sale of digital assets such as usernames, passwords, confidential business information, financial data and designs. There are specific value chains in this economy, which make the acquisition, sale and utilisation of such assets a relatively easy process.&lt;br /&gt;
&lt;br /&gt;
This talk focuses on the skills needed in a security team to deal with this next level of threat, and on the sort of teams that we need in enterprise security to address the modern threats that we face.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Hinne Hettema is the team leader of the IT security team at The University of Auckland, an honorary research fellow in the Department of Philosophy at The University of Auckland, and lectures in cyber security at Unitec. He has 10 years experience in security consulting and has a PhD in Philosophy (2012) and theoretical chemistry (1993).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Francois Marier - Mozilla - Securing the Web Without Site-Specific Passwords===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Has anyone else noticed that the OWASP Top 10 is not changing very much?&lt;br /&gt;
Especially in the realm of authentication-related problems. I don't&lt;br /&gt;
claim to have the one true solution for this, but one thing is certain:&lt;br /&gt;
if we change how things are done on the web and relieve developers from&lt;br /&gt;
having to store passwords, we can make things better.&lt;br /&gt;
&lt;br /&gt;
We need to let web developers outsource their authentication needs to&lt;br /&gt;
people who can do it well. Does that mean we should force all of our&lt;br /&gt;
users to join Facebook? Well not really. That might work for some sites,&lt;br /&gt;
but outsourcing all of our logins to a single for-profit company isn't a&lt;br /&gt;
solution that works for the whole web.&lt;br /&gt;
&lt;br /&gt;
The open web needs a better solution. One that enable users to choose&lt;br /&gt;
their identity provider and shop for the most secure one if that's what&lt;br /&gt;
they're into. This is the promise behind Persona and the BrowserID&lt;br /&gt;
protocol. Choose your email provider carefully and let's get rid of all&lt;br /&gt;
of these site-specific passwords that are just sitting there waiting to&lt;br /&gt;
be leaked and cracked.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Francois is a software engineer and security champion on the Mozilla Identity team where he works on decentralising authentication on the web. A long time Debian developer, Francois has been involved in Open Source and web development for a while and has always had a strong interest in security.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Andrew Kelly - Nothing to See Here!===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This is how it starts: &amp;quot;Seeking an exciting new challenge? Want to be responsible for building and shaping an embryonic information security function? Then you so won't want to miss this golden opportunity!&amp;quot; Andrew will talk about the setting up of an information security function in an organisation from scratch ('Greenfield') - as opposed to trying to bed yourself down into an already-existing organisation ('Brownfield'). He'll talk about the pros and the cons, and the many ups and downs. And hopefully he'll answer some questions like: Is there, if fact, any such thing as a greenfield security opportunity left in the wild? And ... if such mythical beasties do exist ... are they worth signing on for? Andrew will discuss the pitfalls and pratfalls of the journey from initial engagement, through (maybe) acceptance, until (perhaps) security sign-off and (hopefully) go-live. He'll also discuss both the Pit Bulls and prats you're likely to meet along the way. So ... if you want to hear a guy speak who reckons he's forgotten more than he ever thought he knew? Then this is so the talk for you!&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Andrew is a whole year older than he was when he presented at last year's OWASP Day: So this time around he's bringing a quarter century's worth of IT security experience to OWASP! Now 25 years ago, he was this mainframe security uber-tech - but today Andrew's recognised as being a 'pragmatic' subject-matter expert on corporate-level information security policy, compliance, frameworks and governance. His first greenfield security 'opportunity' came in November 1989 at the Sun Life Assurance Company of Canada, in the UK. And during those intervening 24 years, he's had similar experiences at various other companies including the likes of Lloyds/TSB Bank, Fonterra, BT Syntegra, Telecom/Gen-i and, lately, Health Benefits Ltd. - amongst many others.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Call For Presentations =&lt;br /&gt;
==Call For Presentations==&lt;br /&gt;
&lt;br /&gt;
OWASP New Zealand Day conferences attract a high quality of speakers from a variety of security disciplines including web developers, system administrators, penetration testers, policy specialists and more. We encourage presentations to have a strong component on fixing and prevention of security issues. We are looking for presentations on a wide variety of security topics, including but not limited to:&lt;br /&gt;
&lt;br /&gt;
* Web application security&lt;br /&gt;
* Mobile security&lt;br /&gt;
* Secure development&lt;br /&gt;
* Vulnerability analysis&lt;br /&gt;
* Threat modelling&lt;br /&gt;
* Threat and vulnerability countermeasures&lt;br /&gt;
* Platform or language security (.NET, Java, RoR, etc)&lt;br /&gt;
* Penetration Testing&lt;br /&gt;
* Browser and client security&lt;br /&gt;
* Application and solution architecture security&lt;br /&gt;
* PCI DSS&lt;br /&gt;
* Risk management&lt;br /&gt;
* Security concepts for C*Os, project managers and other non-technical attendees&lt;br /&gt;
* Privacy controls&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The email subject must be &amp;quot;OWASP New Zealand 2013: CFP&amp;quot; and the email body must contains the following information/sections:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name and Surname&lt;br /&gt;
* Affiliation&lt;br /&gt;
* Telephone number&lt;br /&gt;
* Email address&lt;br /&gt;
* Short presenter bio&lt;br /&gt;
* Title of the contribution&lt;br /&gt;
* Type of contribution: Technical, Informative, Management&lt;br /&gt;
* Short abstract (up to 500 words)&lt;br /&gt;
* List of the author's previous papers/articles/speeches on the same topic&lt;br /&gt;
* If you are not from New Zealand, will your company support your travel/accommodation costs? - Yes/No&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The submission will be reviewed by the OWASP New Zealand Day CFP Review Board and the highest voted talks will be selected and invited for presentation.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
PLEASE NOTE:&lt;br /&gt;
* Due to limited budget available, expenses for international speakers cannot be covered.&lt;br /&gt;
* If your company is willing to cover travel and accommodation costs, the company will become &amp;quot;Support Sponsor&amp;quot; of the event.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Please submit the above information to both Nick Freeman and Adrian Hayes - nick.freeman@owasp.org and adrian.hayes@owasp.org&lt;br /&gt;
&lt;br /&gt;
Submissions deadline: 1st August 2013&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Call For Trainers =&lt;br /&gt;
==Call For Trainers==&lt;br /&gt;
&lt;br /&gt;
We are happy to announce that training will run on Wednesday September 11th 2013, the day before the OWASP Day conference. The training venues will be auditoriums kindly provided by the University of Auckland, in the same building as the OWASP Day conference itself. Classes will contain up to 20 students, and each seat has power for laptop usage. A wide range of half-day or full-day training proposals will be considered, see the Call for Papers for a list of topics example topics&lt;br /&gt;
&lt;br /&gt;
If you are interested in running one of the training sessions, please contact Nick Freeman and Adrian Hayes with the following information:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Trainer name&lt;br /&gt;
* Trainer organisation&lt;br /&gt;
* Telephone + email contact&lt;br /&gt;
* Short Trainer bio&lt;br /&gt;
&lt;br /&gt;
* Training title&lt;br /&gt;
* Trainer requirements (e.g. a projector, whiteboard, etc)&lt;br /&gt;
* Trainee requirements (e.g. laptop, VMWare/Virtualbox, etc)&lt;br /&gt;
* Training summary (less than 500 words)&lt;br /&gt;
* Target audience (e.g. testers, project managers, security managers, web developers)&lt;br /&gt;
* Skill level required (Basic / Intermediate / Advanced)&lt;br /&gt;
* What attendees can expect to learn (key objectives)&lt;br /&gt;
&lt;br /&gt;
* Short course outline&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The fixed price per head for training will be $250 for a half-day session and $500 for a whole-day session. As this training is part of an OWASP event, part of the proceeds go back to OWASP. The split is as follows:&lt;br /&gt;
&lt;br /&gt;
* 25% to OWASP Global - used for OWASP projects around the world&lt;br /&gt;
* 25% to OWASP NZ Day - used for expenses such as catering during the conference&lt;br /&gt;
* 50% to the training provider.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Please submit the above information to both Nick Freeman and Adrian Hayes - nick.freeman@owasp.org and adrian.hayes@owasp.org&lt;br /&gt;
&lt;br /&gt;
* nick.freeman@owasp.org&lt;br /&gt;
* adrian.hayes@owasp.org&lt;br /&gt;
&lt;br /&gt;
Submissions deadline: 1st August 201&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Call For Sponsorships =&lt;br /&gt;
==Call For Sponsorships==&lt;br /&gt;
&lt;br /&gt;
OWASP New Zealand Day 2013 will be held in Auckland on the 12th of September, 2013 and is a security conference entirely dedicated to application security. The conference is once again being hosted by the University of Auckland with their support and assistance. OWASP New Zealand Day 2013 is a free event, but requires sponsor support to help be an instructive and quality event for the New Zealand community. OWASP is strictly non for profit. The sponsorship money will be used to help make OWASP New Zealand Day 2013 a free, compelling, and valuable experience for the audience.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The sponsorship funds collected are to be used for things such as:&lt;br /&gt;
&lt;br /&gt;
* Refreshments (coffee break/lunch) - we want to keep people refreshed during the day; while we certainly bring good and interesting speakers, we don't want people to go home when they become hungry. &lt;br /&gt;
* Name tags - we feel that getting to know people within the New Zealand community is important, and name tags make that possible.&lt;br /&gt;
* Promotion - up to now our events are propagating by word of mouth. We would like to get to a wider audience by advertising our events.&lt;br /&gt;
* Printed Materials - printed materials will include brochures, tags and lanyards.&lt;br /&gt;
&lt;br /&gt;
== Facts ==&lt;br /&gt;
&lt;br /&gt;
Last year, the event was supported by seven sponsors and attracted more than 250 participants. Plenty of constructive (and positive!) feedback from the audience was received and we are using this to make the conference more appealing to more people. For more information on last year's event, please visit: https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2012&lt;br /&gt;
&lt;br /&gt;
The OWASP New Zealand community is strong and there are more than 220 people currently subscribed to the mailing-list. OWASP New Zealand Day is expected to attract between 250 and 300 attendees this year.&lt;br /&gt;
&lt;br /&gt;
OWASP regular attendees are IT project managers, IT security managers, IT security consultants, web application architects and developers, QA managers, QA testers and system administrators.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Sponsorships  ==&lt;br /&gt;
&lt;br /&gt;
There are three different levels of sponsorships for the OWASP Day event:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Support Sponsorship&amp;lt;/b&amp;gt;: (Covering international speaker travel expenses, media coverage/article/promotion of the event)&lt;br /&gt;
	&lt;br /&gt;
Includes:&lt;br /&gt;
&lt;br /&gt;
* Publication of the sponsor logo on the event web site - https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2013&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Silver Sponsorship&amp;lt;/b&amp;gt;: 1500 NZD&lt;br /&gt;
&lt;br /&gt;
Includes: &lt;br /&gt;
&lt;br /&gt;
* Publication of the sponsor logo on the event web site - https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2013&lt;br /&gt;
* The publication of the sponsor logo in the event site, in the agenda, on the handouts and in all the official communications with the attendees at the conference.&lt;br /&gt;
* The possibility to distribute the company brochures, CDs or other materials to the participants during the event.&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Gold Sponsorship&amp;lt;/b&amp;gt;: 2750 NZD&lt;br /&gt;
&lt;br /&gt;
Includes: &lt;br /&gt;
&lt;br /&gt;
* The possibility to have a promotional banner or sign side stage in the main auditorium (to be provided by the sponsor, size subject to approval by the OWASP NZ Day Committee).&lt;br /&gt;
* The publication of the sponsor logo in the event site, in the agenda, on the handouts and in all the official communications with the attendees at the conference.&lt;br /&gt;
* The possibility to distribute the company brochures, CDs or other materials to the participants during the event.&lt;br /&gt;
* Publication of the sponsor logo on the OWASP New Zealand Chapter page	- Sponsor logo on the OWASP NZ site prior and during the OWASP Day event - https://www.owasp.org/index.php/New_Zealand&lt;br /&gt;
* Publication of the sponsor logo on the event web site - https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2013&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Those who are interested in sponsoring OWASP New Zealand 2013 Conference can contact the [mailto:nick.freeman@owasp.org?cc=adrian.hayes@owasp.org OWASP New Zealand Board].&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]]&lt;/div&gt;</summary>
		<author><name>Adrian Hayes</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Qualys_logo_small.png&amp;diff=157120</id>
		<title>File:Qualys logo small.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Qualys_logo_small.png&amp;diff=157120"/>
				<updated>2013-08-22T03:12:35Z</updated>
		
		<summary type="html">&lt;p&gt;Adrian Hayes: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Adrian Hayes</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Orionhealth_logo_small.png&amp;diff=157119</id>
		<title>File:Orionhealth logo small.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Orionhealth_logo_small.png&amp;diff=157119"/>
				<updated>2013-08-22T03:07:05Z</updated>
		
		<summary type="html">&lt;p&gt;Adrian Hayes: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Adrian Hayes</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_New_Zealand_Day_2013&amp;diff=157019</id>
		<title>OWASP New Zealand Day 2013</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_New_Zealand_Day_2013&amp;diff=157019"/>
				<updated>2013-08-19T23:06:40Z</updated>
		
		<summary type="html">&lt;p&gt;Adrian Hayes: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2013 https://www.owasp.org/images/3/3e/OWASP_NZ_Day_2013_logo.png]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''11th and 12st September 2013 - Auckland'''&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
= Introduction =&lt;br /&gt;
==Introduction==&lt;br /&gt;
We are proud to announce the fifth annual OWASP New Zealand Day conference, to be held at the University of Auckland on Thursday September 12th, 2013. OWASP New Zealand Day is a one-day conference dedicated to application security, with an emphasis on secure development techniques to help Kiwi developers build more secure applications.&lt;br /&gt;
&lt;br /&gt;
Similar to last year:&lt;br /&gt;
&lt;br /&gt;
* We will be offering training on the day before the conference (Wednesday, 11th of September). &lt;br /&gt;
* After lunch on the conference day, we will split to two tracks - one focused on deep technical topics, the other on policy, compliance and risk management. &lt;br /&gt;
&lt;br /&gt;
The fifth OWASP New Zealand Day will be happening thanks to the support provided by the University of Auckland School of Business, which will kindly offer the same conference venue of the last four years. Entry to the event will, as in the past, be free. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For any comments, feedback or observations, please don't hesitate to contact [mailto:nick.freeman@owasp.org?cc=adrian.hayes@owasp.org us].&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Registration==&lt;br /&gt;
&lt;br /&gt;
Registration for the main conference day is now open: [https://registration.owasp.org.nz/ Register Here]&lt;br /&gt;
&lt;br /&gt;
There is no cost for the main conference day and lunch is provided. We do ask that if at any point you realise you cannot make it please cancel your registration to make room for others as spaces are limited.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Training registration will be handled separately and is not yet open. Please join our low volume [http://lists.owasp.org/mailman/listinfo/owasp-newzealand mailing list] to be notified when registration opens.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Important dates==&lt;br /&gt;
&lt;br /&gt;
* CFP &amp;amp; CFT submission deadline:	1st August 2013&lt;br /&gt;
* Conference Registration deadline: 30th August 2013&lt;br /&gt;
* Training Registration deadline: 	30th August 2013&lt;br /&gt;
* Training Day date:				11th September 2013&lt;br /&gt;
* Conference Day date:				12th September 2013&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Conference Venue==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
	&amp;lt;td&amp;gt;&lt;br /&gt;
		The University of Auckland Business School&amp;lt;br&amp;gt;&lt;br /&gt;
		Owen G Glenn Building&amp;lt;br&amp;gt;&lt;br /&gt;
		Room: OGGB 260-073 (OGGB4)&amp;lt;br&amp;gt;&lt;br /&gt;
		Address: 12 Grafton Road&amp;lt;br&amp;gt;&lt;br /&gt;
		Auckland&amp;lt;br&amp;gt;&lt;br /&gt;
		New Zealand&amp;lt;br&amp;gt;&lt;br /&gt;
		[http://maps.google.com/maps?oe=UTF-8&amp;amp;ie=UTF8&amp;amp;q=auckland+business+school&amp;amp;fb=1&amp;amp;split=1&amp;amp;cid=0,0,12303692579639430581&amp;amp;ei=6WeqSZr_OZLFkAWR--zbDQ&amp;amp;ll=-36.852308,174.770916&amp;amp;spn=0.01056,0.020621&amp;amp;z=16&amp;amp;iwloc=A Map]&lt;br /&gt;
	&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;td&amp;gt;&lt;br /&gt;
		[[Image:Auckland_business_school_small2.jpg]] [[Image:Room_hall.jpg]]&lt;br /&gt;
	&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Conference Sponsors==&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;bottom&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;[http://www.auckland.ac.nz/ https://www.owasp.org/images/8/82/University_of_Auckland_crest_small.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;bottom&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;[http://www.security.org.nz/NZISF_NZISForumContent.php https://www.owasp.org/images/5/5a/Nz_information_security_forum.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;ICT and Department of Information Systems and Operations Management&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Conference Committee==&lt;br /&gt;
&lt;br /&gt;
* Nick Freeman - OWASP New Zealand Leader (Auckland)&lt;br /&gt;
* Adrian Hayes -  OWASP New Zealand Leader (Wellington)&lt;br /&gt;
* Lech Janczewski - Associate Professor - University of Auckland School of Business&lt;br /&gt;
&lt;br /&gt;
Please direct all enquiries to nick.freeman@owasp.org and adrian.hayes@owasp.org.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Speakers List=&lt;br /&gt;
==Speakers List==&lt;br /&gt;
&lt;br /&gt;
===Tom Eastman  - Catalyst IT - Serialization Formats Aren't Toys===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Do you have an API? Do you accept input from users? Do you accept it in XML? What about YAML? Or maybe JSON? How safe are you? How sure are you? It's not in the OWASP Top 10, but you don't have to look far to hear stories of security vulnerabilities involving deserialization user inputs. Why do they keep happening?&lt;br /&gt;
&lt;br /&gt;
In this talk I'll go over what the threat is, how you might be making yourself vulnerable and how to mitigate the problem. I'll cover the features (not bugs, features) of formats like XML, YAML, and JSON that make them surprisingly dangerous, and how to protect your code from them.&lt;br /&gt;
&lt;br /&gt;
Because here's the thing: If you are using, say, a compliant, properly implemented XML parser to parse your XML, you are NOT safe. Possibly quite the opposite. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Tom is a senior Python developer and technical lead for Catalyst IT, New Zealand's largest company specialising in open source. Prior to that he worked as a developer and system administrator for the University of Otago Faculty of Medicine and as a Computer Science tutor for same.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Paul Haas - Security-Assessment.com -  Improving XPath Injection with Binary Search Optimisations===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
XPath injection is technique similar to SQL injection for attacking XML processors, however many people are unaware of the technique and exploitation vectors. This talk aims to expand awareness of both the risks and remediation path in addition to the introduction of a new technique to significantly improve reconstruction speed of the backend XML document. A brief primer to XPath injection will also be covered within the talk.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Paul Haas hails from California where the waves are better but the quakes are not. With over nine years of experience in professional hacking, he is currently working with Security-Assessment.com in Wellington to bring the good word of web hacks to Kiwis everywhere. His sole hobby is driving people into Mario Kart's abyss.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Nick von Dadelszen - Lateral Security - Security Vulnerability Disclosure===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Disclosing security vulnerabilities can be a dangerous business. While there are systems in place for handling disclosures to most major software companies, the process for disclosing vulnerabilities to local organisations is a lot less discussed.&lt;br /&gt;
&lt;br /&gt;
As the discloser, there is always the chance that you are accused of hacking and get a visit from the police merely for identifying an issue. As an organisation, you can find yourself on the front page of the news when someone goes public with an issue.&lt;br /&gt;
&lt;br /&gt;
This talk outlines the dilemmas faced when stumbling across that SQL injection in the local shopping site and proposes mechanisms to safely get the right people told about it. It also discusses how organisations can make it more likely that security vulnerabilities are reported to them directly, rather than through the press.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Nick von Dadelszen is the technical director at Lateral Security. Nick has been performing professional penetration testing for over 12 years and has managed several successful penetration testing teams. He has worked with the majority of large corporates and Government agencies in New Zealand and is a regular presenter at OWASP and Kiwicon conferences.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Mark Piper - Insomnia Security - OWASP Top 10 Mobile Risks - An Introduction By Case Study===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
As mobile application usage explodes, so does the associated application&lt;br /&gt;
security issues. The OWASP Mobile Security Project includes an&lt;br /&gt;
initiative to categorise and rate these issues into a top 10 format.&lt;br /&gt;
This list is known as the Top 10 Mobile Risks.&lt;br /&gt;
&lt;br /&gt;
During the session, we will introduce the current (RC1) Top 10 supported&lt;br /&gt;
with several real world case studies of issues.  We will cover how the&lt;br /&gt;
issues were identified, how they may be exploited by attackers and what&lt;br /&gt;
mitigation's could be implemented to resolve the issues in the future.&lt;br /&gt;
While the issues will be largely platform agnostic, the examples will&lt;br /&gt;
cover both iOS and Android environments.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Mark is a Principal Security Consultant with the Insomnia Security&lt;br /&gt;
team. Mark spends his days auditing software, running penetration&lt;br /&gt;
testing and red team engagements while working with global customers on&lt;br /&gt;
developing new testing services.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Kirk Jackson - Xero - Bad Smells That Lead to Bad Security===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Your job as a defender is to reduce the attack surface of your web application and protect your infrastructure and data from being breached. However we can't be involved in every decision that goes on in our organisation, and we don't always think the same as an attacker does. This talk will introduce you to some common &amp;quot;bad smells&amp;quot; that might indicate security issues lurking under the surface of your code, and help you develop your spidey sense so that you know when to raise the alarm.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Kirk is the Security Officer at Xero, and is interested in writing and defending secure web applications.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Kim Carter - BinaryMist - What's Our Software Doing With All That User Input===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
What are we doing with all the characters that get shoved into our applications? Have we considered every potential execution context?&lt;br /&gt;
It's often interesting and surprising to see what sort of concoction of characters can be executed in different places... and linking multiple attack vectors together which the builders haven't thought about.&lt;br /&gt;
What are we trusting? Why are we trusting it? What, where and how should we be sanitising?&lt;br /&gt;
&lt;br /&gt;
We have a vast collection of libraries, techniques, cheat sheets, tutorials, guides and tools at our disposal.&lt;br /&gt;
I often find myself thinking... how can we commoditise the sanitisation of user input and I keep coming up with the same answer.&lt;br /&gt;
It's not easy. Every application has a completely different set of concerns.&lt;br /&gt;
&lt;br /&gt;
In order for our software to be shielded from an attack, the builders must think like attackers.&lt;br /&gt;
&lt;br /&gt;
In this talk I'll attempt to:&lt;br /&gt;
&lt;br /&gt;
* Increase our knowledge and awareness&lt;br /&gt;
* Discuss practical techniques and approaches that increase our defences&lt;br /&gt;
* Break some software&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Kim Carter is a Software Engineer, Architect, Entrepreneur and the founder of BinaryMist. He is passionate about and enjoys many things. Some of which include:&lt;br /&gt;
* Designing and creating robust software and networks.&lt;br /&gt;
* Breaking his and others software and networks, then fixing it/them.&lt;br /&gt;
* Teaching, training, mentoring, motivating, listening to and being around smart people.&lt;br /&gt;
* Increasing quality awareness and helping people and organisations implement higher quality in a cost effective manner.&lt;br /&gt;
* Improving operational efficiencies.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Hugh Davenport - Aura RedEye Security - Bug Chaining (aka, why XSS can be worse than you think) ===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Security bugs can range in damage from small stuff, all the way to big stuff. Some people only focus on the large stuff, and the smaller stuff can go unnoticed. This talk will give a real world example of a project that had a small bug, that allowed a larger bug to happen, which allowed a larger bug, which allowed for unwanted shell access. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Hugh works at Aura RedEye Security on their managed vulnerability scanning service. In his spare time, he is the security point of contact on the Mahara open source tool and contributes to many other open source projects. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Hinne Hettema - University of Auckland - Evolution of Threats and the Skills in our Security Team===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The threat landscape for security threats is constantly evolving, with new threats being stealthier, more diverse, and increasingly aimed at bypassing the protection offered by antivirus and network intrusion detection systems. Adversaries are now often part of a semi-organised underground economy geared towards the acquisition and sale of digital assets such as usernames, passwords, confidential business information, financial data and designs. There are specific value chains in this economy, which make the acquisition, sale and utilisation of such assets a relatively easy process.&lt;br /&gt;
&lt;br /&gt;
This talk focuses on the skills needed in a security team to deal with this next level of threat, and on the sort of teams that we need in enterprise security to address the modern threats that we face.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Hinne Hettema is the team leader of the IT security team at The University of Auckland, an honorary research fellow in the Department of Philosophy at The University of Auckland, and lectures in cyber security at Unitec. He has 10 years experience in security consulting and has a PhD in Philosophy (2012) and theoretical chemistry (1993).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Francois Marier - Mozilla - Securing the Web Without Site-Specific Passwords===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Has anyone else noticed that the OWASP Top 10 is not changing very much?&lt;br /&gt;
Especially in the realm of authentication-related problems. I don't&lt;br /&gt;
claim to have the one true solution for this, but one thing is certain:&lt;br /&gt;
if we change how things are done on the web and relieve developers from&lt;br /&gt;
having to store passwords, we can make things better.&lt;br /&gt;
&lt;br /&gt;
We need to let web developers outsource their authentication needs to&lt;br /&gt;
people who can do it well. Does that mean we should force all of our&lt;br /&gt;
users to join Facebook? Well not really. That might work for some sites,&lt;br /&gt;
but outsourcing all of our logins to a single for-profit company isn't a&lt;br /&gt;
solution that works for the whole web.&lt;br /&gt;
&lt;br /&gt;
The open web needs a better solution. One that enable users to choose&lt;br /&gt;
their identity provider and shop for the most secure one if that's what&lt;br /&gt;
they're into. This is the promise behind Persona and the BrowserID&lt;br /&gt;
protocol. Choose your email provider carefully and let's get rid of all&lt;br /&gt;
of these site-specific passwords that are just sitting there waiting to&lt;br /&gt;
be leaked and cracked.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Francois is a software engineer and security champion on the Mozilla Identity team where he works on decentralising authentication on the web. A long time Debian developer, Francois has been involved in Open Source and web development for a while and has always had a strong interest in security.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Andrew Kelly - Nothing to See Here!===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This is how it starts: &amp;quot;Seeking an exciting new challenge? Want to be responsible for building and shaping an embryonic information security function? Then you so won't want to miss this golden opportunity!&amp;quot; Andrew will talk about the setting up of an information security function in an organisation from scratch ('Greenfield') - as opposed to trying to bed yourself down into an already-existing organisation ('Brownfield'). He'll talk about the pros and the cons, and the many ups and downs. And hopefully he'll answer some questions like: Is there, if fact, any such thing as a greenfield security opportunity left in the wild? And ... if such mythical beasties do exist ... are they worth signing on for? Andrew will discuss the pitfalls and pratfalls of the journey from initial engagement, through (maybe) acceptance, until (perhaps) security sign-off and (hopefully) go-live. He'll also discuss both the Pit Bulls and prats you're likely to meet along the way. So ... if you want to hear a guy speak who reckons he's forgotten more than he ever thought he knew? Then this is so the talk for you!&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Andrew is a whole year older than he was when he presented at last year's OWASP Day: So this time around he's bringing a quarter century's worth of IT security experience to OWASP! Now 25 years ago, he was this mainframe security uber-tech - but today Andrew's recognised as being a 'pragmatic' subject-matter expert on corporate-level information security policy, compliance, frameworks and governance. His first greenfield security 'opportunity' came in November 1989 at the Sun Life Assurance Company of Canada, in the UK. And during those intervening 24 years, he's had similar experiences at various other companies including the likes of Lloyds/TSB Bank, Fonterra, BT Syntegra, Telecom/Gen-i and, lately, Health Benefits Ltd. - amongst many others.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Call For Presentations =&lt;br /&gt;
==Call For Presentations==&lt;br /&gt;
&lt;br /&gt;
OWASP New Zealand Day conferences attract a high quality of speakers from a variety of security disciplines including web developers, system administrators, penetration testers, policy specialists and more. We encourage presentations to have a strong component on fixing and prevention of security issues. We are looking for presentations on a wide variety of security topics, including but not limited to:&lt;br /&gt;
&lt;br /&gt;
* Web application security&lt;br /&gt;
* Mobile security&lt;br /&gt;
* Secure development&lt;br /&gt;
* Vulnerability analysis&lt;br /&gt;
* Threat modelling&lt;br /&gt;
* Threat and vulnerability countermeasures&lt;br /&gt;
* Platform or language security (.NET, Java, RoR, etc)&lt;br /&gt;
* Penetration Testing&lt;br /&gt;
* Browser and client security&lt;br /&gt;
* Application and solution architecture security&lt;br /&gt;
* PCI DSS&lt;br /&gt;
* Risk management&lt;br /&gt;
* Security concepts for C*Os, project managers and other non-technical attendees&lt;br /&gt;
* Privacy controls&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The email subject must be &amp;quot;OWASP New Zealand 2013: CFP&amp;quot; and the email body must contains the following information/sections:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name and Surname&lt;br /&gt;
* Affiliation&lt;br /&gt;
* Telephone number&lt;br /&gt;
* Email address&lt;br /&gt;
* Short presenter bio&lt;br /&gt;
* Title of the contribution&lt;br /&gt;
* Type of contribution: Technical, Informative, Management&lt;br /&gt;
* Short abstract (up to 500 words)&lt;br /&gt;
* List of the author's previous papers/articles/speeches on the same topic&lt;br /&gt;
* If you are not from New Zealand, will your company support your travel/accommodation costs? - Yes/No&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The submission will be reviewed by the OWASP New Zealand Day CFP Review Board and the highest voted talks will be selected and invited for presentation.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
PLEASE NOTE:&lt;br /&gt;
* Due to limited budget available, expenses for international speakers cannot be covered.&lt;br /&gt;
* If your company is willing to cover travel and accommodation costs, the company will become &amp;quot;Support Sponsor&amp;quot; of the event.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Please submit the above information to both Nick Freeman and Adrian Hayes - nick.freeman@owasp.org and adrian.hayes@owasp.org&lt;br /&gt;
&lt;br /&gt;
Submissions deadline: 1st August 2013&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Call For Trainers =&lt;br /&gt;
==Call For Trainers==&lt;br /&gt;
&lt;br /&gt;
We are happy to announce that training will run on Wednesday September 11th 2013, the day before the OWASP Day conference. The training venues will be auditoriums kindly provided by the University of Auckland, in the same building as the OWASP Day conference itself. Classes will contain up to 20 students, and each seat has power for laptop usage. A wide range of half-day or full-day training proposals will be considered, see the Call for Papers for a list of topics example topics&lt;br /&gt;
&lt;br /&gt;
If you are interested in running one of the training sessions, please contact Nick Freeman and Adrian Hayes with the following information:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Trainer name&lt;br /&gt;
* Trainer organisation&lt;br /&gt;
* Telephone + email contact&lt;br /&gt;
* Short Trainer bio&lt;br /&gt;
&lt;br /&gt;
* Training title&lt;br /&gt;
* Trainer requirements (e.g. a projector, whiteboard, etc)&lt;br /&gt;
* Trainee requirements (e.g. laptop, VMWare/Virtualbox, etc)&lt;br /&gt;
* Training summary (less than 500 words)&lt;br /&gt;
* Target audience (e.g. testers, project managers, security managers, web developers)&lt;br /&gt;
* Skill level required (Basic / Intermediate / Advanced)&lt;br /&gt;
* What attendees can expect to learn (key objectives)&lt;br /&gt;
&lt;br /&gt;
* Short course outline&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The fixed price per head for training will be $250 for a half-day session and $500 for a whole-day session. As this training is part of an OWASP event, part of the proceeds go back to OWASP. The split is as follows:&lt;br /&gt;
&lt;br /&gt;
* 25% to OWASP Global - used for OWASP projects around the world&lt;br /&gt;
* 25% to OWASP NZ Day - used for expenses such as catering during the conference&lt;br /&gt;
* 50% to the training provider.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Please submit the above information to both Nick Freeman and Adrian Hayes - nick.freeman@owasp.org and adrian.hayes@owasp.org&lt;br /&gt;
&lt;br /&gt;
* nick.freeman@owasp.org&lt;br /&gt;
* adrian.hayes@owasp.org&lt;br /&gt;
&lt;br /&gt;
Submissions deadline: 1st August 201&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Call For Sponsorships =&lt;br /&gt;
==Call For Sponsorships==&lt;br /&gt;
&lt;br /&gt;
OWASP New Zealand Day 2013 will be held in Auckland on the 12th of September, 2013 and is a security conference entirely dedicated to application security. The conference is once again being hosted by the University of Auckland with their support and assistance. OWASP New Zealand Day 2013 is a free event, but requires sponsor support to help be an instructive and quality event for the New Zealand community. OWASP is strictly non for profit. The sponsorship money will be used to help make OWASP New Zealand Day 2013 a free, compelling, and valuable experience for the audience.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The sponsorship funds collected are to be used for things such as:&lt;br /&gt;
&lt;br /&gt;
* Refreshments (coffee break/lunch) - we want to keep people refreshed during the day; while we certainly bring good and interesting speakers, we don't want people to go home when they become hungry. &lt;br /&gt;
* Name tags - we feel that getting to know people within the New Zealand community is important, and name tags make that possible.&lt;br /&gt;
* Promotion - up to now our events are propagating by word of mouth. We would like to get to a wider audience by advertising our events.&lt;br /&gt;
* Printed Materials - printed materials will include brochures, tags and lanyards.&lt;br /&gt;
&lt;br /&gt;
== Facts ==&lt;br /&gt;
&lt;br /&gt;
Last year, the event was supported by seven sponsors and attracted more than 250 participants. Plenty of constructive (and positive!) feedback from the audience was received and we are using this to make the conference more appealing to more people. For more information on last year's event, please visit: https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2012&lt;br /&gt;
&lt;br /&gt;
The OWASP New Zealand community is strong and there are more than 220 people currently subscribed to the mailing-list. OWASP New Zealand Day is expected to attract between 250 and 300 attendees this year.&lt;br /&gt;
&lt;br /&gt;
OWASP regular attendees are IT project managers, IT security managers, IT security consultants, web application architects and developers, QA managers, QA testers and system administrators.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Sponsorships  ==&lt;br /&gt;
&lt;br /&gt;
There are three different levels of sponsorships for the OWASP Day event:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Support Sponsorship&amp;lt;/b&amp;gt;: (Covering international speaker travel expenses, media coverage/article/promotion of the event)&lt;br /&gt;
	&lt;br /&gt;
Includes:&lt;br /&gt;
&lt;br /&gt;
* Publication of the sponsor logo on the event web site - https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2013&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Silver Sponsorship&amp;lt;/b&amp;gt;: 1500 NZD&lt;br /&gt;
&lt;br /&gt;
Includes: &lt;br /&gt;
&lt;br /&gt;
* Publication of the sponsor logo on the event web site - https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2013&lt;br /&gt;
* The publication of the sponsor logo in the event site, in the agenda, on the handouts and in all the official communications with the attendees at the conference.&lt;br /&gt;
* The possibility to distribute the company brochures, CDs or other materials to the participants during the event.&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Gold Sponsorship&amp;lt;/b&amp;gt;: 2750 NZD&lt;br /&gt;
&lt;br /&gt;
Includes: &lt;br /&gt;
&lt;br /&gt;
* The possibility to have a promotional banner or sign side stage in the main auditorium (to be provided by the sponsor, size subject to approval by the OWASP NZ Day Committee).&lt;br /&gt;
* The publication of the sponsor logo in the event site, in the agenda, on the handouts and in all the official communications with the attendees at the conference.&lt;br /&gt;
* The possibility to distribute the company brochures, CDs or other materials to the participants during the event.&lt;br /&gt;
* Publication of the sponsor logo on the OWASP New Zealand Chapter page	- Sponsor logo on the OWASP NZ site prior and during the OWASP Day event - https://www.owasp.org/index.php/New_Zealand&lt;br /&gt;
* Publication of the sponsor logo on the event web site - https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2013&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Those who are interested in sponsoring OWASP New Zealand 2013 Conference can contact the [mailto:nick.freeman@owasp.org?cc=adrian.hayes@owasp.org OWASP New Zealand Board].&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]]&lt;/div&gt;</summary>
		<author><name>Adrian Hayes</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_New_Zealand_Day_2013&amp;diff=156711</id>
		<title>OWASP New Zealand Day 2013</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_New_Zealand_Day_2013&amp;diff=156711"/>
				<updated>2013-08-12T22:36:03Z</updated>
		
		<summary type="html">&lt;p&gt;Adrian Hayes: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2013 https://www.owasp.org/images/3/3e/OWASP_NZ_Day_2013_logo.png]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''11th and 12st September 2013 - Auckland'''&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
= Introduction =&lt;br /&gt;
==Introduction==&lt;br /&gt;
We are proud to announce the fifth annual OWASP New Zealand Day conference, to be held at the University of Auckland on Thursday September 12th, 2013. OWASP New Zealand Day is a one-day conference dedicated to application security, with an emphasis on secure development techniques to help Kiwi developers build more secure applications.&lt;br /&gt;
&lt;br /&gt;
Similar to last year:&lt;br /&gt;
&lt;br /&gt;
* We will be offering training on the day before the conference (Wednesday, 11th of September). &lt;br /&gt;
* After lunch on the conference day, we will split to two tracks - one focused on deep technical topics, the other on policy, compliance and risk management. &lt;br /&gt;
&lt;br /&gt;
The fifth OWASP New Zealand Day will be happening thanks to the support provided by the University of Auckland School of Business, which will kindly offer the same conference venue of the last four years. Entry to the event will, as in the past, be free. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For any comments, feedback or observations, please don't hesitate to contact [mailto:nick.freeman@owasp.org?cc=adrian.hayes@owasp.org us].&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Registration==&lt;br /&gt;
&lt;br /&gt;
Registration for the main conference day is now open: [https://registration.owasp.org.nz/ Register Here]&lt;br /&gt;
&lt;br /&gt;
There is no cost for the main conference day and lunch is provided. We do ask that if at any point you realise you cannot make it please cancel your registration to make room for others as spaces are limited.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Training registration will be handled separately and is not yet open. Please join our low volume [http://lists.owasp.org/mailman/listinfo/owasp-newzealand mailing list] to be notified when registration opens.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Important dates==&lt;br /&gt;
&lt;br /&gt;
* CFP &amp;amp; CFT submission deadline:	1st August 2013&lt;br /&gt;
* Conference Registration deadline: 30th August 2013&lt;br /&gt;
* Training Registration deadline: 	30th August 2013&lt;br /&gt;
* Training Day date:				11th September 2013&lt;br /&gt;
* Conference Day date:				12th September 2013&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Conference Venue==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
	&amp;lt;td&amp;gt;&lt;br /&gt;
		The University of Auckland Business School&amp;lt;br&amp;gt;&lt;br /&gt;
		Owen G Glenn Building&amp;lt;br&amp;gt;&lt;br /&gt;
		Room: OGGB 260-073 (OGGB4)&amp;lt;br&amp;gt;&lt;br /&gt;
		Address: 12 Grafton Road&amp;lt;br&amp;gt;&lt;br /&gt;
		Auckland&amp;lt;br&amp;gt;&lt;br /&gt;
		New Zealand&amp;lt;br&amp;gt;&lt;br /&gt;
		[http://maps.google.com/maps?oe=UTF-8&amp;amp;ie=UTF8&amp;amp;q=auckland+business+school&amp;amp;fb=1&amp;amp;split=1&amp;amp;cid=0,0,12303692579639430581&amp;amp;ei=6WeqSZr_OZLFkAWR--zbDQ&amp;amp;ll=-36.852308,174.770916&amp;amp;spn=0.01056,0.020621&amp;amp;z=16&amp;amp;iwloc=A Map]&lt;br /&gt;
	&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;td&amp;gt;&lt;br /&gt;
		[[Image:Auckland_business_school_small2.jpg]] [[Image:Room_hall.jpg]]&lt;br /&gt;
	&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Conference Sponsors==&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;bottom&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;[http://www.auckland.ac.nz/ https://www.owasp.org/images/8/82/University_of_Auckland_crest_small.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;bottom&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;[http://www.security.org.nz/NZISF_NZISForumContent.php https://www.owasp.org/images/5/5a/Nz_information_security_forum.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;ICT and Department of Information Systems and Operations Management&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Conference Committee==&lt;br /&gt;
&lt;br /&gt;
* Nick Freeman - OWASP New Zealand Leader (Auckland)&lt;br /&gt;
* Adrian Hayes -  OWASP New Zealand Leader (Wellington)&lt;br /&gt;
* Lech Janczewski - Associate Professor - University of Auckland School of Business&lt;br /&gt;
&lt;br /&gt;
Please direct all enquiries to nick.freeman@owasp.org and adrian.hayes@owasp.org.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Speakers List=&lt;br /&gt;
==Speakers List==&lt;br /&gt;
&lt;br /&gt;
===Tom Eastman  - Catalyst IT - Serialization Formats Aren't Toys===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Do you have an API? Do you accept input from users? Do you accept it in XML? What about YAML? Or maybe JSON? How safe are you? How sure are you? It's not in the OWASP Top 10, but you don't have to look far to hear stories of security vulnerabilities involving deserialization user inputs. Why do they keep happening?&lt;br /&gt;
&lt;br /&gt;
In this talk I'll go over what the threat is, how you might be making yourself vulnerable and how to mitigate the problem. I'll cover the features (not bugs, features) of formats like XML, YAML, and JSON that make them surprisingly dangerous, and how to protect your code from them.&lt;br /&gt;
&lt;br /&gt;
Because here's the thing: If you are using, say, a compliant, properly implemented XML parser to parse your XML, you are NOT safe. Possibly quite the opposite. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Tom is a senior Python developer and technical lead for Catalyst IT, New Zealand's largest company specialising in open source. Prior to that he worked as a developer and system administrator for the University of Otago Faculty of Medicine and as a Computer Science tutor for same.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Paul Haas - Security-Assessment.com -  Improving XPath Injection with Binary Search Optimisations===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
XPath injection is technique similar to SQL injection for attacking XML processors, however many people are unaware of the technique and exploitation vectors. This talk aims to expand awareness of both the risks and remediation path in addition to the introduction of a new technique to significantly improve reconstruction speed of the backend XML document. A brief primer to XPath injection will also be covered within the talk.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Paul Haas hails from California where the waves are better but the quakes are not. With over nine years of experience in professional hacking, he is currently working with Security-Assessment.com in Wellington to bring the good word of web hacks to Kiwis everywhere. His sole hobby is driving people into Mario Kart's abyss.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Nick von Dadelszen - Lateral Security - Security Vulnerability Disclosure===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Disclosing security vulnerabilities can be a dangerous business. While there are systems in place for handling disclosures to most major software companies, the process for disclosing vulnerabilities to local organisations is a lot less discussed.&lt;br /&gt;
&lt;br /&gt;
As the discloser, there is always the chance that you are accused of hacking and get a visit from the police merely for identifying an issue. As an organisation, you can find yourself on the front page of the news when someone goes public with an issue.&lt;br /&gt;
&lt;br /&gt;
This talk outlines the dilemmas faced when stumbling across that SQL injection in the local shopping site and proposes mechanisms to safely get the right people told about it. It also discusses how organisations can make it more likely that security vulnerabilities are reported to them directly, rather than through the press.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Nick von Dadelszen is the technical director at Lateral Security. Nick has been performing professional penetration testing for over 12 years and has managed several successful penetration testing teams. He has worked with the majority of large corporates and Government agencies in New Zealand and is a regular presenter at OWASP and Kiwicon conferences.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Mark Piper - Insomnia Security - OWASP Top 10 Mobile Risks - An Introduction By Case Study===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
As mobile application usage explodes, so does the associated application&lt;br /&gt;
security issues. The OWASP Mobile Security Project includes an&lt;br /&gt;
initiative to categorise and rate these issues into a top 10 format.&lt;br /&gt;
This list is known as the Top 10 Mobile Risks.&lt;br /&gt;
&lt;br /&gt;
During the session, we will introduce the current (RC1) Top 10 supported&lt;br /&gt;
with several real world case studies of issues.  We will cover how the&lt;br /&gt;
issues were identified, how they may be exploited by attackers and what&lt;br /&gt;
mitigation's could be implemented to resolve the issues in the future.&lt;br /&gt;
While the issues will be largely platform agnostic, the examples will&lt;br /&gt;
cover both iOS and Android environments.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Mark is a Principal Security Consultant with the Insomnia Security&lt;br /&gt;
team. Mark spends his days auditing software, running penetration&lt;br /&gt;
testing and red team engagements while working with global customers on&lt;br /&gt;
developing new testing services.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Kirk Jackson - Xero - Bad Smells That Lead to Bad Security===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Your job as a defender is to reduce the attack surface of your web application and protect your infrastructure and data from being breached. However we can't be involved in every decision that goes on in our organisation, and we don't always think the same as an attacker does. This talk will introduce you to some common &amp;quot;bad smells&amp;quot; that might indicate security issues lurking under the surface of your code, and help you develop your spidey sense so that you know when to raise the alarm.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Kirk is the Security Officer at Xero, and is interested in writing and defending secure web applications.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Kim Carter - BinaryMist - Kali, ZAP, and Sanatising User Input - Oh My!===&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Kim Carter is a Software Engineer, Architect, Entrepreneur and the founder of BinaryMist. He is passionate about and enjoys many things. Some of which include:&lt;br /&gt;
* Designing and creating robust software and networks.&lt;br /&gt;
*Breaking his and others software and networks, then fixing it/them.&lt;br /&gt;
*Teaching, training, mentoring, motivating, listening to and being around smart people.&lt;br /&gt;
*Increasing quality awareness and helping people and organisations implement higher quality in a cost effective manner.&lt;br /&gt;
*Improving operational efficiencies.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Hugh Davenport - Aura RedEye Security - Bug Chaining (aka, why XSS can be worse than you think) ===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Security bugs can range in damage from small stuff, all the way to big stuff. Some people only focus on the large stuff, and the smaller stuff can go unnoticed. This talk will give a real world example of a project that had a small bug, that allowed a larger bug to happen, which allowed a larger bug, which allowed for unwanted shell access. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Hugh works at Aura RedEye Security on their managed vulnerability scanning service. In his spare time, he is the security point of contact on the Mahara open source tool and contributes to many other open source projects. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Hinne Hettema - University of Auckland - Evolution of Threats and the Skills in our Security Team===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The threat landscape for security threats is constantly evolving, with new threats being stealthier, more diverse, and increasingly aimed at bypassing the protection offered by antivirus and network intrusion detection systems. Adversaries are now often part of a semi-organised underground economy geared towards the acquisition and sale of digital assets such as usernames, passwords, confidential business information, financial data and designs. There are specific value chains in this economy, which make the acquisition, sale and utilisation of such assets a relatively easy process.&lt;br /&gt;
&lt;br /&gt;
This talk focuses on the skills needed in a security team to deal with this next level of threat, and on the sort of teams that we need in enterprise security to address the modern threats that we face.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Hinne Hettema is the team leader of the IT security team at The University of Auckland, an honorary research fellow in the Department of Philosophy at The University of Auckland, and lectures in cyber security at Unitec. He has 10 years experience in security consulting and has a PhD in Philosophy (2012) and theoretical chemistry (1993).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Francois Marier - Mozilla - Securing the Web Without Site-Specific Passwords===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Has anyone else noticed that the OWASP Top 10 is not changing very much?&lt;br /&gt;
Especially in the realm of authentication-related problems. I don't&lt;br /&gt;
claim to have the one true solution for this, but one thing is certain:&lt;br /&gt;
if we change how things are done on the web and relieve developers from&lt;br /&gt;
having to store passwords, we can make things better.&lt;br /&gt;
&lt;br /&gt;
We need to let web developers outsource their authentication needs to&lt;br /&gt;
people who can do it well. Does that mean we should force all of our&lt;br /&gt;
users to join Facebook? Well not really. That might work for some sites,&lt;br /&gt;
but outsourcing all of our logins to a single for-profit company isn't a&lt;br /&gt;
solution that works for the whole web.&lt;br /&gt;
&lt;br /&gt;
The open web needs a better solution. One that enable users to choose&lt;br /&gt;
their identity provider and shop for the most secure one if that's what&lt;br /&gt;
they're into. This is the promise behind Persona and the BrowserID&lt;br /&gt;
protocol. Choose your email provider carefully and let's get rid of all&lt;br /&gt;
of these site-specific passwords that are just sitting there waiting to&lt;br /&gt;
be leaked and cracked.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Francois is a software engineer and security champion on the Mozilla Identity team where he works on decentralising authentication on the web. A long time Debian developer, Francois has been involved in Open Source and web development for a while and has always had a strong interest in security.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Andrew Kelly - Nothing to See Here!===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This is how it starts: &amp;quot;Seeking an exciting new challenge? Want to be responsible for building and shaping an embryonic information security function? Then you so won't want to miss this golden opportunity!&amp;quot; Andrew will talk about the setting up of an information security function in an organisation from scratch ('Greenfield') - as opposed to trying to bed yourself down into an already-existing organisation ('Brownfield'). He'll talk about the pros and the cons, and the many ups and downs. And hopefully he'll answer some questions like: Is there, if fact, any such thing as a greenfield security opportunity left in the wild? And ... if such mythical beasties do exist ... are they worth signing on for? Andrew will discuss the pitfalls and pratfalls of the journey from initial engagement, through (maybe) acceptance, until (perhaps) security sign-off and (hopefully) go-live. He'll also discuss both the Pit Bulls and prats you're likely to meet along the way. So ... if you want to hear a guy speak who reckons he's forgotten more than he ever thought he knew? Then this is so the talk for you!&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Andrew is a whole year older than he was when he presented at last year's OWASP Day: So this time around he's bringing a quarter century's worth of IT security experience to OWASP! Now 25 years ago, he was this mainframe security uber-tech - but today Andrew's recognised as being a 'pragmatic' subject-matter expert on corporate-level information security policy, compliance, frameworks and governance. His first greenfield security 'opportunity' came in November 1989 at the Sun Life Assurance Company of Canada, in the UK. And during those intervening 24 years, he's had similar experiences at various other companies including the likes of Lloyds/TSB Bank, Fonterra, BT Syntegra, Telecom/Gen-i and, lately, Health Benefits Ltd. - amongst many others.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Call For Presentations =&lt;br /&gt;
==Call For Presentations==&lt;br /&gt;
&lt;br /&gt;
OWASP New Zealand Day conferences attract a high quality of speakers from a variety of security disciplines including web developers, system administrators, penetration testers, policy specialists and more. We encourage presentations to have a strong component on fixing and prevention of security issues. We are looking for presentations on a wide variety of security topics, including but not limited to:&lt;br /&gt;
&lt;br /&gt;
* Web application security&lt;br /&gt;
* Mobile security&lt;br /&gt;
* Secure development&lt;br /&gt;
* Vulnerability analysis&lt;br /&gt;
* Threat modelling&lt;br /&gt;
* Threat and vulnerability countermeasures&lt;br /&gt;
* Platform or language security (.NET, Java, RoR, etc)&lt;br /&gt;
* Penetration Testing&lt;br /&gt;
* Browser and client security&lt;br /&gt;
* Application and solution architecture security&lt;br /&gt;
* PCI DSS&lt;br /&gt;
* Risk management&lt;br /&gt;
* Security concepts for C*Os, project managers and other non-technical attendees&lt;br /&gt;
* Privacy controls&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The email subject must be &amp;quot;OWASP New Zealand 2013: CFP&amp;quot; and the email body must contains the following information/sections:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name and Surname&lt;br /&gt;
* Affiliation&lt;br /&gt;
* Telephone number&lt;br /&gt;
* Email address&lt;br /&gt;
* Short presenter bio&lt;br /&gt;
* Title of the contribution&lt;br /&gt;
* Type of contribution: Technical, Informative, Management&lt;br /&gt;
* Short abstract (up to 500 words)&lt;br /&gt;
* List of the author's previous papers/articles/speeches on the same topic&lt;br /&gt;
* If you are not from New Zealand, will your company support your travel/accommodation costs? - Yes/No&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The submission will be reviewed by the OWASP New Zealand Day CFP Review Board and the highest voted talks will be selected and invited for presentation.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
PLEASE NOTE:&lt;br /&gt;
* Due to limited budget available, expenses for international speakers cannot be covered.&lt;br /&gt;
* If your company is willing to cover travel and accommodation costs, the company will become &amp;quot;Support Sponsor&amp;quot; of the event.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Please submit the above information to both Nick Freeman and Adrian Hayes - nick.freeman@owasp.org and adrian.hayes@owasp.org&lt;br /&gt;
&lt;br /&gt;
Submissions deadline: 1st August 2013&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Call For Trainers =&lt;br /&gt;
==Call For Trainers==&lt;br /&gt;
&lt;br /&gt;
We are happy to announce that training will run on Wednesday September 11th 2013, the day before the OWASP Day conference. The training venues will be auditoriums kindly provided by the University of Auckland, in the same building as the OWASP Day conference itself. Classes will contain up to 20 students, and each seat has power for laptop usage. A wide range of half-day or full-day training proposals will be considered, see the Call for Papers for a list of topics example topics&lt;br /&gt;
&lt;br /&gt;
If you are interested in running one of the training sessions, please contact Nick Freeman and Adrian Hayes with the following information:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Trainer name&lt;br /&gt;
* Trainer organisation&lt;br /&gt;
* Telephone + email contact&lt;br /&gt;
* Short Trainer bio&lt;br /&gt;
&lt;br /&gt;
* Training title&lt;br /&gt;
* Trainer requirements (e.g. a projector, whiteboard, etc)&lt;br /&gt;
* Trainee requirements (e.g. laptop, VMWare/Virtualbox, etc)&lt;br /&gt;
* Training summary (less than 500 words)&lt;br /&gt;
* Target audience (e.g. testers, project managers, security managers, web developers)&lt;br /&gt;
* Skill level required (Basic / Intermediate / Advanced)&lt;br /&gt;
* What attendees can expect to learn (key objectives)&lt;br /&gt;
&lt;br /&gt;
* Short course outline&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The fixed price per head for training will be $250 for a half-day session and $500 for a whole-day session. As this training is part of an OWASP event, part of the proceeds go back to OWASP. The split is as follows:&lt;br /&gt;
&lt;br /&gt;
* 25% to OWASP Global - used for OWASP projects around the world&lt;br /&gt;
* 25% to OWASP NZ Day - used for expenses such as catering during the conference&lt;br /&gt;
* 50% to the training provider.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Please submit the above information to both Nick Freeman and Adrian Hayes - nick.freeman@owasp.org and adrian.hayes@owasp.org&lt;br /&gt;
&lt;br /&gt;
* nick.freeman@owasp.org&lt;br /&gt;
* adrian.hayes@owasp.org&lt;br /&gt;
&lt;br /&gt;
Submissions deadline: 1st August 201&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Call For Sponsorships =&lt;br /&gt;
==Call For Sponsorships==&lt;br /&gt;
&lt;br /&gt;
OWASP New Zealand Day 2013 will be held in Auckland on the 12th of September, 2013 and is a security conference entirely dedicated to application security. The conference is once again being hosted by the University of Auckland with their support and assistance. OWASP New Zealand Day 2013 is a free event, but requires sponsor support to help be an instructive and quality event for the New Zealand community. OWASP is strictly non for profit. The sponsorship money will be used to help make OWASP New Zealand Day 2013 a free, compelling, and valuable experience for the audience.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The sponsorship funds collected are to be used for things such as:&lt;br /&gt;
&lt;br /&gt;
* Refreshments (coffee break/lunch) - we want to keep people refreshed during the day; while we certainly bring good and interesting speakers, we don't want people to go home when they become hungry. &lt;br /&gt;
* Name tags - we feel that getting to know people within the New Zealand community is important, and name tags make that possible.&lt;br /&gt;
* Promotion - up to now our events are propagating by word of mouth. We would like to get to a wider audience by advertising our events.&lt;br /&gt;
* Printed Materials - printed materials will include brochures, tags and lanyards.&lt;br /&gt;
&lt;br /&gt;
== Facts ==&lt;br /&gt;
&lt;br /&gt;
Last year, the event was supported by seven sponsors and attracted more than 250 participants. Plenty of constructive (and positive!) feedback from the audience was received and we are using this to make the conference more appealing to more people. For more information on last year's event, please visit: https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2012&lt;br /&gt;
&lt;br /&gt;
The OWASP New Zealand community is strong and there are more than 220 people currently subscribed to the mailing-list. OWASP New Zealand Day is expected to attract between 250 and 300 attendees this year.&lt;br /&gt;
&lt;br /&gt;
OWASP regular attendees are IT project managers, IT security managers, IT security consultants, web application architects and developers, QA managers, QA testers and system administrators.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Sponsorships  ==&lt;br /&gt;
&lt;br /&gt;
There are three different levels of sponsorships for the OWASP Day event:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Support Sponsorship&amp;lt;/b&amp;gt;: (Covering international speaker travel expenses, media coverage/article/promotion of the event)&lt;br /&gt;
	&lt;br /&gt;
Includes:&lt;br /&gt;
&lt;br /&gt;
* Publication of the sponsor logo on the event web site - https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2013&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Silver Sponsorship&amp;lt;/b&amp;gt;: 1500 NZD&lt;br /&gt;
&lt;br /&gt;
Includes: &lt;br /&gt;
&lt;br /&gt;
* Publication of the sponsor logo on the event web site - https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2013&lt;br /&gt;
* The publication of the sponsor logo in the event site, in the agenda, on the handouts and in all the official communications with the attendees at the conference.&lt;br /&gt;
* The possibility to distribute the company brochures, CDs or other materials to the participants during the event.&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Gold Sponsorship&amp;lt;/b&amp;gt;: 2750 NZD&lt;br /&gt;
&lt;br /&gt;
Includes: &lt;br /&gt;
&lt;br /&gt;
* The possibility to have a promotional banner or sign side stage in the main auditorium (to be provided by the sponsor, size subject to approval by the OWASP NZ Day Committee).&lt;br /&gt;
* The publication of the sponsor logo in the event site, in the agenda, on the handouts and in all the official communications with the attendees at the conference.&lt;br /&gt;
* The possibility to distribute the company brochures, CDs or other materials to the participants during the event.&lt;br /&gt;
* Publication of the sponsor logo on the OWASP New Zealand Chapter page	- Sponsor logo on the OWASP NZ site prior and during the OWASP Day event - https://www.owasp.org/index.php/New_Zealand&lt;br /&gt;
* Publication of the sponsor logo on the event web site - https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2013&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Those who are interested in sponsoring OWASP New Zealand 2013 Conference can contact the [mailto:nick.freeman@owasp.org?cc=adrian.hayes@owasp.org OWASP New Zealand Board].&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]]&lt;/div&gt;</summary>
		<author><name>Adrian Hayes</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_New_Zealand_Day_2013&amp;diff=156663</id>
		<title>OWASP New Zealand Day 2013</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_New_Zealand_Day_2013&amp;diff=156663"/>
				<updated>2013-08-12T03:29:58Z</updated>
		
