<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Andylew</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Andylew"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Andylew"/>
		<updated>2026-05-15T16:23:24Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Internet_of_Things_Project&amp;diff=231845</id>
		<title>OWASP Internet of Things Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Internet_of_Things_Project&amp;diff=231845"/>
				<updated>2017-07-25T21:11:18Z</updated>
		
		<summary type="html">&lt;p&gt;Andylew: Added brief Slack instructions including link to Noreen's Slack invite.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Main =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Internet of Things (IoT) Project==&lt;br /&gt;
&lt;br /&gt;
Oxford defines the Internet of Things as: “A proposed development of the Internet in which everyday objects have network connectivity, allowing them to send and receive data.”&lt;br /&gt;
&lt;br /&gt;
''The OWASP Internet of Things Project is designed to help manufacturers, developers, and consumers better understand the security issues associated with the Internet of Things, and to enable users in any context to make better security decisions when building, deploying, or assessing IoT technologies''. &lt;br /&gt;
&lt;br /&gt;
The project looks to define a structure for various IoT sub-projects such as Attack Surface Areas, Testing Guides and Top Vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
[[File:iot-project.png|400px|thumb|center]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Internet of Things Project is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Internet of Things Project? ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Internet of Things Project provides information on:&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Attack_Surface_Areas IoT Attack Surface Areas]&lt;br /&gt;
* IoT Vulnerabilities&lt;br /&gt;
* Firmware Analysis&lt;br /&gt;
* ICS/SCADA Software Weaknesses&lt;br /&gt;
* Community Information&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Testing_Guides IoT Testing Guides]&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Security_Guidance IoT Security Guidance]&lt;br /&gt;
* [https://www.owasp.org/index.php/Principles_of_IoT_Security Principles of IoT Security]&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Framework_Assessment IoT Framework Assessment]&lt;br /&gt;
* Developer, Consumer and Manufacturer Guidance&lt;br /&gt;
* Design Principles&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Contributors ==&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Justin_C._Klein_Keane Justin Klein Keane]&lt;br /&gt;
* Saša Zdjelar&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Project|OWASP Project Repository]]&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
* [[OWASP_.NET_Project|OWASP .NET]]&lt;br /&gt;
* [[Java|OWASP Java and JVM]]&lt;br /&gt;
* [[C/C++|OWASP C/C++]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
Hint: If you're new to Slack, [https://lists.owasp.org/pipermail/owasp-community/2015-July/000703.html join OWASP's slack channel first], then join #iot-security within OWASP's channel.&lt;br /&gt;
&amp;lt;!-- Hey Guys - Andy Lewis here.  I'm not great w/slack but when I browse to https://owasp-iot-security.slack.com/signup&lt;br /&gt;
I'm getting &amp;quot;This team's administrator has not enabled email signups.&amp;quot; and &amp;quot;Ask your administrator to send you an invitation.&amp;quot;&lt;br /&gt;
I'm adding this comment in hopes of being able to get in contact w/someone from the project after Blackhat/Defcon.&lt;br /&gt;
If you're reading this, could you please reach out to me &lt;br /&gt;
alewis@owasp.org&lt;br /&gt;
or open up the slack channel to auto-OK @owasp.org addresses?&lt;br /&gt;
Thanks&lt;br /&gt;
Andy&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping DEFCON 23]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/2/2d/Iot_testing_methodology.JPG IoT Testing Guidance Handout]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/7/71/Internet_of_Things_Top_Ten_2014-OWASP.pdf OWASP IoT Top Ten PDF]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/8/8e/Infographic-v1.jpg OWASP IoT Top Ten Infographic]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/0/01/Internet_of_Things_Top_Ten_2014-OWASP-ppt.pptx OWASP IoT Top Ten PPT]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf OWASP IoT Top Ten-RSA 2015]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/b/bd/OWASP-IoT.pptx OWASP IoT Project Overview]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Added a [https://owasp-iot-security.slack.com/ Slack channel]&lt;br /&gt;
* Added a sub-project; [https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project#tab=IoT_Security_Policy_Project IoT Security Policy Project]&lt;br /&gt;
* Daniel Miessler gave his [https://www.youtube.com/watch?v=RhxHHD790nw IoT talk at DEFCON 23]&lt;br /&gt;
* Migrating the IoT Top Ten to be under the IoT Project&lt;br /&gt;
* HP Study Reveals 70 Percent of Internet of Things Devices Vulnerable to Attack&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Attack Surface Areas =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Attack Surface Areas Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP IoT Attack Surface Areas (DRAFT) are as follows:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Vulnerability&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem (general)'''&lt;br /&gt;
|&lt;br /&gt;
* Interoperability standards&lt;br /&gt;
* Data governance&lt;br /&gt;
* System wide failure&lt;br /&gt;
* Individual stakeholder risks&lt;br /&gt;
* Implicit trust between components&lt;br /&gt;
* Enrollment security&lt;br /&gt;
* Decommissioning system&lt;br /&gt;
* Lost access procedures&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Memory'''&lt;br /&gt;
|&lt;br /&gt;
* Sensitive data&lt;br /&gt;
** Cleartext usernames&lt;br /&gt;
** Cleartext passwords&lt;br /&gt;
** Third-party credentials&lt;br /&gt;
** Encryption keys&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Physical Interfaces'''&lt;br /&gt;
|&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* User CLI&lt;br /&gt;
* Admin CLI&lt;br /&gt;
* Privilege escalation&lt;br /&gt;
* Reset to insecure state&lt;br /&gt;
* Removal of storage media&lt;br /&gt;
* Tamper resistance&lt;br /&gt;
* Debug port&lt;br /&gt;
** UART (Serial)&lt;br /&gt;
** JTAG / SWD&lt;br /&gt;
* Device ID/Serial number exposure&lt;br /&gt;
|-&lt;br /&gt;
| '''Device Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Standard set of web application vulnerabilities, see:&lt;br /&gt;
** [[:Category:OWASP Top Ten Project|OWASP Web Top 10]]&lt;br /&gt;
** [[:Category:OWASP Application Security Verification Standard Project|OWASP ASVS]]&lt;br /&gt;
** [[:Category:OWASP Testing Project|OWASP Testing guide]]&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Firmware'''&lt;br /&gt;
|&lt;br /&gt;
* Sensitive data exposure ([[Top 10 2013-A6-Sensitive Data Exposure|See OWASP Top 10 - A6 Sensitive data exposure]]):&lt;br /&gt;
** Backdoor accounts&lt;br /&gt;
** Hardcoded credentials&lt;br /&gt;
** Encryption keys&lt;br /&gt;
** Encryption (Symmetric, Asymmetric)&lt;br /&gt;
** Sensitive information&lt;br /&gt;
** Sensitive URL disclosure&lt;br /&gt;
* Firmware version display and/or last update date&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
** Verify for old sw versions and possible attacks (Heartbleed, Shellshock, old PHP versions etc)&lt;br /&gt;
* Security related function API exposure&lt;br /&gt;
* Firmware downgrade possibility&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Network Services'''&lt;br /&gt;
|&lt;br /&gt;
* Information disclosure&lt;br /&gt;
* User CLI&lt;br /&gt;
* Administrative CLI&lt;br /&gt;
* Injection&lt;br /&gt;
* Denial of Service&lt;br /&gt;
* Unencrypted Services&lt;br /&gt;
* Poorly implemented encryption&lt;br /&gt;
* Test/Development Services&lt;br /&gt;
* Buffer Overflow&lt;br /&gt;
* UPnP&lt;br /&gt;
* Vulnerable UDP Services&lt;br /&gt;
* DoS&lt;br /&gt;
* Device Firmware OTA update block&lt;br /&gt;
* Firmware loaded over insecure channel (no TLS)&lt;br /&gt;
* Replay attack&lt;br /&gt;
* Lack of payload verification&lt;br /&gt;
* Lack of message integrity check&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Administrative Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Standard set of web application vulnerabilities, see:&lt;br /&gt;
** [[:Category:OWASP Top Ten Project|OWASP Web Top 10]]&lt;br /&gt;
** [[:Category:OWASP Application Security Verification Standard Project|OWASP ASVS]]&lt;br /&gt;
** [[:Category:OWASP Testing Project|OWASP Testing guide]]&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
* Security/encryption options&lt;br /&gt;
* Logging options&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
* Check for insecure direct object references&lt;br /&gt;
* Inability to wipe device&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Data Storage'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted data&lt;br /&gt;
* Data encrypted with discovered keys&lt;br /&gt;
* Lack of data integrity checks&lt;br /&gt;
* Use of static same enc/dec key&lt;br /&gt;
|- &lt;br /&gt;
| '''Cloud Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
&lt;br /&gt;
* Standard set of web application vulnerabilities, see:&lt;br /&gt;
** [[:Category:OWASP Top Ten Project|OWASP Web Top 10]]&lt;br /&gt;
** [[:Category:OWASP Application Security Verification Standard Project|OWASP ASVS]]&lt;br /&gt;
** [[:Category:OWASP Testing Project|OWASP Testing guide]]&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Third-party Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted PII sent&lt;br /&gt;
* Encrypted PII sent&lt;br /&gt;
* Device information leaked&lt;br /&gt;
* Location leaked&lt;br /&gt;
|- &lt;br /&gt;
| '''Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update sent without encryption&lt;br /&gt;
* Updates not signed&lt;br /&gt;
* Update location writable&lt;br /&gt;
* Update verification&lt;br /&gt;
* Update authentication&lt;br /&gt;
* Malicious update&lt;br /&gt;
* Missing update mechanism&lt;br /&gt;
* No manual update mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Mobile Application'''&lt;br /&gt;
|&lt;br /&gt;
* Implicitly trusted by device or cloud&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Insecure data storage&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Insecure password recovery mechanism&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Vendor Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Inherent trust of cloud or mobile application&lt;br /&gt;
* Weak authentication&lt;br /&gt;
* Weak access controls&lt;br /&gt;
* Injection attacks&lt;br /&gt;
* Hidden services&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem Communication'''&lt;br /&gt;
|&lt;br /&gt;
* Health checks&lt;br /&gt;
* Heartbeats&lt;br /&gt;
* Ecosystem commands&lt;br /&gt;
* Deprovisioning&lt;br /&gt;
* Pushing updates&lt;br /&gt;
|- &lt;br /&gt;
| '''Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* LAN&lt;br /&gt;
* LAN to Internet&lt;br /&gt;
* Short range&lt;br /&gt;
* Non-standard&lt;br /&gt;
* Wireless (WiFi, Z-wave, XBee, Zigbee, Bluetooth, LoRA)&lt;br /&gt;
* Protocol fuzzing&lt;br /&gt;
|- &lt;br /&gt;
| '''Authentication/Authorization'''&lt;br /&gt;
|&lt;br /&gt;
* Authentication/Authorization related values (session key, token, cookie, etc.) disclosure&lt;br /&gt;
* Reusing of session key, token, etc.&lt;br /&gt;
* Device to device authentication&lt;br /&gt;
* Device to mobile Application authentication&lt;br /&gt;
* Device to cloud system authentication&lt;br /&gt;
* Mobile application to cloud system authentication&lt;br /&gt;
* Web application to cloud system authentication&lt;br /&gt;
* Lack of dynamic authentication&lt;br /&gt;
|-&lt;br /&gt;
| '''Privacy'''&lt;br /&gt;
|&lt;br /&gt;
* User data disclosure&lt;br /&gt;
* User/device location disclosure&lt;br /&gt;
* Differential privacy&lt;br /&gt;
|-&lt;br /&gt;
| '''Hardware (Sensors)'''&lt;br /&gt;
|&lt;br /&gt;
* Sensing Environment Manipulation&lt;br /&gt;
* Tampering (Physically)&lt;br /&gt;
* Damage (Physicall)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Attack Surface Areas Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Attack Surface Areas Project provides a list of attack surfaces that should be understood by manufacturers, developers, security researchers, and those looking to deploy or implement IoT technologies within their organizations.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Vulnerabilities =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Vulnerabilities Project ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Vulnerability&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Summary&lt;br /&gt;
|-&lt;br /&gt;
| '''Username Enumeration'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Device Web Interface&lt;br /&gt;
* Cloud Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Ability to collect a set of valid usernames by interacting with the authentication mechanism&lt;br /&gt;
|-&lt;br /&gt;
| '''Weak Passwords'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Device Web Interface&lt;br /&gt;
* Cloud Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Ability to set account passwords to '1234' or '123456' for example.&lt;br /&gt;
* Usage of pre-programmed default passwords&lt;br /&gt;
|-&lt;br /&gt;
| '''Account Lockout'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Device Web Interface&lt;br /&gt;
* Cloud Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Ability to continue sending authentication attempts after 3 - 5 failed login attempts&lt;br /&gt;
|-&lt;br /&gt;
| '''Unencrypted Services'''&lt;br /&gt;
|&lt;br /&gt;
* Device Network Services&lt;br /&gt;
|&lt;br /&gt;
* Network services are not properly encrypted to prevent eavesdropping or tampering  by attackers&lt;br /&gt;
|-&lt;br /&gt;
| '''Two-factor Authentication'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Cloud Web Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Lack of two-factor authentication mechanisms such as a security token or fingerprint scanner&lt;br /&gt;
|-&lt;br /&gt;
| '''Poorly Implemented Encryption'''&lt;br /&gt;
|&lt;br /&gt;
* Device Network Services&lt;br /&gt;
|&lt;br /&gt;
* Encryption is implemented however it is improperly configured or is not being properly updated, e.g. using SSL v2 &lt;br /&gt;
|-&lt;br /&gt;
| '''Update Sent Without Encryption'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* Updates are transmitted over the network without using TLS or encrypting the update file itself&lt;br /&gt;
|-&lt;br /&gt;
| '''Update Location Writable'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* Storage location for update files is world writable potentially allowing firmware to be modified and distributed to all users&lt;br /&gt;
|-&lt;br /&gt;
| '''Denial of Service'''&lt;br /&gt;
|&lt;br /&gt;
* Device Network Services&lt;br /&gt;
|&lt;br /&gt;
* Service can be attacked in a way that denies service to that service or the entire device&lt;br /&gt;
|-&lt;br /&gt;
| '''Removal of Storage Media'''&lt;br /&gt;
|&lt;br /&gt;
* Device Physical Interfaces&lt;br /&gt;
|&lt;br /&gt;
* Ability to physically remove the storage media from the device&lt;br /&gt;
|-&lt;br /&gt;
| '''No Manual Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* No ability to manually force an update check for the device&lt;br /&gt;
|-&lt;br /&gt;
| '''Missing Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* No ability to update device&lt;br /&gt;
|-&lt;br /&gt;
| '''Firmware Version Display and/or Last Update Date'''&lt;br /&gt;
|&lt;br /&gt;
* Device Firmware&lt;br /&gt;
|&lt;br /&gt;
* Current firmware version is not displayed and/or the last update date is not displayed&lt;br /&gt;
|-&lt;br /&gt;
| '''Firmware and storage extraction'''&lt;br /&gt;
|&lt;br /&gt;
* JTAG / SWD interface&lt;br /&gt;
* [https://www.flashrom.org/Flashrom In-Situ dumping]&lt;br /&gt;
* Intercepting a OTA update&lt;br /&gt;
* Downloading from the manufacturers web page&lt;br /&gt;
* [https://www.exploitee.rs/index.php/Exploitee.rs_Low_Voltage_e-MMC_Adapter eMMC tapping]&lt;br /&gt;
* Unsoldering the SPI Flash / eMMC chip and reading it in a adapter&lt;br /&gt;
|&lt;br /&gt;
* Firmware contains a lot of useful information, like source code and binaries of running services, pre-set passwords, ssh keys etc.  &lt;br /&gt;
|-&lt;br /&gt;
| '''Manipulating the code execution flow of the device'''&lt;br /&gt;
|&lt;br /&gt;
* JTAG / SWD interface&lt;br /&gt;
* [https://wiki.newae.com/Main_Page Side channel attacks like glitching]&lt;br /&gt;
|&lt;br /&gt;
* With the help of a JTAG adapter and gdb we can modify the execution of firmware in the device and bypass almost all software based security controls.&lt;br /&gt;
* Side channel attacks can also modify the execution flow or can be used to leak interesting information from the device&lt;br /&gt;
|-&lt;br /&gt;
| '''Obtaining console access'''&lt;br /&gt;
|&lt;br /&gt;
* Serial interfaces (SPI / UART)&lt;br /&gt;
|&lt;br /&gt;
* By connecting to a serial interface, we will obtain full console access to a device&lt;br /&gt;
* Usually security measures include custom bootloaders that prevent the attacker from entering single user mode, but that can also be bypassed.&lt;br /&gt;
|-&lt;br /&gt;
| '''Insecure 3rd party components'''&lt;br /&gt;
|&lt;br /&gt;
* Software&lt;br /&gt;
|&lt;br /&gt;
* Out of date versions of busybox, openssl, ssh, web servers, etc.&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Vulnerabilities Project provides:&lt;br /&gt;
&lt;br /&gt;
* Information on the top IoT vulnerabilities&lt;br /&gt;
* The attack surface associated with the vulnerability&lt;br /&gt;
* A summary of the vulnerability&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Medical Devices =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Medical Device Testing ==&lt;br /&gt;
&lt;br /&gt;
The Medical Device Testing project is intended to provide some basic attack surface considerations that should be evaluated before shipping Medical Device equipment.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Vulnerability&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem (general)'''&lt;br /&gt;
|&lt;br /&gt;
* Interoperability standards&lt;br /&gt;
* Data governance&lt;br /&gt;
* System wide failure&lt;br /&gt;
* Individual stakeholder risks&lt;br /&gt;
* Implicit trust between components&lt;br /&gt;
* Enrollment security&lt;br /&gt;
* Decommissioning system&lt;br /&gt;
* Lost access procedures&lt;br /&gt;
|- &lt;br /&gt;
| '''HL7'''&lt;br /&gt;
|&lt;br /&gt;
* XML Parsing&lt;br /&gt;
** XSS&lt;br /&gt;
* Information Disclosure&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Memory'''&lt;br /&gt;
|&lt;br /&gt;
* Sensitive data&lt;br /&gt;
** Cleartext usernames&lt;br /&gt;
** Cleartext passwords&lt;br /&gt;
** Third-party credentials&lt;br /&gt;
** Encryption keys&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Physical Interfaces'''&lt;br /&gt;
|&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* User CLI&lt;br /&gt;
* Admin CLI&lt;br /&gt;
* Privilege escalation&lt;br /&gt;
* Reset to insecure state&lt;br /&gt;
* Removal of storage media&lt;br /&gt;
* Tamper resistance&lt;br /&gt;
* Debug port&lt;br /&gt;
* Device ID/Serial number exposure&lt;br /&gt;
|-&lt;br /&gt;
| '''Device Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Standard set of web vulnerabilities:&lt;br /&gt;
** SQL injection&lt;br /&gt;
** Cross-site scripting&lt;br /&gt;
** Cross-site Request Forgery&lt;br /&gt;
** Username enumeration&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Firmware'''&lt;br /&gt;
|&lt;br /&gt;
* Sensitive data exposure:&lt;br /&gt;
** Backdoor accounts&lt;br /&gt;
** Hardcoded credentials&lt;br /&gt;
** Encryption keys&lt;br /&gt;
** Encryption (Symmetric, Asymmetric)&lt;br /&gt;
** Sensitive information&lt;br /&gt;
** Sensitive URL disclosure&lt;br /&gt;
* Firmware version display and/or last update date&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
* Security related function API exposure&lt;br /&gt;
* Firmware downgrade&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Network Services'''&lt;br /&gt;
|&lt;br /&gt;
* Information disclosure&lt;br /&gt;
* User CLI&lt;br /&gt;
* Administrative CLI&lt;br /&gt;
* Injection&lt;br /&gt;
* Denial of Service&lt;br /&gt;
* Unencrypted Services&lt;br /&gt;
* Poorly implemented encryption&lt;br /&gt;
* Test/Development Services&lt;br /&gt;
* Buffer Overflow&lt;br /&gt;
* UPnP&lt;br /&gt;
* Vulnerable UDP Services&lt;br /&gt;
* DoS&lt;br /&gt;
* Device Firmware OTA update block&lt;br /&gt;
* Replay attack&lt;br /&gt;
* Lack of payload verification&lt;br /&gt;
* Lack of message integrity check&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Administrative Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Standard web vulnerabilities:&lt;br /&gt;
** SQL injection&lt;br /&gt;
** Cross-site scripting&lt;br /&gt;
** Cross-site Request Forgery&lt;br /&gt;
** Username enumeration&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
* Security/encryption options&lt;br /&gt;
* Logging options&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
* Inability to wipe device&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Data Storage'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted data&lt;br /&gt;
* Data encrypted with discovered keys&lt;br /&gt;
* Lack of data integrity checks&lt;br /&gt;
* Use of static same enc/dec key&lt;br /&gt;
|- &lt;br /&gt;
| '''Cloud Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Standard set of web vulnerabilities:&lt;br /&gt;
** SQL injection&lt;br /&gt;
** Cross-site scripting&lt;br /&gt;
** Cross-site Request Forgery&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Third-party Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted PII sent&lt;br /&gt;
* Encrypted PII sent&lt;br /&gt;
* Device information leaked&lt;br /&gt;
* Location leaked&lt;br /&gt;
|- &lt;br /&gt;
| '''Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update sent without encryption&lt;br /&gt;
* Updates not signed&lt;br /&gt;
* Update location writable&lt;br /&gt;
* Update verification&lt;br /&gt;
* Update authentication&lt;br /&gt;
* Malicious update&lt;br /&gt;
* Missing update mechanism&lt;br /&gt;
* No manual update mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Mobile Application'''&lt;br /&gt;
|&lt;br /&gt;
* Implicitly trusted by device or cloud&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Insecure data storage&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Insecure password recovery mechanism&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Vendor Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Inherent trust of cloud or mobile application&lt;br /&gt;
* Weak authentication&lt;br /&gt;
* Weak access controls&lt;br /&gt;
* Injection attacks&lt;br /&gt;
* Hidden services&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem Communication'''&lt;br /&gt;
|&lt;br /&gt;
* Health checks&lt;br /&gt;
* Heartbeats&lt;br /&gt;
* Ecosystem commands&lt;br /&gt;
* Deprovisioning&lt;br /&gt;
* Pushing updates&lt;br /&gt;
|- &lt;br /&gt;
| '''Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* LAN&lt;br /&gt;
* LAN to Internet&lt;br /&gt;
* Short range&lt;br /&gt;
* Non-standard&lt;br /&gt;
* Wireless (WiFi, Z-wave, XBee, Zigbee, Bluetooth, LoRA)&lt;br /&gt;
* Protocol fuzzing&lt;br /&gt;
|- &lt;br /&gt;
| '''Authentication/Authorization'''&lt;br /&gt;
|&lt;br /&gt;
* Authentication/Authorization related values (session key, token, cookie, etc.) disclosure&lt;br /&gt;
* Reusing of session key, token, etc.&lt;br /&gt;
* Device to device authentication&lt;br /&gt;
* Device to mobile Application authentication&lt;br /&gt;
* Device to cloud system authentication&lt;br /&gt;
* Mobile application to cloud system authentication&lt;br /&gt;
* Web application to cloud system authentication&lt;br /&gt;
* Lack of dynamic authentication&lt;br /&gt;
|-&lt;br /&gt;
| '''Data Flow'''&lt;br /&gt;
|&lt;br /&gt;
* What data is being captured?&lt;br /&gt;
* How does it move within the ecosystem?&lt;br /&gt;
* How is it protected in transit?&lt;br /&gt;
* How is it protected at rest?&lt;br /&gt;
* Who is that data shared with?&lt;br /&gt;
|-&lt;br /&gt;
| '''Hardware (Sensors)'''&lt;br /&gt;
|&lt;br /&gt;
* Sensing Environment Manipulation&lt;br /&gt;
* Tampering (Physically)&lt;br /&gt;
* Damaging (Physically)&lt;br /&gt;
* Failure state analysis&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Medical Attack Surfaces project? ==&lt;br /&gt;
&lt;br /&gt;
The Medical Attack Surfaces project provides:&lt;br /&gt;
&lt;br /&gt;
* A simple way for testers, manufacturers, developers, and users to get an understanding of the complexity of a modern medical environment&lt;br /&gt;
* Allows people to visualize the numerous attack surfaces that need to be defended within medical equipment ecosystems&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Firmware_Analysis IoT Firmware Analysis Primer]&lt;br /&gt;
* [https://otalliance.org/initiatives/internet-things Online Trust Alliance - Internet of Things]&lt;br /&gt;
* [https://people.debian.org/~aurel32/qemu/ Pre-compiled QEMU images]&lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://craigsmith.net/episode-11-1-firmware-extraction/ Short Firmware Extraction Video]&lt;br /&gt;
* [https://craigsmith.net/episode-12-1-firmware-emulation-with-qemu/ Firmware Emulation with QEMU]&lt;br /&gt;
* [https://craigsmith.net/episode-18-1-file-extraction-from-network-capture/ File Extraction from Network Capture]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Daniel Miessler presented on using Adaptive Testing Methodologies to evaluate the security of medical devices at RSA 2017.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Firmware Analysis =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Firmware Analysis Project ==&lt;br /&gt;
&lt;br /&gt;
The Firmware Analysis Project is intended to provide security testing guidance for the IoT Attack Surface &amp;quot;Device Firmware&amp;quot;:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Section&lt;br /&gt;
! &lt;br /&gt;
|- &lt;br /&gt;
|&lt;br /&gt;
Device Firmware Vulnerabilties&lt;br /&gt;
|&lt;br /&gt;
* Out-of-date core components&lt;br /&gt;
* Unsupported core components&lt;br /&gt;
* Expired and/or self-signed certificates&lt;br /&gt;
* Same certificate used on multiple devices&lt;br /&gt;
* Admin web interface concerns&lt;br /&gt;
* Hardcoded or easy to guess credentials&lt;br /&gt;
* Sensitive information disclosure&lt;br /&gt;
* Sensitive URL disclosure&lt;br /&gt;
* Encryption key exposure&lt;br /&gt;
* Backdoor accounts&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Manufacturer Recommendations&lt;br /&gt;
|&lt;br /&gt;
* Ensure that supported and up-to-date software is used by developers&lt;br /&gt;
* Ensure that robust update mechanisms are in place for devices&lt;br /&gt;
* Ensure that certificates are not duplicated across devices and product lines.&lt;br /&gt;
* Ensure supported and up-to-date software is used by developers&lt;br /&gt;
* Develop a mechanism to ensure a new certificate is installed when old ones expire&lt;br /&gt;
* Disable deprecated SSL versions&lt;br /&gt;
* Ensure developers do not code in easy to guess or common admin passwords&lt;br /&gt;
* Ensure services such as SSH have a secure password created&lt;br /&gt;
* Develop a mechanism that requires the user to create a secure admin password during initial device setup&lt;br /&gt;
* Ensure developers do not hard code passwords or hashes&lt;br /&gt;
* Have source code reviewed by a third party before releasing device to production&lt;br /&gt;
* Ensure industry standard encryption or strong hashing is used&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Device Firmware Guidance and Instruction&lt;br /&gt;
|&lt;br /&gt;
* Firmware file analysis&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* Dynamic binary analysis&lt;br /&gt;
* Static binary analysis&lt;br /&gt;
* Static code analysis&lt;br /&gt;
* Firmware emulation&lt;br /&gt;
* File system analysis&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Device Firmware Tools&lt;br /&gt;
|&lt;br /&gt;
* [https://github.com/craigz28/firmwalker Firmwalker] &lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://github.com/angr/angr Angr binary analysis framework]&lt;br /&gt;
* [http://binwalk.org/ Binwalk firmware analysis tool]&lt;br /&gt;
* [http://www.binaryanalysis.org/en/home Binary Analysis Tool]&lt;br /&gt;
* [https://github.com/firmadyne/firmadyne Firmadyne]&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Vulnerable Firmware&lt;br /&gt;
|&lt;br /&gt;
* [https://github.com/praetorian-inc/DVRF Damn Vulnerable Router Firmware]&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Firmware Analysis Project? ==&lt;br /&gt;
&lt;br /&gt;
The Firmware Analysis Project provides:&lt;br /&gt;
&lt;br /&gt;
* Security testing guidance for vulnerabilities in the &amp;quot;Device Firmware&amp;quot; attack surface&lt;br /&gt;
* Steps for extracting file systems from various firmware files&lt;br /&gt;
* Guidance on searching a file systems for sensitive of interesting data&lt;br /&gt;
* Information on static analysis of firmware contents&lt;br /&gt;
* Information on dynamic analysis of emulated services (e.g. web admin interface)&lt;br /&gt;
* Testing tool links&lt;br /&gt;
* A site for pulling together existing information on firmware analysis&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Firmware_Analysis IoT Firmware Analysis Primer]&lt;br /&gt;
* [https://otalliance.org/initiatives/internet-things Online Trust Alliance - Internet of Things]&lt;br /&gt;
* [https://people.debian.org/~aurel32/qemu/ Pre-compiled QEMU images]&lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://craigsmith.net/episode-11-1-firmware-extraction/ Short Firmware Extraction Video]&lt;br /&gt;
* [https://craigsmith.net/episode-12-1-firmware-emulation-with-qemu/ Firmware Emulation with QEMU]&lt;br /&gt;
* [https://craigsmith.net/episode-18-1-file-extraction-from-network-capture/ File Extraction from Network Capture]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Event Logging Project=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:                   OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Logging Events==&lt;br /&gt;
&lt;br /&gt;
This is a working draft of the recommended minimum IoT Device logging events. This includes many   different types of devices, including consumer IoT, enterprise IoT, and ICS/SCADA type devices.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Event Category&lt;br /&gt;
! Events&lt;br /&gt;
|-&lt;br /&gt;
| '''Request Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Attempt to Invoke Unsupported HTTP Method&lt;br /&gt;
* Unexpected Quantity of Characters in Parameter&lt;br /&gt;
* Unexpected Type of Characters in Parameter&lt;br /&gt;
|-&lt;br /&gt;
| '''Authentication Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Multiple Failed Passwords&lt;br /&gt;
* High Rate of Login Attempts&lt;br /&gt;
* Additional POST Variable&lt;br /&gt;
* Deviation from Normal GEO Location&lt;br /&gt;
|-&lt;br /&gt;
| '''Session Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Modifying the Existing Cookie&lt;br /&gt;
* Substituting Another User's Valid SessionID or Cookie&lt;br /&gt;
* Source Location Changes During Session&lt;br /&gt;
|-&lt;br /&gt;
| '''Access Control Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Modifying URL Argument Within a GET for Direct Object Access Attempt&lt;br /&gt;
* Modifying Parameter Within a POST for Direct Object Access Attempt&lt;br /&gt;
* Forced Browsing Attempt&lt;br /&gt;
|-&lt;br /&gt;
| '''Ecosystem Membership Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Traffic Seen from Disenrolled System&lt;br /&gt;
* Traffic Seen from Unenrolled System&lt;br /&gt;
* Failed Attempt to Enroll in Ecosystem&lt;br /&gt;
* Multiple Attempts to Enroll in Ecosystem&lt;br /&gt;
|-&lt;br /&gt;
| '''Device Access Events'''&lt;br /&gt;
|&lt;br /&gt;
* Device Case Tampering Detected&lt;br /&gt;
* Device Logic Board Tampering Detected&lt;br /&gt;
|-&lt;br /&gt;
| '''Administrative Mode Events'''&lt;br /&gt;
|&lt;br /&gt;
* Device Entered Administrative Mode&lt;br /&gt;
* Device Accessed Using Default Administrative Credentials&lt;br /&gt;
|-&lt;br /&gt;
| '''Input Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Double Encoded Character&lt;br /&gt;
* Unexpected Encoding Used&lt;br /&gt;
|-&lt;br /&gt;
| '''Command Injection Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Blacklist Inspection for Common SQL Injection Values&lt;br /&gt;
* Abnormal Quantity of Returned Records&lt;br /&gt;
|-&lt;br /&gt;
| '''Honey Trap Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Honey Trap Resource Requested&lt;br /&gt;
* Honey Trap Data Used&lt;br /&gt;
|-&lt;br /&gt;
| '''Reputation Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Suspicious or Disallowed User Source Location&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:  25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Security Logging Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Secure Logging Project provides a list of core events that should be logged in any IoT-related system. The project exists because IoT systems in general are not logging nearly enough events to constitute input for a solid detection and response program around IoT devices, and for companies that want to do this there are not many good resources for what should be logged.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_AppSensor_Project The OWASP AppSensor Project]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= ICS/SCADA =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== ICS/SCADA Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP ICS/SCADA Top 10 software weaknesses are as follows:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Rank and ID&lt;br /&gt;
! Title&lt;br /&gt;
|- &lt;br /&gt;
| '''1 - CWE-119'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Restriction of Operations within the Bounds of a Memory Buffer&lt;br /&gt;
|- &lt;br /&gt;
| '''2 - CWE-20'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Input Validation&lt;br /&gt;
|- &lt;br /&gt;
| '''3 - CWE-22'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')&lt;br /&gt;
|-&lt;br /&gt;
| '''4 - CWE-264'''&lt;br /&gt;
|&lt;br /&gt;
* Permissions, Privileges, and Access Controls&lt;br /&gt;
|- &lt;br /&gt;
| '''5 - CWE-200'''&lt;br /&gt;
|&lt;br /&gt;
* Information Exposure&lt;br /&gt;
|- &lt;br /&gt;
| '''6 - CWE-255'''&lt;br /&gt;
|&lt;br /&gt;
* Credentials Management&lt;br /&gt;
|- &lt;br /&gt;
| '''7 - CWE-287'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''8 - CWE-399'''&lt;br /&gt;
|&lt;br /&gt;
* Resource Management Errors&lt;br /&gt;
|- &lt;br /&gt;
| '''9 - CWE-79'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')&lt;br /&gt;
|- &lt;br /&gt;
| '''10 - CWE-189'''&lt;br /&gt;
|&lt;br /&gt;
* Numeric Errors&lt;br /&gt;
|- &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the ICS/SCADA Project? ==&lt;br /&gt;
&lt;br /&gt;
The ICS/SCADA Project provides:&lt;br /&gt;
&lt;br /&gt;
* A list of the Top 10 most dangerous software weaknesses&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* NJ Ouchn&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Security Policy Project =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Security Policy Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP IoT Security Policy Project provides:&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Security Policies Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Security Policy Project provides:&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Saša Zdjelar&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Community =&lt;br /&gt;
&lt;br /&gt;
[https://www.iamthecavalry.org/ I Am The Cavalry] &lt;br /&gt;
&lt;br /&gt;
A global grassroots organization that is focused on issues where computer security intersects public safety and human life.&lt;br /&gt;
&lt;br /&gt;
Their areas of focus include:&lt;br /&gt;
* Medical devices&lt;br /&gt;
* Automobiles&lt;br /&gt;
* Home Electronics&lt;br /&gt;
* Public Infrastructure&lt;br /&gt;
&lt;br /&gt;
[https://otalliance.org Online Trust Alliance]&lt;br /&gt;
&lt;br /&gt;
Formed as an informal industry working group in 2005, today OTA is an Internal Revenue Service (IRS) approved 501c3 charitable organization with the mission to enhance online trust and empower users, while promoting innovation and the vitality of the internet.  OTA is global organization supported by over 100 organizations headquartered in Bellevue, Washington with offices in Washington DC.&lt;br /&gt;
&lt;br /&gt;
Addressing the mounting concerns, in January 2015 the Online Trust Alliance, established the [https://otalliance.org/initiatives/internet-things IoT Trustworthy Working Group (ITWG)], a multi-stakeholder initiative.  The group recognizes “security and privacy by design” must be a priority from the onset of product development and be addressed holistically. The framework focuses on privacy, security sustainability. The sustainability pillar is critical as it looks at the life-cycle issues related to long- term supportability and transfers of ownership of devices and the data collected.&lt;br /&gt;
&lt;br /&gt;
[https://allseenalliance.org/framework AllSeen Alliance]&lt;br /&gt;
&lt;br /&gt;
The AllSeen Alliance is a Linux Foundation collaborative project.  They're a cross-industry consortium dedicated to enabling the interoperability of billions of devices, services and apps that comprise the Internet of Things.  The Alliance supports the AllJoyn Framework, an open source software framework that makes it easy for devices and apps to discover and communicate with each other. Developers can write applications for interoperability regardless of transport layer, manufacturer, and without the need for Internet access. The software has been and will continue to be openly available for developers to download, and runs on popular platforms such as Linux and Linux-based Android, iOS, and Windows, including many other lightweight real-time operating systems.&lt;br /&gt;
&lt;br /&gt;
[http://www.iiconsortium.org/ The Industrial Internet Consortium (IIC)]&lt;br /&gt;
&lt;br /&gt;
The Industrial Internet Consortium is the open membership, international not-for-profit consortium that is setting the architectural framework and direction for the Industrial Internet. Founded by AT&amp;amp;T, Cisco, GE, IBM and Intel in March 2014, the consortium’s mission is to coordinate vast ecosystem initiatives to connect and integrate objects with people, processes and data using common architectures, interoperability and open standards.&lt;br /&gt;
&lt;br /&gt;
[http://securingsmartcities.org/ Securing Smart Cities]&lt;br /&gt;
&lt;br /&gt;
Securing Smart Cities is a not-for-profit global initiative that aims to solve the existing and future cybersecurity problems of smart cities through collaboration between companies, governments, media outlets, other not-for-profit initiatives and individuals across the world.&lt;br /&gt;
&lt;br /&gt;
===Talks===&lt;br /&gt;
&lt;br /&gt;
RSA Conference San Francisco &amp;lt;br&amp;gt; &lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf Securing the Internet of Things: Mapping IoT Attack Surface Areas with the OWASP IoT Top 10 Project] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler, Practice Principal &amp;lt;br&amp;gt;&lt;br /&gt;
April 21, 2015 &amp;lt;br&amp;gt;&lt;br /&gt;
--- &amp;lt;br&amp;gt;&lt;br /&gt;
Defcon 23 &amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler &amp;lt;br&amp;gt;&lt;br /&gt;
August 6-9, 2015&lt;br /&gt;
&lt;br /&gt;
===Podcasts===&lt;br /&gt;
&lt;br /&gt;
* [http://iotpodcast.com/ The Internet of Things Podcast]&lt;br /&gt;
* [http://www.iot-inc.com/ IoT Inc]&lt;br /&gt;
* [https://craigsmith.net/iot-this-week/ IoT This Week]&lt;br /&gt;
* [http://farstuff.com/ Farstuff: The Internet of Things Podcast]&lt;br /&gt;
&lt;br /&gt;
===IoT Conferences===&lt;br /&gt;
&lt;br /&gt;
* [http://www.iotevents.org Internet of Things Events]&lt;br /&gt;
&lt;br /&gt;
Conference Call for Papers&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=internet+of+things&amp;amp;year=t WikiCFP - Internet of Things]&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=iot&amp;amp;year=t WikiCFP - IoT]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name =OWASP Internet of Things Project&lt;br /&gt;
| project_description = &lt;br /&gt;
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. &lt;br /&gt;
| leader_name1 = Daniel Miessler&lt;br /&gt;
| leader_email1 = &lt;br /&gt;
| leader_username1 = &lt;br /&gt;
| leader_name2 =Craig Smith&lt;br /&gt;
| leader_email2 = &lt;br /&gt;
| leader_username2 = &lt;br /&gt;
| contributor_name1 = Justin Klein Keane]&lt;br /&gt;
| contributor_email1 = &lt;br /&gt;
| contributor_username1 = Justin_C._Klein_Keane&lt;br /&gt;
| contributor_name2 = Yunsoul&lt;br /&gt;
| contributor_email2 = &lt;br /&gt;
| contributor_username2 = Yunsoul&lt;br /&gt;
| mailing_list_name = &lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 =&lt;br /&gt;
}}  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project]] &lt;br /&gt;
[[Category:OWASP_Document]] &lt;br /&gt;
[[Category:OWASP_Download]] &lt;br /&gt;
[[Category:OWASP_Release_Quality_Document]]&lt;/div&gt;</summary>
		<author><name>Andylew</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Internet_of_Things_Project&amp;diff=231832</id>
		<title>OWASP Internet of Things Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Internet_of_Things_Project&amp;diff=231832"/>
				<updated>2017-07-24T21:25:07Z</updated>
		