		<summary type="html">&lt;p&gt;Adrian Hayes: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2013 https://www.owasp.org/images/3/3e/OWASP_NZ_Day_2013_logo.png]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''11th and 12st September 2013 - Auckland'''&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
= Introduction =&lt;br /&gt;
==Introduction==&lt;br /&gt;
We are proud to announce the fifth annual OWASP New Zealand Day conference, to be held at the University of Auckland on Thursday September 12th, 2013. OWASP New Zealand Day is a one-day conference dedicated to application security, with an emphasis on secure development techniques to help Kiwi developers build more secure applications.&lt;br /&gt;
&lt;br /&gt;
Similar to last year:&lt;br /&gt;
&lt;br /&gt;
* We will be offering training on the day before the conference (Wednesday, 11th of September). &lt;br /&gt;
* After lunch on the conference day, we will split to two tracks - one focused on deep technical topics, the other on policy, compliance and risk management. &lt;br /&gt;
&lt;br /&gt;
The fifth OWASP New Zealand Day will be happening thanks to the support provided by the University of Auckland School of Business, which will kindly offer the same conference venue of the last four years. Entry to the event will, as in the past, be free. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For any comments, feedback or observations, please don't hesitate to contact [mailto:nick.freeman@owasp.org?cc=adrian.hayes@owasp.org us].&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Registration==&lt;br /&gt;
&lt;br /&gt;
Registration for the main conference day is now open: [https://registration.owasp.org.nz/ Register Here]&lt;br /&gt;
&lt;br /&gt;
There is no cost for the main conference day and lunch is provided. We do ask that if at any point you realise you cannot make it please cancel your registration to make room for others as spaces are limited.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Training registration will be done seprately and is not yet open. Please join our low volume [http://lists.owasp.org/mailman/listinfo/owasp-newzealand mailing list] to be notified when registration opens.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Important dates==&lt;br /&gt;
&lt;br /&gt;
* CFP &amp;amp; CFT submission deadline:	1st August 2013&lt;br /&gt;
* Conference Registration deadline: 30th August 2013&lt;br /&gt;
* Training Registration deadline: 	30th August 2013&lt;br /&gt;
* Training Day date:				11th September 2013&lt;br /&gt;
* Conference Day date:				12th September 2013&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Conference Venue==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
	&amp;lt;td&amp;gt;&lt;br /&gt;
		The University of Auckland Business School&amp;lt;br&amp;gt;&lt;br /&gt;
		Owen G Glenn Building&amp;lt;br&amp;gt;&lt;br /&gt;
		Room: OGGB 260-073 (OGGB4)&amp;lt;br&amp;gt;&lt;br /&gt;
		Address: 12 Grafton Road&amp;lt;br&amp;gt;&lt;br /&gt;
		Auckland&amp;lt;br&amp;gt;&lt;br /&gt;
		New Zealand&amp;lt;br&amp;gt;&lt;br /&gt;
		[http://maps.google.com/maps?oe=UTF-8&amp;amp;ie=UTF8&amp;amp;q=auckland+business+school&amp;amp;fb=1&amp;amp;split=1&amp;amp;cid=0,0,12303692579639430581&amp;amp;ei=6WeqSZr_OZLFkAWR--zbDQ&amp;amp;ll=-36.852308,174.770916&amp;amp;spn=0.01056,0.020621&amp;amp;z=16&amp;amp;iwloc=A Map]&lt;br /&gt;
	&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;td&amp;gt;&lt;br /&gt;
		[[Image:Auckland_business_school_small2.jpg]] [[Image:Room_hall.jpg]]&lt;br /&gt;
	&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Conference Sponsors==&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;bottom&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;[http://www.auckland.ac.nz/ https://www.owasp.org/images/8/82/University_of_Auckland_crest_small.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;bottom&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;[http://www.security.org.nz/NZISF_NZISForumContent.php https://www.owasp.org/images/5/5a/Nz_information_security_forum.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;ICT and Department of Information Systems and Operations Management&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Conference Committee==&lt;br /&gt;
&lt;br /&gt;
* Nick Freeman - OWASP New Zealand Leader (Auckland)&lt;br /&gt;
* Adrian Hayes -  OWASP New Zealand Leader (Wellington)&lt;br /&gt;
* Lech Janczewski - Associate Professor - University of Auckland School of Business&lt;br /&gt;
&lt;br /&gt;
Please direct all enquiries to nick.freeman@owasp.org and adrian.hayes@owasp.org.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Speakers List=&lt;br /&gt;
==Speakers List==&lt;br /&gt;
&lt;br /&gt;
===Tom Eastman  - Catalyst IT - Serialization Formats Aren't Toys===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Do you have an API? Do you accept input from users? Do you accept it in XML? What about YAML? Or maybe JSON? How safe are you? How sure are you? It's not in the OWASP Top 10, but you don't have to look far to hear stories of security vulnerabilities involving deserialization user inputs. Why do they keep happening?&lt;br /&gt;
&lt;br /&gt;
In this talk I'll go over what the threat is, how you might be making yourself vulnerable and how to mitigate the problem. I'll cover the features (not bugs, features) of formats like XML, YAML, and JSON that make them surprisingly dangerous, and how to protect your code from them.&lt;br /&gt;
&lt;br /&gt;
Because here's the thing: If you are using, say, a compliant, properly implemented XML parser to parse your XML, you are NOT safe. Possibly quite the opposite. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Tom is a senior Python developer and technical lead for Catalyst IT, New Zealand's largest company specialising in open source. Prior to that he worked as a developer and system administrator for the University of Otago Faculty of Medicine and as a Computer Science tutor for same.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Paul Haas - Security-Assessment.com -  Improving XPath Injection with Binary Search Optimisations===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
XPath injection is technique similar to SQL injection for attacking XML processors, however many people are unaware of the technique and exploitation vectors. This talk aims to expand awareness of both the risks and remediation path in addition to the introduction of a new technique to significantly improve reconstruction speed of the backend XML document. A brief primer to XPath injection will also be covered within the talk.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Paul Haas hails from California where the waves are better but the quakes are not. With over nine years of experience in professional hacking, he is currently working with Security-Assessment.com in Wellington to bring the good word of web hacks to Kiwis everywhere. His sole hobby is driving people into Mario Kart's abyss.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Nick von Dadelszen - Lateral Security - Security Vulnerability Disclosure===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Disclosing security vulnerabilities can be a dangerous business. While there are systems in place for handling disclosures to most major software companies, the process for disclosing vulnerabilities to local organisations is a lot less discussed.&lt;br /&gt;
&lt;br /&gt;
As the discloser, there is always the chance that you are accused of hacking and get a visit from the police merely for identifying an issue. As an organisation, you can find yourself on the front page of the news when someone goes public with an issue.&lt;br /&gt;
&lt;br /&gt;
This talk outlines the dilemmas faced when stumbling across that SQL injection in the local shopping site and proposes mechanisms to safely get the right people told about it. It also discusses how organisations can make it more likely that security vulnerabilities are reported to them directly, rather than through the press.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Nick von Dadelszen is the technical director at Lateral Security. Nick has been performing professional penetration testing for over 12 years and has managed several successful penetration testing teams. He has worked with the majority of large corporates and Government agencies in New Zealand and is a regular presenter at OWASP and Kiwicon conferences.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Mark Piper - Insomnia Security - OWASP Top 10 Mobile Risks - An Introduction By Case Study===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
As mobile application usage explodes, so does the associated application&lt;br /&gt;
security issues. The OWASP Mobile Security Project includes an&lt;br /&gt;
initiative to categorise and rate these issues into a top 10 format.&lt;br /&gt;
This list is known as the Top 10 Mobile Risks.&lt;br /&gt;
&lt;br /&gt;
During the session, we will introduce the current (RC1) Top 10 supported&lt;br /&gt;
with several real world case studies of issues.  We will cover how the&lt;br /&gt;
issues were identified, how they may be exploited by attackers and what&lt;br /&gt;
mitigation's could be implemented to resolve the issues in the future.&lt;br /&gt;
While the issues will be largely platform agnostic, the examples will&lt;br /&gt;
cover both iOS and Android environments.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Mark is a Principal Security Consultant with the Insomnia Security&lt;br /&gt;
team. Mark spends his days auditing software, running penetration&lt;br /&gt;
testing and red team engagements while working with global customers on&lt;br /&gt;
developing new testing services.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Kirk Jackson - Xero - Bad Smells That Lead to Bad Security===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Your job as a defender is to reduce the attack surface of your web application and protect your infrastructure and data from being breached. However we can't be involved in every decision that goes on in our organisation, and we don't always think the same as an attacker does. This talk will introduce you to some common &amp;quot;bad smells&amp;quot; that might indicate security issues lurking under the surface of your code, and help you develop your spidey sense so that you know when to raise the alarm.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Kirk is the Security Officer at Xero, and is interested in writing and defending secure web applications.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Kim Carter - BinaryMist - Kali, ZAP, and Sanatising User Input - Oh My!===&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Kim Carter is a Software Engineer, Architect, Entrepreneur and the founder of BinaryMist. He is passionate about and enjoys many things. Some of which include:&lt;br /&gt;
* Designing and creating robust software and networks.&lt;br /&gt;
*Breaking his and others software and networks, then fixing it/them.&lt;br /&gt;
*Teaching, training, mentoring, motivating, listening to and being around smart people.&lt;br /&gt;
*Increasing quality awareness and helping people and organisations implement higher quality in a cost effective manner.&lt;br /&gt;
*Improving operational efficiencies.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Hugh Davenport - Aura RedEye Security - Bug Chaining (aka, why XSS can be worse than you think) ===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Security bugs can range in damage from small stuff, all the way to big stuff. Some people only focus on the large stuff, and the smaller stuff can go unnoticed. This talk will give a real world example of a project that had a small bug, that allowed a larger bug to happen, which allowed a larger bug, which allowed for unwanted shell access. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Hugh works at Aura RedEye Security on their managed vulnerability scanning service. In his spare time, he is the security point of contact on the Mahara open source tool and contributes to many other open source projects. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Hinne Hettema - University of Auckland - Evolution of Threats and the Skills in our Security Team===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The threat landscape for security threats is constantly evolving, with new threats being stealthier, more diverse, and increasingly aimed at bypassing the protection offered by antivirus and network intrusion detection systems. Adversaries are now often part of a semi-organised underground economy geared towards the acquisition and sale of digital assets such as usernames, passwords, confidential business information, financial data and designs. There are specific value chains in this economy, which make the acquisition, sale and utilisation of such assets a relatively easy process.&lt;br /&gt;
&lt;br /&gt;
This talk focuses on the skills needed in a security team to deal with this next level of threat, and on the sort of teams that we need in enterprise security to address the modern threats that we face.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Hinne Hettema is the team leader of the IT security team at The University of Auckland, an honorary research fellow in the Department of Philosophy at The University of Auckland, and lectures in cyber security at Unitec. He has 10 years experience in security consulting and has a PhD in Philosophy (2012) and theoretical chemistry (1993).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Francois Marier - Mozilla - Securing the Web Without Site-Specific Passwords===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Has anyone else noticed that the OWASP Top 10 is not changing very much?&lt;br /&gt;
Especially in the realm of authentication-related problems. I don't&lt;br /&gt;
claim to have the one true solution for this, but one thing is certain:&lt;br /&gt;
if we change how things are done on the web and relieve developers from&lt;br /&gt;
having to store passwords, we can make things better.&lt;br /&gt;
&lt;br /&gt;
We need to let web developers outsource their authentication needs to&lt;br /&gt;
people who can do it well. Does that mean we should force all of our&lt;br /&gt;
users to join Facebook? Well not really. That might work for some sites,&lt;br /&gt;
but outsourcing all of our logins to a single for-profit company isn't a&lt;br /&gt;
solution that works for the whole web.&lt;br /&gt;
&lt;br /&gt;
The open web needs a better solution. One that enable users to choose&lt;br /&gt;
their identity provider and shop for the most secure one if that's what&lt;br /&gt;
they're into. This is the promise behind Persona and the BrowserID&lt;br /&gt;
protocol. Choose your email provider carefully and let's get rid of all&lt;br /&gt;
of these site-specific passwords that are just sitting there waiting to&lt;br /&gt;
be leaked and cracked.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Francois is a software engineer and security champion on the Mozilla Identity team where he works on decentralising authentication on the web. A long time Debian developer, Francois has been involved in Open Source and web development for a while and has always had a strong interest in security.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Andrew Kelly - Nothing to See Here!===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This is how it starts: &amp;quot;Seeking an exciting new challenge? Want to be responsible for building and shaping an embryonic information security function? Then you so won't want to miss this golden opportunity!&amp;quot; Andrew will talk about the setting up of an information security function in an organisation from scratch ('Greenfield') - as opposed to trying to bed yourself down into an already-existing organisation ('Brownfield'). He'll talk about the pros and the cons, and the many ups and downs. And hopefully he'll answer some questions like: Is there, if fact, any such thing as a greenfield security opportunity left in the wild? And ... if such mythical beasties do exist ... are they worth signing on for? Andrew will discuss the pitfalls and pratfalls of the journey from initial engagement, through (maybe) acceptance, until (perhaps) security sign-off and (hopefully) go-live. He'll also discuss both the Pit Bulls and prats you're likely to meet along the way. So ... if you want to hear a guy speak who reckons he's forgotten more than he ever thought he knew? Then this is so the talk for you!&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Andrew is a whole year older than he was when he presented at last year's OWASP Day: So this time around he's bringing a quarter century's worth of IT security experience to OWASP! Now 25 years ago, he was this mainframe security uber-tech - but today Andrew's recognised as being a 'pragmatic' subject-matter expert on corporate-level information security policy, compliance, frameworks and governance. His first greenfield security 'opportunity' came in November 1989 at the Sun Life Assurance Company of Canada, in the UK. And during those intervening 24 years, he's had similar experiences at various other companies including the likes of Lloyds/TSB Bank, Fonterra, BT Syntegra, Telecom/Gen-i and, lately, Health Benefits Ltd. - amongst many others.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Call For Presentations =&lt;br /&gt;
==Call For Presentations==&lt;br /&gt;
&lt;br /&gt;
OWASP New Zealand Day conferences attract a high quality of speakers from a variety of security disciplines including web developers, system administrators, penetration testers, policy specialists and more. We encourage presentations to have a strong component on fixing and prevention of security issues. We are looking for presentations on a wide variety of security topics, including but not limited to:&lt;br /&gt;
&lt;br /&gt;
* Web application security&lt;br /&gt;
* Mobile security&lt;br /&gt;
* Secure development&lt;br /&gt;
* Vulnerability analysis&lt;br /&gt;
* Threat modelling&lt;br /&gt;
* Threat and vulnerability countermeasures&lt;br /&gt;
* Platform or language security (.NET, Java, RoR, etc)&lt;br /&gt;
* Penetration Testing&lt;br /&gt;
* Browser and client security&lt;br /&gt;
* Application and solution architecture security&lt;br /&gt;
* PCI DSS&lt;br /&gt;
* Risk management&lt;br /&gt;
* Security concepts for C*Os, project managers and other non-technical attendees&lt;br /&gt;
* Privacy controls&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The email subject must be &amp;quot;OWASP New Zealand 2013: CFP&amp;quot; and the email body must contains the following information/sections:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name and Surname&lt;br /&gt;
* Affiliation&lt;br /&gt;
* Telephone number&lt;br /&gt;
* Email address&lt;br /&gt;
* Short presenter bio&lt;br /&gt;
* Title of the contribution&lt;br /&gt;
* Type of contribution: Technical, Informative, Management&lt;br /&gt;
* Short abstract (up to 500 words)&lt;br /&gt;
* List of the author's previous papers/articles/speeches on the same topic&lt;br /&gt;
* If you are not from New Zealand, will your company support your travel/accommodation costs? - Yes/No&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The submission will be reviewed by the OWASP New Zealand Day CFP Review Board and the highest voted talks will be selected and invited for presentation.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
PLEASE NOTE:&lt;br /&gt;
* Due to limited budget available, expenses for international speakers cannot be covered.&lt;br /&gt;
* If your company is willing to cover travel and accommodation costs, the company will become &amp;quot;Support Sponsor&amp;quot; of the event.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Please submit the above information to both Nick Freeman and Adrian Hayes - nick.freeman@owasp.org and adrian.hayes@owasp.org&lt;br /&gt;
&lt;br /&gt;
Submissions deadline: 1st August 2013&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Call For Trainers =&lt;br /&gt;
==Call For Trainers==&lt;br /&gt;
&lt;br /&gt;
We are happy to announce that training will run on Wednesday September 11th 2013, the day before the OWASP Day conference. The training venues will be auditoriums kindly provided by the University of Auckland, in the same building as the OWASP Day conference itself. Classes will contain up to 20 students, and each seat has power for laptop usage. A wide range of half-day or full-day training proposals will be considered, see the Call for Papers for a list of topics example topics&lt;br /&gt;
&lt;br /&gt;
If you are interested in running one of the training sessions, please contact Nick Freeman and Adrian Hayes with the following information:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Trainer name&lt;br /&gt;
* Trainer organisation&lt;br /&gt;
* Telephone + email contact&lt;br /&gt;
* Short Trainer bio&lt;br /&gt;
&lt;br /&gt;
* Training title&lt;br /&gt;
* Trainer requirements (e.g. a projector, whiteboard, etc)&lt;br /&gt;
* Trainee requirements (e.g. laptop, VMWare/Virtualbox, etc)&lt;br /&gt;
* Training summary (less than 500 words)&lt;br /&gt;
* Target audience (e.g. testers, project managers, security managers, web developers)&lt;br /&gt;
* Skill level required (Basic / Intermediate / Advanced)&lt;br /&gt;
* What attendees can expect to learn (key objectives)&lt;br /&gt;
&lt;br /&gt;
* Short course outline&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The fixed price per head for training will be $250 for a half-day session and $500 for a whole-day session. As this training is part of an OWASP event, part of the proceeds go back to OWASP. The split is as follows:&lt;br /&gt;
&lt;br /&gt;
* 25% to OWASP Global - used for OWASP projects around the world&lt;br /&gt;
* 25% to OWASP NZ Day - used for expenses such as catering during the conference&lt;br /&gt;
* 50% to the training provider.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Please submit the above information to both Nick Freeman and Adrian Hayes - nick.freeman@owasp.org and adrian.hayes@owasp.org&lt;br /&gt;
&lt;br /&gt;
* nick.freeman@owasp.org&lt;br /&gt;
* adrian.hayes@owasp.org&lt;br /&gt;
&lt;br /&gt;
Submissions deadline: 1st August 201&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Call For Sponsorships =&lt;br /&gt;
==Call For Sponsorships==&lt;br /&gt;
&lt;br /&gt;
OWASP New Zealand Day 2013 will be held in Auckland on the 12th of September, 2013 and is a security conference entirely dedicated to application security. The conference is once again being hosted by the University of Auckland with their support and assistance. OWASP New Zealand Day 2013 is a free event, but requires sponsor support to help be an instructive and quality event for the New Zealand community. OWASP is strictly non for profit. The sponsorship money will be used to help make OWASP New Zealand Day 2013 a free, compelling, and valuable experience for the audience.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The sponsorship funds collected are to be used for things such as:&lt;br /&gt;
&lt;br /&gt;
* Refreshments (coffee break/lunch) - we want to keep people refreshed during the day; while we certainly bring good and interesting speakers, we don't want people to go home when they become hungry. &lt;br /&gt;
* Name tags - we feel that getting to know people within the New Zealand community is important, and name tags make that possible.&lt;br /&gt;
* Promotion - up to now our events are propagating by word of mouth. We would like to get to a wider audience by advertising our events.&lt;br /&gt;
* Printed Materials - printed materials will include brochures, tags and lanyards.&lt;br /&gt;
&lt;br /&gt;
== Facts ==&lt;br /&gt;
&lt;br /&gt;
Last year, the event was supported by seven sponsors and attracted more than 250 participants. Plenty of constructive (and positive!) feedback from the audience was received and we are using this to make the conference more appealing to more people. For more information on last year's event, please visit: https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2012&lt;br /&gt;
&lt;br /&gt;
The OWASP New Zealand community is strong and there are more than 220 people currently subscribed to the mailing-list. OWASP New Zealand Day is expected to attract between 250 and 300 attendees this year.&lt;br /&gt;
&lt;br /&gt;
OWASP regular attendees are IT project managers, IT security managers, IT security consultants, web application architects and developers, QA managers, QA testers and system administrators.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Sponsorships  ==&lt;br /&gt;
&lt;br /&gt;
There are three different levels of sponsorships for the OWASP Day event:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Support Sponsorship&amp;lt;/b&amp;gt;: (Covering international speaker travel expenses, media coverage/article/promotion of the event)&lt;br /&gt;
	&lt;br /&gt;
Includes:&lt;br /&gt;
&lt;br /&gt;
* Publication of the sponsor logo on the event web site - https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2013&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Silver Sponsorship&amp;lt;/b&amp;gt;: 1500 NZD&lt;br /&gt;
&lt;br /&gt;
Includes: &lt;br /&gt;
&lt;br /&gt;
* Publication of the sponsor logo on the event web site - https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2013&lt;br /&gt;
* The publication of the sponsor logo in the event site, in the agenda, on the handouts and in all the official communications with the attendees at the conference.&lt;br /&gt;
* The possibility to distribute the company brochures, CDs or other materials to the participants during the event.&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Gold Sponsorship&amp;lt;/b&amp;gt;: 2750 NZD&lt;br /&gt;
&lt;br /&gt;
Includes: &lt;br /&gt;
&lt;br /&gt;
* The possibility to have a promotional banner or sign side stage in the main auditorium (to be provided by the sponsor, size subject to approval by the OWASP NZ Day Committee).&lt;br /&gt;
* The publication of the sponsor logo in the event site, in the agenda, on the handouts and in all the official communications with the attendees at the conference.&lt;br /&gt;
* The possibility to distribute the company brochures, CDs or other materials to the participants during the event.&lt;br /&gt;
* Publication of the sponsor logo on the OWASP New Zealand Chapter page	- Sponsor logo on the OWASP NZ site prior and during the OWASP Day event - https://www.owasp.org/index.php/New_Zealand&lt;br /&gt;
* Publication of the sponsor logo on the event web site - https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2013&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Those who are interested in sponsoring OWASP New Zealand 2013 Conference can contact the [mailto:nick.freeman@owasp.org?cc=adrian.hayes@owasp.org OWASP New Zealand Board].&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]]&lt;/div&gt;</summary>
		<author><name>Adrian Hayes</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_New_Zealand_Day_2013&amp;diff=156662</id>
		<title>OWASP New Zealand Day 2013</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_New_Zealand_Day_2013&amp;diff=156662"/>
				<updated>2013-08-12T02:57:55Z</updated>
		
		<summary type="html">&lt;p&gt;Adrian Hayes: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2013 https://www.owasp.org/images/3/3e/OWASP_NZ_Day_2013_logo.png]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''11th and 12st September 2013 - Auckland'''&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
= Introduction =&lt;br /&gt;
==Introduction==&lt;br /&gt;
We are proud to announce the fifth annual OWASP New Zealand Day conference, to be held at the University of Auckland on Thursday September 12th, 2013. OWASP New Zealand Day is a one-day conference dedicated to application security, with an emphasis on secure development techniques to help Kiwi developers build more secure applications.&lt;br /&gt;
&lt;br /&gt;
Similar to last year:&lt;br /&gt;
&lt;br /&gt;
* We will be offering training on the day before the conference (Wednesday, 11th of September). &lt;br /&gt;
* After lunch on the conference day, we will split to two tracks - one focused on deep technical topics, the other on policy, compliance and risk management. &lt;br /&gt;
&lt;br /&gt;
The fifth OWASP New Zealand Day will be happening thanks to the support provided by the University of Auckland School of Business, which will kindly offer the same conference venue of the last four years. Entry to the event will, as in the past, be free. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For any comments, feedback or observations, please don't hesitate to contact [mailto:nick.freeman@owasp.org?cc=adrian.hayes@owasp.org us].&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Registration==&lt;br /&gt;
&lt;br /&gt;
Registration for the main conference day is now open: [https://registration.owasp.org.nz/ Register Here]&lt;br /&gt;
&lt;br /&gt;
There is no cost for the main conference day and lunch is provided. We do ask that if at any point you realise you cannot make it please cancel your registration to make room for others as spaces are limited.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Training registration will be done seprately and is not yet open. Please join our low volume [http://lists.owasp.org/mailman/listinfo/owasp-newzealand mailing list] to be notified when registration opens.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Important dates==&lt;br /&gt;
&lt;br /&gt;
* CFP &amp;amp; CFT submission deadline:	1st August 2013&lt;br /&gt;
* Conference Registration deadline: 30th August 2013&lt;br /&gt;
* Training Registration deadline: 	30th August 2013&lt;br /&gt;
* Training Day date:				11th September 2013&lt;br /&gt;
* Conference Day date:				12th September 2013&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Conference Venue==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
	&amp;lt;td&amp;gt;&lt;br /&gt;
		The University of Auckland Business School&amp;lt;br&amp;gt;&lt;br /&gt;
		Owen G Glenn Building&amp;lt;br&amp;gt;&lt;br /&gt;
		Room: OGGB 260-073 (OGGB4)&amp;lt;br&amp;gt;&lt;br /&gt;
		Address: 12 Grafton Road&amp;lt;br&amp;gt;&lt;br /&gt;
		Auckland&amp;lt;br&amp;gt;&lt;br /&gt;
		New Zealand&amp;lt;br&amp;gt;&lt;br /&gt;
		[http://maps.google.com/maps?oe=UTF-8&amp;amp;ie=UTF8&amp;amp;q=auckland+business+school&amp;amp;fb=1&amp;amp;split=1&amp;amp;cid=0,0,12303692579639430581&amp;amp;ei=6WeqSZr_OZLFkAWR--zbDQ&amp;amp;ll=-36.852308,174.770916&amp;amp;spn=0.01056,0.020621&amp;amp;z=16&amp;amp;iwloc=A Map]&lt;br /&gt;
	&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;td&amp;gt;&lt;br /&gt;
		[[Image:Auckland_business_school_small2.jpg]] [[Image:Room_hall.jpg]]&lt;br /&gt;
	&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Conference Sponsors==&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;bottom&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;[http://www.auckland.ac.nz/ https://www.owasp.org/images/8/82/University_of_Auckland_crest_small.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;bottom&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;[http://www.security.org.nz/NZISF_NZISForumContent.php https://www.owasp.org/images/5/5a/Nz_information_security_forum.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;ICT and Department of Information Systems and Operations Management&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Conference Committee==&lt;br /&gt;
&lt;br /&gt;
* Nick Freeman - OWASP New Zealand Leader (Auckland)&lt;br /&gt;
* Adrian Hayes -  OWASP New Zealand Leader (Wellington)&lt;br /&gt;
* Lech Janczewski - Associate Professor - University of Auckland School of Business&lt;br /&gt;
&lt;br /&gt;
Please direct all enquiries to nick.freeman@owasp.org and adrian.hayes@owasp.org.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Speakers List=&lt;br /&gt;
==Speakers List==&lt;br /&gt;
&lt;br /&gt;
===Tom Eastman  - Catalyst IT - Serialization Formats Aren't Toys===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Do you have an API? Do you accept input from users? Do you accept it in XML? What about YAML? Or maybe JSON? How safe are you? How sure are you? It's not in the OWASP Top 10, but you don't have to look far to hear stories of security vulnerabilities involving deserialization user inputs. Why do they keep happening?&lt;br /&gt;
&lt;br /&gt;
In this talk I'll go over what the threat is, how you might be making yourself vulnerable and how to mitigate the problem. I'll cover the features (not bugs, features) of formats like XML, YAML, and JSON that make them surprisingly dangerous, and how to protect your code from them.&lt;br /&gt;
&lt;br /&gt;
Because here's the thing: If you are using, say, a compliant, properly implemented XML parser to parse your XML, you are NOT safe. Possibly quite the opposite. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Tom is a senior Python developer and technical lead for Catalyst IT, New Zealand's largest company specialising in open source. Prior to that he worked as a developer and system administrator for the University of Otago Faculty of Medicine and as a Computer Science tutor for same.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Paul Haas - Security-Assessment.com -  Improving XPath Injection with Binary Search Optimisations===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
XPath injection is technique similar to SQL injection for attacking XML processors, however many people are unaware of the technique and exploitation vectors. This talk aims to expand awareness of both the risks and remediation path in addition to the introduction of a new technique to significantly improve reconstruction speed of the backend XML document. A brief primer to XPath injection will also be covered within the talk.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Paul Haas hails from California where the waves are better but the quakes are not. With over nine years of experience in professional hacking, he is currently working with Security-Assessment.com in Wellington to bring the good word of web hacks to Kiwis everywhere. His sole hobby is driving people into Mario Kart's abyss.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Nick von Dadelszen - Lateral Security - Security Vulnerability Disclosure===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Disclosing security vulnerabilities can be a dangerous business. While there are systems in place for handling disclosures to most major software companies, the process for disclosing vulnerabilities to local organisations is a lot less discussed.&lt;br /&gt;
&lt;br /&gt;
As the discloser, there is always the chance that you are accused of hacking and get a visit from the police merely for identifying an issue. As an organisation, you can find yourself on the front page of the news when someone goes public with an issue.&lt;br /&gt;
&lt;br /&gt;
This talk outlines the dilemmas faced when stumbling across that SQL injection in the local shopping site and proposes mechanisms to safely get the right people told about it. It also discusses how organisations can make it more likely that security vulnerabilities are reported to them directly, rather than through the press.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Nick von Dadelszen is the technical director at Lateral Security. Nick has been performing professional penetration testing for over 12 years and has managed several successful penetration testing teams. He has worked with the majority of large corporates and Government agencies in New Zealand and is a regular presenter at OWASP and Kiwicon conferences.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Mark Piper - Insomnia Security - OWASP Top 10 Mobile Risks - An Introduction By Case Study===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
As mobile application usage explodes, so does the associated application&lt;br /&gt;
security issues. The OWASP Mobile Security Project includes an&lt;br /&gt;
initiative to categorise and rate these issues into a top 10 format.&lt;br /&gt;
This list is known as the Top 10 Mobile Risks.&lt;br /&gt;
&lt;br /&gt;
During the session, we will introduce the current (RC1) Top 10 supported&lt;br /&gt;
with several real world case studies of issues.  We will cover how the&lt;br /&gt;
issues were identified, how they may be exploited by attackers and what&lt;br /&gt;
mitigation's could be implemented to resolve the issues in the future.&lt;br /&gt;
While the issues will be largely platform agnostic, the examples will&lt;br /&gt;
cover both iOS and Android environments.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Mark is a Principal Security Consultant with the Insomnia Security&lt;br /&gt;
team. Mark spends his days auditing software, running penetration&lt;br /&gt;
testing and red team engagements while working with global customers on&lt;br /&gt;
developing new testing services.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Kirk Jackson - Xero - Bad Smells That Lead to Bad Security===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Your job as a defender is to reduce the attack surface of your web application and protect your infrastructure and data from being breached. However we can't be involved in every decision that goes on in our organisation, and we don't always think the same as an attacker does. This talk will introduce you to some common &amp;quot;bad smells&amp;quot; that might indicate security issues lurking under the surface of your code, and help you develop your spidey sense so that you know when to raise the alarm.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Kirk is the Security Officer at Xero, and is interested in writing and defending secure web applications.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Kim Carter - BinaryMist - Kali, ZAP, and Sanatising User Input - Oh My!===&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Kim Carter is a Software Engineer, Architect, Entrepreneur and the founder of BinaryMist. He is passionate about and enjoys many things. Some of which include:&lt;br /&gt;
* Designing and creating robust software and networks.&lt;br /&gt;
*Breaking his and others software and networks, then fixing it/them.&lt;br /&gt;
*Teaching, training, mentoring, motivating, listening to and being around smart people.&lt;br /&gt;
*Increasing quality awareness and helping people and organisations implement higher quality in a cost effective manner.&lt;br /&gt;
*Improving operational efficiencies.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Hugh Davenport - Aura RedEye Security - Bug Chaining (aka, why XSS can be worse than you think) ===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Security bugs can range in damage from small stuff, all the way to big stuff. Some people only focus on the large stuff, and the smaller stuff can go unnoticed. This talk will give a real world example of a project that had a small bug, that allowed a larger bug to happen, which allowed a larger bug, which allowed for unwanted shell access. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Hugh works at Aura RedEye Security on their managed vulnerability scanning service. In his spare time, he is the security point of contact on the Mahara open source tool and contributes to many other open source projects. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Hinne Hettema - University of Auckland - Evolution of Threats and the Skills in our Security Team===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The threat landscape for security threats is constantly evolving, with new threats being stealthier, more diverse, and increasingly aimed at bypassing the protection offered by antivirus and network intrusion detection systems. Adversaries are now often part of a semi-organised underground economy geared towards the acquisition and sale of digital assets such as usernames, passwords, confidential business information, financial data and designs. There are specific value chains in this economy, which make the acquisition, sale and utilisation of such assets a relatively easy process.&lt;br /&gt;
&lt;br /&gt;
This talk focuses on the skills needed in a security team to deal with this next level of threat, and on the sort of teams that we need in enterprise security to address the modern threats that we face.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Hinne Hettema is the team leader of the IT security team at The University of Auckland, an honorary research fellow in the Department of Philosophy at The University of Auckland, and lectures in cyber security at Unitec. He has 10 years experience in security consulting and has a PhD in Philosophy (2012) and theoretical chemistry (1993).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Francois Marier - Mozilla - Securing the Web Without Site-Specific Passwords===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Has anyone else noticed that the OWASP Top 10 is not changing very much?&lt;br /&gt;
Especially in the realm of authentication-related problems. I don't&lt;br /&gt;
claim to have the one true solution for this, but one thing is certain:&lt;br /&gt;
if we change how things are done on the web and relieve developers from&lt;br /&gt;
having to store passwords, we can make things better.&lt;br /&gt;
&lt;br /&gt;
We need to let web developers outsource their authentication needs to&lt;br /&gt;
people who can do it well. Does that mean we should force all of our&lt;br /&gt;
users to join Facebook? Well not really. That might work for some sites,&lt;br /&gt;
but outsourcing all of our logins to a single American compay isn't a&lt;br /&gt;
solution that works for the whole web.&lt;br /&gt;
&lt;br /&gt;
The open web needs a better solution. One that enable users to choose&lt;br /&gt;
their identity provider and shop for the most secure one if that's what&lt;br /&gt;
they're into. This is the promise behind Persona and the BrowserID&lt;br /&gt;
protocol. Choose your email provider carefully and let's get rid of all&lt;br /&gt;
of these site-specific passwords that are just sitting there waiting to&lt;br /&gt;
be leaked and cracked.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Francois is a software engineer and security champion on the Mozilla Identity team where he works on decentralising authentication on the web. A long time Debian developer, Francois has been involved in Open Source and web development for a while and has always had a strong interest in security.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Andrew Kelly - Nothing to See Here!===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This is how it starts: &amp;quot;Seeking an exciting new challenge? Want to be responsible for building and shaping an embryonic information security function? Then you so won't want to miss this golden opportunity!&amp;quot; Andrew will talk about the setting up of an information security function in an organisation from scratch ('Greenfield') - as opposed to trying to bed yourself down into an already-existing organisation ('Brownfield'). He'll talk about the pros and the cons, and the many ups and downs. And hopefully he'll answer some questions like: Is there, if fact, any such thing as a greenfield security opportunity left in the wild? And ... if such mythical beasties do exist ... are they worth signing on for? Andrew will discuss the pitfalls and pratfalls of the journey from initial engagement, through (maybe) acceptance, until (perhaps) security sign-off and (hopefully) go-live. He'll also discuss both the Pit Bulls and prats you're likely to meet along the way. So ... if you want to hear a guy speak who reckons he's forgotten more than he ever thought he knew? Then this is so the talk for you!&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Andrew is a whole year older than he was when he presented at last year's OWASP Day: So this time around he's bringing a quarter century's worth of IT security experience to OWASP! Now 25 years ago, he was this mainframe security uber-tech - but today Andrew's recognised as being a 'pragmatic' subject-matter expert on corporate-level information security policy, compliance, frameworks and governance. His first greenfield security 'opportunity' came in November 1989 at the Sun Life Assurance Company of Canada, in the UK. And during those intervening 24 years, he's had similar experiences at various other companies including the likes of Lloyds/TSB Bank, Fonterra, BT Syntegra, Telecom/Gen-i and, lately, Health Benefits Ltd. - amongst many others.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Call For Presentations =&lt;br /&gt;
==Call For Presentations==&lt;br /&gt;
&lt;br /&gt;
OWASP New Zealand Day conferences attract a high quality of speakers from a variety of security disciplines including web developers, system administrators, penetration testers, policy specialists and more. We encourage presentations to have a strong component on fixing and prevention of security issues. We are looking for presentations on a wide variety of security topics, including but not limited to:&lt;br /&gt;
&lt;br /&gt;
* Web application security&lt;br /&gt;
* Mobile security&lt;br /&gt;
* Secure development&lt;br /&gt;
* Vulnerability analysis&lt;br /&gt;
* Threat modelling&lt;br /&gt;
* Threat and vulnerability countermeasures&lt;br /&gt;
* Platform or language security (.NET, Java, RoR, etc)&lt;br /&gt;
* Penetration Testing&lt;br /&gt;
* Browser and client security&lt;br /&gt;
* Application and solution architecture security&lt;br /&gt;
* PCI DSS&lt;br /&gt;
* Risk management&lt;br /&gt;
* Security concepts for C*Os, project managers and other non-technical attendees&lt;br /&gt;
* Privacy controls&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The email subject must be &amp;quot;OWASP New Zealand 2013: CFP&amp;quot; and the email body must contains the following information/sections:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name and Surname&lt;br /&gt;
* Affiliation&lt;br /&gt;
* Telephone number&lt;br /&gt;
* Email address&lt;br /&gt;
* Short presenter bio&lt;br /&gt;
* Title of the contribution&lt;br /&gt;
* Type of contribution: Technical, Informative, Management&lt;br /&gt;
* Short abstract (up to 500 words)&lt;br /&gt;
* List of the author's previous papers/articles/speeches on the same topic&lt;br /&gt;
* If you are not from New Zealand, will your company support your travel/accommodation costs? - Yes/No&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The submission will be reviewed by the OWASP New Zealand Day CFP Review Board and the highest voted talks will be selected and invited for presentation.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
PLEASE NOTE:&lt;br /&gt;
* Due to limited budget available, expenses for international speakers cannot be covered.&lt;br /&gt;
* If your company is willing to cover travel and accommodation costs, the company will become &amp;quot;Support Sponsor&amp;quot; of the event.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Please submit the above information to both Nick Freeman and Adrian Hayes - nick.freeman@owasp.org and adrian.hayes@owasp.org&lt;br /&gt;
&lt;br /&gt;
Submissions deadline: 1st August 2013&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Call For Trainers =&lt;br /&gt;
==Call For Trainers==&lt;br /&gt;
&lt;br /&gt;
We are happy to announce that training will run on Wednesday September 11th 2013, the day before the OWASP Day conference. The training venues will be auditoriums kindly provided by the University of Auckland, in the same building as the OWASP Day conference itself. Classes will contain up to 20 students, and each seat has power for laptop usage. A wide range of half-day or full-day training proposals will be considered, see the Call for Papers for a list of topics example topics&lt;br /&gt;
&lt;br /&gt;
If you are interested in running one of the training sessions, please contact Nick Freeman and Adrian Hayes with the following information:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Trainer name&lt;br /&gt;
* Trainer organisation&lt;br /&gt;
* Telephone + email contact&lt;br /&gt;
* Short Trainer bio&lt;br /&gt;
&lt;br /&gt;
* Training title&lt;br /&gt;
* Trainer requirements (e.g. a projector, whiteboard, etc)&lt;br /&gt;
* Trainee requirements (e.g. laptop, VMWare/Virtualbox, etc)&lt;br /&gt;
* Training summary (less than 500 words)&lt;br /&gt;
* Target audience (e.g. testers, project managers, security managers, web developers)&lt;br /&gt;
* Skill level required (Basic / Intermediate / Advanced)&lt;br /&gt;
* What attendees can expect to learn (key objectives)&lt;br /&gt;
&lt;br /&gt;
* Short course outline&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The fixed price per head for training will be $250 for a half-day session and $500 for a whole-day session. As this training is part of an OWASP event, part of the proceeds go back to OWASP. The split is as follows:&lt;br /&gt;
&lt;br /&gt;
* 25% to OWASP Global - used for OWASP projects around the world&lt;br /&gt;
* 25% to OWASP NZ Day - used for expenses such as catering during the conference&lt;br /&gt;
* 50% to the training provider.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Please submit the above information to both Nick Freeman and Adrian Hayes - nick.freeman@owasp.org and adrian.hayes@owasp.org&lt;br /&gt;
&lt;br /&gt;
* nick.freeman@owasp.org&lt;br /&gt;
* adrian.hayes@owasp.org&lt;br /&gt;
&lt;br /&gt;
Submissions deadline: 1st August 201&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Call For Sponsorships =&lt;br /&gt;
==Call For Sponsorships==&lt;br /&gt;
&lt;br /&gt;
OWASP New Zealand Day 2013 will be held in Auckland on the 12th of September, 2013 and is a security conference entirely dedicated to application security. The conference is once again being hosted by the University of Auckland with their support and assistance. OWASP New Zealand Day 2013 is a free event, but requires sponsor support to help be an instructive and quality event for the New Zealand community. OWASP is strictly non for profit. The sponsorship money will be used to help make OWASP New Zealand Day 2013 a free, compelling, and valuable experience for the audience.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The sponsorship funds collected are to be used for things such as:&lt;br /&gt;
&lt;br /&gt;
* Refreshments (coffee break/lunch) - we want to keep people refreshed during the day; while we certainly bring good and interesting speakers, we don't want people to go home when they become hungry. &lt;br /&gt;
* Name tags - we feel that getting to know people within the New Zealand community is important, and name tags make that possible.&lt;br /&gt;
* Promotion - up to now our events are propagating by word of mouth. We would like to get to a wider audience by advertising our events.&lt;br /&gt;
* Printed Materials - printed materials will include brochures, tags and lanyards.&lt;br /&gt;
&lt;br /&gt;
== Facts ==&lt;br /&gt;
&lt;br /&gt;
Last year, the event was supported by seven sponsors and attracted more than 250 participants. Plenty of constructive (and positive!) feedback from the audience was received and we are using this to make the conference more appealing to more people. For more information on last year's event, please visit: https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2012&lt;br /&gt;
&lt;br /&gt;
The OWASP New Zealand community is strong and there are more than 220 people currently subscribed to the mailing-list. OWASP New Zealand Day is expected to attract between 250 and 300 attendees this year.&lt;br /&gt;
&lt;br /&gt;
OWASP regular attendees are IT project managers, IT security managers, IT security consultants, web application architects and developers, QA managers, QA testers and system administrators.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Sponsorships  ==&lt;br /&gt;
&lt;br /&gt;
There are three different levels of sponsorships for the OWASP Day event:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Support Sponsorship&amp;lt;/b&amp;gt;: (Covering international speaker travel expenses, media coverage/article/promotion of the event)&lt;br /&gt;
	&lt;br /&gt;
Includes:&lt;br /&gt;
&lt;br /&gt;
* Publication of the sponsor logo on the event web site - https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2013&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Silver Sponsorship&amp;lt;/b&amp;gt;: 1500 NZD&lt;br /&gt;
&lt;br /&gt;
Includes: &lt;br /&gt;
&lt;br /&gt;
* Publication of the sponsor logo on the event web site - https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2013&lt;br /&gt;
* The publication of the sponsor logo in the event site, in the agenda, on the handouts and in all the official communications with the attendees at the conference.&lt;br /&gt;
* The possibility to distribute the company brochures, CDs or other materials to the participants during the event.&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Gold Sponsorship&amp;lt;/b&amp;gt;: 2750 NZD&lt;br /&gt;
&lt;br /&gt;
Includes: &lt;br /&gt;
&lt;br /&gt;
* The possibility to have a promotional banner or sign side stage in the main auditorium (to be provided by the sponsor, size subject to approval by the OWASP NZ Day Committee).&lt;br /&gt;
* The publication of the sponsor logo in the event site, in the agenda, on the handouts and in all the official communications with the attendees at the conference.&lt;br /&gt;
* The possibility to distribute the company brochures, CDs or other materials to the participants during the event.&lt;br /&gt;
* Publication of the sponsor logo on the OWASP New Zealand Chapter page	- Sponsor logo on the OWASP NZ site prior and during the OWASP Day event - https://www.owasp.org/index.php/New_Zealand&lt;br /&gt;
* Publication of the sponsor logo on the event web site - https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2013&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Those who are interested in sponsoring OWASP New Zealand 2013 Conference can contact the [mailto:nick.freeman@owasp.org?cc=adrian.hayes@owasp.org OWASP New Zealand Board].&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]]&lt;/div&gt;</summary>
		<author><name>Adrian Hayes</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_New_Zealand_Day_2013&amp;diff=156659</id>
		<title>OWASP New Zealand Day 2013</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_New_Zealand_Day_2013&amp;diff=156659"/>
				<updated>2013-08-11T23:14:52Z</updated>
		
		<summary type="html">&lt;p&gt;Adrian Hayes: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2013 https://www.owasp.org/images/3/3e/OWASP_NZ_Day_2013_logo.png]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''11th and 12st September 2013 - Auckland'''&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
= Introduction =&lt;br /&gt;
==Introduction==&lt;br /&gt;
We are proud to announce the fifth annual OWASP New Zealand Day conference, to be held at the University of Auckland on Thursday September 12th, 2013. OWASP New Zealand Day is a one-day conference dedicated to application security, with an emphasis on secure development techniques to help Kiwi developers build more secure applications.&lt;br /&gt;
&lt;br /&gt;
Similar to last year:&lt;br /&gt;
&lt;br /&gt;
* We will be offering training on the day before the conference (Wednesday, 11th of September). &lt;br /&gt;
* After lunch on the conference day, we will split to two tracks - one focused on deep technical topics, the other on policy, compliance and risk management. &lt;br /&gt;
&lt;br /&gt;
The fifth OWASP New Zealand Day will be happening thanks to the support provided by the University of Auckland School of Business, which will kindly offer the same conference venue of the last four years. Entry to the event will, as in the past, be free. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For any comments, feedback or observations, please don't hesitate to contact [mailto:nick.freeman@owasp.org?cc=adrian.hayes@owasp.org us].&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Registration==&lt;br /&gt;
&lt;br /&gt;
Registration for the main conference day is now open: [https://registration.owasp.org.nz/ Register Here]&lt;br /&gt;
&lt;br /&gt;
There is no cost for the main conference day and lunch is provided. We do ask that if at any point you realise you cannot make it please cancel your registration to make room for others as spaces are limited.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Training registration will be done seprately and is not yet open. Please join our low volume [http://lists.owasp.org/mailman/listinfo/owasp-newzealand mailing list] to be notified when registration opens.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Important dates==&lt;br /&gt;
&lt;br /&gt;
* CFP &amp;amp; CFT submission deadline:	1st August 2013&lt;br /&gt;
* Conference Registration deadline: 30th August 2013&lt;br /&gt;
* Training Registration deadline: 	30th August 2013&lt;br /&gt;
* Training Day date:				11th September 2013&lt;br /&gt;
* Conference Day date:				12th September 2013&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Conference Venue==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
	&amp;lt;td&amp;gt;&lt;br /&gt;
		The University of Auckland Business School&amp;lt;br&amp;gt;&lt;br /&gt;
		Owen G Glenn Building&amp;lt;br&amp;gt;&lt;br /&gt;
		Room: OGGB 260-073 (OGGB4)&amp;lt;br&amp;gt;&lt;br /&gt;
		Address: 12 Grafton Road&amp;lt;br&amp;gt;&lt;br /&gt;
		Auckland&amp;lt;br&amp;gt;&lt;br /&gt;
		New Zealand&amp;lt;br&amp;gt;&lt;br /&gt;
		[http://maps.google.com/maps?oe=UTF-8&amp;amp;ie=UTF8&amp;amp;q=auckland+business+school&amp;amp;fb=1&amp;amp;split=1&amp;amp;cid=0,0,12303692579639430581&amp;amp;ei=6WeqSZr_OZLFkAWR--zbDQ&amp;amp;ll=-36.852308,174.770916&amp;amp;spn=0.01056,0.020621&amp;amp;z=16&amp;amp;iwloc=A Map]&lt;br /&gt;
	&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;td&amp;gt;&lt;br /&gt;
		[[Image:Auckland_business_school_small2.jpg]] [[Image:Room_hall.jpg]]&lt;br /&gt;
	&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Conference Sponsors==&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;bottom&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;[http://www.auckland.ac.nz/ https://www.owasp.org/images/8/82/University_of_Auckland_crest_small.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;bottom&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;[http://www.security.org.nz/NZISF_NZISForumContent.php https://www.owasp.org/images/5/5a/Nz_information_security_forum.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;ICT and Department of Information Systems and Operations Management&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Conference Committee==&lt;br /&gt;
&lt;br /&gt;
* Nick Freeman - OWASP New Zealand Leader (Auckland)&lt;br /&gt;
* Adrian Hayes -  OWASP New Zealand Leader (Wellington)&lt;br /&gt;
* Lech Janczewski - Associate Professor - University of Auckland School of Business&lt;br /&gt;
&lt;br /&gt;
Please direct all enquiries to nick.freeman@owasp.org and adrian.hayes@owasp.org.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Call For Presentations =&lt;br /&gt;
==Call For Presentations==&lt;br /&gt;
&lt;br /&gt;
OWASP New Zealand Day conferences attract a high quality of speakers from a variety of security disciplines including web developers, system administrators, penetration testers, policy specialists and more. We encourage presentations to have a strong component on fixing and prevention of security issues. We are looking for presentations on a wide variety of security topics, including but not limited to:&lt;br /&gt;
&lt;br /&gt;
* Web application security&lt;br /&gt;
* Mobile security&lt;br /&gt;
* Secure development&lt;br /&gt;
* Vulnerability analysis&lt;br /&gt;
* Threat modelling&lt;br /&gt;
* Threat and vulnerability countermeasures&lt;br /&gt;
* Platform or language security (.NET, Java, RoR, etc)&lt;br /&gt;
* Penetration Testing&lt;br /&gt;
* Browser and client security&lt;br /&gt;
* Application and solution architecture security&lt;br /&gt;
* PCI DSS&lt;br /&gt;
* Risk management&lt;br /&gt;
* Security concepts for C*Os, project managers and other non-technical attendees&lt;br /&gt;
* Privacy controls&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The email subject must be &amp;quot;OWASP New Zealand 2013: CFP&amp;quot; and the email body must contains the following information/sections:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name and Surname&lt;br /&gt;
* Affiliation&lt;br /&gt;
* Telephone number&lt;br /&gt;
* Email address&lt;br /&gt;
* Short presenter bio&lt;br /&gt;
* Title of the contribution&lt;br /&gt;
* Type of contribution: Technical, Informative, Management&lt;br /&gt;
* Short abstract (up to 500 words)&lt;br /&gt;
* List of the author's previous papers/articles/speeches on the same topic&lt;br /&gt;
* If you are not from New Zealand, will your company support your travel/accommodation costs? - Yes/No&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The submission will be reviewed by the OWASP New Zealand Day CFP Review Board and the highest voted talks will be selected and invited for presentation.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
PLEASE NOTE:&lt;br /&gt;
* Due to limited budget available, expenses for international speakers cannot be covered.&lt;br /&gt;
* If your company is willing to cover travel and accommodation costs, the company will become &amp;quot;Support Sponsor&amp;quot; of the event.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Please submit the above information to both Nick Freeman and Adrian Hayes - nick.freeman@owasp.org and adrian.hayes@owasp.org&lt;br /&gt;
&lt;br /&gt;
Submissions deadline: 1st August 2013&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Call For Trainers =&lt;br /&gt;
==Call For Trainers==&lt;br /&gt;
&lt;br /&gt;
We are happy to announce that training will run on Wednesday September 11th 2013, the day before the OWASP Day conference. The training venues will be auditoriums kindly provided by the University of Auckland, in the same building as the OWASP Day conference itself. Classes will contain up to 20 students, and each seat has power for laptop usage. A wide range of half-day or full-day training proposals will be considered, see the Call for Papers for a list of topics example topics&lt;br /&gt;
&lt;br /&gt;
If you are interested in running one of the training sessions, please contact Nick Freeman and Adrian Hayes with the following information:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Trainer name&lt;br /&gt;
* Trainer organisation&lt;br /&gt;
* Telephone + email contact&lt;br /&gt;
* Short Trainer bio&lt;br /&gt;
&lt;br /&gt;
* Training title&lt;br /&gt;
* Trainer requirements (e.g. a projector, whiteboard, etc)&lt;br /&gt;
* Trainee requirements (e.g. laptop, VMWare/Virtualbox, etc)&lt;br /&gt;
* Training summary (less than 500 words)&lt;br /&gt;
* Target audience (e.g. testers, project managers, security managers, web developers)&lt;br /&gt;
* Skill level required (Basic / Intermediate / Advanced)&lt;br /&gt;
* What attendees can expect to learn (key objectives)&lt;br /&gt;
&lt;br /&gt;
* Short course outline&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The fixed price per head for training will be $250 for a half-day session and $500 for a whole-day session. As this training is part of an OWASP event, part of the proceeds go back to OWASP. The split is as follows:&lt;br /&gt;
&lt;br /&gt;
* 25% to OWASP Global - used for OWASP projects around the world&lt;br /&gt;
* 25% to OWASP NZ Day - used for expenses such as catering during the conference&lt;br /&gt;
* 50% to the training provider.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Please submit the above information to both Nick Freeman and Adrian Hayes - nick.freeman@owasp.org and adrian.hayes@owasp.org&lt;br /&gt;
&lt;br /&gt;
* nick.freeman@owasp.org&lt;br /&gt;
* adrian.hayes@owasp.org&lt;br /&gt;
&lt;br /&gt;
Submissions deadline: 1st August 201&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Call For Sponsorships =&lt;br /&gt;
==Call For Sponsorships==&lt;br /&gt;
&lt;br /&gt;
OWASP New Zealand Day 2013 will be held in Auckland on the 12th of September, 2013 and is a security conference entirely dedicated to application security. The conference is once again being hosted by the University of Auckland with their support and assistance. OWASP New Zealand Day 2013 is a free event, but requires sponsor support to help be an instructive and quality event for the New Zealand community. OWASP is strictly non for profit. The sponsorship money will be used to help make OWASP New Zealand Day 2013 a free, compelling, and valuable experience for the audience.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The sponsorship funds collected are to be used for things such as:&lt;br /&gt;
&lt;br /&gt;
* Refreshments (coffee break/lunch) - we want to keep people refreshed during the day; while we certainly bring good and interesting speakers, we don't want people to go home when they become hungry. &lt;br /&gt;
* Name tags - we feel that getting to know people within the New Zealand community is important, and name tags make that possible.&lt;br /&gt;
* Promotion - up to now our events are propagating by word of mouth. We would like to get to a wider audience by advertising our events.&lt;br /&gt;
* Printed Materials - printed materials will include brochures, tags and lanyards.&lt;br /&gt;
&lt;br /&gt;
== Facts ==&lt;br /&gt;
&lt;br /&gt;
Last year, the event was supported by seven sponsors and attracted more than 250 participants. Plenty of constructive (and positive!) feedback from the audience was received and we are using this to make the conference more appealing to more people. For more information on last year's event, please visit: https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2012&lt;br /&gt;
&lt;br /&gt;
The OWASP New Zealand community is strong and there are more than 220 people currently subscribed to the mailing-list. OWASP New Zealand Day is expected to attract between 250 and 300 attendees this year.&lt;br /&gt;
&lt;br /&gt;
OWASP regular attendees are IT project managers, IT security managers, IT security consultants, web application architects and developers, QA managers, QA testers and system administrators.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Sponsorships  ==&lt;br /&gt;
&lt;br /&gt;
There are three different levels of sponsorships for the OWASP Day event:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Support Sponsorship&amp;lt;/b&amp;gt;: (Covering international speaker travel expenses, media coverage/article/promotion of the event)&lt;br /&gt;
	&lt;br /&gt;
Includes:&lt;br /&gt;
&lt;br /&gt;
* Publication of the sponsor logo on the event web site - https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2013&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Silver Sponsorship&amp;lt;/b&amp;gt;: 1500 NZD&lt;br /&gt;
&lt;br /&gt;
Includes: &lt;br /&gt;
&lt;br /&gt;
* Publication of the sponsor logo on the event web site - https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2013&lt;br /&gt;
* The publication of the sponsor logo in the event site, in the agenda, on the handouts and in all the official communications with the attendees at the conference.&lt;br /&gt;
* The possibility to distribute the company brochures, CDs or other materials to the participants during the event.&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Gold Sponsorship&amp;lt;/b&amp;gt;: 2750 NZD&lt;br /&gt;
&lt;br /&gt;
Includes: &lt;br /&gt;
&lt;br /&gt;
* The possibility to have a promotional banner or sign side stage in the main auditorium (to be provided by the sponsor, size subject to approval by the OWASP NZ Day Committee).&lt;br /&gt;
* The publication of the sponsor logo in the event site, in the agenda, on the handouts and in all the official communications with the attendees at the conference.&lt;br /&gt;
* The possibility to distribute the company brochures, CDs or other materials to the participants during the event.&lt;br /&gt;
* Publication of the sponsor logo on the OWASP New Zealand Chapter page	- Sponsor logo on the OWASP NZ site prior and during the OWASP Day event - https://www.owasp.org/index.php/New_Zealand&lt;br /&gt;
* Publication of the sponsor logo on the event web site - https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2013&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Those who are interested in sponsoring OWASP New Zealand 2013 Conference can contact the [mailto:nick.freeman@owasp.org?cc=adrian.hayes@owasp.org OWASP New Zealand Board].&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]]&lt;/div&gt;</summary>
		<author><name>Adrian Hayes</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_New_Zealand_Day_2013&amp;diff=156658</id>
		<title>OWASP New Zealand Day 2013</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_New_Zealand_Day_2013&amp;diff=156658"/>
				<updated>2013-08-11T23:08:54Z</updated>
		
		<summary type="html">&lt;p&gt;Adrian Hayes: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2013 https://www.owasp.org/images/3/3e/OWASP_NZ_Day_2013_logo.png]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''11th and 12st September 2013 - Auckland'''&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
= Introduction =&lt;br /&gt;
==Introduction==&lt;br /&gt;
We are proud to announce the fifth annual OWASP New Zealand Day conference, to be held at the University of Auckland on Thursday September 12th, 2013. OWASP New Zealand Day is a one-day conference dedicated to application security, with an emphasis on secure development techniques to help Kiwi developers build more secure applications.&lt;br /&gt;
&lt;br /&gt;
Similar to last year:&lt;br /&gt;
&lt;br /&gt;
* We will be offering training on the day before the conference (Wednesday, 11th of September). &lt;br /&gt;
* After lunch on the conference day, we will split to two tracks - one focused on deep technical topics, the other on policy, compliance and risk management. &lt;br /&gt;
&lt;br /&gt;
The fifth OWASP New Zealand Day will be happening thanks to the support provided by the University of Auckland School of Business, which will kindly offer the same conference venue of the last four years. Entry to the event will, as in the past, be free. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For any comments, feedback or observations, please don't hesitate to contact [mailto:nick.freeman@owasp.org?cc=adrian.hayes@owasp.org us].&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Registration==&lt;br /&gt;
&lt;br /&gt;
Registration is not yet open. Please join our low volume [http://lists.owasp.org/mailman/listinfo/owasp-newzealand mailing list] to be notified when registration opens.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Important dates==&lt;br /&gt;
&lt;br /&gt;
* CFP &amp;amp; CFT submission deadline:	1st August 2013&lt;br /&gt;
* Conference Registration deadline: 30th August 2013&lt;br /&gt;
* Training Registration deadline: 	30th August 2013&lt;br /&gt;
* Training Day date:				11th September 2013&lt;br /&gt;
* Conference Day date:				12th September 2013&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Conference Venue==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
	&amp;lt;td&amp;gt;&lt;br /&gt;
		The University of Auckland Business School&amp;lt;br&amp;gt;&lt;br /&gt;
		Owen G Glenn Building&amp;lt;br&amp;gt;&lt;br /&gt;
		Room: OGGB 260-073 (OGGB4)&amp;lt;br&amp;gt;&lt;br /&gt;
		Address: 12 Grafton Road&amp;lt;br&amp;gt;&lt;br /&gt;
		Auckland&amp;lt;br&amp;gt;&lt;br /&gt;
		New Zealand&amp;lt;br&amp;gt;&lt;br /&gt;
		[http://maps.google.com/maps?oe=UTF-8&amp;amp;ie=UTF8&amp;amp;q=auckland+business+school&amp;amp;fb=1&amp;amp;split=1&amp;amp;cid=0,0,12303692579639430581&amp;amp;ei=6WeqSZr_OZLFkAWR--zbDQ&amp;amp;ll=-36.852308,174.770916&amp;amp;spn=0.01056,0.020621&amp;amp;z=16&amp;amp;iwloc=A Map]&lt;br /&gt;
	&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;td&amp;gt;&lt;br /&gt;
		[[Image:Auckland_business_school_small2.jpg]] [[Image:Room_hall.jpg]]&lt;br /&gt;
	&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Conference Sponsors==&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;bottom&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;[http://www.auckland.ac.nz/ https://www.owasp.org/images/8/82/University_of_Auckland_crest_small.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;bottom&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;[http://www.security.org.nz/NZISF_NZISForumContent.php https://www.owasp.org/images/5/5a/Nz_information_security_forum.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;ICT and Department of Information Systems and Operations Management&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Conference Committee==&lt;br /&gt;
&lt;br /&gt;
* Nick Freeman - OWASP New Zealand Leader (Auckland)&lt;br /&gt;
* Adrian Hayes -  OWASP New Zealand Leader (Wellington)&lt;br /&gt;
* Lech Janczewski - Associate Professor - University of Auckland School of Business&lt;br /&gt;
&lt;br /&gt;
Please direct all enquiries to nick.freeman@owasp.org and adrian.hayes@owasp.org.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Call For Presentations =&lt;br /&gt;
==Call For Presentations==&lt;br /&gt;
&lt;br /&gt;
OWASP New Zealand Day conferences attract a high quality of speakers from a variety of security disciplines including web developers, system administrators, penetration testers, policy specialists and more. We encourage presentations to have a strong component on fixing and prevention of security issues. We are looking for presentations on a wide variety of security topics, including but not limited to:&lt;br /&gt;
&lt;br /&gt;
* Web application security&lt;br /&gt;
* Mobile security&lt;br /&gt;
* Secure development&lt;br /&gt;
* Vulnerability analysis&lt;br /&gt;
* Threat modelling&lt;br /&gt;
* Threat and vulnerability countermeasures&lt;br /&gt;
* Platform or language security (.NET, Java, RoR, etc)&lt;br /&gt;
* Penetration Testing&lt;br /&gt;
* Browser and client security&lt;br /&gt;
* Application and solution architecture security&lt;br /&gt;
* PCI DSS&lt;br /&gt;
* Risk management&lt;br /&gt;
* Security concepts for C*Os, project managers and other non-technical attendees&lt;br /&gt;
* Privacy controls&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The email subject must be &amp;quot;OWASP New Zealand 2013: CFP&amp;quot; and the email body must contains the following information/sections:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name and Surname&lt;br /&gt;
* Affiliation&lt;br /&gt;
* Telephone number&lt;br /&gt;
* Email address&lt;br /&gt;
* Short presenter bio&lt;br /&gt;
* Title of the contribution&lt;br /&gt;
* Type of contribution: Technical, Informative, Management&lt;br /&gt;
* Short abstract (up to 500 words)&lt;br /&gt;
* List of the author's previous papers/articles/speeches on the same topic&lt;br /&gt;
* If you are not from New Zealand, will your company support your travel/accommodation costs? - Yes/No&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The submission will be reviewed by the OWASP New Zealand Day CFP Review Board and the highest voted talks will be selected and invited for presentation.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
PLEASE NOTE:&lt;br /&gt;
* Due to limited budget available, expenses for international speakers cannot be covered.&lt;br /&gt;
* If your company is willing to cover travel and accommodation costs, the company will become &amp;quot;Support Sponsor&amp;quot; of the event.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Please submit the above information to both Nick Freeman and Adrian Hayes - nick.freeman@owasp.org and adrian.hayes@owasp.org&lt;br /&gt;
&lt;br /&gt;
Submissions deadline: 1st August 2013&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Call For Trainers =&lt;br /&gt;
==Call For Trainers==&lt;br /&gt;
&lt;br /&gt;
We are happy to announce that training will run on Wednesday September 11th 2013, the day before the OWASP Day conference. The training venues will be auditoriums kindly provided by the University of Auckland, in the same building as the OWASP Day conference itself. Classes will contain up to 20 students, and each seat has power for laptop usage. A wide range of half-day or full-day training proposals will be considered, see the Call for Papers for a list of topics example topics&lt;br /&gt;
&lt;br /&gt;
If you are interested in running one of the training sessions, please contact Nick Freeman and Adrian Hayes with the following information:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Trainer name&lt;br /&gt;
* Trainer organisation&lt;br /&gt;
* Telephone + email contact&lt;br /&gt;
* Short Trainer bio&lt;br /&gt;
&lt;br /&gt;
* Training title&lt;br /&gt;
* Trainer requirements (e.g. a projector, whiteboard, etc)&lt;br /&gt;
* Trainee requirements (e.g. laptop, VMWare/Virtualbox, etc)&lt;br /&gt;
* Training summary (less than 500 words)&lt;br /&gt;
* Target audience (e.g. testers, project managers, security managers, web developers)&lt;br /&gt;
* Skill level required (Basic / Intermediate / Advanced)&lt;br /&gt;
* What attendees can expect to learn (key objectives)&lt;br /&gt;
&lt;br /&gt;
* Short course outline&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The fixed price per head for training will be $250 for a half-day session and $500 for a whole-day session. As this training is part of an OWASP event, part of the proceeds go back to OWASP. The split is as follows:&lt;br /&gt;
&lt;br /&gt;
* 25% to OWASP Global - used for OWASP projects around the world&lt;br /&gt;
* 25% to OWASP NZ Day - used for expenses such as catering during the conference&lt;br /&gt;
* 50% to the training provider.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Please submit the above information to both Nick Freeman and Adrian Hayes - nick.freeman@owasp.org and adrian.hayes@owasp.org&lt;br /&gt;
&lt;br /&gt;
* nick.freeman@owasp.org&lt;br /&gt;
* adrian.hayes@owasp.org&lt;br /&gt;
&lt;br /&gt;
Submissions deadline: 1st August 201&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Call For Sponsorships =&lt;br /&gt;
==Call For Sponsorships==&lt;br /&gt;
&lt;br /&gt;
OWASP New Zealand Day 2013 will be held in Auckland on the 12th of September, 2013 and is a security conference entirely dedicated to application security. The conference is once again being hosted by the University of Auckland with their support and assistance. OWASP New Zealand Day 2013 is a free event, but requires sponsor support to help be an instructive and quality event for the New Zealand community. OWASP is strictly non for profit. The sponsorship money will be used to help make OWASP New Zealand Day 2013 a free, compelling, and valuable experience for the audience.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The sponsorship funds collected are to be used for things such as:&lt;br /&gt;
&lt;br /&gt;
* Refreshments (coffee break/lunch) - we want to keep people refreshed during the day; while we certainly bring good and interesting speakers, we don't want people to go home when they become hungry. &lt;br /&gt;
* Name tags - we feel that getting to know people within the New Zealand community is important, and name tags make that possible.&lt;br /&gt;
* Promotion - up to now our events are propagating by word of mouth. We would like to get to a wider audience by advertising our events.&lt;br /&gt;
* Printed Materials - printed materials will include brochures, tags and lanyards.&lt;br /&gt;
&lt;br /&gt;
== Facts ==&lt;br /&gt;
&lt;br /&gt;
Last year, the event was supported by seven sponsors and attracted more than 250 participants. Plenty of constructive (and positive!) feedback from the audience was received and we are using this to make the conference more appealing to more people. For more information on last year's event, please visit: https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2012&lt;br /&gt;
&lt;br /&gt;
The OWASP New Zealand community is strong and there are more than 220 people currently subscribed to the mailing-list. OWASP New Zealand Day is expected to attract between 250 and 300 attendees this year.&lt;br /&gt;
&lt;br /&gt;
OWASP regular attendees are IT project managers, IT security managers, IT security consultants, web application architects and developers, QA managers, QA testers and system administrators.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Sponsorships  ==&lt;br /&gt;
&lt;br /&gt;
There are three different levels of sponsorships for the OWASP Day event:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Support Sponsorship&amp;lt;/b&amp;gt;: (Covering international speaker travel expenses, media coverage/article/promotion of the event)&lt;br /&gt;
	&lt;br /&gt;
Includes:&lt;br /&gt;
&lt;br /&gt;
* Publication of the sponsor logo on the event web site - https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2013&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Silver Sponsorship&amp;lt;/b&amp;gt;: 1500 NZD&lt;br /&gt;
&lt;br /&gt;
Includes: &lt;br /&gt;
&lt;br /&gt;
* Publication of the sponsor logo on the event web site - https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2013&lt;br /&gt;
* The publication of the sponsor logo in the event site, in the agenda, on the handouts and in all the official communications with the attendees at the conference.&lt;br /&gt;
* The possibility to distribute the company brochures, CDs or other materials to the participants during the event.&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Gold Sponsorship&amp;lt;/b&amp;gt;: 2750 NZD&lt;br /&gt;
&lt;br /&gt;
Includes: &lt;br /&gt;
&lt;br /&gt;
* The possibility to have a promotional banner or sign side stage in the main auditorium (to be provided by the sponsor, size subject to approval by the OWASP NZ Day Committee).&lt;br /&gt;
* The publication of the sponsor logo in the event site, in the agenda, on the handouts and in all the official communications with the attendees at the conference.&lt;br /&gt;
* The possibility to distribute the company brochures, CDs or other materials to the participants during the event.&lt;br /&gt;
* Publication of the sponsor logo on the OWASP New Zealand Chapter page	- Sponsor logo on the OWASP NZ site prior and during the OWASP Day event - https://www.owasp.org/index.php/New_Zealand&lt;br /&gt;
* Publication of the sponsor logo on the event web site - https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2013&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Those who are interested in sponsoring OWASP New Zealand 2013 Conference can contact the [mailto:nick.freeman@owasp.org?cc=adrian.hayes@owasp.org OWASP New Zealand Board].&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]]&lt;/div&gt;</summary>
		<author><name>Adrian Hayes</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=New_Zealand&amp;diff=156580</id>
		<title>New Zealand</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=New_Zealand&amp;diff=156580"/>
				<updated>2013-08-08T23:38:24Z</updated>
		
		<summary type="html">&lt;p&gt;Adrian Hayes: Added OWASP NZ Day 2013 and removed some old events.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=New_Zealand|extra=The chapter leaders are [mailto:nick.freeman@owasp.org Nick Freeman] and [mailto:adrian.hayes@owasp.org Adrian Hayes] |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-newzealand|emailarchives=http://lists.owasp.org/pipermail/owasp-newzealand}}&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
== Upcoming Event  ==&lt;br /&gt;
&lt;br /&gt;
;11th and 12th of September 2013&lt;br /&gt;
&lt;br /&gt;
[[File:OWASP_NZ_Day_2013_logo.png|400px|link=https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2013|11th and 12st September 2013 - Auckland Business School&lt;br /&gt;
]]&lt;br /&gt;
&lt;br /&gt;
At the Auckland Business School&lt;br /&gt;
&lt;br /&gt;
[[OWASP New Zealand Day 2013|https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2013]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''2013''' ==&lt;br /&gt;
&lt;br /&gt;
; 22 May 2013&lt;br /&gt;
[http://www.meetup.com/OWASP-New-Zealand-Chapter/events/115108982/ OWASP Meetup page to RSVP]&lt;br /&gt;
: '''Co-Sponsor:''' [http://security-assessment.com Security-Assessment.com] and [http://www.touchpoint.co.nz Touchpoint]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland, Webcast&lt;br /&gt;
: '''Details:''' All details are on the meetup page above&lt;br /&gt;
&lt;br /&gt;
== '''2012''' ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; 31st August 2012&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2012 OWASP New Zealand Day 2012]&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.auckland.ac.nz/ The University of Auckland], [http://www.security-assessment.com Security-Assessment.com], [http://www.aurainfosec.com Aura Information Security], [http://www.insomniasec.com Insomnia Security], [http://www.lateralsecurity.com Lateral Security], [http://www.webdrive.co.nz Web Drive]&lt;br /&gt;
: '''Location:''' Auckland &lt;br /&gt;
: '''Event site:''' [[OWASP_New_Zealand_Day_2012|OWASP New Zealand Day 2012]]&lt;br /&gt;
&lt;br /&gt;
; 8th May 2012&lt;br /&gt;
: '''Co-Sponsor:''' [http://security-assessment.com Security-Assessment.com] and [http://www.touchpoint.co.nz Touchpoint]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' [https://www.owasp.org/images/e/e0/Owasp2012-MarkPiper.pdf An Overview and introduction to modern day BeEF]&lt;br /&gt;
: '''Presented By:''' Mark Piper, Insomnia Security&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; 28th February 2012&lt;br /&gt;
: '''Co-Sponsor:''' [http://security-assessment.com Security-Assessment.com] and [http://www.touchpoint.co.nz Touchpoint]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' [https://www.owasp.org/images/2/27/OWASP_Top_10-7_to_10-aj.pdf Introduction to the OWASP Top Ten - Part 3]&lt;br /&gt;
: '''Presented By:''' Adrian Hayes, Security Consultant (Security-Assessment.com)&lt;br /&gt;
: '''Presentation:''' [https://www.owasp.org/images/0/08/OWASP-Mistaken_Identity-Password_Reset-nickf.pdf Mistaken Identity: How Not To Build A Password Reset Process]&lt;br /&gt;
: '''Presented By:''' Nick Freeman, Senior Security Consultant (Security-Assessment.com)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP NZ Members == &lt;br /&gt;
&lt;br /&gt;
We are always looking for additional board members to evangelise the OWASP mission help with meetings, projects and initiatives as we all know it takes time/effort to run a chapter. Please contact us if you are interested to join the NZ OWASP board member or for any queries related to OWASP NZ.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;NZ Board Member (Leader - Auckland)&amp;lt;/b&amp;gt; [mailto:nick.freeman(at)owasp.org Nick Freeman] 021 424 777&lt;br /&gt;
*&amp;lt;b&amp;gt;NZ Board Member (Leader - Wellington)&amp;lt;/b&amp;gt; [mailto:adrian.hayes(at)owasp.org Adrian Hayes]  0274 429 632&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;u&amp;gt;The chapter mailing address is:&amp;lt;/u&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Security-Assessment.com &amp;lt;br&amp;gt;&lt;br /&gt;
Level 1 - Building 2&amp;lt;br&amp;gt;&lt;br /&gt;
12-16 Nicholls Lane, Parnell, Auckland 1010&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Chapter Sponsors ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com https://www.owasp.org/images/a/a4/Security-assessment_com.jpeg]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com www.security-assessment.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.touchpoint.co.nz https://www.owasp.org/images/d/d8/Touchpoint.jpg]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.touchpoint.co.nz www.touchpoint.co.nz]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;/div&gt;</summary>
		<author><name>Adrian Hayes</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_New_Zealand_Day_2013&amp;diff=154749</id>
		<title>OWASP New Zealand Day 2013</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_New_Zealand_Day_2013&amp;diff=154749"/>
				<updated>2013-07-01T05:11:02Z</updated>
		
		<summary type="html">&lt;p&gt;Adrian Hayes: Created page with &amp;quot;__NOTOC__ &amp;lt;center&amp;gt; [https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2013 https://www.owasp.org/images/3/3e/OWASP_NZ_Day_2013_logo.png]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; '''11th and 12st September...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2013 https://www.owasp.org/images/3/3e/OWASP_NZ_Day_2013_logo.png]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''11th and 12st September 2013 - Auckland'''&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
= Introduction =&lt;br /&gt;
==Introduction==&lt;br /&gt;
We are proud to announce the fifth annual OWASP New Zealand Day conference, to be held at the University of Auckland on Thursday September 12th, 2013. OWASP New Zealand Day is a one-day conference dedicated to application security, with an emphasis on secure development techniques to help Kiwi developers build more secure applications.&lt;br /&gt;
&lt;br /&gt;
Similar to last year:&lt;br /&gt;
&lt;br /&gt;
* We will be offering training on the day before the conference (Thursday August 30th) rather than at the same time as the conference. &lt;br /&gt;
* After lunch on the conference day, we will split to two tracks - one focused on deep technical topics, the other on policy, compliance and risk management. &lt;br /&gt;
&lt;br /&gt;
The fifth OWASP New Zealand Day will be happening thanks to the support provided by the University of Auckland School of Business, which will kindly offer the same conference venue of the last four years. Entry to the event will, as in the past, be free. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For any comments, feedback or observations, please don't hesitate to contact [mailto:nick.freeman@owasp.org?cc=adrian.hayes@owasp.org us].&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Registration==&lt;br /&gt;
&lt;br /&gt;
Registration is not yet open. Please join our low volume [http://lists.owasp.org/mailman/listinfo/owasp-newzealand mailing list] to be notified when registration opens.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Important dates==&lt;br /&gt;
&lt;br /&gt;
* CFP &amp;amp; CFT submission deadline:	1st August 2013&lt;br /&gt;
* Conference Registration deadline: 30th August 2013&lt;br /&gt;
* Training Registration deadline: 	30th August 2013&lt;br /&gt;
* Training Day date:				11th September 2013&lt;br /&gt;
* Conference Day date:				12th September 2013&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Conference Venue==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
	&amp;lt;td&amp;gt;&lt;br /&gt;
		The University of Auckland Business School&amp;lt;br&amp;gt;&lt;br /&gt;
		Owen G Glenn Building&amp;lt;br&amp;gt;&lt;br /&gt;
		Room: OGGB 260-073 (OGGB4)&amp;lt;br&amp;gt;&lt;br /&gt;
		Address: 12 Grafton Road&amp;lt;br&amp;gt;&lt;br /&gt;
		Auckland&amp;lt;br&amp;gt;&lt;br /&gt;
		New Zealand&amp;lt;br&amp;gt;&lt;br /&gt;
		[http://maps.google.com/maps?oe=UTF-8&amp;amp;ie=UTF8&amp;amp;q=auckland+business+school&amp;amp;fb=1&amp;amp;split=1&amp;amp;cid=0,0,12303692579639430581&amp;amp;ei=6WeqSZr_OZLFkAWR--zbDQ&amp;amp;ll=-36.852308,174.770916&amp;amp;spn=0.01056,0.020621&amp;amp;z=16&amp;amp;iwloc=A Map]&lt;br /&gt;
	&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;td&amp;gt;&lt;br /&gt;
		[[Image:Auckland_business_school_small2.jpg]] [[Image:Room_hall.jpg]]&lt;br /&gt;
	&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Conference Sponsors==&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;bottom&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;[http://www.auckland.ac.nz/ https://www.owasp.org/images/8/82/University_of_Auckland_crest_small.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;bottom&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;[http://www.security.org.nz/NZISF_NZISForumContent.php https://www.owasp.org/images/5/5a/Nz_information_security_forum.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;ICT and Department of Information Systems and Operations Management&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Conference Committee==&lt;br /&gt;
&lt;br /&gt;
* Nick Freeman - OWASP New Zealand Leader (Auckland)&lt;br /&gt;
* Adrian Hayes -  OWASP New Zealand Leader (Wellington)&lt;br /&gt;
* Lech Janczewski - Associate Professor - University of Auckland School of Business&lt;br /&gt;
&lt;br /&gt;
Please direct all enquiries to nick.freeman@owasp.org and adrian.hayes@owasp.org.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Call For Presentations =&lt;br /&gt;
==Call For Presentations==&lt;br /&gt;
&lt;br /&gt;
OWASP New Zealand Day conferences attract a high quality of speakers from a variety of security disciplines including web developers, system administrators, penetration testers, policy specialists and more. We encourage presentations to have a strong component on fixing and prevention of security issues. We are looking for presentations on a wide variety of security topics, including but not limited to:&lt;br /&gt;
&lt;br /&gt;
* Web application security&lt;br /&gt;
* Mobile security&lt;br /&gt;
* Secure development&lt;br /&gt;
* Vulnerability analysis&lt;br /&gt;
* Threat modelling&lt;br /&gt;
* Threat and vulnerability countermeasures&lt;br /&gt;
* Platform or language security (.NET, Java, RoR, etc)&lt;br /&gt;
* Penetration Testing&lt;br /&gt;
* Browser and client security&lt;br /&gt;
* Application and solution architecture security&lt;br /&gt;
* PCI DSS&lt;br /&gt;
* Risk management&lt;br /&gt;
* Security concepts for C*Os, project managers and other non-technical attendees&lt;br /&gt;
* Privacy controls&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The email subject must be &amp;quot;OWASP New Zealand 2013: CFP&amp;quot; and the email body must contains the following information/sections:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name and Surname&lt;br /&gt;
* Affiliation&lt;br /&gt;
* Telephone number&lt;br /&gt;
* Email address&lt;br /&gt;
* Short presenter bio&lt;br /&gt;
* Title of the contribution&lt;br /&gt;
* Type of contribution: Technical, Informative, Management&lt;br /&gt;
* Short abstract (up to 500 words)&lt;br /&gt;
* List of the author's previous papers/articles/speeches on the same topic&lt;br /&gt;
* If you are not from New Zealand, will your company support your travel/accommodation costs? - Yes/No&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The submission will be reviewed by the OWASP New Zealand Day CFP Review Board and the highest voted talks will be selected and invited for presentation.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
PLEASE NOTE:&lt;br /&gt;
* Due to limited budget available, expenses for international speakers cannot be covered.&lt;br /&gt;
* If your company is willing to cover travel and accommodation costs, the company will become &amp;quot;Support Sponsor&amp;quot; of the event.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Please submit the above information to both Nick Freeman and Adrian Hayes - nick.freeman@owasp.org and adrian.hayes@owasp.org&lt;br /&gt;
&lt;br /&gt;
Submissions deadline: 1st August 2013&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Call For Trainers =&lt;br /&gt;
==Call For Trainers==&lt;br /&gt;
&lt;br /&gt;
We are happy to announce that training will run on Wednesday September 11th 2013, the day before the OWASP Day conference. The training venues will be auditoriums kindly provided by the University of Auckland, in the same building as the OWASP Day conference itself. Classes will contain up to 20 students, and each seat has power for laptop usage. A wide range of half-day or full-day training proposals will be considered, see the Call for Papers for a list of topics example topics&lt;br /&gt;
&lt;br /&gt;
If you are interested in running one of the training sessions, please contact Nick Freeman and Adrian Hayes with the following information:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Trainer name&lt;br /&gt;
* Trainer organisation&lt;br /&gt;
* Telephone + email contact&lt;br /&gt;
* Short Trainer bio&lt;br /&gt;
&lt;br /&gt;
* Training title&lt;br /&gt;
* Trainer requirements (e.g. a projector, whiteboard, etc)&lt;br /&gt;
* Trainee requirements (e.g. laptop, VMWare/Virtualbox, etc)&lt;br /&gt;
* Training summary (less than 500 words)&lt;br /&gt;
* Target audience (e.g. testers, project managers, security managers, web developers)&lt;br /&gt;
* Skill level required (Basic / Intermediate / Advanced)&lt;br /&gt;
* What attendees can expect to learn (key objectives)&lt;br /&gt;
&lt;br /&gt;
* Short course outline&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The fixed price per head for training will be $250 for a half-day session and $500 for a whole-day session. As this training is part of an OWASP event, part of the proceeds go back to OWASP. The split is as follows:&lt;br /&gt;
&lt;br /&gt;
* 25% to OWASP Global - used for OWASP projects around the world&lt;br /&gt;
* 25% to OWASP NZ Day - used for expenses such as catering during the conference&lt;br /&gt;
* 50% to the training provider.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Please submit the above information to both Nick Freeman and Adrian Hayes - nick.freeman@owasp.org and adrian.hayes@owasp.org&lt;br /&gt;
&lt;br /&gt;
* nick.freeman@owasp.org&lt;br /&gt;
* adrian.hayes@owasp.org&lt;br /&gt;
&lt;br /&gt;
Submissions deadline: 1st August 201&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Call For Sponsorships =&lt;br /&gt;
==Call For Sponsorships==&lt;br /&gt;
&lt;br /&gt;
OWASP New Zealand Day 2013 will be held in Auckland on the 12th of September, 2013 and is a security conference entirely dedicated to application security. The conference is once again being hosted by the University of Auckland with their support and assistance. OWASP New Zealand Day 2013 is a free event, but requires sponsor support to help be an instructive and quality event for the New Zealand community. OWASP is strictly non for profit. The sponsorship money will be used to help make OWASP New Zealand Day 2013 a free, compelling, and valuable experience for the audience.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The sponsorship funds collected are to be used for things such as:&lt;br /&gt;
&lt;br /&gt;
* Refreshments (coffee break/lunch) - we want to keep people refreshed during the day; while we certainly bring good and interesting speakers, we don't want people to go home when they become hungry. &lt;br /&gt;
* Name tags - we feel that getting to know people within the New Zealand community is important, and name tags make that possible.&lt;br /&gt;
* Promotion - up to now our events are propagating by word of mouth. We would like to get to a wider audience by advertising our events.&lt;br /&gt;
* Printed Materials - printed materials will include brochures, tags and lanyards.&lt;br /&gt;
&lt;br /&gt;
== Facts ==&lt;br /&gt;
&lt;br /&gt;
Last year, the event was supported by seven sponsors and attracted more than 250 participants. Plenty of constructive (and positive!) feedback from the audience was received and we are using this to make the conference more appealing to more people. For more information on last year's event, please visit: https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2012&lt;br /&gt;
&lt;br /&gt;
The OWASP New Zealand community is strong and there are more than 220 people currently subscribed to the mailing-list. OWASP New Zealand Day is expected to attract between 250 and 300 attendees this year.&lt;br /&gt;
&lt;br /&gt;
OWASP regular attendees are IT project managers, IT security managers, IT security consultants, web application architects and developers, QA managers, QA testers and system administrators.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Sponsorships  ==&lt;br /&gt;
&lt;br /&gt;
There are three different levels of sponsorships for the OWASP Day event:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Support Sponsorship&amp;lt;/b&amp;gt;: (Covering international speaker travel expenses, media coverage/article/promotion of the event)&lt;br /&gt;
	&lt;br /&gt;
Includes:&lt;br /&gt;
&lt;br /&gt;
* Publication of the sponsor logo on the event web site - https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2013&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Silver Sponsorship&amp;lt;/b&amp;gt;: 1500 NZD&lt;br /&gt;
&lt;br /&gt;
Includes: &lt;br /&gt;
&lt;br /&gt;
* Publication of the sponsor logo on the event web site - https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2013&lt;br /&gt;
* The publication of the sponsor logo in the event site, in the agenda, on the handouts and in all the official communications with the attendees at the conference.&lt;br /&gt;
* The possibility to distribute the company brochures, CDs or other materials to the participants during the event.&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Gold Sponsorship&amp;lt;/b&amp;gt;: 2750 NZD&lt;br /&gt;
&lt;br /&gt;
Includes: &lt;br /&gt;
&lt;br /&gt;
* The possibility to have a promotional banner or sign side stage in the main auditorium (to be provided by the sponsor, size subject to approval by the OWASP NZ Day Committee).&lt;br /&gt;
* The publication of the sponsor logo in the event site, in the agenda, on the handouts and in all the official communications with the attendees at the conference.&lt;br /&gt;
* The possibility to distribute the company brochures, CDs or other materials to the participants during the event.&lt;br /&gt;
* Publication of the sponsor logo on the OWASP New Zealand Chapter page	- Sponsor logo on the OWASP NZ site prior and during the OWASP Day event - https://www.owasp.org/index.php/New_Zealand&lt;br /&gt;
* Publication of the sponsor logo on the event web site - https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2013&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Those who are interested in sponsoring OWASP New Zealand 2013 Conference can contact the [mailto:nick.freeman@owasp.org?cc=adrian.hayes@owasp.org OWASP New Zealand Board].&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]]&lt;/div&gt;</summary>
		<author><name>Adrian Hayes</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:OWASP_NZ_Day_2013_logo.png&amp;diff=154748</id>
		<title>File:OWASP NZ Day 2013 logo.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:OWASP_NZ_Day_2013_logo.png&amp;diff=154748"/>
				<updated>2013-07-01T05:09:15Z</updated>
		
		<summary type="html">&lt;p&gt;Adrian Hayes: uploaded a new version of &amp;amp;quot;File:OWASP NZ Day 2013 logo.png&amp;amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Adrian Hayes</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:OWASP_NZ_Day_2013_logo.png&amp;diff=154747</id>
		<title>File:OWASP NZ Day 2013 logo.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:OWASP_NZ_Day_2013_logo.png&amp;diff=154747"/>
				<updated>2013-07-01T05:06:22Z</updated>
		
		<summary type="html">&lt;p&gt;Adrian Hayes: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Adrian Hayes</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=New_Zealand&amp;diff=151953</id>
		<title>New Zealand</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=New_Zealand&amp;diff=151953"/>
				<updated>2013-05-21T04:03:15Z</updated>
		
		<summary type="html">&lt;p&gt;Adrian Hayes: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=New_Zealand|extra=The chapter leaders are [mailto:nick.freeman@owasp.org Nick Freeman] and [mailto:adrian.hayes@owasp.org Adrian Hayes] |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-newzealand|emailarchives=http://lists.owasp.org/pipermail/owasp-newzealand}}&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
== Upcoming Event  ==&lt;br /&gt;
&lt;br /&gt;
== '''2013''' ==&lt;br /&gt;
&lt;br /&gt;
; 22 May 2013&lt;br /&gt;
[http://www.meetup.com/OWASP-New-Zealand-Chapter/events/115108982/ OWASP Meetup page to RSVP]&lt;br /&gt;
: '''Co-Sponsor:''' [http://security-assessment.com Security-Assessment.com] and [http://www.touchpoint.co.nz Touchpoint]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland, Webcast&lt;br /&gt;
: '''Details:''' All details are on the meetup page above&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
&lt;br /&gt;
== '''2012''' ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; 31st August 2012&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2012 https://www.owasp.org/images/a/ad/Owaspnz2012logo.png]&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.auckland.ac.nz/ The University of Auckland], [http://www.security-assessment.com Security-Assessment.com], [http://www.aurainfosec.com Aura Information Security], [http://www.insomniasec.com Insomnia Security], [http://www.lateralsecurity.com Lateral Security], [http://www.webdrive.co.nz Web Drive]&lt;br /&gt;
: '''Location:''' Auckland &lt;br /&gt;
: '''Event site:''' [[OWASP_New_Zealand_Day_2012|OWASP New Zealand Day 2012]]&lt;br /&gt;
&lt;br /&gt;
; 8th May 2012&lt;br /&gt;
: '''Co-Sponsor:''' [http://security-assessment.com Security-Assessment.com] and [http://www.touchpoint.co.nz Touchpoint]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' [https://www.owasp.org/images/e/e0/Owasp2012-MarkPiper.pdf An Overview and introduction to modern day BeEF]&lt;br /&gt;
: '''Presented By:''' Mark Piper, Insomnia Security&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; 28th February 2012&lt;br /&gt;
: '''Co-Sponsor:''' [http://security-assessment.com Security-Assessment.com] and [http://www.touchpoint.co.nz Touchpoint]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' [https://www.owasp.org/images/2/27/OWASP_Top_10-7_to_10-aj.pdf Introduction to the OWASP Top Ten - Part 3]&lt;br /&gt;
: '''Presented By:''' Adrian Hayes, Security Consultant (Security-Assessment.com)&lt;br /&gt;
: '''Presentation:''' [https://www.owasp.org/images/0/08/OWASP-Mistaken_Identity-Password_Reset-nickf.pdf Mistaken Identity: How Not To Build A Password Reset Process]&lt;br /&gt;
: '''Presented By:''' Nick Freeman, Senior Security Consultant (Security-Assessment.com)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''2011''' ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- 2011 --&amp;gt;&lt;br /&gt;
; 6th December 2011&lt;br /&gt;
: '''Co-Sponsor:''' [http://security-assessment.com Security-Assessment.com] and [http://www.touchpoint.co.nz Touchpoint]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' [https://www.owasp.org/images/6/6d/OWASP_NZ-DEC2011-OWASP_Top_10-4_to_6.pdf Introduction to the OWASP Top Ten - Part 2]&lt;br /&gt;
: '''Presented By:''' Adrian Hayes, Security Consultant (Security-Assessment.com)&lt;br /&gt;
: '''Presentation:''' [https://www.owasp.org/images/1/15/OWASP_NZ-DEC2011-Hardened_Hosting.pdf Hardened Hosting]&lt;br /&gt;
: '''Presented By:''' Quintin Russ, Technical Director (SiteHost)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; 20th September 2011&lt;br /&gt;
: '''Co-Sponsor:''' [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' [https://www.owasp.org/images/c/cf/OWASP_NZ_SEP2011_TOP-10_1-of-3.pdf Introduction to the OWASP Top Ten - Part 1]&lt;br /&gt;
: '''Presented By:''' Nick Freeman, Security Consultant (Security-Assessment.com)&lt;br /&gt;
: '''Presentation:''' [https://www.owasp.org/images/3/31/OWASP_NZ_SEP2011_Clickjacking-for-shells_PDF-version.pdf Clickjacking for Shells]&lt;br /&gt;
: '''Presented By:''' Andrew Horton, Security Consultant (Security-Assessment.com)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; 7th July 2011&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2011 https://www.owasp.org/images/0/05/OWASP_NZ_Day_2011_Logo.png]&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.security-assessment.com Security-Assessment.com], [http://www.auckland.ac.nz/ The University of Auckland]&lt;br /&gt;
: '''Location:''' Auckland&lt;br /&gt;
: '''Presentations:''' [http://www.owasp.org/index.php/OWASP_New_Zealand_Day_2011#tab=Speakers Download] &lt;br /&gt;
: '''Event site:''' [[OWASP_New_Zealand_Day_2011|OWASP New Zealand Day 2011]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; 2nd March 2011&lt;br /&gt;
: '''Co-Sponsor:''' [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' Crazy Insecure Web Apps Google Didn't Tell You About..&lt;br /&gt;
: '''Presented By:''' Adrian Hayes, Security Consultant (Security-Assessment.com)&lt;br /&gt;
: '''Presentation:''' [http://www.owasp.org/images/5/5e/2011-03-02-OWASP.pdf I know what you did last summer: The latest from the world of web hacks]&lt;br /&gt;
: '''Presented By:''' Kirk Jackson, Security Consultant (Aura Software Security)&lt;br /&gt;
&lt;br /&gt;
== '''2010''' ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- 2010 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
; 15th July 2010&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2010 http://www.owasp.org/images/a/a7/Owasp_nz_day_2010.jpg]&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.security-assessment.com Security-Assessment.com], [http://www.lateralsecurity.com Lateral Security], [http://www.auckland.ac.nz/ The University of Auckland]&lt;br /&gt;
: '''Location:''' Auckland&lt;br /&gt;
: '''Presentations:''' [http://www.owasp.org/index.php/OWASP_New_Zealand_Day_2010#tab=Presentations Download] &lt;br /&gt;
: '''Event site:''' [[OWASP_New_Zealand_Day_2010|OWASP New Zealand Day 2010]]&lt;br /&gt;
&lt;br /&gt;
; 4th March 2010&lt;br /&gt;
: '''Co-Sponsor:''' [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' MS-SQL Injections.&lt;br /&gt;
: '''Presented By:''' Scott Bell, Security Consultant (Security-Assessment.com)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''2009''' ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- 2009 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
; 10th November 2009&lt;br /&gt;
: '''Co-Sponsor:''' [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' Testing AMF/Flex.&lt;br /&gt;
: '''Presented By:''' Nick Freeman, Security Consultant (Security-Assessment.com)&lt;br /&gt;
: '''Presentation:''' &amp;quot;Shared Ownership&amp;quot;, from a web security perspective.&lt;br /&gt;
: '''Presented By:''' Quintin Russ, Technical Director (Site Host)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; 13th July 2009&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2009 https://www.owasp.org/images/8/85/Owasp_nz_logo.jpg]&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.security-assessment.com Security-Assessment.com], [http://www.lateralsecurity.com Lateral Security], [http://www.auckland.ac.nz/ The University of Auckland]&lt;br /&gt;
: '''Location:''' Auckland&lt;br /&gt;
: '''Presentations:''' [http://www.owasp.org/index.php/OWASP_New_Zealand_Day_2009#tab=Presentations Download] &lt;br /&gt;
: '''Event site:''' [[OWASP_New_Zealand_Day_2009|OWASP New Zealand Day 2009]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; 19th March 2009&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.vodafone.co.nz Vodafone New Zealand] and [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;[http://www.owasp.org/index.php/Image:ActiveXploitation_In_2009.pptx ActiveXploitation in 2009]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Paul Craig, Principal Security Consultant (Security-Assessment.com)&lt;br /&gt;
: '''Presentation:''' &amp;quot;[http://www.owasp.org/index.php/Image:OWASP_Mar09_Reversing_JavaScript.zip Reversing JavaScript]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Roberto Suggi Liverani, Senior Security Consultant (Security-Assessment.com)&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== '''2008''' ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- 2008 --&amp;gt;&lt;br /&gt;
; 5th November 2008&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.vodafone.co.nz Vodafone New Zealand] and [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;[https://www.owasp.org/index.php/Image:Common_Application_Flaws.ppt Common Application Flaws]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Brett Moore, Network Intrusion Specialist (Insomnia Security)&lt;br /&gt;
: '''Presentation:''' &amp;quot;In your Browser, Jackin your Clicks&amp;quot;&lt;br /&gt;
: '''Presented By:''' Beau Butler, Security Consultant (Security-Assessment.com)&lt;br /&gt;
: '''Presentation:''' &amp;quot;Opera Stored Cross Site Scripting&amp;quot;&lt;br /&gt;
: '''Presented By:''' Roberto Suggi Liverani, Security Consultant (Security-Assessment.com)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; 3rd September 2008&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.microsoft.com/en/nz/default.aspx Microsoft] and [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;[https://www.owasp.org/index.php/Image:Browser_security.ppt Browser Security]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Roberto Suggi Liverani, Security Consultant (Security-Assessment.com)&lt;br /&gt;
: '''Presentation:''' &amp;quot;[https://www.owasp.org/index.php/Image:Time_Based_SQL_Injections.ppt Time based blind SQL Injections]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Muhaimin Dzulfakar, Security Consultant (Security-Assessment.com)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; 25th June 2008&lt;br /&gt;
: '''Co-Sponsor:''' [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;Fuzz the Web&amp;quot;&lt;br /&gt;
: '''Presented By:''' Dean Jerkovich, Security Analyst (ASB)&lt;br /&gt;
: '''Presentation:''' &amp;quot;Hacking The World With Flash Part #2: The Results&amp;quot;&lt;br /&gt;
: '''Presented By:''' Paul Crag, Principal Security Consultant (Security-Assessment.com)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; 29th April 2008&lt;br /&gt;
: '''Co-Sponsor:''' [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;[https://www.owasp.org/index.php/Image:Hacking_The_World_With_Flash.ppt Hacking The World With Flash]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Paul Craig, Principal Security Consultant (Security-Assessment.com)&lt;br /&gt;
: '''Presentation:''' &amp;quot;[https://www.owasp.org/index.php/Image:Web_spam_techniques.ppt Web Spam Techniques] - also available in [http://malerisch.net/docs/web_spam_techniques/web_spam_techniques.html HTML] format&amp;quot;&lt;br /&gt;
: '''Presented By:''' Roberto Suggi Liverani, Security Consultant (Security-Assessment.com)&lt;br /&gt;
&lt;br /&gt;
; 21st February 2008&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.vedaadvantage.com/home/home_default.aspx Veda Advantage]&lt;br /&gt;
: '''Locations:''' Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;[http://www.owasp.org/index.php/Image:Xpath_Injection.ppt Xpath Injection - An Overview]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Roberto Suggi Liverani, Security Consultant (Security-assessment.com)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== '''2007''' ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- 2007 --&amp;gt;&lt;br /&gt;
; 5th December 2007&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.vedaadvantage.com/home/home_default.aspx Veda Advantage]&lt;br /&gt;
: '''Locations:''' Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;[http://malerisch.net/docs/ajax_security/Ajax_security.ppt Ajax Security]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Roberto Suggi Liverani, Security Consultant (Security-assessment.com)&lt;br /&gt;
: '''Presentation:''' &amp;quot;On the job browser exploitation&amp;quot;&lt;br /&gt;
: '''Presented By:''' Mark Piper, Senior Security Consultant (Security-assessment.com)&lt;br /&gt;
&lt;br /&gt;
; 22nd May 2007&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.vedaadvantage.com/home/home_default.aspx Veda Advantage]&lt;br /&gt;
: '''Press Release:''' [http://www.vedaadvantage.com/vantage/news_in_brief_and_events/host_nz_owasp_meeting.aspx VedaAdvantage.com]&lt;br /&gt;
: '''Locations:''' Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;OWASP in New Zealand&amp;quot;&lt;br /&gt;
: '''Presented By:''' Roberto Suggi Liverani / Antonio Spera&lt;br /&gt;
&lt;br /&gt;
; April 2007&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.vedaadvantage.com/home/home_default.aspx Veda Advantage]&lt;br /&gt;
: '''Locations:''' Auckland&lt;br /&gt;
&lt;br /&gt;
; January 2007&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.vedaadvantage.com/home/home_default.aspx Veda Advantage]&lt;br /&gt;
: '''Locations:''' Auckland&lt;br /&gt;
&lt;br /&gt;
== Activities == &lt;br /&gt;
&lt;br /&gt;
OWASP New Zealand members actively participate in various OWASP activities. The following are some recent activities undertaken by OWASP NZ members: &lt;br /&gt;
&lt;br /&gt;
* Nick Freeman and Scott Bell have been appointed as the new leaders of the new OWASP New Zealand Chapter&lt;br /&gt;
* Roberto Suggi Liverani has resigned from his position as OWASP New Zealand Chapter Leader&lt;br /&gt;
* Roberto Suggi Liverani will be speaking at OWASP AppSec Asia 2009 conference&lt;br /&gt;
* Roberto Suggi Liverani and Nick Freeman will be speaking at Defcon 17&lt;br /&gt;
* OWASP NZ Day 2009 - [http://www.owasp.org/index.php/OWASP_New_Zealand_Day_2009#tab=Presentations Presentations online]&lt;br /&gt;
* Roberto Suggi Liverani and Nick Freeman will be speaking at EUSecWest 09&lt;br /&gt;
* Brett Moore will be speaking at [http://www.owasp.org/index.php/OWASP_AU_Conference_2009 OWASP AU Conference] about &amp;quot;Vulnerabilities In Action&amp;quot;.&lt;br /&gt;
* Roberto Suggi Liverani contributed to the [http://www.owasp.org/index.php/OWASP_Testing_Project OWASP Testing Guide v3].&lt;br /&gt;
* Mark Piper took his &amp;quot;On the job browser exploitation&amp;quot; talk to the [http://www.owasp.org/index.php/OWASP_Australia_AppSec_2008_Conference OWASP_Australia_AppSec_2008_Conference].&lt;br /&gt;
* Rob Munro has been appointed as OWASP Evangelist&lt;br /&gt;
* OWASP NZ has audio/video conference capability between Auckland and Wellington&lt;br /&gt;
&lt;br /&gt;
== OWASP NZ Members == &lt;br /&gt;
&lt;br /&gt;
We are always looking for additional board members to evangelise the OWASP mission help with meetings, projects and initiatives as we all know it takes time/effort to run a chapter. Please contact us if you are interested to join the NZ OWASP board member or for any queries related to OWASP NZ.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;NZ Board Member (Leader - Auckland)&amp;lt;/b&amp;gt; [mailto:nick.freeman(at)owasp.org Nick Freeman] 021 424 777&lt;br /&gt;
*&amp;lt;b&amp;gt;NZ Board Member (Leader - Wellington)&amp;lt;/b&amp;gt; [mailto:adrian.hayes(at)owasp.org Adrian Hayes]  0274 429 632&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;u&amp;gt;The chapter mailing address is:&amp;lt;/u&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Security-Assessment.com &amp;lt;br&amp;gt;&lt;br /&gt;
Level 1 - Building 2&amp;lt;br&amp;gt;&lt;br /&gt;
12-16 Nicholls Lane, Parnell, Auckland 1010&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Chapter Sponsors ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com https://www.owasp.org/images/a/a4/Security-assessment_com.jpeg]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com www.security-assessment.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.touchpoint.co.nz https://www.owasp.org/images/d/d8/Touchpoint.jpg]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.touchpoint.co.nz www.touchpoint.co.nz]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;/div&gt;</summary>
		<author><name>Adrian Hayes</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_New_Zealand_Day_2012&amp;diff=134766</id>
		<title>OWASP New Zealand Day 2012</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_New_Zealand_Day_2012&amp;diff=134766"/>
				<updated>2012-08-26T21:19:28Z</updated>
		