		<summary type="html">&lt;p&gt;Andylew: Added a commented request to open up slack/contact me in hopes somebody's watching this page &amp;amp; will see it&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Main =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Internet of Things (IoT) Project==&lt;br /&gt;
&lt;br /&gt;
Oxford defines the Internet of Things as: “A proposed development of the Internet in which everyday objects have network connectivity, allowing them to send and receive data.”&lt;br /&gt;
&lt;br /&gt;
''The OWASP Internet of Things Project is designed to help manufacturers, developers, and consumers better understand the security issues associated with the Internet of Things, and to enable users in any context to make better security decisions when building, deploying, or assessing IoT technologies''. &lt;br /&gt;
&lt;br /&gt;
The project looks to define a structure for various IoT sub-projects such as Attack Surface Areas, Testing Guides and Top Vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
[[File:iot-project.png|400px|thumb|center]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Internet of Things Project is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Internet of Things Project? ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Internet of Things Project provides information on:&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Attack_Surface_Areas IoT Attack Surface Areas]&lt;br /&gt;
* IoT Vulnerabilities&lt;br /&gt;
* Firmware Analysis&lt;br /&gt;
* ICS/SCADA Software Weaknesses&lt;br /&gt;
* Community Information&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Testing_Guides IoT Testing Guides]&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Security_Guidance IoT Security Guidance]&lt;br /&gt;
* [https://www.owasp.org/index.php/Principles_of_IoT_Security Principles of IoT Security]&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Framework_Assessment IoT Framework Assessment]&lt;br /&gt;
* Developer, Consumer and Manufacturer Guidance&lt;br /&gt;
* Design Principles&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Contributors ==&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Justin_C._Klein_Keane Justin Klein Keane]&lt;br /&gt;
* Saša Zdjelar&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Project|OWASP Project Repository]]&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
* [[OWASP_.NET_Project|OWASP .NET]]&lt;br /&gt;
* [[Java|OWASP Java and JVM]]&lt;br /&gt;
* [[C/C++|OWASP C/C++]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&amp;lt;!-- Hey Guys - Andy Lewis here.  I'm not great w/slack but when I browse to https://owasp-iot-security.slack.com/signup&lt;br /&gt;
I'm getting &amp;quot;This team's administrator has not enabled email signups.&amp;quot; and &amp;quot;Ask your administrator to send you an invitation.&amp;quot;&lt;br /&gt;
I'm adding this comment in hopes of being able to get in contact w/someone from the project after Blackhat/Defcon.&lt;br /&gt;
If you're reading this, could you please reach out to me &lt;br /&gt;
alewis@owasp.org&lt;br /&gt;
or open up the slack channel to auto-OK @owasp.org addresses?&lt;br /&gt;
Thanks&lt;br /&gt;
Andy&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping DEFCON 23]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/2/2d/Iot_testing_methodology.JPG IoT Testing Guidance Handout]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/7/71/Internet_of_Things_Top_Ten_2014-OWASP.pdf OWASP IoT Top Ten PDF]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/8/8e/Infographic-v1.jpg OWASP IoT Top Ten Infographic]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/0/01/Internet_of_Things_Top_Ten_2014-OWASP-ppt.pptx OWASP IoT Top Ten PPT]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf OWASP IoT Top Ten-RSA 2015]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/b/bd/OWASP-IoT.pptx OWASP IoT Project Overview]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Added a [https://owasp-iot-security.slack.com/ Slack channel]&lt;br /&gt;
* Added a sub-project; [https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project#tab=IoT_Security_Policy_Project IoT Security Policy Project]&lt;br /&gt;
* Daniel Miessler gave his [https://www.youtube.com/watch?v=RhxHHD790nw IoT talk at DEFCON 23]&lt;br /&gt;
* Migrating the IoT Top Ten to be under the IoT Project&lt;br /&gt;
* HP Study Reveals 70 Percent of Internet of Things Devices Vulnerable to Attack&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Attack Surface Areas =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Attack Surface Areas Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP IoT Attack Surface Areas (DRAFT) are as follows:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Vulnerability&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem (general)'''&lt;br /&gt;
|&lt;br /&gt;
* Interoperability standards&lt;br /&gt;
* Data governance&lt;br /&gt;
* System wide failure&lt;br /&gt;
* Individual stakeholder risks&lt;br /&gt;
* Implicit trust between components&lt;br /&gt;
* Enrollment security&lt;br /&gt;
* Decommissioning system&lt;br /&gt;
* Lost access procedures&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Memory'''&lt;br /&gt;
|&lt;br /&gt;
* Sensitive data&lt;br /&gt;
** Cleartext usernames&lt;br /&gt;
** Cleartext passwords&lt;br /&gt;
** Third-party credentials&lt;br /&gt;
** Encryption keys&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Physical Interfaces'''&lt;br /&gt;
|&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* User CLI&lt;br /&gt;
* Admin CLI&lt;br /&gt;
* Privilege escalation&lt;br /&gt;
* Reset to insecure state&lt;br /&gt;
* Removal of storage media&lt;br /&gt;
* Tamper resistance&lt;br /&gt;
* Debug port&lt;br /&gt;
** UART (Serial)&lt;br /&gt;
** JTAG / SWD&lt;br /&gt;
* Device ID/Serial number exposure&lt;br /&gt;
|-&lt;br /&gt;
| '''Device Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Standard set of web application vulnerabilities, see:&lt;br /&gt;
** [[:Category:OWASP Top Ten Project|OWASP Web Top 10]]&lt;br /&gt;
** [[:Category:OWASP Application Security Verification Standard Project|OWASP ASVS]]&lt;br /&gt;
** [[:Category:OWASP Testing Project|OWASP Testing guide]]&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Firmware'''&lt;br /&gt;
|&lt;br /&gt;
* Sensitive data exposure ([[Top 10 2013-A6-Sensitive Data Exposure|See OWASP Top 10 - A6 Sensitive data exposure]]):&lt;br /&gt;
** Backdoor accounts&lt;br /&gt;
** Hardcoded credentials&lt;br /&gt;
** Encryption keys&lt;br /&gt;
** Encryption (Symmetric, Asymmetric)&lt;br /&gt;
** Sensitive information&lt;br /&gt;
** Sensitive URL disclosure&lt;br /&gt;
* Firmware version display and/or last update date&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
** Verify for old sw versions and possible attacks (Heartbleed, Shellshock, old PHP versions etc)&lt;br /&gt;
* Security related function API exposure&lt;br /&gt;
* Firmware downgrade possibility&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Network Services'''&lt;br /&gt;
|&lt;br /&gt;
* Information disclosure&lt;br /&gt;
* User CLI&lt;br /&gt;
* Administrative CLI&lt;br /&gt;
* Injection&lt;br /&gt;
* Denial of Service&lt;br /&gt;
* Unencrypted Services&lt;br /&gt;
* Poorly implemented encryption&lt;br /&gt;
* Test/Development Services&lt;br /&gt;
* Buffer Overflow&lt;br /&gt;
* UPnP&lt;br /&gt;
* Vulnerable UDP Services&lt;br /&gt;
* DoS&lt;br /&gt;
* Device Firmware OTA update block&lt;br /&gt;
* Firmware loaded over insecure channel (no TLS)&lt;br /&gt;
* Replay attack&lt;br /&gt;
* Lack of payload verification&lt;br /&gt;
* Lack of message integrity check&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Administrative Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Standard set of web application vulnerabilities, see:&lt;br /&gt;
** [[:Category:OWASP Top Ten Project|OWASP Web Top 10]]&lt;br /&gt;
** [[:Category:OWASP Application Security Verification Standard Project|OWASP ASVS]]&lt;br /&gt;
** [[:Category:OWASP Testing Project|OWASP Testing guide]]&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
* Security/encryption options&lt;br /&gt;
* Logging options&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
* Check for insecure direct object references&lt;br /&gt;
* Inability to wipe device&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Data Storage'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted data&lt;br /&gt;
* Data encrypted with discovered keys&lt;br /&gt;
* Lack of data integrity checks&lt;br /&gt;
* Use of static same enc/dec key&lt;br /&gt;
|- &lt;br /&gt;
| '''Cloud Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
&lt;br /&gt;
* Standard set of web application vulnerabilities, see:&lt;br /&gt;
** [[:Category:OWASP Top Ten Project|OWASP Web Top 10]]&lt;br /&gt;
** [[:Category:OWASP Application Security Verification Standard Project|OWASP ASVS]]&lt;br /&gt;
** [[:Category:OWASP Testing Project|OWASP Testing guide]]&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Third-party Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted PII sent&lt;br /&gt;
* Encrypted PII sent&lt;br /&gt;
* Device information leaked&lt;br /&gt;
* Location leaked&lt;br /&gt;
|- &lt;br /&gt;
| '''Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update sent without encryption&lt;br /&gt;
* Updates not signed&lt;br /&gt;
* Update location writable&lt;br /&gt;
* Update verification&lt;br /&gt;
* Update authentication&lt;br /&gt;
* Malicious update&lt;br /&gt;
* Missing update mechanism&lt;br /&gt;
* No manual update mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Mobile Application'''&lt;br /&gt;
|&lt;br /&gt;
* Implicitly trusted by device or cloud&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Insecure data storage&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Insecure password recovery mechanism&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Vendor Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Inherent trust of cloud or mobile application&lt;br /&gt;
* Weak authentication&lt;br /&gt;
* Weak access controls&lt;br /&gt;
* Injection attacks&lt;br /&gt;
* Hidden services&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem Communication'''&lt;br /&gt;
|&lt;br /&gt;
* Health checks&lt;br /&gt;
* Heartbeats&lt;br /&gt;
* Ecosystem commands&lt;br /&gt;
* Deprovisioning&lt;br /&gt;
* Pushing updates&lt;br /&gt;
|- &lt;br /&gt;
| '''Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* LAN&lt;br /&gt;
* LAN to Internet&lt;br /&gt;
* Short range&lt;br /&gt;
* Non-standard&lt;br /&gt;
* Wireless (WiFi, Z-wave, XBee, Zigbee, Bluetooth, LoRA)&lt;br /&gt;
* Protocol fuzzing&lt;br /&gt;
|- &lt;br /&gt;
| '''Authentication/Authorization'''&lt;br /&gt;
|&lt;br /&gt;
* Authentication/Authorization related values (session key, token, cookie, etc.) disclosure&lt;br /&gt;
* Reusing of session key, token, etc.&lt;br /&gt;
* Device to device authentication&lt;br /&gt;
* Device to mobile Application authentication&lt;br /&gt;
* Device to cloud system authentication&lt;br /&gt;
* Mobile application to cloud system authentication&lt;br /&gt;
* Web application to cloud system authentication&lt;br /&gt;
* Lack of dynamic authentication&lt;br /&gt;
|-&lt;br /&gt;
| '''Privacy'''&lt;br /&gt;
|&lt;br /&gt;
* User data disclosure&lt;br /&gt;
* User/device location disclosure&lt;br /&gt;
* Differential privacy&lt;br /&gt;
|-&lt;br /&gt;
| '''Hardware (Sensors)'''&lt;br /&gt;
|&lt;br /&gt;
* Sensing Environment Manipulation&lt;br /&gt;
* Tampering (Physically)&lt;br /&gt;
* Damage (Physicall)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Attack Surface Areas Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Attack Surface Areas Project provides a list of attack surfaces that should be understood by manufacturers, developers, security researchers, and those looking to deploy or implement IoT technologies within their organizations.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Vulnerabilities =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Vulnerabilities Project ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Vulnerability&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Summary&lt;br /&gt;
|-&lt;br /&gt;
| '''Username Enumeration'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Device Web Interface&lt;br /&gt;
* Cloud Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Ability to collect a set of valid usernames by interacting with the authentication mechanism&lt;br /&gt;
|-&lt;br /&gt;
| '''Weak Passwords'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Device Web Interface&lt;br /&gt;
* Cloud Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Ability to set account passwords to '1234' or '123456' for example.&lt;br /&gt;
* Usage of pre-programmed default passwords&lt;br /&gt;
|-&lt;br /&gt;
| '''Account Lockout'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Device Web Interface&lt;br /&gt;
* Cloud Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Ability to continue sending authentication attempts after 3 - 5 failed login attempts&lt;br /&gt;
|-&lt;br /&gt;
| '''Unencrypted Services'''&lt;br /&gt;
|&lt;br /&gt;
* Device Network Services&lt;br /&gt;
|&lt;br /&gt;
* Network services are not properly encrypted to prevent eavesdropping or tampering  by attackers&lt;br /&gt;
|-&lt;br /&gt;
| '''Two-factor Authentication'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Cloud Web Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Lack of two-factor authentication mechanisms such as a security token or fingerprint scanner&lt;br /&gt;
|-&lt;br /&gt;
| '''Poorly Implemented Encryption'''&lt;br /&gt;
|&lt;br /&gt;
* Device Network Services&lt;br /&gt;
|&lt;br /&gt;
* Encryption is implemented however it is improperly configured or is not being properly updated, e.g. using SSL v2 &lt;br /&gt;
|-&lt;br /&gt;
| '''Update Sent Without Encryption'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* Updates are transmitted over the network without using TLS or encrypting the update file itself&lt;br /&gt;
|-&lt;br /&gt;
| '''Update Location Writable'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* Storage location for update files is world writable potentially allowing firmware to be modified and distributed to all users&lt;br /&gt;
|-&lt;br /&gt;
| '''Denial of Service'''&lt;br /&gt;
|&lt;br /&gt;
* Device Network Services&lt;br /&gt;
|&lt;br /&gt;
* Service can be attacked in a way that denies service to that service or the entire device&lt;br /&gt;
|-&lt;br /&gt;
| '''Removal of Storage Media'''&lt;br /&gt;
|&lt;br /&gt;
* Device Physical Interfaces&lt;br /&gt;
|&lt;br /&gt;
* Ability to physically remove the storage media from the device&lt;br /&gt;
|-&lt;br /&gt;
| '''No Manual Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* No ability to manually force an update check for the device&lt;br /&gt;
|-&lt;br /&gt;
| '''Missing Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* No ability to update device&lt;br /&gt;
|-&lt;br /&gt;
| '''Firmware Version Display and/or Last Update Date'''&lt;br /&gt;
|&lt;br /&gt;
* Device Firmware&lt;br /&gt;
|&lt;br /&gt;
* Current firmware version is not displayed and/or the last update date is not displayed&lt;br /&gt;
|-&lt;br /&gt;
| '''Firmware and storage extraction'''&lt;br /&gt;
|&lt;br /&gt;
* JTAG / SWD interface&lt;br /&gt;
* [https://www.flashrom.org/Flashrom In-Situ dumping]&lt;br /&gt;
* Intercepting a OTA update&lt;br /&gt;
* Downloading from the manufacturers web page&lt;br /&gt;
* [https://www.exploitee.rs/index.php/Exploitee.rs_Low_Voltage_e-MMC_Adapter eMMC tapping]&lt;br /&gt;
* Unsoldering the SPI Flash / eMMC chip and reading it in a adapter&lt;br /&gt;
|&lt;br /&gt;
* Firmware contains a lot of useful information, like source code and binaries of running services, pre-set passwords, ssh keys etc.  &lt;br /&gt;
|-&lt;br /&gt;
| '''Manipulating the code execution flow of the device'''&lt;br /&gt;
|&lt;br /&gt;
* JTAG / SWD interface&lt;br /&gt;
* [https://wiki.newae.com/Main_Page Side channel attacks like glitching]&lt;br /&gt;
|&lt;br /&gt;
* With the help of a JTAG adapter and gdb we can modify the execution of firmware in the device and bypass almost all software based security controls.&lt;br /&gt;
* Side channel attacks can also modify the execution flow or can be used to leak interesting information from the device&lt;br /&gt;
|-&lt;br /&gt;
| '''Obtaining console access'''&lt;br /&gt;
|&lt;br /&gt;
* Serial interfaces (SPI / UART)&lt;br /&gt;
|&lt;br /&gt;
* By connecting to a serial interface, we will obtain full console access to a device&lt;br /&gt;
* Usually security measures include custom bootloaders that prevent the attacker from entering single user mode, but that can also be bypassed.&lt;br /&gt;
|-&lt;br /&gt;
| '''Insecure 3rd party components'''&lt;br /&gt;
|&lt;br /&gt;
* Software&lt;br /&gt;
|&lt;br /&gt;
* Out of date versions of busybox, openssl, ssh, web servers, etc.&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Vulnerabilities Project provides:&lt;br /&gt;
&lt;br /&gt;
* Information on the top IoT vulnerabilities&lt;br /&gt;
* The attack surface associated with the vulnerability&lt;br /&gt;
* A summary of the vulnerability&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Medical Devices =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Medical Device Testing ==&lt;br /&gt;
&lt;br /&gt;
The Medical Device Testing project is intended to provide some basic attack surface considerations that should be evaluated before shipping Medical Device equipment.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Vulnerability&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem (general)'''&lt;br /&gt;
|&lt;br /&gt;
* Interoperability standards&lt;br /&gt;
* Data governance&lt;br /&gt;
* System wide failure&lt;br /&gt;
* Individual stakeholder risks&lt;br /&gt;
* Implicit trust between components&lt;br /&gt;
* Enrollment security&lt;br /&gt;
* Decommissioning system&lt;br /&gt;
* Lost access procedures&lt;br /&gt;
|- &lt;br /&gt;
| '''HL7'''&lt;br /&gt;
|&lt;br /&gt;
* XML Parsing&lt;br /&gt;
** XSS&lt;br /&gt;
* Information Disclosure&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Memory'''&lt;br /&gt;
|&lt;br /&gt;
* Sensitive data&lt;br /&gt;
** Cleartext usernames&lt;br /&gt;
** Cleartext passwords&lt;br /&gt;
** Third-party credentials&lt;br /&gt;
** Encryption keys&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Physical Interfaces'''&lt;br /&gt;
|&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* User CLI&lt;br /&gt;
* Admin CLI&lt;br /&gt;
* Privilege escalation&lt;br /&gt;
* Reset to insecure state&lt;br /&gt;
* Removal of storage media&lt;br /&gt;
* Tamper resistance&lt;br /&gt;
* Debug port&lt;br /&gt;
* Device ID/Serial number exposure&lt;br /&gt;
|-&lt;br /&gt;
| '''Device Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Standard set of web vulnerabilities:&lt;br /&gt;
** SQL injection&lt;br /&gt;
** Cross-site scripting&lt;br /&gt;
** Cross-site Request Forgery&lt;br /&gt;
** Username enumeration&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Firmware'''&lt;br /&gt;
|&lt;br /&gt;
* Sensitive data exposure:&lt;br /&gt;
** Backdoor accounts&lt;br /&gt;
** Hardcoded credentials&lt;br /&gt;
** Encryption keys&lt;br /&gt;
** Encryption (Symmetric, Asymmetric)&lt;br /&gt;
** Sensitive information&lt;br /&gt;
** Sensitive URL disclosure&lt;br /&gt;
* Firmware version display and/or last update date&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
* Security related function API exposure&lt;br /&gt;
* Firmware downgrade&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Network Services'''&lt;br /&gt;
|&lt;br /&gt;
* Information disclosure&lt;br /&gt;
* User CLI&lt;br /&gt;
* Administrative CLI&lt;br /&gt;
* Injection&lt;br /&gt;
* Denial of Service&lt;br /&gt;
* Unencrypted Services&lt;br /&gt;
* Poorly implemented encryption&lt;br /&gt;
* Test/Development Services&lt;br /&gt;
* Buffer Overflow&lt;br /&gt;
* UPnP&lt;br /&gt;
* Vulnerable UDP Services&lt;br /&gt;
* DoS&lt;br /&gt;
* Device Firmware OTA update block&lt;br /&gt;
* Replay attack&lt;br /&gt;
* Lack of payload verification&lt;br /&gt;
* Lack of message integrity check&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Administrative Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Standard web vulnerabilities:&lt;br /&gt;
** SQL injection&lt;br /&gt;
** Cross-site scripting&lt;br /&gt;
** Cross-site Request Forgery&lt;br /&gt;
** Username enumeration&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
* Security/encryption options&lt;br /&gt;
* Logging options&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
* Inability to wipe device&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Data Storage'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted data&lt;br /&gt;
* Data encrypted with discovered keys&lt;br /&gt;
* Lack of data integrity checks&lt;br /&gt;
* Use of static same enc/dec key&lt;br /&gt;
|- &lt;br /&gt;
| '''Cloud Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Standard set of web vulnerabilities:&lt;br /&gt;
** SQL injection&lt;br /&gt;
** Cross-site scripting&lt;br /&gt;
** Cross-site Request Forgery&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Third-party Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted PII sent&lt;br /&gt;
* Encrypted PII sent&lt;br /&gt;
* Device information leaked&lt;br /&gt;
* Location leaked&lt;br /&gt;
|- &lt;br /&gt;
| '''Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update sent without encryption&lt;br /&gt;
* Updates not signed&lt;br /&gt;
* Update location writable&lt;br /&gt;
* Update verification&lt;br /&gt;
* Update authentication&lt;br /&gt;
* Malicious update&lt;br /&gt;
* Missing update mechanism&lt;br /&gt;
* No manual update mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Mobile Application'''&lt;br /&gt;
|&lt;br /&gt;
* Implicitly trusted by device or cloud&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Insecure data storage&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Insecure password recovery mechanism&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Vendor Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Inherent trust of cloud or mobile application&lt;br /&gt;
* Weak authentication&lt;br /&gt;
* Weak access controls&lt;br /&gt;
* Injection attacks&lt;br /&gt;
* Hidden services&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem Communication'''&lt;br /&gt;
|&lt;br /&gt;
* Health checks&lt;br /&gt;
* Heartbeats&lt;br /&gt;
* Ecosystem commands&lt;br /&gt;
* Deprovisioning&lt;br /&gt;
* Pushing updates&lt;br /&gt;
|- &lt;br /&gt;
| '''Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* LAN&lt;br /&gt;
* LAN to Internet&lt;br /&gt;
* Short range&lt;br /&gt;
* Non-standard&lt;br /&gt;
* Wireless (WiFi, Z-wave, XBee, Zigbee, Bluetooth, LoRA)&lt;br /&gt;
* Protocol fuzzing&lt;br /&gt;
|- &lt;br /&gt;
| '''Authentication/Authorization'''&lt;br /&gt;
|&lt;br /&gt;
* Authentication/Authorization related values (session key, token, cookie, etc.) disclosure&lt;br /&gt;
* Reusing of session key, token, etc.&lt;br /&gt;
* Device to device authentication&lt;br /&gt;
* Device to mobile Application authentication&lt;br /&gt;
* Device to cloud system authentication&lt;br /&gt;
* Mobile application to cloud system authentication&lt;br /&gt;
* Web application to cloud system authentication&lt;br /&gt;
* Lack of dynamic authentication&lt;br /&gt;
|-&lt;br /&gt;
| '''Data Flow'''&lt;br /&gt;
|&lt;br /&gt;
* What data is being captured?&lt;br /&gt;
* How does it move within the ecosystem?&lt;br /&gt;
* How is it protected in transit?&lt;br /&gt;
* How is it protected at rest?&lt;br /&gt;
* Who is that data shared with?&lt;br /&gt;
|-&lt;br /&gt;
| '''Hardware (Sensors)'''&lt;br /&gt;
|&lt;br /&gt;
* Sensing Environment Manipulation&lt;br /&gt;
* Tampering (Physically)&lt;br /&gt;
* Damaging (Physically)&lt;br /&gt;
* Failure state analysis&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Medical Attack Surfaces project? ==&lt;br /&gt;
&lt;br /&gt;
The Medical Attack Surfaces project provides:&lt;br /&gt;
&lt;br /&gt;
* A simple way for testers, manufacturers, developers, and users to get an understanding of the complexity of a modern medical environment&lt;br /&gt;
* Allows people to visualize the numerous attack surfaces that need to be defended within medical equipment ecosystems&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Firmware_Analysis IoT Firmware Analysis Primer]&lt;br /&gt;
* [https://otalliance.org/initiatives/internet-things Online Trust Alliance - Internet of Things]&lt;br /&gt;
* [https://people.debian.org/~aurel32/qemu/ Pre-compiled QEMU images]&lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://craigsmith.net/episode-11-1-firmware-extraction/ Short Firmware Extraction Video]&lt;br /&gt;
* [https://craigsmith.net/episode-12-1-firmware-emulation-with-qemu/ Firmware Emulation with QEMU]&lt;br /&gt;
* [https://craigsmith.net/episode-18-1-file-extraction-from-network-capture/ File Extraction from Network Capture]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Daniel Miessler presented on using Adaptive Testing Methodologies to evaluate the security of medical devices at RSA 2017.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Firmware Analysis =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Firmware Analysis Project ==&lt;br /&gt;
&lt;br /&gt;
The Firmware Analysis Project is intended to provide security testing guidance for the IoT Attack Surface &amp;quot;Device Firmware&amp;quot;:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Section&lt;br /&gt;
! &lt;br /&gt;
|- &lt;br /&gt;
|&lt;br /&gt;
Device Firmware Vulnerabilties&lt;br /&gt;
|&lt;br /&gt;
* Out-of-date core components&lt;br /&gt;
* Unsupported core components&lt;br /&gt;
* Expired and/or self-signed certificates&lt;br /&gt;
* Same certificate used on multiple devices&lt;br /&gt;
* Admin web interface concerns&lt;br /&gt;
* Hardcoded or easy to guess credentials&lt;br /&gt;
* Sensitive information disclosure&lt;br /&gt;
* Sensitive URL disclosure&lt;br /&gt;
* Encryption key exposure&lt;br /&gt;
* Backdoor accounts&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Manufacturer Recommendations&lt;br /&gt;
|&lt;br /&gt;
* Ensure that supported and up-to-date software is used by developers&lt;br /&gt;
* Ensure that robust update mechanisms are in place for devices&lt;br /&gt;
* Ensure that certificates are not duplicated across devices and product lines.&lt;br /&gt;
* Ensure supported and up-to-date software is used by developers&lt;br /&gt;
* Develop a mechanism to ensure a new certificate is installed when old ones expire&lt;br /&gt;
* Disable deprecated SSL versions&lt;br /&gt;
* Ensure developers do not code in easy to guess or common admin passwords&lt;br /&gt;
* Ensure services such as SSH have a secure password created&lt;br /&gt;
* Develop a mechanism that requires the user to create a secure admin password during initial device setup&lt;br /&gt;
* Ensure developers do not hard code passwords or hashes&lt;br /&gt;
* Have source code reviewed by a third party before releasing device to production&lt;br /&gt;
* Ensure industry standard encryption or strong hashing is used&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Device Firmware Guidance and Instruction&lt;br /&gt;
|&lt;br /&gt;
* Firmware file analysis&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* Dynamic binary analysis&lt;br /&gt;
* Static binary analysis&lt;br /&gt;
* Static code analysis&lt;br /&gt;
* Firmware emulation&lt;br /&gt;
* File system analysis&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Device Firmware Tools&lt;br /&gt;
|&lt;br /&gt;
* [https://github.com/craigz28/firmwalker Firmwalker] &lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://github.com/angr/angr Angr binary analysis framework]&lt;br /&gt;
* [http://binwalk.org/ Binwalk firmware analysis tool]&lt;br /&gt;
* [http://www.binaryanalysis.org/en/home Binary Analysis Tool]&lt;br /&gt;
* [https://github.com/firmadyne/firmadyne Firmadyne]&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Vulnerable Firmware&lt;br /&gt;
|&lt;br /&gt;
* [https://github.com/praetorian-inc/DVRF Damn Vulnerable Router Firmware]&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Firmware Analysis Project? ==&lt;br /&gt;
&lt;br /&gt;
The Firmware Analysis Project provides:&lt;br /&gt;
&lt;br /&gt;
* Security testing guidance for vulnerabilities in the &amp;quot;Device Firmware&amp;quot; attack surface&lt;br /&gt;
* Steps for extracting file systems from various firmware files&lt;br /&gt;
* Guidance on searching a file systems for sensitive of interesting data&lt;br /&gt;
* Information on static analysis of firmware contents&lt;br /&gt;
* Information on dynamic analysis of emulated services (e.g. web admin interface)&lt;br /&gt;
* Testing tool links&lt;br /&gt;
* A site for pulling together existing information on firmware analysis&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Firmware_Analysis IoT Firmware Analysis Primer]&lt;br /&gt;
* [https://otalliance.org/initiatives/internet-things Online Trust Alliance - Internet of Things]&lt;br /&gt;
* [https://people.debian.org/~aurel32/qemu/ Pre-compiled QEMU images]&lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://craigsmith.net/episode-11-1-firmware-extraction/ Short Firmware Extraction Video]&lt;br /&gt;
* [https://craigsmith.net/episode-12-1-firmware-emulation-with-qemu/ Firmware Emulation with QEMU]&lt;br /&gt;
* [https://craigsmith.net/episode-18-1-file-extraction-from-network-capture/ File Extraction from Network Capture]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Event Logging Project=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:                   OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Logging Events==&lt;br /&gt;
&lt;br /&gt;
This is a working draft of the recommended minimum IoT Device logging events. This includes many   different types of devices, including consumer IoT, enterprise IoT, and ICS/SCADA type devices.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Event Category&lt;br /&gt;
! Events&lt;br /&gt;
|-&lt;br /&gt;
| '''Request Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Attempt to Invoke Unsupported HTTP Method&lt;br /&gt;
* Unexpected Quantity of Characters in Parameter&lt;br /&gt;
* Unexpected Type of Characters in Parameter&lt;br /&gt;
|-&lt;br /&gt;
| '''Authentication Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Multiple Failed Passwords&lt;br /&gt;
* High Rate of Login Attempts&lt;br /&gt;
* Additional POST Variable&lt;br /&gt;
* Deviation from Normal GEO Location&lt;br /&gt;
|-&lt;br /&gt;
| '''Session Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Modifying the Existing Cookie&lt;br /&gt;
* Substituting Another User's Valid SessionID or Cookie&lt;br /&gt;
* Source Location Changes During Session&lt;br /&gt;
|-&lt;br /&gt;
| '''Access Control Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Modifying URL Argument Within a GET for Direct Object Access Attempt&lt;br /&gt;
* Modifying Parameter Within a POST for Direct Object Access Attempt&lt;br /&gt;
* Forced Browsing Attempt&lt;br /&gt;
|-&lt;br /&gt;
| '''Ecosystem Membership Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Traffic Seen from Disenrolled System&lt;br /&gt;
* Traffic Seen from Unenrolled System&lt;br /&gt;
* Failed Attempt to Enroll in Ecosystem&lt;br /&gt;
* Multiple Attempts to Enroll in Ecosystem&lt;br /&gt;
|-&lt;br /&gt;
| '''Device Access Events'''&lt;br /&gt;
|&lt;br /&gt;
* Device Case Tampering Detected&lt;br /&gt;
* Device Logic Board Tampering Detected&lt;br /&gt;
|-&lt;br /&gt;
| '''Administrative Mode Events'''&lt;br /&gt;
|&lt;br /&gt;
* Device Entered Administrative Mode&lt;br /&gt;
* Device Accessed Using Default Administrative Credentials&lt;br /&gt;
|-&lt;br /&gt;
| '''Input Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Double Encoded Character&lt;br /&gt;
* Unexpected Encoding Used&lt;br /&gt;
|-&lt;br /&gt;
| '''Command Injection Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Blacklist Inspection for Common SQL Injection Values&lt;br /&gt;
* Abnormal Quantity of Returned Records&lt;br /&gt;
|-&lt;br /&gt;
| '''Honey Trap Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Honey Trap Resource Requested&lt;br /&gt;
* Honey Trap Data Used&lt;br /&gt;
|-&lt;br /&gt;
| '''Reputation Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Suspicious or Disallowed User Source Location&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:  25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Security Logging Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Secure Logging Project provides a list of core events that should be logged in any IoT-related system. The project exists because IoT systems in general are not logging nearly enough events to constitute input for a solid detection and response program around IoT devices, and for companies that want to do this there are not many good resources for what should be logged.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_AppSensor_Project The OWASP AppSensor Project]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= ICS/SCADA =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== ICS/SCADA Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP ICS/SCADA Top 10 software weaknesses are as follows:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Rank and ID&lt;br /&gt;
! Title&lt;br /&gt;
|- &lt;br /&gt;
| '''1 - CWE-119'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Restriction of Operations within the Bounds of a Memory Buffer&lt;br /&gt;
|- &lt;br /&gt;
| '''2 - CWE-20'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Input Validation&lt;br /&gt;
|- &lt;br /&gt;
| '''3 - CWE-22'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')&lt;br /&gt;
|-&lt;br /&gt;
| '''4 - CWE-264'''&lt;br /&gt;
|&lt;br /&gt;
* Permissions, Privileges, and Access Controls&lt;br /&gt;
|- &lt;br /&gt;
| '''5 - CWE-200'''&lt;br /&gt;
|&lt;br /&gt;
* Information Exposure&lt;br /&gt;
|- &lt;br /&gt;
| '''6 - CWE-255'''&lt;br /&gt;
|&lt;br /&gt;
* Credentials Management&lt;br /&gt;
|- &lt;br /&gt;
| '''7 - CWE-287'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''8 - CWE-399'''&lt;br /&gt;
|&lt;br /&gt;
* Resource Management Errors&lt;br /&gt;
|- &lt;br /&gt;
| '''9 - CWE-79'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')&lt;br /&gt;
|- &lt;br /&gt;
| '''10 - CWE-189'''&lt;br /&gt;
|&lt;br /&gt;
* Numeric Errors&lt;br /&gt;
|- &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the ICS/SCADA Project? ==&lt;br /&gt;
&lt;br /&gt;
The ICS/SCADA Project provides:&lt;br /&gt;
&lt;br /&gt;
* A list of the Top 10 most dangerous software weaknesses&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* NJ Ouchn&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Security Policy Project =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Security Policy Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP IoT Security Policy Project provides:&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Security Policies Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Security Policy Project provides:&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Saša Zdjelar&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Community =&lt;br /&gt;
&lt;br /&gt;
[https://www.iamthecavalry.org/ I Am The Cavalry] &lt;br /&gt;
&lt;br /&gt;
A global grassroots organization that is focused on issues where computer security intersects public safety and human life.&lt;br /&gt;
&lt;br /&gt;
Their areas of focus include:&lt;br /&gt;
* Medical devices&lt;br /&gt;
* Automobiles&lt;br /&gt;
* Home Electronics&lt;br /&gt;
* Public Infrastructure&lt;br /&gt;
&lt;br /&gt;
[https://otalliance.org Online Trust Alliance]&lt;br /&gt;
&lt;br /&gt;
Formed as an informal industry working group in 2005, today OTA is an Internal Revenue Service (IRS) approved 501c3 charitable organization with the mission to enhance online trust and empower users, while promoting innovation and the vitality of the internet.  OTA is global organization supported by over 100 organizations headquartered in Bellevue, Washington with offices in Washington DC.&lt;br /&gt;
&lt;br /&gt;
Addressing the mounting concerns, in January 2015 the Online Trust Alliance, established the [https://otalliance.org/initiatives/internet-things IoT Trustworthy Working Group (ITWG)], a multi-stakeholder initiative.  The group recognizes “security and privacy by design” must be a priority from the onset of product development and be addressed holistically. The framework focuses on privacy, security sustainability. The sustainability pillar is critical as it looks at the life-cycle issues related to long- term supportability and transfers of ownership of devices and the data collected.&lt;br /&gt;
&lt;br /&gt;
[https://allseenalliance.org/framework AllSeen Alliance]&lt;br /&gt;
&lt;br /&gt;
The AllSeen Alliance is a Linux Foundation collaborative project.  They're a cross-industry consortium dedicated to enabling the interoperability of billions of devices, services and apps that comprise the Internet of Things.  The Alliance supports the AllJoyn Framework, an open source software framework that makes it easy for devices and apps to discover and communicate with each other. Developers can write applications for interoperability regardless of transport layer, manufacturer, and without the need for Internet access. The software has been and will continue to be openly available for developers to download, and runs on popular platforms such as Linux and Linux-based Android, iOS, and Windows, including many other lightweight real-time operating systems.&lt;br /&gt;
&lt;br /&gt;
[http://www.iiconsortium.org/ The Industrial Internet Consortium (IIC)]&lt;br /&gt;
&lt;br /&gt;
The Industrial Internet Consortium is the open membership, international not-for-profit consortium that is setting the architectural framework and direction for the Industrial Internet. Founded by AT&amp;amp;T, Cisco, GE, IBM and Intel in March 2014, the consortium’s mission is to coordinate vast ecosystem initiatives to connect and integrate objects with people, processes and data using common architectures, interoperability and open standards.&lt;br /&gt;
&lt;br /&gt;
[http://securingsmartcities.org/ Securing Smart Cities]&lt;br /&gt;
&lt;br /&gt;
Securing Smart Cities is a not-for-profit global initiative that aims to solve the existing and future cybersecurity problems of smart cities through collaboration between companies, governments, media outlets, other not-for-profit initiatives and individuals across the world.&lt;br /&gt;
&lt;br /&gt;
===Talks===&lt;br /&gt;
&lt;br /&gt;
RSA Conference San Francisco &amp;lt;br&amp;gt; &lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf Securing the Internet of Things: Mapping IoT Attack Surface Areas with the OWASP IoT Top 10 Project] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler, Practice Principal &amp;lt;br&amp;gt;&lt;br /&gt;
April 21, 2015 &amp;lt;br&amp;gt;&lt;br /&gt;
--- &amp;lt;br&amp;gt;&lt;br /&gt;
Defcon 23 &amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler &amp;lt;br&amp;gt;&lt;br /&gt;
August 6-9, 2015&lt;br /&gt;
&lt;br /&gt;
===Podcasts===&lt;br /&gt;
&lt;br /&gt;
* [http://iotpodcast.com/ The Internet of Things Podcast]&lt;br /&gt;
* [http://www.iot-inc.com/ IoT Inc]&lt;br /&gt;
* [https://craigsmith.net/iot-this-week/ IoT This Week]&lt;br /&gt;
* [http://farstuff.com/ Farstuff: The Internet of Things Podcast]&lt;br /&gt;
&lt;br /&gt;
===IoT Conferences===&lt;br /&gt;
&lt;br /&gt;
* [http://www.iotevents.org Internet of Things Events]&lt;br /&gt;
&lt;br /&gt;
Conference Call for Papers&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=internet+of+things&amp;amp;year=t WikiCFP - Internet of Things]&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=iot&amp;amp;year=t WikiCFP - IoT]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name =OWASP Internet of Things Project&lt;br /&gt;
| project_description = &lt;br /&gt;
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. &lt;br /&gt;
| leader_name1 = Daniel Miessler&lt;br /&gt;
| leader_email1 = &lt;br /&gt;
| leader_username1 = &lt;br /&gt;
| leader_name2 =Craig Smith&lt;br /&gt;
| leader_email2 = &lt;br /&gt;
| leader_username2 = &lt;br /&gt;
| contributor_name1 = Justin Klein Keane]&lt;br /&gt;
| contributor_email1 = &lt;br /&gt;
| contributor_username1 = Justin_C._Klein_Keane&lt;br /&gt;
| contributor_name2 = Yunsoul&lt;br /&gt;
| contributor_email2 = &lt;br /&gt;
| contributor_username2 = Yunsoul&lt;br /&gt;
| mailing_list_name = &lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 =&lt;br /&gt;
}}  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project]] &lt;br /&gt;
[[Category:OWASP_Document]] &lt;br /&gt;
[[Category:OWASP_Download]] &lt;br /&gt;
[[Category:OWASP_Release_Quality_Document]]&lt;/div&gt;</summary>
		<author><name>Andylew</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2017&amp;diff=223720</id>
		<title>Front Range OWASP Conference 2017</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2017&amp;diff=223720"/>
				<updated>2016-11-29T15:55:26Z</updated>
		