		<summary type="html">&lt;p&gt;Adrian Hayes: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&amp;lt;center&amp;gt;'''OWASP New Zealand Day 2012&amp;lt;br&amp;gt;30th and 31st August 2012 - Auckland'''&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2012 https://www.owasp.org/images/a/ad/Owaspnz2012logo.png]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
= Introduction =&lt;br /&gt;
==Introduction==&lt;br /&gt;
We are proud to announce the fourth annual OWASP New Zealand Day conference, to be held at the University of Auckland on Friday August 31st, 2012. OWASP New Zealand Day is a one-day conference dedicated to web application security, with an emphasis on secure development techniques to help Kiwi developers build more secure applications.&lt;br /&gt;
&lt;br /&gt;
Based on feedback from last year, the structure of the conference will be slightly different this time. &lt;br /&gt;
&lt;br /&gt;
* We will be offering training on the day before the conference (Thursday August 30th) rather than at the same time as the conference. &lt;br /&gt;
* After lunch on the conference day, we will split to two tracks - one focused on deep technical topics, the other on policy, compliance and risk management. &lt;br /&gt;
&lt;br /&gt;
The fourth OWASP New Zealand Day will be happening thanks to the support provided by the University of Auckland School of Business, which will kindly offer the same conference venue of the last three years. Entry to the event will, as in the past, be free. &lt;br /&gt;
&lt;br /&gt;
For any comments, feedback or observations, please don't hesitate to contact [mailto:nick.freeman@owasp.org?cc=adrian.hayes@owasp.org us].&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Registration==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;Registrations are now closed.&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Important dates==&lt;br /&gt;
&lt;br /&gt;
* CFP &amp;amp; CFT closes:		 		22nd July 2012 [ CLOSED ]&lt;br /&gt;
* Conference Agenda due: 			30th July 2012 [ CLOSED ]&lt;br /&gt;
* Conference Registration deadline: 		20th August 2012 [ CLOSED ]&lt;br /&gt;
* Training Registration deadline: 		27th August 2012 [ CLOSED ]&lt;br /&gt;
* Training Day date: 				30th August 2012&lt;br /&gt;
* Conference Day date: 				31st August 2012&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Conference Venue==&lt;br /&gt;
&lt;br /&gt;
The University of Auckland Business School&amp;lt;br&amp;gt;&lt;br /&gt;
Owen G Glenn Building&amp;lt;br&amp;gt;&lt;br /&gt;
Room: OGGB 260-073 (OGGB4)&amp;lt;br&amp;gt;&lt;br /&gt;
Address: 12 Grafton Road&amp;lt;br&amp;gt;&lt;br /&gt;
Auckland&amp;lt;br&amp;gt;&lt;br /&gt;
New Zealand&amp;lt;br&amp;gt;&lt;br /&gt;
[http://maps.google.com/maps?oe=UTF-8&amp;amp;ie=UTF8&amp;amp;q=auckland+business+school&amp;amp;fb=1&amp;amp;split=1&amp;amp;cid=0,0,12303692579639430581&amp;amp;ei=6WeqSZr_OZLFkAWR--zbDQ&amp;amp;ll=-36.852308,174.770916&amp;amp;spn=0.01056,0.020621&amp;amp;z=16&amp;amp;iwloc=A Map]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;[[Image:Auckland_business_school_small2.jpg]] [[Image:Room_hall.jpg]]&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Conference Sponsors==&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;bottom&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;[http://www.auckland.ac.nz/ https://www.owasp.org/images/8/82/University_of_Auckland_crest_small.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;bottom&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;[http://www.security.org.nz/NZISF_NZISForumContent.php https://www.owasp.org/images/5/5a/Nz_information_security_forum.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;ICT and Department of Information Systems and Operations Management&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Gold Sponsors:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com https://www.owasp.org/images/4/41/SA_Logo_w_DD.gif]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[[File:F5aura-small.jpg|center|350px|link=http://www.aurainfosec.com/]]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com www.security-assessment.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.aurasoftwaresecurity.co.nz Aura Information Security in partnership with F5 Networks]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Silver Sponsors:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[[File:INSOMNIA.PNG|center|200px|link=http://www.insomniasec.com]]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.insomniasec.com/ www.insomniasec.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.lateralsecurity.com/ https://www.owasp.org/images/f/f4/Lateral_security.jpeg]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.lateralsecurity.com/ www.lateralsecurity.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[[File:webdrive_logo.jpg|center|200px|link=]]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.webdrive.co.nz/ www.webdrive.co.nz]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Conference Committee==&lt;br /&gt;
&lt;br /&gt;
* Nick Freeman - OWASP New Zealand Leader (Auckland)&lt;br /&gt;
* Adrian Hayes -  OWASP New Zealand Leader (Wellington)&lt;br /&gt;
* Lech Janczewski - Associate Professor - University of Auckland School of Business&lt;br /&gt;
&lt;br /&gt;
Please direct all enquiries to nick.freeman@owasp.org and adrian.hayes@owasp.org.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Training =&lt;br /&gt;
==Training==&lt;br /&gt;
&lt;br /&gt;
===Test-Driven Security===&lt;br /&gt;
-----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The purpose of this training is to introduce and demonstrate some&lt;br /&gt;
application of test-driven security. Based on a ruby application, we&lt;br /&gt;
are going to see how developers and testers can quickly improve and&lt;br /&gt;
ensure the security of an application by asking themselves some simple&lt;br /&gt;
questions and by checking simple things in their test cases.&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Trainer:&amp;lt;/b&amp;gt; Louis Nyffenegger - PentesterLab&lt;br /&gt;
&lt;br /&gt;
Louis is a security consultant working in Melbourne for Securus&lt;br /&gt;
Global. He focus on web application security and presented to Ruxcon,&lt;br /&gt;
Owasp and Auscert. In his spare, he works on 2 side projects:&lt;br /&gt;
pentesterlab (a training web site) and pntstr (an easy web to run the&lt;br /&gt;
first round of an interview).&lt;br /&gt;
&lt;br /&gt;
[https://pentesterlab.com/ PentesterLab.com]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Trainee Requiements&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Laptop&lt;br /&gt;
* Some virtualisation software able to run an ISO. I.e. VirtualBox or VMWare.&lt;br /&gt;
* A basic Ruby understanding&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Time:&amp;lt;/b&amp;gt; 9am till 12pm, 30th August 2012&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Cost:&amp;lt;/b&amp;gt; $250.00&lt;br /&gt;
&lt;br /&gt;
[https://www.regonline.com/owaspnzday2012 Register here!]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Teaching the Good-Guys Bad-Tricks - OWASP Top 10 in real-life===&lt;br /&gt;
-----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;quot;I'm taught and I forget, I do and I remember&amp;quot; is particularly true with web-security. &lt;br /&gt;
At this session you will have web-security and insecurity clearly explained and we'll walk through clear examples.&lt;br /&gt;
But not only will you learn the OWASP Top 10 but you will also hand-craft your own attacks.&lt;br /&gt;
In our fully functional hack-lab websites you will have a variety of hack challenges from hacking into other users' accounts, stealing credit cards and killing websites!&lt;br /&gt;
But wait, there's more! We'll also cover techniques you need to employ to defend these attacks.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Trainer:&amp;lt;/b&amp;gt;  Andy Prow - Aura&lt;br /&gt;
&lt;br /&gt;
Andy Prow is an IT Security Consultant, Trainer and software developer who founded Aura back in 2001. With 18 years in the IT industry Andy has developed code for IBM, Vodafone, Telecom and Microsoft. Andy presents around the world at conferences including Microsoft's TechEd.&lt;br /&gt;
&lt;br /&gt;
[http://www.aurainfosec.com/ AuraInfoSec.com]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Trainee Requiements&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Laptop&lt;br /&gt;
* A working browser and the [http://portswigger.net/burp/ Burp Suite] free edition installed.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Time:&amp;lt;/b&amp;gt; 9am till 5pm, 30th August 2012&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Cost:&amp;lt;/b&amp;gt; $500.00&lt;br /&gt;
&lt;br /&gt;
[https://www.regonline.com/owaspnzday2012 Register here!]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Conference Schedule =&lt;br /&gt;
==Conference Schedule==&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
31st August 2012&lt;br /&gt;
&amp;lt;table width=&amp;quot;80%&amp;quot;&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;08:30&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #8595C2&amp;quot;&amp;gt;Registration&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;09:00&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Welcome to OWASP New Zealand Day 2012&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Adrian Hayes and Nick Freeman (OWASP Leaders)&amp;lt;br /&amp;gt;Lech Janczewski - The University of Auckland Business School&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;09:10&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #B9C2DC; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;How do I get into Security? I'm a webdev! (An introduction to in2securITy)&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Adam Bell - in2securITy&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;09:25&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Blindsided by Security - The Reality of Web Security for the Visually Impaired&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Laura Bell - Lateral Security and Britta Offergeld - Royal New Zealand Foundation of the Blind&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;10:00&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #B9C2DC; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Internet Junk&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Quintin Russ - SiteHost&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;10:30&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #D98B66; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Break for Morning Tea&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;11:00&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Defeating Cross-Site Scripting with Content Security Policy&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Francois Marier - Mozilla&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;11:20&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #B9C2DC; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;The Dos and Don'ts of Web Application Frameworks&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Denis Andzakovic - Security-Assessment.com&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;11:50&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Web Application Firewalls - Going where no WAFs have gone before...&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Sam Pickles - F5, and Andy Prow - Aura&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;12:30&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #D98B66; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Break for Lunch&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;13:45&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;background-color: #B9C2DC; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Mobile NFC 101&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Nick von Dadelszen - Lateral Security&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;background-color: #B9C2DC; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Comply or Die Trying&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Andrew Kelly&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;14:45&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Going Down to the Wire&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Kirk Jackson - Xero and Mike Haworth - Aura&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Increasing The Value of Penetration Testing&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Brett Moore- Insomnia Security&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;15:30&amp;lt;/td&amp;gt;&lt;br /&gt;
&lt;br /&gt;
		&amp;lt;td style=&amp;quot;background-color: #B9C2DC; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;An (Unofficial) OWASP Top 10 for Managers&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Dean Carter and Shahn Harris - Lateral Security&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;16:00&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #D98B66; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Break for Afternoon Tea&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;16:30&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Discussion Panel and Wrap-up&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&lt;br /&gt;
	&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
	&lt;br /&gt;
= Speakers List=&lt;br /&gt;
==Speakers List==&lt;br /&gt;
&lt;br /&gt;
===Adam Bell - in2securITy - How do I get into Security? I'm a webdev! (An introduction to in2securITy)===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A brief introduction to in2securITy, it's aims and goals.  A particular focus on the availability of mentoring, peers and the secure development stream.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Adam Bell is a security consultant with two years experience in the security industry backed by a further seven years experience in other IT industries. In this time he has worked for both local and national governments in network defence roles as well as working in more generalised system administration, programming, and (the dreaded) service centre.  He currently works for Lateral Security and is the Network Defence writer for in2security.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Andrew Kelly - Comply or Die Trying===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
We all have to comply with something: Laws or bylaws - regulations or recommendations - industry standards or industry best-practice. This OWASP talk will focus on the 'real-world' application of security policy and compliance in IT and business. How policy and compliance can actually be very useful when it comes to securing your job, your company - and your company's future. Both from an IT - and a business/commercial prospective. And - along the way - some common myths, misconceptions and downright misunderstandings around policy and compliance may well be busted. Come and listen to a guy who actually thinks compliance and policy ... are fun!&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Andrew brings 27 years IT experience to OWASP - 24 of them in IT Security - and 13 of those spent in the UK and Europe (okay ... Belgium).&lt;br /&gt;
Now despite starting out as a mainframe uber-tech - Andrew's recognised today as being a 'pragmatic' subject-matter expert on corporate information security policy, compliance and governance. Andrew created his first BS 7799-compliant security policy - for a credit card&lt;br /&gt;
provider - in Cardiff back in 1999. Since then he's done much the same for the a number of security consultancies (NZ and UK),&lt;br /&gt;
Fonterra, Transpower and Telecom (NZ) - and BT, Deutsche Bank, Lloyds/TSB Bank and Legal &amp;amp; General Assurance (UK) - amongst many others.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Andy Prow and Sam Pickles - Aura and F5 - Web Application Firewalls - Going where no WAFs have gone before...===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
So we all know that WAFs (web application firewalls) are not the silver bullet they're often sold as. Many of us in the pen-testing space completely discount their value as dumb signature based systems that are bypassed with a flurry of keystrokes and encoding. BUT WAFs are getting MUCH smarter, and you may be really interested to see what a really intelligent WAF can do today. Ever thought a WAF could stop attacks against business logic flaws and broken authorisation?&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Andy Prow is an IT Security Consultant, Trainer and software developer who founded Aura back in 2001. With 18 years in the IT industry Andy has developed code for IBM, Vodafone, Telecom and Microsoft. Andy presents around the world at conferences including Microsoft's TechEd&lt;br /&gt;
&lt;br /&gt;
Sam Pickles is a senior engineer and security specialist with F5 Networks. During over twelve years of security industry experience, Sam has designed and built IT security systems; and conducted network, application and hardware penetration testing in many countries. Sam studied Physics at the University of Otago, and Computer Science at the University of Oxford; and has presented at events including ISIG, First Tuesday, OWASP and AusCERT.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Brett Moore - Insomnia Security - Increasing The Value of Penetration Testing===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Penetration testing has become fairy accepted now as part of the requirements of any new project. Is it really part of a company's security practices, or is it just a tick in the box? This presentation will examine how effective this is for organisations and how it can best be used to increase the usefulness from this type of work. &lt;br /&gt;
&lt;br /&gt;
* What is, and what isn't penetration testing&lt;br /&gt;
* How cost effective is this method as a security measure?&lt;br /&gt;
* How should it fit into the software development lifecycle of any application or network?&lt;br /&gt;
* what you should look for in a company doing this work&lt;br /&gt;
* what part of the work can you do yourselves  &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Having conducted vulnerability assessments, network reviews, and penetration tests for the majority of the large companies in New Zealand, Insomnia founder Brett Moore brings with him over ten years experience in information security. During this time, Brett has also worked with companies such as SUN Microsystems, Skype Limited and Microsoft Corporation by reporting and helping to fix security vulnerabilities in their products. Brett has released numerous whitepapers and technical postings related to security issues and has spoken at security conferences both locally and overseas, including BlackHat, Defcon, Syscan, Kiwicon, Ruxcon, and the invitation only Microsoft internal security conference called BlueHat.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Dean Carter and Shahn Harris - Lateral Security - An (Unofficial) OWASP Top 10 for Managers===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 Web Application Security Risks has done a fantastic job&lt;br /&gt;
at a technical level.&lt;br /&gt;
&lt;br /&gt;
Dean and Shahn have decided to turn their attention to the layer above&lt;br /&gt;
and create a Top 10 for Managers.&lt;br /&gt;
&lt;br /&gt;
10 things to assist Managers in ensuring that their web application&lt;br /&gt;
projects are delivered in a secure, measurable, repeatable manner.&lt;br /&gt;
&lt;br /&gt;
Oh… and they don’t cost a lot….&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Denis Andzakovic - Security-Assessment.com - The Dos and Don'ts of Web Application Frameworks ===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Don't roll your own&amp;quot; has been common advice over the past decade;&lt;br /&gt;
however even when heeding these words, insecure practices and common&lt;br /&gt;
mistakes lead to glaring security holes. This talk will cover some of&lt;br /&gt;
the common errors made when implementing applcations based around web&lt;br /&gt;
frameworks, where to look for vulnerabilities and how to avoid them.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Denis is a Security Consultant for Security-Assessment.com, a security&lt;br /&gt;
consultancy based in Auckland, Wellington, and Singapore.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Francois Marier - Mozilla - Defeating Cross-Site Scripting with Content Security Policy===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Cross-site scripting vulnerabilities are very common in web applications. They have been in the OWASP top 10 for a while and are routinely used by attackers.&lt;br /&gt;
&lt;br /&gt;
There are simple guidelines that one can follow to prevent XSS bugs and most of the web frameworks out there offer some level of protection but at the end of the day, it's easy to make a mistake.&lt;br /&gt;
&lt;br /&gt;
Content Security Policy adds another layer to a website's defenses: browser-enforced restrictions against external resources or unauthorized scripting. An extra response header instructs browsers to enforce a policy set by the server administrator.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Francois is a software engineer on the Mozilla Identity team where he&lt;br /&gt;
works on Persona, the new decentralized authentication system for the&lt;br /&gt;
open web. A long time Debian developer, Francois has been involved in Open Source&lt;br /&gt;
and web development for a while and has always had a strong interest in&lt;br /&gt;
security.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Kirk Jackson and Mike Haworth - Xero and Aura -  Going Down to the Wire===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
You've built the flashiest web app your cow-orkers have ever seen.&lt;br /&gt;
Your boss loves you, and nominates you for a promotion next financial&lt;br /&gt;
year. You've leveraged the latest hip web framework, and have jaxed&lt;br /&gt;
your ajax to the max.&lt;br /&gt;
&lt;br /&gt;
But have you done everything you can to make your application secure?&lt;br /&gt;
Are you perhaps, in fact, doing a little _too much_?&lt;br /&gt;
&lt;br /&gt;
A common issue we've come across in the past few years is applications&lt;br /&gt;
that share too much information over the wire, or trust too much of&lt;br /&gt;
what they receive. In this talk we'll look at some common pitfalls and&lt;br /&gt;
techniques to counter them in modern web applications.&lt;br /&gt;
&lt;br /&gt;
Let's go down to the wire.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Kirk works at Xero as a Security Architect, co-hosts the Wellington .NET user group, and is a Microsoft Developer Security MVP. He has previous experience in building and penetration testing large web applications.&lt;br /&gt;
&lt;br /&gt;
Mike has previously spoken at OWASP and Kiwicon. He is a contributor to the BeEF project and spends his days pentesting for Aura Information Security.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Laura Bell - Lateral Security and Britta Offergeld – Royal New Zealand Foundation of the Blind - Blindsided by Security - The Reality of Web Security for the Visually Impaired===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Digital self-defence is now seen as a valuable life skill. As web developers we try to design systems that can protect as well as provide for our clients. As security consultants, we develop guidelines and frameworks that people can use to decide if a web application is trustworthy and secure. Even the least technical home users are becoming more confident in spotting suspicious behaviour online. Unfortunately, for the visually impaired, it’s not that simple. In a world where visual clues are not enough and where additional technologies such as screen readers are business as usual – web security is a very different matter.&lt;br /&gt;
&lt;br /&gt;
Lateral Security and The Royal New Zealand Foundation of the Blind will examine the guidance and security best practice commonly in use for web applications today and how effective they are for those with visual impairments. In a talk that mixes real world examples, demonstrations and discussion from both a usability and security perspective, we aim to not only outline the issues but also suggest some solutions.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Nick von Dadelszen - Lateral Security - Mobile NFC 101===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This talk is designed to provide a detailed understanding of NFC on mobile phones and security considerations associated with the technology.&lt;br /&gt;
&lt;br /&gt;
The participants should leave the presentation with an understanding of the technology behind NFC on mobile phones and how it interacts. They should obtain an understanding of the security considerations for NFC on Mobile and how it differs from standard NFC implementations.&lt;br /&gt;
&lt;br /&gt;
The agenda for the talk will be the following:&lt;br /&gt;
- Introduce the audience to NFC&lt;br /&gt;
- Discuss the current state of NFC on mobile phones&lt;br /&gt;
- Analyse the technology involved and how this is used to develop NFC applications&lt;br /&gt;
- Discuss the security considerations of NFC on mobile devices&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Nick von Dadelszen is the technical director at Lateral Security. Nick has been performing professional pen testing for over 12 years and has managed several successful penetration testing teams. He has worked with the majority of large corporates and Government agencies in New Zealand and is a regular presenter at OWASP and kiwicon conferences.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Quintin Russ - SiteHost - Internet Junk===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Junk, we all have it. Some have more, a lot more ... Whether you have accepted your Trademe addiction or are still in denial we all have a problem. Just like Space we are filling up the Internet with junk. What happens to our websites when we are finished with them? How are they closed? Are they ever closed? This talk will look at what sort of junk is left behind and how this can be used to attack your organisation. We will cover the issues with real world examples and time allowing, discuss simple steps to help overcome your Trademe addiction should you have one. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Quintin has carved out his own niche in the .nz hosting industry, having spent a large proportion of the last few years becoming an expert in both building and defending systems. He now runs enough infrastructure to ensure he never, ever gets a good night's sleep, and sometimes doesn't even get to snooze through Sunday mornings. Quintin has a keen interest in security, especially as it relates to web hosting. This has ranged from the vicissitudes of shared hosting to code reviews of popular blogging applications. He has previously presented at ISIG, OWASP &amp;amp; Kiwicon. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Call For Sponsorships =&lt;br /&gt;
==Call For Sponsorships==&lt;br /&gt;
&lt;br /&gt;
As mentioned above, OWASP New Zealand Day 2012 will be held in Auckland on the 31st of August, 2012. OWASP New Zealand Day is a security conference entirely dedicated to web application security. The conference is once again being hosted by the University of Auckland with their support and assistance. OWASP New Zealand Day 2012 is a free event, but requires sponsor support to help be an instructive and quality event for the New Zealand community. OWASP is strictly non for profit. The sponsorship money will be used to help make OWASP New Zealand Day 2012 a free, compelling and valuable experience for the audience. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The sponsorship funds collected are to be used for things such as: &lt;br /&gt;
&lt;br /&gt;
* Refreshments (coffee break/lunch) - we want to keep people refreshed during the day; while we certainly bring good and interesting speakers, we don't want people to go home when they become hungry. &lt;br /&gt;
* Name tags - we feel that getting to know people within the New Zealand community is important, and name tags make that possible. &lt;br /&gt;
* Promotion - up to now our events are propagating by word of mouth. We would like to get to a wider audience by advertising our events. &lt;br /&gt;
* Printed Materials - printed materials will include brochures, tags and lanyards.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Facts ==&lt;br /&gt;
&lt;br /&gt;
Last year, the event was supported by 5 sponsors and attracted more than 200 participants. Plenty of constructive (and positive!) feedback from the audience was received and we are using this to make the conference more appealing to more people. For more information on last year's event, please visit: https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2011 &lt;br /&gt;
&lt;br /&gt;
The OWASP New Zealand community is strong and there are more than 220 people currently subscribed to the mailing-list. OWASP New Zealand Day is expected to attract between 200 and 250 attendees this year.&lt;br /&gt;
&lt;br /&gt;
OWASP regular attendees are IT project managers, IT security managers, IT security consultants, web application architects and developers, QA managers, QA testers and system administrators.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Sponsorships  ==&lt;br /&gt;
&lt;br /&gt;
There are three different levels of sponsorships for the OWASP Day event:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* &amp;lt;b&amp;gt;Support Sponsorship&amp;lt;/b&amp;gt;: (Covering international speaker travel expenses, media coverage/article/promotion of the event)&lt;br /&gt;
	&lt;br /&gt;
Includes:&lt;br /&gt;
&lt;br /&gt;
	- Publication of the sponsor logo on the event web site - https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2012&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* &amp;lt;b&amp;gt;Silver Sponsorship&amp;lt;/b&amp;gt;: 1500 NZD&lt;br /&gt;
&lt;br /&gt;
	Includes: &lt;br /&gt;
&lt;br /&gt;
	- Publication of the sponsor logo on the event web site - https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2012&amp;lt;br&amp;gt;&lt;br /&gt;
	- The publication of the sponsor logo in the event site, in the agenda, on the flyers, brochure and in all the official communications with the attendees at the conference.&amp;lt;br&amp;gt;&lt;br /&gt;
	- The possibility to distribute the company brochures, CDs or other materials to the participants during the event.&amp;lt;br&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
* &amp;lt;b&amp;gt;Gold Sponsorship&amp;lt;/b&amp;gt;: 2750 or 3500 NZD (see below)&lt;br /&gt;
&lt;br /&gt;
	Includes: &lt;br /&gt;
&lt;br /&gt;
	- The publication of the sponsor logo in the event site, in the agenda, on the handouts and in all the official communications with the attendees at the conference.&amp;lt;br&amp;gt;&lt;br /&gt;
	- The possibility to distribute the company brochures, CDs or other materials to the participants during the event.&amp;lt;br&amp;gt;&lt;br /&gt;
	- Publication of the sponsor logo on the OWASP New Zealand Chapter page&amp;lt;br&amp;gt;&lt;br /&gt;
	- Sponsor logo on the OWASP NZ site prior and during the OWASP Day event - https://www.owasp.org/index.php/New_Zealand&amp;lt;br&amp;gt;&lt;br /&gt;
	- Publication of the sponsor logo on the event web site - https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2012&amp;lt;br&amp;gt;&lt;br /&gt;
	- Sponsor dedicated space at the conference (sponsor booth) to show products/services to the attendees during coffee breaks, lunch and snack breaks. If a booth is not required, the Gold Sponsorship fee is 2750 NZD instead of 3500 NZD.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Those who are interested in sponsoring OWASP New Zealand 2012 Conference can contact the [mailto:nick.freeman@owasp.org?cc=adrian.hayes@owasp.org OWASP New Zealand Board].&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Conference Dates =&lt;br /&gt;
==Conference Dates==&lt;br /&gt;
&lt;br /&gt;
Please find below important dates for the conference:&lt;br /&gt;
&lt;br /&gt;
* CFP &amp;amp; CFT closes:		 		22nd July 2012 [CLOSED]&lt;br /&gt;
* Conference Agenda due: 			30th July 2012 &lt;br /&gt;
* Conference Registration deadline: 		20th August 2012&lt;br /&gt;
* Training Registration deadline: 		20th August 2012&lt;br /&gt;
* Training Day date: 				30th August 2012&lt;br /&gt;
* Conference Day date: 				31st August 2012&lt;br /&gt;
&lt;br /&gt;
= Conference Committee =&lt;br /&gt;
==OWASP New Zealand Day 2012 Organising Committee==&lt;br /&gt;
&lt;br /&gt;
* Nick Freeman - OWASP New Zealand Leader (Auckland)&lt;br /&gt;
* Adrian Hayes - OWASP New Zealand Leader (Wellington)&lt;br /&gt;
* Lech Janczewski - Associate Professor - University of Auckland School of Business&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]]&lt;/div&gt;</summary>
		<author><name>Adrian Hayes</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_New_Zealand_Day_2012&amp;diff=134392</id>
		<title>OWASP New Zealand Day 2012</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_New_Zealand_Day_2012&amp;diff=134392"/>
				<updated>2012-08-15T03:46:57Z</updated>
		
		<summary type="html">&lt;p&gt;Adrian Hayes: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&amp;lt;center&amp;gt;'''OWASP New Zealand Day 2012&amp;lt;br&amp;gt;30th and 31st August 2012 - Auckland'''&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2012 https://www.owasp.org/images/a/ad/Owaspnz2012logo.png]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
= Introduction =&lt;br /&gt;
==Introduction==&lt;br /&gt;
We are proud to announce the fourth annual OWASP New Zealand Day conference, to be held at the University of Auckland on Friday August 31st, 2012. OWASP New Zealand Day is a one-day conference dedicated to web application security, with an emphasis on secure development techniques to help Kiwi developers build more secure applications.&lt;br /&gt;
&lt;br /&gt;
Based on feedback from last year, the structure of the conference will be slightly different this time. &lt;br /&gt;
&lt;br /&gt;
* We will be offering training on the day before the conference (Thursday August 30th) rather than at the same time as the conference. &lt;br /&gt;
* After lunch on the conference day, we will split to two tracks - one focused on deep technical topics, the other on policy, compliance and risk management. &lt;br /&gt;
&lt;br /&gt;
The fourth OWASP New Zealand Day will be happening thanks to the support provided by the University of Auckland School of Business, which will kindly offer the same conference venue of the last three years. Entry to the event will, as in the past, be free. &lt;br /&gt;
&lt;br /&gt;
For any comments, feedback or observations, please don't hesitate to contact [mailto:nick.freeman@owasp.org?cc=adrian.hayes@owasp.org us].&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Registration==&lt;br /&gt;
&lt;br /&gt;
As with last year, registration will be performed through the RegOnline system. Registrations will be limited to 300 people, so please register using the following link soon to reserve your spot!&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;[https://www.regonline.com/owaspnzday2012 Register here!] - https://www.regonline.com/owaspnzday2012&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Important dates==&lt;br /&gt;
&lt;br /&gt;
* CFP &amp;amp; CFT closes:		 		22nd July 2012 [ CLOSED ]&lt;br /&gt;
* Conference Agenda due: 			30th July 2012 &lt;br /&gt;
* Conference Registration deadline: 		20th August 2012&lt;br /&gt;
* Training Registration deadline: 		20th August 2012&lt;br /&gt;
* Training Day date: 				30th August 2012&lt;br /&gt;
* Conference Day date: 				31st August 2012&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Conference Venue==&lt;br /&gt;
&lt;br /&gt;
The University of Auckland Business School&amp;lt;br&amp;gt;&lt;br /&gt;
Owen G Glenn Building&amp;lt;br&amp;gt;&lt;br /&gt;
Room: OGGB 260-073 (OGGB4)&amp;lt;br&amp;gt;&lt;br /&gt;
Address: 12 Grafton Road&amp;lt;br&amp;gt;&lt;br /&gt;
Auckland&amp;lt;br&amp;gt;&lt;br /&gt;
New Zealand&amp;lt;br&amp;gt;&lt;br /&gt;
[http://maps.google.com/maps?oe=UTF-8&amp;amp;ie=UTF8&amp;amp;q=auckland+business+school&amp;amp;fb=1&amp;amp;split=1&amp;amp;cid=0,0,12303692579639430581&amp;amp;ei=6WeqSZr_OZLFkAWR--zbDQ&amp;amp;ll=-36.852308,174.770916&amp;amp;spn=0.01056,0.020621&amp;amp;z=16&amp;amp;iwloc=A Map]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;[[Image:Auckland_business_school_small2.jpg]] [[Image:Room_hall.jpg]]&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Conference Sponsors==&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;bottom&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;[http://www.auckland.ac.nz/ https://www.owasp.org/images/8/82/University_of_Auckland_crest_small.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;bottom&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;[http://www.security.org.nz/NZISF_NZISForumContent.php https://www.owasp.org/images/5/5a/Nz_information_security_forum.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;ICT and Department of Information Systems and Operations Management&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Gold Sponsors:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com https://www.owasp.org/images/4/41/SA_Logo_w_DD.gif]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[[File:F5aura-small.jpg|center|350px|link=http://www.aurainfosec.com/]]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com www.security-assessment.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.aurasoftwaresecurity.co.nz Aura Information Security in partnership with F5 Networks]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Silver Sponsors:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[[File:INSOMNIA.PNG|center|200px|link=http://www.insomniasec.com]]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.insomniasec.com/ www.insomniasec.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.lateralsecurity.com/ https://www.owasp.org/images/f/f4/Lateral_security.jpeg]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.lateralsecurity.com/ www.lateralsecurity.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[[File:webdrive_logo.jpg|center|200px|link=]]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.webdrive.co.nz/ www.webdrive.co.nz]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Conference Committee==&lt;br /&gt;
&lt;br /&gt;
* Nick Freeman - OWASP New Zealand Leader (Auckland)&lt;br /&gt;
* Adrian Hayes -  OWASP New Zealand Leader (Wellington)&lt;br /&gt;
* Lech Janczewski - Associate Professor - University of Auckland School of Business&lt;br /&gt;
&lt;br /&gt;
Please direct all enquiries to nick.freeman@owasp.org and adrian.hayes@owasp.org.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Training =&lt;br /&gt;
==Training==&lt;br /&gt;
&lt;br /&gt;
===Test-Driven Security===&lt;br /&gt;
-----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The purpose of this training is to introduce and demonstrate some&lt;br /&gt;
application of test-driven security. Based on a ruby application, we&lt;br /&gt;
are going to see how developers and testers can quickly improve and&lt;br /&gt;
ensure the security of an application by asking themselves some simple&lt;br /&gt;
questions and by checking simple things in their test cases.&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Trainer:&amp;lt;/b&amp;gt; Louis Nyffenegger - PentesterLab&lt;br /&gt;
&lt;br /&gt;
Louis is a security consultant working in Melbourne for Securus&lt;br /&gt;
Global. He focus on web application security and presented to Ruxcon,&lt;br /&gt;
Owasp and Auscert. In his spare, he works on 2 side projects:&lt;br /&gt;
pentesterlab (a training web site) and pntstr (an easy web to run the&lt;br /&gt;
first round of an interview).&lt;br /&gt;
&lt;br /&gt;
[https://pentesterlab.com/ PentesterLab.com]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Trainee Requiements&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Laptop&lt;br /&gt;
* Some virtualisation software able to run an ISO. I.e. VirtualBox or VMWare.&lt;br /&gt;
* A basic Ruby understanding&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Time:&amp;lt;/b&amp;gt; 9am till 12pm, 30th August 2012&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Cost:&amp;lt;/b&amp;gt; $250.00&lt;br /&gt;
&lt;br /&gt;
[https://www.regonline.com/owaspnzday2012 Register here!]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Teaching the Good-Guys Bad-Tricks - OWASP Top 10 in real-life===&lt;br /&gt;
-----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;quot;I'm taught and I forget, I do and I remember&amp;quot; is particularly true with web-security. &lt;br /&gt;
At this session you will have web-security and insecurity clearly explained and we'll walk through clear examples.&lt;br /&gt;
But not only will you learn the OWASP Top 10 but you will also hand-craft your own attacks.&lt;br /&gt;
In our fully functional hack-lab websites you will have a variety of hack challenges from hacking into other users' accounts, stealing credit cards and killing websites!&lt;br /&gt;
But wait, there's more! We'll also cover techniques you need to employ to defend these attacks.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Trainer:&amp;lt;/b&amp;gt;  Andy Prow - Aura&lt;br /&gt;
&lt;br /&gt;
Andy Prow is an IT Security Consultant, Trainer and software developer who founded Aura back in 2001. With 18 years in the IT industry Andy has developed code for IBM, Vodafone, Telecom and Microsoft. Andy presents around the world at conferences including Microsoft's TechEd.&lt;br /&gt;
&lt;br /&gt;
[http://www.aurainfosec.com/ AuraInfoSec.com]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Trainee Requiements&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Laptop&lt;br /&gt;
* A working browser and the [http://portswigger.net/burp/ Burp Suite] free edition installed.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Time:&amp;lt;/b&amp;gt; 9am till 5pm, 30th August 2012&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Cost:&amp;lt;/b&amp;gt; $500.00&lt;br /&gt;
&lt;br /&gt;
[https://www.regonline.com/owaspnzday2012 Register here!]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Conference Schedule =&lt;br /&gt;
==Conference Schedule==&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
31st August 2012&lt;br /&gt;
&amp;lt;table width=&amp;quot;80%&amp;quot;&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;08:30&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #8595C2&amp;quot;&amp;gt;Registration&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;09:00&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Welcome to OWASP New Zealand Day 2012&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Adrian Hayes and Nick Freeman (OWASP Leaders)&amp;lt;br /&amp;gt;Lech Janczewski - The University of Auckland Business School&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;09:10&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #B9C2DC; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;How do I get into Security? I'm a webdev! (An introduction to in2securITy)&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Adam Bell - in2securITy&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;09:25&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Blindsided by Security - The Reality of Web Security for the Visually Impaired&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Laura Bell - Lateral Security and Britta Offergeld - Royal New Zealand Foundation of the Blind&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;10:00&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #B9C2DC; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Internet Junk&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Quintin Russ - SiteHost&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;10:30&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #D98B66; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Break for Morning Tea&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;11:00&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Defeating Cross-Site Scripting with Content Security Policy&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Francois Marier - Mozilla&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;11:20&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #B9C2DC; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;The Dos and Don'ts of Web Application Frameworks&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Denis Andzakovic - Security-Assessment.com&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;11:50&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Web Application Firewalls - Going where no WAFs have gone before...&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Sam Pickles - F5, and Andy Prow - Aura&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;12:30&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #D98B66; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Break for Lunch&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;13:45&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;background-color: #B9C2DC; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Mobile NFC 101&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Nick von Dadelszen - Lateral Security&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;background-color: #B9C2DC; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Comply or Die Trying&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Andrew Kelly&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;14:45&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Going Down to the Wire&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Kirk Jackson - Xero and Mike Haworth - Aura&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Increasing The Value of Penetration Testing&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Brett Moore- Insomnia Security&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;15:30&amp;lt;/td&amp;gt;&lt;br /&gt;
&lt;br /&gt;
		&amp;lt;td style=&amp;quot;background-color: #B9C2DC; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;An (Unofficial) OWASP Top 10 for Managers&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Dean Carter and Shahn Harris - Lateral Security&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;16:00&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #D98B66; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Break for Afternoon Tea&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;16:30&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Discussion Panel and Wrap-up&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&lt;br /&gt;
	&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
	&lt;br /&gt;
= Speakers List=&lt;br /&gt;
==Speakers List==&lt;br /&gt;
&lt;br /&gt;
===Adam Bell - in2securITy - How do I get into Security? I'm a webdev! (An introduction to in2securITy)===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A brief introduction to in2securITy, it's aims and goals.  A particular focus on the availability of mentoring, peers and the secure development stream.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Adam Bell is a security consultant with two years experience in the security industry backed by a further seven years experience in other IT industries. In this time he has worked for both local and national governments in network defence roles as well as working in more generalised system administration, programming, and (the dreaded) service centre.  He currently works for Lateral Security and is the Network Defence writer for in2security.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Andrew Kelly - Comply or Die Trying===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
We all have to comply with something: Laws or bylaws - regulations or recommendations - industry standards or industry best-practice. This OWASP talk will focus on the 'real-world' application of security policy and compliance in IT and business. How policy and compliance can actually be very useful when it comes to securing your job, your company - and your company's future. Both from an IT - and a business/commercial prospective. And - along the way - some common myths, misconceptions and downright misunderstandings around policy and compliance may well be busted. Come and listen to a guy who actually thinks compliance and policy ... are fun!&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Andrew brings 27 years IT experience to OWASP - 24 of them in IT Security - and 13 of those spent in the UK and Europe (okay ... Belgium).&lt;br /&gt;
Now despite starting out as a mainframe uber-tech - Andrew's recognised today as being a 'pragmatic' subject-matter expert on corporate information security policy, compliance and governance. Andrew created his first BS 7799-compliant security policy - for a credit card&lt;br /&gt;
provider - in Cardiff back in 1999. Since then he's done much the same for the a number of security consultancies (NZ and UK),&lt;br /&gt;
Fonterra, Transpower and Telecom (NZ) - and BT, Deutsche Bank, Lloyds/TSB Bank and Legal &amp;amp; General Assurance (UK) - amongst many others.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Andy Prow and Sam Pickles - Aura and F5 - Web Application Firewalls - Going where no WAFs have gone before...===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
So we all know that WAFs (web application firewalls) are not the silver bullet they're often sold as. Many of us in the pen-testing space completely discount their value as dumb signature based systems that are bypassed with a flurry of keystrokes and encoding. BUT WAFs are getting MUCH smarter, and you may be really interested to see what a really intelligent WAF can do today. Ever thought a WAF could stop attacks against business logic flaws and broken authorisation?&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Andy Prow is an IT Security Consultant, Trainer and software developer who founded Aura back in 2001. With 18 years in the IT industry Andy has developed code for IBM, Vodafone, Telecom and Microsoft. Andy presents around the world at conferences including Microsoft's TechEd&lt;br /&gt;
&lt;br /&gt;
Sam Pickles is a senior engineer and security specialist with F5 Networks. During over twelve years of security industry experience, Sam has designed and built IT security systems; and conducted network, application and hardware penetration testing in many countries. Sam studied Physics at the University of Otago, and Computer Science at the University of Oxford; and has presented at events including ISIG, First Tuesday, OWASP and AusCERT.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Brett Moore - Insomnia Security - Increasing The Value of Penetration Testing===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Penetration testing has become fairy accepted now as part of the requirements of any new project. Is it really part of a company's security practices, or is it just a tick in the box? This presentation will examine how effective this is for organisations and how it can best be used to increase the usefulness from this type of work. &lt;br /&gt;
&lt;br /&gt;
* What is, and what isn't penetration testing&lt;br /&gt;
* How cost effective is this method as a security measure?&lt;br /&gt;
* How should it fit into the software development lifecycle of any application or network?&lt;br /&gt;
* what you should look for in a company doing this work&lt;br /&gt;
* what part of the work can you do yourselves  &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Having conducted vulnerability assessments, network reviews, and penetration tests for the majority of the large companies in New Zealand, Insomnia founder Brett Moore brings with him over ten years experience in information security. During this time, Brett has also worked with companies such as SUN Microsystems, Skype Limited and Microsoft Corporation by reporting and helping to fix security vulnerabilities in their products. Brett has released numerous whitepapers and technical postings related to security issues and has spoken at security conferences both locally and overseas, including BlackHat, Defcon, Syscan, Kiwicon, Ruxcon, and the invitation only Microsoft internal security conference called BlueHat.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Dean Carter and Shahn Harris - Lateral Security - An (Unofficial) OWASP Top 10 for Managers===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 Web Application Security Risks has done a fantastic job&lt;br /&gt;
at a technical level.&lt;br /&gt;
&lt;br /&gt;
Dean and Shahn have decided to turn their attention to the layer above&lt;br /&gt;
and create a Top 10 for Managers.&lt;br /&gt;
&lt;br /&gt;
10 things to assist Managers in ensuring that their web application&lt;br /&gt;
projects are delivered in a secure, measurable, repeatable manner.&lt;br /&gt;
&lt;br /&gt;
Oh… and they don’t cost a lot….&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Denis Andzakovic - Security-Assessment.com - The Dos and Don'ts of Web Application Frameworks ===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Don't roll your own&amp;quot; has been common advice over the past decade;&lt;br /&gt;
however even when heeding these words, insecure practices and common&lt;br /&gt;
mistakes lead to glaring security holes. This talk will cover some of&lt;br /&gt;
the common errors made when implementing applcations based around web&lt;br /&gt;
frameworks, where to look for vulnerabilities and how to avoid them.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Denis is a Security Consultant for Security-Assessment.com, a security&lt;br /&gt;
consultancy based in Auckland, Wellington, and Singapore.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Francois Marier - Mozilla - Defeating Cross-Site Scripting with Content Security Policy===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Cross-site scripting vulnerabilities are very common in web applications. They have been in the OWASP top 10 for a while and are routinely used by attackers.&lt;br /&gt;
&lt;br /&gt;
There are simple guidelines that one can follow to prevent XSS bugs and most of the web frameworks out there offer some level of protection but at the end of the day, it's easy to make a mistake.&lt;br /&gt;
&lt;br /&gt;
Content Security Policy adds another layer to a website's defenses: browser-enforced restrictions against external resources or unauthorized scripting. An extra response header instructs browsers to enforce a policy set by the server administrator.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Francois is a software engineer on the Mozilla Identity team where he&lt;br /&gt;
works on Persona, the new decentralized authentication system for the&lt;br /&gt;
open web. A long time Debian developer, Francois has been involved in Open Source&lt;br /&gt;
and web development for a while and has always had a strong interest in&lt;br /&gt;
security.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Kirk Jackson and Mike Haworth - Xero and Aura -  Going Down to the Wire===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
You've built the flashiest web app your cow-orkers have ever seen.&lt;br /&gt;
Your boss loves you, and nominates you for a promotion next financial&lt;br /&gt;
year. You've leveraged the latest hip web framework, and have jaxed&lt;br /&gt;
your ajax to the max.&lt;br /&gt;
&lt;br /&gt;
But have you done everything you can to make your application secure?&lt;br /&gt;
Are you perhaps, in fact, doing a little _too much_?&lt;br /&gt;
&lt;br /&gt;
A common issue we've come across in the past few years is applications&lt;br /&gt;
that share too much information over the wire, or trust too much of&lt;br /&gt;
what they receive. In this talk we'll look at some common pitfalls and&lt;br /&gt;
techniques to counter them in modern web applications.&lt;br /&gt;
&lt;br /&gt;
Let's go down to the wire.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Kirk works at Xero as a Security Architect, co-hosts the Wellington .NET user group, and is a Microsoft Developer Security MVP. He has previous experience in building and penetration testing large web applications.&lt;br /&gt;
&lt;br /&gt;
Mike has previously spoken at OWASP and Kiwicon. He is a contributor to the BeEF project and spends his days pentesting for Aura Information Security.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Laura Bell - Lateral Security and Britta Offergeld – Royal New Zealand Foundation of the Blind - Blindsided by Security - The Reality of Web Security for the Visually Impaired===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Digital self-defence is now seen as a valuable life skill. As web developers we try to design systems that can protect as well as provide for our clients. As security consultants, we develop guidelines and frameworks that people can use to decide if a web application is trustworthy and secure. Even the least technical home users are becoming more confident in spotting suspicious behaviour online. Unfortunately, for the visually impaired, it’s not that simple. In a world where visual clues are not enough and where additional technologies such as screen readers are business as usual – web security is a very different matter.&lt;br /&gt;
&lt;br /&gt;
Lateral Security and The Royal New Zealand Foundation of the Blind will examine the guidance and security best practice commonly in use for web applications today and how effective they are for those with visual impairments. In a talk that mixes real world examples, demonstrations and discussion from both a usability and security perspective, we aim to not only outline the issues but also suggest some solutions.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Nick von Dadelszen - Lateral Security - Mobile NFC 101===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This talk is designed to provide a detailed understanding of NFC on mobile phones and security considerations associated with the technology.&lt;br /&gt;
&lt;br /&gt;
The participants should leave the presentation with an understanding of the technology behind NFC on mobile phones and how it interacts. They should obtain an understanding of the security considerations for NFC on Mobile and how it differs from standard NFC implementations.&lt;br /&gt;
&lt;br /&gt;
The agenda for the talk will be the following:&lt;br /&gt;
- Introduce the audience to NFC&lt;br /&gt;
- Discuss the current state of NFC on mobile phones&lt;br /&gt;
- Analyse the technology involved and how this is used to develop NFC applications&lt;br /&gt;
- Discuss the security considerations of NFC on mobile devices&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Nick von Dadelszen is the technical director at Lateral Security. Nick has been performing professional pen testing for over 12 years and has managed several successful penetration testing teams. He has worked with the majority of large corporates and Government agencies in New Zealand and is a regular presenter at OWASP and kiwicon conferences.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Quintin Russ - SiteHost - Internet Junk===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Junk, we all have it. Some have more, a lot more ... Whether you have accepted your Trademe addiction or are still in denial we all have a problem. Just like Space we are filling up the Internet with junk. What happens to our websites when we are finished with them? How are they closed? Are they ever closed? This talk will look at what sort of junk is left behind and how this can be used to attack your organisation. We will cover the issues with real world examples and time allowing, discuss simple steps to help overcome your Trademe addiction should you have one. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Quintin has carved out his own niche in the .nz hosting industry, having spent a large proportion of the last few years becoming an expert in both building and defending systems. He now runs enough infrastructure to ensure he never, ever gets a good night's sleep, and sometimes doesn't even get to snooze through Sunday mornings. Quintin has a keen interest in security, especially as it relates to web hosting. This has ranged from the vicissitudes of shared hosting to code reviews of popular blogging applications. He has previously presented at ISIG, OWASP &amp;amp; Kiwicon. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Registration =&lt;br /&gt;
==Registration==&lt;br /&gt;
&lt;br /&gt;
As with last year, registration will be performed through the RegOnline system. Registrations will be limited to 300 people, so please register using the following link soon to reserve your spot!&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;[https://www.regonline.com/owaspnzday2012 Register here!] - https://www.regonline.com/owaspnzday2012&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Call For Sponsorships =&lt;br /&gt;
==Call For Sponsorships==&lt;br /&gt;
&lt;br /&gt;
As mentioned above, OWASP New Zealand Day 2012 will be held in Auckland on the 31st of August, 2012. OWASP New Zealand Day is a security conference entirely dedicated to web application security. The conference is once again being hosted by the University of Auckland with their support and assistance. OWASP New Zealand Day 2012 is a free event, but requires sponsor support to help be an instructive and quality event for the New Zealand community. OWASP is strictly non for profit. The sponsorship money will be used to help make OWASP New Zealand Day 2012 a free, compelling and valuable experience for the audience. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The sponsorship funds collected are to be used for things such as: &lt;br /&gt;
&lt;br /&gt;
* Refreshments (coffee break/lunch) - we want to keep people refreshed during the day; while we certainly bring good and interesting speakers, we don't want people to go home when they become hungry. &lt;br /&gt;
* Name tags - we feel that getting to know people within the New Zealand community is important, and name tags make that possible. &lt;br /&gt;
* Promotion - up to now our events are propagating by word of mouth. We would like to get to a wider audience by advertising our events. &lt;br /&gt;
* Printed Materials - printed materials will include brochures, tags and lanyards.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Facts ==&lt;br /&gt;
&lt;br /&gt;
Last year, the event was supported by 5 sponsors and attracted more than 200 participants. Plenty of constructive (and positive!) feedback from the audience was received and we are using this to make the conference more appealing to more people. For more information on last year's event, please visit: https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2011 &lt;br /&gt;
&lt;br /&gt;
The OWASP New Zealand community is strong and there are more than 220 people currently subscribed to the mailing-list. OWASP New Zealand Day is expected to attract between 200 and 250 attendees this year.&lt;br /&gt;
&lt;br /&gt;
OWASP regular attendees are IT project managers, IT security managers, IT security consultants, web application architects and developers, QA managers, QA testers and system administrators.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Sponsorships  ==&lt;br /&gt;
&lt;br /&gt;
There are three different levels of sponsorships for the OWASP Day event:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* &amp;lt;b&amp;gt;Support Sponsorship&amp;lt;/b&amp;gt;: (Covering international speaker travel expenses, media coverage/article/promotion of the event)&lt;br /&gt;
	&lt;br /&gt;
Includes:&lt;br /&gt;
&lt;br /&gt;
	- Publication of the sponsor logo on the event web site - https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2012&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* &amp;lt;b&amp;gt;Silver Sponsorship&amp;lt;/b&amp;gt;: 1500 NZD&lt;br /&gt;
&lt;br /&gt;
	Includes: &lt;br /&gt;
&lt;br /&gt;
	- Publication of the sponsor logo on the event web site - https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2012&amp;lt;br&amp;gt;&lt;br /&gt;
	- The publication of the sponsor logo in the event site, in the agenda, on the flyers, brochure and in all the official communications with the attendees at the conference.&amp;lt;br&amp;gt;&lt;br /&gt;
	- The possibility to distribute the company brochures, CDs or other materials to the participants during the event.&amp;lt;br&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
* &amp;lt;b&amp;gt;Gold Sponsorship&amp;lt;/b&amp;gt;: 2750 or 3500 NZD (see below)&lt;br /&gt;
&lt;br /&gt;
	Includes: &lt;br /&gt;
&lt;br /&gt;
	- The publication of the sponsor logo in the event site, in the agenda, on the handouts and in all the official communications with the attendees at the conference.&amp;lt;br&amp;gt;&lt;br /&gt;
	- The possibility to distribute the company brochures, CDs or other materials to the participants during the event.&amp;lt;br&amp;gt;&lt;br /&gt;
	- Publication of the sponsor logo on the OWASP New Zealand Chapter page&amp;lt;br&amp;gt;&lt;br /&gt;
	- Sponsor logo on the OWASP NZ site prior and during the OWASP Day event - https://www.owasp.org/index.php/New_Zealand&amp;lt;br&amp;gt;&lt;br /&gt;
	- Publication of the sponsor logo on the event web site - https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2012&amp;lt;br&amp;gt;&lt;br /&gt;
	- Sponsor dedicated space at the conference (sponsor booth) to show products/services to the attendees during coffee breaks, lunch and snack breaks. If a booth is not required, the Gold Sponsorship fee is 2750 NZD instead of 3500 NZD.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Those who are interested in sponsoring OWASP New Zealand 2012 Conference can contact the [mailto:nick.freeman@owasp.org?cc=adrian.hayes@owasp.org OWASP New Zealand Board].&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Conference Dates =&lt;br /&gt;
==Conference Dates==&lt;br /&gt;
&lt;br /&gt;
Please find below important dates for the conference:&lt;br /&gt;
&lt;br /&gt;
* CFP &amp;amp; CFT closes:		 		22nd July 2012 [CLOSED]&lt;br /&gt;
* Conference Agenda due: 			30th July 2012 &lt;br /&gt;
* Conference Registration deadline: 		20th August 2012&lt;br /&gt;
* Training Registration deadline: 		20th August 2012&lt;br /&gt;
* Training Day date: 				30th August 2012&lt;br /&gt;
* Conference Day date: 				31st August 2012&lt;br /&gt;
&lt;br /&gt;
= Conference Committee =&lt;br /&gt;
==OWASP New Zealand Day 2012 Organising Committee==&lt;br /&gt;
&lt;br /&gt;
* Nick Freeman - OWASP New Zealand Leader (Auckland)&lt;br /&gt;
* Adrian Hayes - OWASP New Zealand Leader (Wellington)&lt;br /&gt;
* Lech Janczewski - Associate Professor - University of Auckland School of Business&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]]&lt;/div&gt;</summary>
		<author><name>Adrian Hayes</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_New_Zealand_Day_2012&amp;diff=133914</id>
		<title>OWASP New Zealand Day 2012</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_New_Zealand_Day_2012&amp;diff=133914"/>
				<updated>2012-08-05T23:47:09Z</updated>
		
		<summary type="html">&lt;p&gt;Adrian Hayes: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&amp;lt;center&amp;gt;'''OWASP New Zealand Day 2012&amp;lt;br&amp;gt;30th and 31st August 2012 - Auckland'''&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2012 https://www.owasp.org/images/a/ad/Owaspnz2012logo.png]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
= Introduction =&lt;br /&gt;
==Introduction==&lt;br /&gt;
We are proud to announce the fourth annual OWASP New Zealand Day conference, to be held at the University of Auckland on Friday August 31st, 2012. OWASP New Zealand Day is a one-day conference dedicated to web application security, with an emphasis on secure development techniques to help Kiwi developers build more secure applications.&lt;br /&gt;
&lt;br /&gt;
Based on feedback from last year, the structure of the conference will be slightly different this time. &lt;br /&gt;
&lt;br /&gt;
* We will be offering training on the day before the conference (Thursday August 30th) rather than at the same time as the conference. &lt;br /&gt;
* After lunch on the conference day, we will split to two tracks - one focused on deep technical topics, the other on policy, compliance and risk management. &lt;br /&gt;
&lt;br /&gt;
The fourth OWASP New Zealand Day will be happening thanks to the support provided by the University of Auckland School of Business, which will kindly offer the same conference venue of the last three years. Entry to the event will, as in the past, be free. &lt;br /&gt;
&lt;br /&gt;
For any comments, feedback or observations, please don't hesitate to contact [mailto:nick.freeman@owasp.org?cc=adrian.hayes@owasp.org us].&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Registration==&lt;br /&gt;
&lt;br /&gt;
As with last year, registration will be performed through the RegOnline system. Registrations will be limited to 300 people, so please register using the following link soon to reserve your spot!&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;[https://www.regonline.com/owaspnzday2012 Register here!] - https://www.regonline.com/owaspnzday2012&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Important dates==&lt;br /&gt;
&lt;br /&gt;
* CFP &amp;amp; CFT closes:		 		22nd July 2012 [ CLOSED ]&lt;br /&gt;
* Conference Agenda due: 			30th July 2012 &lt;br /&gt;
* Conference Registration deadline: 		20th August 2012&lt;br /&gt;
* Training Registration deadline: 		20th August 2012&lt;br /&gt;
* Training Day date: 				30th August 2012&lt;br /&gt;
* Conference Day date: 				31st August 2012&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Conference Venue==&lt;br /&gt;
&lt;br /&gt;
The University of Auckland Business School&amp;lt;br&amp;gt;&lt;br /&gt;
Owen G Glenn Building&amp;lt;br&amp;gt;&lt;br /&gt;
Room: OGGB 260-073 (OGGB4)&amp;lt;br&amp;gt;&lt;br /&gt;
Address: 12 Grafton Road&amp;lt;br&amp;gt;&lt;br /&gt;
Auckland&amp;lt;br&amp;gt;&lt;br /&gt;
New Zealand&amp;lt;br&amp;gt;&lt;br /&gt;
[http://maps.google.com/maps?oe=UTF-8&amp;amp;ie=UTF8&amp;amp;q=auckland+business+school&amp;amp;fb=1&amp;amp;split=1&amp;amp;cid=0,0,12303692579639430581&amp;amp;ei=6WeqSZr_OZLFkAWR--zbDQ&amp;amp;ll=-36.852308,174.770916&amp;amp;spn=0.01056,0.020621&amp;amp;z=16&amp;amp;iwloc=A Map]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;[[Image:Auckland_business_school_small2.jpg]] [[Image:Room_hall.jpg]]&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Conference Sponsors==&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;bottom&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;[http://www.auckland.ac.nz/ https://www.owasp.org/images/8/82/University_of_Auckland_crest_small.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;bottom&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;[http://www.security.org.nz/NZISF_NZISForumContent.php https://www.owasp.org/images/5/5a/Nz_information_security_forum.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;ICT and Department of Information Systems and Operations Management&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Gold Sponsors:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com https://www.owasp.org/images/4/41/SA_Logo_w_DD.gif]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[[File:F5aura-small.jpg|center|350px|link=http://www.aurainfosec.com/]]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com www.security-assessment.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.aurasoftwaresecurity.co.nz Aura Information Security in partnership with F5 Networks]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Silver Sponsors:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[[File:INSOMNIA.PNG|center|200px|link=http://www.insomniasec.com]]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.insomniasec.com/ www.insomniasec.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.lateralsecurity.com/ https://www.owasp.org/images/f/f4/Lateral_security.jpeg]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.lateralsecurity.com/ www.lateralsecurity.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[[File:webdrive_logo.jpg|center|200px|link=]]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.webdrive.co.nz/ www.webdrive.co.nz]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Conference Committee==&lt;br /&gt;
&lt;br /&gt;
* Nick Freeman - OWASP New Zealand Leader (Auckland)&lt;br /&gt;
* Adrian Hayes -  OWASP New Zealand Leader (Wellington)&lt;br /&gt;
* Lech Janczewski - Associate Professor - University of Auckland School of Business&lt;br /&gt;
&lt;br /&gt;
Please direct all enquiries to nick.freeman@owasp.org and adrian.hayes@owasp.org.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Training =&lt;br /&gt;
==Training==&lt;br /&gt;
&lt;br /&gt;
===Test-Driven Security===&lt;br /&gt;
-----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The purpose of this training is to introduce and demonstrate some&lt;br /&gt;
application of test-driven security. Based on a ruby application, we&lt;br /&gt;
are going to see how developers and testers can quickly improve and&lt;br /&gt;
ensure the security of an application by asking themselves some simple&lt;br /&gt;
questions and by checking simple things in their test cases.&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Trainer:&amp;lt;/b&amp;gt; Louis Nyffenegger - PentesterLab&lt;br /&gt;
&lt;br /&gt;
Louis is a security consultant working in Melbourne for Securus&lt;br /&gt;
Global. He focus on web application security and presented to Ruxcon,&lt;br /&gt;
Owasp and Auscert. In his spare, he works on 2 side projects:&lt;br /&gt;
pentesterlab (a training web site) and pntstr (an easy web to run the&lt;br /&gt;
first round of an interview).&lt;br /&gt;
&lt;br /&gt;
[https://pentesterlab.com/ PentesterLab.com]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Trainee Requiements&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Laptop&lt;br /&gt;
* Some virtualisation software able to run an ISO. I.e. VirtualBox or VMWare.&lt;br /&gt;
* A basic Ruby understanding&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Time:&amp;lt;/b&amp;gt; 9am till 12pm, 30th August 2012&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Cost:&amp;lt;/b&amp;gt; $250.00&lt;br /&gt;
&lt;br /&gt;
[https://www.regonline.com/owaspnzday2012 Register here!]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Teaching the Good-Guys Bad-Tricks - OWASP Top 10 in real-life===&lt;br /&gt;
-----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;quot;I'm taught and I forget, I do and I remember&amp;quot; is particularly true with web-security. &lt;br /&gt;
At this session you will have web-security and insecurity clearly explained and we'll walk through clear examples.&lt;br /&gt;
But not only will you learn the OWASP Top 10 but you will also hand-craft your own attacks.&lt;br /&gt;
In our fully functional hack-lab websites you will have a variety of hack challenges from hacking into other users' accounts, stealing credit cards and killing websites!&lt;br /&gt;
But wait, there's more! We'll also cover techniques you need to employ to defend these attacks.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Trainer:&amp;lt;/b&amp;gt;  Andy Prow - Aura&lt;br /&gt;
&lt;br /&gt;
Andy Prow is an IT Security Consultant, Trainer and software developer who founded Aura back in 2001. With 18 years in the IT industry Andy has developed code for IBM, Vodafone, Telecom and Microsoft. Andy presents around the world at conferences including Microsoft's TechEd.&lt;br /&gt;
&lt;br /&gt;
[http://www.aurainfosec.com/ AuraInfoSec.com]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Trainee Requiements&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Laptop&lt;br /&gt;
* A working browser and the [http://portswigger.net/burp/ Burp Suite] free edition installed.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Time:&amp;lt;/b&amp;gt; 9am till 5pm, 30th August 2012&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Cost:&amp;lt;/b&amp;gt; $500.00&lt;br /&gt;
&lt;br /&gt;
[https://www.regonline.com/owaspnzday2012 Register here!]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Conference Schedule =&lt;br /&gt;
==Conference Schedule==&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
31st August 2012&lt;br /&gt;
&amp;lt;table width=&amp;quot;80%&amp;quot;&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;08:30&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #8595C2&amp;quot;&amp;gt;Registration&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;09:00&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Welcome to OWASP New Zealand Day 2012&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Adrian Hayes and Nick Freeman (OWASP Leaders)&amp;lt;br /&amp;gt;Lech Janczewski - The University of Auckland Business School&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;09:10&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #B9C2DC; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;How do I get into Security? I'm a webdev! (An introduction to in2securITy)&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Adam Bell - in2securITy&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;09:25&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Blindsided by Security - The Reality of Web Security for the Visually Impaired&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Laura Bell - Lateral Security and Britta Offergeld - Royal New Zealand Foundation of the Blind&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;10:00&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #B9C2DC; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Internet Junk&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Quintin Russ - SiteHost&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;10:30&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #D98B66; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Break for Morning Tea&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;11:00&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Defeating Cross-Site Scripting with Content Security Policy&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Francois Marier - Mozilla&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;11:20&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #B9C2DC; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;The Dos and Don'ts of Web Application Frameworks&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Denis Andzakovic - Security-Assessment.com&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;11:50&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Web Application Firewalls - Going where no WAFs have gone before...&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Sam Pickles - F5, and Andy Prow - Aura&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;12:30&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #D98B66; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Break for Lunch&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;13:45&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;background-color: #B9C2DC; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Mobile NFC 101&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Nick von Dadelszen - Lateral Security&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;background-color: #B9C2DC; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Comply or Die Trying&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Andrew Kelly&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;14:45&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Going Down to the Wire&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Kirk Jackson - Xero and Mike Haworth - Aura&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Increasing The Value of Penetration Testing&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Brett Moore- Insomnia Security&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;15:30&amp;lt;/td&amp;gt;&lt;br /&gt;
&lt;br /&gt;
		&amp;lt;td style=&amp;quot;background-color: #B9C2DC; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;An (Unofficial) OWASP Top 10 for Managers&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Dean Carter and Shahn Harris - Lateral Security&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;16:00&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #D98B66; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Break for Afternoon Tea&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;16:30&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Discussion Panel and Wrap-up&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&lt;br /&gt;
	&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
	&lt;br /&gt;
= Speakers List=&lt;br /&gt;
==Speakers List==&lt;br /&gt;
&lt;br /&gt;
===Adam Bell - in2securITy - How do I get into Security? I'm a webdev! (An introduction to in2securITy)===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A brief introduction to in2securITy, it's aims and goals.  A particular focus on the availability of mentoring, peers and the secure development stream.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Adam Bell is a security consultant with two years experience in the security industry backed by a further seven years experience in other IT industries. In this time he has worked for both local and national governments in network defence roles as well as working in more generalised system administration, programming, and (the dreaded) service centre.  He currently works for Lateral Security and is the Network Defence writer for in2security.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Andrew Kelly - Comply or Die Trying===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
We all have to comply with something: Laws or bylaws - regulations or recommendations - industry standards or industry best-practice. This OWASP talk will focus on the 'real-world' application of security policy and compliance in IT and business. How policy and compliance can actually be very useful when it comes to securing your job, your company - and your company's future. Both from an IT - and a business/commercial prospective. And - along the way - some common myths, misconceptions and downright misunderstandings around policy and compliance may well be busted. Come and listen to a guy who actually thinks compliance and policy ... are fun!&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Andrew brings 27 years IT experience to OWASP - 24 of them in IT Security - and 13 of those spent in the UK and Europe (okay ... Belgium).&lt;br /&gt;
Now despite starting out as a mainframe uber-tech - Andrew's recognised today as being a 'pragmatic' subject-matter expert on corporate information security policy, compliance and governance. Andrew created his first BS 7799-compliant security policy - for a credit card&lt;br /&gt;
provider - in Cardiff back in 1999. Since then he's done much the same for the a number of security consultancies (NZ and UK),&lt;br /&gt;
Fonterra, Transpower and Telecom (NZ) - and BT, Deutsche Bank, Lloyds/TSB Bank and Legal &amp;amp; General Assurance (UK) - amongst many others.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Andy Prow and Sam Pickles - Aura and F5 - Web Application Firewalls - Going where no WAFs have gone before...===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
So we all know that WAFs (web application firewalls) are not the silver bullet they're often sold as. Many of us in the pen-testing space completely discount their value as dumb signature based systems that are bypassed with a flurry of keystrokes and encoding. BUT WAFs are getting MUCH smarter, and you may be really interested to see what a really intelligent WAF can do today. Ever thought a WAF could stop attacks against business logic flaws and broken authorisation?&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Andy Prow is an IT Security Consultant, Trainer and software developer who founded Aura back in 2001. With 18 years in the IT industry Andy has developed code for IBM, Vodafone, Telecom and Microsoft. Andy presents around the world at conferences including Microsoft's TechEd&lt;br /&gt;
&lt;br /&gt;
Sam Pickles is a senior engineer and security specialist with F5 Networks. During over twelve years of security industry experience, Sam has designed and built IT security systems; and conducted network, application and hardware penetration testing in many countries. Sam studied Physics at the University of Otago, and Computer Science at the University of Oxford; and has presented at events including ISIG, First Tuesday, OWASP and AusCERT.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Brett Moore - Insomnia Security - Increasing The Value of Penetration Testing===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Penetration testing has become fairy accepted now as part of the requirements of any new project. Is it really part of a company's security practices, or is it just a tick in the box? This presentation will examine how effective this is for organisations and how it can best be used to increase the usefulness from this type of work. &lt;br /&gt;
&lt;br /&gt;
* What is, and what isn't penetration testing&lt;br /&gt;
* How cost effective is this method as a security measure?&lt;br /&gt;
* How should it fit into the software development lifecycle of any application or network?&lt;br /&gt;
* what you should look for in a company doing this work&lt;br /&gt;
* what part of the work can you do yourselves  &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Having conducted vulnerability assessments, network reviews, and penetration tests for the majority of the large companies in New Zealand, Insomnia founder Brett Moore brings with him over ten years experience in information security. During this time, Brett has also worked with companies such as SUN Microsystems, Skype Limited and Microsoft Corporation by reporting and helping to fix security vulnerabilities in their products. Brett has released numerous whitepapers and technical postings related to security issues and has spoken at security conferences both locally and overseas, including BlackHat, Defcon, Syscan, Kiwicon, Ruxcon, and the invitation only Microsoft internal security conference called BlueHat.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Dean Carter and Shahn Harris - Lateral Security - An (Unofficial) OWASP Top 10 for Managers===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 Web Application Security Risks has done a fantastic job&lt;br /&gt;
at a technical level.&lt;br /&gt;
&lt;br /&gt;
Dean and Shahn have decided to turn their attention to the layer above&lt;br /&gt;
and create a Top 10 for Managers.&lt;br /&gt;
&lt;br /&gt;
10 things to assist Managers in ensuring that their web application&lt;br /&gt;
projects are delivered in a secure, measurable, repeatable manner.&lt;br /&gt;
&lt;br /&gt;
Oh… and they don’t cost a lot….&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Denis Andzakovic - Security-Assessment.com - The Dos and Don'ts of Web Application Frameworks ===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Don't roll your own&amp;quot; has been common advice over the past decade;&lt;br /&gt;
however even when heeding these words, insecure practices and common&lt;br /&gt;
mistakes lead to glaring security holes. This talk will cover some of&lt;br /&gt;
the common errors made when implementing applcations based around web&lt;br /&gt;
frameworks, where to look for vulnerabilities and how to avoid them.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Denis is a Security Consultant for Security-Assessment.com, a security&lt;br /&gt;
consultancy based in Auckland, Wellington, and Singapore.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Francois Marier - Mozilla - Defeating Cross-Site Scripting with Content Security Policy===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Cross-site scripting vulnerabilities are very common in web applications. They have been in the OWASP top 10 for a while and are routinely used by attackers.&lt;br /&gt;
&lt;br /&gt;
There are simple guidelines that one can follow to prevent XSS bugs and most of the web frameworks out there offer some level of protection but at the end of the day, it's easy to make a mistake.&lt;br /&gt;
&lt;br /&gt;
Content Security Policy adds another layer to a website's defenses: browser-enforced restrictions against external resources or unauthorized scripting. An extra response header instructs browsers to enforce a policy set by the server administrator.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Francois is a software engineer on the Mozilla Identity team where he&lt;br /&gt;
works on Persona, the new decentralized authentication system for the&lt;br /&gt;
open web. A long time Debian developer, Francois has been involved in Open Source&lt;br /&gt;
and web development for a while and has always had a strong interest in&lt;br /&gt;
security.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Kirk Jackson and Mike Haworth - Xero and Aura -  Going Down to the Wire===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
You've built the flashiest web app your cow-orkers have ever seen.&lt;br /&gt;
Your boss loves you, and nominates you for a promotion next financial&lt;br /&gt;
year. You've leveraged the latest hip web framework, and have jaxed&lt;br /&gt;
your ajax to the max.&lt;br /&gt;
&lt;br /&gt;
But have you done everything you can to make your application secure?&lt;br /&gt;
Are you perhaps, in fact, doing a little _too much_?&lt;br /&gt;
&lt;br /&gt;
A common issue we've come across in the past few years is applications&lt;br /&gt;
that share too much information over the wire, or trust too much of&lt;br /&gt;
what they receive. In this talk we'll look at some common pitfalls and&lt;br /&gt;
techniques to counter them in modern web applications.&lt;br /&gt;
&lt;br /&gt;
Let's go down to the wire.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Kirk works at Xero as a Security Architect, co-hosts the Wellington .NET user group, and is a Microsoft Developer Security MVP. He has previous experience in building and penetration testing large web applications.&lt;br /&gt;
&lt;br /&gt;
Mike has previously spoken at OWASP and Kiwicon. He is a contributor to the BeEF project and spends his days pentesting for Aura Information Security.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Laura Bell - Lateral Security and Britta Offergeld – Royal New Zealand Foundation of the Blind - Blindsided by Security - The Reality of Web Security for the Visually Impaired===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Digital self-defence is now seen as a valuable life skill. As web developers we try to design systems that can protect as well as provide for our clients. As security consultants, we develop guidelines and frameworks that people can use to decide if a web application is trustworthy and secure. Even the least technical home users are becoming more confident in spotting suspicious behaviour online. Unfortunately, for the visually impaired, it’s not that simple. In a world where visual clues are not enough and where additional technologies such as screen readers are business as usual – web security is a very different matter.&lt;br /&gt;
&lt;br /&gt;
Lateral Security and The Royal New Zealand Foundation of the Blind will examine the guidance and security best practice commonly in use for web applications today and how effective they are for those with visual impairments. In a talk that mixes real world examples, demonstrations and discussion from both a usability and security perspective, we aim to not only outline the issues but also suggest some solutions.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Nick von Dadelszen - Lateral Security - Mobile NFC 101===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This talk is designed to provide a detailed understanding of NFC on mobile phones and security considerations associated with the technology.&lt;br /&gt;
&lt;br /&gt;
The participants should leave the presentation with an understanding of the technology behind NFC on mobile phones and how it interacts. They should obtain an understanding of the security considerations for NFC on Mobile and how it differs from standard NFC implementations.&lt;br /&gt;
&lt;br /&gt;
The agenda for the talk will be the following:&lt;br /&gt;
- Introduce the audience to NFC&lt;br /&gt;
- Discuss the current state of NFC on mobile phones&lt;br /&gt;
- Analyse the technology involved and how this is used to develop NFC applications&lt;br /&gt;
- Discuss the security considerations of NFC on mobile devices&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Quintin Russ - SiteHost - Internet Junk===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Junk, we all have it. Some have more, a lot more ... Whether you have accepted your Trademe addiction or are still in denial we all have a problem. Just like Space we are filling up the Internet with junk. What happens to our websites when we are finished with them? How are they closed? Are they ever closed? This talk will look at what sort of junk is left behind and how this can be used to attack your organisation. We will cover the issues with real world examples and time allowing, discuss simple steps to help overcome your Trademe addiction should you have one. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Quintin has carved out his own niche in the .nz hosting industry, having spent a large proportion of the last few years becoming an expert in both building and defending systems. He now runs enough infrastructure to ensure he never, ever gets a good night's sleep, and sometimes doesn't even get to snooze through Sunday mornings. Quintin has a keen interest in security, especially as it relates to web hosting. This has ranged from the vicissitudes of shared hosting to code reviews of popular blogging applications. He has previously presented at ISIG, OWASP &amp;amp; Kiwicon. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Registration =&lt;br /&gt;
==Registration==&lt;br /&gt;
&lt;br /&gt;
As with last year, registration will be performed through the RegOnline system. Registrations will be limited to 300 people, so please register using the following link soon to reserve your spot!&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;[https://www.regonline.com/owaspnzday2012 Register here!] - https://www.regonline.com/owaspnzday2012&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Call For Sponsorships =&lt;br /&gt;
==Call For Sponsorships==&lt;br /&gt;
&lt;br /&gt;
As mentioned above, OWASP New Zealand Day 2012 will be held in Auckland on the 31st of August, 2012. OWASP New Zealand Day is a security conference entirely dedicated to web application security. The conference is once again being hosted by the University of Auckland with their support and assistance. OWASP New Zealand Day 2012 is a free event, but requires sponsor support to help be an instructive and quality event for the New Zealand community. OWASP is strictly non for profit. The sponsorship money will be used to help make OWASP New Zealand Day 2012 a free, compelling and valuable experience for the audience. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The sponsorship funds collected are to be used for things such as: &lt;br /&gt;
&lt;br /&gt;
* Refreshments (coffee break/lunch) - we want to keep people refreshed during the day; while we certainly bring good and interesting speakers, we don't want people to go home when they become hungry. &lt;br /&gt;
* Name tags - we feel that getting to know people within the New Zealand community is important, and name tags make that possible. &lt;br /&gt;
* Promotion - up to now our events are propagating by word of mouth. We would like to get to a wider audience by advertising our events. &lt;br /&gt;
* Printed Materials - printed materials will include brochures, tags and lanyards.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Facts ==&lt;br /&gt;
&lt;br /&gt;
Last year, the event was supported by 5 sponsors and attracted more than 200 participants. Plenty of constructive (and positive!) feedback from the audience was received and we are using this to make the conference more appealing to more people. For more information on last year's event, please visit: https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2011 &lt;br /&gt;
&lt;br /&gt;
The OWASP New Zealand community is strong and there are more than 220 people currently subscribed to the mailing-list. OWASP New Zealand Day is expected to attract between 200 and 250 attendees this year.&lt;br /&gt;
&lt;br /&gt;
OWASP regular attendees are IT project managers, IT security managers, IT security consultants, web application architects and developers, QA managers, QA testers and system administrators.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Sponsorships  ==&lt;br /&gt;
&lt;br /&gt;
There are three different levels of sponsorships for the OWASP Day event:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* &amp;lt;b&amp;gt;Support Sponsorship&amp;lt;/b&amp;gt;: (Covering international speaker travel expenses, media coverage/article/promotion of the event)&lt;br /&gt;
	&lt;br /&gt;
Includes:&lt;br /&gt;
&lt;br /&gt;
	- Publication of the sponsor logo on the event web site - https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2012&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* &amp;lt;b&amp;gt;Silver Sponsorship&amp;lt;/b&amp;gt;: 1500 NZD&lt;br /&gt;
&lt;br /&gt;
	Includes: &lt;br /&gt;
&lt;br /&gt;
	- Publication of the sponsor logo on the event web site - https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2012&amp;lt;br&amp;gt;&lt;br /&gt;
	- The publication of the sponsor logo in the event site, in the agenda, on the flyers, brochure and in all the official communications with the attendees at the conference.&amp;lt;br&amp;gt;&lt;br /&gt;
	- The possibility to distribute the company brochures, CDs or other materials to the participants during the event.&amp;lt;br&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
* &amp;lt;b&amp;gt;Gold Sponsorship&amp;lt;/b&amp;gt;: 2750 or 3500 NZD (see below)&lt;br /&gt;
&lt;br /&gt;
	Includes: &lt;br /&gt;
&lt;br /&gt;
	- The publication of the sponsor logo in the event site, in the agenda, on the handouts and in all the official communications with the attendees at the conference.&amp;lt;br&amp;gt;&lt;br /&gt;
	- The possibility to distribute the company brochures, CDs or other materials to the participants during the event.&amp;lt;br&amp;gt;&lt;br /&gt;
	- Publication of the sponsor logo on the OWASP New Zealand Chapter page&amp;lt;br&amp;gt;&lt;br /&gt;
	- Sponsor logo on the OWASP NZ site prior and during the OWASP Day event - https://www.owasp.org/index.php/New_Zealand&amp;lt;br&amp;gt;&lt;br /&gt;
	- Publication of the sponsor logo on the event web site - https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2012&amp;lt;br&amp;gt;&lt;br /&gt;
	- Sponsor dedicated space at the conference (sponsor booth) to show products/services to the attendees during coffee breaks, lunch and snack breaks. If a booth is not required, the Gold Sponsorship fee is 2750 NZD instead of 3500 NZD.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Those who are interested in sponsoring OWASP New Zealand 2012 Conference can contact the [mailto:nick.freeman@owasp.org?cc=adrian.hayes@owasp.org OWASP New Zealand Board].&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Conference Dates =&lt;br /&gt;
==Conference Dates==&lt;br /&gt;
&lt;br /&gt;
Please find below important dates for the conference:&lt;br /&gt;
&lt;br /&gt;
* CFP &amp;amp; CFT closes:		 		22nd July 2012 [CLOSED]&lt;br /&gt;
* Conference Agenda due: 			30th July 2012 &lt;br /&gt;
* Conference Registration deadline: 		20th August 2012&lt;br /&gt;
* Training Registration deadline: 		20th August 2012&lt;br /&gt;
* Training Day date: 				30th August 2012&lt;br /&gt;
* Conference Day date: 				31st August 2012&lt;br /&gt;
&lt;br /&gt;
= Conference Committee =&lt;br /&gt;
==OWASP New Zealand Day 2012 Organising Committee==&lt;br /&gt;
&lt;br /&gt;
* Nick Freeman - OWASP New Zealand Leader (Auckland)&lt;br /&gt;
* Adrian Hayes - OWASP New Zealand Leader (Wellington)&lt;br /&gt;
* Lech Janczewski - Associate Professor - University of Auckland School of Business&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]]&lt;/div&gt;</summary>
		<author><name>Adrian Hayes</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_New_Zealand_Day_2012&amp;diff=133913</id>
		<title>OWASP New Zealand Day 2012</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_New_Zealand_Day_2012&amp;diff=133913"/>
				<updated>2012-08-05T23:41:13Z</updated>
		
		<summary type="html">&lt;p&gt;Adrian Hayes: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&amp;lt;center&amp;gt;'''OWASP New Zealand Day 2012&amp;lt;br&amp;gt;30th and 31st August 2012 - Auckland'''&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2012 https://www.owasp.org/images/a/ad/Owaspnz2012logo.png]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
= Introduction =&lt;br /&gt;
==Introduction==&lt;br /&gt;
We are proud to announce the fourth annual OWASP New Zealand Day conference, to be held at the University of Auckland on Friday August 31st, 2012. OWASP New Zealand Day is a one-day conference dedicated to web application security, with an emphasis on secure development techniques to help Kiwi developers build more secure applications.&lt;br /&gt;
&lt;br /&gt;
Based on feedback from last year, the structure of the conference will be slightly different this time. &lt;br /&gt;
&lt;br /&gt;
* We will be offering training on the day before the conference (Thursday August 30th) rather than at the same time as the conference. &lt;br /&gt;
* After lunch on the conference day, we will split to two tracks - one focused on deep technical topics, the other on policy, compliance and risk management. &lt;br /&gt;
&lt;br /&gt;
The fourth OWASP New Zealand Day will be happening thanks to the support provided by the University of Auckland School of Business, which will kindly offer the same conference venue of the last three years. Entry to the event will, as in the past, be free. &lt;br /&gt;
&lt;br /&gt;
For any comments, feedback or observations, please don't hesitate to contact [mailto:nick.freeman@owasp.org?cc=adrian.hayes@owasp.org us].&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Registration==&lt;br /&gt;
&lt;br /&gt;
As with last year, registration will be performed through the RegOnline system. Registrations will be limited to 300 people, so please register using the following link soon to reserve your spot!&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;[https://www.regonline.com/owaspnzday2012 Register here!] - https://www.regonline.com/owaspnzday2012&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Important dates==&lt;br /&gt;
&lt;br /&gt;
* CFP &amp;amp; CFT closes:		 		22nd July 2012 [ CLOSED ]&lt;br /&gt;
* Conference Agenda due: 			30th July 2012 &lt;br /&gt;
* Conference Registration deadline: 		20th August 2012&lt;br /&gt;
* Training Registration deadline: 		20th August 2012&lt;br /&gt;
* Training Day date: 				30th August 2012&lt;br /&gt;
* Conference Day date: 				31st August 2012&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Conference Venue==&lt;br /&gt;
&lt;br /&gt;
The University of Auckland Business School&amp;lt;br&amp;gt;&lt;br /&gt;
Owen G Glenn Building&amp;lt;br&amp;gt;&lt;br /&gt;
Room: OGGB 260-073 (OGGB4)&amp;lt;br&amp;gt;&lt;br /&gt;
Address: 12 Grafton Road&amp;lt;br&amp;gt;&lt;br /&gt;
Auckland&amp;lt;br&amp;gt;&lt;br /&gt;
New Zealand&amp;lt;br&amp;gt;&lt;br /&gt;
[http://maps.google.com/maps?oe=UTF-8&amp;amp;ie=UTF8&amp;amp;q=auckland+business+school&amp;amp;fb=1&amp;amp;split=1&amp;amp;cid=0,0,12303692579639430581&amp;amp;ei=6WeqSZr_OZLFkAWR--zbDQ&amp;amp;ll=-36.852308,174.770916&amp;amp;spn=0.01056,0.020621&amp;amp;z=16&amp;amp;iwloc=A Map]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;[[Image:Auckland_business_school_small2.jpg]] [[Image:Room_hall.jpg]]&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Conference Sponsors==&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;bottom&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;[http://www.auckland.ac.nz/ https://www.owasp.org/images/8/82/University_of_Auckland_crest_small.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;bottom&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;[http://www.security.org.nz/NZISF_NZISForumContent.php https://www.owasp.org/images/5/5a/Nz_information_security_forum.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;ICT and Department of Information Systems and Operations Management&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Gold Sponsors:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com https://www.owasp.org/images/4/41/SA_Logo_w_DD.gif]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[[File:F5aura-small.jpg|center|350px|link=http://www.aurainfosec.com/]]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com www.security-assessment.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.aurasoftwaresecurity.co.nz Aura Information Security in partnership with F5 Networks]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Silver Sponsors:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[[File:INSOMNIA.PNG|center|200px|link=http://www.insomniasec.com]]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.insomniasec.com/ www.insomniasec.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.lateralsecurity.com/ https://www.owasp.org/images/f/f4/Lateral_security.jpeg]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.lateralsecurity.com/ www.lateralsecurity.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[[File:webdrive_logo.jpg|center|200px|link=]]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.webdrive.co.nz/ www.webdrive.co.nz]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Conference Committee==&lt;br /&gt;
&lt;br /&gt;
* Nick Freeman - OWASP New Zealand Leader (Auckland)&lt;br /&gt;
* Adrian Hayes -  OWASP New Zealand Leader (Wellington)&lt;br /&gt;
* Lech Janczewski - Associate Professor - University of Auckland School of Business&lt;br /&gt;
&lt;br /&gt;
Please direct all enquiries to nick.freeman@owasp.org and adrian.hayes@owasp.org.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Training =&lt;br /&gt;
==Training==&lt;br /&gt;
&lt;br /&gt;
===Test-Driven Security===&lt;br /&gt;
-----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The purpose of this training is to introduce and demonstrate some&lt;br /&gt;
application of test-driven security. Based on a ruby application, we&lt;br /&gt;
are going to see how developers and testers can quickly improve and&lt;br /&gt;
ensure the security of an application by asking themselves some simple&lt;br /&gt;
questions and by checking simple things in their test cases.&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Trainer:&amp;lt;/b&amp;gt; Louis Nyffenegger - PentesterLab&lt;br /&gt;
&lt;br /&gt;
Louis is a security consultant working in Melbourne for Securus&lt;br /&gt;
Global. He focus on web application security and presented to Ruxcon,&lt;br /&gt;
Owasp and Auscert. In his spare, he works on 2 side projects:&lt;br /&gt;
pentesterlab (a training web site) and pntstr (an easy web to run the&lt;br /&gt;
first round of an interview).&lt;br /&gt;
&lt;br /&gt;
[https://pentesterlab.com/ PentesterLab.com]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Trainee Requiements&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Laptop&lt;br /&gt;
* Some virtualisation software able to run an ISO. I.e. VirtualBox or VMWare.&lt;br /&gt;
* A basic Ruby understanding&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Time:&amp;lt;/b&amp;gt; 9am till 12pm, 30th August 2012&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Cost:&amp;lt;/b&amp;gt; $250.00&lt;br /&gt;
&lt;br /&gt;
[https://www.regonline.com/owaspnzday2012 Register here!]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Teaching the Good-Guys Bad-Tricks - OWASP Top 10 in real-life===&lt;br /&gt;
-----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;quot;I'm taught and I forget, I do and I remember&amp;quot; is particularly true with web-security. &lt;br /&gt;
At this session you will have web-security and insecurity clearly explained and we'll walk through clear examples.&lt;br /&gt;
But not only will you learn the OWASP Top 10 but you will also hand-craft your own attacks.&lt;br /&gt;
In our fully functional hack-lab websites you will have a variety of hack challenges from hacking into other users' accounts, stealing credit cards and killing websites!&lt;br /&gt;
But wait, there's more! We'll also cover techniques you need to employ to defend these attacks.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Trainer:&amp;lt;/b&amp;gt;  Andy Prow - Aura&lt;br /&gt;
&lt;br /&gt;
Andy Prow is an IT Security Consultant, Trainer and software developer who founded Aura back in 2001. With 18 years in the IT industry Andy has developed code for IBM, Vodafone, Telecom and Microsoft. Andy presents around the world at conferences including Microsoft's TechEd.&lt;br /&gt;
&lt;br /&gt;
[http://www.aurainfosec.com/ AuraInfoSec.com]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Trainee Requiements&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Laptop&lt;br /&gt;
* A working browser and the [http://portswigger.net/burp/ Burp Suite] free edition installed.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Time:&amp;lt;/b&amp;gt; 9am till 5pm, 30th August 2012&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Cost:&amp;lt;/b&amp;gt; $500.00&lt;br /&gt;
&lt;br /&gt;
[https://www.regonline.com/owaspnzday2012 Register here!]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Conference Schedule =&lt;br /&gt;
==Conference Schedule==&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
31st August 2012&lt;br /&gt;
&amp;lt;table width=&amp;quot;80%&amp;quot;&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;08:30&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #8595C2&amp;quot;&amp;gt;Registration&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;09:00&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Welcome to OWASP New Zealand Day 2012&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Adrian Hayes and Nick Freeman (OWASP Leaders)&amp;lt;br /&amp;gt;Lech Janczewski - The University of Auckland Business School&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;09:10&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #B9C2DC; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;How do I get into Security? I'm a webdev! (An introduction to in2securITy)&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Adam Bell - in2securITy&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;09:25&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Blindsided by Security - The Reality of Web Security for the Visually Impaired&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Laura Bell - Lateral Security and Britta Offergeld - Royal New Zealand Foundation of the Blind&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;10:00&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #B9C2DC; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Internet Junk&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Quintin Russ - SiteHost&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;10:30&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #D98B66; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Break for Morning Tea&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;11:00&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Defeating Cross-Site Scripting with Content Security Policy&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Francois Marier - Mozilla&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;11:20&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #B9C2DC; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;The Dos and Don'ts of Web Application Frameworks&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Denis Andzakovic - Security-Assessment.com&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;11:50&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Web Application Firewalls - Going where no WAFs have gone before...&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Sam Pickles - F5, and Andy Prow - Aura&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;12:30&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #D98B66; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Break for Lunch&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;13:45&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;background-color: #B9C2DC; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Mobile NFC 101&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Nick von Dadelszen - Lateral Security&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;background-color: #B9C2DC; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Comply or Die Trying&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Andrew Kelly&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;14:45&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Going Down to the Wire&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Kirk Jackson - Xero and Mike Haworth - Aura&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Increasing The Value of Penetration Testing&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Brett Moore- Insomnia Security&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;15:30&amp;lt;/td&amp;gt;&lt;br /&gt;
&lt;br /&gt;
		&amp;lt;td style=&amp;quot;background-color: #B9C2DC; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;An (Unofficial) OWASP Top 10 for Managers&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Dean Carter and Shahn Harris - Lateral Security&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;16:00&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #D98B66; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Break for Afternoon Tea&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;16:30&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Discussion Panel and Wrap-up&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&lt;br /&gt;
	&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
	&lt;br /&gt;
= Speakers List=&lt;br /&gt;
==Speakers List==&lt;br /&gt;
&lt;br /&gt;
===Adam Bell - in2securITy - How do I get into Security? I'm a webdev! (An introduction to in2securITy)===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A brief introduction to in2securITy, it's aims and goals.  A particular focus on the availability of mentoring, peers and the secure development stream.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Andrew Kelly - Comply or Die Trying===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
We all have to comply with something: Laws or bylaws - regulations or recommendations - industry standards or industry best-practice. This OWASP talk will focus on the 'real-world' application of security policy and compliance in IT and business. How policy and compliance can actually be very useful when it comes to securing your job, your company - and your company's future. Both from an IT - and a business/commercial prospective. And - along the way - some common myths, misconceptions and downright misunderstandings around policy and compliance may well be busted. Come and listen to a guy who actually thinks compliance and policy ... are fun!&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Andrew brings 27 years IT experience to OWASP - 24 of them in IT Security - and 13 of those spent in the UK and Europe (okay ... Belgium).&lt;br /&gt;
Now despite starting out as a mainframe uber-tech - Andrew's recognised today as being a 'pragmatic' subject-matter expert on corporate information security policy, compliance and governance. Andrew created his first BS 7799-compliant security policy - for a credit card&lt;br /&gt;
provider - in Cardiff back in 1999. Since then he's done much the same for the a number of security consultancies (NZ and UK),&lt;br /&gt;
Fonterra, Transpower and Telecom (NZ) - and BT, Deutsche Bank, Lloyds/TSB Bank and Legal &amp;amp; General Assurance (UK) - amongst many others.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Andy Prow and Sam Pickles - Aura and F5 - Web Application Firewalls - Going where no WAFs have gone before...===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
So we all know that WAFs (web application firewalls) are not the silver bullet they're often sold as. Many of us in the pen-testing space completely discount their value as dumb signature based systems that are bypassed with a flurry of keystrokes and encoding. BUT WAFs are getting MUCH smarter, and you may be really interested to see what a really intelligent WAF can do today. Ever thought a WAF could stop attacks against business logic flaws and broken authorisation?&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Andy Prow is an IT Security Consultant, Trainer and software developer who founded Aura back in 2001. With 18 years in the IT industry Andy has developed code for IBM, Vodafone, Telecom and Microsoft. Andy presents around the world at conferences including Microsoft's TechEd&lt;br /&gt;
&lt;br /&gt;
Sam Pickles is a senior engineer and security specialist with F5 Networks. During over twelve years of security industry experience, Sam has designed and built IT security systems; and conducted network, application and hardware penetration testing in many countries. Sam studied Physics at the University of Otago, and Computer Science at the University of Oxford; and has presented at events including ISIG, First Tuesday, OWASP and AusCERT.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Brett Moore - Insomnia Security - Increasing The Value of Penetration Testing===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Penetration testing has become fairy accepted now as part of the requirements of any new project. Is it really part of a company's security practices, or is it just a tick in the box? This presentation will examine how effective this is for organisations and how it can best be used to increase the usefulness from this type of work. &lt;br /&gt;
&lt;br /&gt;
* What is, and what isn't penetration testing&lt;br /&gt;
* How cost effective is this method as a security measure?&lt;br /&gt;
* How should it fit into the software development lifecycle of any application or network?&lt;br /&gt;
* what you should look for in a company doing this work&lt;br /&gt;
* what part of the work can you do yourselves  &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Having conducted vulnerability assessments, network reviews, and penetration tests for the majority of the large companies in New Zealand, Insomnia founder Brett Moore brings with him over ten years experience in information security. During this time, Brett has also worked with companies such as SUN Microsystems, Skype Limited and Microsoft Corporation by reporting and helping to fix security vulnerabilities in their products. Brett has released numerous whitepapers and technical postings related to security issues and has spoken at security conferences both locally and overseas, including BlackHat, Defcon, Syscan, Kiwicon, Ruxcon, and the invitation only Microsoft internal security conference called BlueHat.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Dean Carter and Shahn Harris - Lateral Security - An (Unofficial) OWASP Top 10 for Managers===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 Web Application Security Risks has done a fantastic job&lt;br /&gt;
at a technical level.&lt;br /&gt;
&lt;br /&gt;
Dean and Shahn have decided to turn their attention to the layer above&lt;br /&gt;
and create a Top 10 for Managers.&lt;br /&gt;
&lt;br /&gt;
10 things to assist Managers in ensuring that their web application&lt;br /&gt;
projects are delivered in a secure, measurable, repeatable manner.&lt;br /&gt;
&lt;br /&gt;
Oh… and they don’t cost a lot….&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Denis Andzakovic - Security-Assessment.com - The Dos and Don'ts of Web Application Frameworks ===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Don't roll your own&amp;quot; has been common advice over the past decade;&lt;br /&gt;
however even when heeding these words, insecure practices and common&lt;br /&gt;
mistakes lead to glaring security holes. This talk will cover some of&lt;br /&gt;
the common errors made when implementing applcations based around web&lt;br /&gt;
frameworks, where to look for vulnerabilities and how to avoid them.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Denis is a Security Consultant for Security-Assessment.com, a security&lt;br /&gt;
consultancy based in Auckland, Wellington, and Singapore.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Francois Marier - Mozilla - Defeating Cross-Site Scripting with Content Security Policy===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Cross-site scripting vulnerabilities are very common in web applications. They have been in the OWASP top 10 for a while and are routinely used by attackers.&lt;br /&gt;
&lt;br /&gt;
There are simple guidelines that one can follow to prevent XSS bugs and most of the web frameworks out there offer some level of protection but at the end of the day, it's easy to make a mistake.&lt;br /&gt;
&lt;br /&gt;
Content Security Policy adds another layer to a website's defenses: browser-enforced restrictions against external resources or unauthorized scripting. An extra response header instructs browsers to enforce a policy set by the server administrator.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Francois is a software engineer on the Mozilla Identity team where he&lt;br /&gt;
works on Persona, the new decentralized authentication system for the&lt;br /&gt;
open web. A long time Debian developer, Francois has been involved in Open Source&lt;br /&gt;
and web development for a while and has always had a strong interest in&lt;br /&gt;
security.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Kirk Jackson and Mike Haworth - Xero and Aura -  Going Down to the Wire===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
You've built the flashiest web app your cow-orkers have ever seen.&lt;br /&gt;
Your boss loves you, and nominates you for a promotion next financial&lt;br /&gt;
year. You've leveraged the latest hip web framework, and have jaxed&lt;br /&gt;
your ajax to the max.&lt;br /&gt;
&lt;br /&gt;
But have you done everything you can to make your application secure?&lt;br /&gt;
Are you perhaps, in fact, doing a little _too much_?&lt;br /&gt;
&lt;br /&gt;
A common issue we've come across in the past few years is applications&lt;br /&gt;
that share too much information over the wire, or trust too much of&lt;br /&gt;
what they receive. In this talk we'll look at some common pitfalls and&lt;br /&gt;
techniques to counter them in modern web applications.&lt;br /&gt;
&lt;br /&gt;
Let's go down to the wire.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Kirk works at Xero as a Security Architect, co-hosts the Wellington .NET user group, and is a Microsoft Developer Security MVP. He has previous experience in building and penetration testing large web applications.&lt;br /&gt;
&lt;br /&gt;
Mike has previously spoken at OWASP and Kiwicon. He is a contributor to the BeEF project and spends his days pentesting for Aura Information Security.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Laura Bell - Lateral Security and Britta Offergeld – Royal New Zealand Foundation of the Blind - Blindsided by Security - The Reality of Web Security for the Visually Impaired===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Digital self-defence is now seen as a valuable life skill. As web developers we try to design systems that can protect as well as provide for our clients. As security consultants, we develop guidelines and frameworks that people can use to decide if a web application is trustworthy and secure. Even the least technical home users are becoming more confident in spotting suspicious behaviour online. Unfortunately, for the visually impaired, it’s not that simple. In a world where visual clues are not enough and where additional technologies such as screen readers are business as usual – web security is a very different matter.&lt;br /&gt;
&lt;br /&gt;
Lateral Security and The Royal New Zealand Foundation of the Blind will examine the guidance and security best practice commonly in use for web applications today and how effective they are for those with visual impairments. In a talk that mixes real world examples, demonstrations and discussion from both a usability and security perspective, we aim to not only outline the issues but also suggest some solutions.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Nick von Dadelszen - Lateral Security - Mobile NFC 101===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This talk is designed to provide a detailed understanding of NFC on mobile phones and security considerations associated with the technology.&lt;br /&gt;
&lt;br /&gt;
The participants should leave the presentation with an understanding of the technology behind NFC on mobile phones and how it interacts. They should obtain an understanding of the security considerations for NFC on Mobile and how it differs from standard NFC implementations.&lt;br /&gt;
&lt;br /&gt;
The agenda for the talk will be the following:&lt;br /&gt;
- Introduce the audience to NFC&lt;br /&gt;
- Discuss the current state of NFC on mobile phones&lt;br /&gt;
- Analyse the technology involved and how this is used to develop NFC applications&lt;br /&gt;
- Discuss the security considerations of NFC on mobile devices&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Quintin Russ - SiteHost - Internet Junk===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Junk, we all have it. Some have more, a lot more ... Whether you have accepted your Trademe addiction or are still in denial we all have a problem. Just like Space we are filling up the Internet with junk. What happens to our websites when we are finished with them? How are they closed? Are they ever closed? This talk will look at what sort of junk is left behind and how this can be used to attack your organisation. We will cover the issues with real world examples and time allowing, discuss simple steps to help overcome your Trademe addiction should you have one. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Quintin has carved out his own niche in the .nz hosting industry, having spent a large proportion of the last few years becoming an expert in both building and defending systems. He now runs enough infrastructure to ensure he never, ever gets a good night's sleep, and sometimes doesn't even get to snooze through Sunday mornings. Quintin has a keen interest in security, especially as it relates to web hosting. This has ranged from the vicissitudes of shared hosting to code reviews of popular blogging applications. He has previously presented at ISIG, OWASP &amp;amp; Kiwicon. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Registration =&lt;br /&gt;
==Registration==&lt;br /&gt;
&lt;br /&gt;
As with last year, registration will be performed through the RegOnline system. Registrations will be limited to 300 people, so please register using the following link soon to reserve your spot!&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;[https://www.regonline.com/owaspnzday2012 Register here!] - https://www.regonline.com/owaspnzday2012&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Call For Sponsorships =&lt;br /&gt;
==Call For Sponsorships==&lt;br /&gt;
&lt;br /&gt;
As mentioned above, OWASP New Zealand Day 2012 will be held in Auckland on the 31st of August, 2012. OWASP New Zealand Day is a security conference entirely dedicated to web application security. The conference is once again being hosted by the University of Auckland with their support and assistance. OWASP New Zealand Day 2012 is a free event, but requires sponsor support to help be an instructive and quality event for the New Zealand community. OWASP is strictly non for profit. The sponsorship money will be used to help make OWASP New Zealand Day 2012 a free, compelling and valuable experience for the audience. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The sponsorship funds collected are to be used for things such as: &lt;br /&gt;
&lt;br /&gt;
* Refreshments (coffee break/lunch) - we want to keep people refreshed during the day; while we certainly bring good and interesting speakers, we don't want people to go home when they become hungry. &lt;br /&gt;
* Name tags - we feel that getting to know people within the New Zealand community is important, and name tags make that possible. &lt;br /&gt;
* Promotion - up to now our events are propagating by word of mouth. We would like to get to a wider audience by advertising our events. &lt;br /&gt;
* Printed Materials - printed materials will include brochures, tags and lanyards.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Facts ==&lt;br /&gt;
&lt;br /&gt;
Last year, the event was supported by 5 sponsors and attracted more than 200 participants. Plenty of constructive (and positive!) feedback from the audience was received and we are using this to make the conference more appealing to more people. For more information on last year's event, please visit: https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2011 &lt;br /&gt;
&lt;br /&gt;
The OWASP New Zealand community is strong and there are more than 220 people currently subscribed to the mailing-list. OWASP New Zealand Day is expected to attract between 200 and 250 attendees this year.&lt;br /&gt;
&lt;br /&gt;
OWASP regular attendees are IT project managers, IT security managers, IT security consultants, web application architects and developers, QA managers, QA testers and system administrators.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Sponsorships  ==&lt;br /&gt;
&lt;br /&gt;
There are three different levels of sponsorships for the OWASP Day event:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* &amp;lt;b&amp;gt;Support Sponsorship&amp;lt;/b&amp;gt;: (Covering international speaker travel expenses, media coverage/article/promotion of the event)&lt;br /&gt;
	&lt;br /&gt;
Includes:&lt;br /&gt;
&lt;br /&gt;
	- Publication of the sponsor logo on the event web site - https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2012&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* &amp;lt;b&amp;gt;Silver Sponsorship&amp;lt;/b&amp;gt;: 1500 NZD&lt;br /&gt;
&lt;br /&gt;
	Includes: &lt;br /&gt;
&lt;br /&gt;
	- Publication of the sponsor logo on the event web site - https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2012&amp;lt;br&amp;gt;&lt;br /&gt;
	- The publication of the sponsor logo in the event site, in the agenda, on the flyers, brochure and in all the official communications with the attendees at the conference.&amp;lt;br&amp;gt;&lt;br /&gt;
	- The possibility to distribute the company brochures, CDs or other materials to the participants during the event.&amp;lt;br&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
* &amp;lt;b&amp;gt;Gold Sponsorship&amp;lt;/b&amp;gt;: 2750 or 3500 NZD (see below)&lt;br /&gt;
&lt;br /&gt;
	Includes: &lt;br /&gt;
&lt;br /&gt;
	- The publication of the sponsor logo in the event site, in the agenda, on the handouts and in all the official communications with the attendees at the conference.&amp;lt;br&amp;gt;&lt;br /&gt;
	- The possibility to distribute the company brochures, CDs or other materials to the participants during the event.&amp;lt;br&amp;gt;&lt;br /&gt;
	- Publication of the sponsor logo on the OWASP New Zealand Chapter page&amp;lt;br&amp;gt;&lt;br /&gt;
	- Sponsor logo on the OWASP NZ site prior and during the OWASP Day event - https://www.owasp.org/index.php/New_Zealand&amp;lt;br&amp;gt;&lt;br /&gt;
	- Publication of the sponsor logo on the event web site - https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2012&amp;lt;br&amp;gt;&lt;br /&gt;
	- Sponsor dedicated space at the conference (sponsor booth) to show products/services to the attendees during coffee breaks, lunch and snack breaks. If a booth is not required, the Gold Sponsorship fee is 2750 NZD instead of 3500 NZD.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Those who are interested in sponsoring OWASP New Zealand 2012 Conference can contact the [mailto:nick.freeman@owasp.org?cc=adrian.hayes@owasp.org OWASP New Zealand Board].&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Conference Dates =&lt;br /&gt;
==Conference Dates==&lt;br /&gt;
&lt;br /&gt;
Please find below important dates for the conference:&lt;br /&gt;
&lt;br /&gt;
* CFP &amp;amp; CFT closes:		 		22nd July 2012 [CLOSED]&lt;br /&gt;
* Conference Agenda due: 			30th July 2012 &lt;br /&gt;
* Conference Registration deadline: 		20th August 2012&lt;br /&gt;
* Training Registration deadline: 		20th August 2012&lt;br /&gt;
* Training Day date: 				30th August 2012&lt;br /&gt;
* Conference Day date: 				31st August 2012&lt;br /&gt;
&lt;br /&gt;
= Conference Committee =&lt;br /&gt;
==OWASP New Zealand Day 2012 Organising Committee==&lt;br /&gt;
&lt;br /&gt;
* Nick Freeman - OWASP New Zealand Leader (Auckland)&lt;br /&gt;
* Adrian Hayes - OWASP New Zealand Leader (Wellington)&lt;br /&gt;
* Lech Janczewski - Associate Professor - University of Auckland School of Business&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]]&lt;/div&gt;</summary>
		<author><name>Adrian Hayes</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_New_Zealand_Day_2012&amp;diff=133912</id>
		<title>OWASP New Zealand Day 2012</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_New_Zealand_Day_2012&amp;diff=133912"/>
				<updated>2012-08-05T21:39:28Z</updated>
		