		<summary type="html">&lt;p&gt;Andylew: Copy/paste from 2016 page w/2017 substitutions&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:SnowFROC2016_Inv_White_med.png]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- [https://www.owasp.org/images/3/31/1024px-SnowFROC_2016_wide_white_smaller.png] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Return of SnowFROC==&lt;br /&gt;
'''SAVE THE DATE - FEBRUARY 18th IT IS ON LIKE DONKEY KONG!'''&lt;br /&gt;
&amp;lt;!-- Dang thumbnails aren't rendering correctly so I'm going with plan B&lt;br /&gt;
{| cellpadding=&amp;quot;15 0 0 &amp;quot;&lt;br /&gt;
 |-&lt;br /&gt;
 | [[Image:BoulderSponsorAerstone.png | 120px | link=https://aerstone.com            | alt=Aerstone         | Aerstone]]&lt;br /&gt;
 | [[Image:SecurityPursuit.png        | 120px | link=http://www.securitypursuit.com/ | alt=Security Pursuit | Security Pursuit]]&lt;br /&gt;
 | [[Image:SouthSeas.png              | 120px | link=http://www.southseascorp.com/   | alt=SouthSeas        | SouthSeas]]&lt;br /&gt;
 | [[Image:Veracode.png               | 120px | link=https://www.veracode.com/       | alt=Veracode         | Veracode]]&lt;br /&gt;
&lt;br /&gt;
 | [[Image:AppliedTrust.png           | 120px | link=http://www.appliedtrust.com     | alt=Applied Trust    | Applied Trust]]&lt;br /&gt;
 | [[Image:Checkmarx.png              | 120px | link=http://www.checkmarx.com/       | alt=Checkmarx        | Checkmarx]]&lt;br /&gt;
 | [[Image:HP.png                     | 120px | link=http://www.hpe.com/              | alt=HP               | HP]]&lt;br /&gt;
 | [[Image:HpLogo.png   | 120px | link=http://www.hpe.com/              | alt=HPE               | HP Enterprise]]&lt;br /&gt;
 |}&lt;br /&gt;
 --&amp;gt;&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;font size=2pt&amp;gt;&lt;br /&gt;
= Introduction =&lt;br /&gt;
{{:Front_Range_OWASP_Conference_2017/Introduction}}&lt;br /&gt;
&lt;br /&gt;
=Registration=&lt;br /&gt;
{{:Front_Range_OWASP_Conference_2017/Registration}}&lt;br /&gt;
&lt;br /&gt;
=Venue=&lt;br /&gt;
{{:Front_Range_OWASP_Conference_2017/Venue}}&lt;br /&gt;
&lt;br /&gt;
=Conference Schedule=&lt;br /&gt;
{{:Front_Range_OWASP_Conference_2017/Schedule}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Speakers=&lt;br /&gt;
{{:Front_Range_OWASP_Conference_2017/Speakers}}&lt;br /&gt;
&lt;br /&gt;
=Presentations=&lt;br /&gt;
{{:Front_Range_OWASP_Conference_2017/Presentations}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Event Sponsors=&lt;br /&gt;
{{:Front_Range_OWASP_Conference_2017/Sponsors}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
=Continuing Education Credit=&lt;br /&gt;
{{:Front_Range_OWASP_Conference_2017/Continuing_Education}}&lt;br /&gt;
&lt;br /&gt;
=Hotel and Travel=&lt;br /&gt;
{{:Front_Range_OWASP_Conference_2017/Travel}}&lt;br /&gt;
&lt;br /&gt;
=Hands-On Lab/CTF=&lt;br /&gt;
{{:Front_Range_OWASP_Conference_2017/CTF}}&lt;br /&gt;
&lt;br /&gt;
=Presentation Materials=&lt;br /&gt;
{{:Front_Range_OWASP_Conference_2017/Archive}}&lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&amp;lt;/font&amp;gt;&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_AppSec_Conference]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Twitter Feed====&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; font-size: 95%; color: rgb(0, 0, 0); background-color: rgb(236, 236, 236);&amp;quot; | &lt;br /&gt;
Use the '''[http://search.twitter.com/search?q=%23FROC #FROC]''' hashtag for your tweets (What are [http://hashtags.org/ hashtags]?) &lt;br /&gt;
&lt;br /&gt;
'''@OWASP303 Twitter Feed ([http://twitter.com/OWASP303 follow us on Twitter!])'''&lt;br /&gt;
| style=&amp;quot;width: 110px; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
|} &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Call for Volunteers==&lt;br /&gt;
We will need all kinds of volunteers.  Stay tuned.&lt;br /&gt;
&lt;br /&gt;
==Call for Sponsors==&lt;br /&gt;
It doesn't happen without sponsors.  Please start to talk this up with your sponsors so that they are inclined to use their marketing dollars for this event...&lt;/div&gt;</summary>
		<author><name>Andylew</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2016/Presentations&amp;diff=212073</id>
		<title>Front Range OWASP Conference 2016/Presentations</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2016/Presentations&amp;diff=212073"/>
				<updated>2016-03-29T21:23:25Z</updated>
		