		<summary type="html">&lt;p&gt;Adrian Hayes: Updated Aura/F5 Logo&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&amp;lt;center&amp;gt;'''OWASP New Zealand Day 2012&amp;lt;br&amp;gt;30th and 31st August 2012 - Auckland'''&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2012 https://www.owasp.org/images/a/ad/Owaspnz2012logo.png]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
= Introduction =&lt;br /&gt;
==Introduction==&lt;br /&gt;
We are proud to announce the fourth annual OWASP New Zealand Day conference, to be held at the University of Auckland on Friday August 31st, 2012. OWASP New Zealand Day is a one-day conference dedicated to web application security, with an emphasis on secure development techniques to help Kiwi developers build more secure applications.&lt;br /&gt;
&lt;br /&gt;
Based on feedback from last year, the structure of the conference will be slightly different this time. &lt;br /&gt;
&lt;br /&gt;
* We will be offering training on the day before the conference (Thursday August 30th) rather than at the same time as the conference. &lt;br /&gt;
* After lunch on the conference day, we will split to two tracks - one focused on deep technical topics, the other on policy, compliance and risk management. &lt;br /&gt;
&lt;br /&gt;
The fourth OWASP New Zealand Day will be happening thanks to the support provided by the University of Auckland School of Business, which will kindly offer the same conference venue of the last three years. Entry to the event will, as in the past, be free. &lt;br /&gt;
&lt;br /&gt;
For any comments, feedback or observations, please don't hesitate to contact [mailto:nick.freeman@owasp.org?cc=adrian.hayes@owasp.org us].&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Registration==&lt;br /&gt;
&lt;br /&gt;
As with last year, registration will be performed through the RegOnline system. Registrations will be limited to 300 people, so please register using the following link soon to reserve your spot!&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;[https://www.regonline.com/owaspnzday2012 Register here!] - https://www.regonline.com/owaspnzday2012&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Important dates==&lt;br /&gt;
&lt;br /&gt;
* CFP &amp;amp; CFT closes:		 		22nd July 2012 [ CLOSED ]&lt;br /&gt;
* Conference Agenda due: 			30th July 2012 &lt;br /&gt;
* Conference Registration deadline: 		20th August 2012&lt;br /&gt;
* Training Registration deadline: 		20th August 2012&lt;br /&gt;
* Training Day date: 				30th August 2012&lt;br /&gt;
* Conference Day date: 				31st August 2012&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Conference Venue==&lt;br /&gt;
&lt;br /&gt;
The University of Auckland Business School&amp;lt;br&amp;gt;&lt;br /&gt;
Owen G Glenn Building&amp;lt;br&amp;gt;&lt;br /&gt;
Room: OGGB 260-073 (OGGB4)&amp;lt;br&amp;gt;&lt;br /&gt;
Address: 12 Grafton Road&amp;lt;br&amp;gt;&lt;br /&gt;
Auckland&amp;lt;br&amp;gt;&lt;br /&gt;
New Zealand&amp;lt;br&amp;gt;&lt;br /&gt;
[http://maps.google.com/maps?oe=UTF-8&amp;amp;ie=UTF8&amp;amp;q=auckland+business+school&amp;amp;fb=1&amp;amp;split=1&amp;amp;cid=0,0,12303692579639430581&amp;amp;ei=6WeqSZr_OZLFkAWR--zbDQ&amp;amp;ll=-36.852308,174.770916&amp;amp;spn=0.01056,0.020621&amp;amp;z=16&amp;amp;iwloc=A Map]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;[[Image:Auckland_business_school_small2.jpg]] [[Image:Room_hall.jpg]]&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Conference Sponsors==&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;bottom&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;[http://www.auckland.ac.nz/ https://www.owasp.org/images/8/82/University_of_Auckland_crest_small.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;bottom&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;[http://www.security.org.nz/NZISF_NZISForumContent.php https://www.owasp.org/images/5/5a/Nz_information_security_forum.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;ICT and Department of Information Systems and Operations Management&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Gold Sponsors:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com https://www.owasp.org/images/4/41/SA_Logo_w_DD.gif]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[[File:F5aura-small.jpg|center|350px|link=http://www.aurainfosec.com/]]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com www.security-assessment.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.aurasoftwaresecurity.co.nz Aura Information Security in partnership with F5 Networks]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Silver Sponsors:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[[File:INSOMNIA.PNG|center|200px|link=http://www.insomniasec.com]]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.insomniasec.com/ www.insomniasec.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.lateralsecurity.com/ https://www.owasp.org/images/f/f4/Lateral_security.jpeg]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.lateralsecurity.com/ www.lateralsecurity.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[[File:webdrive_logo.jpg|center|200px|link=]]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.webdrive.co.nz/ www.webdrive.co.nz]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Conference Committee==&lt;br /&gt;
&lt;br /&gt;
* Nick Freeman - OWASP New Zealand Leader (Auckland)&lt;br /&gt;
* Adrian Hayes -  OWASP New Zealand Leader (Wellington)&lt;br /&gt;
* Lech Janczewski - Associate Professor - University of Auckland School of Business&lt;br /&gt;
&lt;br /&gt;
Please direct all enquiries to nick.freeman@owasp.org and adrian.hayes@owasp.org.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Training =&lt;br /&gt;
==Training==&lt;br /&gt;
&lt;br /&gt;
===Test-Driven Security===&lt;br /&gt;
-----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The purpose of this training is to introduce and demonstrate some&lt;br /&gt;
application of test-driven security. Based on a ruby application, we&lt;br /&gt;
are going to see how developers and testers can quickly improve and&lt;br /&gt;
ensure the security of an application by asking themselves some simple&lt;br /&gt;
questions and by checking simple things in their test cases.&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Trainer:&amp;lt;/b&amp;gt; Louis Nyffenegger - PentesterLab&lt;br /&gt;
&lt;br /&gt;
Louis is a security consultant working in Melbourne for Securus&lt;br /&gt;
Global. He focus on web application security and presented to Ruxcon,&lt;br /&gt;
Owasp and Auscert. In his spare, he works on 2 side projects:&lt;br /&gt;
pentesterlab (a training web site) and pntstr (an easy web to run the&lt;br /&gt;
first round of an interview).&lt;br /&gt;
&lt;br /&gt;
[https://pentesterlab.com/ PentesterLab.com]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Trainee Requiements&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Laptop&lt;br /&gt;
* Some virtualisation software able to run an ISO. I.e. VirtualBox or VMWare.&lt;br /&gt;
* A basic Ruby understanding&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Time:&amp;lt;/b&amp;gt; 9am till 12pm, 30th August 2012&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Cost:&amp;lt;/b&amp;gt; $250.00&lt;br /&gt;
&lt;br /&gt;
[https://www.regonline.com/owaspnzday2012 Register here!]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Teaching the Good-Guys Bad-Tricks - OWASP Top 10 in real-life===&lt;br /&gt;
-----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;quot;I'm taught and I forget, I do and I remember&amp;quot; is particularly true with web-security. &lt;br /&gt;
At this session you will have web-security and insecurity clearly explained and we'll walk through clear examples.&lt;br /&gt;
But not only will you learn the OWASP Top 10 but you will also hand-craft your own attacks.&lt;br /&gt;
In our fully functional hack-lab websites you will have a variety of hack challenges from hacking into other users' accounts, stealing credit cards and killing websites!&lt;br /&gt;
But wait, there's more! We'll also cover techniques you need to employ to defend these attacks.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Trainer:&amp;lt;/b&amp;gt;  Andy Prow - Aura&lt;br /&gt;
&lt;br /&gt;
Andy Prow is an IT Security Consultant, Trainer and software developer who founded Aura back in 2001. With 18 years in the IT industry Andy has developed code for IBM, Vodafone, Telecom and Microsoft. Andy presents around the world at conferences including Microsoft's TechEd.&lt;br /&gt;
&lt;br /&gt;
[http://www.aurainfosec.com/ AuraInfoSec.com]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Trainee Requiements&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Laptop&lt;br /&gt;
* A working browser and the [http://portswigger.net/burp/ Burp Suite] free edition installed.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Time:&amp;lt;/b&amp;gt; 9am till 5pm, 30th August 2012&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Cost:&amp;lt;/b&amp;gt; $500.00&lt;br /&gt;
&lt;br /&gt;
[https://www.regonline.com/owaspnzday2012 Register here!]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Conference Schedule =&lt;br /&gt;
==Conference Schedule==&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
31st August 2012&lt;br /&gt;
&amp;lt;table width=&amp;quot;80%&amp;quot;&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;08:30&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #8595C2&amp;quot;&amp;gt;Registration&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;09:00&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Welcome to OWASP New Zealand Day 2012&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Adrian Hayes and Nick Freeman (OWASP Leaders)&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;09:10&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #B9C2DC; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;How do I get into Security? I'm a webdev! (An introduction to in2securITy)&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Adam Bell - in2securITy&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;09:25&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Blindsided by Security - The Reality of Web Security for the Visually Impaired&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Laura Bell - Lateral Security and Britta Offergeld - Royal New Zealand Foundation of the Blind&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;10:00&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #B9C2DC; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Internet Junk&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Quintin Russ - SiteHost&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;10:30&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #D98B66; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Break for Morning Tea&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;11:00&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Defeating Cross-Site Scripting with Content Security Policy&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Francois Marier - Mozilla&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;11:20&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #B9C2DC; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;The Dos and Don'ts of Web Application Frameworks&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Denis Andzakovic - Security-Assessment.com&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;11:50&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Web Application Firewalls - Going where no WAFs have gone before...&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Sam Pickles - F5, and Andy Prow - Aura&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;12:30&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #D98B66; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Break for Lunch&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;13:45&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;background-color: #B9C2DC; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Mobile NFC 101&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Nick von Dadelszen - Lateral Security&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;background-color: #B9C2DC; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Comply or Die Trying&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Andrew Kelly&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;14:45&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Going Down to the Wire&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Kirk Jackson - Xero and Mike Haworth - Aura&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Increasing The Value of Penetration Testing&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Brett Moore- Insomnia Security&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;15:30&amp;lt;/td&amp;gt;&lt;br /&gt;
&lt;br /&gt;
		&amp;lt;td style=&amp;quot;background-color: #B9C2DC; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;An (Unofficial) OWASP Top 10 for Managers&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Dean Carter and Shahn Harris - Lateral Security&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;16:00&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #D98B66; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Break for Afternoon Tea&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;16:30&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Discussion Panel and Wrap-up&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&lt;br /&gt;
	&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
	&lt;br /&gt;
= Speakers List=&lt;br /&gt;
==Speakers List==&lt;br /&gt;
&lt;br /&gt;
===Adam Bell - in2securITy - How do I get into Security? I'm a webdev! (An introduction to in2securITy)===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A brief introduction to in2securITy, it's aims and goals.  A particular focus on the availability of mentoring, peers and the secure development stream.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Andrew Kelly - Comply or Die Trying===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
We all have to comply with something: Laws or bylaws - regulations or recommendations - industry standards or industry best-practice. This OWASP talk will focus on the 'real-world' application of security policy and compliance in IT and business. How policy and compliance can actually be very useful when it comes to securing your job, your company - and your company's future. Both from an IT - and a business/commercial prospective. And - along the way - some common myths, misconceptions and downright misunderstandings around policy and compliance may well be busted. Come and listen to a guy who actually thinks compliance and policy ... are fun!&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Andrew brings 27 years IT experience to OWASP - 24 of them in IT Security - and 13 of those spent in the UK and Europe (okay ... Belgium).&lt;br /&gt;
Now despite starting out as a mainframe uber-tech - Andrew's recognised today as being a 'pragmatic' subject-matter expert on corporate information security policy, compliance and governance. Andrew created his first BS 7799-compliant security policy - for a credit card&lt;br /&gt;
provider - in Cardiff back in 1999. Since then he's done much the same for the a number of security consultancies (NZ and UK),&lt;br /&gt;
Fonterra, Transpower and Telecom (NZ) - and BT, Deutsche Bank, Lloyds/TSB Bank and Legal &amp;amp; General Assurance (UK) - amongst many others.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Andy Prow and Sam Pickles - Aura and F5 - Web Application Firewalls - Going where no WAFs have gone before...===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
So we all know that WAFs (web application firewalls) are not the silver bullet they're often sold as. Many of us in the pen-testing space completely discount their value as dumb signature based systems that are bypassed with a flurry of keystrokes and encoding. BUT WAFs are getting MUCH smarter, and you may be really interested to see what a really intelligent WAF can do today. Ever thought a WAF could stop attacks against business logic flaws and broken authorisation?&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Andy Prow is an IT Security Consultant, Trainer and software developer who founded Aura back in 2001. With 18 years in the IT industry Andy has developed code for IBM, Vodafone, Telecom and Microsoft. Andy presents around the world at conferences including Microsoft's TechEd&lt;br /&gt;
&lt;br /&gt;
Sam Pickles is a senior engineer and security specialist with F5 Networks. During over twelve years of security industry experience, Sam has designed and built IT security systems; and conducted network, application and hardware penetration testing in many countries. Sam studied Physics at the University of Otago, and Computer Science at the University of Oxford; and has presented at events including ISIG, First Tuesday, OWASP and AusCERT.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Brett Moore - Insomnia Security - Increasing The Value of Penetration Testing===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Penetration testing has become fairy accepted now as part of the requirements of any new project. Is it really part of a company's security practices, or is it just a tick in the box? This presentation will examine how effective this is for organisations and how it can best be used to increase the usefulness from this type of work. &lt;br /&gt;
&lt;br /&gt;
* What is, and what isn't penetration testing&lt;br /&gt;
* How cost effective is this method as a security measure?&lt;br /&gt;
* How should it fit into the software development lifecycle of any application or network?&lt;br /&gt;
* what you should look for in a company doing this work&lt;br /&gt;
* what part of the work can you do yourselves  &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Having conducted vulnerability assessments, network reviews, and penetration tests for the majority of the large companies in New Zealand, Insomnia founder Brett Moore brings with him over ten years experience in information security. During this time, Brett has also worked with companies such as SUN Microsystems, Skype Limited and Microsoft Corporation by reporting and helping to fix security vulnerabilities in their products. Brett has released numerous whitepapers and technical postings related to security issues and has spoken at security conferences both locally and overseas, including BlackHat, Defcon, Syscan, Kiwicon, Ruxcon, and the invitation only Microsoft internal security conference called BlueHat.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Dean Carter and Shahn Harris - Lateral Security - An (Unofficial) OWASP Top 10 for Managers===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 Web Application Security Risks has done a fantastic job&lt;br /&gt;
at a technical level.&lt;br /&gt;
&lt;br /&gt;
Dean and Shahn have decided to turn their attention to the layer above&lt;br /&gt;
and create a Top 10 for Managers.&lt;br /&gt;
&lt;br /&gt;
10 things to assist Managers in ensuring that their web application&lt;br /&gt;
projects are delivered in a secure, measurable, repeatable manner.&lt;br /&gt;
&lt;br /&gt;
Oh… and they don’t cost a lot….&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Denis Andzakovic - Security-Assessment.com - The Dos and Don'ts of Web Application Frameworks ===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Don't roll your own&amp;quot; has been common advice over the past decade;&lt;br /&gt;
however even when heeding these words, insecure practices and common&lt;br /&gt;
mistakes lead to glaring security holes. This talk will cover some of&lt;br /&gt;
the common errors made when implementing applcations based around web&lt;br /&gt;
frameworks, where to look for vulnerabilities and how to avoid them.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Denis is a Security Consultant for Security-Assessment.com, a security&lt;br /&gt;
consultancy based in Auckland, Wellington, and Singapore.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Francois Marier - Mozilla - Defeating Cross-Site Scripting with Content Security Policy===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Cross-site scripting vulnerabilities are very common in web applications. They have been in the OWASP top 10 for a while and are routinely used by attackers.&lt;br /&gt;
&lt;br /&gt;
There are simple guidelines that one can follow to prevent XSS bugs and most of the web frameworks out there offer some level of protection but at the end of the day, it's easy to make a mistake.&lt;br /&gt;
&lt;br /&gt;
Content Security Policy adds another layer to a website's defenses: browser-enforced restrictions against external resources or unauthorized scripting. An extra response header instructs browsers to enforce a policy set by the server administrator.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Francois is a software engineer on the Mozilla Identity team where he&lt;br /&gt;
works on Persona, the new decentralized authentication system for the&lt;br /&gt;
open web. A long time Debian developer, Francois has been involved in Open Source&lt;br /&gt;
and web development for a while and has always had a strong interest in&lt;br /&gt;
security.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Kirk Jackson and Mike Haworth - Xero and Aura -  Going Down to the Wire===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
You've built the flashiest web app your cow-orkers have ever seen.&lt;br /&gt;
Your boss loves you, and nominates you for a promotion next financial&lt;br /&gt;
year. You've leveraged the latest hip web framework, and have jaxed&lt;br /&gt;
your ajax to the max.&lt;br /&gt;
&lt;br /&gt;
But have you done everything you can to make your application secure?&lt;br /&gt;
Are you perhaps, in fact, doing a little _too much_?&lt;br /&gt;
&lt;br /&gt;
A common issue we've come across in the past few years is applications&lt;br /&gt;
that share too much information over the wire, or trust too much of&lt;br /&gt;
what they receive. In this talk we'll look at some common pitfalls and&lt;br /&gt;
techniques to counter them in modern web applications.&lt;br /&gt;
&lt;br /&gt;
Let's go down to the wire.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Kirk works at Xero as a Security Architect, co-hosts the Wellington .NET user group, and is a Microsoft Developer Security MVP. He has previous experience in building and penetration testing large web applications.&lt;br /&gt;
&lt;br /&gt;
Mike has previously spoken at OWASP and Kiwicon. He is a contributor to the BeEF project and spends his days pentesting for Aura Information Security.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Laura Bell - Lateral Security and Britta Offergeld – Royal New Zealand Foundation of the Blind - Blindsided by Security - The Reality of Web Security for the Visually Impaired===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Digital self-defence is now seen as a valuable life skill. As web developers we try to design systems that can protect as well as provide for our clients. As security consultants, we develop guidelines and frameworks that people can use to decide if a web application is trustworthy and secure. Even the least technical home users are becoming more confident in spotting suspicious behaviour online. Unfortunately, for the visually impaired, it’s not that simple. In a world where visual clues are not enough and where additional technologies such as screen readers are business as usual – web security is a very different matter.&lt;br /&gt;
&lt;br /&gt;
Lateral Security and The Royal New Zealand Foundation of the Blind will examine the guidance and security best practice commonly in use for web applications today and how effective they are for those with visual impairments. In a talk that mixes real world examples, demonstrations and discussion from both a usability and security perspective, we aim to not only outline the issues but also suggest some solutions.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Nick von Dadelszen - Lateral Security - Mobile NFC 101===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This talk is designed to provide a detailed understanding of NFC on mobile phones and security considerations associated with the technology.&lt;br /&gt;
&lt;br /&gt;
The participants should leave the presentation with an understanding of the technology behind NFC on mobile phones and how it interacts. They should obtain an understanding of the security considerations for NFC on Mobile and how it differs from standard NFC implementations.&lt;br /&gt;
&lt;br /&gt;
The agenda for the talk will be the following:&lt;br /&gt;
- Introduce the audience to NFC&lt;br /&gt;
- Discuss the current state of NFC on mobile phones&lt;br /&gt;
- Analyse the technology involved and how this is used to develop NFC applications&lt;br /&gt;
- Discuss the security considerations of NFC on mobile devices&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Quintin Russ - SiteHost - Internet Junk===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Junk, we all have it. Some have more, a lot more ... Whether you have accepted your Trademe addiction or are still in denial we all have a problem. Just like Space we are filling up the Internet with junk. What happens to our websites when we are finished with them? How are they closed? Are they ever closed? This talk will look at what sort of junk is left behind and how this can be used to attack your organisation. We will cover the issues with real world examples and time allowing, discuss simple steps to help overcome your Trademe addiction should you have one. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Quintin has carved out his own niche in the .nz hosting industry, having spent a large proportion of the last few years becoming an expert in both building and defending systems. He now runs enough infrastructure to ensure he never, ever gets a good night's sleep, and sometimes doesn't even get to snooze through Sunday mornings. Quintin has a keen interest in security, especially as it relates to web hosting. This has ranged from the vicissitudes of shared hosting to code reviews of popular blogging applications. He has previously presented at ISIG, OWASP &amp;amp; Kiwicon. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Registration =&lt;br /&gt;
==Registration==&lt;br /&gt;
&lt;br /&gt;
As with last year, registration will be performed through the RegOnline system. Registrations will be limited to 300 people, so please register using the following link soon to reserve your spot!&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;[https://www.regonline.com/owaspnzday2012 Register here!] - https://www.regonline.com/owaspnzday2012&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Call For Sponsorships =&lt;br /&gt;
==Call For Sponsorships==&lt;br /&gt;
&lt;br /&gt;
As mentioned above, OWASP New Zealand Day 2012 will be held in Auckland on the 31st of August, 2012. OWASP New Zealand Day is a security conference entirely dedicated to web application security. The conference is once again being hosted by the University of Auckland with their support and assistance. OWASP New Zealand Day 2012 is a free event, but requires sponsor support to help be an instructive and quality event for the New Zealand community. OWASP is strictly non for profit. The sponsorship money will be used to help make OWASP New Zealand Day 2012 a free, compelling and valuable experience for the audience. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The sponsorship funds collected are to be used for things such as: &lt;br /&gt;
&lt;br /&gt;
* Refreshments (coffee break/lunch) - we want to keep people refreshed during the day; while we certainly bring good and interesting speakers, we don't want people to go home when they become hungry. &lt;br /&gt;
* Name tags - we feel that getting to know people within the New Zealand community is important, and name tags make that possible. &lt;br /&gt;
* Promotion - up to now our events are propagating by word of mouth. We would like to get to a wider audience by advertising our events. &lt;br /&gt;
* Printed Materials - printed materials will include brochures, tags and lanyards.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Facts ==&lt;br /&gt;
&lt;br /&gt;
Last year, the event was supported by 5 sponsors and attracted more than 200 participants. Plenty of constructive (and positive!) feedback from the audience was received and we are using this to make the conference more appealing to more people. For more information on last year's event, please visit: https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2011 &lt;br /&gt;
&lt;br /&gt;
The OWASP New Zealand community is strong and there are more than 220 people currently subscribed to the mailing-list. OWASP New Zealand Day is expected to attract between 200 and 250 attendees this year.&lt;br /&gt;
&lt;br /&gt;
OWASP regular attendees are IT project managers, IT security managers, IT security consultants, web application architects and developers, QA managers, QA testers and system administrators.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Sponsorships  ==&lt;br /&gt;
&lt;br /&gt;
There are three different levels of sponsorships for the OWASP Day event:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* &amp;lt;b&amp;gt;Support Sponsorship&amp;lt;/b&amp;gt;: (Covering international speaker travel expenses, media coverage/article/promotion of the event)&lt;br /&gt;
	&lt;br /&gt;
Includes:&lt;br /&gt;
&lt;br /&gt;
	- Publication of the sponsor logo on the event web site - https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2012&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* &amp;lt;b&amp;gt;Silver Sponsorship&amp;lt;/b&amp;gt;: 1500 NZD&lt;br /&gt;
&lt;br /&gt;
	Includes: &lt;br /&gt;
&lt;br /&gt;
	- Publication of the sponsor logo on the event web site - https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2012&amp;lt;br&amp;gt;&lt;br /&gt;
	- The publication of the sponsor logo in the event site, in the agenda, on the flyers, brochure and in all the official communications with the attendees at the conference.&amp;lt;br&amp;gt;&lt;br /&gt;
	- The possibility to distribute the company brochures, CDs or other materials to the participants during the event.&amp;lt;br&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
* &amp;lt;b&amp;gt;Gold Sponsorship&amp;lt;/b&amp;gt;: 2750 or 3500 NZD (see below)&lt;br /&gt;
&lt;br /&gt;
	Includes: &lt;br /&gt;
&lt;br /&gt;
	- The publication of the sponsor logo in the event site, in the agenda, on the handouts and in all the official communications with the attendees at the conference.&amp;lt;br&amp;gt;&lt;br /&gt;
	- The possibility to distribute the company brochures, CDs or other materials to the participants during the event.&amp;lt;br&amp;gt;&lt;br /&gt;
	- Publication of the sponsor logo on the OWASP New Zealand Chapter page&amp;lt;br&amp;gt;&lt;br /&gt;
	- Sponsor logo on the OWASP NZ site prior and during the OWASP Day event - https://www.owasp.org/index.php/New_Zealand&amp;lt;br&amp;gt;&lt;br /&gt;
	- Publication of the sponsor logo on the event web site - https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2012&amp;lt;br&amp;gt;&lt;br /&gt;
	- Sponsor dedicated space at the conference (sponsor booth) to show products/services to the attendees during coffee breaks, lunch and snack breaks. If a booth is not required, the Gold Sponsorship fee is 2750 NZD instead of 3500 NZD.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Those who are interested in sponsoring OWASP New Zealand 2012 Conference can contact the [mailto:nick.freeman@owasp.org?cc=adrian.hayes@owasp.org OWASP New Zealand Board].&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Conference Dates =&lt;br /&gt;
==Conference Dates==&lt;br /&gt;
&lt;br /&gt;
Please find below important dates for the conference:&lt;br /&gt;
&lt;br /&gt;
* CFP &amp;amp; CFT closes:		 		22nd July 2012 [CLOSED]&lt;br /&gt;
* Conference Agenda due: 			30th July 2012 &lt;br /&gt;
* Conference Registration deadline: 		20th August 2012&lt;br /&gt;
* Training Registration deadline: 		20th August 2012&lt;br /&gt;
* Training Day date: 				30th August 2012&lt;br /&gt;
* Conference Day date: 				31st August 2012&lt;br /&gt;
&lt;br /&gt;
= Conference Committee =&lt;br /&gt;
==OWASP New Zealand Day 2012 Organising Committee==&lt;br /&gt;
&lt;br /&gt;
* Nick Freeman - OWASP New Zealand Leader (Auckland)&lt;br /&gt;
* Adrian Hayes - OWASP New Zealand Leader (Wellington)&lt;br /&gt;
* Lech Janczewski - Associate Professor - University of Auckland School of Business&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]]&lt;/div&gt;</summary>
		<author><name>Adrian Hayes</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:F5aura-small.jpg&amp;diff=133911</id>
		<title>File:F5aura-small.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:F5aura-small.jpg&amp;diff=133911"/>
				<updated>2012-08-05T21:36:30Z</updated>
		
		<summary type="html">&lt;p&gt;Adrian Hayes: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Adrian Hayes</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_New_Zealand_Day_2012&amp;diff=133777</id>
		<title>OWASP New Zealand Day 2012</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_New_Zealand_Day_2012&amp;diff=133777"/>
				<updated>2012-08-02T02:05:31Z</updated>
		
		<summary type="html">&lt;p&gt;Adrian Hayes: valigned top times in schedule table.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&amp;lt;center&amp;gt;'''OWASP New Zealand Day 2012&amp;lt;br&amp;gt;30th and 31st August 2012 - Auckland'''&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2012 https://www.owasp.org/images/a/ad/Owaspnz2012logo.png]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
= Introduction =&lt;br /&gt;
==Introduction==&lt;br /&gt;
We are proud to announce the fourth annual OWASP New Zealand Day conference, to be held at the University of Auckland on Friday August 31st, 2012. OWASP New Zealand Day is a one-day conference dedicated to web application security, with an emphasis on secure development techniques to help Kiwi developers build more secure applications.&lt;br /&gt;
&lt;br /&gt;
Based on feedback from last year, the structure of the conference will be slightly different this time. &lt;br /&gt;
&lt;br /&gt;
* We will be offering training on the day before the conference (Thursday August 30th) rather than at the same time as the conference. &lt;br /&gt;
* After lunch on the conference day, we will split to two tracks - one focused on deep technical topics, the other on policy, compliance and risk management. &lt;br /&gt;
&lt;br /&gt;
The fourth OWASP New Zealand Day will be happening thanks to the support provided by the University of Auckland School of Business, which will kindly offer the same conference venue of the last three years. Entry to the event will, as in the past, be free. &lt;br /&gt;
&lt;br /&gt;
For any comments, feedback or observations, please don't hesitate to contact [mailto:nick.freeman@owasp.org?cc=adrian.hayes@owasp.org us].&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Registration==&lt;br /&gt;
&lt;br /&gt;
As with last year, registration will be performed through the RegOnline system. Registrations will be limited to 300 people, so please register using the following link soon to reserve your spot!&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;[https://www.regonline.com/owaspnzday2012 Register here!] - https://www.regonline.com/owaspnzday2012&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Important dates==&lt;br /&gt;
&lt;br /&gt;
* CFP &amp;amp; CFT closes:		 		22nd July 2012 [ CLOSED ]&lt;br /&gt;
* Conference Agenda due: 			30th July 2012 &lt;br /&gt;
* Conference Registration deadline: 		20th August 2012&lt;br /&gt;
* Training Registration deadline: 		20th August 2012&lt;br /&gt;
* Training Day date: 				30th August 2012&lt;br /&gt;
* Conference Day date: 				31st August 2012&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Conference Venue==&lt;br /&gt;
&lt;br /&gt;
The University of Auckland Business School&amp;lt;br&amp;gt;&lt;br /&gt;
Owen G Glenn Building&amp;lt;br&amp;gt;&lt;br /&gt;
Room: OGGB 260-073 (OGGB4)&amp;lt;br&amp;gt;&lt;br /&gt;
Address: 12 Grafton Road&amp;lt;br&amp;gt;&lt;br /&gt;
Auckland&amp;lt;br&amp;gt;&lt;br /&gt;
New Zealand&amp;lt;br&amp;gt;&lt;br /&gt;
[http://maps.google.com/maps?oe=UTF-8&amp;amp;ie=UTF8&amp;amp;q=auckland+business+school&amp;amp;fb=1&amp;amp;split=1&amp;amp;cid=0,0,12303692579639430581&amp;amp;ei=6WeqSZr_OZLFkAWR--zbDQ&amp;amp;ll=-36.852308,174.770916&amp;amp;spn=0.01056,0.020621&amp;amp;z=16&amp;amp;iwloc=A Map]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;[[Image:Auckland_business_school_small2.jpg]] [[Image:Room_hall.jpg]]&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Conference Sponsors==&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;bottom&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;[http://www.auckland.ac.nz/ https://www.owasp.org/images/8/82/University_of_Auckland_crest_small.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;bottom&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;[http://www.security.org.nz/NZISF_NZISForumContent.php https://www.owasp.org/images/5/5a/Nz_information_security_forum.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;ICT and Department of Information Systems and Operations Management&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Gold Sponsors:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com https://www.owasp.org/images/4/41/SA_Logo_w_DD.gif]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.aurasoftwaresecurity.co.nz https://www.owasp.org/images/5/54/Auralogo3.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com www.security-assessment.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.aurasoftwaresecurity.co.nz Aura Information Security in partnership with F5 Networks]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Silver Sponsors:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[[File:INSOMNIA.PNG|center|200px|link=http://www.insomniasec.com]]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.insomniasec.com/ www.insomniasec.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.lateralsecurity.com/ https://www.owasp.org/images/f/f4/Lateral_security.jpeg]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.lateralsecurity.com/ www.lateralsecurity.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[[File:webdrive_logo.jpg|center|200px|link=]]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.webdrive.co.nz/ www.webdrive.co.nz]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Conference Committee==&lt;br /&gt;
&lt;br /&gt;
* Nick Freeman - OWASP New Zealand Leader (Auckland)&lt;br /&gt;
* Adrian Hayes -  OWASP New Zealand Leader (Wellington)&lt;br /&gt;
* Lech Janczewski - Associate Professor - University of Auckland School of Business&lt;br /&gt;
&lt;br /&gt;
Please direct all enquiries to nick.freeman@owasp.org and adrian.hayes@owasp.org.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Training =&lt;br /&gt;
==Training==&lt;br /&gt;
&lt;br /&gt;
===Test-Driven Security===&lt;br /&gt;
-----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The purpose of this training is to introduce and demonstrate some&lt;br /&gt;
application of test-driven security. Based on a ruby application, we&lt;br /&gt;
are going to see how developers and testers can quickly improve and&lt;br /&gt;
ensure the security of an application by asking themselves some simple&lt;br /&gt;
questions and by checking simple things in their test cases.&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Trainer:&amp;lt;/b&amp;gt; Louis Nyffenegger - PentesterLab&lt;br /&gt;
&lt;br /&gt;
Louis is a security consultant working in Melbourne for Securus&lt;br /&gt;
Global. He focus on web application security and presented to Ruxcon,&lt;br /&gt;
Owasp and Auscert. In his spare, he works on 2 side projects:&lt;br /&gt;
pentesterlab (a training web site) and pntstr (an easy web to run the&lt;br /&gt;
first round of an interview).&lt;br /&gt;
&lt;br /&gt;
[https://pentesterlab.com/ PentesterLab.com]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Trainee Requiements&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Laptop&lt;br /&gt;
* Some virtualisation software able to run an ISO. I.e. VirtualBox or VMWare.&lt;br /&gt;
* A basic Ruby understanding&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Time:&amp;lt;/b&amp;gt; 9am till 12pm, 30th August 2012&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Cost:&amp;lt;/b&amp;gt; $250.00&lt;br /&gt;
&lt;br /&gt;
[https://www.regonline.com/owaspnzday2012 Register here!]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Teaching the Good-Guys Bad-Tricks - OWASP Top 10 in real-life===&lt;br /&gt;
-----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;quot;I'm taught and I forget, I do and I remember&amp;quot; is particularly true with web-security. &lt;br /&gt;
At this session you will have web-security and insecurity clearly explained and we'll walk through clear examples.&lt;br /&gt;
But not only will you learn the OWASP Top 10 but you will also hand-craft your own attacks.&lt;br /&gt;
In our fully functional hack-lab websites you will have a variety of hack challenges from hacking into other users' accounts, stealing credit cards and killing websites!&lt;br /&gt;
But wait, there's more! We'll also cover techniques you need to employ to defend these attacks.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Trainer:&amp;lt;/b&amp;gt;  Andy Prow - Aura&lt;br /&gt;
&lt;br /&gt;
Andy Prow is an IT Security Consultant, Trainer and software developer who founded Aura back in 2001. With 18 years in the IT industry Andy has developed code for IBM, Vodafone, Telecom and Microsoft. Andy presents around the world at conferences including Microsoft's TechEd.&lt;br /&gt;
&lt;br /&gt;
[http://www.aurainfosec.com/ AuraInfoSec.com]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Trainee Requiements&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Laptop&lt;br /&gt;
* A working browser and the [http://portswigger.net/burp/ Burp Suite] free edition installed.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Time:&amp;lt;/b&amp;gt; 9am till 5pm, 30th August 2012&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Cost:&amp;lt;/b&amp;gt; $500.00&lt;br /&gt;
&lt;br /&gt;
[https://www.regonline.com/owaspnzday2012 Register here!]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Conference Schedule =&lt;br /&gt;
==Conference Schedule==&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
31st August 2012&lt;br /&gt;
&amp;lt;table width=&amp;quot;80%&amp;quot;&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;08:30&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #8595C2&amp;quot;&amp;gt;Registration&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;09:00&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Welcome to OWASP New Zealand Day 2012&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Adrian Hayes and Nick Freeman (OWASP Leaders)&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;09:10&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #B9C2DC; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;How do I get into Security? I'm a webdev! (An introduction to in2securITy)&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Adam Bell - in2securITy&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;09:25&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Blindsided by Security - The Reality of Web Security for the Visually Impaired&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Laura Bell - Lateral Security and Britta Offergeld - Royal New Zealand Foundation of the Blind&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;10:00&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #B9C2DC; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Internet Junk&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Quintin Russ - SiteHost&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;10:30&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #D98B66; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Break for Morning Tea&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;11:00&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Defeating Cross-Site Scripting with Content Security Policy&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Francois Marier - Mozilla&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;11:20&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #B9C2DC; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;The Dos and Don'ts of Web Application Frameworks&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Denis Andzakovic - Security-Assessment.com&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;11:50&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Web Application Firewalls - Going where no WAFs have gone before...&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Sam Pickles - F5, and Andy Prow - Aura&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;12:30&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #D98B66; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Break for Lunch&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;13:45&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;background-color: #B9C2DC; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Mobile NFC 101&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Nick von Dadelszen - Lateral Security&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;background-color: #B9C2DC; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Comply or Die Trying&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Andrew Kelly&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;14:45&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Going Down to the Wire&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Kirk Jackson - Xero and Mike Haworth - Aura&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Increasing The Value of Penetration Testing&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Brett Moore- Insomnia Security&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;15:30&amp;lt;/td&amp;gt;&lt;br /&gt;
&lt;br /&gt;
		&amp;lt;td style=&amp;quot;background-color: #B9C2DC; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;An (Unofficial) OWASP Top 10 for Managers&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Dean Carter and Shahn Harris - Lateral Security&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;16:00&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #D98B66; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Break for Afternoon Tea&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;16:30&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Discussion Panel and Wrap-up&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&lt;br /&gt;
	&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
	&lt;br /&gt;
= Speakers List=&lt;br /&gt;
==Speakers List==&lt;br /&gt;
&lt;br /&gt;
===Adam Bell - in2securITy - How do I get into Security? I'm a webdev! (An introduction to in2securITy)===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A brief introduction to in2securITy, it's aims and goals.  A particular focus on the availability of mentoring, peers and the secure development stream.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Andrew Kelly - Comply or Die Trying===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
We all have to comply with something: Laws or bylaws - regulations or recommendations - industry standards or industry best-practice. This OWASP talk will focus on the 'real-world' application of security policy and compliance in IT and business. How policy and compliance can actually be very useful when it comes to securing your job, your company - and your company's future. Both from an IT - and a business/commercial prospective. And - along the way - some common myths, misconceptions and downright misunderstandings around policy and compliance may well be busted. Come and listen to a guy who actually thinks compliance and policy ... are fun!&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Andrew brings 27 years IT experience to OWASP - 24 of them in IT Security - and 13 of those spent in the UK and Europe (okay ... Belgium).&lt;br /&gt;
Now despite starting out as a mainframe uber-tech - Andrew's recognised today as being a 'pragmatic' subject-matter expert on corporate information security policy, compliance and governance. Andrew created his first BS 7799-compliant security policy - for a credit card&lt;br /&gt;
provider - in Cardiff back in 1999. Since then he's done much the same for the a number of security consultancies (NZ and UK),&lt;br /&gt;
Fonterra, Transpower and Telecom (NZ) - and BT, Deutsche Bank, Lloyds/TSB Bank and Legal &amp;amp; General Assurance (UK) - amongst many others.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Andy Prow and Sam Pickles - Aura and F5 - Web Application Firewalls - Going where no WAFs have gone before...===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
So we all know that WAFs (web application firewalls) are not the silver bullet they're often sold as. Many of us in the pen-testing space completely discount their value as dumb signature based systems that are bypassed with a flurry of keystrokes and encoding. BUT WAFs are getting MUCH smarter, and you may be really interested to see what a really intelligent WAF can do today. Ever thought a WAF could stop attacks against business logic flaws and broken authorisation?&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Andy Prow is an IT Security Consultant, Trainer and software developer who founded Aura back in 2001. With 18 years in the IT industry Andy has developed code for IBM, Vodafone, Telecom and Microsoft. Andy presents around the world at conferences including Microsoft's TechEd&lt;br /&gt;
&lt;br /&gt;
Sam Pickles is a senior engineer and security specialist with F5 Networks. During over twelve years of security industry experience, Sam has designed and built IT security systems; and conducted network, application and hardware penetration testing in many countries. Sam studied Physics at the University of Otago, and Computer Science at the University of Oxford; and has presented at events including ISIG, First Tuesday, OWASP and AusCERT.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Brett Moore - Insomnia Security - Increasing The Value of Penetration Testing===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Penetration testing has become fairy accepted now as part of the requirements of any new project. Is it really part of a company's security practices, or is it just a tick in the box? This presentation will examine how effective this is for organisations and how it can best be used to increase the usefulness from this type of work. &lt;br /&gt;
&lt;br /&gt;
* What is, and what isn't penetration testing&lt;br /&gt;
* How cost effective is this method as a security measure?&lt;br /&gt;
* How should it fit into the software development lifecycle of any application or network?&lt;br /&gt;
* what you should look for in a company doing this work&lt;br /&gt;
* what part of the work can you do yourselves  &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Having conducted vulnerability assessments, network reviews, and penetration tests for the majority of the large companies in New Zealand, Insomnia founder Brett Moore brings with him over ten years experience in information security. During this time, Brett has also worked with companies such as SUN Microsystems, Skype Limited and Microsoft Corporation by reporting and helping to fix security vulnerabilities in their products. Brett has released numerous whitepapers and technical postings related to security issues and has spoken at security conferences both locally and overseas, including BlackHat, Defcon, Syscan, Kiwicon, Ruxcon, and the invitation only Microsoft internal security conference called BlueHat.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Dean Carter and Shahn Harris - Lateral Security - An (Unofficial) OWASP Top 10 for Managers===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 Web Application Security Risks has done a fantastic job&lt;br /&gt;
at a technical level.&lt;br /&gt;
&lt;br /&gt;
Dean and Shahn have decided to turn their attention to the layer above&lt;br /&gt;
and create a Top 10 for Managers.&lt;br /&gt;
&lt;br /&gt;
10 things to assist Managers in ensuring that their web application&lt;br /&gt;
projects are delivered in a secure, measurable, repeatable manner.&lt;br /&gt;
&lt;br /&gt;
Oh… and they don’t cost a lot….&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Denis Andzakovic - Security-Assessment.com - The Dos and Don'ts of Web Application Frameworks ===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Don't roll your own&amp;quot; has been common advice over the past decade;&lt;br /&gt;
however even when heeding these words, insecure practices and common&lt;br /&gt;
mistakes lead to glaring security holes. This talk will cover some of&lt;br /&gt;
the common errors made when implementing applcations based around web&lt;br /&gt;
frameworks, where to look for vulnerabilities and how to avoid them.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Denis is a Security Consultant for Security-Assessment.com, a security&lt;br /&gt;
consultancy based in Auckland, Wellington, and Singapore.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Francois Marier - Mozilla - Defeating Cross-Site Scripting with Content Security Policy===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Cross-site scripting vulnerabilities are very common in web applications. They have been in the OWASP top 10 for a while and are routinely used by attackers.&lt;br /&gt;
&lt;br /&gt;
There are simple guidelines that one can follow to prevent XSS bugs and most of the web frameworks out there offer some level of protection but at the end of the day, it's easy to make a mistake.&lt;br /&gt;
&lt;br /&gt;
Content Security Policy adds another layer to a website's defenses: browser-enforced restrictions against external resources or unauthorized scripting. An extra response header instructs browsers to enforce a policy set by the server administrator.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Francois is a software engineer on the Mozilla Identity team where he&lt;br /&gt;
works on Persona, the new decentralized authentication system for the&lt;br /&gt;
open web. A long time Debian developer, Francois has been involved in Open Source&lt;br /&gt;
and web development for a while and has always had a strong interest in&lt;br /&gt;
security.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Kirk Jackson and Mike Haworth - Xero and Aura -  Going Down to the Wire===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
You've built the flashiest web app your cow-orkers have ever seen.&lt;br /&gt;
Your boss loves you, and nominates you for a promotion next financial&lt;br /&gt;
year. You've leveraged the latest hip web framework, and have jaxed&lt;br /&gt;
your ajax to the max.&lt;br /&gt;
&lt;br /&gt;
But have you done everything you can to make your application secure?&lt;br /&gt;
Are you perhaps, in fact, doing a little _too much_?&lt;br /&gt;
&lt;br /&gt;
A common issue we've come across in the past few years is applications&lt;br /&gt;
that share too much information over the wire, or trust too much of&lt;br /&gt;
what they receive. In this talk we'll look at some common pitfalls and&lt;br /&gt;
techniques to counter them in modern web applications.&lt;br /&gt;
&lt;br /&gt;
Let's go down to the wire.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Kirk works at Xero as a Security Architect, co-hosts the Wellington .NET user group, and is a Microsoft Developer Security MVP. He has previous experience in building and penetration testing large web applications.&lt;br /&gt;
&lt;br /&gt;
Mike has previously spoken at OWASP and Kiwicon. He is a contributor to the BeEF project and spends his days pentesting for Aura Information Security.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Laura Bell - Lateral Security and Britta Offergeld – Royal New Zealand Foundation of the Blind - Blindsided by Security - The Reality of Web Security for the Visually Impaired===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Digital self-defence is now seen as a valuable life skill. As web developers we try to design systems that can protect as well as provide for our clients. As security consultants, we develop guidelines and frameworks that people can use to decide if a web application is trustworthy and secure. Even the least technical home users are becoming more confident in spotting suspicious behaviour online. Unfortunately, for the visually impaired, it’s not that simple. In a world where visual clues are not enough and where additional technologies such as screen readers are business as usual – web security is a very different matter.&lt;br /&gt;
&lt;br /&gt;
Lateral Security and The Royal New Zealand Foundation of the Blind will examine the guidance and security best practice commonly in use for web applications today and how effective they are for those with visual impairments. In a talk that mixes real world examples, demonstrations and discussion from both a usability and security perspective, we aim to not only outline the issues but also suggest some solutions.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Nick von Dadelszen - Lateral Security - Mobile NFC 101===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This talk is designed to provide a detailed understanding of NFC on mobile phones and security considerations associated with the technology.&lt;br /&gt;
&lt;br /&gt;
The participants should leave the presentation with an understanding of the technology behind NFC on mobile phones and how it interacts. They should obtain an understanding of the security considerations for NFC on Mobile and how it differs from standard NFC implementations.&lt;br /&gt;
&lt;br /&gt;
The agenda for the talk will be the following:&lt;br /&gt;
- Introduce the audience to NFC&lt;br /&gt;
- Discuss the current state of NFC on mobile phones&lt;br /&gt;
- Analyse the technology involved and how this is used to develop NFC applications&lt;br /&gt;
- Discuss the security considerations of NFC on mobile devices&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Quintin Russ - SiteHost - Internet Junk===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Junk, we all have it. Some have more, a lot more ... Whether you have accepted your Trademe addiction or are still in denial we all have a problem. Just like Space we are filling up the Internet with junk. What happens to our websites when we are finished with them? How are they closed? Are they ever closed? This talk will look at what sort of junk is left behind and how this can be used to attack your organisation. We will cover the issues with real world examples and time allowing, discuss simple steps to help overcome your Trademe addiction should you have one. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Quintin has carved out his own niche in the .nz hosting industry, having spent a large proportion of the last few years becoming an expert in both building and defending systems. He now runs enough infrastructure to ensure he never, ever gets a good night's sleep, and sometimes doesn't even get to snooze through Sunday mornings. Quintin has a keen interest in security, especially as it relates to web hosting. This has ranged from the vicissitudes of shared hosting to code reviews of popular blogging applications. He has previously presented at ISIG, OWASP &amp;amp; Kiwicon. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Registration =&lt;br /&gt;
==Registration==&lt;br /&gt;
&lt;br /&gt;
As with last year, registration will be performed through the RegOnline system. Registrations will be limited to 300 people, so please register using the following link soon to reserve your spot!&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;[https://www.regonline.com/owaspnzday2012 Register here!] - https://www.regonline.com/owaspnzday2012&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Call For Sponsorships =&lt;br /&gt;
==Call For Sponsorships==&lt;br /&gt;
&lt;br /&gt;
As mentioned above, OWASP New Zealand Day 2012 will be held in Auckland on the 31st of August, 2012. OWASP New Zealand Day is a security conference entirely dedicated to web application security. The conference is once again being hosted by the University of Auckland with their support and assistance. OWASP New Zealand Day 2012 is a free event, but requires sponsor support to help be an instructive and quality event for the New Zealand community. OWASP is strictly non for profit. The sponsorship money will be used to help make OWASP New Zealand Day 2012 a free, compelling and valuable experience for the audience. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The sponsorship funds collected are to be used for things such as: &lt;br /&gt;
&lt;br /&gt;
* Refreshments (coffee break/lunch) - we want to keep people refreshed during the day; while we certainly bring good and interesting speakers, we don't want people to go home when they become hungry. &lt;br /&gt;
* Name tags - we feel that getting to know people within the New Zealand community is important, and name tags make that possible. &lt;br /&gt;
* Promotion - up to now our events are propagating by word of mouth. We would like to get to a wider audience by advertising our events. &lt;br /&gt;
* Printed Materials - printed materials will include brochures, tags and lanyards.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Facts ==&lt;br /&gt;
&lt;br /&gt;
Last year, the event was supported by 5 sponsors and attracted more than 200 participants. Plenty of constructive (and positive!) feedback from the audience was received and we are using this to make the conference more appealing to more people. For more information on last year's event, please visit: https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2011 &lt;br /&gt;
&lt;br /&gt;
The OWASP New Zealand community is strong and there are more than 220 people currently subscribed to the mailing-list. OWASP New Zealand Day is expected to attract between 200 and 250 attendees this year.&lt;br /&gt;
&lt;br /&gt;
OWASP regular attendees are IT project managers, IT security managers, IT security consultants, web application architects and developers, QA managers, QA testers and system administrators.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Sponsorships  ==&lt;br /&gt;
&lt;br /&gt;
There are three different levels of sponsorships for the OWASP Day event:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* &amp;lt;b&amp;gt;Support Sponsorship&amp;lt;/b&amp;gt;: (Covering international speaker travel expenses, media coverage/article/promotion of the event)&lt;br /&gt;
	&lt;br /&gt;
Includes:&lt;br /&gt;
&lt;br /&gt;
	- Publication of the sponsor logo on the event web site - https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2012&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* &amp;lt;b&amp;gt;Silver Sponsorship&amp;lt;/b&amp;gt;: 1500 NZD&lt;br /&gt;
&lt;br /&gt;
	Includes: &lt;br /&gt;
&lt;br /&gt;
	- Publication of the sponsor logo on the event web site - https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2012&amp;lt;br&amp;gt;&lt;br /&gt;
	- The publication of the sponsor logo in the event site, in the agenda, on the flyers, brochure and in all the official communications with the attendees at the conference.&amp;lt;br&amp;gt;&lt;br /&gt;
	- The possibility to distribute the company brochures, CDs or other materials to the participants during the event.&amp;lt;br&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
* &amp;lt;b&amp;gt;Gold Sponsorship&amp;lt;/b&amp;gt;: 2750 or 3500 NZD (see below)&lt;br /&gt;
&lt;br /&gt;
	Includes: &lt;br /&gt;
&lt;br /&gt;
	- The publication of the sponsor logo in the event site, in the agenda, on the handouts and in all the official communications with the attendees at the conference.&amp;lt;br&amp;gt;&lt;br /&gt;
	- The possibility to distribute the company brochures, CDs or other materials to the participants during the event.&amp;lt;br&amp;gt;&lt;br /&gt;
	- Publication of the sponsor logo on the OWASP New Zealand Chapter page&amp;lt;br&amp;gt;&lt;br /&gt;
	- Sponsor logo on the OWASP NZ site prior and during the OWASP Day event - https://www.owasp.org/index.php/New_Zealand&amp;lt;br&amp;gt;&lt;br /&gt;
	- Publication of the sponsor logo on the event web site - https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2012&amp;lt;br&amp;gt;&lt;br /&gt;
	- Sponsor dedicated space at the conference (sponsor booth) to show products/services to the attendees during coffee breaks, lunch and snack breaks. If a booth is not required, the Gold Sponsorship fee is 2750 NZD instead of 3500 NZD.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Those who are interested in sponsoring OWASP New Zealand 2012 Conference can contact the [mailto:nick.freeman@owasp.org?cc=adrian.hayes@owasp.org OWASP New Zealand Board].&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Conference Dates =&lt;br /&gt;
==Conference Dates==&lt;br /&gt;
&lt;br /&gt;
Please find below important dates for the conference:&lt;br /&gt;
&lt;br /&gt;
* CFP &amp;amp; CFT closes:		 		22nd July 2012 [CLOSED]&lt;br /&gt;
* Conference Agenda due: 			30th July 2012 &lt;br /&gt;
* Conference Registration deadline: 		20th August 2012&lt;br /&gt;
* Training Registration deadline: 		20th August 2012&lt;br /&gt;
* Training Day date: 				30th August 2012&lt;br /&gt;
* Conference Day date: 				31st August 2012&lt;br /&gt;
&lt;br /&gt;
= Conference Committee =&lt;br /&gt;
==OWASP New Zealand Day 2012 Organising Committee==&lt;br /&gt;
&lt;br /&gt;
* Nick Freeman - OWASP New Zealand Leader (Auckland)&lt;br /&gt;
* Adrian Hayes - OWASP New Zealand Leader (Wellington)&lt;br /&gt;
* Lech Janczewski - Associate Professor - University of Auckland School of Business&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]]&lt;/div&gt;</summary>
		<author><name>Adrian Hayes</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_New_Zealand_Day_2012&amp;diff=133776</id>
		<title>OWASP New Zealand Day 2012</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_New_Zealand_Day_2012&amp;diff=133776"/>
				<updated>2012-08-02T01:57:24Z</updated>
		