		<summary type="html">&lt;p&gt;Andylew: Added Bo Pearce's deck; re-arranged list sequence.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Presentations==&lt;br /&gt;
&lt;br /&gt;
Here are the presentations from speakers at SnowFROC 2016.  If you can't find it, it's because the speaker hasn't uploaded it or chose not to share it...&lt;br /&gt;
&lt;br /&gt;
[https://www.whitehatsec.com/company/leadership/jeremiah-grossman/ Jeremiah Grossman's] slideshare [http://www.slideshare.net/jeremiahgrossman/presentations page with all his decks]&lt;br /&gt;
&lt;br /&gt;
[[File:SnowFROC_2016-_Taking_AppSec_to_11.pdf|&amp;quot;Taking AppSec to 11: AppSec Pipelines, DevOps and Making Things Better&amp;quot;]] &amp;quot;Taking AppSec to 11: AppSec Pipelines, DevOps and Making Things Better&amp;quot; by [[User:mtesauro|Matt Tesauro]] (Optimizing an AppSec Program)&lt;br /&gt;
&lt;br /&gt;
[[File:Earle_SnowFROC2016-FalsePositives-Earle.pptx|&amp;quot;False Positives in Static Analysis: the Good, the Bad, and the Ugly&amp;quot;]] &amp;quot;False Positives in Static Analysis: the Good, the Bad, and the Ugly&amp;quot; by Andy Earle&lt;br /&gt;
&lt;br /&gt;
[[File:Hoopes_Deserialization-SnowFROC16.pptx|&amp;quot;Deserialization Demystified&amp;quot;]] &amp;quot;Deserialization Demystified&amp;quot; by Mark Hoopes&lt;br /&gt;
&lt;br /&gt;
[[File:SnowFROC16_-_IoT_BBQ.pdf|&amp;quot;IoT BBQ&amp;quot;]] &amp;quot;IoT BBQ&amp;quot; by Max Sobell &amp;amp; Jeremy Allen&lt;br /&gt;
&lt;br /&gt;
[[File:Chrastil_snowfroc2016_web101.ppt|&amp;quot;Web App Testing 101&amp;quot;]] &amp;quot;Web App Testing 101&amp;quot; by Danny Chrastil&lt;br /&gt;
&lt;br /&gt;
[[File:Exploitation101_FROC.pptx|&amp;quot;Exploitation 101&amp;quot;]] &amp;quot;Exploitation 101&amp;quot; by Brad Woodward&lt;br /&gt;
&lt;br /&gt;
[[File:BlueTeamBasics_SnowFROC2016.pptx|&amp;quot;Blue Team Basics&amp;quot;]] &amp;quot;Blue Team Basics incl. Recon-Ng&amp;quot; by Tyler Bell&lt;br /&gt;
&lt;br /&gt;
[[File:SnowFROC16_Kali_Pi_Bo_Pearce.pptx.pdf| &amp;quot;Build a Raspberry Pi Pentest Platform&amp;quot;]] by Bo Pearce&lt;br /&gt;
&lt;br /&gt;
[[File:SnowFROC kiosk20160218 ISSAMega.pptx|&amp;quot;The Kiosk deck that ran before the con &amp;amp; during lunch&amp;quot;]] &amp;quot;The Kiosk deck that ran before the con &amp;amp; during lunch&amp;quot; by Andy Lewis&lt;br /&gt;
&lt;br /&gt;
[[File:SnowFROC_WelcomeDeck20160218_ISSA_2.pptx|&amp;quot;The kickoff deck&amp;quot;]] &amp;quot;The kickoff deck&amp;quot; by Andy Lewis&lt;br /&gt;
&lt;br /&gt;
[[File:DestinationsAndRoutes20160217a.ppt|&amp;quot;Career Planning Lightning Talk - What the Heck am I doing here?&amp;quot;]] by [[User:Andylew|Andy Lewis]] (Career planning &amp;amp; goal setting)&lt;/div&gt;</summary>
		<author><name>Andylew</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:SnowFROC16_Kali_Pi_Bo_Pearce.pptx.pdf&amp;diff=212072</id>
		<title>File:SnowFROC16 Kali Pi Bo Pearce.pptx.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:SnowFROC16_Kali_Pi_Bo_Pearce.pptx.pdf&amp;diff=212072"/>
				<updated>2016-03-29T21:19:45Z</updated>
		
		<summary type="html">&lt;p&gt;Andylew: Bo Pearce's &amp;quot;Build a Raspberry Pi Pentest Platform&amp;quot; from SnowFROC 2016&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Bo Pearce's &amp;quot;Build a Raspberry Pi Pentest Platform&amp;quot; from SnowFROC 2016&lt;/div&gt;</summary>
		<author><name>Andylew</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Chrastil_snowfroc2016_web101.ppt&amp;diff=212071</id>
		<title>File:Chrastil snowfroc2016 web101.ppt</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Chrastil_snowfroc2016_web101.ppt&amp;diff=212071"/>
				<updated>2016-03-29T21:14:58Z</updated>
		
		<summary type="html">&lt;p&gt;Andylew: Andylew uploaded a new version of &amp;amp;quot;File:Chrastil snowfroc2016 web101.ppt&amp;amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Danny Chrastil Web 101 from SnowFROC2016&lt;/div&gt;</summary>
		<author><name>Andylew</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2016/Presentations&amp;diff=209451</id>
		<title>Front Range OWASP Conference 2016/Presentations</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2016/Presentations&amp;diff=209451"/>
				<updated>2016-02-22T20:40:15Z</updated>
		
		<summary type="html">&lt;p&gt;Andylew: Added PDF form of IoT BBQ; added Jeremy Allens to credits for that talk.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Presentations==&lt;br /&gt;
&lt;br /&gt;
Here are the presentations from speakers at SnowFROC 2016.  If you can't find it, it's because the speaker hasn't uploaded it or chose not to share it...&lt;br /&gt;
&lt;br /&gt;
[https://www.whitehatsec.com/company/leadership/jeremiah-grossman/ Jeremiah Grossman's] slideshare [http://www.slideshare.net/jeremiahgrossman/presentations page with all his decks]&lt;br /&gt;
&lt;br /&gt;
[[File:SnowFROC_2016-_Taking_AppSec_to_11.pdf|&amp;quot;Taking AppSec to 11: AppSec Pipelines, DevOps and Making Things Better&amp;quot;]] &amp;quot;Taking AppSec to 11: AppSec Pipelines, DevOps and Making Things Better&amp;quot; by [[User:mtesauro|Matt Tesauro]] (Optimizing an AppSec Program)&lt;br /&gt;
&lt;br /&gt;
[[File:Chrastil_snowfroc2016_web101.ppt|&amp;quot;Web App Testing 101&amp;quot;]] &amp;quot;Web App Testing 101&amp;quot; by Danny Chrastil&lt;br /&gt;
&lt;br /&gt;
[[File:Earle_SnowFROC2016-FalsePositives-Earle.pptx|&amp;quot;False Positives in Static Analysis: the Good, the Bad, and the Ugly&amp;quot;]] &amp;quot;False Positives in Static Analysis: the Good, the Bad, and the Ugly&amp;quot; by Andy Earle&lt;br /&gt;
&lt;br /&gt;
[[File:Hoopes_Deserialization-SnowFROC16.pptx|&amp;quot;Deserialization Demystified&amp;quot;]] &amp;quot;Deserialization Demystified&amp;quot; by Mark Hoopes&lt;br /&gt;
&lt;br /&gt;
[[File:SnowFROC16_-_IoT_BBQ.pdf|&amp;quot;IoT BBQ&amp;quot;]] &amp;quot;IoT BBQ&amp;quot; by Max Sobell &amp;amp; Jeremy Allen&lt;br /&gt;
&lt;br /&gt;
[[File:DestinationsAndRoutes20160217a.ppt|&amp;quot;Career Planning Lightning Talk - What the Heck am I doing here?&amp;quot;]] by [[User:Andylew|Andy Lewis]] (Career planning &amp;amp; goal setting)&lt;br /&gt;
&lt;br /&gt;
[[File:SnowFROC kiosk20160218 ISSAMega.pptx|&amp;quot;The Kiosk deck that ran before the con &amp;amp; during lunch&amp;quot;]] &amp;quot;The Kiosk deck that ran before the con &amp;amp; during lunch&amp;quot; by Andy Lewis&lt;br /&gt;
&lt;br /&gt;
[[File:SnowFROC_WelcomeDeck20160218_ISSA_2.pptx|&amp;quot;The kickoff deck&amp;quot;]] &amp;quot;The kickoff deck&amp;quot; by Andy Lewis&lt;br /&gt;
&lt;br /&gt;
[[File:Exploitation101_FROC.pptx|&amp;quot;Exploitation 101&amp;quot;]] &amp;quot;Exploitation 101&amp;quot; by Brad Woodward&lt;br /&gt;
&lt;br /&gt;
[[File:BlueTeamBasics_SnowFROC2016.pptx|&amp;quot;Blue Team Basics&amp;quot;]] &amp;quot;Blue Team Basics incl. Recon-Ng&amp;quot; by Tyler Bell&lt;/div&gt;</summary>
		<author><name>Andylew</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:SnowFROC16_-_IoT_BBQ.pdf&amp;diff=209450</id>
		<title>File:SnowFROC16 - IoT BBQ.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:SnowFROC16_-_IoT_BBQ.pdf&amp;diff=209450"/>
				<updated>2016-02-22T20:39:31Z</updated>
		
		<summary type="html">&lt;p&gt;Andylew: Max Sobell &amp;amp; Jeremy Allen's deck in PDF (fonts work etc).&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Max Sobell &amp;amp; Jeremy Allen's deck in PDF (fonts work etc).&lt;/div&gt;</summary>
		<author><name>Andylew</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2016/Presentations&amp;diff=209437</id>
		<title>Front Range OWASP Conference 2016/Presentations</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2016/Presentations&amp;diff=209437"/>
				<updated>2016-02-22T17:23:23Z</updated>
		
		<summary type="html">&lt;p&gt;Andylew: Added intro para&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Presentations==&lt;br /&gt;
&lt;br /&gt;
Here are the presentations from speakers at SnowFROC 2016.  If you can't find it, it's because the speaker hasn't uploaded it or chose not to share it...&lt;br /&gt;
&lt;br /&gt;
[https://www.whitehatsec.com/company/leadership/jeremiah-grossman/ Jeremiah Grossman's] slideshare [http://www.slideshare.net/jeremiahgrossman/presentations page with all his decks]&lt;br /&gt;
&lt;br /&gt;
[[File:SnowFROC_2016-_Taking_AppSec_to_11.pdf|&amp;quot;Taking AppSec to 11: AppSec Pipelines, DevOps and Making Things Better&amp;quot;]] &amp;quot;Taking AppSec to 11: AppSec Pipelines, DevOps and Making Things Better&amp;quot; by [[User:mtesauro|Matt Tesauro]] (Optimizing an AppSec Program)&lt;br /&gt;
&lt;br /&gt;
[[File:Chrastil_snowfroc2016_web101.ppt|&amp;quot;Web App Testing 101&amp;quot;]] &amp;quot;Web App Testing 101&amp;quot; by Danny Chrastil&lt;br /&gt;
&lt;br /&gt;
[[File:Earle_SnowFROC2016-FalsePositives-Earle.pptx|&amp;quot;False Positives in Static Analysis: the Good, the Bad, and the Ugly&amp;quot;]] &amp;quot;False Positives in Static Analysis: the Good, the Bad, and the Ugly&amp;quot; by Andy Earle&lt;br /&gt;
&lt;br /&gt;
[[File:Hoopes_Deserialization-SnowFROC16.pptx|&amp;quot;Deserialization Demystified&amp;quot;]] &amp;quot;Deserialization Demystified&amp;quot; by Mark Hoopes&lt;br /&gt;
&lt;br /&gt;
[[File:MaxSobell_SnowFROC16_-_IoT_BBQ.pptx|&amp;quot;IoT BBQ&amp;quot;]] &amp;quot;IoT BBQ&amp;quot; by Max Sobell&lt;br /&gt;
&lt;br /&gt;
[[File:DestinationsAndRoutes20160217a.ppt|&amp;quot;Career Planning Lightning Talk - What the Heck am I doing here?&amp;quot;]] by [[User:Andylew|Andy Lewis]] (Career planning &amp;amp; goal setting)&lt;br /&gt;
&lt;br /&gt;
[[File:SnowFROC kiosk20160218 ISSAMega.pptx|&amp;quot;The Kiosk deck that ran before the con &amp;amp; during lunch&amp;quot;]] &amp;quot;The Kiosk deck that ran before the con &amp;amp; during lunch&amp;quot; by Andy Lewis&lt;br /&gt;
&lt;br /&gt;
[[File:SnowFROC_WelcomeDeck20160218_ISSA_2.pptx|&amp;quot;The kickoff deck&amp;quot;]] &amp;quot;The kickoff deck&amp;quot; by Andy Lewis&lt;/div&gt;</summary>
		<author><name>Andylew</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2016/Presentations&amp;diff=209434</id>
		<title>Front Range OWASP Conference 2016/Presentations</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2016/Presentations&amp;diff=209434"/>
				<updated>2016-02-22T17:11:55Z</updated>
		
		<summary type="html">&lt;p&gt;Andylew: Cleaned up some stuff&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Presentations==&lt;br /&gt;
&lt;br /&gt;
[[File:SnowFROC_2016-_Taking_AppSec_to_11.pdf|&amp;quot;Taking AppSec to 11: AppSec Pipelines, DevOps and Making Things Better&amp;quot;]] &amp;quot;Taking AppSec to 11: AppSec Pipelines, DevOps and Making Things Better&amp;quot; by [[User:mtesauro|Matt Tesauro]] (Optimizing an AppSec Program)&lt;br /&gt;
&lt;br /&gt;
[https://www.whitehatsec.com/company/leadership/jeremiah-grossman/ Jeremiah Grossman's] slideshare [http://www.slideshare.net/jeremiahgrossman/presentations page with all his decks]&lt;br /&gt;
&lt;br /&gt;
[[File:Chrastil_snowfroc2016_web101.ppt|&amp;quot;Web App Testing 101&amp;quot;]] &amp;quot;Web App Testing 101&amp;quot; by Danny Chrastil&lt;br /&gt;
&lt;br /&gt;
[[File:Earle_SnowFROC2016-FalsePositives-Earle.pptx|&amp;quot;False Positives in Static Analysis: the Good, the Bad, and the Ugly&amp;quot;]] &amp;quot;False Positives in Static Analysis: the Good, the Bad, and the Ugly&amp;quot; by Andy Earle&lt;br /&gt;
&lt;br /&gt;
[[File:Hoopes_Deserialization-SnowFROC16.pptx|&amp;quot;Deserialization Demystified&amp;quot;]] &amp;quot;Deserialization Demystified&amp;quot; by Mark Hoopes&lt;br /&gt;
&lt;br /&gt;
[[File:MaxSobell_SnowFROC16_-_IoT_BBQ.pptx|&amp;quot;IoT BBQ&amp;quot;]] &amp;quot;IoT BBQ&amp;quot; by Max Sobell&lt;br /&gt;
&lt;br /&gt;
[[File:DestinationsAndRoutes20160217a.ppt|&amp;quot;Career Planning Lightning Talk - What the Heck am I doing here?&amp;quot;]] by [[User:Andylew|Andy Lewis]] (Career planning &amp;amp; goal setting)&lt;br /&gt;
&lt;br /&gt;
[[File:SnowFROC kiosk20160218 ISSAMega.pptx|&amp;quot;The Kiosk deck that ran before the con &amp;amp; during lunch&amp;quot;]] &amp;quot;The Kiosk deck that ran before the con &amp;amp; during lunch&amp;quot; by Andy Lewis&lt;br /&gt;
&lt;br /&gt;
[[File:SnowFROC_WelcomeDeck20160218_ISSA_2.pptx|&amp;quot;The kickoff deck&amp;quot;]] &amp;quot;The kickoff deck&amp;quot; by Andy Lewis&lt;/div&gt;</summary>
		<author><name>Andylew</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2016/Presentations&amp;diff=209432</id>
		<title>Front Range OWASP Conference 2016/Presentations</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2016/Presentations&amp;diff=209432"/>
				<updated>2016-02-22T17:09:39Z</updated>
		
		<summary type="html">&lt;p&gt;Andylew: Added MC Kiosk &amp;amp; intro/welcome decks&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Presentations==&lt;br /&gt;
&lt;br /&gt;
[[File:DestinationsAndRoutes20160217a.ppt|&amp;quot;Career Planning Lightning Talk - What the Heck am I doing here?&amp;quot;]] by [[User:Andylew|Andy Lewis]] (Career planning &amp;amp; goal setting)&lt;br /&gt;
&lt;br /&gt;
[[File:SnowFROC_2016-_Taking_AppSec_to_11.pdf|&amp;quot;Taking AppSec to 11: AppSec Pipelines, DevOps and Making Things Better&amp;quot;]] by [[User:mtesauro|Matt Tesauro]] (Optimizing an AppSec Program)&lt;br /&gt;
&lt;br /&gt;
[https://www.whitehatsec.com/company/leadership/jeremiah-grossman/ Jeremiah Grossman's] slideshare [http://www.slideshare.net/jeremiahgrossman/presentations page with all his decks]&lt;br /&gt;
&lt;br /&gt;
[[File:Chrastil_snowfroc2016_web101.ppt|&amp;quot;Web App Testing 101&amp;quot;]] by Danny Chrastil&lt;br /&gt;
&lt;br /&gt;
[[File:Earle_SnowFROC2016-FalsePositives-Earle.pptx|&amp;quot;False Positives in Static Analysis: the Good, the Bad, and the Ugly&amp;quot;]] by Andy Earle&lt;br /&gt;
&lt;br /&gt;
[[File:Hoopes_Deserialization-SnowFROC16.pptx|&amp;quot;Deserialization Demystified&amp;quot;]] by Mark Hoopes&lt;br /&gt;
&lt;br /&gt;
[[File:MaxSobell_SnowFROC16_-_IoT_BBQ.pptx|&amp;quot;IoT BBQ&amp;quot;]] by Max Sobell&lt;br /&gt;
&lt;br /&gt;
[[File:SnowFROC kiosk20160218 ISSAMega.pptx|&amp;quot;The Kiosk deck that ran before the con &amp;amp; during lunch&amp;quot;]] by Andy Lewis&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:SnowFROC_WelcomeDeck20160218_ISSA_2.pptx|&amp;quot;The kickoff deck&amp;quot;]] by Andy Lewis&lt;/div&gt;</summary>
		<author><name>Andylew</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:SnowFROC_WelcomeDeck20160218_ISSA_2.pptx&amp;diff=209430</id>
		<title>File:SnowFROC WelcomeDeck20160218 ISSA 2.pptx</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:SnowFROC_WelcomeDeck20160218_ISSA_2.pptx&amp;diff=209430"/>
				<updated>2016-02-22T17:07:55Z</updated>
		
		<summary type="html">&lt;p&gt;Andylew: Welcome deck from SnowFROC 2016&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Welcome deck from SnowFROC 2016&lt;/div&gt;</summary>
		<author><name>Andylew</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:SnowFROC_kiosk20160218_ISSAMega.pptx&amp;diff=209421</id>
		<title>File:SnowFROC kiosk20160218 ISSAMega.pptx</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:SnowFROC_kiosk20160218_ISSAMega.pptx&amp;diff=209421"/>
				<updated>2016-02-22T16:11:15Z</updated>
		
		<summary type="html">&lt;p&gt;Andylew: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Andylew</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:MaxSobell_SnowFROC16_-_IoT_BBQ.pptx&amp;diff=209419</id>
		<title>File:MaxSobell SnowFROC16 - IoT BBQ.pptx</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:MaxSobell_SnowFROC16_-_IoT_BBQ.pptx&amp;diff=209419"/>
				<updated>2016-02-22T16:04:36Z</updated>
		
		<summary type="html">&lt;p&gt;Andylew: Max Sobell's &amp;quot;Internet of Things Bar-B-Que&amp;quot; preso from SnowFROC 2016&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Max Sobell's &amp;quot;Internet of Things Bar-B-Que&amp;quot; preso from SnowFROC 2016&lt;/div&gt;</summary>
		<author><name>Andylew</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2016/Presentations&amp;diff=209418</id>
		<title>Front Range OWASP Conference 2016/Presentations</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2016/Presentations&amp;diff=209418"/>
				<updated>2016-02-22T16:03:10Z</updated>
		
		<summary type="html">&lt;p&gt;Andylew: Added Max Sobell's IoT BBQ&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Presentations==&lt;br /&gt;
&lt;br /&gt;
[[File:DestinationsAndRoutes20160217a.ppt|&amp;quot;Career Planning Lightning Talk - What the Heck am I doing here?&amp;quot;]] by [[User:Andylew|Andy Lewis]] (Career planning &amp;amp; goal setting)&lt;br /&gt;
&lt;br /&gt;
[[File:SnowFROC_2016-_Taking_AppSec_to_11.pdf|&amp;quot;Taking AppSec to 11: AppSec Pipelines, DevOps and Making Things Better&amp;quot;]] by [[User:mtesauro|Matt Tesauro]] (Optimizing an AppSec Program)&lt;br /&gt;
&lt;br /&gt;
[https://www.whitehatsec.com/company/leadership/jeremiah-grossman/ Jeremiah Grossman's] slideshare [http://www.slideshare.net/jeremiahgrossman/presentations page with all his decks]&lt;br /&gt;
&lt;br /&gt;
[[File:Chrastil_snowfroc2016_web101.ppt|&amp;quot;Web App Testing 101&amp;quot;]] by Danny Chrastil&lt;br /&gt;
&lt;br /&gt;
[[File:Earle_SnowFROC2016-FalsePositives-Earle.pptx|&amp;quot;False Positives in Static Analysis: the Good, the Bad, and the Ugly&amp;quot;]] by Andy Earle&lt;br /&gt;
&lt;br /&gt;
[[File:Hoopes_Deserialization-SnowFROC16.pptx|&amp;quot;Deserialization Demystified&amp;quot;]] by Mark Hoopes&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:MaxSobell_SnowFROC16_-_IoT_BBQ.pptx|&amp;quot;IoT BBQ&amp;quot;]] by Max Sobell&lt;/div&gt;</summary>
		<author><name>Andylew</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2016/Presentations&amp;diff=209415</id>
		<title>Front Range OWASP Conference 2016/Presentations</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2016/Presentations&amp;diff=209415"/>
				<updated>2016-02-22T15:59:10Z</updated>
		
		<summary type="html">&lt;p&gt;Andylew: Added Mark Hoopes' Deserialization Demystified deck&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Presentations==&lt;br /&gt;
&lt;br /&gt;
[[File:DestinationsAndRoutes20160217a.ppt|&amp;quot;Career Planning Lightning Talk - What the Heck am I doing here?&amp;quot;]] by [[User:Andylew|Andy Lewis]] (Career planning &amp;amp; goal setting)&lt;br /&gt;
&lt;br /&gt;
[[File:SnowFROC_2016-_Taking_AppSec_to_11.pdf|&amp;quot;Taking AppSec to 11: AppSec Pipelines, DevOps and Making Things Better&amp;quot;]] by [[User:mtesauro|Matt Tesauro]] (Optimizing an AppSec Program)&lt;br /&gt;
&lt;br /&gt;
[https://www.whitehatsec.com/company/leadership/jeremiah-grossman/ Jeremiah Grossman's] slideshare [http://www.slideshare.net/jeremiahgrossman/presentations page with all his decks]&lt;br /&gt;
&lt;br /&gt;
[[File:Chrastil_snowfroc2016_web101.ppt|&amp;quot;Web App Testing 101&amp;quot;]] by Danny Chrastil&lt;br /&gt;
&lt;br /&gt;
[[File:Earle_SnowFROC2016-FalsePositives-Earle.pptx|&amp;quot;False Positives in Static Analysis: the Good, the Bad, and the Ugly&amp;quot;]] by Andy Earle&lt;br /&gt;
&lt;br /&gt;
[[File:Hoopes_Deserialization-SnowFROC16.pptx|&amp;quot;Deserialization Demystified&amp;quot;]] by Mark Hoopes&lt;/div&gt;</summary>
		<author><name>Andylew</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Hoopes_Deserialization-SnowFROC16.pptx&amp;diff=209414</id>
		<title>File:Hoopes Deserialization-SnowFROC16.pptx</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Hoopes_Deserialization-SnowFROC16.pptx&amp;diff=209414"/>
				<updated>2016-02-22T15:58:06Z</updated>
		
		<summary type="html">&lt;p&gt;Andylew: Mark Hoopes' Deserialization Attacks preso for SnowFROC 2016&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Mark Hoopes' Deserialization Attacks preso for SnowFROC 2016&lt;/div&gt;</summary>
		<author><name>Andylew</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2016/Presentations&amp;diff=209412</id>
		<title>Front Range OWASP Conference 2016/Presentations</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2016/Presentations&amp;diff=209412"/>
				<updated>2016-02-22T15:56:05Z</updated>
		
		<summary type="html">&lt;p&gt;Andylew: Added link to Andy Earle's preso&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Presentations==&lt;br /&gt;
&lt;br /&gt;
[[File:DestinationsAndRoutes20160217a.ppt|&amp;quot;Career Planning Lightning Talk - What the Heck am I doing here?&amp;quot;]] by [[User:Andylew|Andy Lewis]] (Career planning &amp;amp; goal setting)&lt;br /&gt;
&lt;br /&gt;
[[File:SnowFROC_2016-_Taking_AppSec_to_11.pdf|&amp;quot;Taking AppSec to 11: AppSec Pipelines, DevOps and Making Things Better&amp;quot;]] by [[User:mtesauro|Matt Tesauro]] (Optimizing an AppSec Program)&lt;br /&gt;
&lt;br /&gt;
[https://www.whitehatsec.com/company/leadership/jeremiah-grossman/ Jeremiah Grossman's] slideshare [http://www.slideshare.net/jeremiahgrossman/presentations page with all his decks]&lt;br /&gt;
&lt;br /&gt;
[[File:Chrastil_snowfroc2016_web101.ppt|&amp;quot;Web App Testing 101&amp;quot;]] by Danny Chrastil&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:Earle_SnowFROC2016-FalsePositives-Earle.pptx|&amp;quot;False Positives in Static Analysis: the Good, the Bad, and the Ugly&amp;quot;]] by Andy Earle&lt;/div&gt;</summary>
		<author><name>Andylew</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Earle_SnowFROC2016-FalsePositives-Earle.pptx&amp;diff=209411</id>
		<title>File:Earle SnowFROC2016-FalsePositives-Earle.pptx</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Earle_SnowFROC2016-FalsePositives-Earle.pptx&amp;diff=209411"/>
				<updated>2016-02-22T15:55:06Z</updated>
		
		<summary type="html">&lt;p&gt;Andylew: Andy Earle's preso about False Positives in Static Code Analysis&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Andy Earle's preso about False Positives in Static Code Analysis&lt;/div&gt;</summary>
		<author><name>Andylew</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2016/Presentations&amp;diff=209410</id>
		<title>Front Range OWASP Conference 2016/Presentations</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2016/Presentations&amp;diff=209410"/>
				<updated>2016-02-22T15:53:43Z</updated>
		
		<summary type="html">&lt;p&gt;Andylew: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Presentations==&lt;br /&gt;
&lt;br /&gt;
[[File:DestinationsAndRoutes20160217a.ppt|&amp;quot;Career Planning Lightning Talk - What the Heck am I doing here?&amp;quot;]] by [[User:Andylew|Andy Lewis]] (Career planning &amp;amp; goal setting)&lt;br /&gt;
&lt;br /&gt;
[[File:SnowFROC_2016-_Taking_AppSec_to_11.pdf|&amp;quot;Taking AppSec to 11: AppSec Pipelines, DevOps and Making Things Better&amp;quot;]] by [[User:mtesauro|Matt Tesauro]] (Optimizing an AppSec Program)&lt;br /&gt;
&lt;br /&gt;
[https://www.whitehatsec.com/company/leadership/jeremiah-grossman/ Jeremiah Grossman's] slideshare [http://www.slideshare.net/jeremiahgrossman/presentations page with all his decks]&lt;br /&gt;
&lt;br /&gt;
[[File:Chrastil_snowfroc2016_web101.ppt|&amp;quot;Web App Testing 101&amp;quot;]] by Danny Chrastil&lt;/div&gt;</summary>
		<author><name>Andylew</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Chrastil_snowfroc2016_web101.ppt&amp;diff=209409</id>
		<title>File:Chrastil snowfroc2016 web101.ppt</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Chrastil_snowfroc2016_web101.ppt&amp;diff=209409"/>
				<updated>2016-02-22T15:52:30Z</updated>
		
		<summary type="html">&lt;p&gt;Andylew: Danny Chrastil Web 101 from SnowFROC2016&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Danny Chrastil Web 101 from SnowFROC2016&lt;/div&gt;</summary>
		<author><name>Andylew</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2016/Presentations&amp;diff=209408</id>
		<title>Front Range OWASP Conference 2016/Presentations</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2016/Presentations&amp;diff=209408"/>
				<updated>2016-02-22T15:48:58Z</updated>
		
		<summary type="html">&lt;p&gt;Andylew: Added Jeremiah's link to bio &amp;amp; link to slideshare&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Presentations==&lt;br /&gt;
&lt;br /&gt;
[[File:DestinationsAndRoutes20160217a.ppt|&amp;quot;Career Planning Lightning Talk - What the Heck am I doing here?&amp;quot;]] by [[User:Andylew|Andy Lewis]] (Career planning &amp;amp; goal setting)&lt;br /&gt;
&lt;br /&gt;
[[File:SnowFROC_2016-_Taking_AppSec_to_11.pdf|&amp;quot;Taking AppSec to 11: AppSec Pipelines, DevOps and Making Things Better&amp;quot;]] by [[User:mtesauro|Matt Tesauro]] (Optimizing an AppSec Program)&lt;br /&gt;
&lt;br /&gt;
[https://www.whitehatsec.com/company/leadership/jeremiah-grossman/ Jeremiah Grossman's] slideshare [http://www.slideshare.net/jeremiahgrossman/presentations page with all his decks]&lt;/div&gt;</summary>
		<author><name>Andylew</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2016/Presentations&amp;diff=209157</id>
		<title>Front Range OWASP Conference 2016/Presentations</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2016/Presentations&amp;diff=209157"/>
				<updated>2016-02-18T07:47:16Z</updated>
		
		<summary type="html">&lt;p&gt;Andylew: Added brief description to Andy's preso file&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Presentations==&lt;br /&gt;
&lt;br /&gt;
[[File:DestinationsAndRoutes20160217a.ppt|&amp;quot;Career Planning Lightning Talk - What the Heck am I doing here?&amp;quot;]] by [[User:Andylew|Andy Lewis]] (Career planning &amp;amp; goal setting)&lt;/div&gt;</summary>
		<author><name>Andylew</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2016/Presentations&amp;diff=209156</id>
		<title>Front Range OWASP Conference 2016/Presentations</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2016/Presentations&amp;diff=209156"/>
				<updated>2016-02-18T07:45:18Z</updated>
		
		<summary type="html">&lt;p&gt;Andylew: Added Andy's Lightning Talk Preso&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Presentations==&lt;br /&gt;
&lt;br /&gt;
[[File:DestinationsAndRoutes20160217a.ppt|&amp;quot;Career Planning Lightning Talk - What the Heck am I doing here?&amp;quot;]] by [[User:Andylew|Andy Lewis]]&lt;/div&gt;</summary>
		<author><name>Andylew</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:DestinationsAndRoutes20160217a.ppt&amp;diff=209155</id>
		<title>File:DestinationsAndRoutes20160217a.ppt</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:DestinationsAndRoutes20160217a.ppt&amp;diff=209155"/>
				<updated>2016-02-18T07:43:23Z</updated>
		
		<summary type="html">&lt;p&gt;Andylew: SnowFROC 2016 career planning &amp;amp; goal setting Lightning Talk.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;SnowFROC 2016 career planning &amp;amp; goal setting Lightning Talk.&lt;/div&gt;</summary>
		<author><name>Andylew</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2016/Sponsors&amp;diff=209110</id>
		<title>Front Range OWASP Conference 2016/Sponsors</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2016/Sponsors&amp;diff=209110"/>
				<updated>2016-02-17T21:34:01Z</updated>
		
		<summary type="html">&lt;p&gt;Andylew: Added Applied Trust Logo&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== SnowFROC is possible through the active participation and support of these generous sponsors: ==&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;15 0 0 &amp;quot;&lt;br /&gt;
 |-&lt;br /&gt;
 | [[Image:HPE_logo.png   | link=http://www.hpe.com/              | alt=HPE               | HP Enterprise]]&lt;br /&gt;
 |}&lt;br /&gt;
&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;15 0 0 &amp;quot;&lt;br /&gt;
 |-&lt;br /&gt;
 | [[Image:Whitehatlogo-medium.png | link=http://www.whitehatsecurity.com/ | alt=WhiteHat Security | Whitehat Security]]&lt;br /&gt;
 |}&lt;br /&gt;
&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;15 0 0 &amp;quot;&lt;br /&gt;
&lt;br /&gt;
 | [[Image:Checkmarx.png  | link=http://www.checkmarx.com/       | alt=Checkmarx        | Checkmarx]]&lt;br /&gt;
 |}&lt;br /&gt;
&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;15 0 0 &amp;quot;&lt;br /&gt;
 | [[Image:SecureSet_Snip20160105.png   | link=http://www.secureset.com/ | alt=SecureSet | SecureSet]]&lt;br /&gt;
 |}&lt;br /&gt;
&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;15 0 0 &amp;quot;&lt;br /&gt;
 | [[Image:Qualys.png | link=http://www.qualys.com            | alt=Qualys         | Qualys]]&lt;br /&gt;
 |}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;15 0 0 &amp;quot;&lt;br /&gt;
 | [[Image:AppliedTrust.png           | link=http://www.appliedtrust.com     | alt=Applied Trust    | Applied Trust]]&lt;br /&gt;
 |}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;15 0 0 &amp;quot;&lt;br /&gt;
 | [[Image:BoulderSponsorAerstone.png | link=https://aerstone.com            | alt=Aerstone         | Aerstone]]&lt;br /&gt;
 |}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
 | [[Image:SecurityPursuit.png        | link=http://www.securitypursuit.com/ | alt=Security Pursuit | Security Pursuit]]&lt;br /&gt;
 | [[Image:SouthSeas.png              | 120px | link=http://www.southseascorp.com/   | alt=SouthSeas        | SouthSeas]]&lt;br /&gt;
 | [[Image:Veracode.png               | 120px | link=https://www.veracode.com/       | alt=Veracode         | Veracode]]&lt;br /&gt;
&lt;br /&gt;
 | [[Image:AppliedTrust.png           | 120px | link=http://www.appliedtrust.com     | alt=Applied Trust    | Applied Trust]]&lt;br /&gt;
 | [[Image:Checkmarx.png              | 120px | link=http://www.checkmarx.com/       | alt=Checkmarx        | Checkmarx]]&lt;br /&gt;
 | [[Image:HP.png                     | 120px | link=http://www.hpe.com/              | alt=HP               | HP]]&lt;br /&gt;
 | [[Image:HpEnterprise20160121.png   | 120px | link=http://www.hpe.com/              | alt=HPE               | HP Enterprise]]&lt;br /&gt;
 |}&lt;br /&gt;
--&amp;gt;&lt;/div&gt;</summary>
		<author><name>Andylew</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2016/Sponsors&amp;diff=209109</id>
		<title>Front Range OWASP Conference 2016/Sponsors</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2016/Sponsors&amp;diff=209109"/>
				<updated>2016-02-17T21:29:50Z</updated>
		
		<summary type="html">&lt;p&gt;Andylew: Added Qualys logo&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== SnowFROC is possible through the active participation and support of these generous sponsors: ==&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;15 0 0 &amp;quot;&lt;br /&gt;
 |-&lt;br /&gt;
 | [[Image:HPE_logo.png   | link=http://www.hpe.com/              | alt=HPE               | HP Enterprise]]&lt;br /&gt;
 |}&lt;br /&gt;
&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;15 0 0 &amp;quot;&lt;br /&gt;
 |-&lt;br /&gt;
 | [[Image:Whitehatlogo-medium.png | link=http://www.whitehatsecurity.com/ | alt=WhiteHat Security | Whitehat Security]]&lt;br /&gt;
 |}&lt;br /&gt;
&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;15 0 0 &amp;quot;&lt;br /&gt;
&lt;br /&gt;
 | [[Image:Checkmarx.png  | link=http://www.checkmarx.com/       | alt=Checkmarx        | Checkmarx]]&lt;br /&gt;
 |}&lt;br /&gt;
&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;15 0 0 &amp;quot;&lt;br /&gt;
 | [[Image:SecureSet_Snip20160105.png   | link=http://www.secureset.com/ | alt=SecureSet | SecureSet]]&lt;br /&gt;
 |}&lt;br /&gt;
&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;15 0 0 &amp;quot;&lt;br /&gt;
 | [[Image:Qualys.png | link=http://www.qualys.com            | alt=Qualys         | Qualys]]&lt;br /&gt;
 |}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;15 0 0 &amp;quot;&lt;br /&gt;
 | [[Image:BoulderSponsorAerstone.png | link=https://aerstone.com            | alt=Aerstone         | Aerstone]]&lt;br /&gt;
 |}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
 | [[Image:SecurityPursuit.png        | link=http://www.securitypursuit.com/ | alt=Security Pursuit | Security Pursuit]]&lt;br /&gt;
 | [[Image:SouthSeas.png              | 120px | link=http://www.southseascorp.com/   | alt=SouthSeas        | SouthSeas]]&lt;br /&gt;
 | [[Image:Veracode.png               | 120px | link=https://www.veracode.com/       | alt=Veracode         | Veracode]]&lt;br /&gt;
&lt;br /&gt;
 | [[Image:AppliedTrust.png           | 120px | link=http://www.appliedtrust.com     | alt=Applied Trust    | Applied Trust]]&lt;br /&gt;
 | [[Image:Checkmarx.png              | 120px | link=http://www.checkmarx.com/       | alt=Checkmarx        | Checkmarx]]&lt;br /&gt;
 | [[Image:HP.png                     | 120px | link=http://www.hpe.com/              | alt=HP               | HP]]&lt;br /&gt;
 | [[Image:HpEnterprise20160121.png   | 120px | link=http://www.hpe.com/              | alt=HPE               | HP Enterprise]]&lt;br /&gt;
 |}&lt;br /&gt;
--&amp;gt;&lt;/div&gt;</summary>
		<author><name>Andylew</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Qualys.png&amp;diff=209108</id>
		<title>File:Qualys.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Qualys.png&amp;diff=209108"/>
				<updated>2016-02-17T21:26:16Z</updated>
		
		<summary type="html">&lt;p&gt;Andylew: Andylew uploaded a new version of &amp;amp;quot;File:Qualys.png&amp;amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Andylew</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2016/Schedule&amp;diff=208959</id>
		<title>Front Range OWASP Conference 2016/Schedule</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2016/Schedule&amp;diff=208959"/>
				<updated>2016-02-15T16:36:18Z</updated>
		
		<summary type="html">&lt;p&gt;Andylew: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&lt;br /&gt;
The agenda follows the successful OWASP conference multi track format, with opening keynotes and presentations in the main room &amp;amp; broadcast throughout the facility, split tracks in the middle of the day, and closing panel discussions at the end of the day.&lt;br /&gt;
'''NOTE: schedule is subject to change.'''&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:86%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | Thursday, February 18th, 2016&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 7:45 - 8:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Registration and Continental Breakfast in the lobby&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 8:30 - 8:45 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | Welcome to SnowFROC 2016 Conference&lt;br /&gt;
&lt;br /&gt;
''OWASP Denver and OWASP Boulder Chapter Leaders''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 8:45 - 9:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
'''State of OWASP''' &lt;br /&gt;
&lt;br /&gt;
''Tom Brennan''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 9:00 - 10:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | '''Keynote: 15 Years of Web Security - The Rebellious Teenage Years''' &lt;br /&gt;
&lt;br /&gt;
''[https://www.whitehatsec.com/about-me_jeremiah.html Jeremiah Grossman], CTO of WhiteHat Security''  &lt;br /&gt;
&amp;lt;!-- Deck source is http://www.slideshare.net/jeremiahgrossman/15-years-of-web-security-the-rebellious-teenage-years --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:00 - 10:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Break - Expo&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | || colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:35%; background:#BC857A&amp;quot; | '''Track 1 - Upstairs'''&lt;br /&gt;
 | colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:35%; background:#BCA57A&amp;quot; | '''Track 2 - Downstairs''' &lt;br /&gt;
 | colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:35%; background:#C6E2FF&amp;quot; | '''AppSec 101: Dungeon''' &lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:30 - 11:15 || style=&amp;quot;width:35%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Making AppSec Easier: the best OWASP projects and how to leverage a worldwide AppSec effort in YOUR organization&lt;br /&gt;
''OWASP Board''&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:35%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | AppSec Pipelines: DevOps and Making Things Better &lt;br /&gt;
''Matt Tesauro''&lt;br /&gt;
&lt;br /&gt;
 | colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:35%; background:#C6E2FF&amp;quot; align=&amp;quot;left&amp;quot; | AppSec 101 Intro &amp;amp; Blue Team Basics&lt;br /&gt;
''Tyler Bell'' &lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 11:30 - 12:00 || style=&amp;quot;width:35%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Lightning Talk: Getting Root via DeSerialization Attacks&lt;br /&gt;
 &lt;br /&gt;
''Mark Hoopes''&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:35%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Lightning Talk: Career Planning - What the Heck am I Doing Here?&lt;br /&gt;
''Andy Lewis''   &lt;br /&gt;
 | style=&amp;quot;width:35%; background:#C6E2FF&amp;quot; align=&amp;quot;left&amp;quot; | AppSec 101 ''Tyler Bell'' &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:00 - 1:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Lunch&lt;br /&gt;
  |-&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 1:00 - 1:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Expo&lt;br /&gt;
  |-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 1:30 - 2:30 || style=&amp;quot;width:45%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | It's in the Cloud - It's Secure Like Voting Machines, Right? &lt;br /&gt;
''Dan Weiske''&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:45%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Embracing IoT Initiatives&lt;br /&gt;
''LAZ''   &lt;br /&gt;
 | style=&amp;quot;width:22%; background:#C6E2FF&amp;quot; align=&amp;quot;left&amp;quot; | Exploitation 101 w/MetaSploit&lt;br /&gt;
''Brad Woodward'' &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 2:30 - 3:30 || style=&amp;quot;width:45%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | False Positives in SAST: The Good, the Bad, and the Ugly&lt;br /&gt;
''Andy Earle''&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:45%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | IOT/Embedded Systems hacking&lt;br /&gt;
''Max Sobell and Jeremy Allen''&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#C6E2FF&amp;quot; align=&amp;quot;left&amp;quot; | Build a Raspberry Pi Pentest Platform&lt;br /&gt;
''Bo Pearce''&lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 3:30 - 3:45 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | BREAK&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 4:00 - 4:45 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | End of Conference Panel Discussion: &lt;br /&gt;
&lt;br /&gt;
Topic: ''The Crystal Ball and the 2-headed Calf - What's on the Horizon and Why Does It Seem So Unnatural?''  &lt;br /&gt;
&lt;br /&gt;
'''Moderator:''' ''Matt Schufeldt''&lt;br /&gt;
'''Panelists:''' ''Jeremiah Grossman, Laz, Matt Tesauro, Steve Kosten, others''&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 4:45-5:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Wrap up, vendor raffles!&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Andylew</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2016/Schedule&amp;diff=208958</id>
		<title>Front Range OWASP Conference 2016/Schedule</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2016/Schedule&amp;diff=208958"/>
				<updated>2016-02-15T16:32:54Z</updated>
		
		<summary type="html">&lt;p&gt;Andylew: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&lt;br /&gt;
The agenda follows the successful OWASP conference multi track format, with opening keynotes and presentations in the main room &amp;amp; broadcast throughout the facility, split tracks in the middle of the day, and closing panel discussions at the end of the day.&lt;br /&gt;
'''NOTE: schedule is subject to change.'''&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:86%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | Thursday, February 18th, 2016&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 7:45 - 8:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Registration and Continental Breakfast in the lobby&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 8:30 - 8:45 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | Welcome to SnowFROC 2016 Conference&lt;br /&gt;
&lt;br /&gt;
''OWASP Denver and OWASP Boulder Chapter Leaders''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 8:45 - 9:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
'''State of OWASP''' &lt;br /&gt;
&lt;br /&gt;
''Tom Brennan''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 9:00 - 10:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | '''Keynote: 15 Years of Web Security - The Rebellious Teenage Years''' &lt;br /&gt;
&lt;br /&gt;
''[https://www.whitehatsec.com/about-me_jeremiah.html Jeremiah Grossman], CTO of WhiteHat Security''  &lt;br /&gt;
&amp;lt;!-- Deck source is http://www.slideshare.net/jeremiahgrossman/15-years-of-web-security-the-rebellious-teenage-years --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:00 - 10:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Break - Expo&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | || colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:35%; background:#BC857A&amp;quot; | '''Track 1 - Upstairs'''&lt;br /&gt;
 | colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:35%; background:#BCA57A&amp;quot; | '''Track 2 - Downstairs''' &lt;br /&gt;
 | colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:35%; background:#C6E2FF&amp;quot; | '''AppSec 101: Dungeon''' &lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:30 - 11:15 || style=&amp;quot;width:35%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Making AppSec Easier: the best OWASP projects and how to leverage a worldwide AppSec effort in YOUR organization&lt;br /&gt;
''OWASP Board''&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:35%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | AppSec Pipelines: DevOps and Making Things Better &lt;br /&gt;
''Matt Tesauro''&lt;br /&gt;
&lt;br /&gt;
 | colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:35%; background:#C6E2FF&amp;quot; align=&amp;quot;left&amp;quot; | AppSec 101 Intro &amp;amp; Blue Team Basics&lt;br /&gt;
''Tyler Bell'' &lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 11:30 - 12:00 || style=&amp;quot;width:35%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Lightning Talk: Getting Root via DeSerialization Attacks&lt;br /&gt;
 &lt;br /&gt;
''Mark Hoopes''&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:35%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Lightning Talk: Career Planning - What the Heck am I Doing Here?&lt;br /&gt;
''Andy Lewis''   &lt;br /&gt;
 | style=&amp;quot;width:35%; background:#C6E2FF&amp;quot; align=&amp;quot;left&amp;quot; | AppSec 101 ''Tyler Bell'' &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:00 - 1:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Lunch&lt;br /&gt;
  |-&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 1:00 - 1:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Expo&lt;br /&gt;
  |-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 1:30 - 2:30 || style=&amp;quot;width:45%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | It's in the Cloud - It's Secure Like Voting Machines, Right? &lt;br /&gt;
''Dan Weiske''&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:45%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Embracing IoT Initiatives&lt;br /&gt;
''LAZ''   &lt;br /&gt;
 | style=&amp;quot;width:22%; background:#C6E2FF&amp;quot; align=&amp;quot;left&amp;quot; | Exploitation 101 w/MetaSploit&lt;br /&gt;
''Brad Woodward'' &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 2:30 - 3:30 || style=&amp;quot;width:45%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | False Positives in SAST: The Good, the Bad, and the Ugly&lt;br /&gt;
''Andy Earle''&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:45%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | IOT/Embedded Systems hacking&lt;br /&gt;
''Max Sobell and Jeremy Allen''&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#C6E2FF&amp;quot; align=&amp;quot;left&amp;quot; | Build a Raspberry Pi Pentest Platform&lt;br /&gt;
''Bo Pearce''&lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 3:30 - 3:45 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | BREAK&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 4:00 - 4:45 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | End of Conference Panel Discussion: &lt;br /&gt;
&lt;br /&gt;
Topic: ''The Crystal Ball and the 2-headed Calf - What's on the Horizon and Why Does It Seem So Unnatural?''  &lt;br /&gt;
&lt;br /&gt;
'''Moderator:''' ''Matt Schufeldt''&lt;br /&gt;
'''Panelists:''' ''Laz, Matt Tesauro, Steve Kosten, others''&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 4:45-5:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Wrap up, vendor raffles!&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Andylew</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2016/Schedule&amp;diff=208957</id>
		<title>Front Range OWASP Conference 2016/Schedule</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2016/Schedule&amp;diff=208957"/>
				<updated>2016-02-15T15:52:51Z</updated>
		