		<summary type="html">&lt;p&gt;Adrian Hayes: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&amp;lt;center&amp;gt;'''OWASP New Zealand Day 2012&amp;lt;br&amp;gt;30th and 31st August 2012 - Auckland'''&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2012 https://www.owasp.org/images/a/ad/Owaspnz2012logo.png]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
= Introduction =&lt;br /&gt;
==Introduction==&lt;br /&gt;
We are proud to announce the fourth annual OWASP New Zealand Day conference, to be held at the University of Auckland on Friday August 31st, 2012. OWASP New Zealand Day is a one-day conference dedicated to web application security, with an emphasis on secure development techniques to help Kiwi developers build more secure applications.&lt;br /&gt;
&lt;br /&gt;
Based on feedback from last year, the structure of the conference will be slightly different this time. &lt;br /&gt;
&lt;br /&gt;
* We will be offering training on the day before the conference (Thursday August 30th) rather than at the same time as the conference. &lt;br /&gt;
* After lunch on the conference day, we will split to two tracks - one focused on deep technical topics, the other on policy, compliance and risk management. &lt;br /&gt;
&lt;br /&gt;
The fourth OWASP New Zealand Day will be happening thanks to the support provided by the University of Auckland School of Business, which will kindly offer the same conference venue of the last three years. Entry to the event will, as in the past, be free. &lt;br /&gt;
&lt;br /&gt;
For any comments, feedback or observations, please don't hesitate to contact [mailto:nick.freeman@owasp.org?cc=adrian.hayes@owasp.org us].&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Registration==&lt;br /&gt;
&lt;br /&gt;
As with last year, registration will be performed through the RegOnline system. Registrations will be limited to 300 people, so please register using the following link soon to reserve your spot!&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;[https://www.regonline.com/owaspnzday2012 Register here!] - https://www.regonline.com/owaspnzday2012&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Important dates==&lt;br /&gt;
&lt;br /&gt;
* CFP &amp;amp; CFT closes:		 		22nd July 2012 [ CLOSED ]&lt;br /&gt;
* Conference Agenda due: 			30th July 2012 &lt;br /&gt;
* Conference Registration deadline: 		20th August 2012&lt;br /&gt;
* Training Registration deadline: 		20th August 2012&lt;br /&gt;
* Training Day date: 				30th August 2012&lt;br /&gt;
* Conference Day date: 				31st August 2012&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Conference Venue==&lt;br /&gt;
&lt;br /&gt;
The University of Auckland Business School&amp;lt;br&amp;gt;&lt;br /&gt;
Owen G Glenn Building&amp;lt;br&amp;gt;&lt;br /&gt;
Room: OGGB 260-073 (OGGB4)&amp;lt;br&amp;gt;&lt;br /&gt;
Address: 12 Grafton Road&amp;lt;br&amp;gt;&lt;br /&gt;
Auckland&amp;lt;br&amp;gt;&lt;br /&gt;
New Zealand&amp;lt;br&amp;gt;&lt;br /&gt;
[http://maps.google.com/maps?oe=UTF-8&amp;amp;ie=UTF8&amp;amp;q=auckland+business+school&amp;amp;fb=1&amp;amp;split=1&amp;amp;cid=0,0,12303692579639430581&amp;amp;ei=6WeqSZr_OZLFkAWR--zbDQ&amp;amp;ll=-36.852308,174.770916&amp;amp;spn=0.01056,0.020621&amp;amp;z=16&amp;amp;iwloc=A Map]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;[[Image:Auckland_business_school_small2.jpg]] [[Image:Room_hall.jpg]]&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Conference Sponsors==&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;bottom&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;[http://www.auckland.ac.nz/ https://www.owasp.org/images/8/82/University_of_Auckland_crest_small.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;bottom&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;[http://www.security.org.nz/NZISF_NZISForumContent.php https://www.owasp.org/images/5/5a/Nz_information_security_forum.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;ICT and Department of Information Systems and Operations Management&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Gold Sponsors:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com https://www.owasp.org/images/4/41/SA_Logo_w_DD.gif]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.aurasoftwaresecurity.co.nz https://www.owasp.org/images/5/54/Auralogo3.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com www.security-assessment.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.aurasoftwaresecurity.co.nz Aura Information Security in partnership with F5 Networks]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Silver Sponsors:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[[File:INSOMNIA.PNG|center|200px|link=http://www.insomniasec.com]]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.insomniasec.com/ www.insomniasec.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.lateralsecurity.com/ https://www.owasp.org/images/f/f4/Lateral_security.jpeg]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.lateralsecurity.com/ www.lateralsecurity.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[[File:webdrive_logo.jpg|center|200px|link=]]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.webdrive.co.nz/ www.webdrive.co.nz]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Conference Committee==&lt;br /&gt;
&lt;br /&gt;
* Nick Freeman - OWASP New Zealand Leader (Auckland)&lt;br /&gt;
* Adrian Hayes -  OWASP New Zealand Leader (Wellington)&lt;br /&gt;
* Lech Janczewski - Associate Professor - University of Auckland School of Business&lt;br /&gt;
&lt;br /&gt;
Please direct all enquiries to nick.freeman@owasp.org and adrian.hayes@owasp.org.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Training =&lt;br /&gt;
==Training==&lt;br /&gt;
&lt;br /&gt;
===Test-Driven Security===&lt;br /&gt;
-----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The purpose of this training is to introduce and demonstrate some&lt;br /&gt;
application of test-driven security. Based on a ruby application, we&lt;br /&gt;
are going to see how developers and testers can quickly improve and&lt;br /&gt;
ensure the security of an application by asking themselves some simple&lt;br /&gt;
questions and by checking simple things in their test cases.&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Trainer:&amp;lt;/b&amp;gt; Louis Nyffenegger - PentesterLab&lt;br /&gt;
&lt;br /&gt;
Louis is a security consultant working in Melbourne for Securus&lt;br /&gt;
Global. He focus on web application security and presented to Ruxcon,&lt;br /&gt;
Owasp and Auscert. In his spare, he works on 2 side projects:&lt;br /&gt;
pentesterlab (a training web site) and pntstr (an easy web to run the&lt;br /&gt;
first round of an interview).&lt;br /&gt;
&lt;br /&gt;
[https://pentesterlab.com/ PentesterLab.com]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Trainee Requiements&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Laptop&lt;br /&gt;
* Some virtualisation software able to run an ISO. I.e. VirtualBox or VMWare.&lt;br /&gt;
* A basic Ruby understanding&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Time:&amp;lt;/b&amp;gt; 9am till 12pm, 30th August 2012&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Cost:&amp;lt;/b&amp;gt; $250.00&lt;br /&gt;
&lt;br /&gt;
[https://www.regonline.com/owaspnzday2012 Register here!]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Teaching the Good-Guys Bad-Tricks - OWASP Top 10 in real-life===&lt;br /&gt;
-----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;quot;I'm taught and I forget, I do and I remember&amp;quot; is particularly true with web-security. &lt;br /&gt;
At this session you will have web-security and insecurity clearly explained and we'll walk through clear examples.&lt;br /&gt;
But not only will you learn the OWASP Top 10 but you will also hand-craft your own attacks.&lt;br /&gt;
In our fully functional hack-lab websites you will have a variety of hack challenges from hacking into other users' accounts, stealing credit cards and killing websites!&lt;br /&gt;
But wait, there's more! We'll also cover techniques you need to employ to defend these attacks.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Trainer:&amp;lt;/b&amp;gt;  Andy Prow - Aura&lt;br /&gt;
&lt;br /&gt;
Andy Prow is an IT Security Consultant, Trainer and software developer who founded Aura back in 2001. With 18 years in the IT industry Andy has developed code for IBM, Vodafone, Telecom and Microsoft. Andy presents around the world at conferences including Microsoft's TechEd.&lt;br /&gt;
&lt;br /&gt;
[http://www.aurainfosec.com/ AuraInfoSec.com]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Trainee Requiements&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Laptop&lt;br /&gt;
* A working browser and the [http://portswigger.net/burp/ Burp Suite] free edition installed.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Time:&amp;lt;/b&amp;gt; 9am till 5pm, 30th August 2012&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Cost:&amp;lt;/b&amp;gt; $500.00&lt;br /&gt;
&lt;br /&gt;
[https://www.regonline.com/owaspnzday2012 Register here!]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Conference Schedule =&lt;br /&gt;
==Conference Schedule==&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
31st August 2012&lt;br /&gt;
&amp;lt;table width=&amp;quot;80%&amp;quot;&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot;&amp;gt;08:30&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #8595C2&amp;quot;&amp;gt;Registration&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot;&amp;gt;09:00&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Welcome to OWASP New Zealand Day 2012&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Adrian Hayes and Nick Freeman (OWASP Leaders)&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot;&amp;gt;09:10&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #B9C2DC; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;How do I get into Security? I'm a webdev! (An introduction to in2securITy)&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Adam Bell - in2securITy&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot;&amp;gt;09:25&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Blindsided by Security - The Reality of Web Security for the Visually Impaired&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Laura Bell - Lateral Security and Britta Offergeld - Royal New Zealand Foundation of the Blind&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot;&amp;gt;10:00&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #B9C2DC; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Internet Junk&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Quintin Russ - SiteHost&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot;&amp;gt;10:30&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #D98B66; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Break for Morning Tea&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot;&amp;gt;11:00&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Defeating Cross-Site Scripting with Content Security Policy&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Francois Marier - Mozilla&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot;&amp;gt;11:20&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #B9C2DC; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;The Dos and Don'ts of Web Application Frameworks&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Denis Andzakovic - Security-Assessment.com&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot;&amp;gt;11:50&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Web Application Firewalls - Going where no WAFs have gone before...&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Sam Pickles - F5, and Andy Prow - Aura&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot;&amp;gt;12:30&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #D98B66; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Break for Lunch&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot;&amp;gt;13:45&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;background-color: #B9C2DC; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Mobile NFC 101&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Nick von Dadelszen - Lateral Security&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;background-color: #B9C2DC; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Comply or Die Trying&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Andrew Kelly&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot;&amp;gt;14:45&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Going Down to the Wire&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Kirk Jackson - Xero and Mike Haworth - Aura&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Increasing The Value of Penetration Testing&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Brett Moore- Insomnia Security&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot;&amp;gt;15:30&amp;lt;/td&amp;gt;&lt;br /&gt;
&lt;br /&gt;
		&amp;lt;td style=&amp;quot;background-color: #B9C2DC; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;An (Unofficial) OWASP Top 10 for Managers&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Dean Carter and Shahn Harris - Lateral Security&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot;&amp;gt;16:00&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #D98B66; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Break for Afternoon Tea&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot;&amp;gt;16:30&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Discussion Panel and Wrap-up&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&lt;br /&gt;
	&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
	&lt;br /&gt;
= Speakers List=&lt;br /&gt;
==Speakers List==&lt;br /&gt;
&lt;br /&gt;
===Adam Bell - in2securITy - How do I get into Security? I'm a webdev! (An introduction to in2securITy)===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A brief introduction to in2securITy, it's aims and goals.  A particular focus on the availability of mentoring, peers and the secure development stream.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Andrew Kelly - Comply or Die Trying===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
We all have to comply with something: Laws or bylaws - regulations or recommendations - industry standards or industry best-practice. This OWASP talk will focus on the 'real-world' application of security policy and compliance in IT and business. How policy and compliance can actually be very useful when it comes to securing your job, your company - and your company's future. Both from an IT - and a business/commercial prospective. And - along the way - some common myths, misconceptions and downright misunderstandings around policy and compliance may well be busted. Come and listen to a guy who actually thinks compliance and policy ... are fun!&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Andrew brings 27 years IT experience to OWASP - 24 of them in IT Security - and 13 of those spent in the UK and Europe (okay ... Belgium).&lt;br /&gt;
Now despite starting out as a mainframe uber-tech - Andrew's recognised today as being a 'pragmatic' subject-matter expert on corporate information security policy, compliance and governance. Andrew created his first BS 7799-compliant security policy - for a credit card&lt;br /&gt;
provider - in Cardiff back in 1999. Since then he's done much the same for the a number of security consultancies (NZ and UK),&lt;br /&gt;
Fonterra, Transpower and Telecom (NZ) - and BT, Deutsche Bank, Lloyds/TSB Bank and Legal &amp;amp; General Assurance (UK) - amongst many others.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Andy Prow and Sam Pickles - Aura and F5 - Web Application Firewalls - Going where no WAFs have gone before...===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
So we all know that WAFs (web application firewalls) are not the silver bullet they're often sold as. Many of us in the pen-testing space completely discount their value as dumb signature based systems that are bypassed with a flurry of keystrokes and encoding. BUT WAFs are getting MUCH smarter, and you may be really interested to see what a really intelligent WAF can do today. Ever thought a WAF could stop attacks against business logic flaws and broken authorisation?&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Andy Prow is an IT Security Consultant, Trainer and software developer who founded Aura back in 2001. With 18 years in the IT industry Andy has developed code for IBM, Vodafone, Telecom and Microsoft. Andy presents around the world at conferences including Microsoft's TechEd&lt;br /&gt;
&lt;br /&gt;
Sam Pickles is a senior engineer and security specialist with F5 Networks. During over twelve years of security industry experience, Sam has designed and built IT security systems; and conducted network, application and hardware penetration testing in many countries. Sam studied Physics at the University of Otago, and Computer Science at the University of Oxford; and has presented at events including ISIG, First Tuesday, OWASP and AusCERT.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Brett Moore - Insomnia Security - Increasing The Value of Penetration Testing===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Penetration testing has become fairy accepted now as part of the requirements of any new project. Is it really part of a company's security practices, or is it just a tick in the box? This presentation will examine how effective this is for organisations and how it can best be used to increase the usefulness from this type of work. &lt;br /&gt;
&lt;br /&gt;
* What is, and what isn't penetration testing&lt;br /&gt;
* How cost effective is this method as a security measure?&lt;br /&gt;
* How should it fit into the software development lifecycle of any application or network?&lt;br /&gt;
* what you should look for in a company doing this work&lt;br /&gt;
* what part of the work can you do yourselves  &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Having conducted vulnerability assessments, network reviews, and penetration tests for the majority of the large companies in New Zealand, Insomnia founder Brett Moore brings with him over ten years experience in information security. During this time, Brett has also worked with companies such as SUN Microsystems, Skype Limited and Microsoft Corporation by reporting and helping to fix security vulnerabilities in their products. Brett has released numerous whitepapers and technical postings related to security issues and has spoken at security conferences both locally and overseas, including BlackHat, Defcon, Syscan, Kiwicon, Ruxcon, and the invitation only Microsoft internal security conference called BlueHat.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Dean Carter and Shahn Harris - Lateral Security - An (Unofficial) OWASP Top 10 for Managers===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 Web Application Security Risks has done a fantastic job&lt;br /&gt;
at a technical level.&lt;br /&gt;
&lt;br /&gt;
Dean and Shahn have decided to turn their attention to the layer above&lt;br /&gt;
and create a Top 10 for Managers.&lt;br /&gt;
&lt;br /&gt;
10 things to assist Managers in ensuring that their web application&lt;br /&gt;
projects are delivered in a secure, measurable, repeatable manner.&lt;br /&gt;
&lt;br /&gt;
Oh… and they don’t cost a lot….&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Denis Andzakovic - Security-Assessment.com - The Dos and Don'ts of Web Application Frameworks ===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Don't roll your own&amp;quot; has been common advice over the past decade;&lt;br /&gt;
however even when heeding these words, insecure practices and common&lt;br /&gt;
mistakes lead to glaring security holes. This talk will cover some of&lt;br /&gt;
the common errors made when implementing applcations based around web&lt;br /&gt;
frameworks, where to look for vulnerabilities and how to avoid them.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Denis is a Security Consultant for Security-Assessment.com, a security&lt;br /&gt;
consultancy based in Auckland, Wellington, and Singapore.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Francois Marier - Mozilla - Defeating Cross-Site Scripting with Content Security Policy===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Cross-site scripting vulnerabilities are very common in web applications. They have been in the OWASP top 10 for a while and are routinely used by attackers.&lt;br /&gt;
&lt;br /&gt;
There are simple guidelines that one can follow to prevent XSS bugs and most of the web frameworks out there offer some level of protection but at the end of the day, it's easy to make a mistake.&lt;br /&gt;
&lt;br /&gt;
Content Security Policy adds another layer to a website's defenses: browser-enforced restrictions against external resources or unauthorized scripting. An extra response header instructs browsers to enforce a policy set by the server administrator.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Francois is a software engineer on the Mozilla Identity team where he&lt;br /&gt;
works on Persona, the new decentralized authentication system for the&lt;br /&gt;
open web. A long time Debian developer, Francois has been involved in Open Source&lt;br /&gt;
and web development for a while and has always had a strong interest in&lt;br /&gt;
security.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Kirk Jackson and Mike Haworth - Xero and Aura -  Going Down to the Wire===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
You've built the flashiest web app your cow-orkers have ever seen.&lt;br /&gt;
Your boss loves you, and nominates you for a promotion next financial&lt;br /&gt;
year. You've leveraged the latest hip web framework, and have jaxed&lt;br /&gt;
your ajax to the max.&lt;br /&gt;
&lt;br /&gt;
But have you done everything you can to make your application secure?&lt;br /&gt;
Are you perhaps, in fact, doing a little _too much_?&lt;br /&gt;
&lt;br /&gt;
A common issue we've come across in the past few years is applications&lt;br /&gt;
that share too much information over the wire, or trust too much of&lt;br /&gt;
what they receive. In this talk we'll look at some common pitfalls and&lt;br /&gt;
techniques to counter them in modern web applications.&lt;br /&gt;
&lt;br /&gt;
Let's go down to the wire.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Kirk works at Xero as a Security Architect, co-hosts the Wellington .NET user group, and is a Microsoft Developer Security MVP. He has previous experience in building and penetration testing large web applications.&lt;br /&gt;
&lt;br /&gt;
Mike has previously spoken at OWASP and Kiwicon. He is a contributor to the BeEF project and spends his days pentesting for Aura Information Security.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Laura Bell - Lateral Security and Britta Offergeld – Royal New Zealand Foundation of the Blind - Blindsided by Security - The Reality of Web Security for the Visually Impaired===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Digital self-defence is now seen as a valuable life skill. As web developers we try to design systems that can protect as well as provide for our clients. As security consultants, we develop guidelines and frameworks that people can use to decide if a web application is trustworthy and secure. Even the least technical home users are becoming more confident in spotting suspicious behaviour online. Unfortunately, for the visually impaired, it’s not that simple. In a world where visual clues are not enough and where additional technologies such as screen readers are business as usual – web security is a very different matter.&lt;br /&gt;
&lt;br /&gt;
Lateral Security and The Royal New Zealand Foundation of the Blind will examine the guidance and security best practice commonly in use for web applications today and how effective they are for those with visual impairments. In a talk that mixes real world examples, demonstrations and discussion from both a usability and security perspective, we aim to not only outline the issues but also suggest some solutions.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Nick von Dadelszen - Lateral Security - Mobile NFC 101===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This talk is designed to provide a detailed understanding of NFC on mobile phones and security considerations associated with the technology.&lt;br /&gt;
&lt;br /&gt;
The participants should leave the presentation with an understanding of the technology behind NFC on mobile phones and how it interacts. They should obtain an understanding of the security considerations for NFC on Mobile and how it differs from standard NFC implementations.&lt;br /&gt;
&lt;br /&gt;
The agenda for the talk will be the following:&lt;br /&gt;
- Introduce the audience to NFC&lt;br /&gt;
- Discuss the current state of NFC on mobile phones&lt;br /&gt;
- Analyse the technology involved and how this is used to develop NFC applications&lt;br /&gt;
- Discuss the security considerations of NFC on mobile devices&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Quintin Russ - SiteHost - Internet Junk===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Junk, we all have it. Some have more, a lot more ... Whether you have accepted your Trademe addiction or are still in denial we all have a problem. Just like Space we are filling up the Internet with junk. What happens to our websites when we are finished with them? How are they closed? Are they ever closed? This talk will look at what sort of junk is left behind and how this can be used to attack your organisation. We will cover the issues with real world examples and time allowing, discuss simple steps to help overcome your Trademe addiction should you have one. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Quintin has carved out his own niche in the .nz hosting industry, having spent a large proportion of the last few years becoming an expert in both building and defending systems. He now runs enough infrastructure to ensure he never, ever gets a good night's sleep, and sometimes doesn't even get to snooze through Sunday mornings. Quintin has a keen interest in security, especially as it relates to web hosting. This has ranged from the vicissitudes of shared hosting to code reviews of popular blogging applications. He has previously presented at ISIG, OWASP &amp;amp; Kiwicon. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Registration =&lt;br /&gt;
==Registration==&lt;br /&gt;
&lt;br /&gt;
As with last year, registration will be performed through the RegOnline system. Registrations will be limited to 300 people, so please register using the following link soon to reserve your spot!&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;[https://www.regonline.com/owaspnzday2012 Register here!] - https://www.regonline.com/owaspnzday2012&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Call For Sponsorships =&lt;br /&gt;
==Call For Sponsorships==&lt;br /&gt;
&lt;br /&gt;
As mentioned above, OWASP New Zealand Day 2012 will be held in Auckland on the 31st of August, 2012. OWASP New Zealand Day is a security conference entirely dedicated to web application security. The conference is once again being hosted by the University of Auckland with their support and assistance. OWASP New Zealand Day 2012 is a free event, but requires sponsor support to help be an instructive and quality event for the New Zealand community. OWASP is strictly non for profit. The sponsorship money will be used to help make OWASP New Zealand Day 2012 a free, compelling and valuable experience for the audience. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The sponsorship funds collected are to be used for things such as: &lt;br /&gt;
&lt;br /&gt;
* Refreshments (coffee break/lunch) - we want to keep people refreshed during the day; while we certainly bring good and interesting speakers, we don't want people to go home when they become hungry. &lt;br /&gt;
* Name tags - we feel that getting to know people within the New Zealand community is important, and name tags make that possible. &lt;br /&gt;
* Promotion - up to now our events are propagating by word of mouth. We would like to get to a wider audience by advertising our events. &lt;br /&gt;
* Printed Materials - printed materials will include brochures, tags and lanyards.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Facts ==&lt;br /&gt;
&lt;br /&gt;
Last year, the event was supported by 5 sponsors and attracted more than 200 participants. Plenty of constructive (and positive!) feedback from the audience was received and we are using this to make the conference more appealing to more people. For more information on last year's event, please visit: https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2011 &lt;br /&gt;
&lt;br /&gt;
The OWASP New Zealand community is strong and there are more than 220 people currently subscribed to the mailing-list. OWASP New Zealand Day is expected to attract between 200 and 250 attendees this year.&lt;br /&gt;
&lt;br /&gt;
OWASP regular attendees are IT project managers, IT security managers, IT security consultants, web application architects and developers, QA managers, QA testers and system administrators.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Sponsorships  ==&lt;br /&gt;
&lt;br /&gt;
There are three different levels of sponsorships for the OWASP Day event:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* &amp;lt;b&amp;gt;Support Sponsorship&amp;lt;/b&amp;gt;: (Covering international speaker travel expenses, media coverage/article/promotion of the event)&lt;br /&gt;
	&lt;br /&gt;
Includes:&lt;br /&gt;
&lt;br /&gt;
	- Publication of the sponsor logo on the event web site - https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2012&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* &amp;lt;b&amp;gt;Silver Sponsorship&amp;lt;/b&amp;gt;: 1500 NZD&lt;br /&gt;
&lt;br /&gt;
	Includes: &lt;br /&gt;
&lt;br /&gt;
	- Publication of the sponsor logo on the event web site - https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2012&amp;lt;br&amp;gt;&lt;br /&gt;
	- The publication of the sponsor logo in the event site, in the agenda, on the flyers, brochure and in all the official communications with the attendees at the conference.&amp;lt;br&amp;gt;&lt;br /&gt;
	- The possibility to distribute the company brochures, CDs or other materials to the participants during the event.&amp;lt;br&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
* &amp;lt;b&amp;gt;Gold Sponsorship&amp;lt;/b&amp;gt;: 2750 or 3500 NZD (see below)&lt;br /&gt;
&lt;br /&gt;
	Includes: &lt;br /&gt;
&lt;br /&gt;
	- The publication of the sponsor logo in the event site, in the agenda, on the handouts and in all the official communications with the attendees at the conference.&amp;lt;br&amp;gt;&lt;br /&gt;
	- The possibility to distribute the company brochures, CDs or other materials to the participants during the event.&amp;lt;br&amp;gt;&lt;br /&gt;
	- Publication of the sponsor logo on the OWASP New Zealand Chapter page&amp;lt;br&amp;gt;&lt;br /&gt;
	- Sponsor logo on the OWASP NZ site prior and during the OWASP Day event - https://www.owasp.org/index.php/New_Zealand&amp;lt;br&amp;gt;&lt;br /&gt;
	- Publication of the sponsor logo on the event web site - https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2012&amp;lt;br&amp;gt;&lt;br /&gt;
	- Sponsor dedicated space at the conference (sponsor booth) to show products/services to the attendees during coffee breaks, lunch and snack breaks. If a booth is not required, the Gold Sponsorship fee is 2750 NZD instead of 3500 NZD.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Those who are interested in sponsoring OWASP New Zealand 2012 Conference can contact the [mailto:nick.freeman@owasp.org?cc=adrian.hayes@owasp.org OWASP New Zealand Board].&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Conference Dates =&lt;br /&gt;
==Conference Dates==&lt;br /&gt;
&lt;br /&gt;
Please find below important dates for the conference:&lt;br /&gt;
&lt;br /&gt;
* CFP &amp;amp; CFT closes:		 		22nd July 2012 [CLOSED]&lt;br /&gt;
* Conference Agenda due: 			30th July 2012 &lt;br /&gt;
* Conference Registration deadline: 		20th August 2012&lt;br /&gt;
* Training Registration deadline: 		20th August 2012&lt;br /&gt;
* Training Day date: 				30th August 2012&lt;br /&gt;
* Conference Day date: 				31st August 2012&lt;br /&gt;
&lt;br /&gt;
= Conference Committee =&lt;br /&gt;
==OWASP New Zealand Day 2012 Organising Committee==&lt;br /&gt;
&lt;br /&gt;
* Nick Freeman - OWASP New Zealand Leader (Auckland)&lt;br /&gt;
* Adrian Hayes - OWASP New Zealand Leader (Wellington)&lt;br /&gt;
* Lech Janczewski - Associate Professor - University of Auckland School of Business&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]]&lt;/div&gt;</summary>
		<author><name>Adrian Hayes</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_New_Zealand_Day_2012&amp;diff=133716</id>
		<title>OWASP New Zealand Day 2012</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_New_Zealand_Day_2012&amp;diff=133716"/>
				<updated>2012-08-01T03:27:06Z</updated>
		
		<summary type="html">&lt;p&gt;Adrian Hayes: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&amp;lt;center&amp;gt;'''OWASP New Zealand Day 2012&amp;lt;br&amp;gt;30th and 31st August 2012 - Auckland'''&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2012 https://www.owasp.org/images/a/ad/Owaspnz2012logo.png]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
= Introduction =&lt;br /&gt;
==Introduction==&lt;br /&gt;
We are proud to announce the fourth annual OWASP New Zealand Day conference, to be held at the University of Auckland on Friday August 31st, 2012. OWASP New Zealand Day is a one-day conference dedicated to web application security, with an emphasis on secure development techniques to help Kiwi developers build more secure applications.&lt;br /&gt;
&lt;br /&gt;
Based on feedback from last year, the structure of the conference will be slightly different this time. &lt;br /&gt;
&lt;br /&gt;
* We will be offering training on the day before the conference (Thursday August 30th) rather than at the same time as the conference. &lt;br /&gt;
* After lunch on the conference day, we will split to two tracks - one focused on deep technical topics, the other on policy, compliance and risk management. &lt;br /&gt;
&lt;br /&gt;
The fourth OWASP New Zealand Day will be happening thanks to the support provided by the University of Auckland School of Business, which will kindly offer the same conference venue of the last three years. Entry to the event will, as in the past, be free. &lt;br /&gt;
&lt;br /&gt;
For any comments, feedback or observations, please don't hesitate to contact [mailto:nick.freeman@owasp.org?cc=adrian.hayes@owasp.org us].&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Registration==&lt;br /&gt;
&lt;br /&gt;
As with last year, registration will be performed through the RegOnline system. Registrations will be limited to 300 people, so please register using the following link soon to reserve your spot!&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;[https://www.regonline.com/owaspnzday2012 Register here!] - https://www.regonline.com/owaspnzday2012&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Important dates==&lt;br /&gt;
&lt;br /&gt;
* CFP &amp;amp; CFT closes:		 		22nd July 2012 [ CLOSED ]&lt;br /&gt;
* Conference Agenda due: 			30th July 2012 &lt;br /&gt;
* Conference Registration deadline: 		20th August 2012&lt;br /&gt;
* Training Registration deadline: 		20th August 2012&lt;br /&gt;
* Training Day date: 				30th August 2012&lt;br /&gt;
* Conference Day date: 				31st August 2012&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Conference Venue==&lt;br /&gt;
&lt;br /&gt;
The University of Auckland Business School&amp;lt;br&amp;gt;&lt;br /&gt;
Owen G Glenn Building&amp;lt;br&amp;gt;&lt;br /&gt;
Room: OGGB 260-073 (OGGB4)&amp;lt;br&amp;gt;&lt;br /&gt;
Address: 12 Grafton Road&amp;lt;br&amp;gt;&lt;br /&gt;
Auckland&amp;lt;br&amp;gt;&lt;br /&gt;
New Zealand&amp;lt;br&amp;gt;&lt;br /&gt;
[http://maps.google.com/maps?oe=UTF-8&amp;amp;ie=UTF8&amp;amp;q=auckland+business+school&amp;amp;fb=1&amp;amp;split=1&amp;amp;cid=0,0,12303692579639430581&amp;amp;ei=6WeqSZr_OZLFkAWR--zbDQ&amp;amp;ll=-36.852308,174.770916&amp;amp;spn=0.01056,0.020621&amp;amp;z=16&amp;amp;iwloc=A Map]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;[[Image:Auckland_business_school_small2.jpg]] [[Image:Room_hall.jpg]]&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Conference Sponsors==&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;bottom&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;[http://www.auckland.ac.nz/ https://www.owasp.org/images/8/82/University_of_Auckland_crest_small.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;bottom&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;[http://www.security.org.nz/NZISF_NZISForumContent.php https://www.owasp.org/images/5/5a/Nz_information_security_forum.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;ICT and Department of Information Systems and Operations Management&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Gold Sponsors:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com https://www.owasp.org/images/4/41/SA_Logo_w_DD.gif]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.aurasoftwaresecurity.co.nz https://www.owasp.org/images/5/54/Auralogo3.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com www.security-assessment.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.aurasoftwaresecurity.co.nz Aura Information Security in partnership with F5 Networks]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Silver Sponsors:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[[File:INSOMNIA.PNG|center|200px|link=http://www.insomniasec.com]]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.insomniasec.com/ www.insomniasec.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.lateralsecurity.com/ https://www.owasp.org/images/f/f4/Lateral_security.jpeg]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.lateralsecurity.com/ www.lateralsecurity.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[[File:webdrive_logo.jpg|center|200px|link=]]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.webdrive.co.nz/ www.webdrive.co.nz]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Conference Committee==&lt;br /&gt;
&lt;br /&gt;
* Nick Freeman - OWASP New Zealand Leader (Auckland)&lt;br /&gt;
* Adrian Hayes -  OWASP New Zealand Leader (Wellington)&lt;br /&gt;
* Lech Janczewski - Associate Professor - University of Auckland School of Business&lt;br /&gt;
&lt;br /&gt;
Please direct all enquiries to nick.freeman@owasp.org and adrian.hayes@owasp.org.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Training =&lt;br /&gt;
==Training==&lt;br /&gt;
&lt;br /&gt;
===Test-Driven Security===&lt;br /&gt;
-----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The purpose of this training is to introduce and demonstrate some&lt;br /&gt;
application of test-driven security. Based on a ruby application, we&lt;br /&gt;
are going to see how developers and testers can quickly improve and&lt;br /&gt;
ensure the security of an application by asking themselves some simple&lt;br /&gt;
questions and by checking simple things in their test cases.&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Trainer:&amp;lt;/b&amp;gt; Louis Nyffenegger - PentesterLab&lt;br /&gt;
&lt;br /&gt;
Louis is a security consultant working in Melbourne for Securus&lt;br /&gt;
Global. He focus on web application security and presented to Ruxcon,&lt;br /&gt;
Owasp and Auscert. In his spare, he works on 2 side projects:&lt;br /&gt;
pentesterlab (a training web site) and pntstr (an easy web to run the&lt;br /&gt;
first round of an interview).&lt;br /&gt;
&lt;br /&gt;
[https://pentesterlab.com/ PentesterLab.com]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Trainee Requiements&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Laptop&lt;br /&gt;
* Some virtualisation software able to run an ISO. I.e. VirtualBox or VMWare.&lt;br /&gt;
* A basic Ruby understanding&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Time:&amp;lt;/b&amp;gt; 9am till 12pm, 30th August 2012&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Cost:&amp;lt;/b&amp;gt; $250.00&lt;br /&gt;
&lt;br /&gt;
[https://www.regonline.com/owaspnzday2012 Register here!]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Teaching the Good-Guys Bad-Tricks - OWASP Top 10 in real-life===&lt;br /&gt;
-----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;quot;I'm taught and I forget, I do and I remember&amp;quot; is particularly true with web-security. &lt;br /&gt;
At this session you will have web-security and insecurity clearly explained and we'll walk through clear examples.&lt;br /&gt;
But not only will you learn the OWASP Top 10 but you will also hand-craft your own attacks.&lt;br /&gt;
In our fully functional hack-lab websites you will have a variety of hack challenges from hacking into other users' accounts, stealing credit cards and killing websites!&lt;br /&gt;
But wait, there's more! We'll also cover techniques you need to employ to defend these attacks.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Trainer:&amp;lt;/b&amp;gt;  Andy Prow - Aura&lt;br /&gt;
&lt;br /&gt;
Andy Prow is an IT Security Consultant, Trainer and software developer who founded Aura back in 2001. With 18 years in the IT industry Andy has developed code for IBM, Vodafone, Telecom and Microsoft. Andy presents around the world at conferences including Microsoft's TechEd.&lt;br /&gt;
&lt;br /&gt;
[http://www.aurainfosec.com/ AuraInfoSec.com]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Trainee Requiements&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Laptop&lt;br /&gt;
* A working browser and the [http://portswigger.net/burp/ Burp Suite] free edition installed.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Time:&amp;lt;/b&amp;gt; 9am till 5pm, 30th August 2012&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Cost:&amp;lt;/b&amp;gt; $500.00&lt;br /&gt;
&lt;br /&gt;
[https://www.regonline.com/owaspnzday2012 Register here!]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Conference Schedule =&lt;br /&gt;
==Conference Schedule==&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
31st August 2012&lt;br /&gt;
&amp;lt;table width=&amp;quot;80%&amp;quot;&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot;&amp;gt;08:30&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #8595C2&amp;quot;&amp;gt;Registration&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot;&amp;gt;09:00&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Welcome to OWASP New Zealand Day 2012&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Adrian Hayes and Nick Freeman (OWASP Leaders)&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot;&amp;gt;09:10&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #B9C2DC; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;How do I get into Security? I'm a webdev! (An introduction to in2securITy)&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Adam Bell - in2securITy&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot;&amp;gt;09:25&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Blindsided by Security - The Reality of Web Security for the Visually Impaired&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Laura Bell - Lateral Security and Britta Offergeld - Royal New Zealand Foundation for the Blind&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot;&amp;gt;10:00&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #B9C2DC; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Internet Junk&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Quintin Russ - SiteHost&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot;&amp;gt;10:30&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #D98B66; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Break for Morning Tea&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot;&amp;gt;11:00&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Defeating Cross-Site Scripting with Content Security Policy&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Francois Marier - Mozilla&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot;&amp;gt;11:20&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #B9C2DC; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;The Dos and Don'ts of Web Application Frameworks&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Denis Andzakovic - Security-Assessment.com&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot;&amp;gt;11:50&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Web Application Firewalls - Going where no WAFs have gone before...&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Sam Pickles - F5, and Andy Prow - Aura&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot;&amp;gt;12:30&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #D98B66; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Break for Lunch&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot;&amp;gt;13:45&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;background-color: #B9C2DC; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Mobile NFC 101&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Nick von Dadelszen - Lateral Security&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;background-color: #B9C2DC; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Comply or Die Trying&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Andrew Kelly&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot;&amp;gt;14:45&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Going Down to the Wire&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Kirk Jackson - Xero and Mike Haworth - Aura&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Increasing The Value of Penetration Testing&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Brett Moore- Insomnia Security&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot;&amp;gt;15:30&amp;lt;/td&amp;gt;&lt;br /&gt;
&lt;br /&gt;
		&amp;lt;td style=&amp;quot;background-color: #B9C2DC; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;An (Unofficial) OWASP Top 10 for Managers&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Dean Carter and Shahn Harris - Lateral Security&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot;&amp;gt;16:00&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #D98B66; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Break for Afternoon Tea&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot;&amp;gt;16:30&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Discussion Panel and Wrap-up&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&lt;br /&gt;
	&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
	&lt;br /&gt;
= Speakers List=&lt;br /&gt;
==Speakers List==&lt;br /&gt;
&lt;br /&gt;
===Adam Bell - in2securITy - How do I get into Security? I'm a webdev! (An introduction to in2securITy)===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A brief introduction to in2securITy, it's aims and goals.  A particular focus on the availability of mentoring, peers and the secure development stream.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Andrew Kelly - Comply or Die Trying===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
We all have to comply with something: Laws or bylaws - regulations or recommendations - industry standards or industry best-practice. This OWASP talk will focus on the 'real-world' application of security policy and compliance in IT and business. How policy and compliance can actually be very useful when it comes to securing your job, your company - and your company's future. Both from an IT - and a business/commercial prospective. And - along the way - some common myths, misconceptions and downright misunderstandings around policy and compliance may well be busted. Come and listen to a guy who actually thinks compliance and policy ... are fun!&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Andrew brings 27 years IT experience to OWASP - 24 of them in IT Security - and 13 of those spent in the UK and Europe (okay ... Belgium).&lt;br /&gt;
Now despite starting out as a mainframe uber-tech - Andrew's recognised today as being a 'pragmatic' subject-matter expert on corporate information security policy, compliance and governance. Andrew created his first BS 7799-compliant security policy - for a credit card&lt;br /&gt;
provider - in Cardiff back in 1999. Since then he's done much the same for the a number of security consultancies (NZ and UK),&lt;br /&gt;
Fonterra, Transpower and Telecom (NZ) - and BT, Deutsche Bank, Lloyds/TSB Bank and Legal &amp;amp; General Assurance (UK) - amongst many others.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Andy Prow and Sam Pickles - Aura and F5 - Web Application Firewalls - Going where no WAFs have gone before...===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
So we all know that WAFs (web application firewalls) are not the silver bullet they're often sold as. Many of us in the pen-testing space completely discount their value as dumb signature based systems that are bypassed with a flurry of keystrokes and encoding. BUT WAFs are getting MUCH smarter, and you may be really interested to see what a really intelligent WAF can do today. Ever thought a WAF could stop attacks against business logic flaws and broken authorisation?&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Andy Prow is an IT Security Consultant, Trainer and software developer who founded Aura back in 2001. With 18 years in the IT industry Andy has developed code for IBM, Vodafone, Telecom and Microsoft. Andy presents around the world at conferences including Microsoft's TechEd&lt;br /&gt;
&lt;br /&gt;
Sam Pickles is a senior engineer and security specialist with F5 Networks. During over twelve years of security industry experience, Sam has designed and built IT security systems; and conducted network, application and hardware penetration testing in many countries. Sam studied Physics at the University of Otago, and Computer Science at the University of Oxford; and has presented at events including ISIG, First Tuesday, OWASP and AusCERT.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Brett Moore - Insomnia Security - Increasing The Value of Penetration Testing===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Penetration testing has become fairy accepted now as part of the requirements of any new project. Is it really part of a company's security practices, or is it just a tick in the box? This presentation will examine how effective this is for organisations and how it can best be used to increase the usefulness from this type of work. &lt;br /&gt;
&lt;br /&gt;
* What is, and what isn't penetration testing&lt;br /&gt;
* How cost effective is this method as a security measure?&lt;br /&gt;
* How should it fit into the software development lifecycle of any application or network?&lt;br /&gt;
* what you should look for in a company doing this work&lt;br /&gt;
* what part of the work can you do yourselves  &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Having conducted vulnerability assessments, network reviews, and penetration tests for the majority of the large companies in New Zealand, Insomnia founder Brett Moore brings with him over ten years experience in information security. During this time, Brett has also worked with companies such as SUN Microsystems, Skype Limited and Microsoft Corporation by reporting and helping to fix security vulnerabilities in their products. Brett has released numerous whitepapers and technical postings related to security issues and has spoken at security conferences both locally and overseas, including BlackHat, Defcon, Syscan, Kiwicon, Ruxcon, and the invitation only Microsoft internal security conference called BlueHat.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Dean Carter and Shahn Harris - Lateral Security - An (Unofficial) OWASP Top 10 for Managers===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 Web Application Security Risks has done a fantastic job&lt;br /&gt;
at a technical level.&lt;br /&gt;
&lt;br /&gt;
Dean and Shahn have decided to turn their attention to the layer above&lt;br /&gt;
and create a Top 10 for Managers.&lt;br /&gt;
&lt;br /&gt;
10 things to assist Managers in ensuring that their web application&lt;br /&gt;
projects are delivered in a secure, measurable, repeatable manner.&lt;br /&gt;
&lt;br /&gt;
Oh… and they don’t cost a lot….&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Denis Andzakovic - Security-Assessment.com - The Dos and Don'ts of Web Application Frameworks ===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Don't roll your own&amp;quot; has been common advice over the past decade;&lt;br /&gt;
however even when heeding these words, insecure practices and common&lt;br /&gt;
mistakes lead to glaring security holes. This talk will cover some of&lt;br /&gt;
the common errors made when implementing applcations based around web&lt;br /&gt;
frameworks, where to look for vulnerabilities and how to avoid them.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Denis is a Security Consultant for Security-Assessment.com, a security&lt;br /&gt;
consultancy based in Auckland, Wellington, and Singapore.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Francois Marier - Mozilla - Defeating Cross-Site Scripting with Content Security Policy===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Cross-site scripting vulnerabilities are very common in web applications. They have been in the OWASP top 10 for a while and are routinely used by attackers.&lt;br /&gt;
&lt;br /&gt;
There are simple guidelines that one can follow to prevent XSS bugs and most of the web frameworks out there offer some level of protection but at the end of the day, it's easy to make a mistake.&lt;br /&gt;
&lt;br /&gt;
Content Security Policy adds another layer to a website's defenses: browser-enforced restrictions against external resources or unauthorized scripting. An extra response header instructs browsers to enforce a policy set by the server administrator.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Kirk Jackson and Mike Haworth - Xero and Aura -  Going Down to the Wire===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
You've built the flashiest web app your cow-orkers have ever seen.&lt;br /&gt;
Your boss loves you, and nominates you for a promotion next financial&lt;br /&gt;
year. You've leveraged the latest hip web framework, and have jaxed&lt;br /&gt;
your ajax to the max.&lt;br /&gt;
&lt;br /&gt;
But have you done everything you can to make your application secure?&lt;br /&gt;
Are you perhaps, in fact, doing a little _too much_?&lt;br /&gt;
&lt;br /&gt;
A common issue we've come across in the past few years is applications&lt;br /&gt;
that share too much information over the wire, or trust too much of&lt;br /&gt;
what they receive. In this talk we'll look at some common pitfalls and&lt;br /&gt;
techniques to counter them in modern web applications.&lt;br /&gt;
&lt;br /&gt;
Let's go down to the wire.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Kirk works at Xero as a Security Architect, co-hosts the Wellington .NET user group, and is a Microsoft Developer Security MVP. He has previous experience in building and penetration testing large web applications.&lt;br /&gt;
&lt;br /&gt;
Mike has previously spoken at OWASP and Kiwicon. He is a contributor to the BeEF project and spends his days pentesting for Aura Information Security.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Laura Bell - Lateral Security and Britta Offergeld – Royal New Zealand Foundation for the Blind - Blindsided by Security - The Reality of Web Security for the Visually Impaired===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Digital self-defence is now seen as a valuable life skill. As web developers we try to design systems that can protect as well as provide for our clients. As security consultants, we develop guidelines and frameworks that people can use to decide if a web application is trustworthy and secure. Even the least technical home users are becoming more confident in spotting suspicious behaviour online. Unfortunately, for the visually impaired, it’s not that simple. In a world where visual clues are not enough and where additional technologies such as screen readers are business as usual – web security is a very different matter. &lt;br /&gt;
&lt;br /&gt;
Lateral Security and The Royal New Zealand Foundation for the Blind will examine the guidance and security best practice commonly in use for web applications today and how effective they are for those with visual impairments. In a talk that mixes real world examples, demonstrations and discussion from both a usability and security perspective, we aim to not only outline the issues but also suggest some solutions.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Nick von Dadelszen - Lateral Security - Mobile NFC 101===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This talk is designed to provide a detailed understanding of NFC on mobile phones and security considerations associated with the technology.&lt;br /&gt;
&lt;br /&gt;
The participants should leave the presentation with an understanding of the technology behind NFC on mobile phones and how it interacts. They should obtain an understanding of the security considerations for NFC on Mobile and how it differs from standard NFC implementations.&lt;br /&gt;
&lt;br /&gt;
The agenda for the talk will be the following:&lt;br /&gt;
- Introduce the audience to NFC&lt;br /&gt;
- Discuss the current state of NFC on mobile phones&lt;br /&gt;
- Analyse the technology involved and how this is used to develop NFC applications&lt;br /&gt;
- Discuss the security considerations of NFC on mobile devices&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Quintin Russ - SiteHost - Internet Junk===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Junk, we all have it. Some have more, a lot more ... Whether you have accepted your Trademe addiction or are still in denial we all have a problem. Just like Space we are filling up the Internet with junk. What happens to our websites when we are finished with them? How are they closed? Are they ever closed? This talk will look at what sort of junk is left behind and how this can be used to attack your organisation. We will cover the issues with real world examples and time allowing, discuss simple steps to help overcome your Trademe addiction should you have one. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Quintin has carved out his own niche in the .nz hosting industry, having spent a large proportion of the last few years becoming an expert in both building and defending systems. He now runs enough infrastructure to ensure he never, ever gets a good night's sleep, and sometimes doesn't even get to snooze through Sunday mornings. Quintin has a keen interest in security, especially as it relates to web hosting. This has ranged from the vicissitudes of shared hosting to code reviews of popular blogging applications. He has previously presented at ISIG, OWASP &amp;amp; Kiwicon. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Registration =&lt;br /&gt;
==Registration==&lt;br /&gt;
&lt;br /&gt;
As with last year, registration will be performed through the RegOnline system. Registrations will be limited to 300 people, so please register using the following link soon to reserve your spot!&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;[https://www.regonline.com/owaspnzday2012 Register here!] - https://www.regonline.com/owaspnzday2012&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Call For Sponsorships =&lt;br /&gt;
==Call For Sponsorships==&lt;br /&gt;
&lt;br /&gt;
As mentioned above, OWASP New Zealand Day 2012 will be held in Auckland on the 31st of August, 2012. OWASP New Zealand Day is a security conference entirely dedicated to web application security. The conference is once again being hosted by the University of Auckland with their support and assistance. OWASP New Zealand Day 2012 is a free event, but requires sponsor support to help be an instructive and quality event for the New Zealand community. OWASP is strictly non for profit. The sponsorship money will be used to help make OWASP New Zealand Day 2012 a free, compelling and valuable experience for the audience. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The sponsorship funds collected are to be used for things such as: &lt;br /&gt;
&lt;br /&gt;
* Refreshments (coffee break/lunch) - we want to keep people refreshed during the day; while we certainly bring good and interesting speakers, we don't want people to go home when they become hungry. &lt;br /&gt;
* Name tags - we feel that getting to know people within the New Zealand community is important, and name tags make that possible. &lt;br /&gt;
* Promotion - up to now our events are propagating by word of mouth. We would like to get to a wider audience by advertising our events. &lt;br /&gt;
* Printed Materials - printed materials will include brochures, tags and lanyards.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Facts ==&lt;br /&gt;
&lt;br /&gt;
Last year, the event was supported by 5 sponsors and attracted more than 200 participants. Plenty of constructive (and positive!) feedback from the audience was received and we are using this to make the conference more appealing to more people. For more information on last year's event, please visit: https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2011 &lt;br /&gt;
&lt;br /&gt;
The OWASP New Zealand community is strong and there are more than 220 people currently subscribed to the mailing-list. OWASP New Zealand Day is expected to attract between 200 and 250 attendees this year.&lt;br /&gt;
&lt;br /&gt;
OWASP regular attendees are IT project managers, IT security managers, IT security consultants, web application architects and developers, QA managers, QA testers and system administrators.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Sponsorships  ==&lt;br /&gt;
&lt;br /&gt;
There are three different levels of sponsorships for the OWASP Day event:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* &amp;lt;b&amp;gt;Support Sponsorship&amp;lt;/b&amp;gt;: (Covering international speaker travel expenses, media coverage/article/promotion of the event)&lt;br /&gt;
	&lt;br /&gt;
Includes:&lt;br /&gt;
&lt;br /&gt;
	- Publication of the sponsor logo on the event web site - https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2012&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* &amp;lt;b&amp;gt;Silver Sponsorship&amp;lt;/b&amp;gt;: 1500 NZD&lt;br /&gt;
&lt;br /&gt;
	Includes: &lt;br /&gt;
&lt;br /&gt;
	- Publication of the sponsor logo on the event web site - https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2012&amp;lt;br&amp;gt;&lt;br /&gt;
	- The publication of the sponsor logo in the event site, in the agenda, on the flyers, brochure and in all the official communications with the attendees at the conference.&amp;lt;br&amp;gt;&lt;br /&gt;
	- The possibility to distribute the company brochures, CDs or other materials to the participants during the event.&amp;lt;br&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
* &amp;lt;b&amp;gt;Gold Sponsorship&amp;lt;/b&amp;gt;: 2750 or 3500 NZD (see below)&lt;br /&gt;
&lt;br /&gt;
	Includes: &lt;br /&gt;
&lt;br /&gt;
	- The publication of the sponsor logo in the event site, in the agenda, on the handouts and in all the official communications with the attendees at the conference.&amp;lt;br&amp;gt;&lt;br /&gt;
	- The possibility to distribute the company brochures, CDs or other materials to the participants during the event.&amp;lt;br&amp;gt;&lt;br /&gt;
	- Publication of the sponsor logo on the OWASP New Zealand Chapter page&amp;lt;br&amp;gt;&lt;br /&gt;
	- Sponsor logo on the OWASP NZ site prior and during the OWASP Day event - https://www.owasp.org/index.php/New_Zealand&amp;lt;br&amp;gt;&lt;br /&gt;
	- Publication of the sponsor logo on the event web site - https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2012&amp;lt;br&amp;gt;&lt;br /&gt;
	- Sponsor dedicated space at the conference (sponsor booth) to show products/services to the attendees during coffee breaks, lunch and snack breaks. If a booth is not required, the Gold Sponsorship fee is 2750 NZD instead of 3500 NZD.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Those who are interested in sponsoring OWASP New Zealand 2012 Conference can contact the [mailto:nick.freeman@owasp.org?cc=adrian.hayes@owasp.org OWASP New Zealand Board].&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Conference Dates =&lt;br /&gt;
==Conference Dates==&lt;br /&gt;
&lt;br /&gt;
Please find below important dates for the conference:&lt;br /&gt;
&lt;br /&gt;
* CFP &amp;amp; CFT closes:		 		22nd July 2012 [CLOSED]&lt;br /&gt;
* Conference Agenda due: 			30th July 2012 &lt;br /&gt;
* Conference Registration deadline: 		20th August 2012&lt;br /&gt;
* Training Registration deadline: 		20th August 2012&lt;br /&gt;
* Training Day date: 				30th August 2012&lt;br /&gt;
* Conference Day date: 				31st August 2012&lt;br /&gt;
&lt;br /&gt;
= Conference Committee =&lt;br /&gt;
==OWASP New Zealand Day 2012 Organising Committee==&lt;br /&gt;
&lt;br /&gt;
* Nick Freeman - OWASP New Zealand Leader (Auckland)&lt;br /&gt;
* Adrian Hayes - OWASP New Zealand Leader (Wellington)&lt;br /&gt;
* Lech Janczewski - Associate Professor - University of Auckland School of Business&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]]&lt;/div&gt;</summary>
		<author><name>Adrian Hayes</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_New_Zealand_Day_2012&amp;diff=133714</id>
		<title>OWASP New Zealand Day 2012</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_New_Zealand_Day_2012&amp;diff=133714"/>
				<updated>2012-08-01T00:12:49Z</updated>
		