		<summary type="html">&lt;p&gt;Andylew: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&lt;br /&gt;
The agenda follows the successful OWASP conference multi track format, with opening keynotes and presentations in the main room &amp;amp; broadcast throughout the facility, split tracks in the middle of the day, and closing panel discussions at the end of the day.&lt;br /&gt;
'''NOTE: schedule is subject to change.'''&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:86%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | Thursday, February 18th, 2016&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 7:45 - 8:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Registration and Continental Breakfast in the lobby&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 8:30 - 8:45 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | Welcome to SnowFROC 2016 Conference&lt;br /&gt;
&lt;br /&gt;
''OWASP Denver and OWASP Boulder Chapter Leaders''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 8:45 - 9:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
'''State of OWASP''' &lt;br /&gt;
&lt;br /&gt;
''Tom Brennan''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 9:00 - 10:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | '''Keynote: 15 Years of Web Security - The Rebellious Teenage Years''' &lt;br /&gt;
&lt;br /&gt;
''[https://www.whitehatsec.com/about-me_jeremiah.html Jeremiah Grossman], CTO of WhiteHat Security''  &lt;br /&gt;
&amp;lt;!-- Deck source is http://www.slideshare.net/jeremiahgrossman/15-years-of-web-security-the-rebellious-teenage-years --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:00 - 10:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Break - Expo&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | || colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:35%; background:#BC857A&amp;quot; | '''Track 1 - Upstairs'''&lt;br /&gt;
 | colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:35%; background:#BCA57A&amp;quot; | '''Track 2 - Downstairs''' &lt;br /&gt;
 | colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:35%; background:#C6E2FF&amp;quot; | '''AppSec 101: Dungeon''' &lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:30 - 11:15 || style=&amp;quot;width:35%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Making AppSec Easier: the best OWASP projects and how to leverage a worldwide AppSec effort in YOUR organization&lt;br /&gt;
''OWASP Board''&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:35%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | What did we learn about private email servers? &lt;br /&gt;
''A. Nonymous''&lt;br /&gt;
&lt;br /&gt;
 | colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:35%; background:#C6E2FF&amp;quot; align=&amp;quot;left&amp;quot; | AppSec 101 Intro &amp;amp; Blue Team Basics&lt;br /&gt;
''Tyler Bell'' &lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 11:30 - 12:00 || style=&amp;quot;width:35%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Lightning Talk: Getting Root via DeSerialization Attacks&lt;br /&gt;
 &lt;br /&gt;
''Mark Hoopes''&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:35%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Lightning Talk: Career Planning - What the Heck am I Doing Here?&lt;br /&gt;
''Andy Lewis''   &lt;br /&gt;
 | style=&amp;quot;width:35%; background:#C6E2FF&amp;quot; align=&amp;quot;left&amp;quot; | AppSec 101 ''Tyler Bell'' &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:00 - 1:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Lunch&lt;br /&gt;
  |-&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 1:00 - 1:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Expo&lt;br /&gt;
  |-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 1:30 - 2:30 || style=&amp;quot;width:45%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | It's in the Cloud - It's Secure Like Voting Machines, Right? &lt;br /&gt;
''Dan Weiske''&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:45%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Embracing IoT Initiatives&lt;br /&gt;
''LAZ''   &lt;br /&gt;
 | style=&amp;quot;width:22%; background:#C6E2FF&amp;quot; align=&amp;quot;left&amp;quot; | Exploitation 101 w/MetaSploit&lt;br /&gt;
''Brad Woodward'' &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 2:30 - 3:30 || style=&amp;quot;width:45%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | False Positives in SAST: The Good, the Bad, and the Ugly&lt;br /&gt;
''Andy Earle''&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:45%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | IOT/Embedded Systems hacking&lt;br /&gt;
''Max Sobell''&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#C6E2FF&amp;quot; align=&amp;quot;left&amp;quot; | Build a Raspberry Pi Pentest Platform&lt;br /&gt;
''Bo Pearce''&lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 3:30 - 3:45 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | BREAK&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 4:00 - 4:45 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | End of Conference Panel Discussion: &lt;br /&gt;
&lt;br /&gt;
Topic: ''The Crystal Ball and the 2-headed Calf - What's on the Horizon and Why Does It Seem So Unnatural?''  &lt;br /&gt;
&lt;br /&gt;
'''Moderator:''' ''Matt Schufeldt''&lt;br /&gt;
'''Panelists:''' ''Laz, Matt Tesauro, Steve Kosten, others''&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 4:45-5:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Wrap up, vendor raffles!&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Andylew</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2016/Schedule&amp;diff=208956</id>
		<title>Front Range OWASP Conference 2016/Schedule</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2016/Schedule&amp;diff=208956"/>
				<updated>2016-02-15T15:51:48Z</updated>
		
		<summary type="html">&lt;p&gt;Andylew: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&lt;br /&gt;
The agenda follows the successful OWASP conference multi track format, with opening keynotes and presentations in the main room &amp;amp; broadcast throughout the facility, split tracks in the middle of the day, and closing panel discussions at the end of the day.&lt;br /&gt;
'''NOTE: schedule is subject to change.'''&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:86%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | Thursday, February 18th, 2016&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 7:45 - 8:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Registration and Continental Breakfast in the lobby&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 8:30 - 8:45 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | Welcome to SnowFROC 2016 Conference&lt;br /&gt;
&lt;br /&gt;
''OWASP Denver and OWASP Boulder Chapter Leaders''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 8:45 - 9:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
'''State of OWASP''' &lt;br /&gt;
&lt;br /&gt;
''Tom Brennan''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 9:00 - 10:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | '''Keynote: 15 Years of Web Security - The Rebellious Teenage Years''' &lt;br /&gt;
&lt;br /&gt;
''[https://www.whitehatsec.com/about-me_jeremiah.html Jeremiah Grossman], CTO of WhiteHat Security''  &lt;br /&gt;
&amp;lt;!-- Deck source is http://www.slideshare.net/jeremiahgrossman/15-years-of-web-security-the-rebellious-teenage-years --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:00 - 10:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Break - Expo&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | || colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:35%; background:#BC857A&amp;quot; | '''Track 1 - Upstairs'''&lt;br /&gt;
 | colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:35%; background:#BCA57A&amp;quot; | '''Track 2 - Downstairs''' &lt;br /&gt;
 | colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:35%; background:#C6E2FF&amp;quot; | '''AppSec 101: Dungeon''' &lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:30 - 11:15 || style=&amp;quot;width:35%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Making AppSec Easier: the best OWASP projects and how to leverage a worldwide AppSec effort in YOUR organization&lt;br /&gt;
''OWASP Board''&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:35%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | What did we learn about private email servers? &lt;br /&gt;
''A. Nonymous''&lt;br /&gt;
&lt;br /&gt;
 | colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:35%; background:#C6E2FF&amp;quot; align=&amp;quot;left&amp;quot; | AppSec 101 Intro &amp;amp; Blue Team Basics&lt;br /&gt;
''Tyler Bell'' &lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 11:30 - 12:00 || style=&amp;quot;width:35%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Lightning Talk: Getting Root via DeSerialization Attacks&lt;br /&gt;
 &lt;br /&gt;
''Mark Hoopes''&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:35%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Lightning Talk: Career Planning - What the Heck am I Doing Here?&lt;br /&gt;
''Andy Lewis''   &lt;br /&gt;
 | style=&amp;quot;width:35%; background:#C6E2FF&amp;quot; align=&amp;quot;left&amp;quot; | AppSec 101 ''Tyler Bell'' &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:00 - 1:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Lunch&lt;br /&gt;
  |-&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 1:00 - 1:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Expo&lt;br /&gt;
  |-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 1:30 - 2:20 || style=&amp;quot;width:45%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | It's in the Cloud - It's Secure Like Voting Machines, Right? &lt;br /&gt;
''Dan Weiske''&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:45%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Embracing IoT Initiatives&lt;br /&gt;
''LAZ''   &lt;br /&gt;
 | style=&amp;quot;width:22%; background:#C6E2FF&amp;quot; align=&amp;quot;left&amp;quot; | Exploitation 101 w/MetaSploit&lt;br /&gt;
''Brad Woodward'' &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 2:30 - 3:30 || style=&amp;quot;width:45%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | False Positives in SAST: The Good, the Bad, and the Ugly&lt;br /&gt;
''Andy Earle''&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:45%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | IOT/Embedded Systems hacking&lt;br /&gt;
''Max Sobell''&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#C6E2FF&amp;quot; align=&amp;quot;left&amp;quot; | Build a Raspberry Pi Pentest Platform&lt;br /&gt;
''Bo Pearce''&lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 3:30 - 3:45 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | BREAK&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 4:00 - 4:45 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | End of Conference Panel Discussion: &lt;br /&gt;
&lt;br /&gt;
Topic: ''The Crystal Ball and the 2-headed Calf - What's on the Horizon and Why Does It Seem So Unnatural?''  &lt;br /&gt;
&lt;br /&gt;
'''Moderator:''' ''Matt Schufeldt''&lt;br /&gt;
'''Panelists:''' ''Laz, Matt Tesauro, Steve Kosten, others''&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 4:45-5:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Wrap up, vendor raffles!&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Andylew</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2016/Schedule&amp;diff=208952</id>
		<title>Front Range OWASP Conference 2016/Schedule</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2016/Schedule&amp;diff=208952"/>
				<updated>2016-02-15T15:24:55Z</updated>
		
		<summary type="html">&lt;p&gt;Andylew: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&lt;br /&gt;
The agenda follows the successful OWASP conference multi track format, with opening keynotes and presentations in the main room &amp;amp; broadcast throughout the facility, split tracks in the middle of the day, and closing panel discussions at the end of the day.&lt;br /&gt;
'''NOTE: schedule is subject to change.'''&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:86%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | Thursday, February 18th, 2016&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 7:45 - 8:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Registration and Continental Breakfast in the lobby&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 8:30 - 8:45 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | Welcome to SnowFROC 2016 Conference&lt;br /&gt;
&lt;br /&gt;
''OWASP Denver and OWASP Boulder Chapter Leaders''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 8:45 - 9:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
'''State of OWASP''' &lt;br /&gt;
&lt;br /&gt;
''Tom Brennan''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 9:00 - 10:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | '''Keynote: 15 Years of Web Security - The Rebellious Teenage Years''' &lt;br /&gt;
&lt;br /&gt;
''[https://www.whitehatsec.com/about-me_jeremiah.html Jeremiah Grossman], CTO of WhiteHat Security''  &lt;br /&gt;
&amp;lt;!-- Deck source is http://www.slideshare.net/jeremiahgrossman/15-years-of-web-security-the-rebellious-teenage-years --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:00 - 10:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Break - Expo&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | || colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:35%; background:#BC857A&amp;quot; | '''Track 1 - Upstairs'''&lt;br /&gt;
 | colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:35%; background:#BCA57A&amp;quot; | '''Track 2 - Downstairs''' &lt;br /&gt;
 | colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:35%; background:#C6E2FF&amp;quot; | '''AppSec 101: Dungeon''' &lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:30 - 11:15 || style=&amp;quot;width:35%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Making AppSec Easier: the best OWASP projects and how to leverage a worldwide AppSec effort in YOUR organization&lt;br /&gt;
''OWASP Board''&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:35%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | What did we learn about private email servers? &lt;br /&gt;
''A. Nonymous''&lt;br /&gt;
&lt;br /&gt;
 | colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:35%; background:#C6E2FF&amp;quot; align=&amp;quot;left&amp;quot; | AppSec 101 Intro &amp;amp; Blue Team Basics&lt;br /&gt;
''Tyler Bell'' &lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 11:30 - 12:00 || style=&amp;quot;width:35%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Lightning Talk: Getting Root via DeSerialization Attacks&lt;br /&gt;
 &lt;br /&gt;
''Mark Hoopes''&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:35%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Lightning Talk: Career Planning - What the Heck am I Doing Here?&lt;br /&gt;
''Andy Lewis''   &lt;br /&gt;
 | style=&amp;quot;width:35%; background:#C6E2FF&amp;quot; align=&amp;quot;left&amp;quot; | AppSec 101 ''Tyler Bell'' &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:00 - 1:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Lunch - Expo&lt;br /&gt;
  |-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 1:00 - 1:50 || style=&amp;quot;width:45%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | It's in the Cloud - It's Secure Like Voting Machines, Right? &lt;br /&gt;
''Dan Weiske''&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:45%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Embracing IoT Initiatives&lt;br /&gt;
''LAZ''   &lt;br /&gt;
 | style=&amp;quot;width:22%; background:#C6E2FF&amp;quot; align=&amp;quot;left&amp;quot; | Exploitation 101 w/MetaSploit&lt;br /&gt;
''Brad Woodward'' &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 2:00 - 2:50 || style=&amp;quot;width:45%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | False Positives in SAST: The Good, the Bad, and the Ugly&lt;br /&gt;
''Andy Earle''&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:45%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | IOT/Embedded Systems hacking&lt;br /&gt;
''Max Sobell''&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#C6E2FF&amp;quot; align=&amp;quot;left&amp;quot; | Build a Raspberry Pi Pentest Platform&lt;br /&gt;
''Bo Pearce''&lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 2:45 - 3:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | BREAK&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 3:00 - 3:45 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | End of Conference Panel Discussion: &lt;br /&gt;
&lt;br /&gt;
Topic: ''The Crystal Ball and the 2-headed Calf - What's on the Horizon and Why Does It Seem So Unnatural?''  &lt;br /&gt;
&lt;br /&gt;
'''Moderator:''' ''Matt Schufeldt''&lt;br /&gt;
'''Panelists:''' ''Laz, Matt Tesauro, Steve Kosten, others''&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 3:45-4:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Wrap up, vendor raffles!&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Andylew</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2016/Schedule&amp;diff=208951</id>
		<title>Front Range OWASP Conference 2016/Schedule</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2016/Schedule&amp;diff=208951"/>
				<updated>2016-02-15T15:23:05Z</updated>
		
		<summary type="html">&lt;p&gt;Andylew: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&lt;br /&gt;
The agenda follows the successful OWASP conference multi track format, with opening keynotes and presentations in the main room &amp;amp; broadcast throughout the facility, split tracks in the middle of the day, and closing panel discussions at the end of the day.&lt;br /&gt;
'''NOTE: schedule is subject to change.'''&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:86%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | Thursday, February 18th, 2016&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 7:45 - 8:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Registration and Continental Breakfast in the lobby&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 8:30 - 8:45 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | Welcome to SnowFROC 2016 Conference&lt;br /&gt;
&lt;br /&gt;
''OWASP Denver and OWASP Boulder Chapter Leaders''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 8:45 - 9:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
'''State of OWASP''' &lt;br /&gt;
&lt;br /&gt;
''Tom Brennan''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 9:00 - 10:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | '''Keynote: 15 Years of Web Security - The Rebellious Teenage Years''' &lt;br /&gt;
&lt;br /&gt;
''[https://www.whitehatsec.com/about-me_jeremiah.html Jeremiah Grossman], CTO of WhiteHat Security''  &lt;br /&gt;
&amp;lt;!-- Deck source is http://www.slideshare.net/jeremiahgrossman/15-years-of-web-security-the-rebellious-teenage-years --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:00 - 10:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Break - Expo&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | || colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:35%; background:#BC857A&amp;quot; | '''Track 1 - Upstairs'''&lt;br /&gt;
 | colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:35%; background:#BCA57A&amp;quot; | '''Track 2 - Downstairs''' &lt;br /&gt;
 | colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:35%; background:#C6E2FF&amp;quot; | '''AppSec 101: Dungeon''' &lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:30 - 11:15 || style=&amp;quot;width:35%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Making AppSec Easier: the best OWASP projects and how to leverage a worldwide AppSec effort in YOUR organization&lt;br /&gt;
''OWASP Board''&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:35%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | What did we learn about private email servers? &lt;br /&gt;
''A. Nonymous''&lt;br /&gt;
&lt;br /&gt;
 | colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:35%; background:#C6E2FF&amp;quot; align=&amp;quot;left&amp;quot; | AppSec 101 Intro &amp;amp; Blue Team Basics&lt;br /&gt;
''Tyler Bell'' &lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 11:30 - 12:00 || style=&amp;quot;width:35%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Lightning Talk: Getting Root via DeSerialization Attacks&lt;br /&gt;
 &lt;br /&gt;
''Mark Hoopes''&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:35%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Lightning Talk: Career Planning - What the Heck am I Doing Here?&lt;br /&gt;
''Andy Lewis''   &lt;br /&gt;
 | style=&amp;quot;width:35%; background:#C6E2FF&amp;quot; align=&amp;quot;left&amp;quot; | AppSec 101 ''Tyler Bell'' &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:00 - 1:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Lunch - Expo&lt;br /&gt;
  |-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 1:00 - 1:50 || style=&amp;quot;width:45%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | It's in the Cloud - It's Secure Like Voting Machines, Right? &lt;br /&gt;
''Dan Weiske''&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:45%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Embracing IoT Initiatives&lt;br /&gt;
''LAZ''   &lt;br /&gt;
 | style=&amp;quot;width:22%; background:#C6E2FF&amp;quot; align=&amp;quot;left&amp;quot; | Exploitation 101 w/MetaSploit&lt;br /&gt;
''Brad Woodward'' &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 2:00 - 2:50 || style=&amp;quot;width:45%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | False Positives in SAST: The Good, the Bad, and the Ugly&lt;br /&gt;
''Andy Earle''&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:45%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | IOT/Embedded Systems hacking&lt;br /&gt;
''Max Sobell''&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#C6E2FF&amp;quot; align=&amp;quot;left&amp;quot; | Build a Raspberry Pi Pentest Platform&lt;br /&gt;
''Bo Pearce''&lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 2:45 - 3:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | BREAK&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 3:00 - 3:45 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | End of Conference Panel Discussion: &lt;br /&gt;
&lt;br /&gt;
Topic: ''The Crystal Ball and the 2-headed Calf - What's on the Horizon and Why Does It Seem So Unnatural?''  &lt;br /&gt;
&lt;br /&gt;
'''Moderator:''' ''Andy Lewis''&lt;br /&gt;
'''Panelists:''' ''Laz, Matt Tesauro, Steve Kosten, others''&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 3:45-4:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Wrap up, vendor raffles!&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Andylew</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2016/Schedule&amp;diff=208950</id>
		<title>Front Range OWASP Conference 2016/Schedule</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2016/Schedule&amp;diff=208950"/>
				<updated>2016-02-15T15:20:33Z</updated>
		
		<summary type="html">&lt;p&gt;Andylew: Filled out the 101 track&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&lt;br /&gt;
The agenda follows the successful OWASP conference multi track format, with opening keynotes and presentations in the main room &amp;amp; broadcast throughout the facility, split tracks in the middle of the day, and closing panel discussions at the end of the day.&lt;br /&gt;
'''NOTE: schedule is subject to change.'''&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:86%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | Thursday, February 18th, 2016&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 7:45 - 8:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Registration and Continental Breakfast in the lobby&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 8:30 - 8:45 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | Welcome to SnowFROC 2016 Conference&lt;br /&gt;
&lt;br /&gt;
''OWASP Denver and OWASP Boulder Chapter Leaders''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 8:45 - 9:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
'''State of OWASP''' &lt;br /&gt;
&lt;br /&gt;
''Tom Brennan''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 9:00 - 10:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | '''Keynote: 15 Years of Web Security - The Rebellious Teenage Years''' &lt;br /&gt;
&lt;br /&gt;
''[https://www.whitehatsec.com/about-me_jeremiah.html Jeremiah Grossman], CTO of WhiteHat Security''  &lt;br /&gt;
&amp;lt;!-- Deck source is http://www.slideshare.net/jeremiahgrossman/15-years-of-web-security-the-rebellious-teenage-years --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:00 - 10:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Break - Expo&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | || colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:35%; background:#BC857A&amp;quot; | '''Track 1 - Upstairs'''&lt;br /&gt;
 | colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:35%; background:#BCA57A&amp;quot; | '''Track 2 - Downstairs''' &lt;br /&gt;
 | colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:35%; background:#C6E2FF&amp;quot; | '''AppSec 101: Dungeon''' &lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:30 - 11:15 || style=&amp;quot;width:35%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Making AppSec Easier: the best OWASP projects and how to leverage a worldwide AppSec effort in YOUR organization&lt;br /&gt;
''OWASP Board''&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:35%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | What did we learn about private email servers? &lt;br /&gt;
''A. Nonymous''&lt;br /&gt;
&lt;br /&gt;
 | colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:35%; background:#C6E2FF&amp;quot; align=&amp;quot;left&amp;quot; | AppSec 101 Intro &amp;amp; Blue Team Basics&lt;br /&gt;
''Tyler Bell'' &lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 11:30 - 12:00 || style=&amp;quot;width:35%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Lightning Talk: Getting Root via DeSerialization Attacks&lt;br /&gt;
 &lt;br /&gt;
''Mark Hoopes''&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:35%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Lightning Talk: Career Planning - What the Heck am I Doing Here?&lt;br /&gt;
''Andy Lewis''   &lt;br /&gt;
 | style=&amp;quot;width:35%; background:#C6E2FF&amp;quot; align=&amp;quot;left&amp;quot; | AppSec 101 ''Tyler Bell'' &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:00 - 1:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Lunch - Expo&lt;br /&gt;
  |-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 1:00 - 1:50 || style=&amp;quot;width:45%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | It's in the Cloud - It's Secure Like Voting Machines, Right? &lt;br /&gt;
''Andy Earl''&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:45%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Embracing IoT Initiatives&lt;br /&gt;
''LAZ''   &lt;br /&gt;
 | style=&amp;quot;width:22%; background:#C6E2FF&amp;quot; align=&amp;quot;left&amp;quot; | Exploitation 101 w/MetaSploit&lt;br /&gt;
''Brad Woodward'' &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 2:00 - 2:50 || style=&amp;quot;width:45%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | False Positives in SAST: The Good, the Bad, and the Ugly&lt;br /&gt;
''Andy Earle''&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:45%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | IOT/Embedded Systems hacking&lt;br /&gt;
''Max Sobell''&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#C6E2FF&amp;quot; align=&amp;quot;left&amp;quot; | Build a Raspberry Pi Pentest Platform&lt;br /&gt;
''Bo Pearce''&lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 2:45 - 3:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | BREAK&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 3:00 - 3:45 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | End of Conference Panel Discussion: &lt;br /&gt;
&lt;br /&gt;
Topic: ''The Crystal Ball and the 2-headed Calf - What's on the Horizon and Why Does It Seem So Unnatural?''  &lt;br /&gt;
&lt;br /&gt;
'''Moderator:''' ''Andy Lewis''&lt;br /&gt;
'''Panelists:''' ''Laz, Matt Tesauro, Steve Kosten, others''&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 3:45-4:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Wrap up, vendor raffles!&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Andylew</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2016/Schedule&amp;diff=208949</id>
		<title>Front Range OWASP Conference 2016/Schedule</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2016/Schedule&amp;diff=208949"/>
				<updated>2016-02-15T15:19:00Z</updated>
		
		<summary type="html">&lt;p&gt;Andylew: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&lt;br /&gt;
The agenda follows the successful OWASP conference multi track format, with opening keynotes and presentations in the main room &amp;amp; broadcast throughout the facility, split tracks in the middle of the day, and closing panel discussions at the end of the day.&lt;br /&gt;
'''NOTE: schedule is subject to change.'''&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:86%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | Thursday, February 18th, 2016&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 7:45 - 8:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Registration and Continental Breakfast in the lobby&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 8:30 - 8:45 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | Welcome to SnowFROC 2016 Conference&lt;br /&gt;
&lt;br /&gt;
''OWASP Denver and OWASP Boulder Chapter Leaders''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 8:45 - 9:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
'''State of OWASP''' &lt;br /&gt;
&lt;br /&gt;
''Tom Brennan''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 9:00 - 10:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | '''Keynote: 15 Years of Web Security - The Rebellious Teenage Years''' &lt;br /&gt;
&lt;br /&gt;
''[https://www.whitehatsec.com/about-me_jeremiah.html Jeremiah Grossman], CTO of WhiteHat Security''  &lt;br /&gt;
&amp;lt;!-- Deck source is http://www.slideshare.net/jeremiahgrossman/15-years-of-web-security-the-rebellious-teenage-years --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:00 - 10:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Break - Expo&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | || colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:35%; background:#BC857A&amp;quot; | '''Track 1 - Upstairs'''&lt;br /&gt;
 | colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:35%; background:#BCA57A&amp;quot; | '''Track 2 - Downstairs''' &lt;br /&gt;
 | colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:35%; background:#C6E2FF&amp;quot; | '''AppSec 101: Dungeon''' &lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:30 - 11:15 || style=&amp;quot;width:35%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Making AppSec Easier: the best OWASP projects and how to leverage a worldwide AppSec effort in YOUR organization&lt;br /&gt;
''OWASP Board''&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:35%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | What did we learn about private email servers? &lt;br /&gt;
''A. Nonymous''&lt;br /&gt;
&lt;br /&gt;
 | colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:35%; background:#C6E2FF&amp;quot; align=&amp;quot;left&amp;quot; | AppSec 101 Intro &amp;amp; Blue Team Basics&lt;br /&gt;
''Tyler Bell'' &lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 11:30 - 12:00 || style=&amp;quot;width:35%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Lightning Talk: Getting Root via DeSerialization Attacks&lt;br /&gt;
 &lt;br /&gt;
''Mark Hoopes''&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:35%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Lightning Talk: Career Planning - What the Heck am I Doing Here?&lt;br /&gt;
''Andy Lewis''   &lt;br /&gt;
 | style=&amp;quot;width:35%; background:#C6E2FF&amp;quot; align=&amp;quot;left&amp;quot; | AppSec 101 ''Tyler Bell'' &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:00 - 1:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Lunch - Expo&lt;br /&gt;
  |-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 1:00 - 1:50 || style=&amp;quot;width:45%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | It's in the Cloud - It's Secure Like Voting Machines, Right? &lt;br /&gt;
''Andy Earl''&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:45%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Embracing IoT Initiatives&lt;br /&gt;
''LAZ''   &lt;br /&gt;
 | style=&amp;quot;width:22%; background:#C6E2FF&amp;quot; align=&amp;quot;left&amp;quot; | Exploitation 101 w/MetaSploit&lt;br /&gt;
''Brad Woodward'' &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 2:00 - 2:50 || style=&amp;quot;width:45%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | False Positives in SAST: The Good, the Bad, and the Ugly&lt;br /&gt;
''Andy Earle''&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:45%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | IOT/Embedded Systems hacking&lt;br /&gt;
''Max Sobell''&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#C6E2FF&amp;quot; align=&amp;quot;left&amp;quot; | AppSec 101&lt;br /&gt;
''Tyler Bell''&lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 2:45 - 3:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | BREAK&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 3:00 - 3:45 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | End of Conference Panel Discussion: &lt;br /&gt;
&lt;br /&gt;
Topic: ''The Crystal Ball and the 2-headed Calf - What's on the Horizon and Why Does It Seem So Unnatural?''  &lt;br /&gt;
&lt;br /&gt;
'''Moderator:''' ''Andy Lewis''&lt;br /&gt;
'''Panelists:''' ''Laz, Matt Tesauro, Steve Kosten, others''&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 3:45-4:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Wrap up, vendor raffles!&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Andylew</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2016/Schedule&amp;diff=208948</id>
		<title>Front Range OWASP Conference 2016/Schedule</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2016/Schedule&amp;diff=208948"/>
				<updated>2016-02-15T15:09:51Z</updated>
		