		<summary type="html">&lt;p&gt;Adrian Hayes: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&amp;lt;center&amp;gt;'''OWASP New Zealand Day 2012&amp;lt;br&amp;gt;30th and 31st August 2012 - Auckland'''&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2012 https://www.owasp.org/images/a/ad/Owaspnz2012logo.png]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
= Introduction =&lt;br /&gt;
==Introduction==&lt;br /&gt;
We are proud to announce the fourth annual OWASP New Zealand Day conference, to be held at the University of Auckland on Friday August 31st, 2012. OWASP New Zealand Day is a one-day conference dedicated to web application security, with an emphasis on secure development techniques to help Kiwi developers build more secure applications.&lt;br /&gt;
&lt;br /&gt;
Based on feedback from last year, the structure of the conference will be slightly different this time. &lt;br /&gt;
&lt;br /&gt;
* We will be offering training on the day before the conference (Thursday August 30th) rather than at the same time as the conference. &lt;br /&gt;
* After lunch on the conference day, we will split to two tracks - one focused on deep technical topics, the other on policy, compliance and risk management. &lt;br /&gt;
&lt;br /&gt;
The fourth OWASP New Zealand Day will be happening thanks to the support provided by the University of Auckland School of Business, which will kindly offer the same conference venue of the last three years. Entry to the event will, as in the past, be free. &lt;br /&gt;
&lt;br /&gt;
For any comments, feedback or observations, please don't hesitate to contact [mailto:nick.freeman@owasp.org?cc=adrian.hayes@owasp.org us].&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Registration==&lt;br /&gt;
&lt;br /&gt;
As with last year, registration will be performed through the RegOnline system. Registrations will be limited to 300 people, so please register using the following link soon to reserve your spot!&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;[https://www.regonline.com/owaspnzday2012 Register here!] - https://www.regonline.com/owaspnzday2012&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Important dates==&lt;br /&gt;
&lt;br /&gt;
* CFP &amp;amp; CFT closes:		 		22nd July 2012 [ CLOSED ]&lt;br /&gt;
* Conference Agenda due: 			30th July 2012 &lt;br /&gt;
* Conference Registration deadline: 		20th August 2012&lt;br /&gt;
* Training Registration deadline: 		20th August 2012&lt;br /&gt;
* Training Day date: 				30th August 2012&lt;br /&gt;
* Conference Day date: 				31st August 2012&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Conference Venue==&lt;br /&gt;
&lt;br /&gt;
The University of Auckland Business School&amp;lt;br&amp;gt;&lt;br /&gt;
Owen G Glenn Building&amp;lt;br&amp;gt;&lt;br /&gt;
Room: OGGB 260-073 (OGGB4)&amp;lt;br&amp;gt;&lt;br /&gt;
Address: 12 Grafton Road&amp;lt;br&amp;gt;&lt;br /&gt;
Auckland&amp;lt;br&amp;gt;&lt;br /&gt;
New Zealand&amp;lt;br&amp;gt;&lt;br /&gt;
[http://maps.google.com/maps?oe=UTF-8&amp;amp;ie=UTF8&amp;amp;q=auckland+business+school&amp;amp;fb=1&amp;amp;split=1&amp;amp;cid=0,0,12303692579639430581&amp;amp;ei=6WeqSZr_OZLFkAWR--zbDQ&amp;amp;ll=-36.852308,174.770916&amp;amp;spn=0.01056,0.020621&amp;amp;z=16&amp;amp;iwloc=A Map]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;[[Image:Auckland_business_school_small2.jpg]] [[Image:Room_hall.jpg]]&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Conference Sponsors==&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;bottom&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;[http://www.auckland.ac.nz/ https://www.owasp.org/images/8/82/University_of_Auckland_crest_small.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;bottom&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;[http://www.security.org.nz/NZISF_NZISForumContent.php https://www.owasp.org/images/5/5a/Nz_information_security_forum.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;ICT and Department of Information Systems and Operations Management&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Gold Sponsors:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com https://www.owasp.org/images/4/41/SA_Logo_w_DD.gif]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.aurasoftwaresecurity.co.nz https://www.owasp.org/images/5/54/Auralogo3.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com www.security-assessment.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.aurasoftwaresecurity.co.nz Aura Information Security in partnership with F5 Networks]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Silver Sponsors:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[[File:INSOMNIA.PNG|center|200px|link=http://www.insomniasec.com]]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.insomniasec.com/ www.insomniasec.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.lateralsecurity.com/ https://www.owasp.org/images/f/f4/Lateral_security.jpeg]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.lateralsecurity.com/ www.lateralsecurity.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[[File:webdrive_logo.jpg|center|200px|link=]]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.webdrive.co.nz/ www.webdrive.co.nz]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Conference Committee==&lt;br /&gt;
&lt;br /&gt;
* Nick Freeman - OWASP New Zealand Leader (Auckland)&lt;br /&gt;
* Adrian Hayes -  OWASP New Zealand Leader (Wellington)&lt;br /&gt;
* Lech Janczewski - Associate Professor - University of Auckland School of Business&lt;br /&gt;
&lt;br /&gt;
Please direct all enquiries to nick.freeman@owasp.org and adrian.hayes@owasp.org.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Training =&lt;br /&gt;
==Training==&lt;br /&gt;
&lt;br /&gt;
===Test-Driven Security===&lt;br /&gt;
-----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The purpose of this training is to introduce and demonstrate some&lt;br /&gt;
application of test-driven security. Based on a ruby application, we&lt;br /&gt;
are going to see how developers and testers can quickly improve and&lt;br /&gt;
ensure the security of an application by asking themselves some simple&lt;br /&gt;
questions and by checking simple things in their test cases.&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Trainer:&amp;lt;/b&amp;gt; Louis Nyffenegger - PentesterLab&lt;br /&gt;
&lt;br /&gt;
Louis is a security consultant working in Melbourne for Securus&lt;br /&gt;
Global. He focus on web application security and presented to Ruxcon,&lt;br /&gt;
Owasp and Auscert. In his spare, he works on 2 side projects:&lt;br /&gt;
pentesterlab (a training web site) and pntstr (an easy web to run the&lt;br /&gt;
first round of an interview).&lt;br /&gt;
&lt;br /&gt;
[https://pentesterlab.com/ PentesterLab.com]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Trainee Requiements&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Laptop&lt;br /&gt;
* Some virtualisation software able to run an ISO. I.e. VirtualBox or VMWare.&lt;br /&gt;
* A basic Ruby understanding&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Time:&amp;lt;/b&amp;gt; 9am till 12pm, 30th August 2012&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Cost:&amp;lt;/b&amp;gt; $250.00&lt;br /&gt;
&lt;br /&gt;
[https://www.regonline.com/owaspnzday2012 Register here!]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Teaching the Good-Guys Bad-Tricks - OWASP Top 10 in real-life===&lt;br /&gt;
-----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;quot;I'm taught and I forget, I do and I remember&amp;quot; is particularly true with web-security. &lt;br /&gt;
At this session you will have web-security and insecurity clearly explained and we'll walk through clear examples.&lt;br /&gt;
But not only will you learn the OWASP Top 10 but you will also hand-craft your own attacks.&lt;br /&gt;
In our fully functional hack-lab websites you will have a variety of hack challenges from hacking into other users' accounts, stealing credit cards and killing websites!&lt;br /&gt;
But wait, there's more! We'll also cover techniques you need to employ to defend these attacks.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Trainer:&amp;lt;/b&amp;gt;  Andy Prow - Aura&lt;br /&gt;
&lt;br /&gt;
Andy Prow is an IT Security Consultant, Trainer and software developer who founded Aura back in 2001. With 18 years in the IT industry Andy has developed code for IBM, Vodafone, Telecom and Microsoft. Andy presents around the world at conferences including Microsoft's TechEd.&lt;br /&gt;
&lt;br /&gt;
[http://www.aurainfosec.com/ AuraInfoSec.com]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Trainee Requiements&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Laptop&lt;br /&gt;
* A working browser and the [http://portswigger.net/burp/ Burp Suite] free edition installed.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Time:&amp;lt;/b&amp;gt; 9am till 5pm, 30th August 2012&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Cost:&amp;lt;/b&amp;gt; $500.00&lt;br /&gt;
&lt;br /&gt;
[https://www.regonline.com/owaspnzday2012 Register here!]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Conference Schedule =&lt;br /&gt;
==Conference Schedule==&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
31st August 2012&lt;br /&gt;
&amp;lt;table width=&amp;quot;80%&amp;quot;&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot;&amp;gt;08:30&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #8595C2&amp;quot;&amp;gt;Registration&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot;&amp;gt;09:00&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Welcome to OWASP New Zealand Day 2012&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Adrian Hayes and Nick Freeman (OWASP Leaders)&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot;&amp;gt;09:10&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #B9C2DC; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;How do I get into Security? I'm a webdev! (An introduction to in2securITy)&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Adam Bell - in2securITy&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot;&amp;gt;09:25&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Blindsided by Security - The Reality of Web Security for the Visually Impaired&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Laura Bell - Lateral Security and Britta Offergeld - Royal New Zealand Foundation for the Blind&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot;&amp;gt;10:00&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #B9C2DC; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Internet Junk&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Quintin Russ - SiteHost&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot;&amp;gt;10:30&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #D98B66; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Break for Morning Tea&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot;&amp;gt;11:00&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Defeating Cross-Site Scripting with Content Security Policy&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Francois Marier - Mozilla&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot;&amp;gt;11:20&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #B9C2DC; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;The Dos and Don'ts of Web Application Frameworks&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Denis Andzakovic - Security-Assessment.com&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot;&amp;gt;11:50&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Web Application Firewalls - Going where no WAFs have gone before...&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Sam Pickles - F5, and Andy Prow - Aura&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot;&amp;gt;12:30&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #D98B66; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Break for Lunch&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot;&amp;gt;13:45&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;background-color: #B9C2DC; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Mobile NFC 101&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Nick von Dadelszen - Lateral Security&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;background-color: #B9C2DC; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Comply or Die Trying&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Andrew Kelly&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot;&amp;gt;14:45&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Going Down to the Wire&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Kirk Jackson - Xero&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Increasing The Value of Penetration Testing&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Brett Moore- Insomnia Security&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot;&amp;gt;15:30&amp;lt;/td&amp;gt;&lt;br /&gt;
&lt;br /&gt;
		&amp;lt;td style=&amp;quot;background-color: #B9C2DC; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;An (Unofficial) OWASP Top 10 for Managers&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Dean Carter and Shahn Harris - Lateral Security&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot;&amp;gt;16:00&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #D98B66; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Break for Afternoon Tea&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot;&amp;gt;16:30&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Discussion Panel and Wrap-up&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&lt;br /&gt;
	&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
	&lt;br /&gt;
= Speakers List=&lt;br /&gt;
==Speakers List==&lt;br /&gt;
&lt;br /&gt;
===Adam Bell - in2securITy - How do I get into Security? I'm a webdev! (An introduction to in2securITy)===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A brief introduction to in2securITy, it's aims and goals.  A particular focus on the availability of mentoring, peers and the secure development stream.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Andrew Kelly - Comply or Die Trying===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
We all have to comply with something: Laws or bylaws - regulations or recommendations - industry standards or industry best-practice. This OWASP talk will focus on the 'real-world' application of security policy and compliance in IT and business. How policy and compliance can actually be very useful when it comes to securing your job, your company - and your company's future. Both from an IT - and a business/commercial prospective. And - along the way - some common myths, misconceptions and downright misunderstandings around policy and compliance may well be busted. Come and listen to a guy who actually thinks compliance and policy ... are fun!&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Andrew brings 27 years IT experience to OWASP - 24 of them in IT Security - and 13 of those spent in the UK and Europe (okay ... Belgium).&lt;br /&gt;
Now despite starting out as a mainframe uber-tech - Andrew's recognised today as being a 'pragmatic' subject-matter expert on corporate information security policy, compliance and governance. Andrew created his first BS 7799-compliant security policy - for a credit card&lt;br /&gt;
provider - in Cardiff back in 1999. Since then he's done much the same for the a number of security consultancies (NZ and UK),&lt;br /&gt;
Fonterra, Transpower and Telecom (NZ) - and BT, Deutsche Bank, Lloyds/TSB Bank and Legal &amp;amp; General Assurance (UK) - amongst many others.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Andy Prow and Sam Pickles - Aura and F5 - Web Application Firewalls - Going where no WAFs have gone before...===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
So we all know that WAFs (web application firewalls) are not the silver bullet they're often sold as. Many of us in the pen-testing space completely discount their value as dumb signature based systems that are bypassed with a flurry of keystrokes and encoding. BUT WAFs are getting MUCH smarter, and you may be really interested to see what a really intelligent WAF can do today. Ever thought a WAF could stop attacks against business logic flaws and broken authorisation?&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Andy Prow is an IT Security Consultant, Trainer and software developer who founded Aura back in 2001. With 18 years in the IT industry Andy has developed code for IBM, Vodafone, Telecom and Microsoft. Andy presents around the world at conferences including Microsoft's TechEd&lt;br /&gt;
&lt;br /&gt;
Sam Pickles is a senior engineer and security specialist with F5 Networks. During over twelve years of security industry experience, Sam has designed and built IT security systems; and conducted network, application and hardware penetration testing in many countries. Sam studied Physics at the University of Otago, and Computer Science at the University of Oxford; and has presented at events including ISIG, First Tuesday, OWASP and AusCERT.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Brett Moore - Insomnia Security - Increasing The Value of Penetration Testing===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Penetration testing has become fairy accepted now as part of the requirements of any new project. Is it really part of a company's security practices, or is it just a tick in the box? This presentation will examine how effective this is for organisations and how it can best be used to increase the usefulness from this type of work. &lt;br /&gt;
&lt;br /&gt;
* What is, and what isn't penetration testing&lt;br /&gt;
* How cost effective is this method as a security measure?&lt;br /&gt;
* How should it fit into the software development lifecycle of any application or network?&lt;br /&gt;
* what you should look for in a company doing this work&lt;br /&gt;
* what part of the work can you do yourselves  &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Having conducted vulnerability assessments, network reviews, and penetration tests for the majority of the large companies in New Zealand, Insomnia founder Brett Moore brings with him over ten years experience in information security. During this time, Brett has also worked with companies such as SUN Microsystems, Skype Limited and Microsoft Corporation by reporting and helping to fix security vulnerabilities in their products. Brett has released numerous whitepapers and technical postings related to security issues and has spoken at security conferences both locally and overseas, including BlackHat, Defcon, Syscan, Kiwicon, Ruxcon, and the invitation only Microsoft internal security conference called BlueHat.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Dean Carter and Shahn Harris - Lateral Security - An (Unofficial) OWASP Top 10 for Managers===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 Web Application Security Risks has done a fantastic job&lt;br /&gt;
at a technical level.&lt;br /&gt;
&lt;br /&gt;
Dean and Shahn have decided to turn their attention to the layer above&lt;br /&gt;
and create a Top 10 for Managers.&lt;br /&gt;
&lt;br /&gt;
10 things to assist Managers in ensuring that their web application&lt;br /&gt;
projects are delivered in a secure, measurable, repeatable manner.&lt;br /&gt;
&lt;br /&gt;
Oh… and they don’t cost a lot….&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Denis Andzakovic - Security-Assessment.com - The Dos and Don'ts of Web Application Frameworks ===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Don't roll your own&amp;quot; has been common advice over the past decade;&lt;br /&gt;
however even when heeding these words, insecure practices and common&lt;br /&gt;
mistakes lead to glaring security holes. This talk will cover some of&lt;br /&gt;
the common errors made when implementing applcations based around web&lt;br /&gt;
frameworks, where to look for vulnerabilities and how to avoid them.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Denis is a Security Consultant for Security-Assessment.com, a security&lt;br /&gt;
consultancy based in Auckland, Wellington, and Singapore.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Francois Marier - Mozilla - Defeating Cross-Site Scripting with Content Security Policy===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Cross-site scripting vulnerabilities are very common in web applications. They have been in the OWASP top 10 for a while and are routinely used by attackers.&lt;br /&gt;
&lt;br /&gt;
There are simple guidelines that one can follow to prevent XSS bugs and most of the web frameworks out there offer some level of protection but at the end of the day, it's easy to make a mistake.&lt;br /&gt;
&lt;br /&gt;
Content Security Policy adds another layer to a website's defenses: browser-enforced restrictions against external resources or unauthorized scripting. An extra response header instructs browsers to enforce a policy set by the server administrator.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Kirk Jackson - Xero -  Going Down to the Wire===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
You've built the flashiest web app your cow-orkers have ever seen.&lt;br /&gt;
Your boss loves you, and nominates you for a promotion next financial&lt;br /&gt;
year. You've leveraged the latest hip web framework, and have jaxed&lt;br /&gt;
your ajax to the max.&lt;br /&gt;
&lt;br /&gt;
But have you done everything you can to make your application secure?&lt;br /&gt;
Are you perhaps, in fact, doing a little _too much_?&lt;br /&gt;
&lt;br /&gt;
A common issue I've come across in the past few years is applications&lt;br /&gt;
that share too much information over the wire, or trust too much of&lt;br /&gt;
what they receive. In this talk I'll look at some common pitfalls and&lt;br /&gt;
techniques to counter them in modern web applications.&lt;br /&gt;
&lt;br /&gt;
Let's go down to the wire.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Laura Bell - Lateral Security and Britta Offergeld – Royal New Zealand Foundation for the Blind - Blindsided by Security - The Reality of Web Security for the Visually Impaired===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Digital self-defence is now seen as a valuable life skill. As web developers we try to design systems that can protect as well as provide for our clients. As security consultants, we develop guidelines and frameworks that people can use to decide if a web application is trustworthy and secure. Even the least technical home users are becoming more confident in spotting suspicious behaviour online. Unfortunately, for the visually impaired, it’s not that simple. In a world where visual clues are not enough and where additional technologies such as screen readers are business as usual – web security is a very different matter. &lt;br /&gt;
&lt;br /&gt;
Lateral Security and The Royal New Zealand Foundation for the Blind will examine the guidance and security best practice commonly in use for web applications today and how effective they are for those with visual impairments. In a talk that mixes real world examples, demonstrations and discussion from both a usability and security perspective, we aim to not only outline the issues but also suggest some solutions.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Nick von Dadelszen - Lateral Security - Mobile NFC 101===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This talk is designed to provide a detailed understanding of NFC on mobile phones and security considerations associated with the technology.&lt;br /&gt;
&lt;br /&gt;
The participants should leave the presentation with an understanding of the technology behind NFC on mobile phones and how it interacts. They should obtain an understanding of the security considerations for NFC on Mobile and how it differs from standard NFC implementations.&lt;br /&gt;
&lt;br /&gt;
The agenda for the talk will be the following:&lt;br /&gt;
- Introduce the audience to NFC&lt;br /&gt;
- Discuss the current state of NFC on mobile phones&lt;br /&gt;
- Analyse the technology involved and how this is used to develop NFC applications&lt;br /&gt;
- Discuss the security considerations of NFC on mobile devices&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Quintin Russ - SiteHost - Internet Junk===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Junk, we all have it. Some have more, a lot more ... Whether you have accepted your Trademe addiction or are still in denial we all have a problem. Just like Space we are filling up the Internet with junk. What happens to our websites when we are finished with them? How are they closed? Are they ever closed? This talk will look at what sort of junk is left behind and how this can be used to attack your organisation. We will cover the issues with real world examples and time allowing, discuss simple steps to help overcome your Trademe addiction should you have one. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Quintin has carved out his own niche in the .nz hosting industry, having spent a large proportion of the last few years becoming an expert in both building and defending systems. He now runs enough infrastructure to ensure he never, ever gets a good night's sleep, and sometimes doesn't even get to snooze through Sunday mornings. Quintin has a keen interest in security, especially as it relates to web hosting. This has ranged from the vicissitudes of shared hosting to code reviews of popular blogging applications. He has previously presented at ISIG, OWASP &amp;amp; Kiwicon. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Registration =&lt;br /&gt;
==Registration==&lt;br /&gt;
&lt;br /&gt;
As with last year, registration will be performed through the RegOnline system. Registrations will be limited to 300 people, so please register using the following link soon to reserve your spot!&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;[https://www.regonline.com/owaspnzday2012 Register here!] - https://www.regonline.com/owaspnzday2012&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Call For Sponsorships =&lt;br /&gt;
==Call For Sponsorships==&lt;br /&gt;
&lt;br /&gt;
As mentioned above, OWASP New Zealand Day 2012 will be held in Auckland on the 31st of August, 2012. OWASP New Zealand Day is a security conference entirely dedicated to web application security. The conference is once again being hosted by the University of Auckland with their support and assistance. OWASP New Zealand Day 2012 is a free event, but requires sponsor support to help be an instructive and quality event for the New Zealand community. OWASP is strictly non for profit. The sponsorship money will be used to help make OWASP New Zealand Day 2012 a free, compelling and valuable experience for the audience. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The sponsorship funds collected are to be used for things such as: &lt;br /&gt;
&lt;br /&gt;
* Refreshments (coffee break/lunch) - we want to keep people refreshed during the day; while we certainly bring good and interesting speakers, we don't want people to go home when they become hungry. &lt;br /&gt;
* Name tags - we feel that getting to know people within the New Zealand community is important, and name tags make that possible. &lt;br /&gt;
* Promotion - up to now our events are propagating by word of mouth. We would like to get to a wider audience by advertising our events. &lt;br /&gt;
* Printed Materials - printed materials will include brochures, tags and lanyards.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Facts ==&lt;br /&gt;
&lt;br /&gt;
Last year, the event was supported by 5 sponsors and attracted more than 200 participants. Plenty of constructive (and positive!) feedback from the audience was received and we are using this to make the conference more appealing to more people. For more information on last year's event, please visit: https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2011 &lt;br /&gt;
&lt;br /&gt;
The OWASP New Zealand community is strong and there are more than 220 people currently subscribed to the mailing-list. OWASP New Zealand Day is expected to attract between 200 and 250 attendees this year.&lt;br /&gt;
&lt;br /&gt;
OWASP regular attendees are IT project managers, IT security managers, IT security consultants, web application architects and developers, QA managers, QA testers and system administrators.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Sponsorships  ==&lt;br /&gt;
&lt;br /&gt;
There are three different levels of sponsorships for the OWASP Day event:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* &amp;lt;b&amp;gt;Support Sponsorship&amp;lt;/b&amp;gt;: (Covering international speaker travel expenses, media coverage/article/promotion of the event)&lt;br /&gt;
	&lt;br /&gt;
Includes:&lt;br /&gt;
&lt;br /&gt;
	- Publication of the sponsor logo on the event web site - https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2012&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* &amp;lt;b&amp;gt;Silver Sponsorship&amp;lt;/b&amp;gt;: 1500 NZD&lt;br /&gt;
&lt;br /&gt;
	Includes: &lt;br /&gt;
&lt;br /&gt;
	- Publication of the sponsor logo on the event web site - https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2012&amp;lt;br&amp;gt;&lt;br /&gt;
	- The publication of the sponsor logo in the event site, in the agenda, on the flyers, brochure and in all the official communications with the attendees at the conference.&amp;lt;br&amp;gt;&lt;br /&gt;
	- The possibility to distribute the company brochures, CDs or other materials to the participants during the event.&amp;lt;br&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
* &amp;lt;b&amp;gt;Gold Sponsorship&amp;lt;/b&amp;gt;: 2750 or 3500 NZD (see below)&lt;br /&gt;
&lt;br /&gt;
	Includes: &lt;br /&gt;
&lt;br /&gt;
	- The publication of the sponsor logo in the event site, in the agenda, on the handouts and in all the official communications with the attendees at the conference.&amp;lt;br&amp;gt;&lt;br /&gt;
	- The possibility to distribute the company brochures, CDs or other materials to the participants during the event.&amp;lt;br&amp;gt;&lt;br /&gt;
	- Publication of the sponsor logo on the OWASP New Zealand Chapter page&amp;lt;br&amp;gt;&lt;br /&gt;
	- Sponsor logo on the OWASP NZ site prior and during the OWASP Day event - https://www.owasp.org/index.php/New_Zealand&amp;lt;br&amp;gt;&lt;br /&gt;
	- Publication of the sponsor logo on the event web site - https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2012&amp;lt;br&amp;gt;&lt;br /&gt;
	- Sponsor dedicated space at the conference (sponsor booth) to show products/services to the attendees during coffee breaks, lunch and snack breaks. If a booth is not required, the Gold Sponsorship fee is 2750 NZD instead of 3500 NZD.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Those who are interested in sponsoring OWASP New Zealand 2012 Conference can contact the [mailto:nick.freeman@owasp.org?cc=adrian.hayes@owasp.org OWASP New Zealand Board].&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Conference Dates =&lt;br /&gt;
==Conference Dates==&lt;br /&gt;
&lt;br /&gt;
Please find below important dates for the conference:&lt;br /&gt;
&lt;br /&gt;
* CFP &amp;amp; CFT closes:		 		22nd July 2012 [CLOSED]&lt;br /&gt;
* Conference Agenda due: 			30th July 2012 &lt;br /&gt;
* Conference Registration deadline: 		20th August 2012&lt;br /&gt;
* Training Registration deadline: 		20th August 2012&lt;br /&gt;
* Training Day date: 				30th August 2012&lt;br /&gt;
* Conference Day date: 				31st August 2012&lt;br /&gt;
&lt;br /&gt;
= Conference Committee =&lt;br /&gt;
==OWASP New Zealand Day 2012 Organising Committee==&lt;br /&gt;
&lt;br /&gt;
* Nick Freeman - OWASP New Zealand Leader (Auckland)&lt;br /&gt;
* Adrian Hayes - OWASP New Zealand Leader (Wellington)&lt;br /&gt;
* Lech Janczewski - Associate Professor - University of Auckland School of Business&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]]&lt;/div&gt;</summary>
		<author><name>Adrian Hayes</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Webdrive_logo.jpg&amp;diff=133713</id>
		<title>File:Webdrive logo.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Webdrive_logo.jpg&amp;diff=133713"/>
				<updated>2012-08-01T00:11:06Z</updated>
		
		<summary type="html">&lt;p&gt;Adrian Hayes: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Adrian Hayes</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_New_Zealand_Day_2012&amp;diff=133712</id>
		<title>OWASP New Zealand Day 2012</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_New_Zealand_Day_2012&amp;diff=133712"/>
				<updated>2012-07-31T22:22:42Z</updated>
		
		<summary type="html">&lt;p&gt;Adrian Hayes: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&amp;lt;center&amp;gt;'''OWASP New Zealand Day 2012&amp;lt;br&amp;gt;30th and 31st August 2012 - Auckland'''&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2012 https://www.owasp.org/images/a/ad/Owaspnz2012logo.png]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
= Introduction =&lt;br /&gt;
==Introduction==&lt;br /&gt;
We are proud to announce the fourth annual OWASP New Zealand Day conference, to be held at the University of Auckland on Friday August 31st, 2012. OWASP New Zealand Day is a one-day conference dedicated to web application security, with an emphasis on secure development techniques to help Kiwi developers build more secure applications.&lt;br /&gt;
&lt;br /&gt;
Based on feedback from last year, the structure of the conference will be slightly different this time. &lt;br /&gt;
&lt;br /&gt;
* We will be offering training on the day before the conference (Thursday August 30th) rather than at the same time as the conference. &lt;br /&gt;
* After lunch on the conference day, we will split to two tracks - one focused on deep technical topics, the other on policy, compliance and risk management. &lt;br /&gt;
&lt;br /&gt;
The fourth OWASP New Zealand Day will be happening thanks to the support provided by the University of Auckland School of Business, which will kindly offer the same conference venue of the last three years. Entry to the event will, as in the past, be free. &lt;br /&gt;
&lt;br /&gt;
For any comments, feedback or observations, please don't hesitate to contact [mailto:nick.freeman@owasp.org?cc=adrian.hayes@owasp.org us].&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Registration==&lt;br /&gt;
&lt;br /&gt;
As with last year, registration will be performed through the RegOnline system. Registrations will be limited to 300 people, so please register using the following link soon to reserve your spot!&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;[https://www.regonline.com/owaspnzday2012 Register here!] - https://www.regonline.com/owaspnzday2012&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Important dates==&lt;br /&gt;
&lt;br /&gt;
* CFP &amp;amp; CFT closes:		 		22nd July 2012 [ CLOSED ]&lt;br /&gt;
* Conference Agenda due: 			30th July 2012 &lt;br /&gt;
* Conference Registration deadline: 		20th August 2012&lt;br /&gt;
* Training Registration deadline: 		20th August 2012&lt;br /&gt;
* Training Day date: 				30th August 2012&lt;br /&gt;
* Conference Day date: 				31st August 2012&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Conference Venue==&lt;br /&gt;
&lt;br /&gt;
The University of Auckland Business School&amp;lt;br&amp;gt;&lt;br /&gt;
Owen G Glenn Building&amp;lt;br&amp;gt;&lt;br /&gt;
Room: OGGB 260-073 (OGGB4)&amp;lt;br&amp;gt;&lt;br /&gt;
Address: 12 Grafton Road&amp;lt;br&amp;gt;&lt;br /&gt;
Auckland&amp;lt;br&amp;gt;&lt;br /&gt;
New Zealand&amp;lt;br&amp;gt;&lt;br /&gt;
[http://maps.google.com/maps?oe=UTF-8&amp;amp;ie=UTF8&amp;amp;q=auckland+business+school&amp;amp;fb=1&amp;amp;split=1&amp;amp;cid=0,0,12303692579639430581&amp;amp;ei=6WeqSZr_OZLFkAWR--zbDQ&amp;amp;ll=-36.852308,174.770916&amp;amp;spn=0.01056,0.020621&amp;amp;z=16&amp;amp;iwloc=A Map]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;[[Image:Auckland_business_school_small2.jpg]] [[Image:Room_hall.jpg]]&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Conference Sponsors==&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;bottom&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;[http://www.auckland.ac.nz/ https://www.owasp.org/images/8/82/University_of_Auckland_crest_small.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;bottom&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;[http://www.security.org.nz/NZISF_NZISForumContent.php https://www.owasp.org/images/5/5a/Nz_information_security_forum.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;ICT and Department of Information Systems and Operations Management&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Gold Sponsors:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com https://www.owasp.org/images/4/41/SA_Logo_w_DD.gif]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com www.security-assessment.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Silver Sponsors:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.insomniasec.com/ https://www.owasp.org/images/e/ef/INSOMNIA.PNG]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.insomniasec.com/ www.insomniasec.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.lateralsecurity.com/ https://www.owasp.org/images/f/f4/Lateral_security.jpeg]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.lateralsecurity.com/ www.lateralsecurity.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Conference Committee==&lt;br /&gt;
&lt;br /&gt;
* Nick Freeman - OWASP New Zealand Leader (Auckland)&lt;br /&gt;
* Adrian Hayes -  OWASP New Zealand Leader (Wellington)&lt;br /&gt;
* Lech Janczewski - Associate Professor - University of Auckland School of Business&lt;br /&gt;
&lt;br /&gt;
Please direct all enquiries to nick.freeman@owasp.org and adrian.hayes@owasp.org.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Training =&lt;br /&gt;
==Training==&lt;br /&gt;
&lt;br /&gt;
===Test-Driven Security===&lt;br /&gt;
-----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The purpose of this training is to introduce and demonstrate some&lt;br /&gt;
application of test-driven security. Based on a ruby application, we&lt;br /&gt;
are going to see how developers and testers can quickly improve and&lt;br /&gt;
ensure the security of an application by asking themselves some simple&lt;br /&gt;
questions and by checking simple things in their test cases.&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Trainer:&amp;lt;/b&amp;gt; Louis Nyffenegger - PentesterLab&lt;br /&gt;
&lt;br /&gt;
Louis is a security consultant working in Melbourne for Securus&lt;br /&gt;
Global. He focus on web application security and presented to Ruxcon,&lt;br /&gt;
Owasp and Auscert. In his spare, he works on 2 side projects:&lt;br /&gt;
pentesterlab (a training web site) and pntstr (an easy web to run the&lt;br /&gt;
first round of an interview).&lt;br /&gt;
&lt;br /&gt;
[https://pentesterlab.com/ PentesterLab.com]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Trainee Requiements&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Laptop&lt;br /&gt;
* Some virtualisation software able to run an ISO. I.e. VirtualBox or VMWare.&lt;br /&gt;
* A basic Ruby understanding&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Time:&amp;lt;/b&amp;gt; 9am till 12pm, 30th August 2012&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Cost:&amp;lt;/b&amp;gt; $250.00&lt;br /&gt;
&lt;br /&gt;
[https://www.regonline.com/owaspnzday2012 Register here!]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Teaching the Good-Guys Bad-Tricks - OWASP Top 10 in real-life===&lt;br /&gt;
-----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;quot;I'm taught and I forget, I do and I remember&amp;quot; is particularly true with web-security. &lt;br /&gt;
At this session you will have web-security and insecurity clearly explained and we'll walk through clear examples.&lt;br /&gt;
But not only will you learn the OWASP Top 10 but you will also hand-craft your own attacks.&lt;br /&gt;
In our fully functional hack-lab websites you will have a variety of hack challenges from hacking into other users' accounts, stealing credit cards and killing websites!&lt;br /&gt;
But wait, there's more! We'll also cover techniques you need to employ to defend these attacks.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Trainer:&amp;lt;/b&amp;gt;  Andy Prow - Aura&lt;br /&gt;
&lt;br /&gt;
Andy Prow is an IT Security Consultant, Trainer and software developer who founded Aura back in 2001. With 18 years in the IT industry Andy has developed code for IBM, Vodafone, Telecom and Microsoft. Andy presents around the world at conferences including Microsoft's TechEd.&lt;br /&gt;
&lt;br /&gt;
[http://www.aurainfosec.com/ AuraInfoSec.com]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Trainee Requiements&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Laptop&lt;br /&gt;
* A working browser and the [http://portswigger.net/burp/ Burp Suite] free edition installed.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Time:&amp;lt;/b&amp;gt; 9am till 5pm, 30th August 2012&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Cost:&amp;lt;/b&amp;gt; $500.00&lt;br /&gt;
&lt;br /&gt;
[https://www.regonline.com/owaspnzday2012 Register here!]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Conference Schedule =&lt;br /&gt;
==Conference Schedule==&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
31st August 2012&lt;br /&gt;
&amp;lt;table width=&amp;quot;80%&amp;quot;&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot;&amp;gt;08:30&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #8595C2&amp;quot;&amp;gt;Registration&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot;&amp;gt;09:00&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Welcome to OWASP New Zealand Day 2012&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Adrian Hayes and Nick Freeman (OWASP Leaders)&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot;&amp;gt;09:10&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #B9C2DC; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;How do I get into Security? I'm a webdev! (An introduction to in2securITy)&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Adam Bell - in2securITy&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot;&amp;gt;09:25&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Blindsided by Security - The Reality of Web Security for the Visually Impaired&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Laura Bell - Lateral Security and Britta Offergeld - Royal New Zealand Foundation for the Blind&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot;&amp;gt;10:00&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #B9C2DC; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Internet Junk&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Quintin Russ - SiteHost&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot;&amp;gt;10:30&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #D98B66; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Break for Morning Tea&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot;&amp;gt;11:00&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Defeating Cross-Site Scripting with Content Security Policy&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Francois Marier - Mozilla&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot;&amp;gt;11:20&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #B9C2DC; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;The Dos and Don'ts of Web Application Frameworks&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Denis Andzakovic - Security-Assessment.com&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot;&amp;gt;11:50&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Web Application Firewalls - Going where no WAFs have gone before...&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Sam Pickles - F5, and Andy Prow - Aura&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot;&amp;gt;12:30&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #D98B66; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Break for Lunch&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot;&amp;gt;13:45&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;background-color: #B9C2DC; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Mobile NFC 101&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Nick von Dadelszen - Lateral Security&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;background-color: #B9C2DC; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Comply or Die Trying&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Andrew Kelly&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot;&amp;gt;14:45&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Going Down to the Wire&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Kirk Jackson - Xero&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Increasing The Value of Penetration Testing&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Brett Moore- Insomnia Security&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot;&amp;gt;15:30&amp;lt;/td&amp;gt;&lt;br /&gt;
&lt;br /&gt;
		&amp;lt;td style=&amp;quot;background-color: #B9C2DC; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;An (Unofficial) OWASP Top 10 for Managers&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;i&amp;gt;Dean Carter and Shahn Harris - Lateral Security&amp;lt;/i&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot;&amp;gt;16:00&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #D98B66; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Break for Afternoon Tea&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td width=&amp;quot;7%&amp;quot;&amp;gt;16:30&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;background-color: #EEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
			&amp;lt;b&amp;gt;Discussion Panel and Wrap-up&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
		&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&lt;br /&gt;
	&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
	&lt;br /&gt;
= Speakers List=&lt;br /&gt;
==Speakers List==&lt;br /&gt;
&lt;br /&gt;
===Adam Bell - in2securITy - How do I get into Security? I'm a webdev! (An introduction to in2securITy)===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A brief introduction to in2securITy, it's aims and goals.  A particular focus on the availability of mentoring, peers and the secure development stream.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Andrew Kelly - Comply or Die Trying===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
We all have to comply with something: Laws or bylaws - regulations or recommendations - industry standards or industry best-practice. This OWASP talk will focus on the 'real-world' application of security policy and compliance in IT and business. How policy and compliance can actually be very useful when it comes to securing your job, your company - and your company's future. Both from an IT - and a business/commercial prospective. And - along the way - some common myths, misconceptions and downright misunderstandings around policy and compliance may well be busted. Come and listen to a guy who actually thinks compliance and policy ... are fun!&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Andrew brings 27 years IT experience to OWASP - 24 of them in IT Security - and 13 of those spent in the UK and Europe (okay ... Belgium).&lt;br /&gt;
Now despite starting out as a mainframe uber-tech - Andrew's recognised today as being a 'pragmatic' subject-matter expert on corporate information security policy, compliance and governance. Andrew created his first BS 7799-compliant security policy - for a credit card&lt;br /&gt;
provider - in Cardiff back in 1999. Since then he's done much the same for the a number of security consultancies (NZ and UK),&lt;br /&gt;
Fonterra, Transpower and Telecom (NZ) - and BT, Deutsche Bank, Lloyds/TSB Bank and Legal &amp;amp; General Assurance (UK) - amongst many others.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Andy Prow and Sam Pickles - Aura and F5 - Web Application Firewalls - Going where no WAFs have gone before...===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
So we all know that WAFs (web application firewalls) are not the silver bullet they're often sold as. Many of us in the pen-testing space completely discount their value as dumb signature based systems that are bypassed with a flurry of keystrokes and encoding. BUT WAFs are getting MUCH smarter, and you may be really interested to see what a really intelligent WAF can do today. Ever thought a WAF could stop attacks against business logic flaws and broken authorisation?&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Andy Prow is an IT Security Consultant, Trainer and software developer who founded Aura back in 2001. With 18 years in the IT industry Andy has developed code for IBM, Vodafone, Telecom and Microsoft. Andy presents around the world at conferences including Microsoft's TechEd&lt;br /&gt;
&lt;br /&gt;
Sam Pickles is a senior engineer and security specialist with F5 Networks. During over twelve years of security industry experience, Sam has designed and built IT security systems; and conducted network, application and hardware penetration testing in many countries. Sam studied Physics at the University of Otago, and Computer Science at the University of Oxford; and has presented at events including ISIG, First Tuesday, OWASP and AusCERT.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Brett Moore - Insomnia Security - Increasing The Value of Penetration Testing===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Penetration testing has become fairy accepted now as part of the requirements of any new project. Is it really part of a company's security practices, or is it just a tick in the box? This presentation will examine how effective this is for organisations and how it can best be used to increase the usefulness from this type of work. &lt;br /&gt;
&lt;br /&gt;
* What is, and what isn't penetration testing&lt;br /&gt;
* How cost effective is this method as a security measure?&lt;br /&gt;
* How should it fit into the software development lifecycle of any application or network?&lt;br /&gt;
* what you should look for in a company doing this work&lt;br /&gt;
* what part of the work can you do yourselves  &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Having conducted vulnerability assessments, network reviews, and penetration tests for the majority of the large companies in New Zealand, Insomnia founder Brett Moore brings with him over ten years experience in information security. During this time, Brett has also worked with companies such as SUN Microsystems, Skype Limited and Microsoft Corporation by reporting and helping to fix security vulnerabilities in their products. Brett has released numerous whitepapers and technical postings related to security issues and has spoken at security conferences both locally and overseas, including BlackHat, Defcon, Syscan, Kiwicon, Ruxcon, and the invitation only Microsoft internal security conference called BlueHat.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Dean Carter and Shahn Harris - Lateral Security - An (Unofficial) OWASP Top 10 for Managers===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 Web Application Security Risks has done a fantastic job&lt;br /&gt;
at a technical level.&lt;br /&gt;
&lt;br /&gt;
Dean and Shahn have decided to turn their attention to the layer above&lt;br /&gt;
and create a Top 10 for Managers.&lt;br /&gt;
&lt;br /&gt;
10 things to assist Managers in ensuring that their web application&lt;br /&gt;
projects are delivered in a secure, measurable, repeatable manner.&lt;br /&gt;
&lt;br /&gt;
Oh… and they don’t cost a lot….&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Denis Andzakovic - Security-Assessment.com - The Dos and Don'ts of Web Application Frameworks ===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Don't roll your own&amp;quot; has been common advice over the past decade;&lt;br /&gt;
however even when heeding these words, insecure practices and common&lt;br /&gt;
mistakes lead to glaring security holes. This talk will cover some of&lt;br /&gt;
the common errors made when implementing applcations based around web&lt;br /&gt;
frameworks, where to look for vulnerabilities and how to avoid them.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Denis is a Security Consultant for Security-Assessment.com, a security&lt;br /&gt;
consultancy based in Auckland, Wellington, and Singapore.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Francois Marier - Mozilla - Defeating Cross-Site Scripting with Content Security Policy===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Cross-site scripting vulnerabilities are very common in web applications. They have been in the OWASP top 10 for a while and are routinely used by attackers.&lt;br /&gt;
&lt;br /&gt;
There are simple guidelines that one can follow to prevent XSS bugs and most of the web frameworks out there offer some level of protection but at the end of the day, it's easy to make a mistake.&lt;br /&gt;
&lt;br /&gt;
Content Security Policy adds another layer to a website's defenses: browser-enforced restrictions against external resources or unauthorized scripting. An extra response header instructs browsers to enforce a policy set by the server administrator.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Kirk Jackson - Xero -  Going Down to the Wire===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
You've built the flashiest web app your cow-orkers have ever seen.&lt;br /&gt;
Your boss loves you, and nominates you for a promotion next financial&lt;br /&gt;
year. You've leveraged the latest hip web framework, and have jaxed&lt;br /&gt;
your ajax to the max.&lt;br /&gt;
&lt;br /&gt;
But have you done everything you can to make your application secure?&lt;br /&gt;
Are you perhaps, in fact, doing a little _too much_?&lt;br /&gt;
&lt;br /&gt;
A common issue I've come across in the past few years is applications&lt;br /&gt;
that share too much information over the wire, or trust too much of&lt;br /&gt;
what they receive. In this talk I'll look at some common pitfalls and&lt;br /&gt;
techniques to counter them in modern web applications.&lt;br /&gt;
&lt;br /&gt;
Let's go down to the wire.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Laura Bell - Lateral Security and Britta Offergeld – Royal New Zealand Foundation for the Blind - Blindsided by Security - The Reality of Web Security for the Visually Impaired===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Digital self-defence is now seen as a valuable life skill. As web developers we try to design systems that can protect as well as provide for our clients. As security consultants, we develop guidelines and frameworks that people can use to decide if a web application is trustworthy and secure. Even the least technical home users are becoming more confident in spotting suspicious behaviour online. Unfortunately, for the visually impaired, it’s not that simple. In a world where visual clues are not enough and where additional technologies such as screen readers are business as usual – web security is a very different matter. &lt;br /&gt;
&lt;br /&gt;
Lateral Security and The Royal New Zealand Foundation for the Blind will examine the guidance and security best practice commonly in use for web applications today and how effective they are for those with visual impairments. In a talk that mixes real world examples, demonstrations and discussion from both a usability and security perspective, we aim to not only outline the issues but also suggest some solutions.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Nick von Dadelszen - Lateral Security - Mobile NFC 101===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This talk is designed to provide a detailed understanding of NFC on mobile phones and security considerations associated with the technology.&lt;br /&gt;
&lt;br /&gt;
The participants should leave the presentation with an understanding of the technology behind NFC on mobile phones and how it interacts. They should obtain an understanding of the security considerations for NFC on Mobile and how it differs from standard NFC implementations.&lt;br /&gt;
&lt;br /&gt;
The agenda for the talk will be the following:&lt;br /&gt;
- Introduce the audience to NFC&lt;br /&gt;
- Discuss the current state of NFC on mobile phones&lt;br /&gt;
- Analyse the technology involved and how this is used to develop NFC applications&lt;br /&gt;
- Discuss the security considerations of NFC on mobile devices&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Quintin Russ - SiteHost - Internet Junk===&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Junk, we all have it. Some have more, a lot more ... Whether you have accepted your Trademe addiction or are still in denial we all have a problem. Just like Space we are filling up the Internet with junk. What happens to our websites when we are finished with them? How are they closed? Are they ever closed? This talk will look at what sort of junk is left behind and how this can be used to attack your organisation. We will cover the issues with real world examples and time allowing, discuss simple steps to help overcome your Trademe addiction should you have one. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Quintin has carved out his own niche in the .nz hosting industry, having spent a large proportion of the last few years becoming an expert in both building and defending systems. He now runs enough infrastructure to ensure he never, ever gets a good night's sleep, and sometimes doesn't even get to snooze through Sunday mornings. Quintin has a keen interest in security, especially as it relates to web hosting. This has ranged from the vicissitudes of shared hosting to code reviews of popular blogging applications. He has previously presented at ISIG, OWASP &amp;amp; Kiwicon. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Registration =&lt;br /&gt;
==Registration==&lt;br /&gt;
&lt;br /&gt;
As with last year, registration will be performed through the RegOnline system. Registrations will be limited to 300 people, so please register using the following link soon to reserve your spot!&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;[https://www.regonline.com/owaspnzday2012 Register here!] - https://www.regonline.com/owaspnzday2012&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Call For Sponsorships =&lt;br /&gt;
==Call For Sponsorships==&lt;br /&gt;
&lt;br /&gt;
As mentioned above, OWASP New Zealand Day 2012 will be held in Auckland on the 31st of August, 2012. OWASP New Zealand Day is a security conference entirely dedicated to web application security. The conference is once again being hosted by the University of Auckland with their support and assistance. OWASP New Zealand Day 2012 is a free event, but requires sponsor support to help be an instructive and quality event for the New Zealand community. OWASP is strictly non for profit. The sponsorship money will be used to help make OWASP New Zealand Day 2012 a free, compelling and valuable experience for the audience. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The sponsorship funds collected are to be used for things such as: &lt;br /&gt;
&lt;br /&gt;
* Refreshments (coffee break/lunch) - we want to keep people refreshed during the day; while we certainly bring good and interesting speakers, we don't want people to go home when they become hungry. &lt;br /&gt;
* Name tags - we feel that getting to know people within the New Zealand community is important, and name tags make that possible. &lt;br /&gt;
* Promotion - up to now our events are propagating by word of mouth. We would like to get to a wider audience by advertising our events. &lt;br /&gt;
* Printed Materials - printed materials will include brochures, tags and lanyards.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Facts ==&lt;br /&gt;
&lt;br /&gt;
Last year, the event was supported by 5 sponsors and attracted more than 200 participants. Plenty of constructive (and positive!) feedback from the audience was received and we are using this to make the conference more appealing to more people. For more information on last year's event, please visit: https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2011 &lt;br /&gt;
&lt;br /&gt;
The OWASP New Zealand community is strong and there are more than 220 people currently subscribed to the mailing-list. OWASP New Zealand Day is expected to attract between 200 and 250 attendees this year.&lt;br /&gt;
&lt;br /&gt;
OWASP regular attendees are IT project managers, IT security managers, IT security consultants, web application architects and developers, QA managers, QA testers and system administrators.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Sponsorships  ==&lt;br /&gt;
&lt;br /&gt;
There are three different levels of sponsorships for the OWASP Day event:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* &amp;lt;b&amp;gt;Support Sponsorship&amp;lt;/b&amp;gt;: (Covering international speaker travel expenses, media coverage/article/promotion of the event)&lt;br /&gt;
	&lt;br /&gt;
Includes:&lt;br /&gt;
&lt;br /&gt;
	- Publication of the sponsor logo on the event web site - https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2012&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* &amp;lt;b&amp;gt;Silver Sponsorship&amp;lt;/b&amp;gt;: 1500 NZD&lt;br /&gt;
&lt;br /&gt;
	Includes: &lt;br /&gt;
&lt;br /&gt;
	- Publication of the sponsor logo on the event web site - https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2012&amp;lt;br&amp;gt;&lt;br /&gt;
	- The publication of the sponsor logo in the event site, in the agenda, on the flyers, brochure and in all the official communications with the attendees at the conference.&amp;lt;br&amp;gt;&lt;br /&gt;
	- The possibility to distribute the company brochures, CDs or other materials to the participants during the event.&amp;lt;br&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
* &amp;lt;b&amp;gt;Gold Sponsorship&amp;lt;/b&amp;gt;: 2750 or 3500 NZD (see below)&lt;br /&gt;
&lt;br /&gt;
	Includes: &lt;br /&gt;
&lt;br /&gt;
	- The publication of the sponsor logo in the event site, in the agenda, on the handouts and in all the official communications with the attendees at the conference.&amp;lt;br&amp;gt;&lt;br /&gt;
	- The possibility to distribute the company brochures, CDs or other materials to the participants during the event.&amp;lt;br&amp;gt;&lt;br /&gt;
	- Publication of the sponsor logo on the OWASP New Zealand Chapter page&amp;lt;br&amp;gt;&lt;br /&gt;
	- Sponsor logo on the OWASP NZ site prior and during the OWASP Day event - https://www.owasp.org/index.php/New_Zealand&amp;lt;br&amp;gt;&lt;br /&gt;
	- Publication of the sponsor logo on the event web site - https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2012&amp;lt;br&amp;gt;&lt;br /&gt;
	- Sponsor dedicated space at the conference (sponsor booth) to show products/services to the attendees during coffee breaks, lunch and snack breaks. If a booth is not required, the Gold Sponsorship fee is 2750 NZD instead of 3500 NZD.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Those who are interested in sponsoring OWASP New Zealand 2012 Conference can contact the [mailto:nick.freeman@owasp.org?cc=adrian.hayes@owasp.org OWASP New Zealand Board].&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Conference Dates =&lt;br /&gt;
==Conference Dates==&lt;br /&gt;
&lt;br /&gt;
Please find below important dates for the conference:&lt;br /&gt;
&lt;br /&gt;
* CFP &amp;amp; CFT closes:		 		22nd July 2012 [CLOSED]&lt;br /&gt;
* Conference Agenda due: 			30th July 2012 &lt;br /&gt;
* Conference Registration deadline: 		20th August 2012&lt;br /&gt;
* Training Registration deadline: 		20th August 2012&lt;br /&gt;
* Training Day date: 				30th August 2012&lt;br /&gt;
* Conference Day date: 				31st August 2012&lt;br /&gt;
&lt;br /&gt;
= Conference Committee =&lt;br /&gt;
==OWASP New Zealand Day 2012 Organising Committee==&lt;br /&gt;
&lt;br /&gt;
* Nick Freeman - OWASP New Zealand Leader (Auckland)&lt;br /&gt;
* Adrian Hayes - OWASP New Zealand Leader (Wellington)&lt;br /&gt;
* Lech Janczewski - Associate Professor - University of Auckland School of Business&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]]&lt;/div&gt;</summary>
		<author><name>Adrian Hayes</name></author>	</entry>

	</feed>