		<summary type="html">&lt;p&gt;Andylew: Added some talks&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&lt;br /&gt;
The agenda follows the successful OWASP conference multi track format, with opening keynotes and presentations in the main room &amp;amp; broadcast throughout the facility, split tracks in the middle of the day, and closing panel discussions at the end of the day.&lt;br /&gt;
'''NOTE: schedule is subject to change.'''&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:86%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | Thursday, February 18th, 2016&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 7:45 - 8:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Registration and Continental Breakfast in the lobby&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 8:30 - 8:45 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | Welcome to SnowFROC 2016 Conference&lt;br /&gt;
&lt;br /&gt;
''OWASP Denver and OWASP Boulder Chapter Leaders''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 8:45 - 9:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
'''State of OWASP''' &lt;br /&gt;
&lt;br /&gt;
''Tom Brennan''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 9:00 - 10:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | '''Keynote: 15 Years of Web Security - The Rebellious Teenage Years''' &lt;br /&gt;
&lt;br /&gt;
''[https://www.whitehatsec.com/about-me_jeremiah.html Jeremiah Grossman], CTO of WhiteHat Security''  &lt;br /&gt;
&amp;lt;!-- Deck source is http://www.slideshare.net/jeremiahgrossman/15-years-of-web-security-the-rebellious-teenage-years --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:00 - 10:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Break - Expo&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | || colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:35%; background:#BC857A&amp;quot; | '''Track 1 - Upstairs'''&lt;br /&gt;
 | colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:35%; background:#BCA57A&amp;quot; | '''Track 2 - Downstairs''' &lt;br /&gt;
 | colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:35%; background:#C6E2FF&amp;quot; | '''AppSec 101: Dungeon''' &lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:30 - 11:15 || style=&amp;quot;width:35%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Making AppSec Easier: the best OWASP projects and how to leverage a worldwide AppSec effort in YOUR organization&lt;br /&gt;
''OWASP Board''&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:35%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | What did we learn about private email servers? &lt;br /&gt;
''A. Nonymous''&lt;br /&gt;
&lt;br /&gt;
 | colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:35%; background:#C6E2FF&amp;quot; align=&amp;quot;left&amp;quot; | AppSec 101 Intro &amp;amp; Blue Team Basics&lt;br /&gt;
''Tyler Bell'' &lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 11:30 - 12:00 || style=&amp;quot;width:35%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Lightning Talk: Getting Root via DeSerialization Attacks&lt;br /&gt;
 &lt;br /&gt;
''Mark Hoopes''&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:35%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Lightning Talk: Career Planning - What the Heck am I Doing Here?&lt;br /&gt;
''Andy Lewis''   &lt;br /&gt;
 | style=&amp;quot;width:35%; background:#C6E2FF&amp;quot; align=&amp;quot;left&amp;quot; | AppSec 101 ''Tyler Bell'' &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:00 - 1:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Lunch - Expo&lt;br /&gt;
  |-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 1:00 - 1:50 || style=&amp;quot;width:45%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | It's in the Cloud - It's Secure Like Voting Machines, Right? &lt;br /&gt;
''Andy Earl''&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:45%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Embracing IoT Initiatives&lt;br /&gt;
''LAZ''   &lt;br /&gt;
 | style=&amp;quot;width:22%; background:#C6E2FF&amp;quot; align=&amp;quot;left&amp;quot; | AppSec 101&lt;br /&gt;
''Tyler Bell'' &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 2:00 - 2:50 || style=&amp;quot;width:45%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | False Positives in SAST: The Good, the Bad, and the Ugly&lt;br /&gt;
''Andy Earle''&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:45%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | IOT/Embedded Systems hacking&lt;br /&gt;
''Max Sobell''&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#C6E2FF&amp;quot; align=&amp;quot;left&amp;quot; | AppSec 101&lt;br /&gt;
''Tyler Bell''&lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 2:45 - 3:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | BREAK&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 3:00 - 3:45 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | End of Conference Panel Discussion: &lt;br /&gt;
&lt;br /&gt;
Topic: ''The Crystal Ball and the 2-headed Calf - What's on the Horizon and Why Does It Seem So Unnatural?''  &lt;br /&gt;
&lt;br /&gt;
'''Moderator:''' ''Andy Lewis''&lt;br /&gt;
'''Panelists:''' ''Laz, Matt Tesauro, Steve Kosten, others''&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 3:45-4:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Wrap up, vendor raffles!&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Andylew</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2016/Schedule&amp;diff=208947</id>
		<title>Front Range OWASP Conference 2016/Schedule</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2016/Schedule&amp;diff=208947"/>
				<updated>2016-02-15T14:58:32Z</updated>
		
		<summary type="html">&lt;p&gt;Andylew: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&lt;br /&gt;
The agenda follows the successful OWASP conference multi track format, with opening keynotes and presentations in the main room &amp;amp; broadcast throughout the facility, split tracks in the middle of the day, and closing panel discussions at the end of the day.&lt;br /&gt;
'''NOTE: schedule is subject to change.'''&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:86%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | Thursday, February 18th, 2016&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 7:45 - 8:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Registration and Continental Breakfast in the lobby&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 8:30 - 8:45 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | Welcome to SnowFROC 2016 Conference&lt;br /&gt;
&lt;br /&gt;
''OWASP Denver and OWASP Boulder Chapter Leaders''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 8:45 - 9:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
'''State of OWASP''' &lt;br /&gt;
&lt;br /&gt;
''Tom Brennan''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 9:00 - 10:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | '''Keynote: 15 Years of Web Security - The Rebellious Teenage Years''' &lt;br /&gt;
&lt;br /&gt;
''[https://www.whitehatsec.com/about-me_jeremiah.html Jeremiah Grossman], CTO of WhiteHat Security''  &lt;br /&gt;
&amp;lt;!-- Deck source is http://www.slideshare.net/jeremiahgrossman/15-years-of-web-security-the-rebellious-teenage-years --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:00 - 10:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Break - Expo&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | || colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:35%; background:#BC857A&amp;quot; | '''Track 1 - Upstairs'''&lt;br /&gt;
 | colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:35%; background:#BCA57A&amp;quot; | '''Track 2 - Downstairs''' &lt;br /&gt;
 | colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:35%; background:#C6E2FF&amp;quot; | '''AppSec 101: Dungeon''' &lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:30 - 11:15 || style=&amp;quot;width:35%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Making AppSec Easier: the best OWASP projects and how to leverage a worldwide AppSec effort in YOUR organization&lt;br /&gt;
''OWASP Board''&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:35%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | What did we learn about private email servers? &lt;br /&gt;
''A. Nonymous''&lt;br /&gt;
&lt;br /&gt;
 | colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:35%; background:#C6E2FF&amp;quot; align=&amp;quot;left&amp;quot; | AppSec 101 Intro &amp;amp; Blue Team Basics&lt;br /&gt;
''Tyler Bell'' &lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 11:30 - 12:00 || style=&amp;quot;width:35%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Lightning Talk: Was my site hacked?  Is my site hacking visitors?  How would I know?&lt;br /&gt;
 &lt;br /&gt;
''Bob Stanley''&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:35%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Lightning Talk: Career Planning - What the Heck am I Doing Here?&lt;br /&gt;
''Andy Lewis''   &lt;br /&gt;
 | style=&amp;quot;width:35%; background:#C6E2FF&amp;quot; align=&amp;quot;left&amp;quot; | AppSec 101 ''Tyler Bell'' &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:00 - 1:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Lunch - Expo&lt;br /&gt;
  |-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 1:00 - 1:50 || style=&amp;quot;width:45%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | &amp;quot;This Year's Model&amp;quot;&lt;br /&gt;
''Mike Zussman''&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:45%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | It's in the Cloud - It's Secure Like Voting Machines, Right?  &lt;br /&gt;
''Dan Weiske''   &lt;br /&gt;
 | style=&amp;quot;width:22%; background:#C6E2FF&amp;quot; align=&amp;quot;left&amp;quot; | AppSec 101&lt;br /&gt;
''Tyler Bell'' &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 2:00 - 2:50 || style=&amp;quot;width:45%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | False Positives in SAST: The Good, the Bad, and the Ugly&lt;br /&gt;
''Andy Earle''&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:45%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Embracing IoT Initiatives&lt;br /&gt;
''LAZ''&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#C6E2FF&amp;quot; align=&amp;quot;left&amp;quot; | AppSec 101&lt;br /&gt;
''Tyler Bell''&lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 2:45 - 3:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | BREAK&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 3:00 - 3:45 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | End of Conference Panel Discussion: &lt;br /&gt;
&lt;br /&gt;
Topic: ''The Crystal Ball and the 2-headed Calf - What's on the Horizon and Why Does It Seem So Unnatural?''  &lt;br /&gt;
&lt;br /&gt;
'''Moderator:''' ''Andy Lewis''&lt;br /&gt;
'''Panelists:''' ''Laz, Matt Tesauro, Steve Kosten, others''&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 3:45-4:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Wrap up, vendor raffles!&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Andylew</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2016/Schedule&amp;diff=208946</id>
		<title>Front Range OWASP Conference 2016/Schedule</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2016/Schedule&amp;diff=208946"/>
				<updated>2016-02-15T14:56:49Z</updated>
		
		<summary type="html">&lt;p&gt;Andylew: Added Tyler's first&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&lt;br /&gt;
The agenda follows the successful OWASP conference multi track format, with opening keynotes and presentations in the main room &amp;amp; broadcast throughout the facility, split tracks in the middle of the day, and closing panel discussions at the end of the day.&lt;br /&gt;
'''NOTE: schedule is subject to change.'''&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:86%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | Thursday, February 18th, 2016&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 7:45 - 8:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Registration and Continental Breakfast in the lobby&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 8:30 - 8:45 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | Welcome to SnowFROC 2016 Conference&lt;br /&gt;
&lt;br /&gt;
''OWASP Denver and OWASP Boulder Chapter Leaders''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 8:45 - 9:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
'''State of OWASP''' &lt;br /&gt;
&lt;br /&gt;
''Tom Brennan''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 9:00 - 10:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | '''Keynote: 15 Years of Web Security - The Rebellious Teenage Years''' &lt;br /&gt;
&lt;br /&gt;
''[https://www.whitehatsec.com/about-me_jeremiah.html Jeremiah Grossman], CTO of WhiteHat Security''  &lt;br /&gt;
&amp;lt;!-- Deck source is http://www.slideshare.net/jeremiahgrossman/15-years-of-web-security-the-rebellious-teenage-years --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:00 - 10:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Break - Expo&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | || colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:35%; background:#BC857A&amp;quot; | '''Track 1 - Upstairs'''&lt;br /&gt;
 | colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:35%; background:#BCA57A&amp;quot; | '''Track 2 - Downstairs''' &lt;br /&gt;
 | colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:35%; background:#C6E2FF&amp;quot; | '''AppSec 101: Dungeon''' &lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:30 - 11:15 || style=&amp;quot;width:35%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Making AppSec Easier: the best OWASP projects and how to leverage a worldwide AppSec effort in YOUR organization&lt;br /&gt;
''OWASP Board''&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:35%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | What did we learn about private email servers? &lt;br /&gt;
''A. Nonymous''&lt;br /&gt;
&lt;br /&gt;
 | colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:35%; background:#C6E2FF&amp;quot; align=&amp;quot;left&amp;quot; | AppSec 101 Intro &amp;amp; Blue Team Basics&lt;br /&gt;
''Tyler Bell'' &lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 11:30 - 12:00 || style=&amp;quot;width:35%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Lightning Talk: Was my site hacked?  Is my site hacking visitors?  How would I know?&lt;br /&gt;
 &lt;br /&gt;
''Bob Stanley''&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:35%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Lightning Talk: TBD&lt;br /&gt;
''TBD''   &lt;br /&gt;
 | style=&amp;quot;width:35%; background:#C6E2FF&amp;quot; align=&amp;quot;left&amp;quot; | AppSec 101 ''Tyler Bell'' &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:00 - 1:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Lunch - Expo&lt;br /&gt;
  |-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 1:00 - 1:50 || style=&amp;quot;width:45%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | &amp;quot;This Year's Model&amp;quot;&lt;br /&gt;
''Mike Zussman''&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:45%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | It's in the Cloud - It's Secure Like Voting Machines, Right?  &lt;br /&gt;
''Dan Weiske''   &lt;br /&gt;
 | style=&amp;quot;width:22%; background:#C6E2FF&amp;quot; align=&amp;quot;left&amp;quot; | AppSec 101&lt;br /&gt;
''Tyler Bell'' &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 2:00 - 2:50 || style=&amp;quot;width:45%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | False Positives in SAST: The Good, the Bad, and the Ugly&lt;br /&gt;
''Andy Earle''&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:45%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Embracing IoT Initiatives&lt;br /&gt;
''LAZ''&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#C6E2FF&amp;quot; align=&amp;quot;left&amp;quot; | AppSec 101&lt;br /&gt;
''Tyler Bell''&lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 2:45 - 3:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | BREAK&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 3:00 - 3:45 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | End of Conference Panel Discussion: &lt;br /&gt;
&lt;br /&gt;
Topic: ''The Crystal Ball and the 2-headed Calf - What's on the Horizon and Why Does It Seem So Unnatural?''  &lt;br /&gt;
&lt;br /&gt;
'''Moderator:''' ''Andy Lewis''&lt;br /&gt;
'''Panelists:''' ''Laz, Matt Tesauro, Steve Kosten, others''&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 3:45-4:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Wrap up, vendor raffles!&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Andylew</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2016/Schedule&amp;diff=208945</id>
		<title>Front Range OWASP Conference 2016/Schedule</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2016/Schedule&amp;diff=208945"/>
				<updated>2016-02-15T14:56:04Z</updated>
		
		<summary type="html">&lt;p&gt;Andylew: Changed Appsec 101 title&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&lt;br /&gt;
The agenda follows the successful OWASP conference multi track format, with opening keynotes and presentations in the main room &amp;amp; broadcast throughout the facility, split tracks in the middle of the day, and closing panel discussions at the end of the day.&lt;br /&gt;
'''NOTE: schedule is subject to change.'''&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:86%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | Thursday, February 18th, 2016&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 7:45 - 8:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Registration and Continental Breakfast in the lobby&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 8:30 - 8:45 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | Welcome to SnowFROC 2016 Conference&lt;br /&gt;
&lt;br /&gt;
''OWASP Denver and OWASP Boulder Chapter Leaders''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 8:45 - 9:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
'''State of OWASP''' &lt;br /&gt;
&lt;br /&gt;
''Tom Brennan''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 9:00 - 10:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | '''Keynote: 15 Years of Web Security - The Rebellious Teenage Years''' &lt;br /&gt;
&lt;br /&gt;
''[https://www.whitehatsec.com/about-me_jeremiah.html Jeremiah Grossman], CTO of WhiteHat Security''  &lt;br /&gt;
&amp;lt;!-- Deck source is http://www.slideshare.net/jeremiahgrossman/15-years-of-web-security-the-rebellious-teenage-years --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:00 - 10:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Break - Expo&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | || colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:35%; background:#BC857A&amp;quot; | '''Track 1 - Upstairs'''&lt;br /&gt;
 | colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:35%; background:#BCA57A&amp;quot; | '''Track 2 - Downstairs''' &lt;br /&gt;
 | colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:35%; background:#C6E2FF&amp;quot; | '''AppSec 101: Dungeon''' &lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:30 - 11:15 || style=&amp;quot;width:35%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Making AppSec Easier: the best OWASP projects and how to leverage a worldwide AppSec effort in YOUR organization&lt;br /&gt;
''OWASP Board''&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:35%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | What did we learn about private email servers? &lt;br /&gt;
''A. Nonymous''&lt;br /&gt;
&lt;br /&gt;
 | colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:35%; background:#C6E2FF&amp;quot; align=&amp;quot;left&amp;quot; | AppSec 101&lt;br /&gt;
''Tyler Bell'' &lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 11:30 - 12:00 || style=&amp;quot;width:35%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Lightning Talk: Was my site hacked?  Is my site hacking visitors?  How would I know?&lt;br /&gt;
 &lt;br /&gt;
''Bob Stanley''&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:35%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Lightning Talk: TBD&lt;br /&gt;
''TBD''   &lt;br /&gt;
 | style=&amp;quot;width:35%; background:#C6E2FF&amp;quot; align=&amp;quot;left&amp;quot; | AppSec 101 ''Tyler Bell'' &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:00 - 1:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Lunch - Expo&lt;br /&gt;
  |-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 1:00 - 1:50 || style=&amp;quot;width:45%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | &amp;quot;This Year's Model&amp;quot;&lt;br /&gt;
''Mike Zussman''&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:45%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | It's in the Cloud - It's Secure Like Voting Machines, Right?  &lt;br /&gt;
''Dan Weiske''   &lt;br /&gt;
 | style=&amp;quot;width:22%; background:#C6E2FF&amp;quot; align=&amp;quot;left&amp;quot; | AppSec 101&lt;br /&gt;
''Tyler Bell'' &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 2:00 - 2:50 || style=&amp;quot;width:45%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | False Positives in SAST: The Good, the Bad, and the Ugly&lt;br /&gt;
''Andy Earle''&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:45%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Embracing IoT Initiatives&lt;br /&gt;
''LAZ''&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#C6E2FF&amp;quot; align=&amp;quot;left&amp;quot; | AppSec 101&lt;br /&gt;
''Tyler Bell''&lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 2:45 - 3:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | BREAK&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 3:00 - 3:45 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | End of Conference Panel Discussion: &lt;br /&gt;
&lt;br /&gt;
Topic: ''The Crystal Ball and the 2-headed Calf - What's on the Horizon and Why Does It Seem So Unnatural?''  &lt;br /&gt;
&lt;br /&gt;
'''Moderator:''' ''Andy Lewis''&lt;br /&gt;
'''Panelists:''' ''Laz, Matt Tesauro, Steve Kosten, others''&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 3:45-4:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Wrap up, vendor raffles!&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Andylew</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2016/Schedule&amp;diff=208081</id>
		<title>Front Range OWASP Conference 2016/Schedule</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2016/Schedule&amp;diff=208081"/>
				<updated>2016-02-03T22:44:44Z</updated>
		
		<summary type="html">&lt;p&gt;Andylew: Updated the dungeon track&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&lt;br /&gt;
The agenda follows the successful OWASP conference multi track format, with opening keynotes and presentations in the main room &amp;amp; broadcast throughout the facility, split tracks in the middle of the day, and closing panel discussions at the end of the day.&lt;br /&gt;
'''NOTE: schedule is subject to change.'''&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:86%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | Thursday, February 18th, 2016&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 7:45 - 8:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Registration and Continental Breakfast in the lobby&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 8:30 - 8:45 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | Welcome to SnowFROC 2016 Conference&lt;br /&gt;
&lt;br /&gt;
''OWASP Denver and OWASP Boulder Chapter Leaders''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 8:45 - 9:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
'''State of OWASP''' &lt;br /&gt;
&lt;br /&gt;
''Tom Brennan''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 9:00 - 10:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | '''Keynote: 15 Years of Web Security - The Rebellious Teenage Years''' &lt;br /&gt;
&lt;br /&gt;
''[https://www.whitehatsec.com/about-me_jeremiah.html Jeremiah Grossman], CTO of WhiteHat Security''  &lt;br /&gt;
&amp;lt;!-- Deck source is http://www.slideshare.net/jeremiahgrossman/15-years-of-web-security-the-rebellious-teenage-years --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:00 - 10:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Break - Expo&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | || colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:35%; background:#BC857A&amp;quot; | '''Track 1 - Upstairs'''&lt;br /&gt;
 | colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:35%; background:#BCA57A&amp;quot; | '''Track 2 - Downstairs''' &lt;br /&gt;
 | colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:35%; background:#C6E2FF&amp;quot; | '''Hands-on Lab: Dungeon''' &lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:30 - 11:15 || style=&amp;quot;width:35%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Making AppSec Easier: the best OWASP projects and how to leverage a worldwide AppSec effort in YOUR organization&lt;br /&gt;
''OWASP Board''&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:35%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | What did we learn about private email servers? &lt;br /&gt;
''A. Nonymous''&lt;br /&gt;
&lt;br /&gt;
 | colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:35%; background:#C6E2FF&amp;quot; align=&amp;quot;left&amp;quot; | AppSec 101&lt;br /&gt;
''Tyler Bell'' &lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 11:30 - 12:00 || style=&amp;quot;width:35%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Lightning Talk: Was my site hacked?  Is my site hacking visitors?  How would I know?&lt;br /&gt;
 &lt;br /&gt;
''Bob Stanley''&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:35%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Lightning Talk: TBD&lt;br /&gt;
''TBD''   &lt;br /&gt;
 | style=&amp;quot;width:35%; background:#C6E2FF&amp;quot; align=&amp;quot;left&amp;quot; | AppSec 101 ''Tyler Bell'' &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:00 - 1:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Lunch - Expo&lt;br /&gt;
  |-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 1:00 - 1:50 || style=&amp;quot;width:45%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | &amp;quot;This Year's Model&amp;quot;&lt;br /&gt;
''Mike Zussman''&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:45%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | It's in the Cloud - It's Secure Like Voting Machines, Right?  &lt;br /&gt;
''Dan Weiske''   &lt;br /&gt;
 | style=&amp;quot;width:22%; background:#C6E2FF&amp;quot; align=&amp;quot;left&amp;quot; | AppSec 101&lt;br /&gt;
''Tyler Bell'' &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 2:00 - 2:50 || style=&amp;quot;width:45%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | False Positives in SAST: The Good, the Bad, and the Ugly&lt;br /&gt;
''Andy Earle''&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:45%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Embracing IoT Initiatives&lt;br /&gt;
''LAZ''&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#C6E2FF&amp;quot; align=&amp;quot;left&amp;quot; | AppSec 101&lt;br /&gt;
''Tyler Bell''&lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 2:45 - 3:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | BREAK&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 3:00 - 3:45 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | End of Conference Panel Discussion: &lt;br /&gt;
&lt;br /&gt;
Topic: ''The Crystal Ball and the 2-headed Calf - What's on the Horizon and Why Does It Seem So Unnatural?''  &lt;br /&gt;
&lt;br /&gt;
'''Moderator:''' ''Andy Lewis''&lt;br /&gt;
'''Panelists:''' ''Laz, Matt Tesauro, Steve Kosten, others''&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 3:45-4:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Wrap up, vendor raffles!&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Andylew</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2016/Sponsors&amp;diff=207603</id>
		<title>Front Range OWASP Conference 2016/Sponsors</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2016/Sponsors&amp;diff=207603"/>
				<updated>2016-01-28T04:16:50Z</updated>
		
		<summary type="html">&lt;p&gt;Andylew: Added SecureSet&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== SnowFROC is possible through the active participation and support of these generous sponsors: ==&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;15 0 0 &amp;quot;&lt;br /&gt;
 |-&lt;br /&gt;
 | [[Image:HPE_logo.png   | link=http://www.hpe.com/              | alt=HPE               | HP Enterprise]]&lt;br /&gt;
 |}&lt;br /&gt;
&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;15 0 0 &amp;quot;&lt;br /&gt;
 |-&lt;br /&gt;
 | [[Image:Whitehatlogo-medium.png | link=http://www.whitehatsecurity.com/ | alt=WhiteHat Security | Whitehat Security]]&lt;br /&gt;
 |}&lt;br /&gt;
&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;15 0 0 &amp;quot;&lt;br /&gt;
&lt;br /&gt;
 | [[Image:Checkmarx.png  | link=http://www.checkmarx.com/       | alt=Checkmarx        | Checkmarx]]&lt;br /&gt;
 |}&lt;br /&gt;
&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;15 0 0 &amp;quot;&lt;br /&gt;
 | [[Image:SecureSet_Snip20160105.png   | link=http://www.secureset.com/ | alt=SecureSet | SecureSet]]&lt;br /&gt;
 |}&lt;br /&gt;
&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;15 0 0 &amp;quot;&lt;br /&gt;
 | [[Image:BoulderSponsorAerstone.png | link=https://aerstone.com            | alt=Aerstone         | Aerstone]]&lt;br /&gt;
&lt;br /&gt;
 |}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
 | [[Image:SecurityPursuit.png        | link=http://www.securitypursuit.com/ | alt=Security Pursuit | Security Pursuit]]&lt;br /&gt;
 | [[Image:SouthSeas.png              | 120px | link=http://www.southseascorp.com/   | alt=SouthSeas        | SouthSeas]]&lt;br /&gt;
 | [[Image:Veracode.png               | 120px | link=https://www.veracode.com/       | alt=Veracode         | Veracode]]&lt;br /&gt;
&lt;br /&gt;
 | [[Image:AppliedTrust.png           | 120px | link=http://www.appliedtrust.com     | alt=Applied Trust    | Applied Trust]]&lt;br /&gt;
 | [[Image:Checkmarx.png              | 120px | link=http://www.checkmarx.com/       | alt=Checkmarx        | Checkmarx]]&lt;br /&gt;
 | [[Image:HP.png                     | 120px | link=http://www.hpe.com/              | alt=HP               | HP]]&lt;br /&gt;
 | [[Image:HpEnterprise20160121.png   | 120px | link=http://www.hpe.com/              | alt=HPE               | HP Enterprise]]&lt;br /&gt;
 |}&lt;br /&gt;
--&amp;gt;&lt;/div&gt;</summary>
		<author><name>Andylew</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2016/Sponsors&amp;diff=207602</id>
		<title>Front Range OWASP Conference 2016/Sponsors</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2016/Sponsors&amp;diff=207602"/>
				<updated>2016-01-28T04:07:26Z</updated>
		
		<summary type="html">&lt;p&gt;Andylew: More formatting.  Looks pretty good now.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== SnowFROC is possible through the active participation and support of these generous sponsors: ==&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;15 0 0 &amp;quot;&lt;br /&gt;
 |-&lt;br /&gt;
 | [[Image:HPE_logo.png   | link=http://www.hpe.com/              | alt=HPE               | HP Enterprise]]&lt;br /&gt;
 |}&lt;br /&gt;
&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;15 0 0 &amp;quot;&lt;br /&gt;
 |-&lt;br /&gt;
 | [[Image:Whitehatlogo-medium.png | link=http://www.whitehatsecurity.com/ | alt=WhiteHat Security | Whitehat Security]]&lt;br /&gt;
 |}&lt;br /&gt;
&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;15 0 0 &amp;quot;&lt;br /&gt;
&lt;br /&gt;
 | [[Image:Checkmarx.png  | link=http://www.checkmarx.com/       | alt=Checkmarx        | Checkmarx]]&lt;br /&gt;
 |}&lt;br /&gt;
&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;15 0 0 &amp;quot;&lt;br /&gt;
 | [[Image:BoulderSponsorAerstone.png | link=https://aerstone.com            | alt=Aerstone         | Aerstone]]&lt;br /&gt;
 |}&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
 | [[Image:SecurityPursuit.png        | link=http://www.securitypursuit.com/ | alt=Security Pursuit | Security Pursuit]]&lt;br /&gt;
 | [[Image:SouthSeas.png              | 120px | link=http://www.southseascorp.com/   | alt=SouthSeas        | SouthSeas]]&lt;br /&gt;
 | [[Image:Veracode.png               | 120px | link=https://www.veracode.com/       | alt=Veracode         | Veracode]]&lt;br /&gt;
&lt;br /&gt;
 | [[Image:AppliedTrust.png           | 120px | link=http://www.appliedtrust.com     | alt=Applied Trust    | Applied Trust]]&lt;br /&gt;
 | [[Image:Checkmarx.png              | 120px | link=http://www.checkmarx.com/       | alt=Checkmarx        | Checkmarx]]&lt;br /&gt;
 | [[Image:HP.png                     | 120px | link=http://www.hpe.com/              | alt=HP               | HP]]&lt;br /&gt;
 | [[Image:HpEnterprise20160121.png   | 120px | link=http://www.hpe.com/              | alt=HPE               | HP Enterprise]]&lt;br /&gt;
 |}&lt;br /&gt;
--&amp;gt;&lt;/div&gt;</summary>
		<author><name>Andylew</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2016/Sponsors&amp;diff=207601</id>
		<title>Front Range OWASP Conference 2016/Sponsors</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2016/Sponsors&amp;diff=207601"/>
				<updated>2016-01-28T03:56:37Z</updated>
		
		<summary type="html">&lt;p&gt;Andylew: Continuing to screw around with images&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== SnowFROC is possible through the active participation and support of these generous sponsors: ==&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;15 0 0 &amp;quot;&lt;br /&gt;
 |-&lt;br /&gt;
 | [[Image:HPE_logo.png   | link=http://www.hpe.com/              | alt=HPE               | HP Enterprise]]&lt;br /&gt;
 | [[Image:BoulderSponsorAerstone.png | link=https://aerstone.com            | alt=Aerstone         | Aerstone]]&lt;br /&gt;
 |}&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;15 0 0 &amp;quot;&lt;br /&gt;
 |-&lt;br /&gt;
 | [[Image:Checkmarx.png  | link=http://www.checkmarx.com/       | alt=Checkmarx        | Checkmarx]]&lt;br /&gt;
 |}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
 | [[Image:SecurityPursuit.png        | link=http://www.securitypursuit.com/ | alt=Security Pursuit | Security Pursuit]]&lt;br /&gt;
 | [[Image:SouthSeas.png              | 120px | link=http://www.southseascorp.com/   | alt=SouthSeas        | SouthSeas]]&lt;br /&gt;
 | [[Image:Veracode.png               | 120px | link=https://www.veracode.com/       | alt=Veracode         | Veracode]]&lt;br /&gt;
&lt;br /&gt;
 | [[Image:AppliedTrust.png           | 120px | link=http://www.appliedtrust.com     | alt=Applied Trust    | Applied Trust]]&lt;br /&gt;
 | [[Image:Checkmarx.png              | 120px | link=http://www.checkmarx.com/       | alt=Checkmarx        | Checkmarx]]&lt;br /&gt;
 | [[Image:HP.png                     | 120px | link=http://www.hpe.com/              | alt=HP               | HP]]&lt;br /&gt;
 | [[Image:HpEnterprise20160121.png   | 120px | link=http://www.hpe.com/              | alt=HPE               | HP Enterprise]]&lt;br /&gt;
 |}&lt;br /&gt;
--&amp;gt;&lt;/div&gt;</summary>
		<author><name>Andylew</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2016&amp;diff=207600</id>
		<title>Front Range OWASP Conference 2016</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2016&amp;diff=207600"/>
				<updated>2016-01-28T03:50:26Z</updated>
		
		<summary type="html">&lt;p&gt;Andylew: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:SnowFROC2016_Inv_White_med.png]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- [https://www.owasp.org/images/3/31/1024px-SnowFROC_2016_wide_white_smaller.png] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Return of SnowFROC==&lt;br /&gt;
'''SAVE THE DATE - FEBRUARY 18th IT IS ON LIKE DONKEY KONG!'''&lt;br /&gt;
&amp;lt;!-- Dang thumbnails aren't rendering correctly so I'm going with plan B&lt;br /&gt;
{| cellpadding=&amp;quot;15 0 0 &amp;quot;&lt;br /&gt;
 |-&lt;br /&gt;
 | [[Image:BoulderSponsorAerstone.png | 120px | link=https://aerstone.com            | alt=Aerstone         | Aerstone]]&lt;br /&gt;
 | [[Image:SecurityPursuit.png        | 120px | link=http://www.securitypursuit.com/ | alt=Security Pursuit | Security Pursuit]]&lt;br /&gt;
 | [[Image:SouthSeas.png              | 120px | link=http://www.southseascorp.com/   | alt=SouthSeas        | SouthSeas]]&lt;br /&gt;
 | [[Image:Veracode.png               | 120px | link=https://www.veracode.com/       | alt=Veracode         | Veracode]]&lt;br /&gt;
&lt;br /&gt;
 | [[Image:AppliedTrust.png           | 120px | link=http://www.appliedtrust.com     | alt=Applied Trust    | Applied Trust]]&lt;br /&gt;
 | [[Image:Checkmarx.png              | 120px | link=http://www.checkmarx.com/       | alt=Checkmarx        | Checkmarx]]&lt;br /&gt;
 | [[Image:HP.png                     | 120px | link=http://www.hpe.com/              | alt=HP               | HP]]&lt;br /&gt;
 | [[Image:HpLogo.png   | 120px | link=http://www.hpe.com/              | alt=HPE               | HP Enterprise]]&lt;br /&gt;
 |}&lt;br /&gt;
 --&amp;gt;&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;font size=2pt&amp;gt;&lt;br /&gt;
= Introduction =&lt;br /&gt;
{{:Front_Range_OWASP_Conference_2016/Introduction}}&lt;br /&gt;
&lt;br /&gt;
=Registration=&lt;br /&gt;
{{:Front_Range_OWASP_Conference_2016/Registration}}&lt;br /&gt;
&lt;br /&gt;
=Venue=&lt;br /&gt;
{{:Front_Range_OWASP_Conference_2016/Venue}}&lt;br /&gt;
&lt;br /&gt;
=Conference Schedule=&lt;br /&gt;
{{:Front_Range_OWASP_Conference_2016/Schedule}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Speakers=&lt;br /&gt;
{{:Front_Range_OWASP_Conference_2016/Speakers}}&lt;br /&gt;
&lt;br /&gt;
=Presentations=&lt;br /&gt;
{{:Front_Range_OWASP_Conference_2016/Presentations}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Event Sponsors=&lt;br /&gt;
{{:Front_Range_OWASP_Conference_2016/Sponsors}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
=Continuing Education Credit=&lt;br /&gt;
{{:Front_Range_OWASP_Conference_2016/Continuing_Education}}&lt;br /&gt;
&lt;br /&gt;
=Hotel and Travel=&lt;br /&gt;
{{:Front_Range_OWASP_Conference_2016/Travel}}&lt;br /&gt;
&lt;br /&gt;
=Hands-On Lab/CTF=&lt;br /&gt;
{{:Front_Range_OWASP_Conference_2016/CTF}}&lt;br /&gt;
&lt;br /&gt;
=Presentation Materials=&lt;br /&gt;
{{:Front_Range_OWASP_Conference_2016/Archive}}&lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&amp;lt;/font&amp;gt;&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_AppSec_Conference]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Twitter Feed====&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; font-size: 95%; color: rgb(0, 0, 0); background-color: rgb(236, 236, 236);&amp;quot; | &lt;br /&gt;
Use the '''[http://search.twitter.com/search?q=%23FROC #FROC]''' hashtag for your tweets (What are [http://hashtags.org/ hashtags]?) &lt;br /&gt;
&lt;br /&gt;
'''@OWASP303 Twitter Feed ([http://twitter.com/OWASP303 follow us on Twitter!])'''&lt;br /&gt;
| style=&amp;quot;width: 110px; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
|} &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Call for Volunteers==&lt;br /&gt;
We will need all kinds of volunteers.  Stay tuned.&lt;br /&gt;
&lt;br /&gt;
==Call for Sponsors==&lt;br /&gt;
It doesn't happen without sponsors.  Please start to talk this up with your sponsors so that they are inclined to use their marketing dollars for this event...&lt;/div&gt;</summary>
		<author><name>Andylew</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2016/Sponsors&amp;diff=207599</id>
		<title>Front Range OWASP Conference 2016/Sponsors</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2016/Sponsors&amp;diff=207599"/>
				<updated>2016-01-28T03:42:32Z</updated>
		
		<summary type="html">&lt;p&gt;Andylew: Full sized logos are about the only option after confirming w/Matt that thumbnail functionality is still busted.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;SnowFROC is possible through the active participation and support of these generous sponsors:&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;15 0 0 &amp;quot;&lt;br /&gt;
 |-&lt;br /&gt;
 | [[Image:HPE_logo.png   | link=http://www.hpe.com/              | alt=HPE               | HP Enterprise]]&lt;br /&gt;
 | [[Image:BoulderSponsorAerstone.png | link=https://aerstone.com            | alt=Aerstone         | Aerstone]]&lt;br /&gt;
 |}&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
 | [[Image:SecurityPursuit.png        | link=http://www.securitypursuit.com/ | alt=Security Pursuit | Security Pursuit]]&lt;br /&gt;
 | [[Image:SouthSeas.png              | 120px | link=http://www.southseascorp.com/   | alt=SouthSeas        | SouthSeas]]&lt;br /&gt;
 | [[Image:Veracode.png               | 120px | link=https://www.veracode.com/       | alt=Veracode         | Veracode]]&lt;br /&gt;
&lt;br /&gt;
 | [[Image:AppliedTrust.png           | 120px | link=http://www.appliedtrust.com     | alt=Applied Trust    | Applied Trust]]&lt;br /&gt;
 | [[Image:Checkmarx.png              | 120px | link=http://www.checkmarx.com/       | alt=Checkmarx        | Checkmarx]]&lt;br /&gt;
 | [[Image:HP.png                     | 120px | link=http://www.hpe.com/              | alt=HP               | HP]]&lt;br /&gt;
 | [[Image:HpEnterprise20160121.png   | 120px | link=http://www.hpe.com/              | alt=HPE               | HP Enterprise]]&lt;br /&gt;
 |}&lt;br /&gt;
--&amp;gt;&lt;/div&gt;</summary>
		<author><name>Andylew</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:HPE_logo.png&amp;diff=207598</id>
		<title>File:HPE logo.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:HPE_logo.png&amp;diff=207598"/>
				<updated>2016-01-28T03:35:59Z</updated>
		
		<summary type="html">&lt;p&gt;Andylew: Hopefully this one is small enough to not dominate the entire SnowFROC sponsors page (until Matt can get the thumbnail-rendering/converting function fixed for the site).&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Hopefully this one is small enough to not dominate the entire SnowFROC sponsors page (until Matt can get the thumbnail-rendering/converting function fixed for the site).&lt;/div&gt;</summary>
		<author><name>Andylew</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2016&amp;diff=207597</id>
		<title>Front Range OWASP Conference 2016</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2016&amp;diff=207597"/>
				<updated>2016-01-28T03:23:53Z</updated>
		
		<summary type="html">&lt;p&gt;Andylew: Dang thumbnails aren't rendering correctly so I'm going with plan B - putting full-sized logos on a dedicated sponsors page&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:SnowFROC2016_Inv_White_med.png]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- [https://www.owasp.org/images/3/31/1024px-SnowFROC_2016_wide_white_smaller.png] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Return of SnowFROC==&lt;br /&gt;
'''SAVE THE DATE - FEBRUARY 18th IT IS ON LIKE DONKEY KONG!'''&lt;br /&gt;
&amp;lt;!-- Dang thumbnails aren't rendering correctly so I'm going with plan B&lt;br /&gt;
{| cellpadding=&amp;quot;15 0 0 &amp;quot;&lt;br /&gt;
 |-&lt;br /&gt;
 | [[Image:BoulderSponsorAerstone.png | 120px | link=https://aerstone.com            | alt=Aerstone         | Aerstone]]&lt;br /&gt;
 | [[Image:SecurityPursuit.png        | 120px | link=http://www.securitypursuit.com/ | alt=Security Pursuit | Security Pursuit]]&lt;br /&gt;
 | [[Image:SouthSeas.png              | 120px | link=http://www.southseascorp.com/   | alt=SouthSeas        | SouthSeas]]&lt;br /&gt;
 | [[Image:Veracode.png               | 120px | link=https://www.veracode.com/       | alt=Veracode         | Veracode]]&lt;br /&gt;
&lt;br /&gt;
 | [[Image:AppliedTrust.png           | 120px | link=http://www.appliedtrust.com     | alt=Applied Trust    | Applied Trust]]&lt;br /&gt;
 | [[Image:Checkmarx.png              | 120px | link=http://www.checkmarx.com/       | alt=Checkmarx        | Checkmarx]]&lt;br /&gt;
 | [[Image:HP.png                     | 120px | link=http://www.hpe.com/              | alt=HP               | HP]]&lt;br /&gt;
 | [[Image:HpEnterprise20160121.png   | 120px | link=http://www.hpe.com/              | alt=HPE               | HP Enterprise]]&lt;br /&gt;
 |}&lt;br /&gt;
 --&amp;gt;&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;font size=2pt&amp;gt;&lt;br /&gt;
= Introduction =&lt;br /&gt;
{{:Front_Range_OWASP_Conference_2016/Introduction}}&lt;br /&gt;
&lt;br /&gt;
=Registration=&lt;br /&gt;
{{:Front_Range_OWASP_Conference_2016/Registration}}&lt;br /&gt;
&lt;br /&gt;
=Venue=&lt;br /&gt;
{{:Front_Range_OWASP_Conference_2016/Venue}}&lt;br /&gt;
&lt;br /&gt;
=Conference Schedule=&lt;br /&gt;
{{:Front_Range_OWASP_Conference_2016/Schedule}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Speakers=&lt;br /&gt;
{{:Front_Range_OWASP_Conference_2016/Speakers}}&lt;br /&gt;
&lt;br /&gt;
=Presentations=&lt;br /&gt;
{{:Front_Range_OWASP_Conference_2016/Presentations}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Event Sponsors=&lt;br /&gt;
{{:Front_Range_OWASP_Conference_2016/Sponsors}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
=Continuing Education Credit=&lt;br /&gt;
{{:Front_Range_OWASP_Conference_2016/Continuing_Education}}&lt;br /&gt;
&lt;br /&gt;
=Hotel and Travel=&lt;br /&gt;
{{:Front_Range_OWASP_Conference_2016/Travel}}&lt;br /&gt;
&lt;br /&gt;
=Hands-On Lab/CTF=&lt;br /&gt;
{{:Front_Range_OWASP_Conference_2016/CTF}}&lt;br /&gt;
&lt;br /&gt;
=Presentation Materials=&lt;br /&gt;
{{:Front_Range_OWASP_Conference_2016/Archive}}&lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&amp;lt;/font&amp;gt;&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_AppSec_Conference]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Twitter Feed====&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; font-size: 95%; color: rgb(0, 0, 0); background-color: rgb(236, 236, 236);&amp;quot; | &lt;br /&gt;
Use the '''[http://search.twitter.com/search?q=%23FROC #FROC]''' hashtag for your tweets (What are [http://hashtags.org/ hashtags]?) &lt;br /&gt;
&lt;br /&gt;
'''@OWASP303 Twitter Feed ([http://twitter.com/OWASP303 follow us on Twitter!])'''&lt;br /&gt;
| style=&amp;quot;width: 110px; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
|} &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Call for Volunteers==&lt;br /&gt;
We will need all kinds of volunteers.  Stay tuned.&lt;br /&gt;
&lt;br /&gt;
==Call for Sponsors==&lt;br /&gt;
It doesn't happen without sponsors.  Please start to talk this up with your sponsors so that they are inclined to use their marketing dollars for this event...&lt;/div&gt;</summary>
		<author><name>Andylew</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2016&amp;diff=207245</id>
		<title>Front Range OWASP Conference 2016</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2016&amp;diff=207245"/>
				<updated>2016-01-21T19:15:34Z</updated>
		
		<summary type="html">&lt;p&gt;Andylew: Adding speakers &amp;amp; presentations tabs.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:SnowFROC2016_Inv_White_med.png]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- [https://www.owasp.org/images/3/31/1024px-SnowFROC_2016_wide_white_smaller.png] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Return of SnowFROC==&lt;br /&gt;
'''SAVE THE DATE - FEBRUARY 18th IT IS ON LIKE DONKEY KONG!'''&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;15 0 0 &amp;quot;&lt;br /&gt;
 |-&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
 | [[Image:BoulderSponsorAerstone.png | 120px | link=https://aerstone.com            | alt=Aerstone         | Aerstone]]&lt;br /&gt;
 | [[Image:SecurityPursuit.png        | 120px | link=http://www.securitypursuit.com/ | alt=Security Pursuit | Security Pursuit]]&lt;br /&gt;
 | [[Image:SouthSeas.png              | 120px | link=http://www.southseascorp.com/   | alt=SouthSeas        | SouthSeas]]&lt;br /&gt;
 | [[Image:Veracode.png               | 120px | link=https://www.veracode.com/       | alt=Veracode         | Veracode]]&lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
 | [[Image:AppliedTrust.png           | 120px | link=http://www.appliedtrust.com     | alt=Applied Trust    | Applied Trust]]&lt;br /&gt;
 | [[Image:Checkmarx.png              | 120px | link=http://www.checkmarx.com/       | alt=Checkmarx        | Checkmarx]]&lt;br /&gt;
 | [[Image:HP.png                     | 120px | link=http://www.hpe.com/              | alt=HP               | HP]]&lt;br /&gt;
&amp;lt;!--  | [[Image:HpEnterprise20160121.png   | 120px | link=http://www.hpe.com/              | alt=HPE               | HP Enterprise]]&lt;br /&gt;
 --&amp;gt;&lt;br /&gt;
 |}&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;font size=2pt&amp;gt;&lt;br /&gt;
= Introduction =&lt;br /&gt;
{{:Front_Range_OWASP_Conference_2016/Introduction}}&lt;br /&gt;
&lt;br /&gt;
=Registration=&lt;br /&gt;
{{:Front_Range_OWASP_Conference_2016/Registration}}&lt;br /&gt;
&lt;br /&gt;
=Venue=&lt;br /&gt;
{{:Front_Range_OWASP_Conference_2016/Venue}}&lt;br /&gt;
&lt;br /&gt;
=Conference Schedule=&lt;br /&gt;
{{:Front_Range_OWASP_Conference_2016/Schedule}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Speakers=&lt;br /&gt;
{{:Front_Range_OWASP_Conference_2016/Speakers}}&lt;br /&gt;
&lt;br /&gt;
=Presentations=&lt;br /&gt;
{{:Front_Range_OWASP_Conference_2016/Presentations}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
=Event Sponsors=&lt;br /&gt;
{{:Front_Range_OWASP_Conference_2016/Sponsors}}&lt;br /&gt;
&lt;br /&gt;
=Continuing Education Credit=&lt;br /&gt;
{{:Front_Range_OWASP_Conference_2016/Continuing_Education}}&lt;br /&gt;
&lt;br /&gt;
=Hotel and Travel=&lt;br /&gt;
{{:Front_Range_OWASP_Conference_2016/Travel}}&lt;br /&gt;
&lt;br /&gt;
=Hands-On Lab/CTF=&lt;br /&gt;
{{:Front_Range_OWASP_Conference_2016/CTF}}&lt;br /&gt;
&lt;br /&gt;
=Presentation Materials=&lt;br /&gt;
{{:Front_Range_OWASP_Conference_2016/Archive}}&lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&amp;lt;/font&amp;gt;&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_AppSec_Conference]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Twitter Feed====&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; font-size: 95%; color: rgb(0, 0, 0); background-color: rgb(236, 236, 236);&amp;quot; | &lt;br /&gt;
Use the '''[http://search.twitter.com/search?q=%23FROC #FROC]''' hashtag for your tweets (What are [http://hashtags.org/ hashtags]?) &lt;br /&gt;
&lt;br /&gt;
'''@OWASP303 Twitter Feed ([http://twitter.com/OWASP303 follow us on Twitter!])'''&lt;br /&gt;
| style=&amp;quot;width: 110px; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
|} &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Call for Volunteers==&lt;br /&gt;
We will need all kinds of volunteers.  Stay tuned.&lt;br /&gt;
&lt;br /&gt;
==Call for Sponsors==&lt;br /&gt;
It doesn't happen without sponsors.  Please start to talk this up with your sponsors so that they are inclined to use their marketing dollars for this event...&lt;/div&gt;</summary>
		<author><name>Andylew</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2016&amp;diff=207244</id>
		<title>Front Range OWASP Conference 2016</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2016&amp;diff=207244"/>
				<updated>2016-01-21T18:56:04Z</updated>
		
		<summary type="html">&lt;p&gt;Andylew: linked HP logo to hpe.com until I can replace the logo.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:SnowFROC2016_Inv_White_med.png]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- [https://www.owasp.org/images/3/31/1024px-SnowFROC_2016_wide_white_smaller.png] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Return of SnowFROC==&lt;br /&gt;
'''SAVE THE DATE - FEBRUARY 18th IT IS ON LIKE DONKEY KONG!'''&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;15 0 0 &amp;quot;&lt;br /&gt;
 |-&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
 | [[Image:BoulderSponsorAerstone.png | 120px | link=https://aerstone.com            | alt=Aerstone         | Aerstone]]&lt;br /&gt;
 | [[Image:SecurityPursuit.png        | 120px | link=http://www.securitypursuit.com/ | alt=Security Pursuit | Security Pursuit]]&lt;br /&gt;
 | [[Image:SouthSeas.png              | 120px | link=http://www.southseascorp.com/   | alt=SouthSeas        | SouthSeas]]&lt;br /&gt;
 | [[Image:Veracode.png               | 120px | link=https://www.veracode.com/       | alt=Veracode         | Veracode]]&lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
 | [[Image:AppliedTrust.png           | 120px | link=http://www.appliedtrust.com     | alt=Applied Trust    | Applied Trust]]&lt;br /&gt;
 | [[Image:Checkmarx.png              | 120px | link=http://www.checkmarx.com/       | alt=Checkmarx        | Checkmarx]]&lt;br /&gt;
 | [[Image:HP.png                     | 120px | link=http://www.hpe.com/              | alt=HP               | HP]]&lt;br /&gt;
&amp;lt;!--  | [[Image:HpEnterprise20160121.png   | 120px | link=http://www.hpe.com/              | alt=HPE               | HP Enterprise]]&lt;br /&gt;
 --&amp;gt;&lt;br /&gt;
 |}&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;font size=2pt&amp;gt;&lt;br /&gt;
= Introduction =&lt;br /&gt;
{{:Front_Range_OWASP_Conference_2016/Introduction}}&lt;br /&gt;
&lt;br /&gt;
=Registration=&lt;br /&gt;
{{:Front_Range_OWASP_Conference_2016/Registration}}&lt;br /&gt;
&lt;br /&gt;
=Venue=&lt;br /&gt;
{{:Front_Range_OWASP_Conference_2016/Venue}}&lt;br /&gt;
&lt;br /&gt;
=Conference Schedule=&lt;br /&gt;
{{:Front_Range_OWASP_Conference_2016/Schedule}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
=Speakers=&lt;br /&gt;
{{:Front_Range_OWASP_Conference_2016/Speakers}}&lt;br /&gt;
&lt;br /&gt;
=Presentations=&lt;br /&gt;
{{:Front_Range_OWASP_Conference_2016/Presentations}}&lt;br /&gt;
&lt;br /&gt;
=Event Sponsors=&lt;br /&gt;
{{:Front_Range_OWASP_Conference_2016/Sponsors}}&lt;br /&gt;
&lt;br /&gt;
=Continuing Education Credit=&lt;br /&gt;
{{:Front_Range_OWASP_Conference_2016/Continuing_Education}}&lt;br /&gt;
&lt;br /&gt;
=Hotel and Travel=&lt;br /&gt;
{{:Front_Range_OWASP_Conference_2016/Travel}}&lt;br /&gt;
&lt;br /&gt;
=Hands-On Lab/CTF=&lt;br /&gt;
{{:Front_Range_OWASP_Conference_2016/CTF}}&lt;br /&gt;
&lt;br /&gt;
=Presentation Materials=&lt;br /&gt;
{{:Front_Range_OWASP_Conference_2016/Archive}}&lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&amp;lt;/font&amp;gt;&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_AppSec_Conference]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Twitter Feed====&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; font-size: 95%; color: rgb(0, 0, 0); background-color: rgb(236, 236, 236);&amp;quot; | &lt;br /&gt;
Use the '''[http://search.twitter.com/search?q=%23FROC #FROC]''' hashtag for your tweets (What are [http://hashtags.org/ hashtags]?) &lt;br /&gt;
&lt;br /&gt;
'''@OWASP303 Twitter Feed ([http://twitter.com/OWASP303 follow us on Twitter!])'''&lt;br /&gt;
| style=&amp;quot;width: 110px; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
|} &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Call for Volunteers==&lt;br /&gt;
We will need all kinds of volunteers.  Stay tuned.&lt;br /&gt;
&lt;br /&gt;
==Call for Sponsors==&lt;br /&gt;
It doesn't happen without sponsors.  Please start to talk this up with your sponsors so that they are inclined to use their marketing dollars for this event...&lt;/div&gt;</summary>
		<author><name>Andylew</name></author>	</entry>

	</feed>